Review the screenshot of part of a Network Utility window, and then answer the question below.
Which statement accurately interprets the Network Utility Lookup results shown above?
A. A forward lookup of mainserver.pretendco.com returned the IP address 10.1.0.1.
B. A reverse lookup of mainserver.pretendco.com returned the IP address 10.1.0.1.
C. A reverse lookup of 10.1.0.1 returned the name mainserver.pretendco.com.
D. The DNS server for mainserver.pretendco.com is pretendco.com.
On your OS X Mountain Lion computer, you want the Finder to display filename extensions by default. How can you configure this setting from the Finder?
A. Choose Preferences from the Finder menu, click Advanced, and select the option "Show all filename extensions."
B. Control-click anywhere on the Desktop, select Preferences from the pop-up menu, click Advanced, and select the option "Show all filename extensions."
C. Choose Show View Options from the View menu, and select the option "Show all filename extensions."
D. Select any file icon, and choose Get Info from the File menu. In the Info window, click the disclosure triangle next to Name and Extension, deselect the option "Hide extension," and click Change All.
Which of these must you know about a corporate VPN server before you can configure the VPN software on an OS X computer to access the corporate network?
A. If the corporate VPN server supports DNSSEC
B. If the corporate VPN server supports PPPoE
C. If the corporate VPN server supports PPTP, L2TP over IPSec, or Cisco IPSec
D. If network protocols will be encapsulated by the corporate VPN server
What's AirDrop, and how do you know if a specific Mac supports it?
A. AirDrop provides a quick and easy method to share files locally via Wi-Fi. AirDrop creates a secure peer-to-peer network between local devices. You can verify that a Mac supports AirDrop from the Finder Go menu.
B. Archive files are much simpler to create in the Finder and are compatible with third-party operating systems. Disk images are more difficult to create and manage, but they offer greater flexibility. Primarily, disk images can be easily modified and converted. However, OS X style disk images aren't compatible with third-party operating systems.
C. The DNS service is used to translate host names to IP addresses via forward lookups and translate IP addresses to host names via reverse lookups. DNS is architected as a hierarchy of worldwide domain servers. Local DNS servers provide name resolution and possibly host names for local clients. These local DNS servers connect to DNS servers higher in the DNS hierarchy to resolve both unknown host names and host local domain names.
D. Any account password reset process won't change any keychain passwords. Therefore, the user's keychains won't automatically open when the user logs in with her new password. The user will have to manually change her keychain passwords using the Keychain Access utility.
The minimum requirements for upgrading OS X Mavericks are:
OS X v10.6.8 or later 2 GB of memory 8 GB of available space Some features require an Apple ID Some features require a compatible Internet service provider Compatible Mac model (as listed on www.apple.com/osx/specs/)
A. What are the minimum hardware requirements for upgrading a system with OS X Mavericks?
B. What are the system requirements for using FileVault 2?
C. What two volume formats are supported for an OS X system volume?
D. What are the requirements for purchasing applications via the Mac App Store?
A Safe Boot performs the following permanent actions: attempting to repair the system volume structure, deleting system KEXT caches, and deleting font caches.
A. How can you acquire the OS X Mavericks installer?
B. Where are the keychain files stored?
C. Which changes are made when OS X Safe Boots?
D. What does the master password do?
How can you ensure that previously deleted items are securely erased?
A. The Finder hides traditional UNIX resources from average users because they don't need to have access to those items. If users need access to these UNIX items, they can access them from Terminal.
B. The four erase options in Disk Utility are: Fastest, which simply replaces the volume's directory structure A second choice, which provides good security by writing zeros on top of all the previous disk data A third choice, which provides even better security by writing three separate passes of information on top of the previous disk data Most Secure, which provides the best security by writing seven separate passes of information on top of the previous disk data
C. The master password is used to reset local account passwords.
D. From the Erase tab in Disk Utility, you can choose to securely erase the free space of a disk or volume. This securely erases any previously deleted files on the selected disk or volume
Key chains are used to store secrets such as resource passwords, digital certificates, and encryption keys. The keychain system can also securely store Safari AutoFill information, Internet Account settings, and secure text notes.
A. What type of items can be found in a keychain?
B. How does file system journaling work?
C. What are the advantages of code signing?
D. What does OS X use bundles or packages for?
What role does the system launchd process serve during system startup?
A. The master password is used to reset local account passwords.
B. A Safe Boot is initiated by holding down the Shift key during system startup
C. The system launchd process is ultimately responsible for starting every system process. It also manages system initialization and starts the login window process.
D. The system version, build number, and hardware serial number are located in the About This Mac dialog or the login screen. The system version number defines the specific version of OS X currently installed. The system build number is an even more specific identifier used primarily by developers. Finally, the hardware serial number is a unique number used to identify your specific Mac.
Improperly unmounting or ejecting a drive or volume may cause data corruption. The system automatically verifies and repairs an improperly unmounted or ejected volume the next time it becomes available to the Mac.
A. What types of files are omitted from Time Machine backups?
B. What role does the system launchd process serve during system startup?
C. What's required to set up the iCloud Keychain service on multiple Apple devices?
D. What's the potential side effect of improperly unmounting or ejecting a disk or volume?