What's the best source for acquiring printer drivers for OS X?
A. The network service order list is used to determine the primary network service interface if there is more than one active service. All network traffic that isn't better handled via local connection to an active network service interface is sent to the primary network service interface. So in most cases all WAN traffic, Internet traffic, and DNS resolution is sent through the primary network service interface.
B. The Apple print drivers are the best source for configuring OS X printers. One method is to let the software update system automatically download and install the appropriate printer drivers. Or you can manually download and install printer drivers from the Apple support website.
C. The master password is used to reset local account passwords.
D. The Activity Monitor application is used to monitor open processes and applications.
What's used to identify a Wi-Fi network?
A. OS X sharing services include DVD or CD sharing, Screen Sharing, File Sharing, Printer Sharing, Scanner Sharing, Remote Login, Remote Management (ARD), Apple Events, Internet Sharing, and Bluetooth Sharing.
B. The network service order list is used to determine the primary network service interface if there is more than one active service. All network traffic that isn't better handled via local connection to an active network service interface is sent to the primary network service interface. So in most cases all WAN traffic, Internet traffic, and DNS resolution is sent through the primary network service interface.
C. A Service Set Identifier, or SSID, is used to identify a Wi-Fi network name and associated configuration.
D. AirDrop provides a quick and easy method to share files locally via Wi-Fi. AirDrop creates a secure peer-to-peer network between local devices. You can verify that a Mac supports AirDrop from the Finder Go menu.
What are four common issues that can interrupt network services on a Mac computer?
A. To verify a specific service is available from a service provider, first use the Network Utility Ping tab to verify basic connectivity. Then use the Network Utility Port Scan tab to verify the specific service port(s) are open. You should always limit the port scan to the specific ports required for the network service you're testing.
B. Four common issues that can interrupt network services on a Mac are: Ethernet connectivity issues, which can cause the hardware network interface to become inactive or introduce excessive packet errors Wi-Fi connectivity issues caused by the selection of an improper Wi-Fi network or excessive wireless interference DHCP service issues, which prevent proper TCP/IP configuration ?DNS service issues, which prevent host name resolution
C. Migration Assistant can migrate information from other OS X systems, Windows systems, and other disks, including Time Machine backups.
D. Review Network preferences, review the Network Utility statistics, and attempt to connect to different network services.
Bluetooth devices must be paired to each other for communication to occur. Bluetooth preferences in the System Preference application is responsible for pairing your Mac with Bluetooth peripherals. You can quickly open Bluetooth preferences from the Bluetooth status menu.
A. Which items aren't loaded when OS X Safe Boots?
B. Which action must take place in order for a Mac to communicate with a Bluetooth peripheral? Where can this be configured?
C. What are some privacy and security concerns with the Spotlight service?
D. What two methods are used to hide items from the Finder?
How do you identify the ownership and permissions of a file or folder in the Finder?
A. A Service Set Identifier, or SSID, is used to identify a Wi-Fi network name and associated configuration.
B. Standard UNIX file system permissions allow only for permissions to be set for one owner, one group, and all others. ACLs, on the other hand, allow for an essentially unlimited list of permissions entries.
C. An item's ownership and permissions can be identified using the Info or Inspector windows in the Finder.
D. A user's home folder permissions can be reset from the Reset Password application on OS X Recovery.
What role does the system launchd process serve during system startup?
A. The master password is used to reset local account passwords.
B. A Safe Boot is initiated by holding down the Shift key during system startup
C. The system launchd process is ultimately responsible for starting every system process. It also manages system initialization and starts the login window process.
D. The system version, build number, and hardware serial number are located in the About This Mac dialog or the login screen. The system version number defines the specific version of OS X currently installed. The system build number is an even more specific identifier used primarily by developers. Finally, the hardware serial number is a unique number used to identify your specific Mac.
If a network device needs to send data to another network device on the same LAN, it addresses the outgoing packets based on the destination device's MAC address.
A. How does the IP use the MAC address to send messages between computers on a local area network (LAN)?
B. How do the four default System Preferences categories differ?
C. How does the keychain system help protect your information?
D. How can you verify that DNS host name resolution is working?
What three primary sources can Migration Assistant pull from?
A. The OS X Recovery Disk Assistant can create a small OS X B. Recovery disk that lacks the OS X installation assets. An OS X Installation disk, which includes the full OS X installation assets, can be created by using the create install media command line tool found inside the Install OS X Mavericks application.
B. A network client uses the subnet mask to determine whether the destination IP address is on the LAN. If the destination IP address isn't on the LAN, it's assumed the destination address is on another network, and the client sends the data to the IP address of the local network router. The network router then sends the data, via a WAN connection, on to another router that it thinks is closer to the destination. This continues across WAN connections from router to router until the data reaches its destination.
C. Time Machine starts with a full copy of the file system to the backup disk. Then it maintains a list of changes to the file system, and every hour copies only the changes to the backup disk. In the backup, it creates a simulation of the full file system using hard links for files that haven't changed.
D. Migration Assistant can migrate information from other OS X systems, Windows systems, and other disks, including Time Machine backups.
What security risk related to storage can occur when fast user switching is enabled?
A. When a user changes his own account password, the system will keep his login keychain password in sync.
B. When fast user switching is enabled, all users are allowed to see other users' locally connected disks.
C. The Archive option in the Finder creates compressed zip archive files.
D. The Finder hides traditional UNIX resources from average users because they don't need to have access to those items. If users need access to these UNIX items, they can access them from Terminal.
How do ACLs differ from standard UNIX file system permissions?
A. An item's ownership and permissions can be identified using the Info or Inspector windows in the Finder.
B. Standard UNIX file system permissions allow only for permissions to be set for one owner, one group, and all others. ACLs, on the other hand, allow for an essentially unlimited list of permissions entries.
C. The Disk Utility Repair Permissions feature repairs only the ownership and permissions for items installed by Apple. However, this may resolve issues with third-party products.
D. You can use the System Information application to easily scan all the appropriate application locations and return a list of installed applications.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Apple exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 9L0-415 exam preparations and Apple certification application, do not hesitate to visit our Vcedump.com to find your solutions here.