What happens during user logout?
A. At system shutdown, the login window process logs all users out and tells the kernel to quit all remaining system processes. Once the kernel quits all system processes, the Mac shuts down.
B. During user logout, the user's login window process does the following: requests that all user applications quit; automatically quits any user background processes; runs any logout scripts; records the logout to the main system.log file; resets device permissions and preferences to their defaults; and quits the user's login window and launched processes.
C. During system initialization, the system launched process automatically starts /System/ Library/LaunchDaemons, /Library/LaunchDaemons, /Library/StartupItems (via SystemStarter), and the /etc/rc.local UNIX script if it exists.
D. Single-partition drives are easier to set up initially, but they aren't as flexible for administration and maintenance. Multiple-partition drives require repartitioning during setup, but provide several separate partitions, which can be used to segregate user data and host multiple operating systems.
What are some privacy and security concerns with the Spotlight service?
A. The Spotlight search service creates index databases of file system metadata so that it can perform normally time intensive searches nearly instantly. File system tags can be found in the Finder sidebar, Spotlight search, and any open or save document dialogs.
B. When fast user switching is enabled, all users are allowed to see other users' locally connected disks.
C. A user's home folder permissions can be reset from the Reset Password application on OS X Recovery.
D. Though Spotlight indexes file and folder permissions, it allows other users to search the contents of locally attached nonsystem volumes when ownership is ignored on those volumes.
How does the default organization of the file system allow users to safely share local files and folders?
A. The volume formats supported as system volumes for OS X are Mac OS Extended (Journaled) and Mac OS Extended (Journaled, Encrypted).
B. The keychain system manages encrypted files that are used to securely save your items. By default, every user has login and Local Items keychains that use the same password as his account. Not even other administrative users can access your keychain secrets without knowing the keychain's password.
C. Every home folder contains a Public folder that other users can read and a Drop Box folder that other users can write to. All other subfolders in a user's home folder (except the optional Sites folder) have default permissions that don't allow access to other users. The Shared folder is also set for all users to share items.
D. The Archive option in the Finder creates compressed zip archive files.
What's unique about the permissions of the /Users/Shared folder?
A. When fast user switching is enabled, all users are allowed to see other users' locally connected disks.
B. The Shared folder is set up to allow all users to read and write files, but only the user who owns an item can delete it from the Shared folder. This is accomplished using the sticky bit permissions setting.
C. The Ping tab of Network Utility allows you to test basic connectivity to another network host by sending and then waiting for the return of a ping packet.
D. You can prevent automatic updates for all users by disabling the options in App Store preferences. You can further restrict a user's ability to use the Mac App Store by configuring Parental Controls for the user's account.
All Apple software updates are handled via the Mac App Store.
A. How can you identify duplicate fonts?
B. Which items fall under the file quarantine system?
C. What can you enable to locate a lost Mac system?
D. Which application can you open to initiate Apple software updates?
How can you identify duplicate fonts?
A. The OS X Mavericks installer can be downloaded from the Mac App Store for free.
B. The Messages application allows for on-demand screen sharing that can be used even when the system screen sharing service isn't enabled.
C. The Font Book application shows a small dot next to the name of any font that has duplicate resources.
D. The four methods used to eject a volume or disk from the Finder are: Drag the disk icon to the Trash in the Dock. Press and hold the Eject key for a few moments to unmount and eject optical media. Select the volume you want to eject and choose Eject from the File menu. In the Finder sidebar, click the small Eject button next to the volume you want to unmount and eject.
Safe Sleep is a feature of all OS X compatible portable Macs that saves the system's state to permanent storage in cases where the computer's battery drains completely. Power Nap is a feature of Mac systems introduced after mid-2011 that use all-flash storage. Power Nap allows the Mac to automatically wake in a low-power mode so the system can perform a variety of application and system updates.
A. What happens during system shutdown?
B. What are Safe Sleep and Power Nap?
C. Which sharing services can OS X provide?
D. What does the master password do?
What do the terms "interface," "protocol," and "service" mean in relation to computer networks?
A. A Service Set Identifier, or SSID, is used to identify a Wi-Fi network name and associated configuration.
B. An interface is any channel through which network data can flow. Hardware network interfaces are defined by physical network connections, and virtual network interfaces are logical network connections that ride on top of hardware network connections. A protocol is a set of rules used to describe a specific type of network communication. Protocols are necessary for separate network devices to communicate properly. Finally, a network service (as it pertains to Network preferences) is the collection of settings that define a network connection.
C. A Safe Boot is initiated c. by holding down the Shift key during system startup
D. Client software is used to access network services provided by server software. The connection is established using a common network protocol known by both the client and server software. Thus, the client and server software can be from different sources.
The Privacy pane of Security and Privacy preferences can be used to allow or disallow applications' access to Location Services, Contacts, Calendars, Reminders, social network services, and Accessibility application access.
A. How can you acquire the OS X Mavericks installer?
B. How can you limit the use of Location Services?
C. How can you identify duplicate fonts?
D. What does the master password do?
How is the Domain Name Service (DNS) used to facilitate network naming?
A. The OS X Mavericks installer can be downloaded from the Mac App Store for free.
B. Keychains are used to store secrets such as resource passwords, digital certificates, and encryption keys. The keychain system can also securely store Safari AutoFill information, Internet Account settings, and secure text notes.
C. The Archive option in the Finder creates compressed zip archive files.
D. The DNS service is used to translate host names to IP addresses via forward lookups and translate IP addresses to host names via reverse lookups. DNS is architected as a hierarchy of worldwide domain servers. Local DNS servers provide name resolution and possibly host names for local clients. These local DNS servers connect to DNS servers higher in the DNS hierarchy to resolve both unknown host names and host local domain names.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Apple exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 9L0-415 exam preparations and Apple certification application, do not hesitate to visit our Vcedump.com to find your solutions here.