SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
ACSP: Apple Certified Support Professional Os X Support
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
apple
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is a Kerberos Ticket and KDC?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
2. How do Mac OS X computers acquire and use link-local TCP/IP addresses?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
3. What items are automatically started by system launchd during the system initialization process?
Any Mac OS X Extended volume including volumes from disk images stored on an AFP share on OS X Server.
/System/Library/LaunchDaemons - /Library/LaunchDaemons - /Library/StartupItems - /etc/rc.local (maybe)
Disconnected cable - nonfunctioning port - DHCP issue - DNS issue
IP addresses identify the location of a specific network device. Subnet masks are used by network devices to identify their local network range. IPv4 addresses are a 32-bit number represented in 4 groups of four octets separated by periods. 0-255.
4. Default install packages
Core system files - fonts - X11 - nearby & local printers - language translations
The status indicator lights - Green - yellow - red.
iSync allows you to sync personal info between Mac OS X apps and peripherals like Palm PDAs - and Bluetooth enabled cell phones.
Code signed items include a digital signature that the system can use to verify the authenticity and integrity of the application or process and its resources.
5. What process or processes are responsible for dashboard widgets?
All users can read/write - but only the creator can delete. This uses the sticky bit.
Full directions to a specific item
The Dock process starts the DashboardClient process. All widgets run inside one of the two DashboardClient processes.
1.) Create a plain text file w/ the 2.) Make the first line #!/bin/bash 3.) Change the permissions to allow execution
6. What items are shared by default to all users?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
7. Four prep steps before installing
The computer's website files are located in /Library/WebServer/Documents and each users' is inside ~/Sites
Universal Access - items for the seeing or hearing impaired - keyboard and mouse difficulties - and are stored in ~/Library/Preferences
Check for firmware updates - verify app compatibility - back up files - document critical settings
Too many to list. Hehe.
8. How does the default organization of the filesystem allow users to safely share local files and folder?
Common flags include locked and hidden - Common extended attributes include an items color - spotlight comments - etc.
Find the third-party resource causing the problem. Start in verbose mode and see where the startup fails.
Code signed items include a digital signature that the system can use to verify the authenticity and integrity of the application or process and its resources.
Every home folder has the public folder and dropbox folder whereas all other home folders are protected.
9. 3 Default items in CLI prompt
Code signed items include a digital signature that the system can use to verify the authenticity and integrity of the application or process and its resources.
Start the name with a . - or enable the hidden file flag.
computer hostname - working directory - user account
It will not load any third party KEXTs - third-party LaunchAgents - LaunchDaemons - StartupItems - fonts - any user login items - or any user specific LaunchAgents.
10. What is the difference between launch daemons - startup items - launch agents - and login items?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
11. What role does system launchd play in the system start-up?
System launchd is responsible for starting every single system process. It manages system initialization and launches loginwindow.
They're used to combine complex items into individual folders. Packages appear as a single item.
Zip files are created with the Finder and are compatible with many OSes. Good for small files & small number of items. Disk Images are created in disk utility.
Safe boot refers to when the system is starting up - safe mode is when the system is actually running - and safe login is when the system starts up the user session.
12. What happens during system shutdown?
Find the third-party resource causing the problem. Start in verbose mode and see where the startup fails.
1.) Create a plain text file w/ the 2.) Make the first line #!/bin/bash 3.) Change the permissions to allow execution
It monitors all incoming connections and requests. Connections are allowed on a per-application basis. Advanced options include signing options - stealth mode - and more.
The loginwindow process logs all users out and then tells the kernel to quit all remaining system processes.
13. What five network file services can you connect to from the Finder's Connect To Server dialog?
Drag the disk image into disk utility and press burn
It enacts itself any time an App crashes or hangs indefinitely. It send an error report and any comments to Apple.
The loginwindow process logs all users out and then tells the kernel to quit all remaining system processes.
AFP - SMB - FTP - NFS - WebDAV
14. What shared items are accessible to an administrator who connects via AFP or SMB? What about a standard user?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
15. What are the device classes used by Mac OS X to categorize peripherals? What are some examples of each class?
Info pane in Network Utility
May cause data corruption
human input devices (HIDs) like keyboards and mice - storage devices like hard drives - printers - scanners - digital cameras - video devices including both input and output - and audio devices.
Firmware - booter - kernel - and system launchd. Primary user environment stages are loginwindow - user launchd - and user environment.
16. What does CUPS do?
A database of information that in some cases can be shared to the network. Account information is the most commonly accessed directory resource.
Common UNIX Printing System (CUPS) manages all printing and faxing for the system.
Defines the directions to a specific item in the filesystem
IP addresses identify the location of a specific network device. Subnet masks are used by network devices to identify their local network range. IPv4 addresses are a 32-bit number represented in 4 groups of four octets separated by periods. 0-255.
17. How do permissions in the Finder appear different than those in the terminal?
Common flags include locked and hidden - Common extended attributes include an items color - spotlight comments - etc.
Finder shows only 4 different permissions options: read/write - read-only - write-only - and no access. Terminal can show you any possible combination.
Automator is a workflow based application whereas AppleScript is an english-like scripting language
Internet traffic goes through the primary interface.
18. What are the two primary automation technologies for the GUI?
Automator is a workflow based application whereas AppleScript is an english-like scripting language
Universal Access - items for the seeing or hearing impaired - keyboard and mouse difficulties - and are stored in ~/Library/Preferences
Enable Web Sharing in System Preferences
Hold down shift on startup
19. What does the firmware do? What is the POST?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
20. What are the differences between ZIP archives and Disk Images?
Zip files are created with the Finder and are compatible with many OSes. Good for small files & small number of items. Disk Images are created in disk utility.
Access is based on the local filesystem. They'll start in their home folder but can traverse anywhere they have permission to do so.
Get Info from Finder or System Profiler
It records what file operations are in progress at any given moment. If a power failure or system crash occurs - it can verify the integrity by replaying the journal.
21. Why is the root of a user's home folder visible to others?
If a known master password is reset - existing accounts are not negatively affected. If the master is reset because it was lost - however - preexisting accounts cannot be reset by the new password until the old FileVault passwords are reset.
So they can navigate to the public or sites folder
Describe containers in the file system
Print and Fax or Sharing Preferences. For windows users - you must enable users' password in the SMB file sharing settings in Sharing Preferences.
22. What three methods can be used to select the start-up disk?
To run commands as the root user
Option key - Startup Disk preference pane in OS X - or the BootCamp utility in Windows.
Defines the directions to a specific item in the filesystem
Users' public folders
23. Security risk with fast user switching?
Applications - Library - System - Users
It enacts itself any time an App crashes or hangs indefinitely. It send an error report and any comments to Apple.
Press the eject button - file>>eject - drag to trash - press eject in the sidebar
Locally connected volumes are fully accessible to any logged in user.
24. How does the Finder's secure empty trash work?
Zip files are created with the Finder and are compatible with many OSes. Good for small files & small number of items. Disk Images are created in disk utility.
Find the third-party resource causing the problem. Start in verbose mode and see where the startup fails.
Too many to list. Hehe.
It does a 7-pass erase.
25. What password issues may arise related to the SMB service?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
26. Best command to list items in a folder?
A database of information that in some cases can be shared to the network. Account information is the most commonly accessed directory resource.
ls
Users' public folders
It's used to verify or repair the directory structure of a volume which contains all the information used to locate files and folders on the volume.
27. What is target disk mode and how is it engaged?
Hold down T on boot - allows the mac to be turned into a very large - and expensive - external hard drive or disc drive.
Users don't traditionally need access to them - and if they do - they can use Terminal.
Hold down shift on startup
Launch Services maintains a database of associated file types and applications.
28. Account attributes
based on the user's current location
Don't erase data - zero out the data - 7-pass erase - 35-pass erase
RAID 0 uses striping to increase performance. RAID 1 uses disk mirroring.
Individual pieces of information used to define a user such as user ID - UUID - home directory - etc.
29. What four Directory Service types can used in Mac OS X?
Local - BSD Flat File and NIS - LDAPv3 - AD
File>>Create Burn Folder and drag items in then press burn. OR Insert blank media and choose new Burn Folder
Review network preferences - review network utility preferences - and attempt to connect to different network services
Option key - Startup Disk preference pane in OS X - or the BootCamp utility in Windows.
30. What is the relationship between a network service and a network port?
Interface is any channel through which networks data can flow. Hardware network interfaces are defined by physical network connections - while virtual network connections are logical network connections on top of hardware connections. Protocol is a s
Forked files may cause issues for NFS and WebDAV. Also avoid AFP 2 on Windows file servers.
Access is based on the local filesystem. They'll start in their home folder but can traverse anywhere they have permission to do so.
The network service operates or broadcasts on a network port.
31. How does Boot Camp work?
HFS+ (Mac OS X Extended Journaled - Mac OS X Extended Case Sensitive Journaled - Mac OS X Extended) - HFS - UFS - FAT32 - NTFS - UDF
Nothing.
May cause data corruption
It allows Windows XP SP2+ - Vista - and 7 to run natively on the Mac by running a separate partition.
32. 6 Reasons to use the CLI
Core system files - fonts - X11 - nearby & local printers - language translations
More options than GUI - bypass finder restrictions - root access - remote ssh is invisible to users - automation easy with scripting - easy combining with ARD
This will not change the keychain. They can either unlock the keychain with the old password to sync them - or create a new keychain.
The Dock process starts the DashboardClient process. All widgets run inside one of the two DashboardClient processes.
33. Utilities available from OS X install DVD
Temp files - spotlight indexes - items in the trash - and any files defined as exempt either by you or by an application.
The user's loginwindow process does the following: Request that all user applications quit - quits any user backgroun processes - runs any logout scripts - records the logout to the man system.log - resets device permissions and preferences to defaul
Bonjour and NetBios & WINS
System Profiler - Disk Utility - Reset Password Utility - Firmware Password - Restore from Time Machine Backup - Startup Disk - Terminal - Network Utility
34. Locate system version - build number - serial number location
iSync allows you to sync personal info between Mac OS X apps and peripherals like Palm PDAs - and Bluetooth enabled cell phones.
About this mac or system profiler. System is general release number - build is specific - and serial number represents the machine.
Cocoa - Carbon - BSD (CLI) - X11 - Java (Cocoa is native - Carbon is based on OS 9 but still provides OS X performance - X11 is a unix windowing environment)
Print and Fax or Sharing Preferences. For windows users - you must enable users' password in the SMB file sharing settings in Sharing Preferences.
35. What do the terms interface - protocol - and service mean in relation to computer networks?
Info pane in Network Utility
Interface is any channel through which networks data can flow. Hardware network interfaces are defined by physical network connections - while virtual network connections are logical network connections on top of hardware connections. Protocol is a s
Finder shows only 4 different permissions options: read/write - read-only - write-only - and no access. Terminal can show you any possible combination.
Any Mac OS X Extended volume including volumes from disk images stored on an AFP share on OS X Server.
36. What functionality does 10.6 support with AppleTalk?
Universal Access - items for the seeing or hearing impaired - keyboard and mouse difficulties - and are stored in ~/Library/Preferences
Users don't traditionally need access to them - and if they do - they can use Terminal.
If the backup volume became full and removed the older item(s).
Nothing.
37. What backup destinations does Time Machine support?
Zip files are created with the Finder and are compatible with many OSes. Good for small files & small number of items. Disk Images are created in disk utility.
Universal Access - items for the seeing or hearing impaired - keyboard and mouse difficulties - and are stored in ~/Library/Preferences
Any Mac OS X Extended volume including volumes from disk images stored on an AFP share on OS X Server.
Run the assistant - install windows - install drivers.
38. What is protected memory? What is 64 bit memory addressing?
Enable Web Sharing in System Preferences
Finder shows only 4 different permissions options: read/write - read-only - write-only - and no access. Terminal can show you any possible combination.
The system keeps applications from interfering with one another by segregating their memory using protected memory. 64 bit memory addressing allows apps to directly access more than 4 GB of ram.
Parental controls
39. How does the IP addresses use the MAC address to send messages between computers on a LAN?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
40. What three common unix commands support Mac filesystem metadata?
The loginwindow process logs all users out and then tells the kernel to quit all remaining system processes.
cp - mv - rm
System Profiler
Absolute always start at the root of the filesystem - whereas relative paths start where the user is current at
41. Path
About this mac or system profiler. System is general release number - build is specific - and serial number represents the machine.
Defines the directions to a specific item in the filesystem
This will not change the keychain. They can either unlock the keychain with the old password to sync them - or create a new keychain.
Access is based on the local filesystem. They'll start in their home folder but can traverse anywhere they have permission to do so.
42. What are three common authentication methods?
Disconnected cable - nonfunctioning port - DHCP issue - DNS issue
Drag the disk image into disk utility and press burn
Clear-text - encrypted - Kerberos
Users' passwords must be stored in a special format - which is less secure - and must be explicitly enabled.
43. What items are not loaded when Mac OS X safe boots?
It allows Windows XP SP2+ - Vista - and 7 to run natively on the Mac by running a separate partition.
It will not load any third party KEXTs - third-party LaunchAgents - LaunchDaemons - StartupItems - fonts - any user login items - or any user specific LaunchAgents.
Drag the disk image into disk utility and press burn
1.) Try another account 2.) Reset the account password 3.) Verify directory service connectivity 4) Verify kerberos authentication & config 5.) Check directory service log files
44. How do you share printers with other Mac and Windows users?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
45. What are five application environments supported by Mac OS X and what are they used for?
Documents - Movies - Music - Pictures - Library - Downloads - Desktop - Public - Sites
Apple Menu>> Force Quit - Activity Monitor - Dock contextual menu
The status indicator lights - Green - yellow - red.
Cocoa - Carbon - BSD (CLI) - X11 - Java (Cocoa is native - Carbon is based on OS 9 but still provides OS X performance - X11 is a unix windowing environment)
46. What is the sticky bit?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
47. How do you use disk utility to burn an optical disk?
So they can navigate to the public or sites folder
Drag the disk image into disk utility and press burn
extensions - tied to the kernel to provide hardware support - frameworks - shared code libraries - fonts - preference files - configuration info - Launch Agents and Launch Daemons - used by launchd to provide auto-starting services - logs - contain d
Common flags include locked and hidden - Common extended attributes include an items color - spotlight comments - etc.
48. What does iSync do?
iSync allows you to sync personal info between Mac OS X apps and peripherals like Palm PDAs - and Bluetooth enabled cell phones.
Drag the disk image into disk utility and press burn
Disconnected cable - nonfunctioning port - DHCP issue - DNS issue
Restart the app - try another document - try another user account - check log files - delete caches - replace preferences - and replace app resources.
49. How does file system journaling work?
Restart the app - try another document - try another user account - check log files - delete caches - replace preferences - and replace app resources.
It records what file operations are in progress at any given moment. If a power failure or system crash occurs - it can verify the integrity by replaying the journal.
It has to copy the entire thing over again on each change.
Code signed items include a digital signature that the system can use to verify the authenticity and integrity of the application or process and its resources.
50. How do kerberos and keychain system differ for managing authentication services?
They're stored at the root of every volume in a /.Spotlight-V100 folder. A fileVault user's database is stored in his vault in his home user. Mail is in ~/Library/Mail/Mail Envelope. Spotlight plugins can be in any library folder in a folder called S
Access is based on the local filesystem. They'll start in their home folder but can traverse anywhere they have permission to do so.
Kerberos can only be used to authenticate against kerberized services and is often managed on a network-wide scale.
This ignores any ownership rules and will grant any logged-on user unlimited access to the contents of the volume.