SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
ACSP: Apple Certified Support Professional Os X Support
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
apple
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How can you limit a user account?
It starts with a full copy of the system and then it records any changes made to the system and only copies those changes. It creates a simulation of the entire system using hard links for files that didn't change.
Documents - Movies - Music - Pictures - Library - Downloads - Desktop - Public - Sites
It enacts itself any time an App crashes or hangs indefinitely. It send an error report and any comments to Apple.
Parental controls
2. Account attributes
Individual pieces of information used to define a user such as user ID - UUID - home directory - etc.
Info pane in Network Utility
Kerberos can only be used to authenticate against kerberized services and is often managed on a network-wide scale.
Root has unlimited access - Admin can change system files & settings - guest can dump tons of files
3. What is the purpose of IP addresses and subnet masks? What is their format?
IP addresses identify the location of a specific network device. Subnet masks are used by network devices to identify their local network range. IPv4 addresses are a 32-bit number represented in 4 groups of four octets separated by periods. 0-255.
This ignores any ownership rules and will grant any logged-on user unlimited access to the contents of the volume.
Review network preferences - review network utility preferences - and attempt to connect to different network services
Local accounts are just for that Mac - network accounts are available anywhere on the network - and Mobile accounts create a cached local copy of a network account for offline access.
4. Where are preferences stored? What format is generally used?
User preferences are in ~/Library and the format is often Property List - which is just a special XML file.
Press the eject button - file>>eject - drag to trash - press eject in the sidebar
Start the name with a . - or enable the hidden file flag.
Launch daemons and startup items are launched during system initialization by the system launchd process on behalf of root. Launch agents and login items are opened during the initialization of the GUI environment by the user's launchd process.
5. What items are not loaded when Mac OS X safe boots?
Launch Services maintains a database of associated file types and applications.
Full directions to a specific item
It will not load any third party KEXTs - third-party LaunchAgents - LaunchDaemons - StartupItems - fonts - any user login items - or any user specific LaunchAgents.
cp - mv - rm
6. How do you provide Mac OS X file sharing services so that other computers can access them?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
7. What are the min sys req for BootCamp?
ls
This ignores any ownership rules and will grant any logged-on user unlimited access to the contents of the volume.
Intel - directly attached input devices - 10.5 or later - all new firmware updates - 10.5 or greater install disc - 10 gigs of free space - 2 GB or more of RAM
Hold down T on boot - allows the mac to be turned into a very large - and expensive - external hard drive or disc drive.
8. Where does spotlight store its metadata index databases? How about the plugins?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
9. How do you use disk utility to burn an optical disk?
ls
Documents - Movies - Music - Pictures - Library - Downloads - Desktop - Public - Sites
Drag the disk image into disk utility and press burn
It will allow any user to search any attached non-system volume if ownership is ignored.
10. How does Boot Camp work?
computer hostname - working directory - user account
The computer's website files are located in /Library/WebServer/Documents and each users' is inside ~/Sites
It allows Windows XP SP2+ - Vista - and 7 to run natively on the Mac by running a separate partition.
Access is based on the local filesystem. They'll start in their home folder but can traverse anywhere they have permission to do so.
11. How are items inside the Finder's Network folder populated?
Documents - Movies - Music - Pictures - Library - Downloads - Desktop - Public - Sites
So they can navigate to the public or sites folder
A database of information that in some cases can be shared to the network. Account information is the most commonly accessed directory resource.
Using information provided by the dynamic network services discovery protocols. Computers providing services appear as resources whereas service discovery zones or workgroups appear as folders.
12. What functionality does 10.6 support with AppleTalk?
Disk drive is the hardware itself - partitions are logical divisions of a drive's storage - and volumes are stored inside partitions and define how data is stored to the storage
Screen sharing - remote login - remote management - remote apple events - and Xgrid sharing
Kerberos tickets are used to validate an account's identity. Kerberos uses ticket-granting-tickets and service tickets. KDC = key distribution center.
Nothing.
13. How does the IP transfer messages between computers on a WAN?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
14. What is authentication and authorization?
/System/Library/LaunchDaemons - /Library/LaunchDaemons - /Library/StartupItems - /etc/rc.local (maybe)
Authentication is who am I?Authorization is what can I do?
Option key - Startup Disk preference pane in OS X - or the BootCamp utility in Windows.
Safe boot refers to when the system is starting up - safe mode is when the system is actually running - and safe login is when the system starts up the user session.
15. How does resetting a user's password as an admin user affect their keychain?
Your Mac provides network routing NAT - DHCP - and DNS forwarding services for any device connected. When sharing AirPort - you can specify and SSID - channel - and WEP settings.
It's used to verify or repair the directory structure of a volume which contains all the information used to locate files and folders on the volume.
This will not change the keychain. They can either unlock the keychain with the old password to sync them - or create a new keychain.
The status indicator lights - Green - yellow - red.
16. What are the four erase options in disk utility?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
17. What are the primary differences between local - network - and mobile accounts?
human input devices (HIDs) like keyboards and mice - storage devices like hard drives - printers - scanners - digital cameras - video devices including both input and output - and audio devices.
Local accounts are just for that Mac - network accounts are available anywhere on the network - and Mobile accounts create a cached local copy of a network account for offline access.
Internet traffic goes through the primary interface.
It addresses the outgoing packets based on the destination device's MAC address
18. What do the terms interface - protocol - and service mean in relation to computer networks?
Interface is any channel through which networks data can flow. Hardware network interfaces are defined by physical network connections - while virtual network connections are logical network connections on top of hardware connections. Protocol is a s
The client uses the subnet mask to decide if the client is on the LAN. If it's not on the LAN - then it sends the data to the IP address of the local router. Traffic continues through routers until it reaches the destination.
All users can read/write - but only the creator can delete. This uses the sticky bit.
Enable Web Sharing in System Preferences
19. Relative path
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
20. Advantages/disadvantages of single/multiple partition drives in OS X
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
21. What does 'ignore volume ownership' do in the Finder?
Disk drive is the hardware itself - partitions are logical divisions of a drive's storage - and volumes are stored inside partitions and define how data is stored to the storage
This ignores any ownership rules and will grant any logged-on user unlimited access to the contents of the volume.
Documents - Movies - Music - Pictures - Library - Downloads - Desktop - Public - Sites
Admins have access to any locally-connected volume whereas standard users can only access their home folders and other user's Public folders.
22. How can you force quit an app from the GUI?
It's used to verify or repair the directory structure of a volume which contains all the information used to locate files and folders on the volume.
Nothing.
User accounts - user groups - computer accounts - computer groups - network file mounts - management settings - and collaboration information.
Apple Menu>> Force Quit - Activity Monitor - Dock contextual menu
23. 3 Default items in CLI prompt
computer hostname - working directory - user account
It will not load any third party KEXTs - third-party LaunchAgents - LaunchDaemons - StartupItems - fonts - any user login items - or any user specific LaunchAgents.
This will not change the keychain. They can either unlock the keychain with the old password to sync them - or create a new keychain.
Launch daemons and startup items are launched during system initialization by the system launchd process on behalf of root. Launch agents and login items are opened during the initialization of the GUI environment by the user's launchd process.
24. Why might a previously backed-up item no longer be available in Time Machine?
Hold down T on boot - allows the mac to be turned into a very large - and expensive - external hard drive or disc drive.
Intel - directly attached input devices - 10.5 or later - all new firmware updates - 10.5 or greater install disc - 10 gigs of free space - 2 GB or more of RAM
If the backup volume became full and removed the older item(s).
Parental controls
25. What are the device classes used by Mac OS X to categorize peripherals? What are some examples of each class?
Launch daemons and startup items are launched during system initialization by the system launchd process on behalf of root. Launch agents and login items are opened during the initialization of the GUI environment by the user's launchd process.
human input devices (HIDs) like keyboards and mice - storage devices like hard drives - printers - scanners - digital cameras - video devices including both input and output - and audio devices.
Devices providing network services broadcast their existence and Mac OS X picks up on these broadcasts and provides a list of services.
cat - less
26. How do Mac OS X computers acquire and use link-local TCP/IP addresses?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
27. How can you identify the type of a particular application?
Get Info from Finder or System Profiler
User accounts - user groups - computer accounts - computer groups - network file mounts - management settings - and collaboration information.
Finder get info - command line run ls -l
AFP - SMB - FTP - NFS - WebDAV
28. Four methods to access CLI
Terminal - Single User Mode - >Console from login window - SSH
Every home folder has the public folder and dropbox folder whereas all other home folders are protected.
Don't erase data - zero out the data - 7-pass erase - 35-pass erase
A database of information that in some cases can be shared to the network. Account information is the most commonly accessed directory resource.
29. What client-sharing services can Mac OS X provide?
cat - less
All users can read/write - but only the creator can delete. This uses the sticky bit.
Option key - Startup Disk preference pane in OS X - or the BootCamp utility in Windows.
Screen sharing - remote login - remote management - remote apple events - and Xgrid sharing
30. What happens during user log-out?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
31. What role does system launchd play in the system start-up?
System launchd is responsible for starting every single system process. It manages system initialization and launches loginwindow.
It enacts itself any time an App crashes or hangs indefinitely. It send an error report and any comments to Apple.
Core system files - fonts - X11 - nearby & local printers - language translations
Local accounts are just for that Mac - network accounts are available anywhere on the network - and Mobile accounts create a cached local copy of a network account for offline access.
32. Default install packages
Core system files - fonts - X11 - nearby & local printers - language translations
They're used to combine complex items into individual folders. Packages appear as a single item.
Set the mac's network identification - enable the desired service - define access.System preferences >> Sharing
Access is based on the local filesystem. They'll start in their home folder but can traverse anywhere they have permission to do so.
33. How do you provide Mac OS X web-sharing services?
cat - less
Enable Web Sharing in System Preferences
It's used to verify or repair the directory structure of a volume which contains all the information used to locate files and folders on the volume.
Access is based on the local filesystem. They'll start in their home folder but can traverse anywhere they have permission to do so.
34. 3 Main components of a typical command
Interface is any channel through which networks data can flow. Hardware network interfaces are defined by physical network connections - while virtual network connections are logical network connections on top of hardware connections. Protocol is a s
GUID partition table for intel-based macs - Apple-Partition-Map for PPC macs
Launch daemons and startup items are launched during system initialization by the system launchd process on behalf of root. Launch agents and login items are opened during the initialization of the GUI environment by the user's launchd process.
command - options - arguments
35. What is Rosetta and what types of items are not supported by Rosetta?
Every home folder has the public folder and dropbox folder whereas all other home folders are protected.
/System/Library/LaunchDaemons - /Library/LaunchDaemons - /Library/StartupItems - /etc/rc.local (maybe)
Run PPC based apps on newer Intel macs. It does not support pre-OS X apps - the Classic environment - PPC screen-savers - PPC preference panes - G5 specific apps - PPC kernel extensions - some Java apps
Option key - Startup Disk preference pane in OS X - or the BootCamp utility in Windows.
36. How does file-fault secure a user's data?
Screen sharing - remote login - remote management - remote apple events - and Xgrid sharing
It stores the home folder as an encrypted sparse-bundle disk image
Hold down shift on startup
Restart the app - try another document - try another user account - check log files - delete caches - replace preferences - and replace app resources.
37. What 3 types of resource contention issues can occur when fast user switching is enabled?
Resource contention general - an item another user has running. Document contention for document another user has open. Peripheral contention for peripheral in use by another user. Application contention for when an app is designed to be open only on
Documents - Movies - Music - Pictures - Library - Downloads - Desktop - Public - Sites
PostScript Printer Description (PPD) files are printer driver files that instruct the CUPS system on how to communicate with specific printer models.
Forked files may cause issues for NFS and WebDAV. Also avoid AFP 2 on Windows file servers.
38. What is a device driver? What three primary types of device drivers are there?
A driver is a piece of software designed to facilitate the communication between Mac OS X and the peripheral. There are kernel extensions - framework plug-ins - or stand-alone applications.
The DNS Service is used to translate host names to IP addresses via forward lookups and IP addresses to domain names via reverse lookups.
RAID 0 uses striping to increase performance. RAID 1 uses disk mirroring.
Using information provided by the dynamic network services discovery protocols. Computers providing services appear as resources whereas service discovery zones or workgroups appear as folders.
39. What interfaces and protocols are supported by default in in Mac OS X?
Too many to list. Hehe.
The Dock process starts the DashboardClient process. All widgets run inside one of the two DashboardClient processes.
Single partition drives are easier to setup initially - but aren't as flexible for admin/maintenance. Multiple can segregate data
The network service operates or broadcasts on a network port.
40. What are five application environments supported by Mac OS X and what are they used for?
Cocoa - Carbon - BSD (CLI) - X11 - Java (Cocoa is native - Carbon is based on OS 9 but still provides OS X performance - X11 is a unix windowing environment)
Disconnected cable - nonfunctioning port - DHCP issue - DNS issue
cat - less
About this mac or system profiler. System is general release number - build is specific - and serial number represents the machine.
41. 6 Reasons to use the CLI
More options than GUI - bypass finder restrictions - root access - remote ssh is invisible to users - automation easy with scripting - easy combining with ARD
The network service operates or broadcasts on a network port.
If the DHCP request goes unanswered - it'll get a self-assigned IP in the 169.254 range.
The client uses the subnet mask to decide if the client is on the LAN. If it's not on the LAN - then it sends the data to the IP address of the local router. Traffic continues through routers until it reaches the destination.
42. What three common unix commands support Mac filesystem metadata?
The network service operates or broadcasts on a network port.
File>>Create Burn Folder and drag items in then press burn. OR Insert blank media and choose new Burn Folder
cp - mv - rm
It records what file operations are in progress at any given moment. If a power failure or system crash occurs - it can verify the integrity by replaying the journal.
43. What steps should you take when troubleshooting app issues?
Finder get info - command line run ls -l
Get Info from Finder or System Profiler
extensions - tied to the kernel to provide hardware support - frameworks - shared code libraries - fonts - preference files - configuration info - Launch Agents and Launch Daemons - used by launchd to provide auto-starting services - logs - contain d
Restart the app - try another document - try another user account - check log files - delete caches - replace preferences - and replace app resources.
44. What are some security concerns with spotlight?
Core system files - fonts - X11 - nearby & local printers - language translations
It will allow any user to search any attached non-system volume if ownership is ignored.
Access is based on the local filesystem. They'll start in their home folder but can traverse anywhere they have permission to do so.
computer hostname - working directory - user account
45. What role does loginwindow serve in system start-up?
Prevents users from using the reset password utility on the os x install dvd because they cannot boot from it.
The loginwindow process logs all users out and then tells the kernel to quit all remaining system processes.
loginwindow displays the login window and then sets up and manages the GUI user environment.
The status indicator lights - Green - yellow - red.
46. What is sudo used for?
They're used to combine complex items into individual folders. Packages appear as a single item.
Zip files are created with the Finder and are compatible with many OSes. Good for small files & small number of items. Disk Images are created in disk utility.
To run commands as the root user
Root has unlimited access - Admin can change system files & settings - guest can dump tons of files
47. What four Directory Service types can used in Mac OS X?
Authentication is who am I?Authorization is what can I do?
Intel - directly attached input devices - 10.5 or later - all new firmware updates - 10.5 or greater install disc - 10 gigs of free space - 2 GB or more of RAM
Get Info from Finder or System Profiler
Local - BSD Flat File and NIS - LDAPv3 - AD
48. What are the differences between ZIP archives and Disk Images?
Zip files are created with the Finder and are compatible with many OSes. Good for small files & small number of items. Disk Images are created in disk utility.
Describe containers in the file system
Devices providing network services broadcast their existence and Mac OS X picks up on these broadcasts and provides a list of services.
Standard - Admin - Guest - Sharing-Only - Root
49. Different between absolute and relative path
Absolute always start at the root of the filesystem - whereas relative paths start where the user is current at
Safe boot refers to when the system is starting up - safe mode is when the system is actually running - and safe login is when the system starts up the user session.
The client uses the subnet mask to decide if the client is on the LAN. If it's not on the LAN - then it sends the data to the IP address of the local router. Traffic continues through routers until it reaches the destination.
Access is based on the local filesystem. They'll start in their home folder but can traverse anywhere they have permission to do so.
50. How does the Finder's secure empty trash work?
About this mac or system profiler. System is general release number - build is specific - and serial number represents the machine.
1.) Create a plain text file w/ the 2.) Make the first line #!/bin/bash 3.) Change the permissions to allow execution
It does a 7-pass erase.
Describe containers in the file system