Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Apple 9L0-415 - OS X Support Essentials 10.9

Page: 1 / 6
Total 218 questions

Files with metadata may cause problems for NFS or WebDAV network file systems. Also, avoid AFP 2 services provided by Windows file servers.

A.

What steps should you use when troubleshooting application issues?

B.

What are the two primary traditional installation methods in OS X?

C.

How does network service order affect network connectivity?

D.

What are some known issues that arise when connecting to network file services?

The OS X Mavericks installer can be downloaded from the Mac App Store for free.

A.

How do you share printers with other users?

B.

How can you identify duplicate fonts?

C.

How does the OS X built-in firewall work?

D.

How can you acquire the OS X Mavericks installer?

How can you identify duplicate fonts?

A.

The OS X Mavericks installer can be downloaded from the Mac App Store for free.

B.

The Messages application allows for on-demand screen sharing that can be used even when the system screen sharing service isn't enabled.

C.

The Font Book application shows a small dot next to the name of any font that has duplicate resources.

D.

The four methods used to eject a volume or disk from the Finder are:

• Drag the disk icon to the Trash in the Dock.

• Press and hold the Eject key for a few moments to unmount and eject optical media.

• Select the volume you want to eject and choose Eject from the File menu.

• In the Finder sidebar, click the small Eject button next to the volume you want to unmount and eject.

Sandboxed applications are only allowed access to specific items. They're otherwise completely cut off from the rest of the system, so they can't cause harm. All Mac App Store applications are required to be sandboxed.

A.

What are the advantages of application sandboxing?

B.

What does the master password do?

C.

What happens during system shutdown?

D.

What are Safe Sleep and Power Nap?

How can you verify that the system can establish a connection to a remote network host?

A.

All Apple software updates are handled via the Mac App Store.

B.

The Activity Monitor application is used to monitor open processes and applications.

C.

The Traceroute tab of Network Utility allows you to verify the connection hops between your Mac and a remote host.

D.

A Safe Boot is initiated by holding down the Shift key during system startup

What are the system requirements for using FileVault 2?

A.

The four methods used to eject a volume or disk from the Finder are:

• Drag the disk icon to the Trash in the Dock.

• Press and hold the Eject key for a few moments to unmount and eject optical media.

• Select the volume you want to eject and choose Eject from the File menu.

• In the Finder sidebar, click the small Eject button next to the volume you want to unmount and eject.

B.

To enable FileVault 2, OS X systems must have the hidden OS X Recovery HD volume on the system disk. Further, any Legacy FileVault accounts must be decrypted and returned to normal accounts before FileVault 2 can be enabled.

C.

The system version, build number, and hardware serial number are located in the About This Mac dialog or the login screen. The system version number defines the specific version of OS X currently installed. The system build number is an even more specific identifier used primarily by developers. Finally, the hardware serial number is a unique number used to identify your specific Mac.

D.

Code-signed items include a digital signature that the system can use to verify the authenticity and integrity of the application or process and its resources.

Why does the Finder hide certain folders at the root of the system volume?

A.

The Disk Utility Verify and Repair feature is used to verify or repair the partition scheme and directory structure of a volume. These elements contain the information used to locate files and folders on the volume.

B.

The Finder populates the Network folder using information provided by the dynamic network services discovery protocols. Computers providing services appear as resources inside the Network folder, and service discovery zones or workgroups appear as folders. Any currently connected servers also appear in the Network folder.

C.

The firmware initializes the Mac computer's hardware and locates the booter file on a system volume. The Power-On

Self-Test (POST) checks for basic hardware functionality when the Mac powers on.

D.

The Finder hides traditional UNIX resources from average users because they don't need to have access to those items. If users need access to these UNIX items, they can access them from Terminal.

How can you identify which applications are installed on your Mac?

A.

Three ways to forcibly quit an application from the graphical interface are from the Force Quit Application dialog accessed from the Apple menu; from the Dock application shortcut menu accessed by Control-clicking or right-clicking the application's icon; or from the /Applications/Utilities/ Activity Monitor application.

B.

You can use the System Information application to easily scan all the appropriate application locations and return a list of installed applications.

C.

The Activity Monitor application is used to monitor open processes and applications.

D.

Disk Utility is the primary application for creating and managing disk images.

Before the local user account is created on a system, you must first copy the restored user's home folder to the /Users folder. Then after you create the new user in Users &Groups preferences with the same account name, the system will prompt you to associate the new account with the restored home folder.

A.

How can you verify that a specific network service is available from a service provider?

B.

How does a user that changes his own account password affect his login keychain?

C.

How do you identify the ownership and permissions of a file or folder in the Finder?

D.

How do you make OS X associate a new local user account with a manually migrated or restored user's home folder?

Client software is used to access network services provided by server software. The connection is established using a common network protocol known by both the client and server software. Thus, the client and server software can be from different sources.

A.

What's the best source for acquiring printer drivers for OS X?

B.

What's the relationship between clients and servers as it relates to network service access?

C.

What's target disk mode and how is it engaged?

D.

What's the primary interface for configuring network service applications?