Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

OS X Support Essentials 10.9

Last Update 17 hours ago Total Questions : 218

The OS X Support Essentials 10.9 content is now fully updated, with all current exam questions added 17 hours ago. Deciding to include 9L0-415 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our 9L0-415 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 9L0-415 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any OS X Support Essentials 10.9 practice test comfortably within the allotted time.

Question # 51

Each primary stage of system initialization can be indicated by the following: firmware, startup chime or bright flash of the power-on light, followed by a light gray screen on the primary display; booter, a dark gray Apple logo on the primary display; kernel, a small dark gray spinning gear or spinning earth icon below the Apple logo; and system launchd, a white screen on all displays followed by the login screen.

A.

What are the primary system initialization stages in OS X? What are the visual and audible cues of these items?

B.

What are some privacy and security concerns with the Spotlight service?

C.

What are the advantages of code signing?

D.

Why does the Finder hide certain folders at the root of the system volume?

Question # 52

How do you engage Quick Look? Which applications support it?

A.

The Privacy pane of Security & Privacy preferences can be used to allow or disallow applications ' access to Location Services, Contacts, Calendars, Reminders, social network services, and Accessibility application access.

B.

Quick Look is engaged by simply pressing the Space bar when a document is selected. Applications that support Quick Look include the Finder, Time Machine, Mail, and most open and save browser dialogs.

C.

The Activity Monitor application is used to monitor open processes and applications.

D.

You can use the System Information application to easily scan all the appropriate application locations and return a list of installed applications.

Question # 53

What two methods can be used to create an external OS X Recovery disk?

(No Answer)

A.

The Font Book application shows a small dot next to the name of any font that has duplicate resources.

B.

The OS X Recovery Disk Assistant can create a small OS X Recovery disk that lacks the OS X installation assets. An OS X Installation disk, which includes the full OS X installation assets, can be created by using the create install media command line tool found inside the Install OS X Mavericks application.

C.

The system version, build number, and hardware serial number are located in the About This Mac dialog or the login screen. The system version number defines the specific version of OS X currently installed. The system build number is an even more specific identifier used primarily by developers. Finally, the hardware serial number is a unique number used to identify your specific Mac.

D.

Any item downloaded using one of the built-in OS X applications will be marked for quarantine. Third-party applications may not mark downloaded items for quarantine.

Question # 54

Which application is used to examine open applications on OS X?

A.

The Disk Utility Verify and Repair feature is used to verify or repair the partition scheme and directory structure of a volume. These elements contain the information used to locate files and folders on the volume.

B.

AppleTalk works only with OS X v10.5 or earlier.

C.

The master password is used to reset local account passwords.

D.

The Activity Monitor application is used to monitor open processes and applications.

Question # 55

If DHCP is specified as the configuration for a TCP/IP connection and no DHCP service is available, the device automatically selects a random IP address in the 169.254.xxx.xxx range. It checks the local network to ensure that no other network device is using the randomly generated IP address before it applies the IP address. In most cases, though, this addressing isn ' t normal, and it ' s often indicative of a problem with DHCP services.

A.

How do network devices acquire and use self-assigned TCP/IP addresses?

B.

How do you share printers with other users?

C.

How do you engage Quick Look? Which applications support it?

D.

How can you encrypt a disk without losing its contents?

Question # 56

What ' s a network location? Who can access network locations?

A.

The OS X Mavericks installer can be downloaded from the Mac App Store for free.

B.

The Archive option in the Finder creates compressed zip archive files. An interface is any channel through which network data can flow. Hardware network interfaces are defined by physical network connections, and virtual network interfaces are logical network connections that ride on top of hardware network connections.

C.

A protocol is a set of rules used to describe a specific type of network communication. Protocols are necessary for separate network devices to communicate properly. Finally, a network service (as it pertains to Network preferences) is the collection of settings that define a network connection.

D.

A network location is a saved state of Network preferences that contains all network interface settings. Only administrators can define network locations, but if more than one location exists, all users can switch between the various network locations via the Apple menu.

Question # 57

OS X software updates can be downloaded from the Apple Support website using any modern web browser. Updates take the form of installation packages that are installed via the Installer application.

A.

How can you prevent a user from installing software updates?

B.

What four methods can be used to eject a volume or disk from the Finder?

C.

Which applications are used to manually acquire and install OS X software updates?

D.

Which items aren ' t loaded when OS X Safe Boots?

Question # 58

A user ' s home folder permissions can be reset from the Reset Password application on OS X Recovery.

A.

How can you reset a user ' s home folder permissions?

B.

How can you limit the use of Location Services?

C.

How can you verify basic connectivity to another network host?

D.

How can you identify duplicate fonts?

Question # 59

What ' s the security risk of enabling client sharing services?

A.

If a network device needs to send data to another network device on the same LAN, it addresses the outgoing packets based on the destination device ' s MAC address.

B.

Assuming the default settings for OS X, a standard user can only configure directly attached or local network printers from the Print dialog. Also, the appropriate drivers must be installed before the standard user configuring the printer.

C.

Any application that supports Auto Save and the Finder can manage document locking.

D.

If a client sharing service is compromised, an unauthorized user can control your Mac and execute unwanted applications or processes.

Question # 60

What security risk related to storage can occur when fast user switching is enabled?

A.

When a user changes his own account password, the system will keep his login keychain password in sync.

B.

When fast user switching is enabled, all users are allowed to see other users ' locally connected disks.

C.

The Archive option in the Finder creates compressed zip archive files.

D.

The Finder hides traditional UNIX resources from average users because they don ' t need to have access to those items. If users need access to these UNIX items, they can access them from Terminal.

Go to page: