Support 10.10 Exam Prep
Support 10.10 Exam Prep
Support 10.10 Exam Prep
Contents
About This Guide ..............................................................................................................3
Exam Details .......................................................................................................................4
Recommended Exam Preparation .............................................................................4
Part One: Installation and Configuration ................................................................6
Part Two: User Accounts .................................................................................................11
Part Three: File Systems ..................................................................................................17
Part Four: Data Management.......................................................................................23
Part Five: Applications and Processes.......................................................................28
Part Six: Network Configuration .................................................................................35
Part Seven: Network Services.......................................................................................41
Part Eight: System Management ................................................................................45
TM and 2015 Apple Inc. All rights reserved. Other product and company names mentioned herein may be trademarks of
their respective companies. Mention of third-party products is for information purposes only and constitutes neither an
endorsement nor a warranty. Apple assumes no responsibility with regard to the selection, performance, or use of these
vendors or products.
Exam Details
The Apple Pro Training Series book OSX Support Essentials 10.10 by Kevin M.
White and Gordon Davisson prepares you to take the certification exam to
earn Apple Certified Support Professional certification.
The OS X Support Essentials 10.10 Exam is a computer-based test oered at
Apple Authorized Training Centers (AATCs). To find the closest AATC, visit
training.apple.com/locations.
Many AATCs schedule certification exam sessions at training.apple.com/
schedule. If you dont see a session scheduled at your nearest AATC,
contact the AATC to find out whether a session can be scheduled. Note: All
AATCs oer all OSX and pro apps exams, even if they dont oer the
corresponding course.
The OS X Support Essentials 10.10 Exam details are as follows:
The exam timer doesnt start until you view the first technical question. You
may not access any resources or references during the exam.
If you have questions about exams, please visit training.apple.com/
certification/faq.
Given a Mac with Internet access, identify the latest version of firmware
thats available for the computer.
Describe how keeping operating system data and user data separate
can be simplified by installing OS X on a multiple-partition drive.
List the utilities available to the user when a Mac is booted from the
OS X recovery volume.
Given a Mac with OS X installed, verify that the computer meets the
minimum hardware requirements to install the latest OS X software.
State the types and sources of data that Migration Assistant can
migrate data from.
Given a Mac with OS X installed, identify any updates that have been
installed.
Define the system terms version number, build number, and serial
number as they pertain to an installation of OS X.
Answers
1. The minimum requirements for upgrading OS X Yosemite are:
Mac OS X v10.6.8 or later
2GB of memory
8GB of available space
Some features require an Apple ID
Some features require a compatible Internet service
provider
Compatible Mac model (as listed on http://
www.apple.com/osx/how-to-upgrade/)
2. Four steps you should take before upgrading a system to
OS X Yosemite are:
Verify application compatibility
7
Answers
1. The Setup Assistant process guides a user through initial
configuration of OS X.
2. iCloud is a free service from Apple that provides cloud
storage and communication services for applications,
including Mail, Contacts, Calendars, Reminders, Notes, Safari,
8
Answers
1. The OS X Recovery System provides access to Restore System
From Time Machine Backup, Install/Reinstall OS X, Get Help
Online via Safari, Disk Utility, Startup Disk, Firmware Password
Utility, Network Utility, Terminal, and Reset Password.
2. The local hidden OS X Recovery HD doesnt include the OS X
installation assets. So reinstalling OS X from here requires
high-speed Internet access and the ability to verify access to
the installation assets. Upgraded Mac systems are verified by
entering the Apple ID used to purchase OS X Yosemite.
Verification is automatic for Mac systems that included OS X
Yosemite when purchased new.
Answers
1. All Apple software updates are handled via the Mac App
Store.
2. By default, system files and security updates are automatically
installed when available.
3. You can prevent automatic updates for all users by disabling
the options in App Store preferences. You can further restrict
a users ability to use the Mac App Store by configuring
parental controls for the users account.
4. OS X software updates can be downloaded from the Apple
Support website using any current web browser. Updates
take the form of installation packages that are installed via
the installer application.
5. The Installations section of System Information will show the
history of all software installed via the Mac App Store or the
OS X Installer.
10
Describe three errors that can occur when fast user switching is
enabled and two users access the same file or peripheral in OS X.
Describe errors that can occur when fast user switching is enabled and
two users access a specific application at the same time.
Describe a security risk that can result when fast user switching is
enabled and other local users switch to their accounts.
11
Answers
1. Standard is the default account type, administrative users can
make changes to the system, a guest user doesnt require a
password, sharing-only users can access only shared files, and
the root user has unlimited access to any file or folder in the
system.
12
13
Answers
1. The default folders in a users home folder are Desktop,
Documents, Downloads, Library (hidden), Movies, Music,
Pictures, and Public. Optional home folder items include
Applications and Sites folders.
2. When deleting a local user account, OS X can archive the
home folder content into a compressed disk image, leave the
home folder content in the /Users folder, or delete the home
folder content. Optionally, OS X can perform a secure erase on
the home folder content.
3. Migration Assistant can migrate information from other OS X
systems, other Windows systems, and other disks, including
Time Machine backups.
4. Before the local user account is created on a system, you
must first copy the restored users home folder to the /Users
folder. Then after you create the new user in Users & Groups
preferences with the same account name, the system will
prompt you to associate the new account with the restored
home folder.
Answers
1. The master password is used to reset local account
passwords.
14
15
Answers
1. Keychains are used to store secrets such as resource
passwords, digital certificates, and encryption keys. The
keychain system can also securely store Safari AutoFill
information, Internet Account settings, and secure text notes.
2. The keychain system manages encrypted files that are used
to securely save your items. By default, all users have login
and Local Items keychains that use the same password as
their account. Not even other administrative users can access
your keychain secrets without knowing the keychains
password.
3. Each user starts with a login keychain saved at /Users/
<username>/Library/Keychain/ login.keychain and a Local
Items/iCloud keychain saved in the /Users/<username>/
Library/Keychains/<UUID> folder. Administrative users can
manage systemwide authentication assets with the /Library/
Keychain/System.keychain. Finally, Apple maintains several
items in /System/Library/Keychains/ for OS X system use.
4. Keychains can be managed from the /Applications/Utilities/
Keychain Access application.
5. An iCloud Security Code can be set up the first time you
enable the iCloud Keychain service for a specific Apple ID. The
iCloud Security Code can be used to set up other devices for
the iCloud Keychain service and can be used to regain access
to the iCloud keychain if you lose all your Apple devices.
6. Additional Apple devices must be authorized to use the
iCloud Keychain service using a combination of the Apple ID
password and another method. One method involves using
an iCloud Security Code, the other method is to authorize
access from another Apple device that has already been
configured for the iCloud Keychain service.
16
Describe the tools and methods used to gather information about the
format, partition scheme, bus type, and available space on local hard
disks and volumes.
Describe the function of the Secure Empty Trash feature in the Finder.
Describe how power failures and force ejecting a disk can corrupt a
volume.
17
Describe how the Get Info window in the Finder can be used to
manage permissions for files and folders.
Describe how Disk Utility can be used to repair permissions for files
and folders.
Given a Mac with OS X installed, identify the owner and group for any
file.
Describe how anyone can access any file on the drive while ownership
is ignored.
Identify the owner and group permission settings for users home
folders in OS X.
18
Answers
1. Disks are the actual storage hardware; partitions are logical
divisions of a disk used to define the storage space; and
volumes, contained inside partitions, are used to define how
the individual files and folders are saved to the storage.
2. GUID Partition Table is the default partition scheme on Intelbased Mac computers, and Apple Partition Map is the default
partition scheme on PowerPC-based Mac computers.
3. The volume formats supported as system volumes for OS X
are Mac OS Extended (Journaled) and Mac OS Extended
(Journaled, Encrypted).
4. File system journaling records which file operations are in
progress at any given moment. This way, if a power failure or
system crash occurs, after the system restarts, it will be able to
quickly verify the integrity of the volume by replaying the
journal.
5. Core Storage is a file system management layer thats used by
OS X to provide disk encryption as used by FileVault, and
combine separate disks as used by Fusion Drive.
6. The four erase options in Disk Utility are:
Fastest, which simply replaces the volumes directory
structure
A second choice, which provides good security by writing
zeroes on top of all the previous disk data
A third choice, which provides even better security by
writing three separate passes of information on top of the
previous disk data
Most Secure, which provides the best security by writing
seven separate passes of information on top of the
previous disk data
7. Secure Empty Trash will perform a 7-pass erase on the
contents of the Trash folder.
8. From the Erase tab in Disk Utility, you can choose to securely
erase the free space of a disk or volume. This securely erases
any previously deleted files on the selected disk or volume.
19
9. From the Finder, you can encrypt a disk without losing its
contents by secondary (or Control-) clicking the disk and
choosing Encrypt from the shortcut menu.
10. The four methods used to eject a volume or disk from the
Finder are:
Drag the disk icon to the Trash in the Dock
Press and hold the Eject key for a few moments to
unmount and eject optical media
Select the volume you want to eject and choose Eject from
the File menu
In the Finder sidebar, click the small Eject button next to
the volume you want to unmount and eject
11. Improperly unmounting or ejecting a drive or volume may
cause data corruption. The system automatically verifies and
repairs an improperly unmounted or ejected volume the next
time it becomes available to the Mac.
Answers
1. FileVault protects the entire system volume and all its data by
using strong XTS-AES 128 encryption. During system startup,
a FileVault-enabled user must enter a password to decrypt
the system volume.
2. To enable FileVault, OS X systems must have the hidden OS X
Recovery HD volume on the system disk. Also, any Legacy
FileVault accounts must be decrypted and returned to normal
accounts before FileVault can be enabled.
3. Any user whos FileVault enabled is allowed to unlock a
FileVault-protected system. This includes any local or cached
network user account that was enabled when FileVault 2 was
set up or created after FileVault 2 was enabled. Further,
administrators may return to Security & Privacy preferences to
enable additional accounts.
4. A FileVault-protected system can be unlocked using the
recovery key that was generated during the FileVault setup
20
Answers
1. An items ownership and permissions can be identified using
the Info or Inspector windows in the Finder.
2. Standard UNIX file system permissions allow for permissions
to be set only for one owner, one group, and all others. ACLs,
on the other hand, allow for an essentially unlimited list of
permissions entries.
3. The locked file flag prevents anyone, including the items
owner, from editing an item. Only the items owner can
unlock the item to then allow modification.
4. The root level of a users home folder is visible to other users
so they can navigate to the Public shared folder.
5. Every home folder contains a Public folder that other users
can read and a Drop Box folder that other users can write to.
All other subfolders in a users home folder (except the
optional Sites folder) have default permissions that dont
allow access to other users. The Shared folder is also set for all
users to share items.
6. The Shared folder is set up to allow all users to read and write
files, but only the user who owns an item can delete it from
the Shared folder. This is accomplished using the sticky bit
permissions setting.
7. You can choose to ignore ownership on any nonsystem
volume. This will ignore any ownership rules and grant any
21
Answers
1. Disk Utility and System Information can both be used to
gather information about storage devices.
2. The Disk Utility Verify and Repair feature is used to verify or
repair the partition scheme and directory structure of a
volume. These elements contain the information used to
locate files and folders on the volume.
3. Target disk mode is a Mac-specific hardware feature that,
when engaged, will share the Mac computers internal disks
through the FireWire ports. Target disk mode can be engaged
from Startup Disk preferences or by holding down the T key
as you turn on the Mac.
4. The Disk Utility Repair Permissions feature repairs only the
ownership and permissions for items installed by Apple.
However, this may resolve issues with third-party products.
5. A users home folder permissions can be reset from the Reset
Password application on OS X Recovery.
22
Describe the tools and methods used to create aliases and links.
Describe the tools and methods used to navigate to and view the
contents of hidden folders in the Finder.
Compare and contrast the System, Local, User, and network domains,
including what resources are stored in each, and the order in which
OS X searches for resources in the file system.
Compare and contrast file system packages and bundles, and their
purposes.
Identify where each of these file types are located in the file system:
extensions, frameworks, fonts, preferences, startup items, and logs.
Compare and contrast disk images created with Disk Utility and zip
archives created by the Finder in OS X.
Describe the options available when creating a new blank image using
Disk Utility in OS X.
Compare and contrast the features and functions of aliases and links as
implemented in OS X.
List the four default top-level folders visible in the Finder: Applications,
Library, System, and Users.
Describe how and why the Finder hides certain folders by default.
Identify potential privacy and security issues with Spotlight.
Describe where metadata indexes and plug-ins are stored in the OS X
file system.
23
Identify the files that are always omitted from Time Machine backups.
Describe issues with backing up large database files that are frequently
updated.
Answers
1. The Finder hides traditional UNIX resources from average
users because they dont need to have access to those items.
If users need access to these UNIX items, they can access
them from Terminal.
2. The Finder doesnt show items with periods at the beginning
of their filenames or items with the hidden file flag enabled.
Both methods for hiding items can be managed only from
the command line interface.
3. Bundles and packages are used to combine complex items
into individual folders. Packages have the additional
advantage of appearing as a single item in the Finder. This
allows software developers to combine resources into a
single item and prevents users from seeing and potentially
24
Answers
1. The four default top-level folders visible in the Finder are:
Applications, containing applications all local users have
access to
Library, containing system resources all local users have
access to
System, containing necessary system resources
Users, containing all the local user home folders
25
26
Answers
1. Metadata is information stored outside of a file or folder. It
provides additional information about files and folders.
Examples include file flags, extended file attributes, and
permissions.
2. Common file flags include the locked flag, which locks files
from changes, and the hidden flag, which hides the item in
the Finder.
3. File system tags are a type of metadata that allow you to
quickly assign keywords, or tags, to any item. The user can
customize the tag names and colors.
4. The Spotlight search service creates index databases of file
system metadata so that it can perform normally timeintensive searches nearly instantly. File system tags can be
found in the Finder sidebar, Spotlight search, and any open or
save document dialogs.
5. Spotlight metadata index databases are stored at the root of
every volume in a /.Spotlight-V100 folder. However, a Legacy
FileVault users database is stored in the users encrypted
home folder. And the Mail application maintains its own
database in each users home folder at ~/Library/Mail/V2/
MailData/Envelope Index. Spotlight plug-ins can be located in
any of the Library folders in a folder named Spotlight.
6. Though Spotlight indexes file and folder permissions, it allows
other users to search the contents of locally attached
nonsystem volumes when ownership is ignored on those
volumes.
7. Forcing a rebuild of the Spotlight index databases is a
common technique to resolve search issues. You can force a
rebuild by adding an item to the Spotlight preferences
Privacy list and then removing the item. This deletes the
current index database and forces the system to build a new
one.
27
Answers
1. Time Machine can back up to any Mac OS Extended volume
or network shares hosted from Time Capsule or OS X Server.
2. Time Machine starts with a full copy of the file system to the
backup disk. Then it maintains a list of changes to the file
system, and every hour copies only the changes to the
backup disk. In the backup, it creates a simulation of the full
file system using hard links for files that havent changed.
3. Time Machine always ignores temporary files, Spotlight
indexes, items in the Trash, log files, and anything else that
can be considered a cache. Time Machine also ignores any
files that an application has defined as exempt, or any files
that you have defined as exempt in Time Machine
preferences.
4. Time Machine is inecient at backing up large databases
because it must back up the entire database file every time
any change, no matter how small, is made to the database.
5. A previously backed-up item wont be available if your
backup volume filled up and Time Machine had to start
deleting older items to make room for newer ones.
6. Methods for restoring from a Time Machine backup include
navigating through the backup history via the Time Machine
application, restoring a user account via Migration Assistant,
restoring an entire system via OS X Recovery, and manually
restoring items via the Finder.
28
Describe the process for signing in and out of the App Store using a
valid Apple ID.
Verify the currently active Apple ID thats being used with the App
Store.
Describe the tools and methods for updating applications that have
been installed using traditional drag-and-drop or installation packages.
29
Describe the tools and methods for using the VoiceOver feature.
Describe the tools and methods that are used to control the Resume
feature in OS X.
Answers
1. The requirements to purchase items from the Mac App Store
are Mac OS X v10.6.6 or later, an Apple ID, and an Internet
connection.
2. In the Mac App Store, you can view the current Apple ID by
selecting Store from the menu bar. You can get more details
about this Apple ID by choosing View My Account in the
same menu.
3. The four primary application environments supported by
OS X are:
Native OS X applications, which are created using Cocoa
UNIX applications, which are primarily accessed via
Terminal
Java applications, which work as cross-platform
applications
X Window System applications, which run inside the
popular UNIX windowing environment
OS X doesnt include the Java application or X Window
System runtime, so they must be downloaded and installed
after the initial OS X installation.
4. Sandboxed applications are allowed access only to specific
items. Theyre otherwise completely cut o from the rest of
the system so they cant cause harm. All Mac App Store
applications are required to be sandboxed.
5. Code-signed items include a digital signature that the system
can use to verify the authenticity and integrity of the
application or process and its resources.
6. Any item downloaded using one of the built-in OS X
applications will be marked for quarantine. Third-party
applications may not mark downloaded items for quarantine.
7. Gatekeeper can restrict software to Mac App Store
applications only, or Mac App Store and identified developer
applications only (this is the default option), or any
application regardless of origin.
8. Traditional installation methods are generally categorized as
either a drag-and-drop installation, where the user simply
copies the application to the local system, or as an installation
package, where an installer process places the items on the
local system.
9. Three methods for uninstalling applications include:
Open Launchpad, hold down the Option key, and click the
X button
In the Finder, drag the primary application to the Trash and
then empty the Trash
31
Answers
1. OS X uses a documents filename extension to determine the
documents type. The Launch Services process maintains a
database of installed applications and which document types
theyre capable of opening.
2. Quick Look is engaged by simply pressing the Space bar
when a document is selected. Applications that support
Quick Look include the Finder, Time Machine, Mail, and most
open and save browser dialogs.
3. Quick Look uses a number of plug-ins that give it the
capability to preview documents. These plug-ins live in Quick
Look folders in any Library folder on OS X.
4. Auto Save allows compatible OS X applications to
automatically save changes to users documents. A user just
saves a document once, then never has to think about saving
changes again. Applications that support Auto Save feature a
Duplicate function in the File menu as opposed to a default
Save As function.
5. Documents sent via email or otherwise copied to a shared
location dont retain any version history.
32
6. Any application that supports Auto Save and the Finder can
manage document locking.
7. When an older iCloud account is upgraded to use iCloud
Drive, you lose the ability to directly access documents from
versions of OS X earlier than Yosemite and versions of iOS
before iOS 8. Older systems can still access items in iCloud
Drive from the iCloud website: www.icloud.com.
8. iCloud Drive items are available in the Finder or in any
application that uses the standard OS X Open or Save dialogs.
9. iOS 8 devices can access documents in iCloud Drive only if
theyre saved in specific application folders. For example,
Pages for iOS can access Pages documents only if theyre
stored in the Pages folder in iCloud Drive.
10. You can deselect the option to Reopen windows when
logging back in from the logout verification dialog. You can
deselect the option to Close windows when quitting an
application from General preferences. Also from General
preferences, you can select the option to Ask to keep
changes when closing documents, which turns o the Auto
Save feature.
33
Answers
1. The system keeps applications from interfering with one
another by segregating their memory usage using protected
memory. Mac computers with 64-bit-capable processors
allow processes to run in 64-bit mode, which allows them to
individually access more than 4GB of memory.
2. Using the Finder Info window, you can force an application to
open in 32-bit mode. This step is necessary for a 64-bit
application to support older 32-bit plug-ins or application
resources.
3. In OS X Yosemite, app extensions allow features from an
application to extend into the Finder, the Sharing menu, the
Action menu, and the Today view in Notification Center.
4. App extensions are installed automatically because theyre
bundled inside the application thats providing the extension.
You can enable or disable installed app extensions from the
Extensions preferences.
5. You can use the System Information application to easily scan
all the appropriate application locations and return a list of
installed applications.
6. The Activity Monitor application is used to monitor open
processes and applications.
7. General application troubleshooting steps include restarting
the application, trying another known working document,
trying another user account, checking log files, deleting cache
files, replacing preference files, and replacing application
resources.
8. The three ways to forcibly quit an application from the
graphical interface are from the Force Quit Application dialog
accessed from the Apple menu, from the Dock application
shortcut menu accessed by Control-clicking or right-clicking
the applications icon, or from the /Applications/Utilities/
Activity Monitor application.
9. The diagnostic reporting feature automatically creates a
diagnostic report log any time an application crashes or
hangs. The diagnostic report log can be viewed immediately,
reported to Apple via the Internet, or viewed later in the /
Applications/Utilities/Console application.
10. Application preferences are almost always stored in the users
Library folder in the ~/Library/Preferences folder. Newer
sandboxed applications must always store their preferences
in a ~/Library/Containers/<Bundle ID>/Data/Library/
Preferences folder, where <Bundle ID> is the unique bundle
identifier for the application.
11. Most application preferences are property lists, which are
XML-formatted files that use the .plist filename extension.
The content of these files can be viewed using Quick Look,
34
Describe how OS X computers acquire and use self-assigned (linklocal) TCP/IP addresses on a network.
Discuss the purpose and format of Internet Protocol (IP) addresses and
subnet masks.
Given an IPv4 address, IPv6 address, and MAC address, identify each.
Given a Mac with OS X installed, configure and manage a network
interface.
35
Answers
1. An interface is any channel through which network data can
flow. Hardware network interfaces are defined by physical
36
Answers
1. A network location is a saved state of Network preferences
that contains all network interface settings. Only
administrators can define network locations, but if more than
one location exists, all users can switch between the various
network locations via the Apple menu.
2. OS X supports the following network interfaces and protocols:
Ethernet IEEE 802.3 family of hardware network interface
standards
Wireless (Wi-Fi) IEEE 802.11 family of hardware network
interface standards
FireWire IEEE 1394 bridged network interface
Thunderbolt bridged network interface
Bluetooth wireless hardware network interface
USB connectivity via cellular network adapters or iOS
devices with cellular network service
38
39
Answers
1. Four common issues that can interrupt network services on a
Mac are:
Ethernet connectivity issues, which can cause the hardware
network interface to become inactive or introduce
excessive packet errors
Wi-Fi connectivity issues caused by the selection of an
improper Wi-Fi network or excessive wireless interference
DHCP service issues, which prevent proper TCP/IP
configuration
DNS service issues, which prevent host name resolution
2. If DHCP is specified as the configuration for a TCP/IP
connection and no DHCP service is available, the device
automatically selects a random IP address in the
169.254.xxx.xxx range. It checks the local network to ensure
that no other network device is using the randomly
generated IP address before it applies the IP address. In most
cases, though, this addressing isnt normal, and its often
indicative of a problem with DHCP services.
3. You can identify all the MAC addresses for the Mac
computers network interfaces from the Info pane of Network
Utility.
4. The Ping tab of Network Utility allows you to test basic
connectivity to another network host by sending and then
waiting for the return of a ping packet.
5. The Lookup tab of Network Utility allows you to test name
resolution against the currently configured DNS server.
40
Describe the tools and methods used to configure network services for
applications such as Safari, Mail, Messages, Contacts, Calendar, and
Finder.
Describe the tools and methods used to mount and unmount network
share points.
List the five types of file servers accessible via the Connect to Server
menu option.
List issues with metadata/file forks, and issues with connecting to file
servers that dont support AFP 3.1.
Compare and contrast the tools and methods used for screen sharing.
Given a Mac with OS X installed, sharing services configured, a network
connection, and a scenario where sharing services arent working as
expected, troubleshoot the configuration and connections to restore
the service connection.
Use the Connect to Server menu option in the Finder to access files
from each of the five types of accessible file servers.
41
Answers
1. Client software is used to access network services provided
by server software. The connection is established using a
common network protocol known by both the client and
server software. Thus, the client and server software can be
from dierent sources.
2. Network services are established using a common network
protocol. The protocol specifies which TCP or UDP port
number is used for communications.
3. Internet Accounts preference is the primary interface in OS X
for configuring built-in network applications.
4. Devices providing a network service advertise their
availability via a dynamic network service discovery protocol.
Clients looking for services request and receive this
42
43
Answers
1. The OS X sharing services include DVD or CD sharing, Screen
Sharing, File Sharing, Printer Sharing, Scanner Sharing, Remote
Login, Remote Management (ARD), Apple Events, Internet
Sharing, and Bluetooth Sharing.
2. If a client sharing service is compromised, an unauthorized
user can control your Mac and execute unwanted
applications or processes.
3. The Messages application allows for on-demand screen
sharing that can be used even when the system screen
sharing service isnt enabled.
4. AirDrop provides a quick and easy method to share files
locally via Wi-Fi. AirDrop creates a secure peer-to-peer
network between local devices. You can verify that a Mac
supports AirDrop from the Finder Go menu.
5. When you open the AirDrop browser on a late-model Mac
computer with OS X Yosemite, the browser shows only other
late-model Mac computers with OS X Yosemite and latemodel iOS devices with iOS 7 or later.
6. On a late model-Mac computer with OS X Yosemite youll find
two settings at the bottom of the AirDrop browser that
control AirDrop discovery. The first setting expands AirDrop
discovery from only users in your Contacts to everyone within
AirDrop range. The second setting makes AirDrop revert to
the previous discovery method, which allows your Mac to
discover older Mac computers and/or Mac computers
running previous versions of OS X.
7. With the firewall built into OS X, connections are allowed or
denied on a per-application basis. This is unlike traditional
network firewalls, where access rules are based on network
service port numbers.
44
Given the System Information utility, identify 64- and 32-bit kernel
extensions.
Compare and contrast uses of the buses and their characteristics such
as speed, power requirements, and connector typesincluding these
buses: Bluetooth, SCSI, ATA, Serial ATA, FireWire, USB PC Card bus,
Thunderbolt.
Describe the role of BootROM and the Power On Self Test (POST) in
OS X startup.
Discuss the steps that occur during the startup and sleep modes.
Identify each of the processes that start up in OS X at system startup, in
the order in which they launch.
45
Identify the items that load when powering up in Safe Mode in the
order in which they load.
Answers
1. The four primary peripheral bus technologies supported by
OS X are:
Universal Serial Bus (USB)
46
FireWire
Thunderbolt
Bluetooth wireless
2. Bluetooth devices must be paired to each other for
communication to occur. Bluetooth preferences in the System
Preference application is responsible for pairing your Mac
with Bluetooth peripherals. You can quickly open Bluetooth
preferences from the Bluetooth status menu.
3. A device driver is software specially designed to facilitate the
communication between OS X and a peripheral. Device
drivers can be kernel extensions, framework plug-ins, or
standalone applications.
4. OS X uses built-in generic drivers based on each device class.
For example, there are generic drivers for scanners and
printers that can be used instead of ocial third-party drivers.
5. If a connected peripheral doesnt appear in System
Information, the issue is likely to be hardware related.
Troubleshoot accordingly.
Answers
1. Common UNIX Printing System (CUPS) manages all printing
for OS X, including both local and shared printing.
2. PostScript Printer Description (PPD) files are printer driver files
that instruct the CUPS system on how to communicate with
specific printer models.
3. The Apple print drivers are the best source for configuring
OS X printers. One method is to let the software update
system automatically download and install the appropriate
printer drivers. Or you can manually download and install
printer drivers from the Apple support website.
47
48
Answers
1. Each primary stage of system initialization can be indicated
by the following: firmware, startup chime or bright flash of
the power-on light, followed by a light-gray screen on the
primary display; booter, a dark-gray Apple logo on the
primary display; kernel, a small dark-gray spinning gear or
spinning Earth icon below the Apple logo; and system
launchd, a white screen on all displays followed by the
login screen.
2. The firmware initializes the Mac computers hardware and
locates the booter file on a system volume. The Power-On
Self-Test (POST) checks for basic hardware functionality when
the Mac powers on.
3. The system launchd process is ultimately responsible for
starting every system process. It also manages system
initialization and starts the loginwindow process.
4. During system initialization, the system launchd process
automatically starts /System/ Library/LaunchDaemons, /
Library/LaunchDaemons, /Library/StartupItems (via
SystemStarter), and the /etc/rc.local UNIX script if it
exists.
5. Each primary stage of the user session can be indicated by
the following: The loginwindow process displays the login
screen, the user launchd process loads applications like the
Finder after user authentication, and the user environment is
active any time the user is logged in to the system.
6. Launch daemons and startup items open during system
initialization by the system launchd process on behalf of
the root user. Launch agents and login items open during the
initialization of the user environment by the users specific
launchd process.
7. Safe Sleep is a feature of all OS Xcompatible portable Mac
computers that saves the systems state to permanent storage
in cases where the computers battery drains completely.
Power Nap is a feature of Mac systems introduced after
mid-2011 that use all-flash storage. Power Nap allows the Mac
to automatically wake in a low-power mode so the system
can perform a variety of application and system updates.
8. During user logout, the users loginwindow process does
the following: requests that all user applications quit,
automatically quits any user background processes, runs any
logout scripts,records the logout to the main system.log file,
resets device permissions and preferences to their defaults,
and quits the users loginwindow and launchd
processes.
49
50