Test your basic knowledge |

ACSP: Apple Certified Support Professional Os X Support

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What are some security concerns with spotlight?






2. How do permissions in the Finder appear different than those in the terminal?






3. What is the relationship between a network service and a network port?






4. How does Mac OS X's built-in firewall work? What advanced firewall settings are available?






5. What items are automatically started by system launchd during the system initialization process?






6. How does the firmware password help secure against password changes?






7. Five types of accounts in 10.6






8. How does resetting a user's password as an admin user affect their keychain?






9. 6 Reasons to use the CLI






10. What is a Kerberos Ticket and KDC?


11. How does resetting the master filevault password affect existing filevault user accounts?






12. Security risks & account types






13. In the network preferences - how can you tell which interface is currently being used for network activities?






14. How are the permissions on the shared folder set to allow local user sharing?






15. How does file-fault secure a user's data?






16. What network services are provided by your Mac to facilitate Internet sharing? What options are available for Internet sharing your Mac's AirPort wireless Ethernet interface?






17. Path






18. How do you use disk utility to burn an optical disk?






19. What are five common directory services and authentication services troubleshooting techniques?






20. What are resource forks and why have they fallen out of favor?


21. What is the difference between launch daemons - startup items - launch agents - and login items?


22. Where are preferences stored? What format is generally used?






23. Four methods to access CLI






24. 6 volumes supported by OS X






25. What shared items are accessible to an administrator who connects via AFP or SMB? What about a standard user?


26. What is protected memory? What is 64 bit memory addressing?






27. What are the primary system initialization stages and user environment stages in Mac OS X and what order do they start?






28. What are the differences between ZIP archives and Disk Images?






29. How does the system determine what app to use to open a file?






30. What is the purpose of IP addresses and subnet masks? What is their format?






31. How does Time Machine maintain a backup history of the system?


32. What happens during system shutdown?






33. What are four common issues that can interrupt network services on a Mac OS X computer?






34. What is the difference between safe boot - safe mode - and safe login?






35. What differentiates RAID 0 from RAID 1?






36. What five network file services can you connect to from the Finder's Connect To Server dialog?






37. What are three common authentication methods?






38. How can you identify which apps are installed on a Mac?






39. What are some common file flags and extended attributes used by Mac OS X?






40. How does the spotlight search service use metadata?






41. What does CUPS do?






42. What role does loginwindow serve in system start-up?






43. Different between absolute and relative path






44. Three minium requirements for creating a command line script






45. Folder/directories






46. Four prep steps before installing






47. What type of files are omitted from time machine backups?






48. Advantages/disadvantages of single/multiple partition drives in OS X


49. How is Disk utility's verify and repair feature used?


50. Security risk with fast user switching?