A standard user can connect to any non-WPA Enterprise Wi-Fi network via the Wi-Fi status menu. Because the system Keychain must be modified for WPA Enterprise connections, only an administrative user can establish these types of connections.
A. What's the easiest method in OS X to configure VPN settings?
B. Through what mechanism can a standard user configure Wi-Fi settings?
C. Which applications can manage document locking?
D. How can you limit the use of Location Services?
How does the OS X built-in firewall work?
A. The Disk Utility Repair Permissions feature repairs only the ownership and permissions for items installed by Apple. However, this may resolve issues with third-party products.
B. The Ping tab of Network Utility allows you to test basic connectivity to another network host by sending and then waiting for the return of a ping packet.
C. The OS X built-in firewall inspects each incoming network connection to determine if it's allowed. Connections are allowed or denied on a per-application basis.
D. Network services are established using a common network protocol. The protocol specifies which TCP or UDP port number is used for communications.
Where are the keychain files stored?
A. A Safe Boot performs the following permanent actions: attempting to repair the system volume structure, deleting system KEXT caches, and deleting font caches.
B. The master password is used to reset local account passwords.
C. Each user starts with a login keychain saved at /Users/
D. Spotlight metadata index databases are stored at the root of every volume in a /.Spotlight-V100 folder. However, a Legacy FileVault user's database is stored in his encrypted home folder. And the Mail application maintains its own database in each user's home folder at ~/Library/Mail/V2/MailData/Envelope Index. Spotlight plug-ins can be located in any of the Library folders in a folder named Spotlight.
Each primary stage of system initialization can be indicated by the following: firmware, startup chime or bright flash of the power-on light, followed by a light gray screen on the primary display; booter, a dark gray Apple logo on the primary display; kernel, a small dark gray spinning gear or spinning earth icon below the Apple logo; and system launchd, a white screen on all displays followed by the login screen.
A. What are the primary system initialization stages in OS X? What are the visual and audible cues of these items?
B. What are some privacy and security concerns with the Spotlight service?
C. What are the advantages of code signing?
D. Why does the Finder hide certain folders at the root of the system volume?
How does a user that changes his own account password affect his login keychain?
A. When a user changes his own account password, the system will keep his login keychain password in sync.
B. The Archive option in the Finder creates compressed zip archive files.
C. The master password is used to reset local account passwords.
D. Time Machine starts with a full copy of the file system to the backup disk. Then it maintains a list of changes to the file system, and every hour copies only the changes to the backup disk. In the backup, it creates a simulation of the full file system using hard links for files that haven't changed.
What OS X application is set as the default for opening archive files?
A. By default on OS X, opens Archive Utility, the default application for opening zip archive files. Archive Utility, expands the contents of the zip archive next to the same location as the original zip archive.
B. The default folders in a user's home folder are Desktop, Documents, Downloads, Library (hidden), Movies, Music, Pictures, and Public. Optional home folder items include Applications and Sites folders.
C. The four erase options in Disk Utility are: Fastest, which simply replaces the volume's directory structure A second choice, which provides good security by writing zeros on top of all the previous disk data A third choice, which provides even better security by writing three separate passes of information on top of the previous disk data Most Secure, which provides the best security by writing seven separate passes of information on top of the previous disk data
D. You can choose to ignore ownership on any non system volume. This will ignore any ownership rules and grant any logged-on user unlimited access to the contents of the volume. It's a potential security risk because it will allow any local user account to have full access to the volume, even if that user didn't originally mount the volume.
What are the two primary traditional installation methods in OS X?
A. The Archive option in the Finder creates compressed zip archive files.
B. Metadata is information stored outside of a file or folder. It provides additional information about files and folders. Examples include: file flags, extended file attributes, and permissions.
C. The diagnostic reporting feature automatically creates a diagnostic report log any time an application crashes or hangs. The diagnostic report log can be viewed immediately, reported to Apple via the Internet, or viewed later in the / Applications/Utilities/Console application.
D. Traditional installation methods are generally categorized as either a drag-and-drop installation, where the user simply copies the application to the local system; or as an installation package, where an installer process places the items on the local system.
How does the keychain system help protect your information?
A. Time Machine always ignores temporary files, Spotlight indexes, items in the Trash, log files, and anything else that can be considered a cache. Time Machine also ignores any files an application has defined as exempt, or any files you have defined as exempt in Time Machine preferences.
B. When fast user switching is enabled, all users are allowed to see other users' locally connected disks.
C. The keychain system manages encrypted files that are used to securely save your items. By default, every user has login and Local Items keychains that use the same password as his account. Not even other administrative users can access your keychain secrets without knowing the keychain's password.
D. By default, system files and security updates are automatically installed when available.
What's a network location? Who can access network locations?
A. The OS X Mavericks installer can be downloaded from the Mac App Store for free.
B. The Archive option in the Finder creates compressed zip archive files. An interface is any channel through which network data can flow. Hardware network interfaces are defined by physical network connections, and virtual network interfaces are logical network connections that ride on top of hardware network connections.
C. A protocol is a set of rules used to describe a specific type of network communication. Protocols are necessary for separate network devices to communicate properly. Finally, a network service (as it pertains to Network preferences) is the collection of settings that define a network connection.
D. A network location is a saved state of Network preferences that contains all network interface settings. Only administrators can define network locations, but if more than one location exists, all users can switch between the various network locations via the Apple menu.
What's the security risk of enabling client sharing services?
A. If a network device needs to send data to another network device on the same LAN, it addresses the outgoing packets based on the destination device's MAC address.
B. Assuming the default settings for OS X, a standard user can only configure directly attached or local network printers from the Print dialog. Also, the appropriate drivers must be installed before the standard user configuring the printer.
C. Any application that supports Auto Save and the Finder can manage document locking.
D. If a client sharing service is compromised, an unauthorized user can control your Mac and execute unwanted applications or processes.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Apple exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 9L0-415 exam preparations and Apple certification application, do not hesitate to visit our Vcedump.com to find your solutions here.