I recommend against sudo.
Sudo by default on OS X is very insecure.
Generally sudo should be avoided. There are times when you do need to give sudo access to some user- but *NOT* they way OS X does it (the PB did it better, btw) and you should aleways try to find another way.
For example- if you don't want the webmaster on a system to have root but he needs to be able to restart the webserver, many sys admins give sudo to the webmaster to restart the webserver (since http is port 80 and https is 443, both under 1024- only root can start those services).
A better solution, however, is to edit httpd.conf and change the webserver to run at a port above 1024 so the webmaster can restart it w/o needing sudo.
Then, you port forward port 80 to whatever port its really running at.
Problem solved w/o sudo.
I realize OS X is a desktop OS and not a Server OS, but its good to think security.
If you have ftp'd anything to an admin account on OS X ot telnet'd into an admin account- you have potentially given root access away (ssh and scp are not as bad) because of how Apple implements sudo.
I started another thread on that here- but if you want the fix-
http://24.5.29.77/Linux_Pages/howto/sudo.php