Lesson 7 Manage Security and Privacy

Descripción

El usuario ha eliminado su información de asignaturas Fichas sobre Lesson 7 Manage Security and Privacy, creado por Usuario eliminado el 05/04/2017.
Usuario eliminado
Fichas por Usuario eliminado, actualizado hace más de 1 año Más Menos
Jake Mauney
Creado por Jake Mauney hace más de 7 años
Jake Mauney
Copiado por Jake Mauney hace más de 7 años
4
0

Resumen del Recurso

Pregunta Respuesta
What type of items can be found in a keychain? Keychains are used to store secrets such as resource passwords, digital certificates, and encryption keys. The keychain system can also securely store Safari AutoFill information, Internet Account settings, and secure text notes.
How does the keychain system help protect your information? Encryption password that is unique for each keychain. Not even admins have the access to view another user's keychain
Where are the keychain files stored? Each user starts with a login keychain saved at /Users/<username>/Library/Keychain /login.keychain and a Local Items/iCloud keychain saved in the /Users/<username> /Library/Keychains/<UUID> folder. Administrator users can manage systemwide authentication assets with the /Library/Keychain/System.keychain. Finally, Apple maintains several items in /System/Library/Keychains/ for macOS system use.
What application is used to manage keychain settings? Keychain Access
When and why would you set up an iCloud Security Code? When you first enable iCloud Keychain for an AppleID that does not have two-factor authentication you will be asked to create a security code. This code is used to setup other devices for the service and to regain access to the iCloud Keychain should you lose access to your devices.
What is required to set up the iCloud Keychain service on multiple Apple devices? Assuming you have set up two-factor authentication for your Apple ID, additional Apple devices will be automatically configured to use iCloud keychain. Otherwise, additional Apple devices must be authorized to use the iCloud Keychain service using a combination of the Apple ID password and another method. One method involves using an iCloud Security Code. The other method is to authorize access from another Apple device that has already been configured for the iCloud Keychain service.
How can you limit the use of Location Services? The Privacy pane of Security & Privacy preferences
How can you ensure that audio recordings used for the Dictation service remain private? Enable Enhanced Dictation feature
What can you enable to locate a lost Mac system? iCloud Find My Mac
Mostrar resumen completo Ocultar resumen completo

Similar

Examen Primer trimestre
jorgeluisparedes
Integrales Indefinidas
Rupert012
Símbolos y Abreviaciones para tomar apuntes
Diego Santos
MAPAS CONCEPTUALES DIGITALES
Ana Maria Orozco
3 Tipos de Interacciones para la Participación de los Alumnos
Diego Santos
HISTORIA: HECHOS, PERSONAJES...
Ulises Yo
ESTÁTICA Y RESISTENCIA DE MATERIALES
alexandergonzale
PRINCIPIO DE OPORTUNIDAD DEL MINISTERIO PÚBLICO ART. 256
ConsentidadeDios
Vocabulaire: Je vole (Louane) -
Michel Gomez
MAPA SINOPTICO
pozeliza
CUADRO SINÓPTICO DE LOS TRASTORNOS DE LA PERSONALIDAD EN EL AMBIENTE ESCOLAR
Taly Contreras