Test your basic knowledge |

ACSP: Apple Certified Support Professional Os X Support

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is protected memory? What is 64 bit memory addressing?






2. What does the firmware do? What is the POST?






3. What are some known issues that arise when connecting to network file services?






4. What are the four default top-level folders available in the Finder?






5. How does resetting a user's password as an admin user affect their keychain?






6. What are the primary differences between local - network - and mobile accounts?






7. What shared items are accessible to any user who connects via FTP?






8. What are the four erase options in disk utility?






9. Three minium requirements for creating a command line script






10. Difference between disk drives - partition - and volume






11. Default install packages






12. What are they advantages of code-signing?






13. What is the relationship between a network service and a network port?






14. What is the potential side effect of improperly unmounting or ejecting a volume?






15. Which two commands can read text files?






16. What password issues may arise related to the SMB service?






17. How do you identify ownership and permissions of a file or folder in the Finder? In the command line?






18. What 4 methods can be used to eject a volume from the finder?






19. 3 Main components of a typical command






20. What are the device classes used by Mac OS X to categorize peripherals? What are some examples of each class?






21. Four prep steps before installing






22. How does Mac OS X's built-in firewall work? What advanced firewall settings are available?






23. What differentiates RAID 0 from RAID 1?






24. How do you further resolve and issue that disappears when the Mac successfully safe-boots?






25. How can you force quit an app from the GUI?






26. What client-sharing services can Mac OS X provide?






27. What system preference enables the accessibility features of OS X - what are they - and where are the preferences stored?






28. What happens during system shutdown?






29. What are four advantages of using network directory services to store account information?






30. Two primary partition schemes for mac formatted drives?






31. How do you provide Mac OS X web-sharing services?






32. How can you identify which apps are installed on a Mac?






33. What is sudo used for?






34. Path






35. In the network preferences - how can you tell which interface is currently being used for network activities?






36. What does 'ignore volume ownership' do in the Finder?






37. How does the firmware password help secure against password changes?






38. What is the difference between launch daemons - startup items - launch agents - and login items?






39. How does the IP transfer messages between computers on a WAN?






40. Where does spotlight store its metadata index databases? How about the plugins?






41. How is Disk utility's verify and repair feature used?






42. Advantages/disadvantages of single/multiple partition drives in OS X






43. How does resetting the master filevault password affect existing filevault user accounts?






44. Five types of accounts in 10.6






45. Absolute path






46. What two methods can be used to hide items from the Finder?






47. Security risk with fast user switching?






48. How can you identify the type of a particular application?






49. What are PPD files responsible for?






50. How do kerberos and keychain system differ for managing authentication services?