Test your basic knowledge |

ACSP: Apple Certified Support Professional Os X Support

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What are some security concerns with spotlight?






2. What does iSync do?






3. Four methods to access CLI






4. What process or processes are responsible for dashboard widgets?






5. What is the potential side effect of improperly unmounting or ejecting a volume?






6. Advantages/disadvantages of single/multiple partition drives in OS X


7. How are the permissions on the shared folder set to allow local user sharing?






8. 6 Reasons to use the CLI






9. What are six common system resources? What purpose does each one serve and where are they located?






10. What two methods can be used to hide items from the Finder?






11. What 3 types of resource contention issues can occur when fast user switching is enabled?






12. What are the primary differences between local - network - and mobile accounts?






13. How can you limit a user account?






14. 6 volumes supported by OS X






15. What items are not loaded when Mac OS X safe boots?






16. What is target disk mode and how is it engaged?






17. How can you identify which apps are installed on a Mac?






18. What are the device classes used by Mac OS X to categorize peripherals? What are some examples of each class?






19. What are the four erase options in disk utility?


20. Which two commands can read text files?






21. How is the DOmain Name Service used to facilitate network naming?






22. What steps should you take when troubleshooting app issues?






23. How do kerberos and keychain system differ for managing authentication services?






24. How do you share printers with other Mac and Windows users?


25. How do Mac OS X computers acquire and use link-local TCP/IP addresses?


26. What are the differences between ZIP archives and Disk Images?






27. What are PPD files responsible for?






28. What role does system launchd play in the system start-up?






29. What are four common issues that can interrupt network services on a Mac OS X computer?






30. How can you identify the MAC Addresses for all of the Mac's network interfaces?






31. How does the Finder's secure empty trash work?






32. Where are preferences stored? What format is generally used?






33. Min hardware requirements for 10.6






34. What are some known issues that arise when connecting to network file services?






35. How do you identify ownership and permissions of a file or folder in the Finder? In the command line?






36. Difference between disk drives - partition - and volume


37. Why is the root of a user's home folder visible to others?






38. What are the four default top-level folders available in the Finder?






39. How does file-fault secure a user's data?






40. What are the primary system initialization stages and user environment stages in Mac OS X and what order do they start?






41. How do you further resolve and issue that disappears when the Mac successfully safe-boots?






42. What role does loginwindow serve in system start-up?






43. How does resetting the master filevault password affect existing filevault user accounts?






44. What is the purpose of IP addresses and subnet masks? What is their format?






45. What are five common directory services and authentication services troubleshooting techniques?






46. How do you provide Mac OS X file sharing services so that other computers can access them?


47. What are the three primary steps for setting up bootcamp?






48. Default 9 home folder folders?






49. What are they advantages of code-signing?






50. What are three common authentication methods?