Test your basic knowledge |

ACSP: Apple Certified Support Professional Os X Support

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 3 Main components of a typical command






2. How do Mac OS X computers acquire and use link-local TCP/IP addresses?


3. How does the IP addresses use the MAC address to send messages between computers on a LAN?


4. How does Mac OS X use dynamic network discovery protocols to access network services?






5. How do you further resolve and issue that disappears when the Mac successfully safe-boots?






6. Advantages/disadvantages of single/multiple partition drives in OS X


7. What are the min sys req for BootCamp?






8. What items are shared by default to all users?


9. What are PPD files responsible for?






10. 6 Reasons to use the CLI






11. How can you identify which apps are installed on a Mac?






12. How is the DOmain Name Service used to facilitate network naming?






13. What are the primary system initialization stages and user environment stages in Mac OS X and what order do they start?






14. How does file-fault secure a user's data?






15. What 3 types of resource contention issues can occur when fast user switching is enabled?






16. What three common unix commands support Mac filesystem metadata?






17. What is a device driver? What three primary types of device drivers are there?






18. What are seven common types of resources Mac OS X can access from a directory service?






19. What are the differences between ZIP archives and Disk Images?






20. What is the relationship between a network service and a network port?






21. What five network file services can you connect to from the Finder's Connect To Server dialog?






22. What files are associated with the computer's website? What about the users' websites?


23. What is the difference between launch daemons - startup items - launch agents - and login items?


24. What is protected memory? What is 64 bit memory addressing?






25. What is the relationship between clients and servers as it relates to network service access?






26. What type of files are omitted from time machine backups?






27. Why is time machine bad at backing up large databases?






28. 6 volumes supported by OS X






29. How do you use disk utility to burn an optical disk?






30. How does Mac OS X's built-in firewall work? What advanced firewall settings are available?






31. Four prep steps before installing






32. How does file system journaling work?






33. How does resetting the master filevault password affect existing filevault user accounts?






34. What are four common issues that can interrupt network services on a Mac OS X computer?






35. What client-sharing services can Mac OS X provide?






36. Two primary partition schemes for mac formatted drives?






37. What is the safe boot keyboard combo?






38. What does iSync do?






39. Why does the Finder hider certain folders at the root of the system volume?


40. What is sudo used for?






41. What two dynamic network service discovery protocols are supported by Mac OS X?






42. What are three common authentication methods?






43. What are the three primary steps for setting up bootcamp?






44. What are five common directory services and authentication services troubleshooting techniques?






45. How do you identify ownership and permissions of a file or folder in the Finder? In the command line?






46. Min hardware requirements for 10.6






47. Path






48. Why might a previously backed-up item no longer be available in Time Machine?






49. Absolute path






50. Security risk with fast user switching?