Part 2 User Accounts: Lesson 6 Flashcards

0
Q

What are some security risk associated with each type of user account?

A

Standard user accounts are very secure, assuming they have good passwords. Administrative users can make changes that may negatively affect the system or other user accounts. A guest user could potentially fill shared folders with unwanted files. Sharing only users are generally very secure as long as you don’t allow excessive access to your account. The potential for mayhem with root user access is nearly unlimited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What are the five types of user accounts and OS 10? How are they different?

A

Standard is the default account type; administrative users can make changes to the system; a guest user doesn’t require a password; sharing only users can access only shared files; and the root user has unlimited access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are account attributes?

A

Account attributes are the individual pieces of information used to define a user account. Examples include full name, account name, user ID, Universally Unique ID (UUID), group, and home folder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can you limit a user account from having full access to all applications?

A

Parental controls can be used to further limit a user account. Examples include enforcing a simple Finder, limiting applications and widgets, setting time limits, and content filtering for several applications included in OS X.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What types of contention issues can occur when fast user switching is enabled?

A

Resource contention occurs when fast user switching is enabled and a user tries to access an item another user already has open in the background. Document contention occurs when a user attempts to open a document another user has already opened. Peripheral contention occurs when a user attempt to access a peripheral already in use by another user’s open application. Application contention occurs when the second user attempts to access an application designed to run only once on a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What security risk related to storage can occur when fast user switching is enabled?

A

when fast user switching is enabled, all users are allowed to see other user’s locally connected disks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly