Test your basic knowledge |

ACSP: Apple Certified Support Professional Os X Support

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How is the DOmain Name Service used to facilitate network naming?






2. What is the relationship between clients and servers as it relates to network service access?






3. How does resetting the master filevault password affect existing filevault user accounts?






4. What type of files are omitted from time machine backups?






5. What are three common authentication methods?






6. What steps should you take when troubleshooting app issues?






7. How does Boot Camp work?






8. What role does loginwindow serve in system start-up?






9. What are some known issues that arise when connecting to network file services?






10. What system preference enables the accessibility features of OS X - what are they - and where are the preferences stored?






11. What is a device driver? What three primary types of device drivers are there?






12. How does Time Machine maintain a backup history of the system?


13. What is a Kerberos Ticket and KDC?


14. How do you share printers with other Mac and Windows users?


15. How can you identify the type of a particular application?






16. How are items inside the Finder's Network folder populated?






17. 6 Reasons to use the CLI






18. How does the IP transfer messages between computers on a WAN?


19. Advantages/disadvantages of single/multiple partition drives in OS X


20. How can you limit a user account?






21. What shared items are accessible to an administrator who connects via AFP or SMB? What about a standard user?


22. How does resetting a user's password as an admin user affect their keychain?






23. What four Directory Service types can used in Mac OS X?






24. What are seven common types of resources Mac OS X can access from a directory service?






25. What are the three primary steps for setting up bootcamp?






26. How do you provide Mac OS X web-sharing services?






27. How does the IP addresses use the MAC address to send messages between computers on a LAN?


28. What does CUPS do?






29. How does the system determine what app to use to open a file?






30. What 3 types of resource contention issues can occur when fast user switching is enabled?






31. What is the difference between launch daemons - startup items - launch agents - and login items?


32. What differentiates RAID 0 from RAID 1?






33. In the network preferences - how can you tell which interface is currently being used for network activities?






34. Utilities available from OS X install DVD






35. Why does the Finder hider certain folders at the root of the system volume?


36. Which two commands can read text files?






37. What are the primary system initialization stages and user environment stages in Mac OS X and what order do they start?






38. Security risks & account types






39. What does Mac OS X use bundles or packages for?


40. What are some security concerns with spotlight?






41. What are the four erase options in disk utility?


42. What process or processes are responsible for dashboard widgets?






43. How do you use disk utility to burn an optical disk?






44. How can you identify which apps are installed on a Mac?






45. What is the purpose of IP addresses and subnet masks? What is their format?






46. Why might a previously backed-up item no longer be available in Time Machine?






47. What are five common directory services and authentication services troubleshooting techniques?






48. What three common unix commands support Mac filesystem metadata?






49. What is protected memory? What is 64 bit memory addressing?






50. How do kerberos and keychain system differ for managing authentication services?