A. It is one of three stripes in a RAID set.
B. It is one of three hard disks in a RAID set.
C. It is one of three file systems on a partition.
D. It is one of three partitions on a hard disk.
Which dynamic service discovery protocol does OS X use to discover devices on a network?
A. SLP
B. AppleTalk
C. Bonjour
D. DynDNS
You have a Mac OS X v10.6.8 computer that has several user accounts. If you install OS X Mountain Lion without first erasing the target volume, what will happen to the 10.6.8 operating system and the existing user accounts?
A. The Installer archives the 10.6.8 OS and installs Mountain Lion. It maintains the user accounts.
B. The Installer upgrades the 10.6.8 OS to Mountain Lion. It maintains the user accounts.
C. The Installer replaces the 10.6.8 OS with Mountain Lion. It archives the user accounts, but they can be restored manually.
D. The Installer erases the 10.6.8 OS and installs Mountain Lion. It archives the user accounts, but they can be restored manually.
Why does the Finder hide certain folders at the root of the system volume?
A. The Disk Utility Verify and Repair feature is used to verify or repair the partition scheme and directory structure of a volume. These elements contain the information used to locate files and folders on the volume.
B. The Finder populates the Network folder using information provided by the dynamic network services discovery protocols. Computers providing services appear as resources inside the Network folder, and service discovery zones or workgroups appear as folders. Any currently connected servers also appear in the Network folder.
C. The firmware initializes the Mac computer's hardware and locates the booter file on a system volume. The Power-On Self-Test (POST) checks for basic hardware functionality when the Mac powers on.
D. The Finder hides traditional UNIX resources from average users because they don't need to have access to those items. If users need access to these UNIX items, they can access them from Terminal.
The Messages application allows for on-demand screen sharing that can be used even when the system screen sharing service isn't enabled.
A. What options can you select from during the OS X Mavericks installation?
B. Which application can provide on-demand screen sharing even when the Screen Sharing service isn't enabled?
C. What application is used to manage keychain settings?
D. Which optional firewall settings are available?
What are the requirements for purchasing applications via the Mac App Store?
A. The Privacy pane of Security and Privacy preferences can be used to allow or disallow applications' access to Location Services, Contacts, Calendars, Reminders, social network services, and Accessibility application access.
B. AppleTalk works only with OS X v10.5 or earlier.
C. The requirements to purchase items from the Mac App Store are OS X v10.6.6 or later, an Apple ID, and an Internet connection.
D. The master password is used to reset local account passwords.
A Safe Boot performs the following permanent actions: attempting to repair the system volume structure, deleting system KEXT caches, and deleting font caches.
A. How can you acquire the OS X Mavericks installer?
B. Where are the keychain files stored?
C. Which changes are made when OS X Safe Boots?
D. What does the master password do?
What are PPD files responsible for?
A. PostScript Printer Description (PPD) files are printer driver files that instruct the CUPS system on how to communicate with specific printer models.
B. If a client sharing service is compromised, an unauthorized user can control your Mac and execute unwanted applications or processes.
C. The Finder hides traditional UNIX resources from average users because they don't need to have access to those items. If users need access to these UNIX items, they can access them from Terminal.
D. Common UNIX Printing System (CUPS) manages all printing for OS X, including both local and shared printing.
How does the default organization of the file system allow users to safely share local files and folders?
A. The volume formats supported as system volumes for OS X are Mac OS Extended (Journaled) and Mac OS Extended (Journaled, Encrypted).
B. The keychain system manages encrypted files that are used to securely save your items. By default, every user has login and Local Items keychains that use the same password as his account. Not even other administrative users can access your keychain secrets without knowing the keychain's password.
C. Every home folder contains a Public folder that other users can read and a Drop Box folder that other users can write to. All other subfolders in a user's home folder (except the optional Sites folder) have default permissions that don't allow access to other users. The Shared folder is also set for all users to share items.
D. The Archive option in the Finder creates compressed zip archive files.
What's unique about the permissions of the /Users/Shared folder?
A. When fast user switching is enabled, all users are allowed to see other users' locally connected disks.
B. The Shared folder is set up to allow all users to read and write files, but only the user who owns an item can delete it from the Shared folder. This is accomplished using the sticky bit permissions setting.
C. The Ping tab of Network Utility allows you to test basic connectivity to another network host by sending and then waiting for the return of a ping packet.
D. You can prevent automatic updates for all users by disabling the options in App Store preferences. You can further restrict a user's ability to use the Mac App Store by configuring Parental Controls for the user's account.