Privacy & Security Practice Questions Flashcards
(47 cards)
Where can users view and modify privacy permissions that control app access to system resources on Mac?
A. System Settings > Security & Privacy
B. System Settings > Privacy & Security
C. System Settings > Apps & Features
D. System Settings > Users & Groups
B. System Settings > Privacy & Security
Privacy permissions on Mac are managed in System Settings > Privacy & Security, where users can control app access to various system resources and data.
Reference: Apple Device Support Tutorial - ‘Managing Privacy on Mac’
Which permission category allows an app to access data from Mail, Messages, Safari, Home, and Time Machine backups?
A. Input Monitoring
B. Files & Folders
C. Full Disk Access
D. Screen Recording
C. Full Disk Access
Full Disk Access is the most restrictive permission level that allows apps to access data in Mail, Messages, Safari, Home, Time Machine backups, and other protected locations.
Reference: Apple Device Support Tutorial - ‘Managing Privacy on Mac’
What happens when an app with Input Monitoring permission is running on a Mac?
A. It can only monitor mouse movements
B. It can capture all keystrokes, mouse clicks, and trackpad input
C. It can only access clipboard data
D. It can monitor network traffic
B. It can capture all keystrokes, mouse clicks, and trackpad input
Input Monitoring permission is a security concern because apps with this permission can capture all keyboard, mouse, and trackpad input from the user.
Reference: Apple Device Support Tutorial - ‘Managing Privacy on Mac’
How do you access Location Services settings on iPhone or iPad?
A. Settings > Privacy & Security > Location Services
B. Settings > General > Location Services
C. Settings > Security > Location Access
D. Settings > Apps > Location Permissions
A. Settings > Privacy & Security > Location Services
Location Services settings are accessed through Settings > Privacy & Security > Location Services on iPhone and iPad devices.
Reference: Apple Device Support Tutorial - ‘Managing Privacy and Security on iPhone or iPad’
Which location access level provides continuous access to location data even when the app is not actively being used?
A. While Using App
B. Ask Next Time
C. Always
D. Never
C. Always
The ‘Always’ access level provides continuous access to location data both when the app is active in the foreground and running in the background.
Reference: Apple Device Support Tutorial - ‘Managing Privacy and Security on iPhone or iPad’
What control does Precise Location provide to users?
A. Controls which apps can access location
B. Controls whether apps receive exact location or approximate area
C. Controls how often location is updated
D. Controls whether location is shared with contacts
B. Controls whether apps receive exact location or approximate area
Precise Location is a per-app toggle that controls whether apps receive exact location coordinates or just an approximate area for privacy protection.
Reference: Apple Device Support Tutorial - ‘Managing Privacy and Security on iPhone or iPad’
What legal requirement does App Tracking Transparency implement?
A. Apps must encrypt all user data
B. Apps must ask permission before tracking across apps and websites
C. Apps must provide privacy policies
D. Apps must allow users to delete their accounts
B. Apps must ask permission before tracking across apps and websites
App Tracking Transparency implements a legal requirement that all apps must ask permission before collecting data about user activity across other apps and websites.
Reference: Apple Device Support Tutorial - ‘Managing Privacy and Security on iPhone or iPad’
Where do users control which apps can track their activity across other apps and websites?
A. Settings > Privacy & Security > App Privacy
B. Settings > Privacy & Security > Tracking
C. Settings > Apps > Tracking Permissions
D. Settings > General > App Tracking
B. Settings > Privacy & Security > Tracking
App tracking permissions are controlled in Settings > Privacy & Security > Tracking, where users can manage which apps are allowed to track their activity.
Reference: Apple Device Support Tutorial - ‘Managing Privacy and Security on iPhone or iPad’
What information does App Privacy Report track when enabled?
A. Only location access by apps
B. App installation and deletion history
C. How often apps access location, camera, photos, contacts, microphone, and network activity
D. App purchase history and spending
C. How often apps access location, camera, photos, contacts, microphone, and network activity
App Privacy Report provides visibility into how often apps access location, camera, photos, contacts, microphone, and network activity to help users make informed privacy decisions.
Reference: Apple Device Support Tutorial - ‘Managing Privacy and Security on iPhone or iPad’
Which Safari privacy feature uses on-device machine learning to block web trackers?
A. Private Browsing
B. Intelligent Tracking Prevention
C. Cross-Site Tracking Protection
D. Fraudulent Website Warning
B. Intelligent Tracking Prevention
Intelligent Tracking Prevention uses on-device machine learning to identify and block web trackers while preserving website functionality.
Reference: Apple Device Support Tutorial - ‘Managing Privacy and Security on iPhone or iPad’
What does the tccutil command allow administrators to do?
A. Install new privacy features
B. Set, change, and reset privacy permissions via Terminal
C. Monitor app privacy violations
D. Encrypt privacy databases
B. Set, change, and reset privacy permissions via Terminal
The tccutil command provides command-line access to set, change, and reset privacy permissions for single apps or all apps on the system.
Reference: Apple Device Support Tutorial - ‘Managing Privacy on Mac’
What command would reset camera permissions for all apps on Mac?
A. sudo tccutil reset Camera
B. sudo tccutil clear Camera
C. sudo privacy reset Camera
D. sudo permissions reset Camera
A. sudo tccutil reset Camera
The command ‘sudo tccutil reset Camera’ resets camera permissions for all apps, requiring them to request permission again when they try to access the camera.
Reference: Apple Device Support Tutorial - ‘Managing Privacy on Mac’
What is the primary purpose of System Integrity Protection (SIP)?
A. Prevents unauthorized network access
B. Prevents malicious software from modifying critical system files
C. Prevents unauthorized app installations
D. Prevents user data access
B. Prevents malicious software from modifying critical system files
System Integrity Protection prevents malicious software from modifying critical system files by using kernel permissions and mandatory access controls.
Reference: Apple Security Guide - System Integrity Protection + Apple Support
Which directory can still be modified by users and apps when System Integrity Protection is enabled?
A. /System
B. /usr
C. /Applications
D. /bin
C. /Applications
The /Applications directory remains modifiable when SIP is enabled, allowing users to install and manage their own applications while protecting critical system areas.
Reference: Apple Security Guide - System Integrity Protection + Apple Support
What signature requirement does System Integrity Protection enforce for system file modifications?
A. User signature verification
B. Administrator signature verification
C. Only Apple-signed processes can modify protected areas
D. Any digitally signed process can modify system files
C. Only Apple-signed processes can modify protected areas
SIP enforces that only Apple-signed processes with proper entitlements can modify protected system files and directories.
Reference: Apple Security Guide - System Integrity Protection + Apple Support
What are Rapid Security Responses designed to deliver?
A. New features between major OS updates
B. Security fixes more frequently without full software updates
C. Performance improvements
D. Bug fixes for third-party apps
B. Security fixes more frequently without full software updates
Rapid Security Responses deliver important security improvements between regular software updates, allowing faster deployment of critical security fixes.
Reference: Apple Deployment Guide - Rapid Security Responses
Do Rapid Security Responses follow the same deferral rules as regular software updates in MDM?
A. Yes, they follow all MDM deferral settings
B. No, they don’t follow deferral rules and can be managed separately
C. They follow deferrals only on supervised devices
D. They follow deferrals only for major updates
B. No, they don’t follow deferral rules and can be managed separately
Rapid Security Responses don’t follow normal software update deferral rules and can be managed separately through specific MDM settings to ensure critical security patches deploy quickly.
Reference: Apple Deployment Guide - Rapid Security Responses
If a user wants to reset all Location Services permissions to default settings, what should they do?
A. Settings > Privacy & Security > Reset Location Services
B. Settings > General > Transfer or Reset iPhone > Reset > Reset Location & Privacy
C. Settings > Privacy & Security > Location Services > Reset All
D. Settings > General > Reset > Reset Privacy Settings
B. Settings > General > Transfer or Reset iPhone > Reset > Reset Location & Privacy
The Reset Location & Privacy option resets all location and privacy permissions to their default ‘Ask’ state, requiring apps to request permission again.
Reference: Apple Device Support Tutorial - ‘Managing Privacy and Security on iPhone or iPad’
When App Privacy Report is first enabled, when does it start collecting usage data?
A. It retroactively collects data from the past 30 days
B. It starts collecting data immediately when turned on
C. It only collects data when apps are updated
D. It collects data only for newly installed apps
B. It starts collecting data immediately when turned on
App Privacy Report only starts collecting data when it’s turned on in Settings > Privacy & Security > App Privacy Report; it doesn’t provide historical data from before activation.
Reference: Apple Device Support Tutorial - ‘Managing Privacy and Security on iPhone or iPad’
An organization wants to prevent users from modifying privacy settings on supervised devices. What type of MDM configuration should they deploy?
A. User-level privacy profiles
B. Device-level restriction profiles
C. Application-specific privacy profiles
D. Network-based privacy controls
B. Device-level restriction profiles
Supervised devices can receive restriction profiles that prevent users from modifying privacy settings, ensuring organizational privacy policies are maintained.
Reference: Complete Apple Device Support Exam Database - Privacy & Security section
A Mac user reports that an app is requesting Input Monitoring permission. What security risks should they consider before granting this permission?
A. The app could access their internet history
B. The app could capture all keystrokes including passwords
C. The app could access their email messages
D. The app could modify system files
B. The app could capture all keystrokes including passwords
Input Monitoring permission allows apps to capture all keyboard input, mouse clicks, and trackpad input, including sensitive information like passwords and private communications.
Reference: Apple Device Support Tutorial - ‘Managing Privacy on Mac’
An IT administrator needs to reset privacy permissions for a specific app using Terminal. What information do they need besides the service name?
A. The app’s Apple ID
B. The app’s bundle identifier
C. The app’s installation date
D. The app’s file size
B. The app’s bundle identifier
To reset permissions for a specific app using tccutil, administrators need the app’s bundle identifier, which can be found using the codesign command or in the app’s Info.plist file.
Reference: Apple Device Support Tutorial - ‘Managing Privacy on Mac’
A company deploys Macs with custom software that requires Full Disk Access. Users report the permission dialog doesn’t appear. What is the most likely cause?
A. The software isn’t digitally signed
B. System Integrity Protection is blocking the request
C. The software needs to request permission through the correct API
D. Full Disk Access requires administrator approval
C. The software needs to request permission through the correct API
Apps must properly request permissions through the appropriate system APIs to trigger permission dialogs. Improper implementation may prevent the dialog from appearing.
Reference: Apple Device Support Tutorial - ‘Managing Privacy on Mac’
An organization wants to ensure Rapid Security Responses install immediately on supervised devices while deferring regular updates by 30 days. How should this be configured?
A. Set RSR deferral to 0 days and regular updates to 30 days
B. Use the allowRapidSecurityResponseInstallation setting set to true with separate update deferrals
C. Configure automatic installation for RSRs only
D. This configuration is not possible with MDM
B. Use the allowRapidSecurityResponseInstallation setting set to true with separate update deferrals
MDM can manage RSRs separately from regular updates using specific settings like allowRapidSecurityResponseInstallation, allowing immediate RSR deployment while deferring other updates.
Reference: Apple Deployment Guide - Rapid Security Responses