Managing Privacy and Security on Mac Flashcards
Which option in System Settings do you use to turn on FileVault on a Mac?
A. Privacy & Security
B. General > Storage
C. Apple ID
D. Users & Groups
A. Privacy & Security
You use Privacy & Security settings in System Settings to turn on FileVault.
What should you do after you turn on FileVault?
A. Continue to use your Mac as you normally do.
B. Wait until FileVault encryption is complete.
C. Quit all applications.
D. Log out of your user account.
A. Continue to use your Mac as you normally do.
You can use your Mac normally because encryption is nearly immediate for Mac computers with Apple silicon or the T2 chip, and it proceeds safely in the background on other Mac computers.
You’ve forgotten your login password or it’s locked from too many failed attempts to log in.
What’s the alternative method to unlock FileVault and reset your password?
A. Call AppleCare to create a new account recovery key.
B. Use iCloud Account Recovery.
C. Create a new personal recovery key.
B. Use iCloud Account Recovery.
Instead of using a personal recovery key, you can set up FileVault to use your iCloud account to reset the password and access your user account and files.
How do you remove an application’s access to the camera in the Privacy section of Privacy & Security settings?
A. Click the application from the list in Camera settings and click the minus button.
B. Turn off the application from the Camera settings list.
C. Click the application and click Disable Camera Access.
D. Enter an administrator account password, then delete the application from Camera settings.
B. Turn off the application from the Camera settings list.
You turn off applications to remove their access.
What do privacy settings help users do?
A. Prevent unauthorized applications from opening
B. Control what applications can or can’t do with a Mac
C. Secure data on their disk by encrypting the contents automatically
B. Control what applications can or can’t do with a Mac
Users can update camera, microphone, and screen recording settings to control what applications can or can’t do with a Mac.
Which privacy setting allows applications to monitor input from the user’s keyboard even while they’re using other applications?
A. Accessibility
B. Automation
C. Bluetooth
D. Input Monitoring
D. Input Monitoring
Input Monitoring grants applications access to a user’s input devices.
Which sharing service uses the VNC protocol?
A. Internet sharing
B. File sharing
C. Printer sharing
D. Screen sharing
D. Screen sharing
Screen sharing allows users of other computers to remotely view and control your computer using the VNC protocol, an industry standard for controlling computers remotely on a network using TCP/IP.
Which sharing service allows you to store software updates, apps, and other content on your computer to reduce bandwidth usage and speed up installation on supported devices?
A. Media sharing
B. Content caching
C. File sharing
D. Internet sharing
B. Content caching
Content caching speeds up the downloading of software that Apple distributes and data that users store in iCloud by saving content that local Mac computers, iPhone and iPad devices, and Apple TV devices have already downloaded.
Which Apple application allows others to access your computer?
A. Apple Remote Login
B. Internet sharing
C. Apple Remote Desktop
D. File sharing
C. Apple Remote Desktop
You can manage computers remotely, send content, and update settings after downloading Apple Remote Desktop from the App Store.
Which web address should you use to locate a Mac if you don’t have access to Find My on another Apple device?
A. iCloud.com
B. FindMy.com
C. support.apple.com
A. iCloud.com
To use Find My when you don’t have an Apple device, sign in to iCloud.com.
What does the “Find My network” option do to help you locate missing devices?
A. It lets you find devices using Bluetooth connections.
B. It automatically plays a sound when the device loses its Wi-Fi connection.
C. It allows a message to appear on a Mac when it isn’t connected to Wi-Fi.
A. It lets you find devices using Bluetooth connections.
When a device isn’t connected to Wi-Fi, “Find My network” looks for it using Bluetooth connections to nearby Apple devices that are on Wi-Fi.
What additional information must you provide to use the remote erase option on iCloud.com?
A. Verification code
B. Your Mac computer’s serial number
C. Touch ID or Face ID confirmation
A. Verification code
You must enter a verification code sent through two-factor authentication to confirm that your Mac erases.