Test your basic knowledge |

ACSP: Apple Certified Support Professional Os X Support

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What does the firmware do? What is the POST?


2. What five network file services can you connect to from the Finder's Connect To Server dialog?






3. What password issues may arise related to the SMB service?


4. Path






5. How do you share printers with other Mac and Windows users?


6. How does the spotlight search service use metadata?






7. How does the default organization of the filesystem allow users to safely share local files and folder?






8. What network services are provided by your Mac to facilitate Internet sharing? What options are available for Internet sharing your Mac's AirPort wireless Ethernet interface?






9. Two primary partition schemes for mac formatted drives?






10. What are four advantages of using network directory services to store account information?






11. What are seven common types of resources Mac OS X can access from a directory service?






12. How does resetting the master filevault password affect existing filevault user accounts?






13. What 3 types of resource contention issues can occur when fast user switching is enabled?






14. How do you identify ownership and permissions of a file or folder in the Finder? In the command line?






15. Which two commands can read text files?






16. Absolute path






17. Account attributes






18. Five types of accounts in 10.6






19. What are three common troubleshooting techniques for issues involving failure to connect to network services?






20. How does the Finder's secure empty trash work?






21. Why is the root of a user's home folder visible to others?






22. How do you further resolve and issue that disappears when the Mac successfully safe-boots?






23. Four prep steps before installing






24. How does Mac OS X use dynamic network discovery protocols to access network services?






25. What three methods can be used to select the start-up disk?






26. What items are not loaded when Mac OS X safe boots?






27. What is the relationship between a network service and a network port?






28. Security risk with fast user switching?






29. How is the DOmain Name Service used to facilitate network naming?






30. Min hardware requirements for 10.6






31. How do Mac OS X computers acquire and use link-local TCP/IP addresses?


32. What system preference enables the accessibility features of OS X - what are they - and where are the preferences stored?






33. What does 'ignore volume ownership' do in the Finder?






34. What items are shared by default to all users?


35. Advantages/disadvantages of single/multiple partition drives in OS X


36. What files are associated with the computer's website? What about the users' websites?


37. What happens during system shutdown?






38. What steps should you take when troubleshooting app issues?






39. How can you limit a user account?






40. How does Boot Camp work?






41. What happens during user log-out?


42. How are the permissions on the shared folder set to allow local user sharing?






43. How does Mac OS X's built-in firewall work? What advanced firewall settings are available?






44. Folder/directories






45. Best command to list items in a folder?






46. In the network preferences - how can you tell which interface is currently being used for network activities?






47. Why is time machine bad at backing up large databases?






48. How can you identify the MAC Addresses for all of the Mac's network interfaces?






49. How do kerberos and keychain system differ for managing authentication services?






50. What are PPD files responsible for?