Developing Your Mac Compliance Strategy(not needed for exam) Flashcards
What describes a fundamental aspect that informs Apple’s modern approach to security?
A. A great user-first experience
B. An intentional separation between hardware, software, and services
C. A commitment to give IT administrators the tools and responsibility for the security of their entire ecosystem
A. A great user-first experience
The biggest advantage of deploying and supporting Apple devices in organizations is that they’re all designed around the same core design, as one core experience.
Which foundational component of Apple’s approach to device management provides advanced security monitoring and response tools for macOS?
A. Apple Business Manager
B. Endpoint API
C. MDM framework
B. Endpoint API
Apple provides an Endpoint Security API for third-party developers to build advanced security monitoring and response tools for macOS.
What is an improved security feature that provides a stronger and more attractive alternative to common two‑factor authentication types?
A. Passkeys
B. Touch ID
C. Smart cards
A. Passkeys
Passkeys replace passwords with cryptographic key pairs, which makes servers less valuable targets for hackers, so people can never be tricked into using their passkey to sign in to a fraudulent app or website.
Which technology did Apple pioneer to better understand patterns of behavior while protecting an individual user’s privacy?
A. Endpoint API
B. Secure Enclave
C. Differential privacy
C. Differential privacy
Apple’s differential privacy technology helps obscure your identity when data must go to Apple servers.
Which strategy element is most commonly associated with policies focused on protecting the organization?
A. Privacy
B. Security
C. Compliance
C. Compliance
The compliance element addresses polices related to protecting the organization from legal action or financial penalties.
What are the defined rule files for securing the operating system in the mSCP?
A. Scripts
B. Baselines
C. Rules
B. Baselines
Baselines are made up of YAML data files you’ll use to define the type of compliance that you want to build.
Which organization provides a catalog of security and privacy controls for information systems and organizations to minimize internal and external security risks?
A. NIST
B. mSCP
C. YAML
A. NIST
NIST provides a catalog of security and privacy controls for information systems and organizations to minimize internal and external security risks.
What contains the generated outputs from your baseline in the mSCP?
A. Includes
B. Scripts
C. Build
C. Build
The build directory contains the generated outputs such as documents, mobileconfig, and so on.
Which directory contains the tailored versions of the rules and sections files?
A. Scripts
B. Build
C. Custom
C. Custom
Baselines are the recipes you’ll use to define the type of compliance that you want to make.
What are the endpoint requirements for the mSCP?
A. macOS
B. Ruby
C. Python
D. Xcode command-line developer tools
A. macOS
The only endpoint requirement for the mSCP is macOS.
Where do you download the mSCP repository?
A. Box
B. Apple compliance website
C. NIST GitHub
C. NIST GitHub
The mSCP repository is hosted on the NIST GitHub website.
Which parts of a rules file help identify the commands used to determine compliance?
A. ID and Discussion
B. References and Tag
C. Check, Result, and Fix
C. Check, Result, and Fix
The check, result, and fix fields in a rule file work in concert to determine compliance when deployed on an endpoint.
Which number is closest to the actual number of rules in the rules folder?
A. 301 (6 supplemental)
B. 158 (12 supplemental)
C. 1090 (30 supplemental)
A. 301 (6 supplemental)
The current version of the mSCP repository contains more than 300 rules and 6 supplemental rules.
Which git command do you use to switch between branches in your local copy of the mSCP repository?
A. git checkout
B. git pull
C. git status
A. git checkout
You use the checkout command to switch between branches.
Which component of the mSCP represents the individual control settings that are mapped to compliance requirements?
A. Baseline
B. Benchmark
C. Control mapping
D. Rules
D. Rules
Rules contain the individual control settings that are mapped to compliance requirements.