Manage Security and Privacy Flashcards
What are the three ways to authenticate or verify your identity?
- Provide username and password
- If you Mac has Touch ID, you can use your fingerprint as long as you’ve logged in once before.
- You can use your Apple Watch to unlock your screen saver and approve authentication requests.
What are the 5 different types of passwords you can use to secure a Mac?
- Local user account password
- Apple ID and password
- Keychain passwords
- Resource passwords
- Firmware password
What types of items can you store in a keychain?
Keychain stores your resource passwords, certificates, keys, website forms, and secure notes.
How does Keychain Access help protect your information?
It manages encrypted files that are used to securely save your items. These files are impenetrable unless you know the keychain password. If you forget the keychain password, you lose the file contents forever.
Where is a users login keychain stored?
/Users/username/Library/Keychain/login.keychain-db
What happens if the login password doesn’t match the login keychain password?
macOS renames the keychain with a filename that begins with “login_renamed_” followed by a number.
Where are other local keychains stored?
/Users/username/Library/Keychains/others.keychain
Why would you want to create a separate keychain to be stored with the other local keychains?
If you wanted to keep your default login keychain for items that require less security and create a more secure keychain that doesn’t automatically unlock for items that require a lot of security.
Where is the iCloud Keychain stored?
/Users/username/Library/Keychains/UUID/
Where are system keychains with authentication assets that aren’t user specific store?
/Library/Keychains/System.keychain
What items are stored in the /Library/Keychains/System.keychain?
Wi-Fi wireless network passwords, 802.1X network passwords, self -signed certificates, and intermediate and root certificate authorities (CAs) that you installed.
What is unique about the /System/Library/Keychains/ keychain?
You can’t modify these items that appear with System Roots, which contains root certificates that Apple provides as part of macOS and are used to identify trusted network services.
What tool do Mac computers with Apple silicon, or Intel-based Mac computers with the T2 chip with FileVault enabled use to provide an additional layer of security against brute force password attacks?
Secure Enclave
How does Secure Enclave work?
It enforces delays between password attempts at login after startup, and in target disk mode, for Intel-based Mac computers with the T2 chip.
After how many attempts of entering a password is your computer Disabled with Secure Enclave?
10
Where does Safari save secret information in regards to keychain, if iCloud Keychain settings are turned OFF?
In the Local Items Keychain
Where can you adjust Safari AutoFill settings?
Safari - Preferences - AutoFill tab
The Passwords System Preferences pane is a new feature of macOS Monterey. What does it do?
- Review and edit password information
- Enter Setup Key for websites that support verification codes
- Detect passwords that easily guessed, that have appeared in a data leak, or have been reused
- Send password info using AirDrop to people in your contacts
- Copy user name and password info with a Control-click
- Add and remove websites
- Import and export website passwords in an unencrypted CSV file.
What does iCloud Keychain do?
It shares your commonly used secrets among your Apple devices through iCloud. When enabled, contents of the Local Items keychain are renamed iCloud and are stored on Apple iCloud servers and pushed to your other Apple configured devices.
How does two-factor authentication provide added security to your Apple ID?
Your Apple ID account can only be access after you approve the sign-in with a device you trust, such as your iPhone, iPad, or Mac.
True/False: If you sign in to another Apple device using an Apple ID with two-factor authentication, iCloud Keychain is automatically turned on.
True