Pass the Apple ACSP Certification 9L0-415 Questions and answers with CertsForce

Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions
Questions # 51:

A user's home folder permissions can be reset from the Reset Password application on OS X Recovery.

Options:

A.

How can you reset a user's home folder permissions?


B.

How can you limit the use of Location Services?


C.

How can you verify basic connectivity to another network host?


D.

How can you identify duplicate fonts?


Questions # 52:

What are the two primary traditional installation methods in OS X?

Options:

A.

The Archive option in the Finder creates compressed zip archive files.


B.

Metadata is information stored outside of a file or folder. It provides additional information about files and folders. Examples include: file flags, extended file attributes, and permissions.


C.

The diagnostic reporting feature automatically creates a diagnostic report log any time an application crashes or hangs. The diagnostic report log can be viewed immediately, reported to Apple via the Internet, or viewed later in the /Applications/Utilities/Console application.


D.

Traditional installation methods are generally categorized as either a drag-and-drop installation, where the user simply copies the application to the local system; or as an installation package, where an installer process places the items on the local system.


Questions # 53:

What's unique about the permissions of the /Users/Shared folder?

Options:

A.

When fast user switching is enabled, all users are allowed to see other users' locally connected disks.


B.

The Shared folder is set up to allow all users to read and write files, but only the user who owns an item can delete it from the Shared folder. This is accomplished using the sticky bit permissions setting.


C.

The Ping tab of Network Utility allows you to test basic connectivity to another network host by sending and then waiting for the return of a ping packet.


D.

You can prevent automatic updates for all users by disabling the options in App Store preferences. You can further restrict a user's ability to use the Mac App Store by configuring Parental Controls for the user's account.


Questions # 54:

Bundles and packages are used to combine complex items into individual folders. Packages have the additional advantage of appearing as a single item in the Finder. This allows software developers to combine resources into a single item and prevents users from seeing and potentially damaging those resources through deletion or moving of files.

Options:

A.

What does OS X use bundles or packages for?


B.

What does the diagnostic reporting feature do?


C.

How does file system journaling work?


D.

What does CUPS do?


Questions # 55:

Client software is used to access network services provided by server software. The connection is established using a common network protocol known by both the client and server software. Thus, the client and server software can be from different sources.

Options:

A.

What's the best source for acquiring printer drivers for OS X?


B.

What's the relationship between clients and servers as it relates to network service access?


C.

What's target disk mode and how is it engaged?


D.

What's the primary interface for configuring network service applications?


Questions # 56:

Code-signed items include a digital signature that the system can use to verify the authenticity and integrity of the application or process and its resources.

Options:

A.

What are account attributes?


B.

What does OS X use bundles or packages for?


C.

What are the advantages of code signing?


D.

Which applications can manage document locking?


Questions # 57:

What's the best source for acquiring printer drivers for OS X?

Options:

A.

The network service order list is used to determine the primary network service interface if there is more than one active service. All network traffic that isn't better handled via local connection to an active network service interface is sent to the primary network service interface. So in most cases all WAN traffic, Internet traffic, and DNS resolution is sent through the primary network service interface.


B.

The Apple print drivers are the best source for configuring OS X printers. One method is to let the software update system automatically download and install the appropriate printer drivers. Or you can manually download and install printer drivers from the Apple support website.


C.

The master password is used to reset local account passwords.


D.

The Activity Monitor application is used to monitor open processes and applications.


Questions # 58:

If a connected peripheral doesn't appear in System Information, the issue is likely to be hardware related. Troubleshoot accordingly.

Options:

A.

What are the four default top-level folders visible in the Finder?


B.

How can you select a new printer driver for a configured printer?


C.

How can you encrypt a disk without losing its contents?


D.

What can you infer about a connected peripheral if it doesn't appear in the System Information application?


Questions # 59:

The four default top-level folders visible in the Finder are:

    Applications, containing applications all local users have access to

    Library, containing system resources all local users have access to

    System, containing necessary system resources

    Users, containing all the local user home folders

Options:

A.

How do the four default System Preferences categories differ?


B.

What are some of the common file flags used by OS X?


C.

What are the four default top-level folders visible in the Finder?


D.

What are the advantages of code signing?


Questions # 60:

Internet Accounts preference is the primary interface in OS X for configuring built-in network applications.

Options:

A.

What options can you select from during the OS X Mavericks installation?


B.

What's a profile? How are profiles managed?


C.

What's used to identify a Wi-Fi network?


D.

What's the primary interface for configuring network service applications?


Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions