Manage Security and Privacy Flashcards

1
Q

What are the three ways to authenticate or verify your identity?

A
  1. Provide username and password
  2. If you Mac has Touch ID, you can use your fingerprint as long as you’ve logged in once before.
  3. You can use your Apple Watch to unlock your screen saver and approve authentication requests.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 5 different types of passwords you can use to secure a Mac?

A
  1. Local user account password
  2. Apple ID and password
  3. Keychain passwords
  4. Resource passwords
  5. Firmware password
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What types of items can you store in a keychain?

A

Keychain stores your resource passwords, certificates, keys, website forms, and secure notes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does Keychain Access help protect your information?

A

It manages encrypted files that are used to securely save your items. These files are impenetrable unless you know the keychain password. If you forget the keychain password, you lose the file contents forever.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Where is a users login keychain stored?

A

/Users/username/Library/Keychain/login.keychain-db

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What happens if the login password doesn’t match the login keychain password?

A

macOS renames the keychain with a filename that begins with “login_renamed_” followed by a number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Where are other local keychains stored?

A

/Users/username/Library/Keychains/others.keychain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why would you want to create a separate keychain to be stored with the other local keychains?

A

If you wanted to keep your default login keychain for items that require less security and create a more secure keychain that doesn’t automatically unlock for items that require a lot of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Where is the iCloud Keychain stored?

A

/Users/username/Library/Keychains/UUID/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Where are system keychains with authentication assets that aren’t user specific store?

A

/Library/Keychains/System.keychain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What items are stored in the /Library/Keychains/System.keychain?

A

Wi-Fi wireless network passwords, 802.1X network passwords, self -signed certificates, and intermediate and root certificate authorities (CAs) that you installed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is unique about the /System/Library/Keychains/ keychain?

A

You can’t modify these items that appear with System Roots, which contains root certificates that Apple provides as part of macOS and are used to identify trusted network services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What tool do Mac computers with Apple silicon, or Intel-based Mac computers with the T2 chip with FileVault enabled use to provide an additional layer of security against brute force password attacks?

A

Secure Enclave

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does Secure Enclave work?

A

It enforces delays between password attempts at login after startup, and in target disk mode, for Intel-based Mac computers with the T2 chip.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

After how many attempts of entering a password is your computer Disabled with Secure Enclave?

A

10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Where does Safari save secret information in regards to keychain, if iCloud Keychain settings are turned OFF?

A

In the Local Items Keychain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Where can you adjust Safari AutoFill settings?

A

Safari - Preferences - AutoFill tab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The Passwords System Preferences pane is a new feature of macOS Monterey. What does it do?

A
  1. Review and edit password information
  2. Enter Setup Key for websites that support verification codes
  3. Detect passwords that easily guessed, that have appeared in a data leak, or have been reused
  4. Send password info using AirDrop to people in your contacts
  5. Copy user name and password info with a Control-click
  6. Add and remove websites
  7. Import and export website passwords in an unencrypted CSV file.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does iCloud Keychain do?

A

It shares your commonly used secrets among your Apple devices through iCloud. When enabled, contents of the Local Items keychain are renamed iCloud and are stored on Apple iCloud servers and pushed to your other Apple configured devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How does two-factor authentication provide added security to your Apple ID?

A

Your Apple ID account can only be access after you approve the sign-in with a device you trust, such as your iPhone, iPad, or Mac.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

True/False: If you sign in to another Apple device using an Apple ID with two-factor authentication, iCloud Keychain is automatically turned on.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the four tabs you can adjust settings to in the Security and Privacy pane of System Preferences?

A
  1. General
  2. FileVault
  3. Firewall
  4. Privacy
23
Q

What are the 4 settings you can adjust under the General tab of the Privacy and Security pane of System Preferences?

A
  1. Change current user password
  2. Require password to unlock Mac from sleep/screen saver and define a delay before that requirement sets in.
  3. Show message on Lock Screen
  4. Allow app downloads from either JUST the App Store OR BOTH the App Store and trusted developers
24
Q

What are the 2 settings you can adjust under Advanced Security and Privacy settings?

A
  1. Set a time period to log out after a set time of inactivity
  2. Require and admin password to access system-wide preferences
25
Q

What feature keeps embedded content such as social media buttons and content from tracking you without permission?

A

Intelligent Tracking Prevention

26
Q

What are the two new features in iCloud+ that protect user data with macOS Monterey?

A
  1. iCloud Private Relay

2. Hide My Email

27
Q

What does iCloud Private Relay do?

A

Conceals a user’s IP traffic because this information could be used to determine your identity and build a profile of your location and browsing history over time.

28
Q

What does Hide My Email do?

A

Generates unique, random email addresses that forward to your personal inbox.

29
Q

What two types of local user accounts can manage service access to personal information in the Privacy pane of Security and Privacy settings?

A

Administrator and Standard user accounts

30
Q

What kind of information can you see/adjust in the Privacy tab of Security and Privacy settings?

A

Apps or services that have asked for information that you can choose to allow or disallow further attempts by those apps to collect information

31
Q

How can you limit the use of Location Services?

A

You can use the Privacy pane of Security and Privacy preferences to configure app access to Location Services, Contacts, Calendars, Reminders, and social network services.

32
Q

What happens when an application requests information that’s considered personal?

A

macOS asks you for Permission

33
Q

What does “Full Disk Access” show in the Privacy pane of Security and Privacy?

A

Apps that can access your entire disk in order to access sensitive data like Mail, Messages, Safari, Home, and Time Machine backups.

34
Q

What does “User Availability” show in the Privacy pane of Security and Privacy?

A

Apps that have access to your Focus status?

35
Q

What does “Automation” show in the Privacy pane of Security and Privacy?

A

Apps that can access and control other apps on your Mac.

36
Q

How do you enable Dictation

A

In the Dictation pane of Keyboard preferences.

37
Q

Where can you enable the “Prevent cross-site tracking” feature?

A

The privacy tab of Safari preferences

38
Q

What feature should you use to find a lost Mac?

A

Find My

39
Q

What are the two primary functions of Find My?

A
  1. Stay in touch with friends and family members who share their location with you.
  2. Locate Apple devices
40
Q

How does Find My see your Mac?

A

Once enabled, your Mac broadcasts Bluetooth signals with the information about its location, even when it’s offline or sleeping. Other nearby Apple devices in use relay that information to iCloud.

41
Q

What two options are turned on automatically when you enable Find My Mac?

A
  1. Find My Mac

2. Find My Network

42
Q

What are the three requirements a Mac must have/have enabled to turn on Find My Mac?

A
  1. An internet connection
  2. Location Services Enabled
  3. Be configured with iCloud, with Find My turned on.
43
Q

True/False: You can erase a Mac that has been locked by Find My.

A

False, you cannot erase the Mac until it has been unlocked.

44
Q

What is Activation Lock?

A

A feature designed to prevent an unauthorized person from using or selling your device.

45
Q

What are the four requirements for Activation Lock?

A
  1. macOS Catalina or higher
  2. Mac with Apple Silicon OR an Intel-based Mac with the T2 chip.
  3. Apple ID account must have two-factor authentication
  4. If Intel-based Mac it must have the default Secure Boot setting of Full Security and the External Boot setting of “Disallow”
46
Q

Where can you look to check if your Mac has Activation Lock enabled?

A

System Information - Hardware Overview

47
Q

What do you need to enter on the Activation Lock Screen to unlock?

A

Apple ID password

48
Q

What are the three types of System Extensions?

A
  1. Network extensions
  2. Endpoint security extensions
  3. Driver extensions
49
Q

Where can you approve/allow a Security Extension?

A

The General tab of Security and Privacy settings in System Preferences

50
Q

How do you delete a system extension?

A

By deleting the app from the Applications folder that the extension came from.

51
Q

What is a kernel extension?

A

A dynamically loaded bundle of executable code that runs in kernel space to perform low-level tasks.

52
Q

What are the three conditions that must be met before a standard user account can install a legacy system extension on a Mac with Apple silicon?

A
  1. Volume for macOS has a Security Policy configured with Reduced Security mode.
  2. For the Security Policy, the “Allow user management of kernel extensions from identified developers” checkbox must be selected
  3. The third-party extension must be notarized.
53
Q

What is the key combination to lock your screen?

A

Control-Command-Q