Created by Jake Mauney
over 7 years ago
|
||
Copied by Jake Mauney
over 7 years ago
|
||
Question | Answer |
What are the five types of user accounts in macOS? How are they different? | Standard is the default account type. Administrator users can make changes to the system. A guest user does not require a password. Sharing-only users can access only shared files. The System Administrator, or root user, has unlimited access to any file or folder in the system. |
What are some security risks associated with each type of user account? | Standard user accounts are very secure, assuming they have good passwords. Administrator users can make changes that may negatively affect the system or other user accounts. A guest user could potentially fill shared folders with unwanted files. Sharing-only users are generally very secure, as long as you don’t give them too much access to your items. The potential for mayhem with root user access is nearly unlimited. |
What two password methods are supported by macOS Sierra for local user accounts? | The default local user account for macOS Sierra uses a local account password. However, macOS Sierra continues to support local accounts that use an Apple ID password. Although these accounts are still supported, you cannot create new accounts in macOS Sierra with this feature. |
What are account attributes? | Account attributes are the individual pieces of information used to define a user account. Examples include full name, account name, user ID, universally unique identifier (UUID), group, and home folder. |
How can you restrict a user account from having full access to all applications? | Parental Controls can be used to further limit a user account. Examples include enforcing a simple Finder, limiting applications and widgets, limiting Mac App Store content, setting time limits, and content filtering for several applications included in macOS. |
What types of resource contention issues can occur when fast user switching is enabled? | Resource contention occurs when fast user switching is enabled and a user tries to access an item that another user already has open in the background. Document contention occurs when a user attempts to open a document that another user has already opened. Peripheral contention occurs when a user attempts to access a peripheral already in use by another user’s open application. Application contention occurs when the second user attempts to access an application designed to run only once on a system. |
What security risk related to storage can occur when fast user switching is enabled? | When fast user switching is enabled, all users are allowed to see other users’ locally connected disks. |
Want to create your own Flashcards for free with GoConqr? Learn more.