Pass the Apple ACSP Certification 9L0-415 Questions and answers with CertsForce

Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions
Questions # 31:

Review the screenshot, and then answer the question below.

Question # 31

If you click Delete User in the dialog shown above, what will happen to James White's home folder?

Options:

A.

It will be moved to the Trash.


B.

"Deleted" will be appended to the home folder name, and it will be archived in Time Machine in a compressed and encrypted file.


C.

"Deleted" will be appended to the home folder name, and its permissions will be changed to allow administrator user access only.


D.

It will be deleted immediately, without being moved to the Trash.


Questions # 32:

Which statement is true of ALL THREE buses: USB, FireWire, AND Thunderbolt?

Options:

A.

The bus can operate at speeds of at least 4 Gbps.


B.

An Intel-based Mac can start up into target disk mode using this bus.


C.

The bus can host at least 64 peripherals.


D.

An Intel-based Mac can start up from a drive on this bus.


Questions # 33:

Which OS X Mountain Lion tool can help you create a strong password?

Options:

A.

Password Audit, accessible from Security preferences


B.

Password Assistant, accessible from Users & Groups preferences


C.

Security Audit, accessible from Directory Utility


D.

Password Checking, accessible from Parental Controls preferences


Questions # 34:

You can deselect the option to "Reopen windows when logging back in" from the logout verification dialog. You can deselect the option to "Close windows when quitting an application" from General preferences. Also from General preferences, you can select the option to "Ask to keep changes when closing documents," which turns off the Auto Save feature.

Options:

A.

Where can you adjust application Auto Save and Resume options?


B.

How can you identify which applications are installed on your Mac?


C.

How can you identify if a Mac requires a firmware update?


D.

How can you prevent a user from installing software updates?


Questions # 35:

How is 802.1X configured on OS X systems?

Options:

A.

In OS X there are two configuration methods for 802.1X. The first method is automatic configuration via the selection of a Wi-Fi network that requires WPA/WPA2 Enterprise authentication. The second method is "semi-automatic" configuration via an 802.1X configuration profile provided by an administrator.


B.

A network client uses the subnet mask to determine whether the destination IP address is on the LAN. If the destination IP address isn't on the LAN, it's assumed the destination address is on another network, and the client sends the data to the IP address of the local network router. The network router then sends the data, via a WAN connection, on to another router that it thinks is closer to the destination. This continues across WAN conn


C.

In the Mac App Store, you can view the current Apple ID by selecting Store from the menu bar. You can get further details regarding this Apple ID, by selecting View My Account in the same menu.


D.

The Lookup tab of Network Utility allows you to test name resolution against the currently configured DNS server.


Questions # 36:

Where are the keychain files stored?

Options:

A.

A Safe Boot performs the following permanent actions: attempting to repair the system volume structure, deleting system KEXT caches, and deleting font caches.


B.

The master password is used to reset local account passwords.


C.

Each user starts with a login keychain saved at /Users//Library/Keychain/ login.keychain and a Local

Items/iCloud keychain saved in the /Users//Library/Keychains/ folder. Administrative users can manage systemwide authentication assets with the /Library/Keychain/System.keychain. Finally, Apple maintains several items in /System/Library/Keychains/ for OS X system use.


D.

Spotlight metadata index databases are stored at the root of every volume in a /.Spotlight-V100 folder. However, a Legacy FileVault user's database is stored in his encrypted home folder. And the Mail application maintains its own database in each user's home folder at ~/Library/Mail/V2/MailData/Envelope Index. Spotlight plug-ins can be located in any of the Library folders in a folder named Spotlight.


Questions # 37:

How can you encrypt a disk without losing its contents?

Options:

A.

The Archive option in the Finder creates compressed zip archive files.


B.

From the Finder, you can encrypt a disk without losing its contents by secondary (or Control-) clicking the disk and then choosing Encrypt from the shortcut menu.


C.

Though Spotlight indexes file and folder permissions, it allows other users to search the contents of locally attached nonsystem volumes when ownership is ignored on those volumes.


D.

From the "Connect to Server" dialog in the Finder, you can connect to:

• Apple File Protocol (AFP)

• Server Message Blocks/Common Internet File System (SMB/CIFS)

• SMB2

• Network File System (NFS)

• Web-based Distributed Authoring and Versioning (WebDAV)

• File Transfer Protocol (FTP) network file services


Questions # 38:

Key chains are used to store secrets such as resource passwords, digital certificates, and encryption keys. The keychain system can also securely store Safari AutoFill information, Internet Account settings, and secure text notes.

Options:

A.

What type of items can be found in a keychain?


B.

How does file system journaling work?


C.

What are the advantages of code signing?


D.

What does OS X use bundles or packages for?


Questions # 39:

What steps should you use when troubleshooting application issues?

Options:

A.

The optional firewall settings let you control whether signed applications are automatically allowed through the firewall, control the list of allowed (or denied) applications, and enable stealth mode (which means your Mac won't respond to any unsolicited connections).


B.

The four system resource domains are:

• User, containing applications and system resources specific to each user account

• Local, containing applications and system resources available to all users on the local Mac

• Network (optional), containing applications and system resources available to any Mac that has an automated network share

• System, containing applications and system resources required to provide basic


C.

General application troubleshooting steps include restarting the application, trying another known working document, trying another user account, checking log files, deleting cache files, replacing preference files, and replacing application resources.


D.

Gatekeeper can restrict software to Mac App Store applications only, or Mac App Store and identified developer applications only (this is the default option), or any application regardless of origin.


Questions # 40:

Before the local user account is created on a system, you must first copy the restored user's home folder to the /Users folder. Then after you create the new user in Users &Groups preferences with the same account name, the system will prompt you to associate the new account with the restored home folder.

Options:

A.

How can you verify that a specific network service is available from a service provider?


B.

How does a user that changes his own account password affect his login keychain?


C.

How do you identify the ownership and permissions of a file or folder in the Finder?


D.

How do you make OS X associate a new local user account with a manually migrated or restored user's home folder?


Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions