Lesson 7 Manage Security and Privacy

Description

User has deleted their subject information Flashcards on Lesson 7 Manage Security and Privacy, created by Deleted user on 05/04/2017.
Deleted user
Flashcards by Deleted user, updated more than 1 year ago More Less
Jake Mauney
Created by Jake Mauney about 7 years ago
Jake Mauney
Copied by Jake Mauney about 7 years ago
3
0

Resource summary

Question Answer
What type of items can be found in a keychain? Keychains are used to store secrets such as resource passwords, digital certificates, and encryption keys. The keychain system can also securely store Safari AutoFill information, Internet Account settings, and secure text notes.
How does the keychain system help protect your information? Encryption password that is unique for each keychain. Not even admins have the access to view another user's keychain
Where are the keychain files stored? Each user starts with a login keychain saved at /Users/<username>/Library/Keychain /login.keychain and a Local Items/iCloud keychain saved in the /Users/<username> /Library/Keychains/<UUID> folder. Administrator users can manage systemwide authentication assets with the /Library/Keychain/System.keychain. Finally, Apple maintains several items in /System/Library/Keychains/ for macOS system use.
What application is used to manage keychain settings? Keychain Access
When and why would you set up an iCloud Security Code? When you first enable iCloud Keychain for an AppleID that does not have two-factor authentication you will be asked to create a security code. This code is used to setup other devices for the service and to regain access to the iCloud Keychain should you lose access to your devices.
What is required to set up the iCloud Keychain service on multiple Apple devices? Assuming you have set up two-factor authentication for your Apple ID, additional Apple devices will be automatically configured to use iCloud keychain. Otherwise, additional Apple devices must be authorized to use the iCloud Keychain service using a combination of the Apple ID password and another method. One method involves using an iCloud Security Code. The other method is to authorize access from another Apple device that has already been configured for the iCloud Keychain service.
How can you limit the use of Location Services? The Privacy pane of Security & Privacy preferences
How can you ensure that audio recordings used for the Dictation service remain private? Enable Enhanced Dictation feature
What can you enable to locate a lost Mac system? iCloud Find My Mac
Show full summary Hide full summary

Similar

C2 - Formulae to learn
Tech Wilkinson
Dr Jekyll and Mr Hyde
Rosie:)
Food Technology - Functions of ingredients
evie.daines
TOEFL Practice
aliking
Biology -B2
HeidiCrosbie
Biology Unit 4: Respiration and Photosynthesis
Charlotte Lloyd
Forms of Business Ownership Quiz
Noah Swanson
Biology Unit 1a - GCSE - AQA
RosettaStoneDecoded
Music symbols
Sarah Egan
Biology - B2 - AQA - GCSE - Exam Style Questions
Josh Anderson
Psychopathology
Laura Louise