SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
ACSP: Apple Certified Support Professional Os X Support
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
apple
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Why does the Finder hider certain folders at the root of the system volume?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
2. Account attributes
Review network preferences - review network utility preferences - and attempt to connect to different network services
Too many to list. Hehe.
HFS+ (Mac OS X Extended Journaled - Mac OS X Extended Case Sensitive Journaled - Mac OS X Extended) - HFS - UFS - FAT32 - NTFS - UDF
Individual pieces of information used to define a user such as user ID - UUID - home directory - etc.
3. What is the difference between launch daemons - startup items - launch agents - and login items?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
4. What are some security concerns with spotlight?
It will allow any user to search any attached non-system volume if ownership is ignored.
Zip files are created with the Finder and are compatible with many OSes. Good for small files & small number of items. Disk Images are created in disk utility.
Local accounts are just for that Mac - network accounts are available anywhere on the network - and Mobile accounts create a cached local copy of a network account for offline access.
The Dock process starts the DashboardClient process. All widgets run inside one of the two DashboardClient processes.
5. What are the four erase options in disk utility?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
6. What does CUPS do?
They're used to combine complex items into individual folders. Packages appear as a single item.
About this mac or system profiler. System is general release number - build is specific - and serial number represents the machine.
Get Info from Finder or System Profiler
Common UNIX Printing System (CUPS) manages all printing and faxing for the system.
7. What does a keychain do?
PostScript Printer Description (PPD) files are printer driver files that instruct the CUPS system on how to communicate with specific printer models.
Set the mac's network identification - enable the desired service - define access.System preferences >> Sharing
based on the user's current location
Securely stores passwords - form-fills - etc.
8. What five network file services can you connect to from the Finder's Connect To Server dialog?
AFP - SMB - FTP - NFS - WebDAV
Forked files may cause issues for NFS and WebDAV. Also avoid AFP 2 on Windows file servers.
The status indicator lights - Green - yellow - red.
Standard - Admin - Guest - Sharing-Only - Root
9. 3 Default items in CLI prompt
Client software is used to access services provided by a server
File>>Create Burn Folder and drag items in then press burn. OR Insert blank media and choose new Burn Folder
computer hostname - working directory - user account
They're used to combine complex items into individual folders. Packages appear as a single item.
10. What is authentication and authorization?
Launch Services maintains a database of associated file types and applications.
Enable Web Sharing in System Preferences
Authentication is who am I?Authorization is what can I do?
Local accounts are just for that Mac - network accounts are available anywhere on the network - and Mobile accounts create a cached local copy of a network account for offline access.
11. How does the Finder's secure empty trash work?
About this mac or system profiler. System is general release number - build is specific - and serial number represents the machine.
Don't erase data - zero out the data - 7-pass erase - 35-pass erase
It does a 7-pass erase.
Common UNIX Printing System (CUPS) manages all printing and faxing for the system.
12. Which two commands can read text files?
The network service operates or broadcasts on a network port.
cat - less
IP addresses identify the location of a specific network device. Subnet masks are used by network devices to identify their local network range. IPv4 addresses are a 32-bit number represented in 4 groups of four octets separated by periods. 0-255.
Code signed items include a digital signature that the system can use to verify the authenticity and integrity of the application or process and its resources.
13. What client-sharing services can Mac OS X provide?
Run the assistant - install windows - install drivers.
Launch daemons and startup items are launched during system initialization by the system launchd process on behalf of root. Launch agents and login items are opened during the initialization of the GUI environment by the user's launchd process.
Screen sharing - remote login - remote management - remote apple events - and Xgrid sharing
Info pane in Network Utility
14. What is Rosetta and what types of items are not supported by Rosetta?
Prevents users from using the reset password utility on the os x install dvd because they cannot boot from it.
Print and Fax or Sharing Preferences. For windows users - you must enable users' password in the SMB file sharing settings in Sharing Preferences.
Forked files may cause issues for NFS and WebDAV. Also avoid AFP 2 on Windows file servers.
Run PPC based apps on newer Intel macs. It does not support pre-OS X apps - the Classic environment - PPC screen-savers - PPC preference panes - G5 specific apps - PPC kernel extensions - some Java apps
15. Folder/directories
User accounts - user groups - computer accounts - computer groups - network file mounts - management settings - and collaboration information.
Describe containers in the file system
extensions - tied to the kernel to provide hardware support - frameworks - shared code libraries - fonts - preference files - configuration info - Launch Agents and Launch Daemons - used by launchd to provide auto-starting services - logs - contain d
Get Info from Finder or System Profiler
16. Advantages/disadvantages of single/multiple partition drives in OS X
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
17. How does network service order affect network connectivity?
Hold down T on boot - allows the mac to be turned into a very large - and expensive - external hard drive or disc drive.
Internet traffic goes through the primary interface.
It will not load any third party KEXTs - third-party LaunchAgents - LaunchDaemons - StartupItems - fonts - any user login items - or any user specific LaunchAgents.
firmware - startup chim or bright flash of power-on light and light gray screen booter - dark gray apple logo on primary display kernel - small gray spinning gear system launchd - bright blue screen
18. Five types of accounts in 10.6
Local accounts are just for that Mac - network accounts are available anywhere on the network - and Mobile accounts create a cached local copy of a network account for offline access.
Access is based on the local filesystem. They'll start in their home folder but can traverse anywhere they have permission to do so.
System Profiler - Disk Utility - Reset Password Utility - Firmware Password - Restore from Time Machine Backup - Startup Disk - Terminal - Network Utility
Standard - Admin - Guest - Sharing-Only - Root
19. Default 9 home folder folders?
The firmware initializes the Mac's hardware and and locates the booter file on the system volume. The Power-On Self Test (POST) checks for basic hardware functionality.
Kerberos tickets are used to validate an account's identity. Kerberos uses ticket-granting-tickets and service tickets. KDC = key distribution center.
Every home folder has the public folder and dropbox folder whereas all other home folders are protected.
Documents - Movies - Music - Pictures - Library - Downloads - Desktop - Public - Sites
20. What are the primary differences between local - network - and mobile accounts?
Finder shows only 4 different permissions options: read/write - read-only - write-only - and no access. Terminal can show you any possible combination.
Local accounts are just for that Mac - network accounts are available anywhere on the network - and Mobile accounts create a cached local copy of a network account for offline access.
Documents - Movies - Music - Pictures - Library - Downloads - Desktop - Public - Sites
Bonjour and NetBios & WINS
21. What is the relationship between clients and servers as it relates to network service access?
Finder get info - command line run ls -l
Client software is used to access services provided by a server
Enable Web Sharing in System Preferences
It's used to verify or repair the directory structure of a volume which contains all the information used to locate files and folders on the volume.
22. What are the primary system initialization stages and user environment stages in Mac OS X and what order do they start?
Clear-text - encrypted - Kerberos
Bonjour and NetBios & WINS
Firmware - booter - kernel - and system launchd. Primary user environment stages are loginwindow - user launchd - and user environment.
The DNS Service is used to translate host names to IP addresses via forward lookups and IP addresses to domain names via reverse lookups.
23. What is the potential side effect of improperly unmounting or ejecting a volume?
iSync allows you to sync personal info between Mac OS X apps and peripherals like Palm PDAs - and Bluetooth enabled cell phones.
May cause data corruption
1.) Create a plain text file w/ the 2.) Make the first line #!/bin/bash 3.) Change the permissions to allow execution
Resource contention general - an item another user has running. Document contention for document another user has open. Peripheral contention for peripheral in use by another user. Application contention for when an app is designed to be open only on
24. Security risk with fast user switching?
Locally connected volumes are fully accessible to any logged in user.
It records what file operations are in progress at any given moment. If a power failure or system crash occurs - it can verify the integrity by replaying the journal.
Disconnected cable - nonfunctioning port - DHCP issue - DNS issue
Finder shows only 4 different permissions options: read/write - read-only - write-only - and no access. Terminal can show you any possible combination.
25. How does the system determine what app to use to open a file?
Screen sharing - remote login - remote management - remote apple events - and Xgrid sharing
Launch Services maintains a database of associated file types and applications.
Temp files - spotlight indexes - items in the trash - and any files defined as exempt either by you or by an application.
Run the assistant - install windows - install drivers.
26. What are the device classes used by Mac OS X to categorize peripherals? What are some examples of each class?
Hold down shift on startup
Locally connected volumes are fully accessible to any logged in user.
PostScript Printer Description (PPD) files are printer driver files that instruct the CUPS system on how to communicate with specific printer models.
human input devices (HIDs) like keyboards and mice - storage devices like hard drives - printers - scanners - digital cameras - video devices including both input and output - and audio devices.
27. Default install packages
The system keeps applications from interfering with one another by segregating their memory using protected memory. 64 bit memory addressing allows apps to directly access more than 4 GB of ram.
All users can read/write - but only the creator can delete. This uses the sticky bit.
ls
Core system files - fonts - X11 - nearby & local printers - language translations
28. What are the min sys req for BootCamp?
System Profiler - Disk Utility - Reset Password Utility - Firmware Password - Restore from Time Machine Backup - Startup Disk - Terminal - Network Utility
Intel - directly attached input devices - 10.5 or later - all new firmware updates - 10.5 or greater install disc - 10 gigs of free space - 2 GB or more of RAM
Enable Web Sharing in System Preferences
Finder shows only 4 different permissions options: read/write - read-only - write-only - and no access. Terminal can show you any possible combination.
29. What network services are provided by your Mac to facilitate Internet sharing? What options are available for Internet sharing your Mac's AirPort wireless Ethernet interface?
Forked files may cause issues for NFS and WebDAV. Also avoid AFP 2 on Windows file servers.
1.) Try another account 2.) Reset the account password 3.) Verify directory service connectivity 4) Verify kerberos authentication & config 5.) Check directory service log files
Finder shows only 4 different permissions options: read/write - read-only - write-only - and no access. Terminal can show you any possible combination.
Your Mac provides network routing NAT - DHCP - and DNS forwarding services for any device connected. When sharing AirPort - you can specify and SSID - channel - and WEP settings.
30. How does the spotlight search service use metadata?
Restart the app - try another document - try another user account - check log files - delete caches - replace preferences - and replace app resources.
The spotlight search service creates index databases of file system metadata so that it can perform normally time-intensive searches nearly instantly.
Safe boot refers to when the system is starting up - safe mode is when the system is actually running - and safe login is when the system starts up the user session.
Automator is a workflow based application whereas AppleScript is an english-like scripting language
31. What is sudo used for?
ls
It starts with a full copy of the system and then it records any changes made to the system and only copies those changes. It creates a simulation of the entire system using hard links for files that didn't change.
Standard - Admin - Guest - Sharing-Only - Root
To run commands as the root user
32. What is protected memory? What is 64 bit memory addressing?
Documents - Movies - Music - Pictures - Library - Downloads - Desktop - Public - Sites
The system keeps applications from interfering with one another by segregating their memory using protected memory. 64 bit memory addressing allows apps to directly access more than 4 GB of ram.
Users don't traditionally need access to them - and if they do - they can use Terminal.
firmware - startup chim or bright flash of power-on light and light gray screen booter - dark gray apple logo on primary display kernel - small gray spinning gear system launchd - bright blue screen
33. What does the firmware do? What is the POST?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
34. Absolute path
Bonjour and NetBios & WINS
Full directions to a specific item
Users' passwords must be stored in a special format - which is less secure - and must be explicitly enabled.
The status indicator lights - Green - yellow - red.
35. How does resetting a user's password as an admin user affect their keychain?
Using information provided by the dynamic network services discovery protocols. Computers providing services appear as resources whereas service discovery zones or workgroups appear as folders.
IP addresses identify the location of a specific network device. Subnet masks are used by network devices to identify their local network range. IPv4 addresses are a 32-bit number represented in 4 groups of four octets separated by periods. 0-255.
This will not change the keychain. They can either unlock the keychain with the old password to sync them - or create a new keychain.
command - options - arguments
36. How do you provide Mac OS X file sharing services so that other computers can access them?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
37. Four methods to access CLI
Terminal - Single User Mode - >Console from login window - SSH
Individual pieces of information used to define a user such as user ID - UUID - home directory - etc.
Option key - Startup Disk preference pane in OS X - or the BootCamp utility in Windows.
Run PPC based apps on newer Intel macs. It does not support pre-OS X apps - the Classic environment - PPC screen-savers - PPC preference panes - G5 specific apps - PPC kernel extensions - some Java apps
38. What are some common file flags and extended attributes used by Mac OS X?
Common flags include locked and hidden - Common extended attributes include an items color - spotlight comments - etc.
Info pane in Network Utility
User accounts - user groups - computer accounts - computer groups - network file mounts - management settings - and collaboration information.
Option key - Startup Disk preference pane in OS X - or the BootCamp utility in Windows.
39. How are the permissions on the shared folder set to allow local user sharing?
All users can read/write - but only the creator can delete. This uses the sticky bit.
System Profiler - Disk Utility - Reset Password Utility - Firmware Password - Restore from Time Machine Backup - Startup Disk - Terminal - Network Utility
The network service operates or broadcasts on a network port.
This will not change the keychain. They can either unlock the keychain with the old password to sync them - or create a new keychain.
40. How does the default organization of the filesystem allow users to safely share local files and folder?
It starts with a full copy of the system and then it records any changes made to the system and only copies those changes. It creates a simulation of the entire system using hard links for files that didn't change.
Every home folder has the public folder and dropbox folder whereas all other home folders are protected.
They're used to combine complex items into individual folders. Packages appear as a single item.
cp - mv - rm
41. What four Directory Service types can used in Mac OS X?
It will allow any user to search any attached non-system volume if ownership is ignored.
Local - BSD Flat File and NIS - LDAPv3 - AD
Kerberos tickets are used to validate an account's identity. Kerberos uses ticket-granting-tickets and service tickets. KDC = key distribution center.
firmware - startup chim or bright flash of power-on light and light gray screen booter - dark gray apple logo on primary display kernel - small gray spinning gear system launchd - bright blue screen
42. How do kerberos and keychain system differ for managing authentication services?
If a known master password is reset - existing accounts are not negatively affected. If the master is reset because it was lost - however - preexisting accounts cannot be reset by the new password until the old FileVault passwords are reset.
Find the third-party resource causing the problem. Start in verbose mode and see where the startup fails.
Hold down T on boot - allows the mac to be turned into a very large - and expensive - external hard drive or disc drive.
Kerberos can only be used to authenticate against kerberized services and is often managed on a network-wide scale.
43. What 4 methods can be used to eject a volume from the finder?
It starts with a full copy of the system and then it records any changes made to the system and only copies those changes. It creates a simulation of the entire system using hard links for files that didn't change.
To run commands as the root user
Press the eject button - file>>eject - drag to trash - press eject in the sidebar
All users can read/write - but only the creator can delete. This uses the sticky bit.
44. How does Time Machine maintain a backup history of the system?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
45. What are four common issues that can interrupt network services on a Mac OS X computer?
Run the assistant - install windows - install drivers.
Disconnected cable - nonfunctioning port - DHCP issue - DNS issue
Restart the app - try another document - try another user account - check log files - delete caches - replace preferences - and replace app resources.
If the backup volume became full and removed the older item(s).
46. What three methods can be used to select the start-up disk?
It's used to verify or repair the directory structure of a volume which contains all the information used to locate files and folders on the volume.
1 GB of RAM - 5 GB of disk space - DVD drive - display
Your Mac provides network routing NAT - DHCP - and DNS forwarding services for any device connected. When sharing AirPort - you can specify and SSID - channel - and WEP settings.
Option key - Startup Disk preference pane in OS X - or the BootCamp utility in Windows.
47. What is the safe boot keyboard combo?
Universal Access - items for the seeing or hearing impaired - keyboard and mouse difficulties - and are stored in ~/Library/Preferences
It will not load any third party KEXTs - third-party LaunchAgents - LaunchDaemons - StartupItems - fonts - any user login items - or any user specific LaunchAgents.
A driver is a piece of software designed to facilitate the communication between Mac OS X and the peripheral. There are kernel extensions - framework plug-ins - or stand-alone applications.
Hold down shift on startup
48. What are three common troubleshooting techniques for issues involving failure to connect to network services?
Clear-text - encrypted - Kerberos
Option key - Startup Disk preference pane in OS X - or the BootCamp utility in Windows.
Root has unlimited access - Admin can change system files & settings - guest can dump tons of files
Review network preferences - review network utility preferences - and attempt to connect to different network services
49. How do you share printers with other Mac and Windows users?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
50. How do you use disk utility to burn an optical disk?
Drag the disk image into disk utility and press burn
The system keeps applications from interfering with one another by segregating their memory using protected memory. 64 bit memory addressing allows apps to directly access more than 4 GB of ram.
Core system files - fonts - X11 - nearby & local printers - language translations
Safe boot refers to when the system is starting up - safe mode is when the system is actually running - and safe login is when the system starts up the user session.