SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
ACSP: Apple Certified Support Professional Os X Support
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
apple
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What are five application environments supported by Mac OS X and what are they used for?
Cocoa - Carbon - BSD (CLI) - X11 - Java (Cocoa is native - Carbon is based on OS 9 but still provides OS X performance - X11 is a unix windowing environment)
Finder get info - command line run ls -l
Local accounts are just for that Mac - network accounts are available anywhere on the network - and Mobile accounts create a cached local copy of a network account for offline access.
File>>Create Burn Folder and drag items in then press burn. OR Insert blank media and choose new Burn Folder
2. Absolute path
Too many to list. Hehe.
Full directions to a specific item
Get Info from Finder or System Profiler
AFP - SMB - FTP - NFS - WebDAV
3. How do Mac OS X computers acquire and use link-local TCP/IP addresses?
4. What files are associated with the computer's website? What about the users' websites?
5. How does Boot Camp work?
If the backup volume became full and removed the older item(s).
It allows Windows XP SP2+ - Vista - and 7 to run natively on the Mac by running a separate partition.
cat - less
based on the user's current location
6. What items are not loaded when Mac OS X safe boots?
Drag the disk image into disk utility and press burn
It will not load any third party KEXTs - third-party LaunchAgents - LaunchDaemons - StartupItems - fonts - any user login items - or any user specific LaunchAgents.
It monitors all incoming connections and requests. Connections are allowed on a per-application basis. Advanced options include signing options - stealth mode - and more.
More options than GUI - bypass finder restrictions - root access - remote ssh is invisible to users - automation easy with scripting - easy combining with ARD
7. What does the problem-reporting feature do?
Start the name with a . - or enable the hidden file flag.
It enacts itself any time an App crashes or hangs indefinitely. It send an error report and any comments to Apple.
Client software is used to access services provided by a server
Hold down shift on startup
8. Relative path
9. Locate system version - build number - serial number location
firmware - startup chim or bright flash of power-on light and light gray screen booter - dark gray apple logo on primary display kernel - small gray spinning gear system launchd - bright blue screen
User preferences are in ~/Library and the format is often Property List - which is just a special XML file.
About this mac or system profiler. System is general release number - build is specific - and serial number represents the machine.
Finder get info - command line run ls -l
10. What process or processes are responsible for dashboard widgets?
The Dock process starts the DashboardClient process. All widgets run inside one of the two DashboardClient processes.
human input devices (HIDs) like keyboards and mice - storage devices like hard drives - printers - scanners - digital cameras - video devices including both input and output - and audio devices.
Authentication is who am I?Authorization is what can I do?
Press the eject button - file>>eject - drag to trash - press eject in the sidebar
11. What are the two primary automation technologies for the GUI?
Safe boot refers to when the system is starting up - safe mode is when the system is actually running - and safe login is when the system starts up the user session.
Describe containers in the file system
extensions - tied to the kernel to provide hardware support - frameworks - shared code libraries - fonts - preference files - configuration info - Launch Agents and Launch Daemons - used by launchd to provide auto-starting services - logs - contain d
Automator is a workflow based application whereas AppleScript is an english-like scripting language
12. What items are automatically started by system launchd during the system initialization process?
Local accounts are just for that Mac - network accounts are available anywhere on the network - and Mobile accounts create a cached local copy of a network account for offline access.
Kerberos tickets are used to validate an account's identity. Kerberos uses ticket-granting-tickets and service tickets. KDC = key distribution center.
/System/Library/LaunchDaemons - /Library/LaunchDaemons - /Library/StartupItems - /etc/rc.local (maybe)
This ignores any ownership rules and will grant any logged-on user unlimited access to the contents of the volume.
13. What is authentication and authorization?
If the DHCP request goes unanswered - it'll get a self-assigned IP in the 169.254 range.
Root has unlimited access - Admin can change system files & settings - guest can dump tons of files
System Profiler
Authentication is who am I?Authorization is what can I do?
14. How is the DOmain Name Service used to facilitate network naming?
Clear-text - encrypted - Kerberos
The DNS Service is used to translate host names to IP addresses via forward lookups and IP addresses to domain names via reverse lookups.
About this mac or system profiler. System is general release number - build is specific - and serial number represents the machine.
Check for firmware updates - verify app compatibility - back up files - document critical settings
15. How are the permissions on the shared folder set to allow local user sharing?
They're used to combine complex items into individual folders. Packages appear as a single item.
User preferences are in ~/Library and the format is often Property List - which is just a special XML file.
All users can read/write - but only the creator can delete. This uses the sticky bit.
Internet traffic goes through the primary interface.
16. What are some known issues that arise when connecting to network file services?
The network service operates or broadcasts on a network port.
1.) User accounts not tied to individual Macs 2.) Same user account for multiple services 3.) Kerberos SSO 4.) Define user/comp settings in a single location
Resource contention general - an item another user has running. Document contention for document another user has open. Peripheral contention for peripheral in use by another user. Application contention for when an app is designed to be open only on
Forked files may cause issues for NFS and WebDAV. Also avoid AFP 2 on Windows file servers.
17. How does network service order affect network connectivity?
The network service operates or broadcasts on a network port.
Run PPC based apps on newer Intel macs. It does not support pre-OS X apps - the Classic environment - PPC screen-savers - PPC preference panes - G5 specific apps - PPC kernel extensions - some Java apps
Internet traffic goes through the primary interface.
Enable Web Sharing in System Preferences
18. How do you identify ownership and permissions of a file or folder in the Finder? In the command line?
Using information provided by the dynamic network services discovery protocols. Computers providing services appear as resources whereas service discovery zones or workgroups appear as folders.
Finder get info - command line run ls -l
1.) Try another account 2.) Reset the account password 3.) Verify directory service connectivity 4) Verify kerberos authentication & config 5.) Check directory service log files
extensions - tied to the kernel to provide hardware support - frameworks - shared code libraries - fonts - preference files - configuration info - Launch Agents and Launch Daemons - used by launchd to provide auto-starting services - logs - contain d
19. Which two commands can read text files?
They're stored at the root of every volume in a /.Spotlight-V100 folder. A fileVault user's database is stored in his vault in his home user. Mail is in ~/Library/Mail/Mail Envelope. Spotlight plugins can be in any library folder in a folder called S
iSync allows you to sync personal info between Mac OS X apps and peripherals like Palm PDAs - and Bluetooth enabled cell phones.
cat - less
It does a 7-pass erase.
20. How do you use disk utility to burn an optical disk?
Drag the disk image into disk utility and press burn
computer hostname - working directory - user account
Universal Access - items for the seeing or hearing impaired - keyboard and mouse difficulties - and are stored in ~/Library/Preferences
Disconnected cable - nonfunctioning port - DHCP issue - DNS issue
21. What is Rosetta and what types of items are not supported by Rosetta?
Temp files - spotlight indexes - items in the trash - and any files defined as exempt either by you or by an application.
Run PPC based apps on newer Intel macs. It does not support pre-OS X apps - the Classic environment - PPC screen-savers - PPC preference panes - G5 specific apps - PPC kernel extensions - some Java apps
IP addresses identify the location of a specific network device. Subnet masks are used by network devices to identify their local network range. IPv4 addresses are a 32-bit number represented in 4 groups of four octets separated by periods. 0-255.
More options than GUI - bypass finder restrictions - root access - remote ssh is invisible to users - automation easy with scripting - easy combining with ARD
22. Account attributes
Individual pieces of information used to define a user such as user ID - UUID - home directory - etc.
The loginwindow process logs all users out and then tells the kernel to quit all remaining system processes.
Standard - Admin - Guest - Sharing-Only - Root
The network service operates or broadcasts on a network port.
23. What are some common file flags and extended attributes used by Mac OS X?
System Profiler
Enable Web Sharing in System Preferences
1 GB of RAM - 5 GB of disk space - DVD drive - display
Common flags include locked and hidden - Common extended attributes include an items color - spotlight comments - etc.
24. What are four advantages of using network directory services to store account information?
If a known master password is reset - existing accounts are not negatively affected. If the master is reset because it was lost - however - preexisting accounts cannot be reset by the new password until the old FileVault passwords are reset.
1.) User accounts not tied to individual Macs 2.) Same user account for multiple services 3.) Kerberos SSO 4.) Define user/comp settings in a single location
Admins have access to any locally-connected volume whereas standard users can only access their home folders and other user's Public folders.
extensions - tied to the kernel to provide hardware support - frameworks - shared code libraries - fonts - preference files - configuration info - Launch Agents and Launch Daemons - used by launchd to provide auto-starting services - logs - contain d
25. How do permissions in the Finder appear different than those in the terminal?
Using information provided by the dynamic network services discovery protocols. Computers providing services appear as resources whereas service discovery zones or workgroups appear as folders.
IP addresses identify the location of a specific network device. Subnet masks are used by network devices to identify their local network range. IPv4 addresses are a 32-bit number represented in 4 groups of four octets separated by periods. 0-255.
It records what file operations are in progress at any given moment. If a power failure or system crash occurs - it can verify the integrity by replaying the journal.
Finder shows only 4 different permissions options: read/write - read-only - write-only - and no access. Terminal can show you any possible combination.
26. What are resource forks and why have they fallen out of favor?
27. What does Mac OS X use bundles or packages for?
28. What client-sharing services can Mac OS X provide?
command - options - arguments
Applications - Library - System - Users
Screen sharing - remote login - remote management - remote apple events - and Xgrid sharing
The DNS Service is used to translate host names to IP addresses via forward lookups and IP addresses to domain names via reverse lookups.
29. What does the firmware do? What is the POST?
30. What shared items are accessible to any user who connects via FTP?
31. What does iSync do?
The network service operates or broadcasts on a network port.
iSync allows you to sync personal info between Mac OS X apps and peripherals like Palm PDAs - and Bluetooth enabled cell phones.
Your Mac provides network routing NAT - DHCP - and DNS forwarding services for any device connected. When sharing AirPort - you can specify and SSID - channel - and WEP settings.
Interface is any channel through which networks data can flow. Hardware network interfaces are defined by physical network connections - while virtual network connections are logical network connections on top of hardware connections. Protocol is a s
32. Security risk with fast user switching?
Disconnected cable - nonfunctioning port - DHCP issue - DNS issue
The firmware initializes the Mac's hardware and and locates the booter file on the system volume. The Power-On Self Test (POST) checks for basic hardware functionality.
It enacts itself any time an App crashes or hangs indefinitely. It send an error report and any comments to Apple.
Locally connected volumes are fully accessible to any logged in user.
33. What two methods can be used to hide items from the Finder?
Start the name with a . - or enable the hidden file flag.
Don't erase data - zero out the data - 7-pass erase - 35-pass erase
based on the user's current location
firmware - startup chim or bright flash of power-on light and light gray screen booter - dark gray apple logo on primary display kernel - small gray spinning gear system launchd - bright blue screen
34. Different between absolute and relative path
The Dock process starts the DashboardClient process. All widgets run inside one of the two DashboardClient processes.
Every home folder has the public folder and dropbox folder whereas all other home folders are protected.
Nothing.
Absolute always start at the root of the filesystem - whereas relative paths start where the user is current at
35. What are they advantages of code-signing?
Code signed items include a digital signature that the system can use to verify the authenticity and integrity of the application or process and its resources.
So they can navigate to the public or sites folder
The Dock process starts the DashboardClient process. All widgets run inside one of the two DashboardClient processes.
command - options - arguments
36. Two primary partition schemes for mac formatted drives?
User preferences are in ~/Library and the format is often Property List - which is just a special XML file.
Hold down shift on startup
Common flags include locked and hidden - Common extended attributes include an items color - spotlight comments - etc.
GUID partition table for intel-based macs - Apple-Partition-Map for PPC macs
37. How can you limit a user account?
based on the user's current location
User preferences are in ~/Library and the format is often Property List - which is just a special XML file.
Internet traffic goes through the primary interface.
Parental controls
38. What 3 types of resource contention issues can occur when fast user switching is enabled?
Resource contention general - an item another user has running. Document contention for document another user has open. Peripheral contention for peripheral in use by another user. Application contention for when an app is designed to be open only on
The computer's website files are located in /Library/WebServer/Documents and each users' is inside ~/Sites
Client software is used to access services provided by a server
Run PPC based apps on newer Intel macs. It does not support pre-OS X apps - the Classic environment - PPC screen-savers - PPC preference panes - G5 specific apps - PPC kernel extensions - some Java apps
39. What does a keychain do?
Securely stores passwords - form-fills - etc.
Locally connected volumes are fully accessible to any logged in user.
The firmware initializes the Mac's hardware and and locates the booter file on the system volume. The Power-On Self Test (POST) checks for basic hardware functionality.
Finder get info - command line run ls -l
40. What are the four erase options in disk utility?
41. How does the Finder's secure empty trash work?
It does a 7-pass erase.
Individual pieces of information used to define a user such as user ID - UUID - home directory - etc.
Terminal - Single User Mode - >Console from login window - SSH
Clear-text - encrypted - Kerberos
42. What do the terms interface - protocol - and service mean in relation to computer networks?
Interface is any channel through which networks data can flow. Hardware network interfaces are defined by physical network connections - while virtual network connections are logical network connections on top of hardware connections. Protocol is a s
Check for firmware updates - verify app compatibility - back up files - document critical settings
Prevents users from using the reset password utility on the os x install dvd because they cannot boot from it.
User accounts - user groups - computer accounts - computer groups - network file mounts - management settings - and collaboration information.
43. What are the four default top-level folders available in the Finder?
Locally connected volumes are fully accessible to any logged in user.
Individual pieces of information used to define a user such as user ID - UUID - home directory - etc.
Applications - Library - System - Users
It monitors all incoming connections and requests. Connections are allowed on a per-application basis. Advanced options include signing options - stealth mode - and more.
44. Default install packages
Drag the disk image into disk utility and press burn
Core system files - fonts - X11 - nearby & local printers - language translations
About this mac or system profiler. System is general release number - build is specific - and serial number represents the machine.
Nothing.
45. How can you identify the type of a particular application?
Get Info from Finder or System Profiler
PostScript Printer Description (PPD) files are printer driver files that instruct the CUPS system on how to communicate with specific printer models.
Apple Menu>> Force Quit - Activity Monitor - Dock contextual menu
Set the mac's network identification - enable the desired service - define access.System preferences >> Sharing
46. Why is the root of a user's home folder visible to others?
Info pane in Network Utility
All users can read/write - but only the creator can delete. This uses the sticky bit.
So they can navigate to the public or sites folder
RAID 0 uses striping to increase performance. RAID 1 uses disk mirroring.
47. What is a device driver? What three primary types of device drivers are there?
It has to copy the entire thing over again on each change.
1.) Try another account 2.) Reset the account password 3.) Verify directory service connectivity 4) Verify kerberos authentication & config 5.) Check directory service log files
A driver is a piece of software designed to facilitate the communication between Mac OS X and the peripheral. There are kernel extensions - framework plug-ins - or stand-alone applications.
Firmware - booter - kernel - and system launchd. Primary user environment stages are loginwindow - user launchd - and user environment.
48. What steps should you take when troubleshooting app issues?
Common UNIX Printing System (CUPS) manages all printing and faxing for the system.
Nothing.
Launch daemons and startup items are launched during system initialization by the system launchd process on behalf of root. Launch agents and login items are opened during the initialization of the GUI environment by the user's launchd process.
Restart the app - try another document - try another user account - check log files - delete caches - replace preferences - and replace app resources.
49. What password issues may arise related to the SMB service?
50. What is a Kerberos Ticket and KDC?