SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
ACSP: Apple Certified Support Professional Os X Support
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
apple
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What are four advantages of using network directory services to store account information?
It's a special permission used to define a folder as an append-only destination (only the creator can delete the file he creates)
It enacts itself any time an App crashes or hangs indefinitely. It send an error report and any comments to Apple.
More options than GUI - bypass finder restrictions - root access - remote ssh is invisible to users - automation easy with scripting - easy combining with ARD
1.) User accounts not tied to individual Macs 2.) Same user account for multiple services 3.) Kerberos SSO 4.) Define user/comp settings in a single location
2. What are the device classes used by Mac OS X to categorize peripherals? What are some examples of each class?
Every home folder has the public folder and dropbox folder whereas all other home folders are protected.
human input devices (HIDs) like keyboards and mice - storage devices like hard drives - printers - scanners - digital cameras - video devices including both input and output - and audio devices.
Press the eject button - file>>eject - drag to trash - press eject in the sidebar
Absolute always start at the root of the filesystem - whereas relative paths start where the user is current at
3. What do the terms interface - protocol - and service mean in relation to computer networks?
Interface is any channel through which networks data can flow. Hardware network interfaces are defined by physical network connections - while virtual network connections are logical network connections on top of hardware connections. Protocol is a s
The system keeps applications from interfering with one another by segregating their memory using protected memory. 64 bit memory addressing allows apps to directly access more than 4 GB of ram.
RAID 0 uses striping to increase performance. RAID 1 uses disk mirroring.
More options than GUI - bypass finder restrictions - root access - remote ssh is invisible to users - automation easy with scripting - easy combining with ARD
4. In the network preferences - how can you tell which interface is currently being used for network activities?
The client uses the subnet mask to decide if the client is on the LAN. If it's not on the LAN - then it sends the data to the IP address of the local router. Traffic continues through routers until it reaches the destination.
Devices providing network services broadcast their existence and Mac OS X picks up on these broadcasts and provides a list of services.
The status indicator lights - Green - yellow - red.
More options than GUI - bypass finder restrictions - root access - remote ssh is invisible to users - automation easy with scripting - easy combining with ARD
5. How does network service order affect network connectivity?
Internet traffic goes through the primary interface.
Access is based on the local filesystem. They'll start in their home folder but can traverse anywhere they have permission to do so.
Find the third-party resource causing the problem. Start in verbose mode and see where the startup fails.
Don't erase data - zero out the data - 7-pass erase - 35-pass erase
6. How do you provide Mac OS X file sharing services so that other computers can access them?
7. What three methods can be used to select the start-up disk?
Option key - Startup Disk preference pane in OS X - or the BootCamp utility in Windows.
Common UNIX Printing System (CUPS) manages all printing and faxing for the system.
1.) Create a plain text file w/ the 2.) Make the first line #!/bin/bash 3.) Change the permissions to allow execution
Access is based on the local filesystem. They'll start in their home folder but can traverse anywhere they have permission to do so.
8. How can you identify which apps are installed on a Mac?
System Profiler
Launch daemons and startup items are launched during system initialization by the system launchd process on behalf of root. Launch agents and login items are opened during the initialization of the GUI environment by the user's launchd process.
The system keeps applications from interfering with one another by segregating their memory using protected memory. 64 bit memory addressing allows apps to directly access more than 4 GB of ram.
Run PPC based apps on newer Intel macs. It does not support pre-OS X apps - the Classic environment - PPC screen-savers - PPC preference panes - G5 specific apps - PPC kernel extensions - some Java apps
9. What three common unix commands support Mac filesystem metadata?
System Profiler
Prevents users from using the reset password utility on the os x install dvd because they cannot boot from it.
cp - mv - rm
Run the assistant - install windows - install drivers.
10. What functionality does 10.6 support with AppleTalk?
Securely stores passwords - form-fills - etc.
Users don't traditionally need access to them - and if they do - they can use Terminal.
Nothing.
Check for firmware updates - verify app compatibility - back up files - document critical settings
11. How does Boot Camp work?
It addresses the outgoing packets based on the destination device's MAC address
It allows Windows XP SP2+ - Vista - and 7 to run natively on the Mac by running a separate partition.
Press the eject button - file>>eject - drag to trash - press eject in the sidebar
cat - less
12. Which two commands can read text files?
HFS+ (Mac OS X Extended Journaled - Mac OS X Extended Case Sensitive Journaled - Mac OS X Extended) - HFS - UFS - FAT32 - NTFS - UDF
It has to copy the entire thing over again on each change.
cat - less
based on the user's current location
13. Four prep steps before installing
All users can read/write - but only the creator can delete. This uses the sticky bit.
1.) User accounts not tied to individual Macs 2.) Same user account for multiple services 3.) Kerberos SSO 4.) Define user/comp settings in a single location
Check for firmware updates - verify app compatibility - back up files - document critical settings
Hold down T on boot - allows the mac to be turned into a very large - and expensive - external hard drive or disc drive.
14. What interfaces and protocols are supported by default in in Mac OS X?
Every home folder has the public folder and dropbox folder whereas all other home folders are protected.
Start the name with a . - or enable the hidden file flag.
1.) User accounts not tied to individual Macs 2.) Same user account for multiple services 3.) Kerberos SSO 4.) Define user/comp settings in a single location
Too many to list. Hehe.
15. What is the relationship between clients and servers as it relates to network service access?
Kerberos can only be used to authenticate against kerberized services and is often managed on a network-wide scale.
Authentication is who am I?Authorization is what can I do?
Your Mac provides network routing NAT - DHCP - and DNS forwarding services for any device connected. When sharing AirPort - you can specify and SSID - channel - and WEP settings.
Client software is used to access services provided by a server
16. What files are associated with the computer's website? What about the users' websites?
17. What are the four default top-level folders available in the Finder?
The firmware initializes the Mac's hardware and and locates the booter file on the system volume. The Power-On Self Test (POST) checks for basic hardware functionality.
Common flags include locked and hidden - Common extended attributes include an items color - spotlight comments - etc.
Applications - Library - System - Users
Run PPC based apps on newer Intel macs. It does not support pre-OS X apps - the Classic environment - PPC screen-savers - PPC preference panes - G5 specific apps - PPC kernel extensions - some Java apps
18. Locate system version - build number - serial number location
The status indicator lights - Green - yellow - red.
About this mac or system profiler. System is general release number - build is specific - and serial number represents the machine.
HFS+ (Mac OS X Extended Journaled - Mac OS X Extended Case Sensitive Journaled - Mac OS X Extended) - HFS - UFS - FAT32 - NTFS - UDF
This will not change the keychain. They can either unlock the keychain with the old password to sync them - or create a new keychain.
19. Why is time machine bad at backing up large databases?
Users' public folders
It has to copy the entire thing over again on each change.
The loginwindow process logs all users out and then tells the kernel to quit all remaining system processes.
Hold down shift on startup
20. How does resetting a user's password as an admin user affect their keychain?
This will not change the keychain. They can either unlock the keychain with the old password to sync them - or create a new keychain.
Find the third-party resource causing the problem. Start in verbose mode and see where the startup fails.
Temp files - spotlight indexes - items in the trash - and any files defined as exempt either by you or by an application.
Used to make the filesystem appear less complex. Data forks and resource forks are combined to appear as a single item. They have fallen out because they're not compatible with non Mac-OS volumes and are not extensible.
21. 6 volumes supported by OS X
Run PPC based apps on newer Intel macs. It does not support pre-OS X apps - the Classic environment - PPC screen-savers - PPC preference panes - G5 specific apps - PPC kernel extensions - some Java apps
HFS+ (Mac OS X Extended Journaled - Mac OS X Extended Case Sensitive Journaled - Mac OS X Extended) - HFS - UFS - FAT32 - NTFS - UDF
Disk drive is the hardware itself - partitions are logical divisions of a drive's storage - and volumes are stored inside partitions and define how data is stored to the storage
Forked files may cause issues for NFS and WebDAV. Also avoid AFP 2 on Windows file servers.
22. What role does loginwindow serve in system start-up?
Kerberos can only be used to authenticate against kerberized services and is often managed on a network-wide scale.
loginwindow displays the login window and then sets up and manages the GUI user environment.
A driver is a piece of software designed to facilitate the communication between Mac OS X and the peripheral. There are kernel extensions - framework plug-ins - or stand-alone applications.
Users don't traditionally need access to them - and if they do - they can use Terminal.
23. Relative path
24. What is target disk mode and how is it engaged?
So they can navigate to the public or sites folder
Info pane in Network Utility
Hold down T on boot - allows the mac to be turned into a very large - and expensive - external hard drive or disc drive.
Full directions to a specific item
25. What are six common system resources? What purpose does each one serve and where are they located?
Prevents users from using the reset password utility on the os x install dvd because they cannot boot from it.
Users' passwords must be stored in a special format - which is less secure - and must be explicitly enabled.
extensions - tied to the kernel to provide hardware support - frameworks - shared code libraries - fonts - preference files - configuration info - Launch Agents and Launch Daemons - used by launchd to provide auto-starting services - logs - contain d
Check for firmware updates - verify app compatibility - back up files - document critical settings
26. Five types of accounts in 10.6
Individual pieces of information used to define a user such as user ID - UUID - home directory - etc.
cat - less
Standard - Admin - Guest - Sharing-Only - Root
The computer's website files are located in /Library/WebServer/Documents and each users' is inside ~/Sites
27. How do Mac OS X computers acquire and use link-local TCP/IP addresses?
28. What client-sharing services can Mac OS X provide?
Resource contention general - an item another user has running. Document contention for document another user has open. Peripheral contention for peripheral in use by another user. Application contention for when an app is designed to be open only on
Disconnected cable - nonfunctioning port - DHCP issue - DNS issue
Screen sharing - remote login - remote management - remote apple events - and Xgrid sharing
Check for firmware updates - verify app compatibility - back up files - document critical settings
29. How does the default organization of the filesystem allow users to safely share local files and folder?
Root has unlimited access - Admin can change system files & settings - guest can dump tons of files
Every home folder has the public folder and dropbox folder whereas all other home folders are protected.
Using information provided by the dynamic network services discovery protocols. Computers providing services appear as resources whereas service discovery zones or workgroups appear as folders.
PostScript Printer Description (PPD) files are printer driver files that instruct the CUPS system on how to communicate with specific printer models.
30. How does the system determine what app to use to open a file?
Launch Services maintains a database of associated file types and applications.
Press the eject button - file>>eject - drag to trash - press eject in the sidebar
Get Info from Finder or System Profiler
Using information provided by the dynamic network services discovery protocols. Computers providing services appear as resources whereas service discovery zones or workgroups appear as folders.
31. 6 Reasons to use the CLI
Enable Web Sharing in System Preferences
This ignores any ownership rules and will grant any logged-on user unlimited access to the contents of the volume.
More options than GUI - bypass finder restrictions - root access - remote ssh is invisible to users - automation easy with scripting - easy combining with ARD
It stores the home folder as an encrypted sparse-bundle disk image
32. What does the firmware do? What is the POST?
33. Absolute path
Locally connected volumes are fully accessible to any logged in user.
Full directions to a specific item
Check for firmware updates - verify app compatibility - back up files - document critical settings
About this mac or system profiler. System is general release number - build is specific - and serial number represents the machine.
34. Folder/directories
Describe containers in the file system
Prevents users from using the reset password utility on the os x install dvd because they cannot boot from it.
It's a special permission used to define a folder as an append-only destination (only the creator can delete the file he creates)
Don't erase data - zero out the data - 7-pass erase - 35-pass erase
35. Where are preferences stored? What format is generally used?
User preferences are in ~/Library and the format is often Property List - which is just a special XML file.
Enable Web Sharing in System Preferences
It's a special permission used to define a folder as an append-only destination (only the creator can delete the file he creates)
Core system files - fonts - X11 - nearby & local printers - language translations
36. What are four common issues that can interrupt network services on a Mac OS X computer?
Disconnected cable - nonfunctioning port - DHCP issue - DNS issue
Your Mac provides network routing NAT - DHCP - and DNS forwarding services for any device connected. When sharing AirPort - you can specify and SSID - channel - and WEP settings.
The client uses the subnet mask to decide if the client is on the LAN. If it's not on the LAN - then it sends the data to the IP address of the local router. Traffic continues through routers until it reaches the destination.
Locally connected volumes are fully accessible to any logged in user.
37. What does a keychain do?
Every home folder has the public folder and dropbox folder whereas all other home folders are protected.
Local accounts are just for that Mac - network accounts are available anywhere on the network - and Mobile accounts create a cached local copy of a network account for offline access.
Securely stores passwords - form-fills - etc.
Run the assistant - install windows - install drivers.
38. What does Mac OS X use bundles or packages for?
39. How does the spotlight search service use metadata?
ls
The spotlight search service creates index databases of file system metadata so that it can perform normally time-intensive searches nearly instantly.
Run the assistant - install windows - install drivers.
Users' public folders
40. What are five application environments supported by Mac OS X and what are they used for?
Kerberos can only be used to authenticate against kerberized services and is often managed on a network-wide scale.
Cocoa - Carbon - BSD (CLI) - X11 - Java (Cocoa is native - Carbon is based on OS 9 but still provides OS X performance - X11 is a unix windowing environment)
Locally connected volumes are fully accessible to any logged in user.
Interface is any channel through which networks data can flow. Hardware network interfaces are defined by physical network connections - while virtual network connections are logical network connections on top of hardware connections. Protocol is a s
41. What backup destinations does Time Machine support?
User preferences are in ~/Library and the format is often Property List - which is just a special XML file.
Every home folder has the public folder and dropbox folder whereas all other home folders are protected.
The computer's website files are located in /Library/WebServer/Documents and each users' is inside ~/Sites
Any Mac OS X Extended volume including volumes from disk images stored on an AFP share on OS X Server.
42. Default 9 home folder folders?
Documents - Movies - Music - Pictures - Library - Downloads - Desktop - Public - Sites
Info pane in Network Utility
About this mac or system profiler. System is general release number - build is specific - and serial number represents the machine.
This ignores any ownership rules and will grant any logged-on user unlimited access to the contents of the volume.
43. How do you further resolve and issue that disappears when the Mac successfully safe-boots?
Find the third-party resource causing the problem. Start in verbose mode and see where the startup fails.
The status indicator lights - Green - yellow - red.
Local accounts are just for that Mac - network accounts are available anywhere on the network - and Mobile accounts create a cached local copy of a network account for offline access.
The computer's website files are located in /Library/WebServer/Documents and each users' is inside ~/Sites
44. What five network file services can you connect to from the Finder's Connect To Server dialog?
extensions - tied to the kernel to provide hardware support - frameworks - shared code libraries - fonts - preference files - configuration info - Launch Agents and Launch Daemons - used by launchd to provide auto-starting services - logs - contain d
AFP - SMB - FTP - NFS - WebDAV
This will not change the keychain. They can either unlock the keychain with the old password to sync them - or create a new keychain.
It has to copy the entire thing over again on each change.
45. What four Directory Service types can used in Mac OS X?
Local - BSD Flat File and NIS - LDAPv3 - AD
Run PPC based apps on newer Intel macs. It does not support pre-OS X apps - the Classic environment - PPC screen-savers - PPC preference panes - G5 specific apps - PPC kernel extensions - some Java apps
Safe boot refers to when the system is starting up - safe mode is when the system is actually running - and safe login is when the system starts up the user session.
ls
46. What is the difference between launch daemons - startup items - launch agents - and login items?
47. Why does the Finder hider certain folders at the root of the system volume?
48. Difference between disk drives - partition - and volume
49. What two methods can be used to hide items from the Finder?
Disconnected cable - nonfunctioning port - DHCP issue - DNS issue
Users don't traditionally need access to them - and if they do - they can use Terminal.
Start the name with a . - or enable the hidden file flag.
command - options - arguments
50. What items are shared by default to all users?