Managing Apple Device Security Flashcards

1
Q

Some apps install ____, or kexts—a kind of system extension that works using older methods that aren’t as secure or reliable as modern alternatives

A

kernel extensions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

On your Mac, where can you find application permission settings for Full Disk Access, Camera access, and other privacy-related settings?

A

Settings > Privacy & Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What Terminal command opens the manual for tccutil?

A

man tccutil

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The ____ Terminal command manages the privacy database, which stores decisions the user has made about whether apps may access personal data

A

tccutil

TCC means Transparency, Consent, and Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In Terminal, you can use ____ to determine the bundle identifier for an application

A

codesign

You can use codesign to create, check, and display code signatures and inquire into the dynamic status of signed code in macOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What Terminal command opens the manual for codesign?

A

man codesign

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Scenario: After typing codesign -d -r - /Applications/Webex.app to determine the bundle identifier, Cisco-Systems.Spark, what Terminal command do you type next to reset privacy settings for the said app?

A

tccutil reset All Cisco-Systems.Spark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which Terminal command resets privacy settings for all applications on your Mac?

A

tccutil reset All

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do you remove an application’s access to the camera in the Privacy section of Privacy & Security settings?

A. Click the application from the list in Camera settings and click the minus button.

B. Turn off the application from the Camera settings list.

C. Click the application and click Disable Camera Access.

D. Enter an administrator account password, then delete the application from Camera settings.

A

B. Turn off the application from the Camera settings list.

You turn off applications to remove their access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do privacy settings help users do?

A. Prevent unauthorized applications from opening

B. Control what applications can or can’t do with a Mac

C. Secure data on their disk by encrypting the contents automatically

A

B. Control what applications can or can’t do with a Mac

Users can update camera, microphone, and screen recording settings to control what applications can or can’t do with a Mac.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which privacy setting allows applications to monitor input from the user’s keyboard even while they’re using other applications?

A. Accessibility

B. Automation

C. Bluetooth

D. Input Monitoring

A

D. Input Monitoring

Input Monitoring grants applications access to a user’s input devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What Terminal command should you type to sign application Terminal.app with a signing identity named “authority”?

A

codesign -s authority Terminal.app

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which option causes codesign to replace any existing signature on the path(s) given. Without this option, existing signatures will not be replaced, and the signing operation fails.

A

-f

f means force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What Terminal command should you type to verify the dynamic validity of process 666

A

codesign –verify 666

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What Terminal command should you type to display all information about Terminal.app’s code signature?

A

codesign –display –verbose=4 Terminal.app

-d is also display

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

____ is a security technology designed to help prevent potentially malicious software from modifying protected files and folders on your Mac. It restricts the root user account and limits the actions that the root user can perform on protected parts of the Mac operating system.

A

System Integrity Protection

18
Q

System Integrity Protection includes protection for which parts of the system?

A
  • /System
  • /usr
  • /bin
  • /sbin
  • /var
  • Apps that are pre-installed with the Mac operating system
19
Q

Which Paths and apps can third-party apps and installers continue to write to?

A
  • /Applications
  • /Library
  • /usr/local
20
Q

Apps that you download from the App Store already work with System Integrity Protection

A. True
B. False

A

A. True

21
Q

MacOS malware defenses are structured in which three layers?

A
  1. Prevent launch or execution of malware: App Store, or Gatekeeper combined with Notarization
  2. Block malware from running on customer systems: Gatekeeper, Notarization, and XProtect
  3. Remediate malware that has executed: XProtect
22
Q

____ is a malware scanning service provided by Apple. Developers who want to distribute apps for macOS outside the App Store submit their apps for scanning as part of the distribution process

A

Notarization

23
Q

MacOS includes built-in antivirus technology called ____ for the signature-based detection and removal of malware

A

XProtect

24
Q

Which conditions prompt XProtect to check for known malicious content?

A
  • An app is first launched
  • An app has been changed (in the file system)
  • XProtect signatures are updated
25
Q

MacOS includes a security technology called ____, which is designed to help ensure that only trusted software runs on a user’s Mac

A

Gatekeeper

Gatekeeper also requests user approval before opening downloaded software for the first time to make sure the user hasn’t been tricked into running executable code they believed to simply be a data file

26
Q

____ deliver important security improvements between software updates—for example, improvements to the Safari web browser, the WebKit framework stack, or other critical system libraries. They may also be used to mitigate some security issues more quickly, such as issues that might have been exploited or reported to exist “in the wild.”

A

Rapid Security Responses

Rapid Security Responses deliver important security improvements between software updates.

27
Q

Where do you check if your device automatically applies Rapid Security Responses?

A
  • iPhone or iPad: Go to Settings > General > Software Update > Automatic Updates, then make sure that “Security Responses & System Files” is turned on
  • Mac: Choose Apple menu > System Settings > General > Software Update. Click the Show Detail button (i button) next to Automatic Updates, then make sure that “Install Security Responses and system files” is turned on
28
Q

____ is an optional, extreme protection that’s designed for the very few individuals who, because of who they are or what they do, might be personally targeted by some of the most sophisticated digital threats

A

Lockdown Mode

Lockdown Mode helps protect devices against extremely rare and highly sophisticated cyber attacks.

29
Q

How do you turn on Lockdown mode on your iPhone or iPad?

A

Settings > Privacy & Security > Lockdown Mode > Turn On Lockdown Mode

You will need to enter your device passcode

30
Q

How do you turn on Lockdown mode on your Mac?

A

System Settings > Privacy & Security > Lockdown Mode > Turn On Lockdown Mode

31
Q

How do you exclude an app or edit your excluded websites on your iPhone while in Lockdown Mode?

A

Settings > Privacy & Security > Lockdown Mode > Configure Web Browsing > Turn off selected apps

To edit your excluded websites, tap Excluded Safari Websites > Edit.

32
Q

How do you exclude websites on your Mac while in Lockdown Mode?

A

Safari menu > Settings for [website] > deselect the Enable Lockdown Mode checkbox

To edit your excluded websites:
Safari menu > Settings > Websites > in sidebar click Lockdown Mode > From the menu next to a configured website, turn Lockdown Mode on or off

33
Q

If a device is in Lockdown Mode, new configuration profiles can be installed, and the device can be enrolled in Mobile Device Management or device supervision

A. True
B. False

A

B. False

34
Q

You can’t have both Screen Sharing and Remote Management on at the same time

A. True
B. False

A

A. True

35
Q

On your Mac, where can you find security settings for Screen Sharing such as password or control permissions?

A

System Settings > General > Sharing > Screen Sharing > click Info button (i)

36
Q

If you forget your login password or need to reset it, ____ won’t let you access your encrypted files

A

FileVault

37
Q

How do you turn on FileVault on your Mac?

A

Settings > Privacy & Security > FileVault > Turn On >follow onscreen instructions

38
Q

What should you do after you turn on FileVault?

A. Continue to use your Mac as you normally do.

B. Wait until FileVault encryption is complete.

C. Quit all applications.

D. Log out of your user account.

A

A. Continue to use your Mac as you normally do.

You can use your Mac normally because encryption is nearly immediate for Mac computers with Apple silicon or the T2 chip, and it proceeds safely in the background on other Mac computers.

39
Q

You’ve forgotten your login password or it’s locked from too many failed attempts to log in.

What’s the alternative method to unlock FileVault and reset your password?

A. Call AppleCare to create a new account recovery key.

B. Use iCloud Account Recovery.

C. Create a new personal recovery key.

A

B. Use iCloud Account Recovery.

Instead of using a personal recovery key, you can set up FileVault to use your iCloud account to reset the password and access your user account and files.