1.
Which TWO Mac OS X v10.6 applications are most helpful when troubleshooting Ethernet connectivity? (Select 2 answers. Partial credit available)
Correct Answer(s)
B. Network Utility
E. Network Diagnostics
Explanation
Network Utility and Network Diagnostics are the most helpful applications when troubleshooting Ethernet connectivity. Network Utility provides various tools such as ping, traceroute, and netstat to diagnose network issues. It can help identify connectivity problems, check network configurations, and test network connections. Network Diagnostics, on the other hand, is specifically designed to troubleshoot network connectivity issues. It can automatically detect and resolve common network problems, such as DNS issues, IP conflicts, and network misconfigurations. These two applications together provide a comprehensive set of tools and features to troubleshoot and resolve Ethernet connectivity problems.
2.
You are logged in as an administrator on a Mac OS X v10.6 computer. You try to drop an application into the computer’s Applications folder, but an alert message tells you that you do not have permission to modify the folder. Which stem is most likely to resolve the issue?
Correct Answer
A. Repair the volume’s permissions using Disk Utility.
Explanation
Repairing the volume's permissions using Disk Utility is the most likely solution to resolve the issue. This is because the alert message indicates that the user does not have permission to modify the Applications folder, which suggests that there may be a problem with the permissions on the volume. By repairing the volume's permissions using Disk Utility, it can fix any permission issues and allow the user to modify the folder.
3.
Why might you choose to install Mac OS X v10.6 on a volume formatted as Mac OS Extended (Journaled) rather than on a volume formatted as Mac OS Extended (Case-Sensitive, Journaled)?
Correct Answer
C. Because case-sensitive volumes allow for document titles that differ only by case.
Explanation
You might choose to install Mac OS X v10.6 on a volume formatted as Mac OS Extended (Journaled) rather than on a volume formatted as Mac OS Extended (Case-Sensitive, Journaled) because case-sensitive volumes allow for document titles that differ only by case. This means that you can have two files with the same name but different capitalization, which can be useful in certain situations.
4.
An application you try to open quits immediately, although it was opening properly yesterday. Which troubleshooting step will help determine if corrupt preferences are causing the application to quit while being as non-intrusive as possible?
Correct Answer
B. Log in as another user and open the application.
Explanation
Logging in as another user and opening the application will help determine if corrupt preferences are causing the application to quit. By logging in as another user, the application will be opened with fresh preferences specific to that user, eliminating the possibility of corrupt preferences causing the issue. This troubleshooting step is non-intrusive as it does not require removing or reinstalling the application, or performing system-level checks.
5.
What security risk arises while using fast user switching on a Mac OS X computer?
Correct Answer
D. External volumes that are connected directly to the Mac are available without restrictions to all concurrently logged-in users.
Explanation
When using fast user switching on a Mac OS X computer, the security risk that arises is that external volumes connected directly to the Mac are available without any restrictions to all concurrently logged-in users. This means that any user who is logged in can access and modify the contents of these external volumes, potentially compromising the security and privacy of the data stored on them.
6.
Review the following file permissions, then answer the question below:
drwxr-xr-x
Which statements accurately reflect the permissions above? (Select all answers that apply. No partial credit.)
Correct Answer(s)
A. Group can read.
C. Owner can read.
D. Owner can write.
E. Others can read.
G. The entry is for a directory.
Explanation
The given file permissions "drwxr-xr-x" indicate that the entry is for a directory. The first character "d" represents that it is a directory. The next three characters "rwx" indicate that the owner has read, write, and execute permissions. The following three characters "r-x" indicate that the group has read and execute permissions, but not write permissions. The last three characters "r-x" indicate that others have read and execute permissions, but not write permissions. Therefore, the statements that accurately reflect the permissions above are: Group can read, Owner can read, Owner can write, Others can read, and The entry is for a directory.
7.
How do you use a file service’s TCP port number to troubleshoot issues with the service?
Correct Answer
C. Verify that the port with the service’s TCP port number, is available and in use.
Explanation
To troubleshoot issues with a file service, it is important to verify that the port with the service's TCP port number is available and in use. This ensures that the client computer can establish a connection with the service using the correct port. If the port is not available or not in use, it could indicate a problem with the service or the network configuration. By verifying the availability and usage of the port, it helps identify any potential issues that may be causing problems with the file service.
8.
What does a Postscript Printer Description (PPD) file do?
Correct Answer
D. Describes printer features that can be used by the Mac OS X v10.6 print system.
Explanation
A Postscript Printer Description (PPD) file is used to describe the features of a printer that can be utilized by the Mac OS X v10.6 print system. This file provides information about the printer's capabilities, such as supported paper sizes, print resolutions, color options, and other features that can be accessed by the operating system. The PPD file acts as a bridge between the printer and the print system, allowing the operating system to communicate effectively with the printer and utilize its full range of features.
9.
When you perform a Safe Boot on a Mac OS X v10.6 computer, which items load?
Correct Answer
D. Required kernel extensions in /System/Library/ Extensions/
Explanation
When performing a Safe Boot on a Mac OS X v10.6 computer, only the required kernel extensions in /System/Library/Extensions/ will load. Safe Boot is a troubleshooting mode that allows the computer to start up with only essential system components, in order to isolate and resolve any software conflicts or issues. By loading only the necessary kernel extensions, it helps to ensure a stable and functional startup process.
10.
You create a document using a third-party word processing application, Writer. You close the file and do a Spotlight search for a word that occurs in the document, but the Writer document is not found by Spotlight. What could explain this?
Correct Answer
B. The Writer application does not include a Spotlight plug- in.
Explanation
The reason why the Writer document is not found by Spotlight could be that the Writer application does not include a Spotlight plug-in. This means that the application does not provide the necessary functionality for Spotlight to index and search the contents of the document. Without a plug-in, Spotlight is unable to recognize and index the document, resulting in it not being found in the search results.