Pass the Apple ACSP Certification 9L0-415 Questions and answers with CertsForce

Viewing page 5 out of 7 pages
Viewing questions 41-50 out of questions
Questions # 41:

How does a user that changes his own account password affect his login keychain?

Options:

A.

When a user changes his own account password, the system will keep his login keychain password in sync.


B.

The Archive option in the Finder creates compressed zip archive files.


C.

The master password is used to reset local account passwords.


D.

Time Machine starts with a full copy of the file system to the backup disk. Then it maintains a list of changes to the file system, and every hour copies only the changes to the backup disk. In the backup, it creates a simulation of the full file system using hard links for files that haven't changed.


Questions # 42:

What are some privacy and security concerns with the Spotlight service?

Options:

A.

The Spotlight search service creates index databases of file system metadata so that it can perform normally time intensive searches nearly instantly. File system tags can be found in the Finder sidebar, Spotlight search, and any open or save document dialogs.


B.

When fast user switching is enabled, all users are allowed to see other users' locally connected disks.


C.

A user's home folder permissions can be reset from the Reset Password application on OS X Recovery.


D.

Though Spotlight indexes file and folder permissions, it allows other users to search the contents of locally attached nonsystem volumes when ownership is ignored on those volumes.


Questions # 43:

How do you identify the ownership and permissions of a file or folder in the Finder?

Options:

A.

A Service Set Identifier, or SSID, is used to identify a Wi-Fi network name and associated configuration.


B.

Standard UNIX file system permissions allow only for permissions to be set for one owner, one group, and all others. ACLs, on the other hand, allow for an essentially unlimited list of permissions entries.


C.

An item's ownership and permissions can be identified using the Info or Inspector windows in the Finder.


D.

A user's home folder permissions can be reset from the Reset Password application on OS X Recovery.


Questions # 44:

What are four common issues that can interrupt network services on a Mac computer?

Options:

A.

To verify a specific service is available from a service provider, first use the Network Utility Ping tab to verify basic connectivity. Then use the Network Utility Port Scan tab to verify the specific service port(s) are open. You should always limit the port scan to the specific ports required for the network service you're testing.


B.

Four common issues that can interrupt network services on a Mac are:

• Ethernet connectivity issues, which can cause the hardware network interface to become inactive or introduce excessive packet errors

• Wi-Fi connectivity issues caused by the selection of an improper Wi-Fi network or excessive wireless interference

• DHCP service issues, which prevent proper TCP/IP configuration

• DNS service issues, which prevent


C.

Migration Assistant can migrate information from other OS X systems, Windows systems, and other disks, including Time Machine backups.


D.

Review Network preferences, review the Network Utility statistics, and attempt to connect to different network services.


Questions # 45:

When deleting a local user account, what three options does Users & Groups preferences give you for dealing with the user's home folder content?

Options:

A.

When a user changes his own account password, the system will keep his login keychain password in sync.


B.

When performing a Safe Boot, OS X doesn't load third-party KEXTs, third-party launch agents, third-party launch daemons, third-party startup items, third-party fonts, any user login items, or any user-specific launch agents.


C.

When deleting a local user account, OS X can archive the home folder content into a compressed disk image, leave the home folder content in the /Users folder, or delete the home folder content. Optionally, OS X can perform a secure erase on the home folder content.


D.

The Font Book application shows a small dot next to the name of any font that has duplicate resources.


Questions # 46:

Local account passwords can be reset by an administrator in Users & Groups, the master password at login, an Apple ID at login, a FileVault 2 recovery key at startup, and by the Reset Password application in OS X Recovery.

Options:

A.

What three methods can be used to uninstall applications?


B.

What does OS X use bundles or packages for?


C.

What methods can be used to reset a user's lost account password?


D.

What four methods can be used to restore from a Time Machine backup?


Questions # 47:

How can an OS X system automatically connect to a Wi-Fi network?

Options:

A.

A new OS X system can only automatically connect to Wi-Fi networks that have no standard authentication mechanism, otherwise known as an "open network." However, a configured OS X system can automatically reconnect to authenticated Wi-Fi networks, provided that the appropriate information was saved to the Keychain system.


B.

Code-signed items include a digital signature that the system can use to verify the authenticity and integrity of the application or process and its resources.


C.

A standard user can connect to any non-WPA Enterprise Wi-Fi network via the Wi-Fi status menu. Because the system Keychain must be modified for WPA Enterprise connections, only an administrative user can establish these types of connections.


D.

The Activity Monitor application is used to monitor open processes and applications.


Questions # 48:

A Safe Boot performs the following permanent actions: attempting to repair the system volume structure, deleting system KEXT caches, and deleting font caches.

Options:

A.

How can you acquire the OS X Mavericks installer?


B.

Where are the keychain files stored?


C.

Which changes are made when OS X Safe Boots?


D.

What does the master password do?


Questions # 49:

Most common IP addresses and subnet masks share the same IPv4 formatting. An IPv4 address is a 32-bit number represented in four groups of three-digit numbers, known as octets, separated by periods. Each octet has a value between 0 and 255. An IPv6 address is a 128-bit number that's presented in eight groups of four-digit hexadecimal numbers separated by colons. This allows for a huge range of addresses, and as a result IPv6 addressing essentially includes subnet information.

Options:

A.

How can you identify duplicate fonts?


B.

What types of files are omitted from Time Machine backups?


C.

How does IPv4 addressing differ from IPv6 addressing?


D.

How does the Secure Empty Trash feature in Finder work?


Questions # 50:

You can enable printer sharing from Print & Scan or Sharing preferences. Note that Windows clients may need additional drivers to access the Mac computer's shared printers via the IPP protocol.

Options:

A.

What are account attributes?


B.

How can you limit the use of Location Services?


C.

How do you share printers with other users?


D.

How can you identify duplicate fonts?


Viewing page 5 out of 7 pages
Viewing questions 41-50 out of questions