Part 3 File Systems 9 - 12 Flashcards

1
Q

3 partition schemes:

A

GUID partition table
APM Apple Partition Map
MBR Master Boot Record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

2 Mac volume formats

A

Mac OS Extended (journaled)

Mac OS Extended (journaled, encrypted)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

4 Window volume formats:

A

FAT File Allocation Table
ExFat Extended
UFS Unix File Systems
NTFS New Tech File Systems (read only)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

2 CD/DVD Formats

A

CDFS Compact disc File Syst

UDF Universal Disk Format (read only)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How are disks, partitions, and volumes different from one another?

A

Disks are the actual storage hardware;
Partitions are logical divisions of a disk used to define the storage space
Volumes (contained inside partitions) are used to define how the individual files and folders are saved to the storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does file system journaling work?

A

records which file operations are in progress at any given moment. This way, if a power failure or system crash occurs, after the system restarts, it will be able to quickly verify the integrity of the volume by “replaying” the journal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Core Storage, and what major OS X features are implemented via Core Storage?

A

A file system management layer.

Provide disk encryption (i.e. FileVault) and combine separate disks (i.e. used by Fusion Drive)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

4 Erase options in disk utility:

A

1) Fastest
2) writes one pass of zeros
3) writes three separate passes of information on top of the previous disk data
4) writes seven separate passes of information on top of the previous disk data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does the Secure Empty Trash feature in Finder work?

A

Performs a 7-pass erase on the contents of the Trash folder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can you ensure that previously deleted items are securely erased?

A

From the Erase tab in Disk Utility, choose ‘securely erase the free space’ of a disk or volume.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can you encrypt a disk without losing its contents?

A

From the Finder, secondary (or Control-) click the disk and choose Encrypt from the shortcut menu.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What 3 methods can be used to eject a volume or disk

from the FINDER?

A

1) Drag the disk icon to the Trash in the Dock
3) Select the volume and choose Eject from the File menu
4) In Finder sidebar, click the small Eject button next to the volume

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What’s the potential side effect of improperly unmounting or ejecting a disk or volume?

A

May cause data corruption. (The system automatically verifies and repairs an improperly unmounted or ejected volume the next time it becomes available to the Mac.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does FileVault protect a user’s data?

A

By using strong XTS-AES 128 encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the system requirements for using FileVault?

A

Must have the hidden OS X Recovery HD volume on the system disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which users are allowed to unlock a FileVault-protected system?

A

Any user who’s FileVault enabled is allowed to unlock a FileVault-protected system. This includes any local or cached network user account that was enabled when FileVault 2 was set up or created after FileVault 2 was enabled. Administrators may return to Security and Privacy preferences to enable additional accounts.

17
Q

How can you unlock a FileVault-protected system when all user accounts have lost their passwords?

A

By using the recovery key that was generated during the FileVault setup process.

18
Q

How do you identify the ownership and permissions of a file or folder in the Finder?

A

By using the Info or Inspector windows in the Finder.

19
Q

How do ACLs differ from standard UNIX file system permissions?

A

UNIX file system permissions allow for permissions to be set only per owner, group or everyone.
ACLs allow for an essentially unlimited list of permissions entries (diff permissions can be added at bottom of “get info” inspector box).

20
Q

What’s the locked file flag do?

A

Prevents anyone (including the item’s owner) from editing an item. Only the item’s owner can unlock the item.

21
Q

Why is the root, or beginning, level of a user’s home folder

visible to other users?

A

So other users so they can navigate to the Public shared folder.

22
Q

How does the default organization of the file system allow users to safely share local files and folders?

A

Every home folder contains a Public folder that other users can read and a Drop Box folder that other users can write to. All other subfolders in a user’s home folder (except the optional Sites folder) have default permissions that don’t allow access to other users. The Shared folder is also set for all users to share items.

23
Q

What’s unique about the permissions of the /Users/Shared folder?

A

The Shared folder is set up to allow all users to read and write files, but only the user who owns an item can delete it from the Shared folder. (This is accomplished using the sticky-bit permissions setting.)

24
Q

What does it mean when you choose the option to “ignore volume ownership” in the Finder? What are the security ramifications of ignoring volume ownership?

A

This will ignore any ownership rules and grant any logged-on user unlimited access to the contents of the volume. It’s a potential security risk because it will allow any local user account to have full access to the volume, even if that user didn’t originally mount the volume.

25
Q

Which two built-in OS X applications can be used to gather information about storage devices?

A

Disk Utility and System Information

26
Q

What does the Disk Utility Verify and Repair feature do?

A

Verify or repair the partition scheme and directory structure of a volume. (These elements contain the information used to locate files and folders on the volume.)

27
Q

What is target disk mode and how is it engaged?

A

Mac-specific hardware feature that will share the Mac computer’s internal disks through the FireWire or thunderbolt ports. Target disk mode can be engaged from Startup Disk preferences or by holding down the T key as you turn on the Mac.

28
Q

Which permissions are modified by the Disk Utility Repair Permissions feature?

A

Only repairs the ownership and permissions for items installed by Apple. However, this may resolve issues with third-party products.

29
Q

How can you reset a user’s home folder permissions?

A

From the Reset Password application on OS X Recovery.

30
Q

4 Level permission options with files and folders:

A

1) Read and Write
2) Read Only
3) No Access
4) Write Only (for Drop Box folder)

31
Q

List the standard three tiered permission structure (part of traditional UNIX system):

A

1) Owner
2) Group (i.e. staff)
3) Everyone