SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
ACSP: Apple Certified Support Professional Os X Support
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
apple
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How do you provide Mac OS X web-sharing services?
Applications - Library - System - Users
Launch Services maintains a database of associated file types and applications.
Admins have access to any locally-connected volume whereas standard users can only access their home folders and other user's Public folders.
Enable Web Sharing in System Preferences
2. What does iSync do?
Internet traffic goes through the primary interface.
Enable Web Sharing in System Preferences
Don't erase data - zero out the data - 7-pass erase - 35-pass erase
iSync allows you to sync personal info between Mac OS X apps and peripherals like Palm PDAs - and Bluetooth enabled cell phones.
3. What are five common directory services and authentication services troubleshooting techniques?
This will not change the keychain. They can either unlock the keychain with the old password to sync them - or create a new keychain.
Finder shows only 4 different permissions options: read/write - read-only - write-only - and no access. Terminal can show you any possible combination.
1.) Try another account 2.) Reset the account password 3.) Verify directory service connectivity 4) Verify kerberos authentication & config 5.) Check directory service log files
They're stored at the root of every volume in a /.Spotlight-V100 folder. A fileVault user's database is stored in his vault in his home user. Mail is in ~/Library/Mail/Mail Envelope. Spotlight plugins can be in any library folder in a folder called S
4. Which two commands can read text files?
Finder shows only 4 different permissions options: read/write - read-only - write-only - and no access. Terminal can show you any possible combination.
cat - less
Hold down T on boot - allows the mac to be turned into a very large - and expensive - external hard drive or disc drive.
It has to copy the entire thing over again on each change.
5. What are the three primary steps for setting up bootcamp?
Launch daemons and startup items are launched during system initialization by the system launchd process on behalf of root. Launch agents and login items are opened during the initialization of the GUI environment by the user's launchd process.
Run the assistant - install windows - install drivers.
HFS+ (Mac OS X Extended Journaled - Mac OS X Extended Case Sensitive Journaled - Mac OS X Extended) - HFS - UFS - FAT32 - NTFS - UDF
computer hostname - working directory - user account
6. How do kerberos and keychain system differ for managing authentication services?
Kerberos can only be used to authenticate against kerberized services and is often managed on a network-wide scale.
Users' public folders
Finder shows only 4 different permissions options: read/write - read-only - write-only - and no access. Terminal can show you any possible combination.
PostScript Printer Description (PPD) files are printer driver files that instruct the CUPS system on how to communicate with specific printer models.
7. What are five application environments supported by Mac OS X and what are they used for?
Disconnected cable - nonfunctioning port - DHCP issue - DNS issue
Cocoa - Carbon - BSD (CLI) - X11 - Java (Cocoa is native - Carbon is based on OS 9 but still provides OS X performance - X11 is a unix windowing environment)
Devices providing network services broadcast their existence and Mac OS X picks up on these broadcasts and provides a list of services.
System Profiler
8. What 3 types of resource contention issues can occur when fast user switching is enabled?
May cause data corruption
IP addresses identify the location of a specific network device. Subnet masks are used by network devices to identify their local network range. IPv4 addresses are a 32-bit number represented in 4 groups of four octets separated by periods. 0-255.
Resource contention general - an item another user has running. Document contention for document another user has open. Peripheral contention for peripheral in use by another user. Application contention for when an app is designed to be open only on
It enacts itself any time an App crashes or hangs indefinitely. It send an error report and any comments to Apple.
9. What are the device classes used by Mac OS X to categorize peripherals? What are some examples of each class?
Local accounts are just for that Mac - network accounts are available anywhere on the network - and Mobile accounts create a cached local copy of a network account for offline access.
A driver is a piece of software designed to facilitate the communication between Mac OS X and the peripheral. There are kernel extensions - framework plug-ins - or stand-alone applications.
human input devices (HIDs) like keyboards and mice - storage devices like hard drives - printers - scanners - digital cameras - video devices including both input and output - and audio devices.
Review network preferences - review network utility preferences - and attempt to connect to different network services
10. What is the safe boot keyboard combo?
More options than GUI - bypass finder restrictions - root access - remote ssh is invisible to users - automation easy with scripting - easy combining with ARD
Admins have access to any locally-connected volume whereas standard users can only access their home folders and other user's Public folders.
Hold down shift on startup
Review network preferences - review network utility preferences - and attempt to connect to different network services
11. What are seven common types of resources Mac OS X can access from a directory service?
User accounts - user groups - computer accounts - computer groups - network file mounts - management settings - and collaboration information.
Nothing.
It enacts itself any time an App crashes or hangs indefinitely. It send an error report and any comments to Apple.
Any Mac OS X Extended volume including volumes from disk images stored on an AFP share on OS X Server.
12. How does Mac OS X use dynamic network discovery protocols to access network services?
Devices providing network services broadcast their existence and Mac OS X picks up on these broadcasts and provides a list of services.
Single partition drives are easier to setup initially - but aren't as flexible for admin/maintenance. Multiple can segregate data
based on the user's current location
This will not change the keychain. They can either unlock the keychain with the old password to sync them - or create a new keychain.
13. How do you further resolve and issue that disappears when the Mac successfully safe-boots?
The firmware initializes the Mac's hardware and and locates the booter file on the system volume. The Power-On Self Test (POST) checks for basic hardware functionality.
Find the third-party resource causing the problem. Start in verbose mode and see where the startup fails.
Parental controls
Common UNIX Printing System (CUPS) manages all printing and faxing for the system.
14. Four methods to access CLI
Users don't traditionally need access to them - and if they do - they can use Terminal.
The status indicator lights - Green - yellow - red.
/System/Library/LaunchDaemons - /Library/LaunchDaemons - /Library/StartupItems - /etc/rc.local (maybe)
Terminal - Single User Mode - >Console from login window - SSH
15. What is the purpose of IP addresses and subnet masks? What is their format?
IP addresses identify the location of a specific network device. Subnet masks are used by network devices to identify their local network range. IPv4 addresses are a 32-bit number represented in 4 groups of four octets separated by periods. 0-255.
Users' passwords must be stored in a special format - which is less secure - and must be explicitly enabled.
human input devices (HIDs) like keyboards and mice - storage devices like hard drives - printers - scanners - digital cameras - video devices including both input and output - and audio devices.
It starts with a full copy of the system and then it records any changes made to the system and only copies those changes. It creates a simulation of the entire system using hard links for files that didn't change.
16. Default install packages
Disconnected cable - nonfunctioning port - DHCP issue - DNS issue
Run PPC based apps on newer Intel macs. It does not support pre-OS X apps - the Classic environment - PPC screen-savers - PPC preference panes - G5 specific apps - PPC kernel extensions - some Java apps
Core system files - fonts - X11 - nearby & local printers - language translations
Parental controls
17. How do you use disk utility to burn an optical disk?
Drag the disk image into disk utility and press burn
Run the assistant - install windows - install drivers.
Find the third-party resource causing the problem. Start in verbose mode and see where the startup fails.
The Dock process starts the DashboardClient process. All widgets run inside one of the two DashboardClient processes.
18. How does resetting a user's password as an admin user affect their keychain?
This will not change the keychain. They can either unlock the keychain with the old password to sync them - or create a new keychain.
Clear-text - encrypted - Kerberos
The user's loginwindow process does the following: Request that all user applications quit - quits any user backgroun processes - runs any logout scripts - records the logout to the man system.log - resets device permissions and preferences to defaul
Find the third-party resource causing the problem. Start in verbose mode and see where the startup fails.
19. What interfaces and protocols are supported by default in in Mac OS X?
Info pane in Network Utility
Find the third-party resource causing the problem. Start in verbose mode and see where the startup fails.
A driver is a piece of software designed to facilitate the communication between Mac OS X and the peripheral. There are kernel extensions - framework plug-ins - or stand-alone applications.
Too many to list. Hehe.
20. What network services are provided by your Mac to facilitate Internet sharing? What options are available for Internet sharing your Mac's AirPort wireless Ethernet interface?
Bonjour and NetBios & WINS
Your Mac provides network routing NAT - DHCP - and DNS forwarding services for any device connected. When sharing AirPort - you can specify and SSID - channel - and WEP settings.
It stores the home folder as an encrypted sparse-bundle disk image
1 GB of RAM - 5 GB of disk space - DVD drive - display
21. 3 Main components of a typical command
command - options - arguments
Run the assistant - install windows - install drivers.
Info pane in Network Utility
A database of information that in some cases can be shared to the network. Account information is the most commonly accessed directory resource.
22. What is the relationship between clients and servers as it relates to network service access?
They're used to combine complex items into individual folders. Packages appear as a single item.
Internet traffic goes through the primary interface.
Client software is used to access services provided by a server
The status indicator lights - Green - yellow - red.
23. What is a device driver? What three primary types of device drivers are there?
It's used to verify or repair the directory structure of a volume which contains all the information used to locate files and folders on the volume.
command - options - arguments
A driver is a piece of software designed to facilitate the communication between Mac OS X and the peripheral. There are kernel extensions - framework plug-ins - or stand-alone applications.
1.) Create a plain text file w/ the 2.) Make the first line #!/bin/bash 3.) Change the permissions to allow execution
24. How can you identify which apps are installed on a Mac?
Find the third-party resource causing the problem. Start in verbose mode and see where the startup fails.
They're used to combine complex items into individual folders. Packages appear as a single item.
System Profiler
human input devices (HIDs) like keyboards and mice - storage devices like hard drives - printers - scanners - digital cameras - video devices including both input and output - and audio devices.
25. What shared items are accessible to any user who connects via FTP?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
26. What 4 methods can be used to eject a volume from the finder?
Press the eject button - file>>eject - drag to trash - press eject in the sidebar
It will allow any user to search any attached non-system volume if ownership is ignored.
It records what file operations are in progress at any given moment. If a power failure or system crash occurs - it can verify the integrity by replaying the journal.
This ignores any ownership rules and will grant any logged-on user unlimited access to the contents of the volume.
27. What functionality does 10.6 support with AppleTalk?
Every home folder has the public folder and dropbox folder whereas all other home folders are protected.
Nothing.
It enacts itself any time an App crashes or hangs indefinitely. It send an error report and any comments to Apple.
Press the eject button - file>>eject - drag to trash - press eject in the sidebar
28. What are the four erase options in disk utility?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
29. Best command to list items in a folder?
Kerberos can only be used to authenticate against kerberized services and is often managed on a network-wide scale.
Standard - Admin - Guest - Sharing-Only - Root
Zip files are created with the Finder and are compatible with many OSes. Good for small files & small number of items. Disk Images are created in disk utility.
ls
30. What two dynamic network service discovery protocols are supported by Mac OS X?
Bonjour and NetBios & WINS
This will not change the keychain. They can either unlock the keychain with the old password to sync them - or create a new keychain.
Using information provided by the dynamic network services discovery protocols. Computers providing services appear as resources whereas service discovery zones or workgroups appear as folders.
Users' public folders
31. In the network preferences - how can you tell which interface is currently being used for network activities?
They're used to combine complex items into individual folders. Packages appear as a single item.
The status indicator lights - Green - yellow - red.
Temp files - spotlight indexes - items in the trash - and any files defined as exempt either by you or by an application.
Code signed items include a digital signature that the system can use to verify the authenticity and integrity of the application or process and its resources.
32. What backup destinations does Time Machine support?
Check for firmware updates - verify app compatibility - back up files - document critical settings
Info pane in Network Utility
Kerberos tickets are used to validate an account's identity. Kerberos uses ticket-granting-tickets and service tickets. KDC = key distribution center.
Any Mac OS X Extended volume including volumes from disk images stored on an AFP share on OS X Server.
33. How does Time Machine maintain a backup history of the system?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
34. 6 Reasons to use the CLI
User preferences are in ~/Library and the format is often Property List - which is just a special XML file.
Absolute always start at the root of the filesystem - whereas relative paths start where the user is current at
cp - mv - rm
More options than GUI - bypass finder restrictions - root access - remote ssh is invisible to users - automation easy with scripting - easy combining with ARD
35. How can you force quit an app from the GUI?
Apple Menu>> Force Quit - Activity Monitor - Dock contextual menu
Access is based on the local filesystem. They'll start in their home folder but can traverse anywhere they have permission to do so.
Applications - Library - System - Users
A driver is a piece of software designed to facilitate the communication between Mac OS X and the peripheral. There are kernel extensions - framework plug-ins - or stand-alone applications.
36. Security risks & account types
Defines the directions to a specific item in the filesystem
It addresses the outgoing packets based on the destination device's MAC address
Root has unlimited access - Admin can change system files & settings - guest can dump tons of files
The computer's website files are located in /Library/WebServer/Documents and each users' is inside ~/Sites
37. How does the system determine what app to use to open a file?
Launch Services maintains a database of associated file types and applications.
System Profiler
It has to copy the entire thing over again on each change.
Locally connected volumes are fully accessible to any logged in user.
38. What happens during system shutdown?
It addresses the outgoing packets based on the destination device's MAC address
Hold down T on boot - allows the mac to be turned into a very large - and expensive - external hard drive or disc drive.
Too many to list. Hehe.
The loginwindow process logs all users out and then tells the kernel to quit all remaining system processes.
39. What are four common issues that can interrupt network services on a Mac OS X computer?
Check for firmware updates - verify app compatibility - back up files - document critical settings
human input devices (HIDs) like keyboards and mice - storage devices like hard drives - printers - scanners - digital cameras - video devices including both input and output - and audio devices.
The network service operates or broadcasts on a network port.
Disconnected cable - nonfunctioning port - DHCP issue - DNS issue
40. What is target disk mode and how is it engaged?
Absolute always start at the root of the filesystem - whereas relative paths start where the user is current at
command - options - arguments
Hold down T on boot - allows the mac to be turned into a very large - and expensive - external hard drive or disc drive.
Option key - Startup Disk preference pane in OS X - or the BootCamp utility in Windows.
41. What three methods can be used to select the start-up disk?
Don't erase data - zero out the data - 7-pass erase - 35-pass erase
Option key - Startup Disk preference pane in OS X - or the BootCamp utility in Windows.
Hold down shift on startup
Review network preferences - review network utility preferences - and attempt to connect to different network services
42. Utilities available from OS X install DVD
Any Mac OS X Extended volume including volumes from disk images stored on an AFP share on OS X Server.
System Profiler - Disk Utility - Reset Password Utility - Firmware Password - Restore from Time Machine Backup - Startup Disk - Terminal - Network Utility
Zip files are created with the Finder and are compatible with many OSes. Good for small files & small number of items. Disk Images are created in disk utility.
The system keeps applications from interfering with one another by segregating their memory using protected memory. 64 bit memory addressing allows apps to directly access more than 4 GB of ram.
43. How does resetting the master filevault password affect existing filevault user accounts?
Intel - directly attached input devices - 10.5 or later - all new firmware updates - 10.5 or greater install disc - 10 gigs of free space - 2 GB or more of RAM
Using information provided by the dynamic network services discovery protocols. Computers providing services appear as resources whereas service discovery zones or workgroups appear as folders.
If a known master password is reset - existing accounts are not negatively affected. If the master is reset because it was lost - however - preexisting accounts cannot be reset by the new password until the old FileVault passwords are reset.
They're used to combine complex items into individual folders. Packages appear as a single item.
44. What is authentication and authorization?
Authentication is who am I?Authorization is what can I do?
The loginwindow process logs all users out and then tells the kernel to quit all remaining system processes.
Single partition drives are easier to setup initially - but aren't as flexible for admin/maintenance. Multiple can segregate data
This ignores any ownership rules and will grant any logged-on user unlimited access to the contents of the volume.
45. Account attributes
Individual pieces of information used to define a user such as user ID - UUID - home directory - etc.
Too many to list. Hehe.
Universal Access - items for the seeing or hearing impaired - keyboard and mouse difficulties - and are stored in ~/Library/Preferences
The status indicator lights - Green - yellow - red.
46. What is a directory as it relates to directory services?
Users don't traditionally need access to them - and if they do - they can use Terminal.
A database of information that in some cases can be shared to the network. Account information is the most commonly accessed directory resource.
System launchd is responsible for starting every single system process. It manages system initialization and launches loginwindow.
human input devices (HIDs) like keyboards and mice - storage devices like hard drives - printers - scanners - digital cameras - video devices including both input and output - and audio devices.
47. How does network service order affect network connectivity?
1.) Try another account 2.) Reset the account password 3.) Verify directory service connectivity 4) Verify kerberos authentication & config 5.) Check directory service log files
Get Info from Finder or System Profiler
It does a 7-pass erase.
Internet traffic goes through the primary interface.
48. Different between absolute and relative path
Absolute always start at the root of the filesystem - whereas relative paths start where the user is current at
Every home folder has the public folder and dropbox folder whereas all other home folders are protected.
Hold down shift on startup
RAID 0 uses striping to increase performance. RAID 1 uses disk mirroring.
49. What is the relationship between a network service and a network port?
Users' passwords must be stored in a special format - which is less secure - and must be explicitly enabled.
This ignores any ownership rules and will grant any logged-on user unlimited access to the contents of the volume.
Local - BSD Flat File and NIS - LDAPv3 - AD
The network service operates or broadcasts on a network port.
50. What are the primary differences between local - network - and mobile accounts?
Press the eject button - file>>eject - drag to trash - press eject in the sidebar
Local accounts are just for that Mac - network accounts are available anywhere on the network - and Mobile accounts create a cached local copy of a network account for offline access.
cp - mv - rm
command - options - arguments
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests