Test your basic knowledge |

ACSP: Apple Certified Support Professional Os X Support

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Advantages/disadvantages of single/multiple partition drives in OS X


2. What is the safe boot keyboard combo?






3. What process or processes are responsible for dashboard widgets?






4. How does the firmware password help secure against password changes?






5. Security risks & account types






6. How do you provide Mac OS X web-sharing services?






7. What does 'ignore volume ownership' do in the Finder?






8. How does resetting a user's password as an admin user affect their keychain?






9. What are the primary differences between local - network - and mobile accounts?






10. Why does the Finder hider certain folders at the root of the system volume?


11. How do you identify ownership and permissions of a file or folder in the Finder? In the command line?






12. What are four advantages of using network directory services to store account information?






13. How does the default organization of the filesystem allow users to safely share local files and folder?






14. What are seven common types of resources Mac OS X can access from a directory service?






15. What functionality does 10.6 support with AppleTalk?






16. How does file system journaling work?






17. What is the purpose of IP addresses and subnet masks? What is their format?






18. How does Time Machine maintain a backup history of the system?


19. Absolute path






20. How are the permissions on the shared folder set to allow local user sharing?






21. What backup destinations does Time Machine support?






22. What is target disk mode and how is it engaged?






23. What does the problem-reporting feature do?






24. 3 Main components of a typical command






25. Why might a previously backed-up item no longer be available in Time Machine?






26. What items are shared by default to all users?


27. How does Mac OS X use dynamic network discovery protocols to access network services?






28. What are five common directory services and authentication services troubleshooting techniques?






29. How do you further resolve and issue that disappears when the Mac successfully safe-boots?






30. Three minium requirements for creating a command line script






31. 6 volumes supported by OS X






32. What are some security concerns with spotlight?






33. What four Directory Service types can used in Mac OS X?






34. How do permissions in the Finder appear different than those in the terminal?






35. What are five application environments supported by Mac OS X and what are they used for?






36. What are the three primary steps for setting up bootcamp?






37. What are three common authentication methods?






38. How can you limit a user account?






39. What role does loginwindow serve in system start-up?






40. Utilities available from OS X install DVD






41. What are six common system resources? What purpose does each one serve and where are they located?






42. What steps should you take when troubleshooting app issues?






43. How do you share printers with other Mac and Windows users?


44. Relative path


45. How does file-fault secure a user's data?






46. What does Mac OS X use bundles or packages for?


47. What are three common troubleshooting techniques for issues involving failure to connect to network services?






48. How is Disk utility's verify and repair feature used?


49. How do kerberos and keychain system differ for managing authentication services?






50. Security risk with fast user switching?