Support Essentials 10.9 Flashcards
What are the minimum hardware requirements for upgrading a system with OS X Mavericks
The minimum requirements for upgrading OS X Mavericks are:
• OS X v10.6.8 or later
• 2 GB of memory
• 8 GB of available space
• Some features require an Apple ID
Some features require a compatible Internet service provider
What four preparation steps must you take before upgrading a system with OS X Mavericks?
Install Apple software and firmware updates
• Verify application compatibility
• Back up important files and folders
• Document critical settings
How can you identify if a Mac requires a firmware update?
You can identify a Mac computer’s firmware version by opening the full system report in the System Information application or System Profiler application. You can verify if a Mac computer’s firmware is up to date by visiting the Apple support website, which maintains a list of available firmware updates.
What are the advantages and disadvantages of using a single- partition disk with OS X? How about a multiple-partition disk?
Single-partition drives are easier to set up initially, but they aren’t as flexible for administration and maintenance. Multiple-partition drives require repartitioning during setup but provide several separate partitions, which can be used to segregate user data and host multiple operating systems.
How can you acquire the OS X Mavericks installer?
The OS X Mavericks installer can be downloaded from the Mac App Store for free.
What options can you select from during the OS X Mavericks installation?
During installation of OS X Mavericks, the only optional choice is to define an installation destination other than the Mac computer’s current default system disk.
What process is used to guide a user through the initial configuration of OS X Mavericks?
The Setup Assistant process guides a user through initial configuration of OS X Mavericks.
What key features do you gain by setting up iCloud?
iCloud is a free service from Apple that provides cloud storage and communication services for applications, including Mail, Contacts, Calendars, Reminders, Notes, Safari, Keychain, Photos and any other applications that support iCloud integration. iCloud also provides Find My Mac technology for help locating a lost or stolen system.
Aside from initial OS X configuration, where can you manage iCloud settings?
After initial OS X setup, iCloud settings can be managed from iCloud or Internet Accounts preferences.
What three primary sources can Migration Assistant pull from?
Migration Assistant can migrate information from other OS X systems, other Windows systems, and other disks, including Time Machine backups.
What are the five System Preference categories?
System Preferences is divided into five categories, from top to bottom; Personal, Hardware, Internet & Wireless, System, and Other.
How do the four default System Preferences categories differ?
Generally, Personal preferences affect only a single user; Hardware preferences adjust hardware and peripheral settings; Internet & Wireless preferences affect personal and system network settings; and System Preferences affect all users and often require administrative access.
What’s a profile? How are profiles managed?
A profile is a document, with the filename extension “.mobileconfig,” that contains system settings as defined by an administrator. Opening a profile document will prompt the system to install the profile and configure the settings. Installed profiles can be managed via Profiles preferences.
Where can you locate the system version number, build number, and serial number? What’s the significance of these numbers?
The system version, build number, and hardware serial number are located in the About This Mac dialog or the login screen. The system version number defines
the specific version of OS X currently installed. The system build number is an even more specific identifier used primarily by developers. Finally, the hardware serial number is a unique number used to identify your specific Mac.
What utilities are available when started up from OS X Recovery?
The OS X Recovery system provides access to Restore System From Time Machine Backup, Install/Reinstall OS X, Get Help Online via Safari, Disk Utility, Startup Disk, Firmware Password Utility, Network Utility, Terminal, and Reset Password.
What two resources does the local hidden OS X Recovery HD need to reinstall OS X Mavericks?
The local hidden OS X Recovery HD doesn’t include the OS X installation assets. So reinstalling OS X Mavericks from here requires high-speed Internet access and the ability to verify access to the installation assets. Upgraded Mac systems are verified by entering the Apple ID used to purchase OS X Mavericks. Verification is automatic for Mac systems that included OS X Mavericks when purchased new.
What two methods can be used to create an external OS X Recovery disk?
The OS X Recovery Disk Assistant can create a small OS X Recovery disk that lacks the OS X installation assets. An OS X Installation disk, which includes the full OS X installation assets, can be created by using the createinstallmedia command line tool found inside the Install OS X Mavericks application.
Which application can you open to initiate Apple software updates?
All Apple software updates are handled via the Mac App Store.
By default, what items are always installed via automatic software updates?
By default, system files and security updates are automatically installed when available.
How can you prevent a user from installing software updates?
You can prevent automatic updates for all users by disabling the options in App Store preferences. You can further restrict a user’s ability to use the Mac App Store by configuring Parental Controls for the user’s account
Which applications are used to manually acquire and install OS X software updates?
OS X software updates can be downloaded from the Apple Support website using any modern web browser. Updates take the form of installation packages that are installed via the Installer application.
What’s the best way to find which installations have taken place on the system?
The Installations section of System Information will show the history of all software installed via the Mac App Store or the OS X Installer.
What are the five types of user accounts in OS X? How are they different?
Standard is the default account type; administrative users can make changes to the system; a guest user doesn’t require a password; sharing-only users can access only shared files; and the root user has unlimited access to any file or folder in the system.
What are some security risks associated with each type of user account?
Standard user accounts are very secure, assuming they have good passwords. Administrative users can make changes that may negatively affect the system or other user accounts. A guest user could potentially fill shared folders with unwanted files. Sharing-only users are generally very secure as long as you don’t give them too much access to your items. The potential for mayhem with root user access is nearly unlimited.
What are account attributes
Account attributes are the individual pieces of information used to define a user account. Examples include full name, account name, user ID, Universally Unique ID (UUID), group, and home folder.
How can you limit a user account from having full access to all applications?
Parental Controls can further limit a user account. Examples include enforcing a simple Finder, limiting applications and widgets, limiting Mac App Store content, setting time limits, and content filtering for several applications included in OS X.
What types of resource contention issues can occur when fast user switching is enabled?
Resource contention occurs when fast user switching is enabled and a user tries to access an item another user already has open in the background. Document contention occurs when a user attempts to open a document another user has already opened. Peripheral contention occurs when a user attempts to access a peripheral already in
use by another user’s open application. Application contention occurs when the second user attempts to access an application designed to run only once on a system.
What security risk related to storage can occur when fast user switching is enabled?
When fast user switching is enabled, all users are allowed to see other users’ locally connected disks.
What default folders make up a user’s home folder? What are some optional folders in a user’s home folder?
The default folders in a user’s home folder are Desktop, Documents, Downloads, Library (hidden), Movies, Music, Pictures, and Public. Optional home folder items include Applications and Sites folders.
When deleting a local user account, what three options does Users & Groups preferences give you for dealing with the user’s home folder content?
When deleting a local user account, OS X can archive the home folder content into a compressed disk image, leave the home folder content in the /Users folder, or delete the home folder content. Optionally, OS X can perform a secure erase on the home folder content.
How do you make OS X associate a new local user account with a manually migrated or restored user’s home folder?
Before the local user account is created on a system, you must first copy the restored user’s home folder to the /Users folder. Then after you create the new user in Users & Groups preferences with the same account name, the system will prompt you to associate the new account with the restored home folder.
What does the master password do?
The master password is used to reset local account passwords.
What methods can be used to reset a user’s lost account password?
Local account passwords can be reset by an administrator in Users & Groups, the master password at login, an Apple ID at login, a FileVault 2 recovery key at startup, and by the Reset Password application in OS X Recovery.
How does a user that changes his own account password affect his login keychain?
When a user changes his own account password, the system will keep his login keychain password in sync.
How does resetting a user’s account password affect that user’s login keychain?
Any account password reset process won’t change any keychain passwords. Therefore, the user’s keychains won’t automatically open when the user logs in with her new password. The user will have to manually change her keychain passwords using the Keychain Access utility.
How does resetting the master password affect existing Legacy FileVault user accounts?
If a master password is reset because it was lost, Legacy FileVault accounts can’t be reset by the new master password.
How can you limit the use of Location Services?
The Privacy pane of Security & Privacy preferences can be used to allow or disallow applications’ access to Location Services, Contacts, Calendars, Reminders, social network services, and Accessibility application access.
What can you enable to locate a lost Mac system?
iCloud Find My Mac allows you to remotely locate a lost Mac system. You enable this feature in iCloud preferences. To locate a lost Mac system, you can use the iCloud website or the Find My iPhone app on an iOS device.
How does the Firmware Password Utility help prevent users from making unauthorized password changes?
The Firmware Password Utility prevents users from starting up from another system disk. This in turn prevents them from using an OS X Recovery system to reset local passwords without authorization.
What type of items can be found in a keychain?
Keychains are used to store secrets such as resource passwords, digital certificates, and encryption keys. The keychain system can also securely store Safari AutoFill information, Internet Account settings, and secure text notes.
How does the keychain system help protect your information?
The keychain system manages encrypted files that are used to securely save your items. By default, every user has login and Local Items keychains that use the same password as his account. Not even other administrative users can access your keychain secrets without knowing the keychain’s password.
Where are the keychain files stored?
Each user starts with a login keychain saved at /Users/ /Library/Keychain/ login.keychain and a Local Items/iCloud keychain saved in the /Users// Library/Keychains/ folder. Administrative users can manage systemwide authentication assets with the /Library/ Keychain/System.keychain. Finally, Apple maintains several items in /System/Library/Keychains/ for OS X system use.
What application is used to manage keychain settings?
Keychains can be managed from the /Applications/Utilities/ Keychain Access application.
When and why would you set up an iCloud Security Code?
An iCloud Security Code can be set up the first time you enable the iCloud Keychain service for a specific Apple ID. The iCloud Security Code can be used to set up other devices for the iCloud Keychain service and can be used to regain access to the iCloud keychain should you lose all your Apple devices.
What’s required to set up the iCloud Keychain service on multiple Apple devices?
Additional Apple devices must be authorized to use the iCloud Keychain service using a combination of the Apple ID password and another method. One method involves using an iCloud Security Code; the other method is to authorize access from another Apple device that has already been configured for the iCloud Keychain service.
How are disks, partitions, and volumes different from one another?
Disks are the actual storage hardware; partitions are logical divisions of a disk used to define the storage space; and volumes, contained inside partitions, are used to define how the individual files and folders are saved to the storage.
What are the two primary partition schemes for Mac- formatted disks? What are their differences?
GUID Partition Table is the default partition scheme on Intel- based Mac computers, and Apple Partition Map is the default partition scheme on PowerPC-based Mac computers.
What two volume formats are supported for an OS X system volume?
The volume formats supported as system volumes for OS X are Mac OS Extended (Journaled) and Mac OS Extended (Journaled, Encrypted).
How does file system journaling work?
File system journaling records what file operations are in progress at any given moment. This way, if a power failure or system crash occurs, after the system restarts, it will be able to quickly verify the integrity of the volume by “replaying” the journal.
What are the four erase options available in Disk Utility? How are they all different?
Fastest, which simply replaces the volume’s directory structure
• A second choice, which provides good security by writing zeros on top of all the previous disk data
• A third choice, which provides even better security by writing three separate passes of information on top of the previous disk data
• Most Secure, which provides the best security by writing seven separate passes of information on top of the previous disk data
How does the Secure Empty Trash feature in Finder work?
Secure Empty Trash will perform a 7-pass erase on the contents of the Trash folder.
How can you ensure that previously deleted items are securely erased?
From the Erase tab in Disk Utility, you can choose to securely erase the free space of a disk or volume. This securely erases any previously deleted files on the selected disk or volume.
How can you encrypt a disk without losing its contents?
From the Finder, you can encrypt a disk without losing its contents by secondary (or Control-) clicking the disk and then choosing Encrypt from the shortcut menu.
What four methods can be used to eject a volume or disk from the Finder?
Drag the disk icon to the Trash in the Dock.
• Press and hold the Eject key for a few moments to unmount and eject optical media.
• Select the volume you want to eject and choose Eject from the File menu.
• In the Finder sidebar, click the small Eject button next to the volume you want to unmount and eject.
What’s the potential side effect of improperly unmounting or ejecting a disk or volume?
Improperly unmounting or ejecting a drive or volume may cause data corruption. The system automatically verifies and repairs an improperly unmounted or ejected volume the next time it becomes available to the Mac.
How does FileVault 2 protect a user’s data?
FileVault 2 protects the entire system volume and all its data by using strong XTS- AES 128 encryption. During system startup, a FileVault-enabled user must enter her password to decrypt the system volume.
What are the system requirements for using FileVault 2?
To enable FileVault 2, OS X systems must have the hidden
OS X Recovery HD volume on the system disk. Further, any Legacy FileVault accounts must be decrypted and returned to normal accounts before FileVault 2 can be enabled.
Which users are allowed to unlock a FileVault 2 protected system?
Any user that’s FileVault enabled is allowed to unlock a FileVault 2–protected system. This includes any local or cached network user account that was enabled when FileVault 2 was set up or created after FileVault 2 was enabled. Further, administrators may return to Security & Privacy preferences to enable additional accounts.
How can you unlock a FileVault 2–protected system when all user accounts have lost their passwords?
A FileVault 2–protected system can be unlocked using the recovery key that was generated during the FileVault 2 setup process. This key can be entered during system startup, and will allow you to reset the user’s account password.
How do you identify the ownership and permissions of a file or folder in the Finder?
An item’s ownership and permissions can be identified using the Info or Inspector windows in the Finder.
How do ACLs differ from standard UNIX file system permissions?
Standard UNIX file system permissions allow only for permissions to be set for one owner, one group, and all others. ACLs, on the other hand, allow for an essentially unlimited list of permissions entries.
What’s the locked file flag?
The locked file flag prevents anyone, including the item’s owner, from editing an item. Only the item’s owner can unlock the item to then allow modification.
Why is the root, or beginning, level of a user’s home folder visible to other users?
The root level of a user’s home folder is visible to other users so they can navigate to the Public shared folder.
How does the default organization of the file system allow users to safely share local files and folders?
Every home folder contains a Public folder that other users can read and a Drop Box folder that other users can write to. All other subfolders in a user’s home folder (except the optional Sites folder) have default permissions that don’t allow access to other users. The Shared folder is also set for all users to share items.
What’s unique about the permissions of the /Users/Shared folder?
The Shared folder is set up to allow all users to read and write files, but only the user who owns an item can delete it from the Shared folder. This is accomplished using the sticky bit permissions setting.
What does it mean when you choose the option to “ignore volume ownership” in the Finder? What are the security ramifications of ignoring volume ownership?
You can choose to ignore ownership on any nonsystem volume. This will ignore any ownership rules and grant any logged-on user unlimited access to the contents of the volume. It’s a potential security risk because it will allow any local user account to have full access to the volume, even if that user didn’t originally mount the volume.
Which two built-in OS X applications can be used to gather information about storage devices?
Disk Utility and System Information can both be used to gather information about storage devices.
What does the Disk Utility Verify and Repair feature do?
The Disk Utility Verify and Repair feature is used to verify or repair the partition scheme and directory structure of a volume. These elements contain the information used to locate files and folders on the volume
What’s target disk mode and how is it engaged?
Target disk mode is a Mac-specific hardware feature that, when engaged, will share the Mac computer’s internal disks through the FireWire ports. Target disk mode can be engaged from Startup Disk preferences or by holding down the T key as you turn on the Mac.
What permissions are modified by the Disk Utility Repair Permissions feature?
The Disk Utility Repair Permissions feature repairs only the ownership and permissions for items installed by Apple. However, this may resolve issues with third-party products.
How can you reset a user’s home folder permissions?
A user’s home folder permissions can be reset from the Reset Password application on OS X Recovery.
Why does the Finder hide certain folders at the root of the system volume?
The Finder hides traditional UNIX resources from average users because they don’t need to have access to those items. If users need access to these UNIX items, they can access them from Terminal.
What two methods are used to hide items from the Finder?
The Finder doesn’t show items with periods at the beginning of their filenames or items with the hidden file flag enabled. Both methods for hiding items can only be managed from the command line interface.
What does OS X use bundles or packages for?
Bundles and packages are used to combine complex items into individual folders. Packages have the additional advantage of appearing as a single item in the Finder. This allows software developers to combine resources into a single item and prevents users from seeing and potentially damaging those resources through deletion or moving of files.
How does an alias differ from a symbolic link?
Both aliases and symbolic links act as a shortcut to an original item. However, an alias contains additional information that allows the system to keep track of the original item if it’s renamed or moved within the same volume. Whereas any change to an original item breaks a symbolic link.
What are the four default top-level folders visible in the Finder?
The four default top-level folders visible in the Finder are:
• Applications, containing applications all local users have access to
• Library, containing system resources all local users have access to
• System, containing necessary system resources
• Users, containing all the local user home folders