Lesson 7 Manage Security and Privacy

Description

User has deleted their subject information Flashcards on Lesson 7 Manage Security and Privacy, created by Deleted user on 05/04/2017.
Deleted user
Flashcards by Deleted user, updated more than 1 year ago More Less
Jake Mauney
Created by Jake Mauney over 7 years ago
Jake Mauney
Copied by Jake Mauney over 7 years ago
4
0

Resource summary

Question Answer
What type of items can be found in a keychain? Keychains are used to store secrets such as resource passwords, digital certificates, and encryption keys. The keychain system can also securely store Safari AutoFill information, Internet Account settings, and secure text notes.
How does the keychain system help protect your information? Encryption password that is unique for each keychain. Not even admins have the access to view another user's keychain
Where are the keychain files stored? Each user starts with a login keychain saved at /Users/<username>/Library/Keychain /login.keychain and a Local Items/iCloud keychain saved in the /Users/<username> /Library/Keychains/<UUID> folder. Administrator users can manage systemwide authentication assets with the /Library/Keychain/System.keychain. Finally, Apple maintains several items in /System/Library/Keychains/ for macOS system use.
What application is used to manage keychain settings? Keychain Access
When and why would you set up an iCloud Security Code? When you first enable iCloud Keychain for an AppleID that does not have two-factor authentication you will be asked to create a security code. This code is used to setup other devices for the service and to regain access to the iCloud Keychain should you lose access to your devices.
What is required to set up the iCloud Keychain service on multiple Apple devices? Assuming you have set up two-factor authentication for your Apple ID, additional Apple devices will be automatically configured to use iCloud keychain. Otherwise, additional Apple devices must be authorized to use the iCloud Keychain service using a combination of the Apple ID password and another method. One method involves using an iCloud Security Code. The other method is to authorize access from another Apple device that has already been configured for the iCloud Keychain service.
How can you limit the use of Location Services? The Privacy pane of Security & Privacy preferences
How can you ensure that audio recordings used for the Dictation service remain private? Enable Enhanced Dictation feature
What can you enable to locate a lost Mac system? iCloud Find My Mac
Show full summary Hide full summary

Similar

Business Studies Unit 2
tara.springate
HSC Economics
lydia le
History- Home Front WW1
jessmitchell
My SMART School Year Goals for 2015
Stephen Lang
Statistics Equations & Graphs
Andrea Leyden
Biology B2.1
Jade Allatt
GCSE Biology - Homeostasis and Classification Flashcards
Beth Coiley
The Strange Case of Dr. Jekyll and Mr. Hyde
K d
Acids and Bases quiz
Derek Cumberbatch
Macbeth Quotes To Learn
Sophie Brokenshire