Lesson 9: Manage Security and Privacy Flashcards

• Describe password types and use. • Manage secrets in Keychain. • Turn on iCloud Keychain and manage it. • Manage systemwide security and user privacy. • Use System Extensions. • Use Find My. • Secure your Mac with Activation Lock. • Lock your screen.

1
Q

What are the different types of passwords you can use to secure a Mac?

A

The different types of passwords you can use to secure a Mac are listed below:

  • Local user account password: Used to log in to your Mac
  • Apple ID and password: For iCloud, iTunes Store, and the App Store
  • Keychain passwords: To protect authentication assets in encrypted keychain files
  • Resource passwords: Such as for email, websites, file servers, apps, and encrypted disk images
  • Firmware password: Prevents your Mac from starting up from any disk other than your designated startup disk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What types of items can you store in a keychain?

A

You use keychains to securely store resource passwords, certificates, keys, website forms, Safari AutoFill information, and secure text notes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does Keychain Access help protect your information?

A

Keychain Access manages encrypted files that are used to securely save your items.

These files are impenetrable unless you know the keychain password.

If you forget the keychain password, you lose the file contents forever.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where are keychain files stored?

A

Keychain files are stored throughout macOS for different users and resources:

  • A user’s login keychain is stored in: /Users/{username}/Library/Keychain/login.keychain-db
  • Other local keychains are stored in: /Users/{username}/Library/Keychains/others.keychain
  • A user’s Local Items or iCloud keychain (depending on if iCloud keychain is turned on) is stored in: /Users/{username}/Library/Keychains/UUID/
  • A system keychain with authentication assets that aren’t user specific (for example, Wi-Fi wireless network passwords, 802.1X network passwords, self-signed certificates, intermediate and root certificate authorities (CAs) installed by you) is stored in: /Library/Keychains/System.keychain
  • Most of the items in /System/Library/Keychains/ don’t appear by default, with the exception of System Roots, which contains root certificates that Apple provides as part of macOS that are used to identify trusted network services.
  • macOS contains other keychains, but you should leave these files alone unless you’re told by a trusted source to resolve an issue.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What app should you use to manage keychain settings?

A

You should use Keychain Access to view and modify most keychain items.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does two-factor authentication provide added security to your Apple ID?

A

With two-factor authentication, your Apple ID account can be accessed only after you approve a sign-in with a device you trust, such as your iPhone, iPad, or Mac.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which macOS system-wide and personal settings can you manage in Security & Privacy preferences?

A

macOS system-wide and personal settings that you can manage in Security & Privacy preferences are listed below:

  • General settings: Provides the option to require a password to wake a Mac from sleep or screen saver mode and to define a delay before this requirement sets in. Also allows you to configure a custom message to show at the login window or when the screen is locked.
  • Advanced settings: Provides the option to require users to automatically log out of accounts after a certain amount of inactivity and to require an administrator password to access system-wide preferences.
  • FileVault settings: Provides the option to enable and configure FileVault.
  • Firewall settings: Provides the option to enable and configure personal network firewall settings.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which feature can you enable to find a lost Mac?

A

Find My helps you find a lost Mac by allowing you to remotely access the Mac computer’s Location Services service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can you limit the use of Location Services?

A

You can use the Privacypane of Security & Privacy preferences to configure app access to Location Services, Contacts, Calendars, Reminders, and social network services.

When a new app requests information that’s considered personal, macOS asks you for permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can you ensure that audio recordings used for Dictation service remain private?

A

To ensure that your voice recordings remain private, you can manage your Enhanced Dictation settings manually. (The Enhanced Dictation option is enabled by default.)

When you use Enhanced Dictation, your Mac immediately converts what you say into text without sending your dictated speech to Apple.

If you turn Enhanced Dictation off or use Siri, what you say and dictate will be recorded and sent to Apple to be converted to text.

(Apple also tracks other information such as your name, nickname, location, and much of the user data sent from your device.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly