• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/58

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

58 Cards in this Set

  • Front
  • Back
CH1: What are the minimum hardware requirements for upgrading a system with Lion?
The minimum requirements for upgrading Lion are:
A Mac with an Intel Core 2 Duo, Core i3, Core i5, Core i7, or Xeon processor 2 GB of memory
Mac OS X v10.6.6 or later (v10.6.8 recommended)
7 GB of available disk space
Some features require an Apple ID; terms apply
Some features require a compatible Internet service provider; fees may apply
CH1: What seven preparation steps must you take before upgrading a system with Lion?
Seven steps you should take before upgrading a system to Lion are to plug portable Macs into main power, run Apple Software Update, check for firmware updates, verify application compatibility, back up important files and folders, document critical set- tings, and keep up-to-date by visiting Apple’s Lion support website.
CH1: How can you identify if a Mac requires a firmware update?
You can identify a Mac’s firmware version by opening the full system report in the System Information application. You can verify if a Mac’s firmware is up-to-date by visiting Apple’s support website, which maintains a list of available firmware updates.
CH1: What are the advantages and disadvantages of using a single-partition drive with Mac OS X? How about a multiple-partition drive?
Single-partition drives are easier to set up initially, but they aren’t as flexible for administration and maintenance. Multiple-partition drives require repartitioning dur- ing setup but provide several separate partitions, which can be used to segregate user data and host multiple operating systems.
CH1: What utilities are available when started up from Lion Recovery?
The Lion Recovery system provides access to Restore System From Time Machine Backup, Reinstall Mac OS X, Get Help Online via Safari, Disk Utility, Startup Disk, Firmware Password Utility, Terminal, Reset Password, System Information, and Network Utility.
CH1: Where can you locate the system version number, build number, and serial number? What is the significance of these numbers?
The system version, build number, and hardware serial number are located in the About This Mac dialog or the login screen. The system version number defines the specific version of Mac OS X currently installed. The system build number is an even more specific identifier used primarily by developers. Finally, the hardware serial number is a unique number used to identify your specific Mac.
CH1: How do the four default System Preferences categories differ?
Generally, Personal preferences affect only a single user, Hardware preferences adjust hardware and peripheral settings, Internet & Wireless preferences affect personal and system network settings, and System preferences affect all users and often require administrative access.
CH1: How do you ensure that you have the latest Apple software?
The Software Update application checks for Apple software updates via the Internet. You can adjust automatic update settings or manually open the Software Update application from the Software Update preferences.
CH2: What are the five types of user accounts in Lion? How are they different?
Standard is the default account type; administrative users can make changes to the system; a guest user does not require a password; sharing only users can access only shared files; and the root user has unlimited access.
CH2: What are account attributes?
Account attributes are the individual pieces of information that are used to define a user account. Examples include full name, account name, user ID, universally unique ID (UUID), group, and home directory.
CH2: How can you limit a user account from having full access to all applications?
Parental controls can be used to further limit a user account. Examples include enforcing a simple Finder, limiting applications and widgets, setting time limits, and content filtering.
CH2: What are some security risks associated with each type of user account?
Standard user accounts are very secure, assuming they have good passwords. Administrative users can make changes that may negatively affect the system or other user accounts. A guest user could potentially fill your system drive with unwanted files. Sharing only users are generally very secure as long as you don’t give them too much access to your items. The potential for mayhem with root user access is nearly unlimited.
CH2: What default folders make up a user’s home folder? What are some optional folders in a user’s home folder?
The default folders in a user’s home folder are Desktop, Documents, Downloads, Library (hidden), Movies, Music, Pictures, and Public. Optional home folder items include Applications and Sites folders.
CH2: What types of resource contention issues can occur when fast user switching is enabled?
Resource contention occurs when fast user switching is enabled and a user tries to access an item that another user already has open in the background. Document contention occurs when a user attempts to open a document that another user has already opened. Peripheral contention occurs when a user attempts to access a
Review Quiz 119
peripheral that is already in use by another user’s open application. Application con- tention occurs when the second user attempts to access an application that is designed to run only once on a system.
CH2: What security risk can occur when fast user switching is enabled?
When fast user switching is enabled, all users are allowed to see other users’ locally connected drives.
CH2: What does a keychain do?
A keychain is an encrypted file that is used to securely save passwords, certificates, or notes. By default, every user has a login keychain that has the same password as his account.
CH2: How does Legacy FileVault secure a user’s data?
Legacy FileVault stores the user’s home folder in an encrypted disk image. This disk image is accessible only by the Legacy FileVault user.
CH2: How does resetting the master password affect existing Legacy FileVault user accounts?
If a known master password is reset using the Security & Privacy preferences, Legacy FileVault accounts will not be negatively affected. On the other hand, if a master pass- word is reset because it was lost, Legacy FileVault accounts cannot be reset by the new master password.
CH 2: How does resetting a user’s password as an administrative user affect that user’s keychains?
If an administrative user resets another user’s account password, this process will not change any keychain passwords. Therefore, the user’s keychains will not automatically open when the user logs in with her new password. The user will have to manually change her keychain passwords using the Keychain Access utility.
CH 2: How does the Firmware Password Utility help prevent users from making unauthor- ized password changes?
The Firmware Password Utility prevents users from starting up from another system drive. This in turn prevents them from using a Lion Recovery system to reset local passwords without authorization.
CH 3: What is the difference between disk drives, partitions, and volumes?
Disk drives are the actual storage hardware; partitions are logical divisions of a disk drive used to define the storage space; and volumes, contained inside partitions, are used to define how the individual files and folders are saved to the storage.
CH 3: What are the two primary partition schemes for Mac-formatted drives? What are their differences?
GUID Partition Table is the default partition scheme on Intel-based Macs, and Apple Partition Map is the default partition scheme on PowerPC-based Macs.
CH 3: What two volume formats are supported for a Lion system volume?
The volume formats supported as system volumes for Lion are Mac OS Extended (Journaled) and Mac OS Extended (Journaled, Encrypted).
CH 3: How does file system journaling work?
File system journaling records what file operations are in progress at any given moment. This way, if a power failure or system crash occurs, after the system restarts it will be able to quickly verify the integrity of the volume by “replaying” the journal.
CH 3: What are the four erase options available in Disk Utility? What are the differences between them?
The four erase options in Disk Utility are Fastest, which simply replaces the volume’s directory structure; a second choice, which provides good security by writing zeros on top of all the previous drive data; a third choice, which provides even better secu- rity by writing three separate passes of information on top of the previous drive data; and Most Secure, which provides the best security by writing seven separate passes of information on top of the previous drive data.
CH 3: How does the Finder’s Secure Empty Trash feature work?
The Finder’s Secure Empty Trash will perform a 7-pass erase on the contents of the Trash folder.
CH 3: What four methods can be used to eject a volume or drive from the Finder?
The four methods used to eject a volume or drive from the Finder are to drag the drive icon to the Trash in the Dock; press and hold the Eject key for a few moments to unmount and eject optical media; select the volume you wish to unmount and eject from the Finder and choose File > Eject from the menu bar; and, finally, in the Finder’s sidebar, click the small Eject button next to the volume you wish to unmount and eject.
CH 3: What is the potential side effect of improperly unmounting or ejecting a drive or volume?
Improperly unmounting or ejecting a drive or volume may cause data corruption. The system will automatically verify and repair an improperly unmounted or ejected volume the next time it becomes available to the Mac.
CH 3: What differentiates a RAID 0 set from a RAID 1 set?
RAID 0 uses disk striping to simultaneously write data to all drives, providing increased performance, but it increases your chances of data loss due to drive failure. RAID 1 uses disk mirroring to write the same data to multiple drives, which does not increase performance but does greatly decrease your chances of data loss due to drive failure.
CH 3: How do you use the Finder’s Burn Folder feature?
There are two methods for using a burn folder in the Finder. First, you can create a burn folder of any size by choosing File > New Burn Folder from the menu bar. Once
Review Quiz 211
you are done adding and arranging items in the burn folder, click the Burn button and then insert a blank recordable optical disc. Or you can create a burn folder of a specific optical disc size by first inserting a blank recordable optical disc; the Finder will automatically create a burn folder that matches the size of the recordable optical disc.
CH 3: How do you use Disk Utility to burn an optical disc?
Disk Utility can burn the contents of a disk image to an optical disk. Click the Burn button in Disk Utility’s toolbar, select a disk image, and then insert a blank recordable optical disc.
CH 3: Why is the root, or beginning, level of a user’s home folder visible to other users?
The root level of a user’s home folder is visible to other users so they can navigate to the Public and Sites shared folders.
CH 3: How are the permissions on the Shared folder set to allow local user sharing?
The Shared folder is set up to allow all users to read and write files, but only the user who owns an item can delete it from the Shared folder. This is accomplished using the sticky bit permissions setting.
CH 3: How does the default organization of the file system allow users to safely share local files and folders?
Every home folder contains a Public folder that other users can read and a Drop
Box folder that other users can write to. All other subfolders in a user’s home folder (except the optional Sites folder) have default permissions that do not allow access to other users. The Shared folder is also set for all users to share items.
CH 3: What does it mean when you choose the option to “ignore volume ownership” in the Finder? What are the security ramifications of ignoring volume ownership?
You can choose to ignore ownership on any non-system volume. This will ignore any ownership rules and grant any logged-on user unlimited access to the contents of the volume. It is a potential security risk because it will allow any local user account to have full access to the volume even if that user did not originally mount the volume.
CH 3: How do you identify the ownership and permissions of a file or folder in the Finder?
An item’s ownership and permissions can be identified using the Get Info or Inspector windows in the Finder.
CH 3: What is the sticky bit?
The sticky bit is a special permission used to define a folder as an append-only des- tination or, more accurately, a folder in which only the owner of the item can move, rename, or delete the item.
CH 3: What is the locked file flag?
The locked file flag prevents anyone, including the item’s owner, from editing an item. Only the item’s owner can unlock the item to then allow modification.
CH 3: How is Disk Utility’s Verify and Repair feature used?
The Disk Utility’s Verify and Repair feature is used to verify or repair the directory structure of a volume. The directory structure contains all the information used to locate files and folders on the volume.
CH 3: What is target disk mode and how is it engaged?
Target disk mode is a Mac-specific hardware feature that, when engaged, will share the Mac’s internal disk drives through the FireWire ports. Target disk mode can be engaged from the Startup Disk preferences or by holding down the T key as you turn on the Mac.
CH4: What are the four default top-level folders visible in the Finder?
The four default top-level folders visible in the Finder are Applications, containing applications all local users have access to; Library, containing system resources all local users have access to; System, containing necessary system resources; and finally, Users, containing all the local user home folders.
CH4: What are six common system resources? What purpose does each resource serve? Where are they located in the file hierarchy?
Six common system resources are extensions, which attach themselves to the system kernel to provide hardware and peripheral driver support; frameworks, which are shared code libraries that provide additional software resources for both applications and system processes; fonts; preference files, which contain application and system configuration information; LaunchAgents and LaunchDaemons, used by launchd to provide services that automatically start when they are needed or at system startup; and finally, logs, which are text files that contain error and progress entries from nearly any application or system service.
CH4: What are the four system resource domains? What purpose does each domain serve?
The four system resource domains are User, containing applications and system resources specific to each user account; Local, containing applications and system resources available to all users on the local Mac; Network (optional), containing appli- cations and system resources available to any Mac that has an automated network share; and finally, System, containing applications and system resources required to provide basic system functionality.
CH4: Why does the Finder hide certain folders at the root of the system volume?
The Finder hides traditional UNIX resources from average users because they don’t need to have access to those items. If users do need access to these UNIX items, they can access them from the Terminal.
CH4: What two methods can be used to hide items from the Finder?
The Finder will not show items with periods at the beginning of their filename or items with the hidden file flag enabled.
CH4: What is file system metadata? What are some examples of file system metadata?
Metadata is information stored outside of a file or folder. It provides additional infor- mation about files and folders. Examples include file flags, extended file attributes, and permissions.
CH4: What are some of the common file flags used by Lion?
Common file flags include the locked flag, which locks files from changes, and the hidden flag, which hides the item in the Finder.
CH4: What does Lion use bundles or packages for?
Bundles and packages are used to combine complex items into individual folders. Packages have the additional advantage of appearing as a single item in the Finder. This allows software developers to combine resources into a single item and prevents users from messing with those resources.
CH4: How does the system identify which application to open when a user double-clicks on a file?
Files are identified primarily by their filename extension. Launch Services main- tains a database of known applications and which file types they can open. When you double-click on a file in the Finder, Launch Services tries to find an appropriate match. You can override the default application selection in the Finder.
CH4: What are some privacy and security concerns with the Spotlight service?
Though Spotlight indexes file and folder permissions, it will allow other users to search the contents of locally attached non-system volumes when ownership is ignored on those volumes.
CH4: What are the differences between zip archives and disk images?
Zip archives are created with the Finder from a specific selection of items. Zip archives are compatible with many operating systems. On the other hand, disk images are made using Disk Utility and allow you to create highly flexible archive volumes that can contain nearly anything.
CH4: How does the Spotlight search service use metadata?
The Spotlight search service creates index databases of file system metadata so that it can perform normally time-intensive searches nearly instantly.
CH4: Where does Spotlight store its metadata index databases? How about the Spotlight plug-ins?
Spotlight metadata index databases are stored at the root of every volume in a /.Spotlight-V100 folder. However, a Legacy FileVault user’s database is stored in his encrypted home folder. Also, the Mail application maintains its own database in each user’s home folder at ~/Library/Mail/V2/MailData/Envelope Index. Spotlight plug-ins can be located in any Library in a folder named Spotlight.
CH4: What backup destinations does Time Machine support?
Time Machine can back up to any Mac OS Extended volume, or network shares hosted from Time Capsule or a Mac OS X Server.
CH4: How does Time Machine maintain a backup history of the file system?
Time Machine starts with a full copy of the file system; then it records any changes to the file system, and only copies the changes. It creates a simulation of the full file sys- tem using hard links for files that have not changed.
CH4: What types of files are omitted from Time Machine backups?
Time Machine always ignores temporary files, Spotlight indexes, items in the Trash, and anything else that can be considered a cache. Time Machine will also ignore any files an application has defined as exempt, or any files you have defined as exempt in the Time Machine preferences.
CH4: Why is Time Machine inefficient at backing up large databases?
Time Machine is inefficient at backing up large databases because it must back up the entire database file every time any change, no matter how small, is made to the database.
CH4: Why might a previously backed-up item no longer be available in Time Machine?
A previously backed-up item will not be available if your backup volume has become full and Time Machine has had to start deleting older items to make room for newer items.