10.11 All Chapters & Lessons LABELED – Flashcards
Unlock all answers in this set
Unlock answersquestion
C1 L1 Q1. What are the minimum requirements for upgrading a system to OS X El Capitan?
answer
C1 L1 A1. The minimum requirements for upgrading to OS X El Capitan are: OS X v10.6.8 or later 2 GB of memory 8.8 GB of available space Some features require an Apple ID. Some features require a compatible Internet service provider. A compatible Mac model as listed at www.apple.com/osx/how-to-upgrade/.
question
C1 L1 Q2. What four preparation steps should you take before upgrading a system?
answer
C1 L1 A2. The four steps you should take before upgrading a system to OS X are to verify application compatibility, back up important files and folders, back up critical settings, and install Apple software and firmware updates.
question
C1 L1 Q3. How can you determine whether a Mac requires a firmware update?
answer
C1 L1 A3. You can identify a Mac computer's firmware version by opening the full system report in the System Information application or the System Profiler application. You can determine whether a Mac computer's firmware is up to date by visiting the Apple support website, which maintains a list of available firmware updates.
question
C1 L1 Q4. What are the advantages and disadvantages of using a single-partition disk with OS X? How about a multiple-partition disk?
answer
C1 L1 A4. Single-partition disks are easier to set up initially, but they aren't as flexible for administration and maintenance. Multiple-partition disks require repartitioning during setup, but separate partitions can be used to segregate user data and host multiple operating systems.
question
C1 L1 Q5. How can you acquire the OS X El Capitan installer?
answer
C1 L1 A5. The OS X El Capitan installer can be downloaded only from the Mac App Store. It is completely free of charge.
question
C1 L1 Q6. What options can you select from during the OS X installation?
answer
C1 L1 A6. During installation of OS X, the only optional choice is to define an installation destination other than the Mac computer's current default system disk.
question
C1 L1 Q7. When troubleshooting a failed OS X installation, how can you find out more about why the installation may have failed?
answer
C1 L1 A7. Once the system restarts after the failed installation, you can open the Console application and view the resulting /var/log/install.log.
question
C1 L2 Q1. What process is used to guide a user through the initial configuration of OS X?
answer
C1 L2 A1. The Setup Assistant process guides a user through initial configuration of OS X.
question
C1 L2 Q2. What key features do you gain by setting up iCloud?
answer
C1 L2 A2. iCloud is a free service from Apple that provides cloud storage and communication services for applications, including Mail, Contacts, Calendars, Reminders, Notes, services for applications, including Mail, Contacts, Calendars, Reminders, Notes, Safari, Keychain, Photos, and any other applications that support iCloud integration. Safari, Keychain, Photos, and any other applications that support iCloud integration. iCloud also provides Find My Mac technology for help locating a lost or stolen system. iCloud also provides Find My Mac technology for help locating a lost or stolen system.
question
C1 L2 Q3. Aside from initial OS X configuration, where can you manage iCloud settings?
answer
C1 L2 A3. iCloud also provides Find My Mac technology for help locating a lost or stolen system.
question
C1 L2 Q4. What is a profile? How are profiles managed?
answer
C1 L2 A4. A profile is a document with the filename extension .mobileconfig that contains system settings as defined by an administrator. Opening a profile document prompts the system to install the profile and configure the settings. Installed profiles can be managed via Profiles preferences.
question
C1 L2 Q5. Where can you locate the system version number, build number, and serial number? What is the significance of these numbers?
answer
C1 L2 A5. The system version, build number, and hardware serial number are located in the About This Mac window. The system version number defines the specific version of OS X currently installed. The system build number is an even more specific identifier and is used primarily by developers. Finally, the hardware serial number is a unique number used to identify your specific Mac.
question
C1 L3 Q1. What utilities are available when a Mac is started up from OS X Recovery?
answer
C1 L3 A1. The OS X Recovery system provides access to Restore System From Time Machine Backup, Install/Reinstall OS X, Get Help Online via Safari, Disk Utility, Startup Disk, Firmware Password Utility, Network Utility, Terminal, and Reset Password.
question
C1 L3 Q2. What two resources does the local hidden OS X Recovery HD need to reinstall OS X?
answer
C1 L3 A2. The local hidden OS X Recovery HD does not include the OS X installation assets. Thus, reinstalling OS X from there requires high-speed Internet access and the ability to verify access to the installation assets. Upgraded Mac systems are verified by entering the Apple ID used to purchase OS X El Capitan. Conversely, verification is automatic for Mac systems that included OS X El Capitan when purchased new.
question
C1 L3 Q3. What methods can be used to create an external OS X installation disk?
answer
C1 L3 A3. An OS X installation disk, which includes the full OS X installation assets, can be created by using the createinstallmedia command-line tool found inside the Install OS X El Capitan application.
question
C1 L4 Q1. Which application can you open to initiate Apple software updates?
answer
C1 L4 A1. All Apple software updates are handled via the Mac App Store.
question
C1 L4 Q2. By default, what items are always installed via automatic software updates?
answer
C1 L4 A2. By default, system files and security updates are automatically installed when available.
question
C1 L4 Q3. How can you prevent a user from installing software updates?
answer
C1 L4 A3. You can prevent automatic updates for all users by disabling the options in Mac App Store preferences. You can further restrict a user's ability to use the Mac App Store by configuring Parental Controls for the user's account.
question
C1 L4 Q4. Which applications are used to manually acquire and install OS X software updates?
answer
C1 L4 A4. OS X software updates can be downloaded from the Apple Support website using any current web browser. Updates take the form of installation packages that are installed via the Installer application.
question
C1 L4 Q5. What is the best way to find out which installations have taken place on the system?
answer
C1 L4 A5. The Installations section of System Information shows the history of all software installed via the Mac App Store or the OS X Installer.
question
C2 L5 Q1. What are the five types of user accounts in OS X? How are they different?
answer
C2 L5 A1. Standard is the default account type. Administrative users can make changes to the system. A guest user does not require a password. Sharing-only users can access only shared files. The System Administrator, or root user, has unlimited access to any file or folder in the system.
question
C2 L5 Q2. What are some security risks associated with each type of user account?
answer
C2 L5 A2. Standard user accounts are very secure, assuming they have good passwords. Administrative users can make changes that may negatively affect the system or other user accounts. A guest user could potentially fill shared folders with unwanted files. Sharing-only users are generally very secure, as long as you don't give them too much access to your items. The potential for mayhem with root user access is nearly unlimited.
question
C2 L5 Q3. What two password methods are supported by OS X El Capitan for local user accounts?
answer
C2 L5 A3. In OS X El Capitan, local user accounts can take advantage of a locally saved password or a password linked to an Apple ID.
question
C2 L5 Q4. What are account attributes?
answer
C2 L5 A4. Account attributes are the individual pieces of information used to define a user account. Examples include full name, account name, user ID, universally unique identifier (UUID), group, and home folder.
question
C2 L5 Q5. How can you restrict a user account from having full access to all applications?
answer
C2 L5 A5. Parental Controls can be used to further limit a user account. Examples include enforcing a simple Finder, limiting applications and widgets, limiting Mac App Store content, setting time limits, and content filtering for several applications included in OS X.
question
C2 L5 Q6. What types of resource contention issues can occur when fast user switching is enabled?
answer
C2 L5 A6. Resource contention occurs when fast user switching is enabled and a user tries to access an item that another user already has open in the background. Document contention occurs when a user attempts to open a document that another user has already opened. Peripheral contention occurs when a user attempts to access a peripheral already in use by another user's open application. Application contention occurs when the second user attempts to access an application designed to run only once on a system.
question
C2 L5 Q7. What security risk related to storage can occur when fast user switching is enabled?
answer
C2 L5 A7. When fast user switching is enabled, all users are allowed to see other users' locally connected disks.
question
C2 L6 Q1. What default folders make up a user's home folder?
answer
C2 L6 A1. The default folders in a user's home folder are Desktop, Documents, Downloads, Library (hidden), Movies, Music, Pictures, and Public.
question
C2 L6 Q2. When deleting a local user account, what three options does Users & Groups preferences give you for dealing with the user's home folder content?
answer
C2 L6 A2. When deleting a local user account, OS X can archive the home folder content into a compressed disk image, leave the home folder content in the /Users folder, or delete the home folder content. Optionally, OS X can perform a secure erase on the home folder content.
question
C2 L6 Q3. What three primary sources can Migration Assistant pull from?
answer
C2 L6 A3. Migration Assistant can migrate information from other OS X systems, other Windows systems, and other disks, including Time Machine backups.
question
C2 L6 Q4. How do you make OS X associate a new local user account with a manually migrated or restored user's home folder?
answer
C2 L6 A4. Before the local user account is created on a system, you must first copy the restored user's home folder to the /Users folder. Then, once you've created the new user in Users & Groups preferences with the same account name, the system will prompt you to associate the new account with the existing home folder.
question
C2 L7 Q1. What does the master password do?
answer
C2 L7 A1. The master password is used to reset local account passwords.
question
C2 L7 Q2. How do users who change their own account passwords on the local Mac computer affect their login keychains?
answer
C2 L7 A2. When users change their own account passwords, the system keeps their login keychain passwords in sync.
question
C2 L7 Q3. For a user account with an Apple ID password, what options are available when you try to change the password?
answer
C2 L7 A3. When you change the password for a user account with an Apple ID password, you are given the option either to change to a separate, locally saved password or to change the Apple ID password.
question
C2 L7 Q4. What methods can be used to reset a lost user account password?
answer
C2 L7 A4. Local account passwords can be reset by an administrator in Users & Groups preferences, by the master password at login, by a FileVault recovery key at startup, and by the Reset Password application in OS X Recovery. Local accounts with Apple ID passwords can also be reset online via https://appleid.apple.com.
question
C2 L7 Q5. How does resetting a user's account password affect that user's login keychain?
answer
C2 L7 A5. The account password reset process will not change any keychain passwords. Therefore, the user's keychains do not automatically open when the user logs in with the new password. The user will have to manually change keychain passwords using the Keychain Access utility.
question
C2 L7 Q6. How does resetting the master password affect existing Legacy FileVault user accounts?
answer
C2 L7 A6. If a master password is reset because it was lost, Legacy FileVault accounts cannot be reset by the new master password.
question
C2 L7 Q7. How can you limit the use of Location Services?
answer
C2 L7 A7. The Privacy pane of Security & Privacy preferences can be used to allow or disallow applications' access to Location Services, Contacts, Calendars, Reminders, social network services, and Accessibility application access.
question
C2 L7 Q8. How can you ensure that audio recordings used for the Dictation service remain private?
answer
C2 L7 A8. Audio recordings used for the Dictation service are not sent to Apple if the Use Enhanced Dictation feature is enabled in Dictation & Speech preferences.
question
C2 L7 Q9. What can you enable to locate a lost Mac system?
answer
C2 L7 A9. iCloud Find My Mac allows you to remotely locate a lost Mac system. You enable this feature in iCloud preferences. To locate a lost Mac system, you can use the iCloud website or the Find My iPhone app on an iOS device.
question
C2 L7 Q10. How does the Firmware Password Utility help prevent users from making unauthorized password changes?
answer
C2 L7 A10. The Firmware Password Utility prevents users from starting up from another system disk. This in turn prevents them from using an OS X Recovery system to reset local passwords without authorization.
question
C2 L8 Q1. What type of items can be found in a keychain?
answer
C2 L8 A1. Keychains are used to store secrets such as resource passwords, digital certificates, and encryption keys. The keychain system can also securely store Safari AutoFill information, Internet Account settings, and secure text notes.
question
C2 L8 Q2. How does the keychain system help protect your information?
answer
C2 L8 A2. The keychain system manages encrypted files that are used to securely save your items. By default, every user has login and Local Items keychains that use the same password as the user's account. Not even other administrative users can access your keychain secrets without knowing the keychain's password.
question
C2 L8 Q3. Where are the keychain files stored?
answer
C2 L8 A3. Each user starts with a login keychain saved at /Users//Library/Keychain/ login.keychain and a Local Items/iCloud keychain saved in the /Users// Library/Keychains/ folder. Administrative users can manage systemwide authentication assets with the /Library/Keychain/System.keychain. Finally, Apple maintains several items in /System/Library/Keychains/ for OS X system use.
question
C2 L8 Q4. What application is used to manage keychain settings?
answer
C2 L8 A4. Keychains can be managed from the /Applications/Utilities/Keychain Access application.
question
C2 L8 Q5. When and why would you set up an iCloud Security Code?
answer
C2 L8 A5. An iCloud Security Code can be set up the first time you enable the iCloud Keychain service for a specific Apple ID. The iCloud Security Code can be used to set up other devices for the iCloud Keychain service and can be used to regain access to the iCloud keychain should you lose all your Apple devices.
question
C2 L8 Q6. What is required to set up the iCloud Keychain service on multiple Apple devices?
answer
C2 L8 A6. Additional Apple devices must be authorized to use the iCloud Keychain service using a combination of the Apple ID password and another method. One method involves using an iCloud Security Code. The other method is to authorize access from another Apple device that has already been configured for the iCloud Keychain service.
question
C3 L9 Q1. How are disks, partitions, and volumes different from one another?
answer
C3 L9 A1. Disks are the actual storage hardware. Partitions are logical divisions of a disk used to define the storage space. Volumes, contained inside partitions, are used to define how the individual files and folders are saved to the storage.
question
C3 L9 Q2. What are the two primary partition schemes for disks formatted for Mac systems? What are their differences?
answer
C3 L9 A2. GUID Partition Map (GPT) is the default partition scheme on Intel-based Mac computers. Apple Partition Map is the default partition scheme on PowerPC-based Mac computers.
question
C3 L9 Q3. What two volume formats are supported for an OS X system volume?
answer
C3 L9 A3. The volume formats supported as system volumes for OS X are OS X Extended (Journaled) and OS X Extended (Journaled, Encrypted).
question
C3 L9 Q4. How does file system journaling work?
answer
C3 L9 A4. File system journaling records what file operations are in process at any given moment. This way, if a power failure or system crash occurs, after the system restarts it will be able to quickly verify the integrity of the volume by "replaying" the journal.
question
C3 L9 Q5. What is Core Storage, and what two major OS X features are implemented via Core Storage?
answer
C3 L9 A5. Core Storage is an additional file system management layer used by OS X to provide disk encryption as used by FileVault and to combine separate disks as used by Fusion Drive.
question
C3 L9 Q6. What five methods can be used to eject a volume or disk from the Finder?
answer
C3 L9 A6. The five methods used to eject a volume or disk in the Finder are to drag the disk icon to the Trash in the Dock; in the Finder sidebar, click the small Eject button next to the volume you want to eject; select the volume you want to eject and then choose File > Eject; select the volume you want to eject and then use the Command-E keyboard shortcut; and finally, select the volume you want to eject and then use secondary click (or Control-click) to reveal a pop-up menu allowing you to select Eject.
question
C3 L9 Q7. What is the potential side effect of improperly unmounting or ejecting a disk or volume?
answer
C3 L9 A7. Improperly unmounting or ejecting a drive or volume may cause data corruption. The system automatically verifies and repairs an improperly unmounted or ejected volume the next time it becomes available to the Mac.
question
C3 L9 Q8. Which two built-in OS X applications can be used to gather information about storage devices?
answer
C3 L9 A8. Disk Utility and System Information can both be used to gather information about storage devices.
question
C3 L9 Q9. What are the four erase options available in Disk Utility? How are they different?
answer
C3 L9 A9. The four erase options in Disk Utility are Don't Erase Data (fastest), which simply replaces the volume's directory structure; Two-Pass Erase, which writes a pass of random data followed by a second pass of zeros on the disk; 3-Pass Erase, which writes two separate passes of random data followed by a third pass of zeros on the disk; and 7-Pass Erase (most secure), which writes seven separate passes of random and patterned data on the disk.
question
C3 L9 Q10. How can you encrypt a disk without losing its contents?
answer
C3 L9 A10. From the Finder, you can encrypt a disk without losing its contents by secondary (or Control-) clicking the disk and then choosing Encrypt from the shortcut menu.
question
C3 L9 Q11. What does the Disk Utility First Aid feature do?
answer
C3 L9 A11. The Disk Utility First Aid feature is used to verify and repair the partition scheme and directory structure of a volume. These elements contain the information used to locate files and folders on the volume.
question
C3 L9 Q12. What is target disk mode, and how is it engaged?
answer
C3 L9 A12. Target disk mode is a hardware feature specific to Mac systems that, when engaged, shares the Mac computer's internal disks through the FireWire ports. Target disk mode can be engaged from Startup Disk preferences or by holding down the T key as you turn on the Mac.
question
C3 L9 Q13. How can you reset a user's home folder permissions?
answer
C3 L9 A13. A user's home folder permissions can be reset from the Reset Password application on OS X Recovery.
question
C3 L10 Q1. How does FileVault 2 protect a user's data?
answer
C3 L10 A1. FileVault 2 protects the entire system volume and all its data by using strong XTSAES 128 encryption with 256-bit keys. During system startup, an authorized user must enter his or her password to decrypt the system volume.
question
C3 L10 Q2. What are the system requirements for enabling FileVault?
answer
C3 L10 A2. To enable FileVault, OS X systems must have the hidden OS X Recovery HD volume on the system disk. Further, any Legacy FileVault accounts must be decrypted and restored as normal accounts before FileVault system volume encryption can be enabled.
question
C3 L10 Q3. Which users are authorized to unlock a FileVault protected system?
answer
C3 L10 A3. Any user that is FileVault enabled is authorized to unlock a system protected by FileVault. This includes any local or cached network user account that was enabled when FileVault was set up or created after FileVault was enabled. Further, administrators may return to Security & Privacy preferences to enable additional accounts.
question
C3 L10 Q4. When enabling FileVault in Security & Privacy preferences, what two methods can be used to save the FileVault recovery key?
answer
C3 L10 A4. When enabling FileVault in the Security & Privacy preferences, you can either manually save the FileVault recovery key using your own devices or save the recovery key on Apple's servers via an iCloud account.
question
C3 L10 A5. How can you unlock a system protected by FileVault when all user accounts have lost their passwords?
answer
C3 L10 A5. A system protected by FileVault can be unlocked using the recovery key that was generated during the FileVault setup process. This key can be entered manually during system startup or automatically via an iCloud account authenticated in the Reset Password Assistant application in OS X Recovery. Once the recovery key successfully unlocks the system volume, the system allows you to reset the user's account password.
question
C3 L11 Q1. How do you identify the ownership and permissions of a file or folder in the Finder?
answer
C3 L11 A1. An item's ownership and permissions can be identified using the Info or Inspector windows in the Finder.
question
C3 L11 Q2. How do ACLs differ from standard UNIX file system permissions?
answer
C3 L11 A2. Standard UNIX file system permissions allow permissions to be set for only one owner, one group, or all others. ACLs, on the other hand, allow for an essentially unlimited list of permissions entries.
question
C3 L11 Q3. What is the locked file flag?
answer
C3 L11 A3. The locked file flag prevents anyone, including the item's owner, from editing an item. Only the item's owner can unlock the item to then allow modification.
question
C3 L11 Q4. Why is the root, or beginning, level of a user's home folder visible to other users?
answer
C3 L11 A4. The root level of a user's home folder is visible to other users so they can navigate to the Public shared folder.
question
C3 L11 Q5. How does the default organization of the file system allow users to safely share local files and folders?
answer
C3 L11 A5. Every home folder contains a Public folder that other users can read and a Drop Box folder that other users can write to. All other subfolders in a user's home folder (except the optional Sites folder) have default permissions that do not allow access to other users. The Shared folder is also set for all users to share items.
question
C3 L11 Q6. What is unique about the permissions of the /Users/Shared folder?
answer
C3 L11 A6. The Shared folder is set up to allow all users to read and write files, but only the user who owns an item can delete it from the Shared folder. This is accomplished using the sticky bit permissions setting.
question
C3 L11 Q7. What does it mean when you choose the option to "ignore volume ownership" in the Finder? What are the security ramifications of ignoring volume ownership?
answer
C3 L11 A7. You can choose to ignore ownership on any nonsystem volume. This will ignore any ownership rules and grant any logged-on user unlimited access to the contents of the volume. It is a potential security risk because it will allow any local user account to have full access to the volume even if that user did not originally mount the volume.
question
C3 L11 Q8. How does System Integrity Protection (SIP) help ensure that an OS X system remains secure?
answer
C3 L11 A8. SIP prevents users and processes with root access from modifying core OS X system items. Protected items include the /System, /bin, /sbin, and /usr folders along with core system applications.
question
C4 L12 Q1. Why does the Finder hide certain folders at the root of the system volume?
answer
C4 L12 A1. The Finder hides traditional UNIX resources from average users because they don't need access to those items. If users do need access to these UNIX items, they can get to them from Terminal.
question
C4 L12 Q2. What two methods are used to hide items from the Finder?
answer
C4 L12 A2. The Finder does not show items with periods at the beginning of their filenames or items with the hidden file flag enabled. Both methods for hiding items can be managed only from the command-line interface.
question
C4 L12 Q3. What does OS X use bundles and packages for?
answer
C4 L12 A3. Bundles and packages are used to combine complex items into individual folders. Packages have the additional advantage of appearing as a single item in the Finder. This allows software developers to combine resources into a single item and prevents users from seeing and potentially damaging those resources by deleting or moving files.
question
C4 L12 Q4. How does an alias differ from a symbolic link?
answer
C4 L12 A4. Both aliases and symbolic links act as a shortcut to an original item. However, an alias contains additional information that allows the system to keep track of the original item should it be renamed or moved within the same volume. In contrast, any change to an original item breaks a symbolic link.
question
C4 L12 Q5. Why would one use an archive file instead of a disk image? Why would one use a disk image instead of an archive file?
answer
C4 L12 A5. Archive files are much simpler to create in the Finder and are compatible with thirdparty operating systems. Disk images are more difficult to create and manage but offer greater flexibility. Primarily, disk images can be easily modified and converted. However, OS X-style disk images are not compatible with third-party operating systems.
question
C4 L12 Q6. What type of file is created by the Finder when you select the Archive option?
answer
C4 L12 A6. The Archive option in the Finder creates compressed zip archive files.
question
C4 L12 Q7. What action on OS X is set as the default for opening zip archive files?
answer
C4 L12 A7. By default on OS X, double-clicking a zip archive causes the system to expand the contents of the zip archive next to the same location as the original zip archive.
question
C4 L12 Q8. Which OS X application is responsible for the creation and management of disk images?
answer
C4 L12 A8. Disk Utility is the primary application for creating and managing disk images.
question
C4 L13 Q1. What are the four default top-level folders visible in the Finder?
answer
C4 L13 A1. The four default top-level folders visible in the Finder are Applications, containing applications all local users have access to; Library, containing system resources all local users have access to; System, containing necessary system resources; and finally, Users, containing all the local user home folders.
question
C4 L13 Q2. What are six common system resources? What purpose does each resource serve? Where are they located in the file hierarchy?
answer
C4 L13 A2. Six common system resources are extensions, which attach themselves to the system kernel to provide hardware and peripheral driver support; frameworks, which are shared code libraries that provide additional software resources for both applications and system processes; fonts; preference files, which contain application and system configuration information; LaunchAgents and LaunchDaemons, used by launchd to provide services that automatically start when they are needed, at system startup, or at user login; and finally, logs, which are text files that contain error and progress entries from nearly any application or system service.
question
C4 L13 Q3. What are the four system resource domains? What purpose does each domain serve?
answer
C4 L13 A3. The four system resource domains are User, containing applications and system resources specific to each user account; Local, containing applications and system resources available to all users on the local Mac; Network (optional), containing applications and system resources available to any Mac that has an automated network share; and finally, System, containing applications and system resources required to provide basic system functionality.
question
C4 L13 Q4. What purpose does the ~/Library/Containers folder serve? What items are found in this folder?
answer
C4 L13 A4. The ~/Library/Containers folder contains resources for sandboxed applications. The system creates and maintains a separate container folder for each sandboxed application the user opens. A sandboxed application is more secure because it can only access items inside its container.
question
C4 L13 Q5. What purpose does the ~/Library/Group Containers folder serve? What items are found in this folder?
answer
C4 L13 A5. The ~/Library/Group Containers folder contains resources for sandboxed applications that are also shared with other applications. The system creates and maintains a separate group container folder for each sandboxed application that specifies a need to share resources with other applications. Only items intended for sharing will be located in a group containers folder.
question
C4 L13 Q6. What happens when a user double-clicks a font file?
answer
C4 L13 A6. Double-clicking a font file automatically opens a preview of the font in the Font Book application. From here, the user can click the Install Font button to copy the font into ~/Library/Fonts.
question
C4 L13 Q7. How can you identify duplicate fonts?
answer
C4 L13 A7. The Font Book application shows a small dot next to the name of any font that has duplicate resources.
question
C4 L14 Q1. What is file system metadata? What are some examples of file system metadata?
answer
C4 L14 A1. Metadata is information stored outside of a file or folder. It provides additional information about files and folders. Examples include file flags, extended file attributes, and permissions.
question
C4 L14 Q2. What are some of the common file flags used by OS X?
answer
C4 L14 A2. Common file flags include the locked flag, which locks files from changes, and the hidden flag, which hides the item in the Finder.
question
C4 L14 Q3. What are file system tags? Where can you find tags in the user interface?
answer
C4 L14 A3. File system tags are a type of metadata that allows you to quickly assign keywords, or "tags," to any item. The user can customize the tag names and colors.
question
C4 L14 Q4. How does the Spotlight search service use metadata?
answer
C4 L14 A4. The Spotlight search service creates index databases of file system metadata so that it can perform normally time-intensive searches nearly instantly. File system tags can be found in the Finder sidebar, Spotlight search, and any Open or Save document dialogs.
question
C4 L14 Q5. Where does Spotlight store its metadata index databases? How about the Spotlight plug-ins?
answer
C4 L14 A5. Spotlight metadata index databases are stored at the root of every volume in a /.Spotlight-V100 folder. However, Legacy FileVault users' databases are stored in their encrypted home folder. Also, the Mail application maintains its own database in each user's home folder at ~/Library/Mail/V2/MailData/Envelope Index. Spotlight plug-ins can be located in any of the Library folders in a folder named Spotlight.
question
C4 L14 Q6. What are some privacy and security concerns with the Spotlight service?
answer
C4 L14 A6. Though Spotlight indexes file and folder permissions, it allows other users to search the contents of locally attached nonsystem volumes when ownership is ignored on those volumes.
question
C4 L14 Q7. How do you resolve an issue where a Spotlight search doesn't appear to be finding the correct items?
answer
C4 L14 A7. Forcing a rebuild of the Spotlight index databases is a common technique for resolving search issues. You can force a rebuild by adding an item to the Spotlight preferences Privacy list and then removing it. This deletes the current index database and forces the system to build a new one.
question
C4 L15 Q1. What backup destination disks does Time Machine support?
answer
C4 L15 A1. Time Machine can back up to any Mac OS Extended volume or network shares hosted from Time Capsule or OS X Server.
question
C4 L15 Q2. How does Time Machine maintain a backup history of the file system?
answer
C4 L15 A2. Time Machine starts with a full copy of the file system to the backup disk. Then it maintains a list of changes to the file system, and every hour copies only the changes to the backup disk. In the backup, it creates a simulation of the full file system using hard links for files that have not changed.
question
C4 L15 Q3. What types of files are omitted from Time Machine backups?
answer
C4 L15 A3. Time Machine always ignores temporary files, Spotlight indexes, items in the Trash, log files, and anything else that can be considered a cache. Time Machine also ignores any files an application has defined as exempt, or any files you have defined as exempt in Time Machine preferences.
question
C4 L15 Q4. Why is Time Machine inefficient at backing up large databases?
answer
C4 L15 A4. Time Machine is inefficient at backing up large databases because it must back up the entire database file every time any change, no matter how small, is made to the database.
question
C4 L15 Q5. Why might a previously backed-up item no longer be available in Time Machine?
answer
C4 L15 A5. A previously backed-up item will not be available if your backup volume filled up and Time Machine had to start deleting older items to make room for newer ones.
question
C4 L15 Q6. What four methods can be used to restore from a Time Machine backup?
answer
C4 L15 A6. Methods for restoring from a Time Machine backup include navigating through the backup history via the Time Machine application, restoring a user account via Migration Assistant, restoring an entire system via OS X Recovery, and manually restoring items via the Finder.
question
C5 L16 Q1. What are the requirements for purchasing applications via the Mac App Store?
answer
C5 L16 A1. To purchase items from the Mac App Store you need OS X v10.6.6 or later, an Apple ID, an Internet connection, and authorization as a local administrator.
question
C5 L16 Q2. In the Mac App Store, how can you verify which Apple ID is currently being used for purchases?
answer
C5 L16 A2. In the Mac App Store, you can view the current Apple ID by selecting Store from the menu bar. You can get further details on this Apple ID by selecting View My Account in the same menu.
question
C5 L16 Q3. What are the four primary application environments supported by OS X? Which ones require an additional download and installation?
answer
C5 L16 A3. The four primary application environments supported by OS X are native OS X applications; UNIX applications, which are primarily accessed via Terminal; Java applications, which work as cross-platform applications; and X Window System applications (X Window is a popular UNIX windowing environment). OS X does not include the Java application runtime or the X Window System runtime, so they must be downloaded and installed after the OS X initial installation.
question
C5 L16 Q4. What are the advantages of application sandboxing?
answer
C5 L16 A4. Sandboxed applications are allowed access only to specific items. They are otherwise completely cut off from the rest of the system, and are therefore unable to cause undue harm. All Mac App Store applications are required to be sandboxed.
question
C5 L16 Q5. What are the advantages of code signing?
answer
C5 L16 A5. Code-signed items include a digital signature that the system can use to verify the authenticity and integrity of the application or process and its resources.
question
C5 L16 Q6. Which items fall under the file quarantine system?
answer
C5 L16 A6. Any item downloaded using one of the built-in OS X applications will be marked for quarantine. Third-party applications may not mark downloaded items for quarantine.
question
C5 L16 Q7. What three security options does the Gatekeeper system allow? Which Gatekeeper option is the OS X default?
answer
C5 L16 A7. Gatekeeper can restrict software to Mac App Store applications only; to Mac App Store and identified developer applications only (this is the default option); or to any application, regardless of origin.
question
C5 L16 Q8. What are the two primary traditional installation methods in OS X?
answer
C5 L16 A8. Traditional installation methods are generally categorized as either a drag-and-drop installation, where the user simply copies the application to the local system, or as an installation package, where an installer process places the items on the local system.
question
C5 L16 Q9. What three methods can be used to uninstall applications?
answer
C5 L16 A9. Three methods for uninstalling applications are to open Launchpad, hold down the Option button, and then click the X button; in the Finder, drag the primary application to the Trash and then empty the Trash; and most rarely, open a custom-built uninstaller package.
question
C5 L17 Q1. In OS X what is used to identify the type of application that should open when you double-click a document?
answer
C5 L17 A1. OS X uses a document's filename extension to determine the document's type. The Launch Services process maintains a database of installed applications and which document types they are capable of opening.
question
C5 L17 Q2. How do you engage Quick Look? Which applications support it?
answer
C5 L17 A2. Quick Look is engaged by simply pressing the Space bar when a document is selected. Applications that support Quick Look include the Finder, Time Machine, Mail, and most Open and Save browser dialogs.
question
C5 L17 Q3. How is Quick Look able to preview so many file types?
answer
C5 L17 A3. Quick Look uses a number of plug-ins that give it the capability to preview documents. These plug-ins live in Quick Look folders in any Library folder on OS X.
question
C5 L17 Q4. What is Auto Save? How can you identify an application that supports Auto Save?
answer
C5 L17 A4. Auto Save allows compatible OS X applications to automatically save changes to users' documents. After the first time a document is saved, the user never has to think about saving changes again. Applications that support Auto Save feature a Duplicate function in the File menu as opposed to a default Save As function.
question
C5 L17 Q5. How deep is the version history of a file when shared via email?
answer
C5 L17 A5. Documents sent via email or otherwise copied to a shared location do not retain any version history.
question
C5 L17 Q6. Which applications can manage document locking?
answer
C5 L17 A6. Any application that supports Auto Save and the Finder can manage document locking.
question
C5 L17 Q7. What ability is lost when you upgrade an older iCloud account to use iCloud Drive?
answer
C5 L17 A7. When an older iCloud account is upgraded to use iCloud Drive, you will lose the ability to directly access documents from versions of OS X earlier than Yosemite (v10.10) and versions of iOS earlier than iOS 8. Older systems can still access items in iCloud Drive from the iCloud website: www.cloud.com.
question
C5 L17 Q8. Where can you access items saved in iCloud Drive?
answer
C5 L17 A8. iCloud Drive items are available in the Finder or in any application that uses the standard OS X Open or Save dialogs.
question
C5 L17 Q9. Where do you save documents in iCloud Drive if you want to access them from an iOS device?
answer
C5 L17 A9. iOS 8 or later devices can access documents in iCloud Drive only if they are saved in specific application folders. For example, Pages for iOS can access Pages documents only if they are stored in the Pages folder in iCloud Drive.
question
C5 L17 Q10. Where can you adjust application Auto Save and Resume options?
answer
C5 L17 A10. You can deselect the option "Reopen windows when logging back in" from the logout verification dialog. You can deselect the option "Close windows when quitting an application" from General preferences. Also from General preferences, you can select the option "Ask to keep changes when closing documents," which turns off the Auto Save feature.
question
C5 L18 Q1. Why would you want to open an application in 32-bit mode?
answer
C5 L18 A1. Using the Finder Info window, you can force an application to open in 32-bit mode. This step is necessary for a 64-bit application to support older 32-bit plug-ins or application resources.
question
C5 L18 Q2. What four types of capabilities can be added via app extensions in OS X El Capitan?
answer
C5 L18 A2. In OS X El Capitan, app extensions allow features from an application to extend into the Action menu, the Finder, the Sharing menu, and the Today view in Notification Center.
question
C5 L18 Q3. How do you install new app extensions? Once they are installed, how do you manage app extension visibility?
answer
C5 L18 A3. App extensions are installed automatically because they are bundled inside the application providing the extension. You can enable or disable installed app extensions from Extensions preferences.
question
C5 L18 Q4. How can you identify which applications are installed on your Mac?
answer
C5 L18 A4. You can use the System Information application to easily scan all the appropriate application locations and return a list of installed applications.
question
C5 L18 Q5. Which application is used to examine open applications on OS X?
answer
C5 L18 A5. The Activity Monitor application is used to monitor open processes and applications.
question
C5 L18 Q6. What steps should you use when troubleshooting application issues?
answer
C5 L18 A6. General application troubleshooting steps include restarting the application, trying another known working document, trying another user account, checking log files, deleting cache files, replacing preference files, and replacing application resources.
question
C5 L18 Q7. In what three ways can you forcibly quit an application from the graphical interface?
answer
C5 L18 A7. The three ways to forcibly quit an application from the graphical interface are from the Force Quit Application dialog, accessed from the Apple menu; from the Dock application shortcut menu, accessed by secondary (or Control-) clicking the application's icon; and from the /Applications/Utilities/Activity Monitor application.
question
C5 L18 Q8. What does the diagnostic reporting feature do?
answer
C5 L18 A8. The diagnostic reporting feature automatically springs into action anytime an application crashes or hangs. This process creates a diagnostic report log that can be viewed immediately, reported to Apple via the Internet, or viewed later in the /Applications/ Utilities/Console application.
question
C5 L18 Q9. Where are application preferences stored?
answer
C5 L18 A9. Application preferences are almost always stored in the user's Library folder in the ~/Library/Preferences folder. Newer sandboxed applications must always store their preferences in a ~/Library/Containers//Data/Library/Preferences folder, where is the unique bundle identifier for the application.
question
C5 L18 Q10. What file format is often used for preference files? How can you view the content of this type of file?
answer
C5 L18 A10. Most application preferences are property lists, which are XML-formatted files that use the .plist filename extension. The content of these files can be viewed using Quick Look and edited using the Xcode development application found on the Mac App Store.
question
C6 L19 Q1. What do the terms interface, protocol, and service mean in relation to computer networks?
answer
C6 L19 A1. An interface is any channel through which network data can flow. Hardware network interfaces are defined by physical network connections, whereas virtual network interfaces are logical network connections that ride on top of hardware network connections. A protocol is a set of rules used to describe a specific type of network communication. Protocols are necessary for separate network devices to communicate properly. Finally, a network service (as it pertains to Network preferences) is the collection of settings that defines a network connection.
question
C6 L19 Q2. What is the purpose of Internet Protocol v4 (IPv4) addresses and subnet masks?
answer
C6 L19 A2. The Internet Protocol (IP) address identifies the location of a specific network device. IP addresses are the primary identification used by the Internet protocol suite TCP/IP for both local area and wide area networks. Subnet masks are used by network devices to identify their local network range and to determine if outgoing data is destined for a network device on the LAN.
question
C6 L19 Q3. How does IPv4 addressing differ from IPv6 addressing?
answer
C6 L19 A3. Most common IP addresses and subnet masks share the same IPv4 formatting. An IPv4 address is a 32-bit number represented in four groups of three-digit numbers, known as octets, separated by periods. Each octet has a value between 0 and 255. An IPv6 address is a 128-bit number that is presented in eight groups of four-digit hexadecimal numbers separated by colons. This allows for a huge range of addresses, and as a result IPv6 addressing essentially includes subnet information.
question
C6 L19 Q4. How does the IP use the MAC address to send messages between computers on a local area network (LAN)?
answer
C6 L19 A4. If a network device needs to send data to another network device on the same LAN, it addresses the outgoing packets based on the destination device's MAC address.
question
C6 L19 Q5. How does the IP transfer messages between computers over a wide area network (WAN)?
answer
C6 L19 A5. A network client uses the subnet mask to determine if the destination IP address is on the LAN. If the destination IP address is not on the LAN, it's assumed that the destination address is on another network, and the client sends the data to the IP address of the local network router. The network router then sends the data, via a WAN connection, on to another router that it thinks is closer to the destination. This continues across WAN connections from router to router until the data reaches its destination.
question
C6 L19 Q6. How is the Domain Name System (DNS) used to facilitate network naming?
answer
C6 L19 A6. The DNS service is used to translate host names to IP addresses via forward lookups and to translate IP addresses to host names via reverse lookups. DNS is architected as a hierarchy of worldwide domain servers. Local DNS servers provide name resolution, and possibly host names, for local clients. These local DNS servers connect to DNS servers higher in the DNS hierarchy to resolve both unknown host names and local domain names.
question
C6 L19 Q7. What is used to identify a Wi-Fi network?
answer
C6 L19 A7. A Service Set Identifier, or SSID, is used to identify a Wi-Fi network name and associated configuration.
question
C6 L19 Q8. What Wi-Fi authentication protocols are supported by OS X?
answer
C6 L19 A8. OS X supports authenticated Wi-Fi via the following authentication protocols: WEP, WPA/WPA2 Personal, and WPA/WPA2 Enterprise, which includes support for 802.1X authentication.
question
C6 L19 Q9. How can an OS X system automatically connect to a Wi-Fi network?
answer
C6 L19 A9. A new OS X system can only automatically connect to Wi-Fi networks that have no standard authentication mechanism, otherwise known as an "open network." However, a configured OS X system can automatically reconnect to authenticated Wi-Fi networks, provided that the appropriate information was saved to the Keychain system.
question
C6 L19 Q10. Through what mechanism can a standard user configure Wi-Fi settings?
answer
C6 L19 A10. A standard user can connect to any non-WPA Enterprise Wi-Fi network via the Wi-Fi status menu. Because the system keychain must be modified for WPA Enterprise connections, only an administrative user can establish these types of connections.
question
C6 L20 Q1. What is a network location? Who can access network locations?
answer
C6 L20 A1. A network location is a saved state of Network preferences that contains all network interface settings. Only administrators can define network locations, but if more than one location exists, all users can switch between the various network locations via the Apple menu.
question
C6 L20 Q2. What interfaces and protocols are supported by default in OS X?
answer
C6 L20 A2. OS X supports the following network interfaces and protocols: Ethernet IEEE 802.3 family of hardware network interface standards Wireless (Wi-Fi) IEEE 802.11 family of hardware network interface standards FireWire IEEE 1394 bridged network interface Thunderbolt bridged network interface Bluetooth wireless hardware network interface Cellular networks via USB adapters or iOS devices with cellular network service (Personal Hotspot) Virtual private network (VPN) virtual network interface via Point-to-Point Tunneling Protocol (PPTP); Layer 2 Tunneling Protocol (L2TP) over Internet Protocol Security (IPSec); Cisco's IPSec; and Internet Key Exchange version 2 (IKEv2) Transmission Control Protocol/Internet Protocol (TCP/IP), also known as the Internet protocol suite Dynamic Host Configuration Protocol (DHCP) Domain Name Service (DNS) protocol Network Basic Input/Output System (NetBIOS) and Windows Internet Naming Service (WINS) protocols Authenticated Ethernet via the 802.1X protocol
question
C6 L20 Q3. How does network service order affect network connectivity?
answer
C6 L20 A3. The network service order list is used to determine the primary network service interface if there is more than one active service. All network traffic that isn't better handled via local connection to an active network service interface is sent to the primary network service interface. Thus, in most cases, all WAN traffic, Internet traffic, and DNS resolution are sent through the primary network service interface.
question
C6 L20 Q4. In Network preferences, how can you tell which interface is currently being used for network activities?
answer
C6 L20 A4. In Network preferences, all network service interfaces with a green status indicator are being used for network activities. However, all network traffic that isn't better handled via a local connection is sent to the primary network service interface. The primary network service interface is the topmost active interface in the listing.
question
C6 L20 Q5. What is the easiest way in OS X to configure VPN settings?
answer
C6 L20 A5. The easiest way to configure VPN settings is to use a configuration profile containing all the relevant VPN setup information.
question
C6 L20 Q6. How is 802.1X configured on OS X systems?
answer
C6 L20 A6. In OS X there are two configuration methods for 802.1X. The first method is automatic configuration via the selection of a Wi-Fi network that requires WPA/WPA2 Enterprise authentication. The second method is "semi-automatic" configuration via an administrator-provided 802.1X configuration profile.
question
C6 L21 Q1. What are four common issues that can interrupt network services on a Mac?
answer
C6 L21 A1. Four common issues that interrupt network services on Mac computers are: Ethernet connectivity issues can cause the hardware network interface to become inactive or introduce excessive packet errors. Selection of an improper Wi-Fi network or excessive wireless interference can cause Wi-Fi connectivity issues. DHCP service issues prevent proper TCP/IP configuration. DNS service issues prevent host name resolution.
question
C6 L21 Q2. How do network devices acquire and use self-assigned TCP/IP addresses?
answer
C6 L21 A2. If DHCP is specified as the configuration for a TCP/IP connection and no DHCP service is available, the device automatically selects a random IP address in the 169.254.xxx.xxx range. It checks the local network to ensure that no other network device is using the randomly generated IP address before it applies the IP address. In most cases, though, this addressing is not normal, and it's often indicative of a problem with DHCP services.
question
C6 L21 Q3. How can you identify the MAC addresses for all the Mac computer's network interfaces?
answer
C6 L21 A3. You can identify all the MAC addresses for the Mac computer's network interfaces from the Info pane of Network Utility.
question
C6 L21 Q4. How can you verify basic connectivity to another network host?
answer
C6 L21 A4. The Ping tab of Network Utility allows you to test basic connectivity to another network host by sending and then waiting for the return of a ping packet.
question
C6 L21 Q5. How can you verify that DNS host name resolution is working?
answer
C6 L21 A5. The Lookup tab of Network Utility allows you to test name resolution against the currently configured DNS server.
question
C6 L21 Q6. How can you verify that the system can establish a connection to a remote network host?
answer
C6 L21 A6. The Traceroute tab of Network Utility allows you to verify the connection hops between your Mac and a remote host.
question
C7 L22 Q1. What is the relationship between clients and servers as it relates to network service access?
answer
C7 L22 A1. Client software is used to access network services provided by server software. The connection is established using a common network protocol known by both the client and server software. Thus, the client and server software can be from different sources.
question
C7 L22 Q2. What is the relationship between a network service and a network port?
answer
C7 L22 A2. Network services are established using a common network protocol. The protocol specifies which TCP or UDP port number is used for communications.
question
C7 L22 Q3. What is the primary interface for configuring network service applications?
answer
C7 L22 A3. Internet Accounts preferences is the primary interface in OS X for configuring builtin network applications.
question
C7 L22 Q4. What ability is lost when you upgrade an older Notes service account to support rich media in the Notes application?
answer
C7 L22 A4. When an older Notes service account is upgraded to support rich media, the Notes data is saved to iCloud. This means you will lose the ability to directly access your notes from versions of OS X earlier than El Capitan and versions of iOS earlier than iOS 9. Older systems can still access Notes from the iCloud website: www.cloud.com.
question
C7 L22 Q5. How does OS X use dynamic network service discovery protocols to access network services?
answer
C7 L22 A5. Devices providing a network service advertise their availability via a dynamic network service discovery protocol. Clients looking for services request and receive this information to provide the user with a list of available network service choices.
question
C7 L22 Q6. Which two dynamic network service discovery protocols are supported by OS X?
answer
C7 L22 A6. OS X supports Bonjour and Server Message Block (SMB), including support for legacy Network Basic Input/Output and Windows Internet Naming Service (NetBIOS and WINS) dynamic network service discovery protocols.
question
C7 L22 Q7. Which five network file services can you connect to from the Finder's Connect to Server dialog?
answer
C7 L22 A7. From the Finder's Connect to Server dialog, you can connect to Server Message Blocks/Common Internet File System (SMB/CIFS), including SMB2 and SMB3; Apple File Protocol (AFP); Network File System (NFS); Web-based Distributed Authoring and Versioning (WebDAV); and File Transfer Protocol (FTP) network file services.
question
C7 L22 Q8. How are items inside the Finder's Network folder populated?
answer
C7 L22 A8. The Finder populates the Network folder using information provided by the dynamic network services discovery protocols. Computers providing services appear as resources inside the Network folder, whereas service discovery zones or workgroups appear as folders. Any currently connected servers also appear in the Network folder.
question
C7 L22 Q9. Which two methods can be used to automatically connect a network share?
answer
C7 L22 A9. To automatically connect a file share when the user logs in to the system, drag the share from the Finder to the user's login items in Users & Groups preferences. Alternatively, you can drag the share to the right side of the user's Dock, and it will automatically connect when the user clicks the share's icon in the Dock.
question
C7 L22 Q10. What are three common troubleshooting techniques for issues involving failure to connect to network services?
answer
C7 L22 A10. To troubleshoot issues involving failure to connect to network services, review Network preferences, review the Network Utility statistics, and attempt to connect to different network services.
question
C7 L22 Q11. How can you verify that a specific network service is available from a service provider?
answer
C7 L22 A11. To verify that a specific service is available from a service provider, first use the Network Utility Ping tab to verify basic connectivity. Then use the Network Utility Port Scan tab to verify that the specific service ports are open. You should always limit the port scan to the specific ports required for the network service you are testing.
question
C7 L23 Q1. Which sharing services can OS X provide?
answer
C7 L23 A1. The OS X sharing services include DVD or CD sharing, Screen Sharing, File Sharing, Printer Sharing, Scanner Sharing, Remote Login, Remote Management (ARD), Apple Events, Internet Sharing, and Bluetooth Sharing.
question
C7 L23 Q2. What is the security risk of enabling client sharing services?
answer
C7 L23 A2. If a client sharing service is compromised, an unauthorized user can control your Mac and execute unwanted applications or processes.
question
C7 L23 Q3. Which application can provide on-demand screen sharing even when the Screen Sharing service isn't enabled? In OS X El Capitan, what network service(s) does this application-based screen sharing capability rely upon?
answer
C7 L23 A3. The Messages application allows for on-demand screen sharing that can be used even when the system screen sharing service isn't enabled. In OS X El Capitan, Messages screen sharing leverages the iMessage service and requires that users on both Mac computers are signed in to iCloud.
question
C7 L23 Q4. What is AirDrop, and how do you know if a specific Mac supports it?
answer
C7 L23 A4. AirDrop provides a quick and easy method for sharing files locally with other wireless devices. AirDrop creates a secure peer-to-peer network between local devices. You can verify that a Mac supports AirDrop from the Finder Go menu.
question
C7 L23 Q5. Assuming you have a new Mac with OS X El Capitan, what other devices will appear in the AirDrop browser with the default settings?
answer
C7 L23 A5. When you open the AirDrop browser on a late-model Mac computer with OS X El Capitan, it will show only other late-model Mac computers with OS X Yosemite (v10.10) or later and late-model iOS devices with iOS 7 or later.
question
C7 L23 Q6. If other devices with AirDrop enabled are not appearing in the AirDrop browser, what two settings on a Mac can you change to potentially make more devices appear?
answer
C7 L23 A6. On a late model-Mac computer with OS X El Capitan, you'll find two settings at the bottom of the AirDrop browser that control AirDrop discovery. The first setting expands AirDrop discovery from only users in your Contacts to everyone within AirDrop range. The second setting makes AirDrop revert to the previous discovery method, which allows your Mac to discover older Mac computers and Mac computers running previous versions of OS X.
question
C7 L23 Q7. In what primary way does the OS X built-in firewall differ from a traditional network firewall?
answer
C7 L23 A7. With the firewall built into OS X, connections are allowed or denied on a per-application basis. This is unlike traditional network firewalls, where access rules are based on network service port numbers.
question
C7 L23 Q8. Which optional firewall settings are available?
answer
C7 L23 A8. The optional firewall settings enable you to control whether signed applications are automatically allowed through the firewall, control the list of allowed (or denied) applications, and enable stealth mode (which means your Mac will not respond to any unsolicited connections).
question
C8 L24 Q1. What are the four primary peripheral bus technologies supported by Mac computers running OS X?
answer
C8 L24 A1. The four primary peripheral bus technologies supported by OS X are Universal Serial Bus (USB), FireWire, Thunderbolt, and Bluetooth wireless.
question
C8 L24 Q2. Which action must take place for a Mac to communicate with a Bluetooth peripheral? Where can this be configured?
answer
C8 L24 A2. Bluetooth devices must be paired to each other for communication to occur. Bluetooth preferences in the System Preference application is responsible for pairing your Mac with Bluetooth peripherals. You can quickly open Bluetooth preferences from the Bluetooth status menu.
question
C8 L24 Q3. What is a device driver? What are the three primary types of device drivers?
answer
C8 L24 A3. A device driver is software specially designed to facilitate the communication between OS X and a peripheral. Device drivers can be kernel extensions, framework plug-ins, or standalone applications.
question
C8 L24 Q4. How does OS X support third-party devices without needing third-party device drivers?
answer
C8 L24 A4. OS X uses built-in generic drivers for each device class. For example, there are generic drivers for scanners and printers that can be used in lieu of specific third-party drivers.
question
C8 L24 Q5. What can you infer about a connected peripheral if it does not appear in the System Information application?
answer
C8 L24 A5. If a connected peripheral does not appear in System Information, the issue is likely to be hardware related. Troubleshoot accordingly.
question
C8 L25 Q1. What does CUPS do?
answer
C8 L25 A1. Common UNIX Printing System (CUPS) manages all printing for OS X, including both local and shared printing.
question
C8 L25 Q2. What are PPD files responsible for?
answer
C8 L25 A2. PostScript Printer Description (PPD) files are printer driver files that instruct the CUPS system how to communicate with specific printer models.
question
C8 L25 Q3. What is the best source for acquiring printer drivers for OS X?
answer
C8 L25 A3. The Apple printer drivers are the best source for configuring OS X printers. You can let the software update system automatically download and install the appropriate printer drivers. Alternatively, you can manually download and install printer drivers from the Apple support website.
question
C8 L25 Q4. Under what circumstances can a standard (nonadministrative) user configure a printer?
answer
C8 L25 A4. Assuming the default settings for OS X, a standard user can configure only directly attached or local network printers from the Print dialog. Also, the appropriate drivers must be installed before the standard user can configure the printer.
question
C8 L25 Q5. How do you share printers with other users?
answer
C8 L25 A5. You can enable printer sharing from Print & Scan or Sharing preferences. Note that Windows clients may need additional drivers to access the Mac computer's shared printers via the IPP protocol.
question
C8 L25 Q6. How can you select a new printer driver for a configured printer?
answer
C8 L25 A6. It depends on the printer. From Printing & Scanning preferences, sometimes you can simply select a new printer driver from the Options & Supplies dialog. In many cases, though, to select a new printer driver for a configured printer you must delete the driver and then add it again.
question
C8 L25 Q7. If it appears that all configured printers are having issues, what is a potential quick fix?
answer
C8 L25 A7. If all printers appear to be having issues, a quick fix is to reset the entire printing system by using secondary (or Control-) click in the printer list and then choosing "Reset printing system."
question
C8 L26 Q1. What are the primary system initialization stages in OS X? What are the visual and audible cues for these items?
answer
C8 L26 A1. Each primary stage of system initialization can be indicated by the following: firmware, startup chime or bright flash of the power-on light followed by the monitor powering on; booter, an Apple logo on the primary display; kernel, a small progress bar below the Apple logo; and launchd, later parts of the startup progress bar followed by the login screen.
question
C8 L26 Q2. What does the firmware do? What is the POST?
answer
C8 L26 A2. The firmware initializes the Mac computer's hardware and locates the booter file on a system volume. The Power-On Self-Test (POST) checks for basic hardware functionality when your Mac powers on.
question
C8 L26 Q3. What role does the launchd process play during system startup?
answer
C8 L26 A3. The launchd process is ultimately responsible for starting every process and application. Thus, it manages system initialization and starts the loginwindow process.
question
C8 L26 Q4. Which items are automatically started by launchd during the system initialization process?
answer
C8 L26 A4. During system initialization, the system launchd process automatically starts /System/ Library/LaunchDaemons, /Library/LaunchDaemons, and the /etc/rc.local UNIX script, if it exists.
question
C8 L26 Q5. What are the primary user session stages in OS X? What are the visual and audible cues for these items?
answer
C8 L26 A5. Each primary stage of the user session can be indicated by the following: the loginwindow process displays the login screen; the launchd process loads applications like the Finder after user authentication; and the user environment is active anytime the user is logged in to the system.
question
C8 L26 Q6. What is the difference between launch daemons, launch agents, and login items?
answer
C8 L26 A6. Launch daemons can open at any time (including system initialization) via the launchd process on behalf of the root user. Launch agents and login items open also via the launchd process, but only after the initialization of the user environment.
question
C8 L26 Q7. What are Safe Sleep and Power Nap?
answer
C8 L26 A7. Safe Sleep is a feature of all portable Mac computers that saves the system's state to permanent storage in cases where the Mac's battery drains completely. Power Nap is a feature of Mac systems introduced after mid-2011. Power Nap allows the Mac to automatically wake in a low-power mode so that the system can perform a variety of application and system updates.
question
C8 L26 Q8. What happens during user logout?
answer
C8 L26 A8. During user logout, the user's loginwindow process does the following: requests that all user applications quit, automatically quits any user background processes, runs any logout scripts, records the logout to the main system.log file, resets device permissions and preferences to their defaults, and quits the user's loginwindow and launchd processes.
question
C8 L26 Q9. What happens during system shutdown?
answer
C8 L26 A9. At system shutdown, the loginwindow process logs all users out and then tells the kernel to quit all remaining system processes. Once the kernel quits all system processes, the Mac shuts down.
question
C8 L26 Q10. Which keyboard shortcut is used to Safe Boot OS X?
answer
C8 L26 A10. A Safe Boot is initiated by holding down the Shift key during system startup.
question
C8 L26 Q11. Which keyboard shortcut can be used to temporarily choose another startup disk?
answer
C8 L26 A11. Holding the Option key at startup opens Startup Manager, which allows you to temporarily choose another startup disk.
question
C8 L26 Q12. Which changes are made when OS X starts up in Safe Mode?
answer
C8 L26 A12. When OS X starts up in Safe Mode, it performs the following permanent actions: attempting to repair the system volume structure, deleting system KEXT caches, and deleting font caches.
question
C8 L26 Q13. Which items are not loaded when OS X starts up in Safe Mode?
answer
C8 L26 A13. When OS X starts up in Safe Mode, it does not load third-party KEXTs, third-party launch agents, third-party launch daemons, third-party startup items, third-party fonts, any user login items, or any user-specific launch agents.
question
C8 L26 Q14. How do you further resolve an issue that disappears when the Mac successfully starts up in Safe Mode?
answer
C8 L26 A14. If an issue disappears when the Mac successfully starts up in Safe Mode, you must find and remove the third-party startup resource that caused the issue. The best way to isolate the problematic item is to start up the Mac in verbose mode and then observe where the startup process fails. Verbose mode is initiated by holding down Command-V during system startup.