SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
ACSP: Apple Certified Support Professional Os X Support
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
apple
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What are five common directory services and authentication services troubleshooting techniques?
1.) Try another account 2.) Reset the account password 3.) Verify directory service connectivity 4) Verify kerberos authentication & config 5.) Check directory service log files
Root has unlimited access - Admin can change system files & settings - guest can dump tons of files
Restart the app - try another document - try another user account - check log files - delete caches - replace preferences - and replace app resources.
It has to copy the entire thing over again on each change.
2. Account attributes
Don't erase data - zero out the data - 7-pass erase - 35-pass erase
Individual pieces of information used to define a user such as user ID - UUID - home directory - etc.
Kerberos can only be used to authenticate against kerberized services and is often managed on a network-wide scale.
Root has unlimited access - Admin can change system files & settings - guest can dump tons of files
3. How does the IP addresses use the MAC address to send messages between computers on a LAN?
4. Why is the root of a user's home folder visible to others?
1 GB of RAM - 5 GB of disk space - DVD drive - display
So they can navigate to the public or sites folder
If a known master password is reset - existing accounts are not negatively affected. If the master is reset because it was lost - however - preexisting accounts cannot be reset by the new password until the old FileVault passwords are reset.
PostScript Printer Description (PPD) files are printer driver files that instruct the CUPS system on how to communicate with specific printer models.
5. What are some known issues that arise when connecting to network file services?
Safe boot refers to when the system is starting up - safe mode is when the system is actually running - and safe login is when the system starts up the user session.
Forked files may cause issues for NFS and WebDAV. Also avoid AFP 2 on Windows file servers.
Individual pieces of information used to define a user such as user ID - UUID - home directory - etc.
They're used to combine complex items into individual folders. Packages appear as a single item.
6. What are the visual or audible cues for each system initialization stage?
Kerberos can only be used to authenticate against kerberized services and is often managed on a network-wide scale.
Users' public folders
firmware - startup chim or bright flash of power-on light and light gray screen booter - dark gray apple logo on primary display kernel - small gray spinning gear system launchd - bright blue screen
Local - BSD Flat File and NIS - LDAPv3 - AD
7. What system preference enables the accessibility features of OS X - what are they - and where are the preferences stored?
A database of information that in some cases can be shared to the network. Account information is the most commonly accessed directory resource.
firmware - startup chim or bright flash of power-on light and light gray screen booter - dark gray apple logo on primary display kernel - small gray spinning gear system launchd - bright blue screen
If a known master password is reset - existing accounts are not negatively affected. If the master is reset because it was lost - however - preexisting accounts cannot be reset by the new password until the old FileVault passwords are reset.
Universal Access - items for the seeing or hearing impaired - keyboard and mouse difficulties - and are stored in ~/Library/Preferences
8. How are items inside the Finder's Network folder populated?
Intel - directly attached input devices - 10.5 or later - all new firmware updates - 10.5 or greater install disc - 10 gigs of free space - 2 GB or more of RAM
Using information provided by the dynamic network services discovery protocols. Computers providing services appear as resources whereas service discovery zones or workgroups appear as folders.
The Dock process starts the DashboardClient process. All widgets run inside one of the two DashboardClient processes.
About this mac or system profiler. System is general release number - build is specific - and serial number represents the machine.
9. What type of files are omitted from time machine backups?
The DNS Service is used to translate host names to IP addresses via forward lookups and IP addresses to domain names via reverse lookups.
System Profiler - Disk Utility - Reset Password Utility - Firmware Password - Restore from Time Machine Backup - Startup Disk - Terminal - Network Utility
Temp files - spotlight indexes - items in the trash - and any files defined as exempt either by you or by an application.
Any Mac OS X Extended volume including volumes from disk images stored on an AFP share on OS X Server.
10. Why might a previously backed-up item no longer be available in Time Machine?
Using information provided by the dynamic network services discovery protocols. Computers providing services appear as resources whereas service discovery zones or workgroups appear as folders.
This will not change the keychain. They can either unlock the keychain with the old password to sync them - or create a new keychain.
The system keeps applications from interfering with one another by segregating their memory using protected memory. 64 bit memory addressing allows apps to directly access more than 4 GB of ram.
If the backup volume became full and removed the older item(s).
11. Locate system version - build number - serial number location
About this mac or system profiler. System is general release number - build is specific - and serial number represents the machine.
All users can read/write - but only the creator can delete. This uses the sticky bit.
Hold down T on boot - allows the mac to be turned into a very large - and expensive - external hard drive or disc drive.
Documents - Movies - Music - Pictures - Library - Downloads - Desktop - Public - Sites
12. What two methods can be used to hide items from the Finder?
About this mac or system profiler. System is general release number - build is specific - and serial number represents the machine.
Start the name with a . - or enable the hidden file flag.
It stores the home folder as an encrypted sparse-bundle disk image
Single partition drives are easier to setup initially - but aren't as flexible for admin/maintenance. Multiple can segregate data
13. What 4 methods can be used to eject a volume from the finder?
User preferences are in ~/Library and the format is often Property List - which is just a special XML file.
Applications - Library - System - Users
Using information provided by the dynamic network services discovery protocols. Computers providing services appear as resources whereas service discovery zones or workgroups appear as folders.
Press the eject button - file>>eject - drag to trash - press eject in the sidebar
14. What happens during system shutdown?
Resource contention general - an item another user has running. Document contention for document another user has open. Peripheral contention for peripheral in use by another user. Application contention for when an app is designed to be open only on
Info pane in Network Utility
It allows Windows XP SP2+ - Vista - and 7 to run natively on the Mac by running a separate partition.
The loginwindow process logs all users out and then tells the kernel to quit all remaining system processes.
15. Four methods to access CLI
Terminal - Single User Mode - >Console from login window - SSH
Apple Menu>> Force Quit - Activity Monitor - Dock contextual menu
The status indicator lights - Green - yellow - red.
human input devices (HIDs) like keyboards and mice - storage devices like hard drives - printers - scanners - digital cameras - video devices including both input and output - and audio devices.
16. Where does spotlight store its metadata index databases? How about the plugins?
17. What are the four erase options in disk utility?
18. How does the default organization of the filesystem allow users to safely share local files and folder?
Every home folder has the public folder and dropbox folder whereas all other home folders are protected.
Prevents users from using the reset password utility on the os x install dvd because they cannot boot from it.
Enable Web Sharing in System Preferences
Internet traffic goes through the primary interface.
19. What are three common authentication methods?
Clear-text - encrypted - Kerberos
System Profiler - Disk Utility - Reset Password Utility - Firmware Password - Restore from Time Machine Backup - Startup Disk - Terminal - Network Utility
Enable Web Sharing in System Preferences
About this mac or system profiler. System is general release number - build is specific - and serial number represents the machine.
20. What is a Kerberos Ticket and KDC?
21. What are the three primary steps for setting up bootcamp?
Run the assistant - install windows - install drivers.
Finder shows only 4 different permissions options: read/write - read-only - write-only - and no access. Terminal can show you any possible combination.
It addresses the outgoing packets based on the destination device's MAC address
Internet traffic goes through the primary interface.
22. What are they advantages of code-signing?
Firmware - booter - kernel - and system launchd. Primary user environment stages are loginwindow - user launchd - and user environment.
The spotlight search service creates index databases of file system metadata so that it can perform normally time-intensive searches nearly instantly.
Devices providing network services broadcast their existence and Mac OS X picks up on these broadcasts and provides a list of services.
Code signed items include a digital signature that the system can use to verify the authenticity and integrity of the application or process and its resources.
23. What does iSync do?
iSync allows you to sync personal info between Mac OS X apps and peripherals like Palm PDAs - and Bluetooth enabled cell phones.
Common flags include locked and hidden - Common extended attributes include an items color - spotlight comments - etc.
It enacts itself any time an App crashes or hangs indefinitely. It send an error report and any comments to Apple.
The status indicator lights - Green - yellow - red.
24. What is authentication and authorization?
Authentication is who am I?Authorization is what can I do?
Local - BSD Flat File and NIS - LDAPv3 - AD
computer hostname - working directory - user account
Admins have access to any locally-connected volume whereas standard users can only access their home folders and other user's Public folders.
25. Default install packages
extensions - tied to the kernel to provide hardware support - frameworks - shared code libraries - fonts - preference files - configuration info - Launch Agents and Launch Daemons - used by launchd to provide auto-starting services - logs - contain d
Core system files - fonts - X11 - nearby & local printers - language translations
User preferences are in ~/Library and the format is often Property List - which is just a special XML file.
To run commands as the root user
26. Absolute path
Full directions to a specific item
Client software is used to access services provided by a server
The spotlight search service creates index databases of file system metadata so that it can perform normally time-intensive searches nearly instantly.
Any Mac OS X Extended volume including volumes from disk images stored on an AFP share on OS X Server.
27. What are four common issues that can interrupt network services on a Mac OS X computer?
Disconnected cable - nonfunctioning port - DHCP issue - DNS issue
Run the assistant - install windows - install drivers.
User accounts - user groups - computer accounts - computer groups - network file mounts - management settings - and collaboration information.
File>>Create Burn Folder and drag items in then press burn. OR Insert blank media and choose new Burn Folder
28. Four prep steps before installing
Enable Web Sharing in System Preferences
Your Mac provides network routing NAT - DHCP - and DNS forwarding services for any device connected. When sharing AirPort - you can specify and SSID - channel - and WEP settings.
Defines the directions to a specific item in the filesystem
Check for firmware updates - verify app compatibility - back up files - document critical settings
29. What is the sticky bit?
30. 3 Default items in CLI prompt
computer hostname - working directory - user account
Parental controls
GUID partition table for intel-based macs - Apple-Partition-Map for PPC macs
Common flags include locked and hidden - Common extended attributes include an items color - spotlight comments - etc.
31. What is protected memory? What is 64 bit memory addressing?
Describe containers in the file system
Local - BSD Flat File and NIS - LDAPv3 - AD
Screen sharing - remote login - remote management - remote apple events - and Xgrid sharing
The system keeps applications from interfering with one another by segregating their memory using protected memory. 64 bit memory addressing allows apps to directly access more than 4 GB of ram.
32. How do you provide Mac OS X web-sharing services?
It's a special permission used to define a folder as an append-only destination (only the creator can delete the file he creates)
Describe containers in the file system
The system keeps applications from interfering with one another by segregating their memory using protected memory. 64 bit memory addressing allows apps to directly access more than 4 GB of ram.
Enable Web Sharing in System Preferences
33. What password issues may arise related to the SMB service?
34. Path
Securely stores passwords - form-fills - etc.
Review network preferences - review network utility preferences - and attempt to connect to different network services
System Profiler
Defines the directions to a specific item in the filesystem
35. What does the problem-reporting feature do?
command - options - arguments
It enacts itself any time an App crashes or hangs indefinitely. It send an error report and any comments to Apple.
A database of information that in some cases can be shared to the network. Account information is the most commonly accessed directory resource.
Too many to list. Hehe.
36. What are the differences between ZIP archives and Disk Images?
Review network preferences - review network utility preferences - and attempt to connect to different network services
They're stored at the root of every volume in a /.Spotlight-V100 folder. A fileVault user's database is stored in his vault in his home user. Mail is in ~/Library/Mail/Mail Envelope. Spotlight plugins can be in any library folder in a folder called S
Set the mac's network identification - enable the desired service - define access.System preferences >> Sharing
Zip files are created with the Finder and are compatible with many OSes. Good for small files & small number of items. Disk Images are created in disk utility.
37. What network services are provided by your Mac to facilitate Internet sharing? What options are available for Internet sharing your Mac's AirPort wireless Ethernet interface?
loginwindow displays the login window and then sets up and manages the GUI user environment.
Authentication is who am I?Authorization is what can I do?
Your Mac provides network routing NAT - DHCP - and DNS forwarding services for any device connected. When sharing AirPort - you can specify and SSID - channel - and WEP settings.
Option key - Startup Disk preference pane in OS X - or the BootCamp utility in Windows.
38. What is the difference between launch daemons - startup items - launch agents - and login items?
39. What are the primary system initialization stages and user environment stages in Mac OS X and what order do they start?
It allows Windows XP SP2+ - Vista - and 7 to run natively on the Mac by running a separate partition.
They're used to combine complex items into individual folders. Packages appear as a single item.
Review network preferences - review network utility preferences - and attempt to connect to different network services
Firmware - booter - kernel - and system launchd. Primary user environment stages are loginwindow - user launchd - and user environment.
40. What four Directory Service types can used in Mac OS X?
Local - BSD Flat File and NIS - LDAPv3 - AD
System Profiler - Disk Utility - Reset Password Utility - Firmware Password - Restore from Time Machine Backup - Startup Disk - Terminal - Network Utility
Too many to list. Hehe.
Interface is any channel through which networks data can flow. Hardware network interfaces are defined by physical network connections - while virtual network connections are logical network connections on top of hardware connections. Protocol is a s
41. How does resetting the master filevault password affect existing filevault user accounts?
System launchd is responsible for starting every single system process. It manages system initialization and launches loginwindow.
It's a special permission used to define a folder as an append-only destination (only the creator can delete the file he creates)
File>>Create Burn Folder and drag items in then press burn. OR Insert blank media and choose new Burn Folder
If a known master password is reset - existing accounts are not negatively affected. If the master is reset because it was lost - however - preexisting accounts cannot be reset by the new password until the old FileVault passwords are reset.
42. How do kerberos and keychain system differ for managing authentication services?
Kerberos can only be used to authenticate against kerberized services and is often managed on a network-wide scale.
Option key - Startup Disk preference pane in OS X - or the BootCamp utility in Windows.
It allows Windows XP SP2+ - Vista - and 7 to run natively on the Mac by running a separate partition.
Forked files may cause issues for NFS and WebDAV. Also avoid AFP 2 on Windows file servers.
43. What are the four default top-level folders available in the Finder?
Press the eject button - file>>eject - drag to trash - press eject in the sidebar
It will allow any user to search any attached non-system volume if ownership is ignored.
Applications - Library - System - Users
Users' public folders
44. Relative path
45. How does network service order affect network connectivity?
Common flags include locked and hidden - Common extended attributes include an items color - spotlight comments - etc.
Review network preferences - review network utility preferences - and attempt to connect to different network services
It starts with a full copy of the system and then it records any changes made to the system and only copies those changes. It creates a simulation of the entire system using hard links for files that didn't change.
Internet traffic goes through the primary interface.
46. What items are automatically started by system launchd during the system initialization process?
A database of information that in some cases can be shared to the network. Account information is the most commonly accessed directory resource.
/System/Library/LaunchDaemons - /Library/LaunchDaemons - /Library/StartupItems - /etc/rc.local (maybe)
1.) User accounts not tied to individual Macs 2.) Same user account for multiple services 3.) Kerberos SSO 4.) Define user/comp settings in a single location
Temp files - spotlight indexes - items in the trash - and any files defined as exempt either by you or by an application.
47. What interfaces and protocols are supported by default in in Mac OS X?
1.) User accounts not tied to individual Macs 2.) Same user account for multiple services 3.) Kerberos SSO 4.) Define user/comp settings in a single location
Your Mac provides network routing NAT - DHCP - and DNS forwarding services for any device connected. When sharing AirPort - you can specify and SSID - channel - and WEP settings.
RAID 0 uses striping to increase performance. RAID 1 uses disk mirroring.
Too many to list. Hehe.
48. What steps should you take when troubleshooting app issues?
File>>Create Burn Folder and drag items in then press burn. OR Insert blank media and choose new Burn Folder
Hold down shift on startup
Kerberos can only be used to authenticate against kerberized services and is often managed on a network-wide scale.
Restart the app - try another document - try another user account - check log files - delete caches - replace preferences - and replace app resources.
49. What are some security concerns with spotlight?
The DNS Service is used to translate host names to IP addresses via forward lookups and IP addresses to domain names via reverse lookups.
Automator is a workflow based application whereas AppleScript is an english-like scripting language
It will allow any user to search any attached non-system volume if ownership is ignored.
User preferences are in ~/Library and the format is often Property List - which is just a special XML file.
50. What is the safe boot keyboard combo?
Automator is a workflow based application whereas AppleScript is an english-like scripting language
Admins have access to any locally-connected volume whereas standard users can only access their home folders and other user's Public folders.
Code signed items include a digital signature that the system can use to verify the authenticity and integrity of the application or process and its resources.
Hold down shift on startup