Support Essentials 10.9 Flashcards

1
Q

What are the minimum hardware requirements for upgrading a system with OS X Mavericks

A

The minimum requirements for upgrading OS X Mavericks are:
• OS X v10.6.8 or later

• 2 GB of memory
• 8 GB of available space
• Some features require an Apple ID
Some features require a compatible Internet service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What four preparation steps must you take before upgrading a system with OS X Mavericks?

A

Install Apple software and firmware updates
• Verify application compatibility
• Back up important files and folders
• Document critical settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can you identify if a Mac requires a firmware update?

A

You can identify a Mac computer’s firmware version by opening the full system report in the System Information application or System Profiler application. You can verify if a Mac computer’s firmware is up to date by visiting the Apple support website, which maintains a list of available firmware updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the advantages and disadvantages of using a single- partition disk with OS X? How about a multiple-partition disk?

A

Single-partition drives are easier to set up initially, but they aren’t as flexible for administration and maintenance. Multiple-partition drives require repartitioning during setup but provide several separate partitions, which can be used to segregate user data and host multiple operating systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can you acquire the OS X Mavericks installer?

A

The OS X Mavericks installer can be downloaded from the Mac App Store for free.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What options can you select from during the OS X Mavericks installation?

A

During installation of OS X Mavericks, the only optional choice is to define an installation destination other than the Mac computer’s current default system disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What process is used to guide a user through the initial configuration of OS X Mavericks?

A

The Setup Assistant process guides a user through initial configuration of OS X Mavericks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What key features do you gain by setting up iCloud?

A

iCloud is a free service from Apple that provides cloud storage and communication services for applications, including Mail, Contacts, Calendars, Reminders, Notes, Safari, Keychain, Photos and any other applications that support iCloud integration. iCloud also provides Find My Mac technology for help locating a lost or stolen system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Aside from initial OS X configuration, where can you manage iCloud settings?

A

After initial OS X setup, iCloud settings can be managed from iCloud or Internet Accounts preferences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What three primary sources can Migration Assistant pull from?

A

Migration Assistant can migrate information from other OS X systems, other Windows systems, and other disks, including Time Machine backups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the five System Preference categories?

A

System Preferences is divided into five categories, from top to bottom; Personal, Hardware, Internet & Wireless, System, and Other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do the four default System Preferences categories differ?

A

Generally, Personal preferences affect only a single user; Hardware preferences adjust hardware and peripheral settings; Internet & Wireless preferences affect personal and system network settings; and System Preferences affect all users and often require administrative access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What’s a profile? How are profiles managed?

A

A profile is a document, with the filename extension “.mobileconfig,” that contains system settings as defined by an administrator. Opening a profile document will prompt the system to install the profile and configure the settings. Installed profiles can be managed via Profiles preferences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Where can you locate the system version number, build number, and serial number? What’s the significance of these numbers?

A

The system version, build number, and hardware serial number are located in the About This Mac dialog or the login screen. The system version number defines
the specific version of OS X currently installed. The system build number is an even more specific identifier used primarily by developers. Finally, the hardware serial number is a unique number used to identify your specific Mac.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What utilities are available when started up from OS X Recovery?

A

The OS X Recovery system provides access to Restore System From Time Machine Backup, Install/Reinstall OS X, Get Help Online via Safari, Disk Utility, Startup Disk, Firmware Password Utility, Network Utility, Terminal, and Reset Password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What two resources does the local hidden OS X Recovery HD need to reinstall OS X Mavericks?

A

The local hidden OS X Recovery HD doesn’t include the OS X installation assets. So reinstalling OS X Mavericks from here requires high-speed Internet access and the ability to verify access to the installation assets. Upgraded Mac systems are verified by entering the Apple ID used to purchase OS X Mavericks. Verification is automatic for Mac systems that included OS X Mavericks when purchased new.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What two methods can be used to create an external OS X Recovery disk?

A

The OS X Recovery Disk Assistant can create a small OS X Recovery disk that lacks the OS X installation assets. An OS X Installation disk, which includes the full OS X installation assets, can be created by using the createinstallmedia command line tool found inside the Install OS X Mavericks application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which application can you open to initiate Apple software updates?

A

All Apple software updates are handled via the Mac App Store.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

By default, what items are always installed via automatic software updates?

A

By default, system files and security updates are automatically installed when available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How can you prevent a user from installing software updates?

A

You can prevent automatic updates for all users by disabling the options in App Store preferences. You can further restrict a user’s ability to use the Mac App Store by configuring Parental Controls for the user’s account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which applications are used to manually acquire and install OS X software updates?

A

OS X software updates can be downloaded from the Apple Support website using any modern web browser. Updates take the form of installation packages that are installed via the Installer application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What’s the best way to find which installations have taken place on the system?

A

The Installations section of System Information will show the history of all software installed via the Mac App Store or the OS X Installer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the five types of user accounts in OS X? How are they different?

A

Standard is the default account type; administrative users can make changes to the system; a guest user doesn’t require a password; sharing-only users can access only shared files; and the root user has unlimited access to any file or folder in the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are some security risks associated with each type of user account?

A

Standard user accounts are very secure, assuming they have good passwords. Administrative users can make changes that may negatively affect the system or other user accounts. A guest user could potentially fill shared folders with unwanted files. Sharing-only users are generally very secure as long as you don’t give them too much access to your items. The potential for mayhem with root user access is nearly unlimited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are account attributes

A

Account attributes are the individual pieces of information used to define a user account. Examples include full name, account name, user ID, Universally Unique ID (UUID), group, and home folder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

How can you limit a user account from having full access to all applications?

A

Parental Controls can further limit a user account. Examples include enforcing a simple Finder, limiting applications and widgets, limiting Mac App Store content, setting time limits, and content filtering for several applications included in OS X.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What types of resource contention issues can occur when fast user switching is enabled?

A

Resource contention occurs when fast user switching is enabled and a user tries to access an item another user already has open in the background. Document contention occurs when a user attempts to open a document another user has already opened. Peripheral contention occurs when a user attempts to access a peripheral already in
use by another user’s open application. Application contention occurs when the second user attempts to access an application designed to run only once on a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What security risk related to storage can occur when fast user switching is enabled?

A

When fast user switching is enabled, all users are allowed to see other users’ locally connected disks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What default folders make up a user’s home folder? What are some optional folders in a user’s home folder?

A

The default folders in a user’s home folder are Desktop, Documents, Downloads, Library (hidden), Movies, Music, Pictures, and Public. Optional home folder items include Applications and Sites folders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

When deleting a local user account, what three options does Users & Groups preferences give you for dealing with the user’s home folder content?

A

When deleting a local user account, OS X can archive the home folder content into a compressed disk image, leave the home folder content in the /Users folder, or delete the home folder content. Optionally, OS X can perform a secure erase on the home folder content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

How do you make OS X associate a new local user account with a manually migrated or restored user’s home folder?

A

Before the local user account is created on a system, you must first copy the restored user’s home folder to the /Users folder. Then after you create the new user in Users & Groups preferences with the same account name, the system will prompt you to associate the new account with the restored home folder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What does the master password do?

A

The master password is used to reset local account passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What methods can be used to reset a user’s lost account password?

A

Local account passwords can be reset by an administrator in Users & Groups, the master password at login, an Apple ID at login, a FileVault 2 recovery key at startup, and by the Reset Password application in OS X Recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

How does a user that changes his own account password affect his login keychain?

A

When a user changes his own account password, the system will keep his login keychain password in sync.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

How does resetting a user’s account password affect that user’s login keychain?

A

Any account password reset process won’t change any keychain passwords. Therefore, the user’s keychains won’t automatically open when the user logs in with her new password. The user will have to manually change her keychain passwords using the Keychain Access utility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

How does resetting the master password affect existing Legacy FileVault user accounts?

A

If a master password is reset because it was lost, Legacy FileVault accounts can’t be reset by the new master password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

How can you limit the use of Location Services?

A

The Privacy pane of Security & Privacy preferences can be used to allow or disallow applications’ access to Location Services, Contacts, Calendars, Reminders, social network services, and Accessibility application access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What can you enable to locate a lost Mac system?

A

iCloud Find My Mac allows you to remotely locate a lost Mac system. You enable this feature in iCloud preferences. To locate a lost Mac system, you can use the iCloud website or the Find My iPhone app on an iOS device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

How does the Firmware Password Utility help prevent users from making unauthorized password changes?

A

The Firmware Password Utility prevents users from starting up from another system disk. This in turn prevents them from using an OS X Recovery system to reset local passwords without authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What type of items can be found in a keychain?

A

Keychains are used to store secrets such as resource passwords, digital certificates, and encryption keys. The keychain system can also securely store Safari AutoFill information, Internet Account settings, and secure text notes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

How does the keychain system help protect your information?

A

The keychain system manages encrypted files that are used to securely save your items. By default, every user has login and Local Items keychains that use the same password as his account. Not even other administrative users can access your keychain secrets without knowing the keychain’s password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Where are the keychain files stored?

A

Each user starts with a login keychain saved at /Users/ /Library/Keychain/ login.keychain and a Local Items/iCloud keychain saved in the /Users// Library/Keychains/ folder. Administrative users can manage systemwide authentication assets with the /Library/ Keychain/System.keychain. Finally, Apple maintains several items in /System/Library/Keychains/ for OS X system use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What application is used to manage keychain settings?

A

Keychains can be managed from the /Applications/Utilities/ Keychain Access application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

When and why would you set up an iCloud Security Code?

A

An iCloud Security Code can be set up the first time you enable the iCloud Keychain service for a specific Apple ID. The iCloud Security Code can be used to set up other devices for the iCloud Keychain service and can be used to regain access to the iCloud keychain should you lose all your Apple devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What’s required to set up the iCloud Keychain service on multiple Apple devices?

A

Additional Apple devices must be authorized to use the iCloud Keychain service using a combination of the Apple ID password and another method. One method involves using an iCloud Security Code; the other method is to authorize access from another Apple device that has already been configured for the iCloud Keychain service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

How are disks, partitions, and volumes different from one another?

A

Disks are the actual storage hardware; partitions are logical divisions of a disk used to define the storage space; and volumes, contained inside partitions, are used to define how the individual files and folders are saved to the storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What are the two primary partition schemes for Mac- formatted disks? What are their differences?

A

GUID Partition Table is the default partition scheme on Intel- based Mac computers, and Apple Partition Map is the default partition scheme on PowerPC-based Mac computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What two volume formats are supported for an OS X system volume?

A

The volume formats supported as system volumes for OS X are Mac OS Extended (Journaled) and Mac OS Extended (Journaled, Encrypted).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

How does file system journaling work?

A

File system journaling records what file operations are in progress at any given moment. This way, if a power failure or system crash occurs, after the system restarts, it will be able to quickly verify the integrity of the volume by “replaying” the journal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What are the four erase options available in Disk Utility? How are they all different?

A

Fastest, which simply replaces the volume’s directory structure
• A second choice, which provides good security by writing zeros on top of all the previous disk data
• A third choice, which provides even better security by writing three separate passes of information on top of the previous disk data
• Most Secure, which provides the best security by writing seven separate passes of information on top of the previous disk data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

How does the Secure Empty Trash feature in Finder work?

A

Secure Empty Trash will perform a 7-pass erase on the contents of the Trash folder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

How can you ensure that previously deleted items are securely erased?

A

From the Erase tab in Disk Utility, you can choose to securely erase the free space of a disk or volume. This securely erases any previously deleted files on the selected disk or volume.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

How can you encrypt a disk without losing its contents?

A

From the Finder, you can encrypt a disk without losing its contents by secondary (or Control-) clicking the disk and then choosing Encrypt from the shortcut menu.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What four methods can be used to eject a volume or disk from the Finder?

A

Drag the disk icon to the Trash in the Dock.
• Press and hold the Eject key for a few moments to unmount and eject optical media.
• Select the volume you want to eject and choose Eject from the File menu.
• In the Finder sidebar, click the small Eject button next to the volume you want to unmount and eject.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What’s the potential side effect of improperly unmounting or ejecting a disk or volume?

A

Improperly unmounting or ejecting a drive or volume may cause data corruption. The system automatically verifies and repairs an improperly unmounted or ejected volume the next time it becomes available to the Mac.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

How does FileVault 2 protect a user’s data?

A

FileVault 2 protects the entire system volume and all its data by using strong XTS- AES 128 encryption. During system startup, a FileVault-enabled user must enter her password to decrypt the system volume.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What are the system requirements for using FileVault 2?

A

To enable FileVault 2, OS X systems must have the hidden
OS X Recovery HD volume on the system disk. Further, any Legacy FileVault accounts must be decrypted and returned to normal accounts before FileVault 2 can be enabled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Which users are allowed to unlock a FileVault 2 protected system?

A

Any user that’s FileVault enabled is allowed to unlock a FileVault 2–protected system. This includes any local or cached network user account that was enabled when FileVault 2 was set up or created after FileVault 2 was enabled. Further, administrators may return to Security & Privacy preferences to enable additional accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

How can you unlock a FileVault 2–protected system when all user accounts have lost their passwords?

A

A FileVault 2–protected system can be unlocked using the recovery key that was generated during the FileVault 2 setup process. This key can be entered during system startup, and will allow you to reset the user’s account password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

How do you identify the ownership and permissions of a file or folder in the Finder?

A

An item’s ownership and permissions can be identified using the Info or Inspector windows in the Finder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

How do ACLs differ from standard UNIX file system permissions?

A

Standard UNIX file system permissions allow only for permissions to be set for one owner, one group, and all others. ACLs, on the other hand, allow for an essentially unlimited list of permissions entries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What’s the locked file flag?

A

The locked file flag prevents anyone, including the item’s owner, from editing an item. Only the item’s owner can unlock the item to then allow modification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Why is the root, or beginning, level of a user’s home folder visible to other users?

A

The root level of a user’s home folder is visible to other users so they can navigate to the Public shared folder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

How does the default organization of the file system allow users to safely share local files and folders?

A

Every home folder contains a Public folder that other users can read and a Drop Box folder that other users can write to. All other subfolders in a user’s home folder (except the optional Sites folder) have default permissions that don’t allow access to other users. The Shared folder is also set for all users to share items.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What’s unique about the permissions of the /Users/Shared folder?

A

The Shared folder is set up to allow all users to read and write files, but only the user who owns an item can delete it from the Shared folder. This is accomplished using the sticky bit permissions setting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What does it mean when you choose the option to “ignore volume ownership” in the Finder? What are the security ramifications of ignoring volume ownership?

A

You can choose to ignore ownership on any nonsystem volume. This will ignore any ownership rules and grant any logged-on user unlimited access to the contents of the volume. It’s a potential security risk because it will allow any local user account to have full access to the volume, even if that user didn’t originally mount the volume.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Which two built-in OS X applications can be used to gather information about storage devices?

A

Disk Utility and System Information can both be used to gather information about storage devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What does the Disk Utility Verify and Repair feature do?

A

The Disk Utility Verify and Repair feature is used to verify or repair the partition scheme and directory structure of a volume. These elements contain the information used to locate files and folders on the volume

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What’s target disk mode and how is it engaged?

A

Target disk mode is a Mac-specific hardware feature that, when engaged, will share the Mac computer’s internal disks through the FireWire ports. Target disk mode can be engaged from Startup Disk preferences or by holding down the T key as you turn on the Mac.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

What permissions are modified by the Disk Utility Repair Permissions feature?

A

The Disk Utility Repair Permissions feature repairs only the ownership and permissions for items installed by Apple. However, this may resolve issues with third-party products.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

How can you reset a user’s home folder permissions?

A

A user’s home folder permissions can be reset from the Reset Password application on OS X Recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Why does the Finder hide certain folders at the root of the system volume?

A

The Finder hides traditional UNIX resources from average users because they don’t need to have access to those items. If users need access to these UNIX items, they can access them from Terminal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

What two methods are used to hide items from the Finder?

A

The Finder doesn’t show items with periods at the beginning of their filenames or items with the hidden file flag enabled. Both methods for hiding items can only be managed from the command line interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

What does OS X use bundles or packages for?

A

Bundles and packages are used to combine complex items into individual folders. Packages have the additional advantage of appearing as a single item in the Finder. This allows software developers to combine resources into a single item and prevents users from seeing and potentially damaging those resources through deletion or moving of files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

How does an alias differ from a symbolic link?

A

Both aliases and symbolic links act as a shortcut to an original item. However, an alias contains additional information that allows the system to keep track of the original item if it’s renamed or moved within the same volume. Whereas any change to an original item breaks a symbolic link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What are the four default top-level folders visible in the Finder?

A

The four default top-level folders visible in the Finder are:
• Applications, containing applications all local users have access to
• Library, containing system resources all local users have access to
• System, containing necessary system resources
• Users, containing all the local user home folders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

What are six common system resources? What purpose does each resource serve? Where are they located in the file hierarchy?

A

Six common system resources are:
• Extensions, which attach themselves to the system kernel to provide hardware and peripheral driver support
• Frameworks, which are shared code libraries that provide additional software resources for both applications and system processes
• Fonts
• Preference files, which contain application and system configuration information
• LaunchAgents and LaunchDaemons, used by launchd to provide services that automatically start when needed at system startup, or at user login
• Logs, which are text files that contain error and progress entries from nearly any application or system service

78
Q

What are the four system resource domains? What purpose does each domain serve?

A

The four system resource domains are:
• User, containing applications and system resources specific to each user account
• Local, containing applications and system resources available to all users on the local Mac
• Network (optional), containing applications and system resources available to any Mac that has an automated network share
• System, containing applications and system resources required to provide basic system functionality

79
Q
  1. What purpose does the ~/Library/Containers folder serve? What items will you find in this folder?
A

The ~/Library/Containers folder contains resources for sandboxed applications. The system creates and maintains a separate container folder for each sandboxed application the user opens. A sandboxed application is more secure because it can only access items inside its container.

80
Q

What happens when a user double-clicks a font file?

A

Double-clicking a font file automatically opens a preview of the font in the Font Book application. From here, the user can click the Install Font button to copy the font into ~/Library/ Fonts.

81
Q

How can you identify duplicate fonts?

A

The Font Book application shows a small dot next to the name of any font that has duplicate resources.

82
Q

What’s file system metadata? What are some examples of file system metadata?

A

Metadata is information stored outside of a file or folder. It provides additional information about files and folders. Examples include file flags, extended file attributes, and permissions.

83
Q

What are some of the common file flags used by OS X?

A

Common file flags include the locked flag, which locks files from changes, and the hidden flag, which hides the item in the Finder.

84
Q

What are file system tags? Where can you find tags in the user interface?

A

File system tags are a type of metadata that allow you to quickly assign keywords, or “tags” to any item. The user can customize the tag names and colors.

85
Q

How does the Spotlight search service use metadata?

A

The Spotlight search service creates index databases of file system metadata so that it can perform normally time- intensive searches nearly instantly. File system tags can be found in the Finder sidebar, Spotlight search, and any open or save document dialogs.

86
Q

Where does Spotlight store its metadata index databases? How about the Spotlight plug-ins?

A

Spotlight metadata index databases are stored at the root of every volume in a /.Spotlight-V100 folder. However, a Legacy FileVault user’s database is stored in his encrypted home folder. And the Mail application maintains its own database in each user’s home folder at ~/Library/Mail/V2/MailData/ Envelope Index. Spotlight plug-ins can be located in any of the Library folders in a folder named Spotlight.

87
Q

What are some privacy and security concerns with the Spotlight service?

A

Though Spotlight indexes file and folder permissions, it allows other users to search the contents of locally attached nonsystem volumes when ownership is ignored on those volumes.

88
Q

How do you resolve an issue where a Spotlight search doesn’t find the correct items?

A

Forcing a rebuild of the Spotlight index databases is a common technique to resolve search issues. You can force a rebuild by adding an item to the Spotlight preferences Privacy list, and then removing the item. This deletes the current index database and forces the system to build a new one.

89
Q

What type of file is created by the Finder when you select the Archive option?

A

The Archive option in the Finder creates compressed zip archive files.

90
Q

What OS X application is set as the default for opening archive files?

A

By default on OS X, double-clicking a zip archive causes the system to expand the contents of the zip archive next to the same location as the original zip archive.

91
Q

Which OS X application is responsible for the creation and management of disk images?

A

Disk Utility is the primary application for creating and managing disk images.

92
Q

Why would one use an archive file over a disk image? Why would one use a disk image over an archive file?

A

Archive files are much simpler to create in the Finder and are compatible with third-party operating systems. Disk images are more difficult to create and manage, but they offer greater flexibility. Primarily, disk images can be easily modified and converted. However, OS X style disk images aren’t compatible with third-party operating systems.

93
Q

What backup destination disks does Time Machine support?

A

Time Machine can back up to any Mac OS Extended volume or network shares hosted from Time Capsule or OS X Server.

94
Q

How does Time Machine maintain a backup history of the file system?

A

Time Machine starts with a full copy of the file system to the backup disk. Then it maintains a list of changes to the file system, and every hour copies only the changes to the backup disk. In the backup, it creates a simulation of the full file system using hard links for files that haven’t changed.

95
Q

What types of files are omitted from Time Machine backups?

A

Time Machine always ignores temporary files, Spotlight indexes, items in the Trash, log files, and anything else that can be considered a cache. Time Machine also ignores any files an application has defined as exempt, or any files you have defined as exempt in Time Machine preferences.

96
Q

Why is Time Machine inefficient at backing up large databases?

A

Time Machine is inefficient at backing up large databases because it must back up the entire database file every time any change, no matter how small, is made to the database.

97
Q

Why might a previously backed-up item no longer be available in Time Machine?

A

A previously backed-up item won’t be available if your backup volume filled up and Time Machine had to start deleting older items to make room for newer items.

98
Q

What four methods can be used to restore from a Time Machine backup?

A

Methods for restoring from a Time Machine backup include:
• Navigating through the backup history via the Time Machine application
• Restoring a user account via Migration Assistant
• Restoring an entire system via OS X Recovery
• Manually restoring items via the Finder

99
Q

What are the requirements for purchasing applications via the Mac App Store?

A

The requirements to purchase items from the Mac App Store are OS X v10.6.6 or later, an Apple ID, an Internet connection, and authorization as a local administrator.

100
Q

In the Mac App Store, how can you verify which Apple ID is being used for purchases?

A

In the Mac App Store, you can view the current Apple ID by selecting Store from the menu bar. You can get further details regarding this Apple ID, by selecting View My Account in the same menu.

101
Q

What are the four primary application environments supported by OS X? Which ones require an additional download and installation?

A

The four primary application environments supported by OS X are:
• Native OS X applications, which are created using Cocoa
• UNIX applications, which are primarily accessed via Terminal
• Java applications, which work as cross-platform applications
• X Window System applications, which run inside the popular UNIX windowing environment
OS X doesn’t include the Java application or X Window System runtime, so they must be downloaded and installed after the OS X initial installation.

102
Q

What are the advantages of application sandboxing?

A

Sandboxed applications are only allowed access to specific items. They’re otherwise completely cut off from the rest of the system, so they can’t cause harm. All Mac App Store applications are required to be sandboxed.

103
Q

What are the advantages of code signing?

A

Code-signed items include a digital signature that the system can use to verify the authenticity and integrity of the application or process and its resources.

104
Q

Which items fall under the file quarantine system?

A

Any item downloaded using one of the built-in OS X applications will be marked for quarantine. Third-party applications may not mark downloaded items for quarantine.

105
Q

What three security options does the Gatekeeper system allow? Which Gatekeeper option is the OS X default?

A

Gatekeeper can restrict software to Mac App Store applications only, or Mac App Store and identified developer applications only (this is the default option), or any application regardless of origin.

106
Q

What are the two primary traditional installation methods in OS X?

A

Traditional installation methods are generally categorized as either a drag-and-drop installation, where the user simply copies the application to the local system; or as an installation package, where an installer process places the items on the local system.

107
Q

What three methods can be used to uninstall applications?

A

Three methods for uninstalling applications include:
• Open Launchpad, hold down the Option key, and click the “X” button
• In the Finder, drag the primary application to the Trash and then empty the Trash
• Use a custom-built uninstaller package

108
Q

In OS X, what’s used to identify the type of application that should open when you double-click a document?

A

OS X uses a document’s filename extension to determine the document’s type. The Launch Services process maintains a database of installed applications and which document types they’re capable of opening.

109
Q

How do you engage Quick Look? Which applications support it?

A

Quick Look is engaged by simply pressing the Space bar when a document is selected. Applications that support Quick Look include the Finder, Time Machine, Mail, and most open and save browser dialogs.

110
Q

How is Quick Look able to preview so many file types?

A

Quick Look uses a number of plug-ins that give it the capability to preview documents. These plug-ins live in Quick Look folders in any Library folder on OS X.

111
Q

What’s Auto Save? How can you identify an application that supports Auto Save?

A

Auto Save allows compatible OS X applications to automatically save changes to users’ documents. A user just saves a document once, then never has to think about saving changes again. Applications that support Auto Save feature a Duplicate function in the File menu as opposed to a default Save As function.

112
Q

How deep is the version history of a file when shared via email?

A

Documents sent via email or otherwise copied to a shared location don’t retain any version history.

113
Q

Which applications can manage document locking?

A

Any application that supports Auto Save and the Finder can manage document locking.

114
Q

What interface is the default location for managing documents in iCloud?

A

Documents saved to iCloud can be managed from the application that was used to create and save the document. iCloud documents don’t appear anywhere in the Finder that a user would normally look

115
Q

Where can you adjust application Auto Save and Resume options?

A

You can deselect the option to “Reopen windows when logging back in” from the logout verification dialog. You can deselect the option to “Close windows when quitting an application” from General preferences. Also from General preferences, you can select the option to “Ask to keep changes when closing documents,” which turns off the Auto Save feature.

116
Q

What’s protected memory? What’s 64-bit memory addressing?

A

The system keeps applications from interfering with one another by segregating their memory usage using protected memory. Mac computers with 64-bit-capable processors allow processes to run in 64-bit mode, which allows them to individually access more than 4 GB of memory.

117
Q

Why would you want to open an application in 32-bit mode?

A

Using the Finder Info window you can force an application to open in 32-bit mode. This step is necessary for a 64-bit application to support older 32-bit plug-ins or application resources.

118
Q

How can you identify which applications are installed on your Mac?

A

You can use the System Information application to easily scan all the appropriate application locations and return a list of installed applications.

119
Q

Which application is used to examine open applications on OS X?

A

The Activity Monitor application is used to monitor open processes and applications.

120
Q

What steps should you use when troubleshooting application issues?

A

General application troubleshooting steps include restarting the application, trying another known working document, trying another user account, checking log files, deleting cache files, replacing preference files, and replacing application resources.

121
Q

What three ways can you forcibly quit an application from the graphical interface?

A

The three ways to forcibly quit an application from the graphical interface are from the Force Quit Application dialog accessed from the Apple menu; from the Dock application shortcut menu accessed by Control-clicking or right-clicking the application’s icon; or from the /Applications/Utilities/ Activity Monitor application.

122
Q

What does the diagnostic reporting feature do?

A

The diagnostic reporting feature automatically creates a diagnostic report log any time an application crashes or hangs. The diagnostic report log can be viewed immediately, reported to Apple via the Internet, or viewed later in the / Applications/Utilities/Console application.

123
Q

Where are application preferences stored?

A

Application preferences are almost always stored in the user’s Library folder in the ~/Library/Preferences folder. Newer sandboxed applications must always store their preferences in a ~/Library/Containers//Data/Library/ Preferences folder, where “” is the unique bundle identifier for the application.

124
Q

What file format is often used for preference files? How can you view the content of this type of file?

A

Most application preferences are property lists, which are XML-formatted files that use the “.plist” filename extension. The content of these files can be viewed using Quick Look, and edited using the Xcode development application found on the Mac App Store.

125
Q

What assistive technology features are available in OS X? What system preference enables these features?

A

The OS X assistive technology features include options to assist users who have difficulty seeing, hearing, using the keyboard, or interacting via keyboard, mouse, or trackpad. These features are available from Accessibility preferences.

126
Q

Where are Dashboard widgets installed when you double- click them? What process or processes are responsible for Dashboard widgets?

A

When a user double-clicks a Dashboard widget, the system installs the widget to ~/Library/Widgets. The launchd
process starts the Dashboard process on behalf of the currently logged-in user. All open widgets run inside the Dashboard process.

127
Q

What do the terms “interface,” “protocol,” and “service” mean in relation to computer networks?

A

An interface is any channel through which network data can flow. Hardware network interfaces are defined by physical network connections, and virtual network interfaces are logical network connections that ride on top of hardware network connections.
A protocol is a set of rules used to describe a specific type of network communication. Protocols are necessary for separate network devices to communicate properly. Finally, a network service (as it pertains to Network preferences) is the collection of settings that define a network connection

128
Q

What’s the purpose of Internet Protocol v4 (IPv4) addresses and subnet masks?

A

The Internet Protocol (IP) address identifies the location of a specific network device. IP addresses are the primary identification used by the Internet protocol suite TCP/IP for both local area and wide area networks. Subnet masks are used by network devices to identify their local network range and to determine whether outgoing data is destined for a network device on the LAN.

129
Q

How does IPv4 addressing differ from IPv6 addressing?

A

Most common IP addresses and subnet masks share the same IPv4 formatting. An IPv4 address is a 32-bit number represented in four groups of three-digit numbers, known as octets, separated by periods. Each octet has a value between 0 and 255. An IPv6 address is a 128-bit number that’s presented in eight groups of four-digit hexadecimal numbers separated by colons. This allows for a huge range of addresses, and as a result IPv6 addressing essentially includes subnet information.

130
Q

How does the IP use the MAC address to send messages between computers on a local area network (LAN)?

A

If a network device needs to send data to another network device on the same LAN, it addresses the outgoing packets based on the destination device’s MAC address.

131
Q

How does the IP transfer messages between computers over a wide area network (WAN)?

A

A network client uses the subnet mask to determine whether the destination IP address is on the LAN. If the destination IP address isn’t on the LAN, it’s assumed the destination address is on another network, and the client sends the data to the IP address of the local network router. The network router then sends the data, via a WAN connection, on to another router that it thinks is closer to the destination. This continues across WAN connections from router to router until the data reaches its destination.

132
Q

How is the Domain Name Service (DNS) used to facilitate network naming?

A

The DNS service is used to translate host names to IP addresses via forward lookups and translate IP addresses to host names via reverse lookups. DNS is architected as a hierarchy of worldwide domain servers. Local DNS servers provide name resolution and possibly host names for local clients. These local DNS servers connect to DNS servers higher in the DNS hierarchy to resolve both unknown host names and host local domain names

133
Q

What’s used to identify a Wi-Fi network?

A

A Service Set Identifier, or SSID, is used to identify a Wi-Fi network name and associated configuration.

134
Q

What Wi-Fi authentication protocols are supported by OS X?

A

OS X supports authenticated Wi-Fi via the following authentication protocols: WEP, WPA/WPA2 Personal, and WPA/ WPA2 Enterprise, which includes support for 802.1X authentication.

135
Q

How can an OS X system automatically connect to a Wi-Fi network?

A

A new OS X system can only automatically connect to Wi-Fi networks that have no standard authentication mechanism, otherwise known as an “open network.” However, a configured OS X system can automatically reconnect to authenticated Wi-Fi networks, provided that the appropriate information was saved to the Keychain system.

136
Q

Through what mechanism can a standard user configure Wi- Fi settings?

A

A standard user can connect to any non-WPA Enterprise Wi-Fi network via the Wi-Fi status menu. Because the system Keychain must be modified for WPA Enterprise connections, only an administrative user can establish these types of connections.

137
Q

What’s a network location? Who can access network locations?

A

A network location is a saved state of Network preferences that contains all network interface settings. Only administrators can define network locations, but if more than one location exists, all users can switch between the various network locations via the Apple menu.

138
Q

What interfaces and protocols are supported by default in OS X?

A

OS X supports the following network interfaces and protocols:
• Ethernet IEEE 802.3 family of hardware network interface standards
• Wireless (Wi-Fi) IEEE 802.11 family of hardware network interface standards
• FireWire IEEE 1394 bridged network interface
• Thunderbolt bridged network interface
• Bluetooth wireless hardware network interface
• USB connectivity via cellular network adapters or iOS devices with cellular network service
• Virtual private network (VPN) virtual network interface via the Point-to-Point Tunneling Protocol (PPTP)
• VPN virtual network interface via the Layer 2 Tunneling Protocol (L2TP) over Internet Protocol Security (IPSec)
• VPN virtual network interface via Cisco IPSec
• Point-to-Point Protocol over Ethernet (PPPoE) virtual network interface
• 6 to 4 virtual network interface
• Virtual local area network (VLAN) virtual network interface via the IEEE 802.1Q standard
• Link Aggregation virtual network interface via the IEEE 802.3ad standard
• Transmission Control Protocol/Internet Protocol (TCP/IP), also known as the Internet protocol suite
• Dynamic Host Configuration Protocol (DHCP)
• Domain Name Service (DNS) protocol
• Network Basic Input/Output System (NetBIOS) and Windows Internet Naming Service (WINS) protocols
• Authenticated Ethernet via the 802.1X protocol

139
Q

What functionality does OS X support with the AppleTalk protocol?

A

AppleTalk works only with OS X v10.5 or earlier.

140
Q

How does network service order affect network connectivity?

A

The network service order list is used to determine the primary network service interface if there is more than one active service. All network traffic that isn’t better handled via local connection to an active network service interface is sent to the primary network service interface. So in most cases all WAN traffic, Internet traffic, and DNS resolution is sent through the primary network service interface.

141
Q

In Network preferences, how can you tell which interface is currently being used for network activities?

A

In Network preferences, all network service interfaces with a green status indicator are being used for network activities. However, again, all network traffic that isn’t better handled via a local connection is sent to the primary network service interface. The primary network service interface is the topmost active interface in the listing.

142
Q

What’s the easiest method in OS X to configure VPN settings?

A

The easiest method to configure VPN settings is to use a configuration profile containing all the relevant VPN setup information.

143
Q

How is 802.1X configured on OS X systems?

A

In OS X there are two configuration methods for 802.1X. The first method is automatic configuration via the selection of a Wi-Fi network that requires WPA/WPA2 Enterprise authentication. The second method is “semi-automatic” configuration via an 802.1X configuration profile provided by an administrator.

144
Q

What are four common issues that can interrupt network services on a Mac computer?

A

Four common issues that can interrupt network services on a Mac are:
• Ethernet connectivity issues, which can cause the hardware network interface to become inactive or introduce excessive packet errors
• Wi-Fi connectivity issues caused by the selection of an improper Wi-Fi network or excessive wireless interference
• DHCP service issues, which prevent proper TCP/IP configuration
• DNS service issues, which prevent host name resolution

145
Q

How do network devices acquire and use self-assigned TCP/IP addresses?

A

If DHCP is specified as the configuration for a TCP/IP connection and no DHCP service is available, the device automatically selects a random IP address in the 169.254.xxx.xxx range. It checks the local network to ensure that no other network device is using the randomly generated IP address before it applies the IP address. In most cases, though, this addressing isn’t normal, and it’s often indicative of a problem with DHCP services.

146
Q

How can you identify the MAC addresses for all the Mac computer’s network interfaces?

A

You can identify all the MAC addresses for the Mac computer’s network interfaces from the Info pane of Network Utility.

147
Q

How can you verify basic connectivity to another network host?

A

The Ping tab of Network Utility allows you to test basic connectivity to another network host by sending and then waiting for the return of a ping packet.

148
Q

How can you verify that DNS host name resolution is working?

A

The Lookup tab of Network Utility allows you to test name resolution against the currently configured DNS server.

149
Q

How can you verify that the system can establish a connection to a remote network host?

A

The Traceroute tab of Network Utility allows you to verify the connection hops between your Mac and a remote host.

150
Q

What’s the relationship between clients and servers as it relates to network service access?

A

Client software is used to access network services provided by server software. The connection is established using a common network protocol known by both the client and server software. Thus, the client and server software can be from different sources.

151
Q

What’s the relationship between a network service and a network port?

A

Network services are established using a common network protocol. The protocol specifies which TCP or UDP port number is used for communications.

152
Q

What’s the primary interface for configuring network service applications?

A

Internet Accounts preference is the primary interface in OS X for configuring built-in network applications.

153
Q

Which five network file services can you connect to from the Finder’s Connect to Server dialog?

A

From the “Connect to Server” dialog in the Finder, you can connect to:
• Apple File Protocol (AFP)
• Server Message Blocks/Common Internet File System (SMB/ CIFS)
• SMB2
• Network File System (NFS)
• Web-based Distributed Authoring and Versioning (WebDAV)
• File Transfer Protocol (FTP) network file services

154
Q

How are items inside the Finder’s Network folder populated?

A

The Finder populates the Network folder using information provided by the dynamic network services discovery protocols. Computers providing services appear as resources inside the Network folder, and service discovery zones or workgroups appear as folders. Any currently connected servers also appear in the Network folder.

155
Q

Which two methods can be used to automatically connect a network share?

A

To automatically connect a file share when the user logs in to the system, drag the share from the Finder to the user’s login items in Users & Groups preferences. Or you can drag the share to the right side of the user’s Dock, and it will automatically connect when the user clicks the share’s icon in the Dock.

156
Q

What are three common troubleshooting techniques for issues involving failure to connect to network services?

A

Review Network preferences, review the Network Utility statistics, and attempt to connect to different network services.

157
Q

How can you verify that a specific network service is available from a service provider?

A

To verify a specific service is available from a service provider, first use the Network Utility Ping tab to verify basic connectivity. Then use the Network Utility Port Scan tab to verify the specific service port(s) are open. You should always limit the port scan to the specific ports required for the network service you’re testing.

158
Q

What are some known issues that arise when connecting to network file services?

A

Files with metadata may cause problems for NFS or WebDAV network file systems. Also, avoid AFP 2 services provided by Windows file servers.

159
Q

How does OS X use dynamic network service discovery protocols to access network services?

A

Devices providing a network service advertise their availability via a dynamic network service discovery protocol. Clients looking for services request and receive this information to provide the user with a list of available network service choices.

160
Q

Which two dynamic network service discovery protocols are supported by OS X?

A

OS X supports Bonjour and Server Message Block (SMB), including support for legacy Network Basic Input/Output and Windows Internet Naming Service (NetBIOS and WINS) dynamic network service discovery protocols.

161
Q

Which sharing services can OS X provide?

A

The OS X sharing services include DVD or CD sharing, Screen Sharing, File Sharing, Printer Sharing, Scanner Sharing, Remote Login, Remote Management (ARD), Apple Events, Internet Sharing, and Bluetooth Sharing.

162
Q

What’s the security risk of enabling client sharing services?

A

If a client sharing service is compromised, an unauthorized user can control your Mac and execute unwanted applications or processes.

163
Q

Which application can provide on-demand screen sharing even when the Screen Sharing service isn’t enabled?

A

The Messages application allows for on-demand screen sharing that can be used even when the system screen sharing service isn’t enabled.

164
Q

What’s AirDrop, and how do you know if a specific Mac supports it?

A

AirDrop provides a quick and easy method to share files locally via Wi-Fi. AirDrop creates a secure peer-to-peer network between local devices. You can verify that a Mac supports AirDrop from the Finder Go menu.

165
Q

How does the OS X built-in firewall work?

A

The OS X built-in firewall inspects each incoming network connection to determine if it’s allowed. Connections are allowed or denied on a per-application basis.

166
Q

Which optional firewall settings are available?

A

The optional firewall settings let you control whether signed applications are automatically allowed through the firewall, control the list of allowed (or denied) applications, and enable stealth mode (which means your Mac won’t respond to any unsolicited connections).

167
Q

What are the four primary peripheral bus technologies supported by Mac computers running OS X?

A

The four primary peripheral bus technologies supported by OS X are:
• Universal Serial Bus (USB) • FireWire
• Thunderbolt,
• Bluetooth wireless

168
Q

Which action must take place in order for a Mac to communicate with a Bluetooth peripheral? Where can this be configured?

A

Bluetooth devices must be paired to each other for communication to occur. Bluetooth preferences in the System Preference application is responsible for pairing your Mac with Bluetooth peripherals. You can quickly open Bluetooth preferences from the Bluetooth status menu.

169
Q

What’s a device driver? Which three primary types of device drivers are there?

A

A device driver is software specially designed to facilitate the communication between OS X and a peripheral. Device drivers can be kernel extensions, framework plug-ins, or standalone applications.

170
Q

How does OS X support third-party devices without needing third-party device drivers?

A

OS X uses built-in generic drivers based on each device class. For example, there are generic drivers for scanners and printers that can be used instead of official third-party drivers.

171
Q

What can you infer about a connected peripheral if it doesn’t appear in the System Information application?

A

If a connected peripheral doesn’t appear in System Information, the issue is likely to be hardware related. Troubleshoot accordingly.

172
Q

What does CUPS do?

A

Common UNIX Printing System (CUPS) manages all printing for OS X, including both local and shared printing.

173
Q

What are PPD files responsible for?

A

PostScript Printer Description (PPD) files are printer driver files that instruct the CUPS system on how to communicate with specific printer models.

174
Q

What’s the best source for acquiring printer drivers for OS X?

A

The Apple print drivers are the best source for configuring OS X printers. One method is to let the software update system automatically download and install the appropriate printer drivers. Or you can manually download and install printer drivers from the Apple support website.

175
Q

Under what circumstances can a standard (nonadministrative) user configure a printer?

A

Assuming the default settings for OS X, a standard user can only configure directly attached or local network printers from the Print dialog. Also, the appropriate drivers must be installed before the standard user configuring the printer.

176
Q

How do you share printers with other users?

A

You can enable printer sharing from Print & Scan or Sharing preferences. Note that Windows clients may need additional drivers to access the Mac computer’s shared printers via the IPP protocol.

177
Q

How can you select a new printer driver for a configured printer?

A

It depends on the printer. From Printing & Scanning preferences, sometimes you can simply select a new printer driver from the Options & Supplies dialog. In many cases though, to select a new printer driver for a configured printer you must delete and then re-add the printer.

178
Q

If it appears that all configured printers are having problems, what’s a potential quick fix?

A

If all printers appear to be having problems, a quick fix is to reset the entire printing system by using secondary (or Control-) click in the printer list and then choosing “Reset printing system.”

179
Q

What are the primary system initialization stages in OS X? What are the visual and audible cues of these items?

A

Each primary stage of system initialization can be indicated by the following: firmware, startup chime or bright flash of the power-on light, followed by a light gray screen on the primary display; booter, a dark gray Apple logo on the primary display; kernel, a small dark gray spinning gear or spinning earth icon below the Apple logo; and system launchd, a white screen on all displays followed by the login screen.

180
Q

What does the firmware do? What’s the POST?

A

The firmware initializes the Mac computer’s hardware and locates the booter file on a system volume. The Power-On Self-Test (POST) checks for basic hardware functionality when the Mac powers on.

181
Q

What role does the system launchd process serve during system startup?

A

The system launchd process is ultimately responsible for starting every system process. It also manages system initialization and starts the loginwindow process.

182
Q

Which items are automatically started by the system launchd during the system initialization process?

A

During system initialization, the system launchd process automatically starts /System/ Library/LaunchDaemons, / Library/LaunchDaemons, /Library/StartupItems (via SystemStarter), and the /etc/rc.local UNIX script if it exists.

183
Q

What are the primary user session stages in OS X? What are the visual and audible cues of these items?

A

Each primary stage of the user session can be indicated by the following: the loginwindow process displays the login screen; the user launchd process loads applications like the Finder after user authentication; and the user environment is active any time the user is logged into the system.

184
Q

What’s the difference between launch daemons, startup items, launch agents, and login items?

A

Launch daemons and startup items open during system initialization by the system launchd process on behalf of
the root user. Launch agents and login items open during the initialization of the user environment by the user’s specific
launchd process.

185
Q

What are Safe Sleep and Power Nap?

A

Safe Sleep is a feature of all OS X compatible portable Macs that saves the system’s state to permanent storage in cases where the computer’s battery drains completely. Power Nap is a feature of Mac systems introduced after mid-2011 that use all-flash storage. Power Nap allows the Mac to automatically wake in a low-power mode so the system can perform a variety of application and system updates.

186
Q

What happens during user logout?

A

During user logout, the user’s loginwindow process does the following: requests that all user applications quit; automatically quits any user background processes; runs any logout scripts; records the logout to the main system.log file; resets device permissions and preferences to their defaults; and quits the user’s loginwindow and launchd processes.

187
Q

What happens during system shutdown?

A

At system shutdown, the loginwindow process logs all users out and then tells the kernel to quit all remaining system processes. Once the kernel quits all system processes, the Mac shuts down.

188
Q

Which keyboard shortcut is used to Safe Boot OS X?

A

A Safe Boot is initiated by holding down the Shift key during system startup.

189
Q

Which keyboard shortcut can be used to temporarily choose another startup disk?

A

Holding down the Option key at startup opens Startup Manager, which allows you to temporarily choose another startup disk.

190
Q

Which changes are made when OS X Safe Boots?

A

A Safe Boot performs the following permanent actions: attempting to repair the system volume structure, deleting system KEXT caches, and deleting font caches.

191
Q

Which items aren’t loaded when OS X Safe Boots?

A

When performing a Safe Boot, OS X doesn’t load third-party KEXTs, third-party launch agents, third-party launch daemons, third-party startup items, third-party fonts, any user login items, or any user-specific launch agents.

192
Q

How do you further resolve an issue that disappears when the Mac successfully safe-boots?

A

If an issue disappears when a Safe Boot is successful, you must find and remove the third-party startup resource that caused the issue. The best way to isolate the problem is to start up the Mac in Verbose mode and then observe where the startup process fails. Verbose mode is initiated by holding down Command-V during system startup.