SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
ACSP: Apple Certified Support Professional Os X Support
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
apple
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How do you share printers with other Mac and Windows users?
2. How do you provide Mac OS X web-sharing services?
Enable Web Sharing in System Preferences
Describe containers in the file system
It allows Windows XP SP2+ - Vista - and 7 to run natively on the Mac by running a separate partition.
Code signed items include a digital signature that the system can use to verify the authenticity and integrity of the application or process and its resources.
3. How does file-fault secure a user's data?
Enable Web Sharing in System Preferences
The computer's website files are located in /Library/WebServer/Documents and each users' is inside ~/Sites
Users don't traditionally need access to them - and if they do - they can use Terminal.
It stores the home folder as an encrypted sparse-bundle disk image
4. What role does system launchd play in the system start-up?
Describe containers in the file system
Firmware - booter - kernel - and system launchd. Primary user environment stages are loginwindow - user launchd - and user environment.
Press the eject button - file>>eject - drag to trash - press eject in the sidebar
System launchd is responsible for starting every single system process. It manages system initialization and launches loginwindow.
5. What is the safe boot keyboard combo?
Launch daemons and startup items are launched during system initialization by the system launchd process on behalf of root. Launch agents and login items are opened during the initialization of the GUI environment by the user's launchd process.
Hold down shift on startup
It does a 7-pass erase.
A driver is a piece of software designed to facilitate the communication between Mac OS X and the peripheral. There are kernel extensions - framework plug-ins - or stand-alone applications.
6. Five types of accounts in 10.6
Standard - Admin - Guest - Sharing-Only - Root
Press the eject button - file>>eject - drag to trash - press eject in the sidebar
HFS+ (Mac OS X Extended Journaled - Mac OS X Extended Case Sensitive Journaled - Mac OS X Extended) - HFS - UFS - FAT32 - NTFS - UDF
Interface is any channel through which networks data can flow. Hardware network interfaces are defined by physical network connections - while virtual network connections are logical network connections on top of hardware connections. Protocol is a s
7. What are the primary differences between local - network - and mobile accounts?
Review network preferences - review network utility preferences - and attempt to connect to different network services
Local accounts are just for that Mac - network accounts are available anywhere on the network - and Mobile accounts create a cached local copy of a network account for offline access.
If the DHCP request goes unanswered - it'll get a self-assigned IP in the 169.254 range.
Devices providing network services broadcast their existence and Mac OS X picks up on these broadcasts and provides a list of services.
8. What is the potential side effect of improperly unmounting or ejecting a volume?
Securely stores passwords - form-fills - etc.
Access is based on the local filesystem. They'll start in their home folder but can traverse anywhere they have permission to do so.
May cause data corruption
Resource contention general - an item another user has running. Document contention for document another user has open. Peripheral contention for peripheral in use by another user. Application contention for when an app is designed to be open only on
9. What two dynamic network service discovery protocols are supported by Mac OS X?
Bonjour and NetBios & WINS
A driver is a piece of software designed to facilitate the communication between Mac OS X and the peripheral. There are kernel extensions - framework plug-ins - or stand-alone applications.
It has to copy the entire thing over again on each change.
Press the eject button - file>>eject - drag to trash - press eject in the sidebar
10. What role does loginwindow serve in system start-up?
human input devices (HIDs) like keyboards and mice - storage devices like hard drives - printers - scanners - digital cameras - video devices including both input and output - and audio devices.
loginwindow displays the login window and then sets up and manages the GUI user environment.
The client uses the subnet mask to decide if the client is on the LAN. If it's not on the LAN - then it sends the data to the IP address of the local router. Traffic continues through routers until it reaches the destination.
Zip files are created with the Finder and are compatible with many OSes. Good for small files & small number of items. Disk Images are created in disk utility.
11. What does 'ignore volume ownership' do in the Finder?
This ignores any ownership rules and will grant any logged-on user unlimited access to the contents of the volume.
Don't erase data - zero out the data - 7-pass erase - 35-pass erase
It's a special permission used to define a folder as an append-only destination (only the creator can delete the file he creates)
Intel - directly attached input devices - 10.5 or later - all new firmware updates - 10.5 or greater install disc - 10 gigs of free space - 2 GB or more of RAM
12. What is authentication and authorization?
Interface is any channel through which networks data can flow. Hardware network interfaces are defined by physical network connections - while virtual network connections are logical network connections on top of hardware connections. Protocol is a s
based on the user's current location
Users' public folders
Authentication is who am I?Authorization is what can I do?
13. What is protected memory? What is 64 bit memory addressing?
It records what file operations are in progress at any given moment. If a power failure or system crash occurs - it can verify the integrity by replaying the journal.
human input devices (HIDs) like keyboards and mice - storage devices like hard drives - printers - scanners - digital cameras - video devices including both input and output - and audio devices.
The system keeps applications from interfering with one another by segregating their memory using protected memory. 64 bit memory addressing allows apps to directly access more than 4 GB of ram.
All users can read/write - but only the creator can delete. This uses the sticky bit.
14. What backup destinations does Time Machine support?
Any Mac OS X Extended volume including volumes from disk images stored on an AFP share on OS X Server.
based on the user's current location
A database of information that in some cases can be shared to the network. Account information is the most commonly accessed directory resource.
The spotlight search service creates index databases of file system metadata so that it can perform normally time-intensive searches nearly instantly.
15. 3 Main components of a typical command
Universal Access - items for the seeing or hearing impaired - keyboard and mouse difficulties - and are stored in ~/Library/Preferences
Don't erase data - zero out the data - 7-pass erase - 35-pass erase
It monitors all incoming connections and requests. Connections are allowed on a per-application basis. Advanced options include signing options - stealth mode - and more.
command - options - arguments
16. What are five application environments supported by Mac OS X and what are they used for?
Cocoa - Carbon - BSD (CLI) - X11 - Java (Cocoa is native - Carbon is based on OS 9 but still provides OS X performance - X11 is a unix windowing environment)
Common flags include locked and hidden - Common extended attributes include an items color - spotlight comments - etc.
Nothing.
iSync allows you to sync personal info between Mac OS X apps and peripherals like Palm PDAs - and Bluetooth enabled cell phones.
17. What files are associated with the computer's website? What about the users' websites?
18. What three common unix commands support Mac filesystem metadata?
cp - mv - rm
Parental controls
Automator is a workflow based application whereas AppleScript is an english-like scripting language
The loginwindow process logs all users out and then tells the kernel to quit all remaining system processes.
19. What are resource forks and why have they fallen out of favor?
20. What are the four erase options in disk utility?
21. Which two commands can read text files?
cat - less
It records what file operations are in progress at any given moment. If a power failure or system crash occurs - it can verify the integrity by replaying the journal.
Set the mac's network identification - enable the desired service - define access.System preferences >> Sharing
Core system files - fonts - X11 - nearby & local printers - language translations
22. How do you identify ownership and permissions of a file or folder in the Finder? In the command line?
Used to make the filesystem appear less complex. Data forks and resource forks are combined to appear as a single item. They have fallen out because they're not compatible with non Mac-OS volumes and are not extensible.
Finder get info - command line run ls -l
Launch Services maintains a database of associated file types and applications.
It will not load any third party KEXTs - third-party LaunchAgents - LaunchDaemons - StartupItems - fonts - any user login items - or any user specific LaunchAgents.
23. How do you further resolve and issue that disappears when the Mac successfully safe-boots?
Find the third-party resource causing the problem. Start in verbose mode and see where the startup fails.
The spotlight search service creates index databases of file system metadata so that it can perform normally time-intensive searches nearly instantly.
Local accounts are just for that Mac - network accounts are available anywhere on the network - and Mobile accounts create a cached local copy of a network account for offline access.
It addresses the outgoing packets based on the destination device's MAC address
24. What network services are provided by your Mac to facilitate Internet sharing? What options are available for Internet sharing your Mac's AirPort wireless Ethernet interface?
Don't erase data - zero out the data - 7-pass erase - 35-pass erase
Press the eject button - file>>eject - drag to trash - press eject in the sidebar
/System/Library/LaunchDaemons - /Library/LaunchDaemons - /Library/StartupItems - /etc/rc.local (maybe)
Your Mac provides network routing NAT - DHCP - and DNS forwarding services for any device connected. When sharing AirPort - you can specify and SSID - channel - and WEP settings.
25. What are three common troubleshooting techniques for issues involving failure to connect to network services?
Common UNIX Printing System (CUPS) manages all printing and faxing for the system.
It does a 7-pass erase.
Nothing.
Review network preferences - review network utility preferences - and attempt to connect to different network services
26. What is the sticky bit?
27. Difference between disk drives - partition - and volume
28. What is a Kerberos Ticket and KDC?
29. Four methods to access CLI
Users don't traditionally need access to them - and if they do - they can use Terminal.
Terminal - Single User Mode - >Console from login window - SSH
Admins have access to any locally-connected volume whereas standard users can only access their home folders and other user's Public folders.
This will not change the keychain. They can either unlock the keychain with the old password to sync them - or create a new keychain.
30. What are they advantages of code-signing?
Enable Web Sharing in System Preferences
Devices providing network services broadcast their existence and Mac OS X picks up on these broadcasts and provides a list of services.
Run PPC based apps on newer Intel macs. It does not support pre-OS X apps - the Classic environment - PPC screen-savers - PPC preference panes - G5 specific apps - PPC kernel extensions - some Java apps
Code signed items include a digital signature that the system can use to verify the authenticity and integrity of the application or process and its resources.
31. How can you force quit an app from the GUI?
Apple Menu>> Force Quit - Activity Monitor - Dock contextual menu
Too many to list. Hehe.
May cause data corruption
Your Mac provides network routing NAT - DHCP - and DNS forwarding services for any device connected. When sharing AirPort - you can specify and SSID - channel - and WEP settings.
32. How does the firmware password help secure against password changes?
It records what file operations are in progress at any given moment. If a power failure or system crash occurs - it can verify the integrity by replaying the journal.
It does a 7-pass erase.
Prevents users from using the reset password utility on the os x install dvd because they cannot boot from it.
Used to make the filesystem appear less complex. Data forks and resource forks are combined to appear as a single item. They have fallen out because they're not compatible with non Mac-OS volumes and are not extensible.
33. How does Time Machine maintain a backup history of the system?
34. Two primary partition schemes for mac formatted drives?
It will not load any third party KEXTs - third-party LaunchAgents - LaunchDaemons - StartupItems - fonts - any user login items - or any user specific LaunchAgents.
1.) Create a plain text file w/ the 2.) Make the first line #!/bin/bash 3.) Change the permissions to allow execution
GUID partition table for intel-based macs - Apple-Partition-Map for PPC macs
May cause data corruption
35. What does iSync do?
System Profiler - Disk Utility - Reset Password Utility - Firmware Password - Restore from Time Machine Backup - Startup Disk - Terminal - Network Utility
The client uses the subnet mask to decide if the client is on the LAN. If it's not on the LAN - then it sends the data to the IP address of the local router. Traffic continues through routers until it reaches the destination.
Zip files are created with the Finder and are compatible with many OSes. Good for small files & small number of items. Disk Images are created in disk utility.
iSync allows you to sync personal info between Mac OS X apps and peripherals like Palm PDAs - and Bluetooth enabled cell phones.
36. What shared items are accessible to an administrator who connects via AFP or SMB? What about a standard user?
37. How does Mac OS X use dynamic network discovery protocols to access network services?
Devices providing network services broadcast their existence and Mac OS X picks up on these broadcasts and provides a list of services.
Kerberos can only be used to authenticate against kerberized services and is often managed on a network-wide scale.
Info pane in Network Utility
Single partition drives are easier to setup initially - but aren't as flexible for admin/maintenance. Multiple can segregate data
38. What happens during system shutdown?
Single partition drives are easier to setup initially - but aren't as flexible for admin/maintenance. Multiple can segregate data
The loginwindow process logs all users out and then tells the kernel to quit all remaining system processes.
Parental controls
It enacts itself any time an App crashes or hangs indefinitely. It send an error report and any comments to Apple.
39. What are the min sys req for BootCamp?
Disconnected cable - nonfunctioning port - DHCP issue - DNS issue
The spotlight search service creates index databases of file system metadata so that it can perform normally time-intensive searches nearly instantly.
Review network preferences - review network utility preferences - and attempt to connect to different network services
Intel - directly attached input devices - 10.5 or later - all new firmware updates - 10.5 or greater install disc - 10 gigs of free space - 2 GB or more of RAM
40. What two methods can be used to hide items from the Finder?
Start the name with a . - or enable the hidden file flag.
The spotlight search service creates index databases of file system metadata so that it can perform normally time-intensive searches nearly instantly.
Securely stores passwords - form-fills - etc.
More options than GUI - bypass finder restrictions - root access - remote ssh is invisible to users - automation easy with scripting - easy combining with ARD
41. Best command to list items in a folder?
Restart the app - try another document - try another user account - check log files - delete caches - replace preferences - and replace app resources.
ls
Temp files - spotlight indexes - items in the trash - and any files defined as exempt either by you or by an application.
Option key - Startup Disk preference pane in OS X - or the BootCamp utility in Windows.
42. What items are automatically started by system launchd during the system initialization process?
extensions - tied to the kernel to provide hardware support - frameworks - shared code libraries - fonts - preference files - configuration info - Launch Agents and Launch Daemons - used by launchd to provide auto-starting services - logs - contain d
/System/Library/LaunchDaemons - /Library/LaunchDaemons - /Library/StartupItems - /etc/rc.local (maybe)
Describe containers in the file system
Using information provided by the dynamic network services discovery protocols. Computers providing services appear as resources whereas service discovery zones or workgroups appear as folders.
43. Security risks & account types
Disconnected cable - nonfunctioning port - DHCP issue - DNS issue
Launch daemons and startup items are launched during system initialization by the system launchd process on behalf of root. Launch agents and login items are opened during the initialization of the GUI environment by the user's launchd process.
Root has unlimited access - Admin can change system files & settings - guest can dump tons of files
User accounts - user groups - computer accounts - computer groups - network file mounts - management settings - and collaboration information.
44. Min hardware requirements for 10.6
Users' public folders
Automator is a workflow based application whereas AppleScript is an english-like scripting language
1 GB of RAM - 5 GB of disk space - DVD drive - display
firmware - startup chim or bright flash of power-on light and light gray screen booter - dark gray apple logo on primary display kernel - small gray spinning gear system launchd - bright blue screen
45. What are four common issues that can interrupt network services on a Mac OS X computer?
Devices providing network services broadcast their existence and Mac OS X picks up on these broadcasts and provides a list of services.
A driver is a piece of software designed to facilitate the communication between Mac OS X and the peripheral. There are kernel extensions - framework plug-ins - or stand-alone applications.
Access is based on the local filesystem. They'll start in their home folder but can traverse anywhere they have permission to do so.
Disconnected cable - nonfunctioning port - DHCP issue - DNS issue
46. What three methods can be used to select the start-up disk?
Single partition drives are easier to setup initially - but aren't as flexible for admin/maintenance. Multiple can segregate data
1.) Create a plain text file w/ the 2.) Make the first line #!/bin/bash 3.) Change the permissions to allow execution
Option key - Startup Disk preference pane in OS X - or the BootCamp utility in Windows.
This will not change the keychain. They can either unlock the keychain with the old password to sync them - or create a new keychain.
47. What are some known issues that arise when connecting to network file services?
Forked files may cause issues for NFS and WebDAV. Also avoid AFP 2 on Windows file servers.
It will allow any user to search any attached non-system volume if ownership is ignored.
A database of information that in some cases can be shared to the network. Account information is the most commonly accessed directory resource.
It records what file operations are in progress at any given moment. If a power failure or system crash occurs - it can verify the integrity by replaying the journal.
48. How does the IP transfer messages between computers on a WAN?
49. What are three common authentication methods?
Clear-text - encrypted - Kerberos
Start the name with a . - or enable the hidden file flag.
Launch Services maintains a database of associated file types and applications.
Common UNIX Printing System (CUPS) manages all printing and faxing for the system.
50. What client-sharing services can Mac OS X provide?
Run PPC based apps on newer Intel macs. It does not support pre-OS X apps - the Classic environment - PPC screen-savers - PPC preference panes - G5 specific apps - PPC kernel extensions - some Java apps
Print and Fax or Sharing Preferences. For windows users - you must enable users' password in the SMB file sharing settings in Sharing Preferences.
Screen sharing - remote login - remote management - remote apple events - and Xgrid sharing
The DNS Service is used to translate host names to IP addresses via forward lookups and IP addresses to domain names via reverse lookups.