9L0-415 - OS X Support Essentials 10.9
Go back to Apple
Disk Utility and System Information can both be used to gather information about storage devices.
Which two built-in OS X applications can be used to gather information about storage devices?
The Messages application allows for on-demand screen sharing that can be used even when the system screen sharing service isn't enabled.
Which application can provide on-demand screen sharing even when the Screen Sharing service isn't enabled?
Which statement about Gatekeeper is TRUE?
Only administrator users can bypass Gatekeeper.
You are logged into a MacBook Pro as a standard user. How can you display the OS X Mountain Lion build number?
Choose About This Mac from the Apple menu, and then click the text directly under OS X until the build number is revealed.
How do the four default System Preferences categories differ?
Generally, Personal preferences affect only a single user; Hardware preferences adjust hardware & peripheral settings; Internet & Wireless preferences affect personal & system network settings; and System Preferences affect all users and often require administrative access.
On an optional configuration step in the Setup Assistant in OS X Mountain Lion, pressing Command-Q lets you skip the step.
Three methods for uninstalling applications include: - Open Launchpad, hold down the Option key, and click the "X" button - In the Finder, drag the primary application to the Trash and then empty the Trash - Use a custom-built uninstaller package
What three methods can be used to uninstall applications?
What can you enable to locate a lost Mac system?
iCloud Find My Mac allows you to remotely locate a lost Mac system. You enable this feature in iCloud preferences. To locate a lost Mac system, you can use the iCloud website or the Find My iPhone app on an iOS device.
The local hidden OS X Recovery HD doesn't include the OS X installation assets. So reinstalling OS X Mavericks from here requires high-speed Internet access and the ability to verify access to the installation assets. Upgraded Mac systems are verified by entering the Apple ID used to purchase OS X Mavericks. Verification is automatic for Mac systems that included OS X Mavericks when purchased new.
What two resources does the local hidden OS X Recovery HD need to reinstall OS X Mavericks?
Why does the Finder hide certain folders at the root of the system volume?
The Finder hides traditional UNIX resources from average users because they don't need to have access to those items. If users need access to these UNIX items, they can access them from Terminal.
Which of these must you know about a corporate VPN server before you can configure the VPN software on an OS X computer to access the corporate network?
If the corporate VPN server supports PPTP, L2TP over IPSec, or Cisco IPSec
What are some privacy and security concerns with the Spotlight service?
Though Spotlight indexes file and folder permissions, it allows other users to search the contents of locally attached nonsystem volumes when ownership is ignored on those volumes.
Which dynamic service discovery protocol does OS X use to discover devices on a network?
On a Mac running OS X Mountain Lion, how can you display a list of installed software updates?
Open Software Update preferences and click Installed Software.
A Safe Boot performs the following permanent actions: attempting to repair the system volume structure, deleting system KEXT caches, and deleting font caches.
Which changes are made when OS X Safe Boots?
You can configure Time Machine to delete versions of files as soon as they reach a specified age.
iCloud is a free service from Apple that provides cloud storage and communication services for applications, including Mail, Contacts, Calendars, Reminders, Notes, Safari, Keychain, Photos and any other applications that support iCloud integration. iCloud also provides Find My Mac technology for help locating a lost or stolen system.
What key features do you gain by setting up iCloud?
Additional Apple devices must be authorized to use the iCloud Keychain service using a combination of the Apple ID password and another method. One method involves using an iCloud Security Code; the other method is to authorize access from another Apple device that has already been configured for the iCloud Keychain service.
What's required to set up the iCloud Keychain service on multiple Apple devices?
Which of these files will Time Machine, by default, NOT back up?
Any file in the Trash
File system journaling records what file operations are in progress at any given moment. This way, if a power failure or system crash occurs, after the system restarts, it will be able to quickly verify the integrity of the volume by "replaying" the journal.
How does file system journaling work?
Three ways to forcibly quit an application from the graphical interface are from the Force Quit Application dialog accessed from the Apple menu; from the Dock application shortcut menu accessed by Control-clicking or right-clicking the application's icon; or from the /Applications/Utilities/ Activity Monitor application.
What three ways can you forcibly quit an application from the graphical interface?
When a user chooses Shut Down from the Apple menu, what process quits all of the user's open applications and tells the kernel to power down the computer?
In OS X, which is a valid method to reset permissions and ACLs on a home folder to their default settings?
Start the computer from the OS X Recovery partition, open Terminal from the Utilities menu, enter resetpassword at the prompt, select the system volume and the user account, and click Reset.
What's the locked file flag?
The locked file flag prevents anyone, including the item's owner, from editing an item. Only the item's owner can unlock the item to then allow modification.
Each primary stage of system initialization can be indicated by the following: firmware, startup chime or bright flash of the power-on light, followed by a light gray screen on the primary display; booter, a dark gray Apple logo on the primary display; kernel, a small dark gray spinning gear or spinning earth icon below the Apple logo; and system launchd, a white screen on all displays followed by the login screen.
What are the primary system initialization stages in OS X? What are the visual and audible cues of these items?
How does the keychain system help protect your information?
The keychain system manages encrypted files that are used to securely save your items. By default, every user has login and Local Items keychains that use the same password as his account. Not even other administrative users can access your keychain secrets without knowing the keychain's password.
If a connected peripheral doesn't appear in System Information, the issue is likely to be hardware related. Troubleshoot accordingly.
What can you infer about a connected peripheral if it doesn't appear in the System Information application?
What are PPD files responsible for?
PostScript Printer Description (PPD) files are printer driver files that instruct the CUPS system on how to communicate with specific printer models.
Where are the keychain files stored?
Each user starts with a login keychain saved at /Users/<username>/Library/Keychain/ login.keychain and a Local Items/iCloud keychain saved in the /Users/<username>/Library/Keychains/<UUID> folder. Administrative users can manage systemwide authentication assets with the /Library/Keychain/System.keychain. Finally, Apple maintains several items in /System/Library/Keychains/ for OS X system use.
Why would you want to open an application in 32-bit mode?
Using the Finder Info window you can force an application to open in 32-bit mode. This step is necessary for a 64-bit application to support older 32-bit plug-ins or application resources.
Which application is used to examine open applications on OS X?
The Activity Monitor application is used to monitor open processes and applications.
What's used to identify a Wi-Fi network?
A Service Set Identifier, or SSID, is used to identify a Wi-Fi network name and associated configuration.
The system version, build number, and hardware serial number are located in the About This Mac dialog or the login screen. The system version number defines the specific version of OS X currently installed. The system build number is an even more specific identifier used primarily by developers. Finally, the hardware serial number is a unique number used to identify your specific Mac.
Where can you locate the system version number, build number, and serial number? What's the significance of these numbers?
Files with metadata may cause problems for NFS or WebDAV network file systems. Also, avoid AFP 2 services provided by Windows file servers.
What are some known issues that arise when connecting to network file services?
Which folder contains items that instruct the launchd process what to launch during OS X Mountain Lion startup?
What does the Disk Utility Verify and Repair feature do?
The Disk Utility Verify and Repair feature is used to verify or repair the partition scheme and directory structure of a volume. These elements contain the information used to locate files and folders on the volume.
You are configuring an OS X Mountain Lion computer that will be located in a public space. You want anyone to be able to log in and use Safari, but you do NOT want their Safari browser history to remain on the computer after users log out. Which action will let the computer function in the desired manner?
Enable the Guest account for login.
Create a managed account with Parental Controls.
Create a Guest account.
What is the role of the launchd process in the startup of an OS X Mountain Lion computer?
The kernel starts launchd, then launchd starts all the other processes involved in startup.
How do you start up an OS X Mountain Lion computer in Safe Mode?
Hold down Shift during startup.
How can you limit a user account from having full access to all applications?
Parental Controls can further limit a user account. Examples include enforcing a simple Finder, limiting applications and widgets, limiting Mac App Store content, setting time limits, and content filtering for several applications included in OS X.
Which statement is true of ALL THREE buses: USB, FireWire, AND Thunderbolt?
An Intel-based Mac can start up from a drive on this bus.
In OS X Mountain Lion, which TWO types of file service hosts can you browse in the Network folder? (Select 2)
What's unique about the permissions of the /Users/Shared folder?
The Shared folder is set up to allow all users to read and write files, but only the user who owns an item can delete it from the Shared folder. This is accomplished using the sticky bit permissions setting.
A standard user can connect to any non-WPA Enterprise Wi-Fi network via the Wi-Fi status menu. Because the system Keychain must be modified for WPA Enterprise connections, only an administrative user can establish these types of connections.
Through what mechanism can a standard user configure Wi-Fi settings?
The OS X Recovery system provides access to Restore System From Time Machine Backup, Install/Reinstall OS X, Get Help Online via Safari, Disk Utility, Startup Disk, Firmware Password Utility, Network Utility, Terminal, and Reset Password.
What utilities are available when started up from OS X Recovery?
The function of journaling in the Mac OS Extended (Journaled) file system is to ________.
protect volume structure integrity in cases of unexpected shutdown
The volume formats supported as system volumes for OS X are Mac OS Extended (Journaled) and Mac OS Extended (Journaled, Encrypted).
What two volume formats are supported for an OS X system volume?
What permissions are modified by the Disk Utility Repair Permissions feature?
The Disk Utility Repair Permissions feature repairs only the ownership and permissions for items installed by Apple. However, this may resolve issues with third-party products.
Which statement is TRUE of file and folder permissions in the Finder in OS X Mountain Lion?
A user with Read-only permissions to a folder CANNOT rename any files in that folder.
Which users are allowed to unlock a FileVault 2 protected system?
Any user that's FileVault enabled is allowed to unlock a FileVault 2-protected system. This includes any local or cached network user account that was enabled when FileVault 2 was set up or created after FileVault 2 was enabled. Further, administrators may return to Security & Privacy preferences to enable additional accounts.