Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Apple 9L0-415 - OS X Support Essentials 10.9

Page: 2 / 6
Total 218 questions

Three methods for uninstalling applications include:

    Open Launchpad, hold down the Option key, and click the "X" button

    In the Finder, drag the primary application to the Trash and then empty the Trash

    Use a custom-built uninstaller package

A.

What three methods can be used to uninstall applications?

B.

Which two methods can be used to automatically connect a network share?

C.

What three primary sources can Migration Assistant pull from?

D.

What four methods can be used to restore from a Time Machine backup?

What's the purpose of Internet Protocol v4 (IPv4) addresses and subnet masks?

A.

The Finder doesn't show items with periods at the beginning of their filenames or items with the hidden file flag enabled. Both methods for hiding items can only be managed from the command line interface.

B.

The master password is used to reset local account passwords.

C.

The Internet Protocol (IP) address identifies the location of a specific network device. IP addresses are the primary identification used by the Internet protocol suite TCP/IP for both local area and wide area networks. Subnet masks are used by network devices to identify their local network range and to determine whether outgoing data is destined for a network device on the LAN.

D.

The Ping tab of Network Utility allows you to test basic connectivity to another network host by sending and then waiting for the return of a ping packet.

The OS X Recovery Disk Assistant can create a small OS X Recovery disk that lacks the OS X installation assets. An OS X Installation disk, which includes the full OS X installation assets, can be created by using the createinstallmedia command line tool found inside the Install OS X Mavericks application.

A.

What four methods can be used to eject a volume or disk from the Finder?

B.

What two methods can be used to create an external OS X Recovery disk?

C.

What does OS X use bundles or packages for?

D.

What two volume formats are supported for an OS X system volume?

The Privacy pane of Security & Privacy preferences can be used to allow or disallow applications' access to Location Services, Contacts, Calendars, Reminders, social network services, and Accessibility application access.

A.

How can you acquire the OS X Mavericks installer?

B.

How can you limit the use of Location Services?

C.

How can you identify duplicate fonts?

D.

What does the master password do?

File system journaling records what file operations are in progress at any given moment. This way, if a power failure or system crash occurs, after the system restarts, it will be able to quickly verify the integrity of the volume by "replaying" the journal.

A.

What does the master password do?

B.

What are PPD files responsible for?

C.

How does file system journaling work?

D.

What are the five System Preference categories?

What permissions are modified by the Disk Utility Repair Permissions feature?

A.

Disk Utility is the primary application for creating and managing disk images.

B.

The master password is used to reset local account passwords.

C.

The Disk Utility Verify and Repair feature is used to verify or repair the partition scheme and directory structure of a volume. These elements contain the information used to locate files and folders on the volume.

D.

The Disk Utility Repair Permissions feature repairs only the ownership and permissions for items installed by Apple. However, this may resolve issues with third-party products.

What does CUPS do?

A.

PostScript Printer Description (PPD) files are printer driver files that instruct the CUPS system on how to communicate with specific printer models.

B.

Standard UNIX file system permissions allow only for permissions to be set for one owner, one group, and all others. ACLs, on the other hand, allow for an essentially unlimited list of permissions entries.

C.

Any application that supports Auto Save and the Finder can manage document locking.

D.

Common UNIX Printing System (CUPS) manages all printing for OS X, including both local and shared printing.

How is Quick Look able to preview so many file types?

A.

Quick Look uses a number of plug-ins that give it the capability to preview documents. These plug-ins live in Quick Look folders in any Library folder on OS X.

B.

During installation of OS X Mavericks, the only optional choice is to define an installation destination other than the Mac computer's current default system disk.

C.

The Finder doesn't show items with periods at the beginning of their filenames or items with the hidden file flag enabled. Both methods for hiding items can only be managed from the command line interface.

D.

Any application that supports Auto Save and the Finder can manage document locking.

How do you engage Quick Look? Which applications support it?

A.

The Privacy pane of Security & Privacy preferences can be used to allow or disallow applications' access to Location Services, Contacts, Calendars, Reminders, social network services, and Accessibility application access.

B.

Quick Look is engaged by simply pressing the Space bar when a document is selected. Applications that support Quick Look include the Finder, Time Machine, Mail, and most open and save browser dialogs.

C.

The Activity Monitor application is used to monitor open processes and applications.

D.

You can use the System Information application to easily scan all the appropriate application locations and return a list of installed applications.

How do the four default System Preferences categories differ?

A.

The easiest method to configure VPN settings is to use a configuration profile containing all the relevant VPN setup information.

B.

During installation of OS X Mavericks, the only optional choice is to define an installation destination other than the Mac computer's current default system disk.

C.

Archive files are much simpler to create in the Finder and are compatible with third-party operating systems. Disk images are more difficult to create and manage, but they offer greater flexibility. Primarily, disk images can be easily modified and converted. However, OS X style disk images aren't compatible with third-party operating systems.

D.

Generally, Personal preferences affect only a single user; Hardware preferences adjust hardware & peripheral settings; Internet & Wireless preferences affect personal & system network settings; and System Preferences affect all users and often require administrative access.