Your Mac is started up from its OS X Recovery partition. You need to repair the hard disk. Which procedure will let you perform the repair?
A. In the OS X Utilities window, click Select Volume, click Continue, select the hard disk, and click Verify & Repair.
B. Quit the Recovery app, then open Disk Utility from the /Applications/Utilities/ folder on the OS X Recovery partition, select the hard disk, and click Repair Disk.
C. Select Disk Utility in the OS X Utilities window, click Continue, select the hard disk, and click Repair Disk.
D. Quit the Recovery app, then open Disk Utility from the /Applications/Utilities/ folder on the Macintosh HD partition, select the hard disk, and click Repair Disk.
正解:C
質問 2:
If an issue disappears when a Safe Boot is successful, youmust find and remove the third-party startup resource that caused the issue. The best way to isolate the problem is to start up the Macin Verbose mode and then observe where the startup process fails. Verbose mode is initiated by holding down Command-V during system startup.
A. How do network devices acquire and use self-assigned TCP/IP addresses?
B. How do you further resolve an issue that disappears when the Mac successfully safe-boots?
C. What backup destination disks does Time Machine support?
D. Which changes are made when OS X Safe Boots?
正解:B
質問 3:
A Safe Boot performs the following permanent actions:attempting to repair the system volume structure, deleting system KEXT caches, and deleting font caches.
A. How can you acquire the OS X Mavericks installer?
B. Which changes are made when OS X Safe Boots?
C. Where are the keychain files stored?
D. What does the master password do?
正解:B
質問 4:
What are the two primary traditional installation methods in OS X?
A. Metadata is information stored outside of a file or folder. It provides additional information about files and folders. Examples include: file flags, extended file attributes, and permissions.
B. The diagnostic reporting feature automatically creates a diagnostic report log any time an application crashes or hangs. The diagnostic report log can be viewed immediately, reported to Apple via the Internet, or viewed later in the /Applications/Utilities/Console application.
C. The Archive option in the Finder creates compressed zip archive files.
D. Traditional installation methods are generally categorized as either a drag-and-drop installation, where the user simply copies the application to the local system; or as an installation package, where an installer process places the items on thelocal system.
正解:D
質問 5:
---
Three methods for uninstalling applications include:
Open Launchpad, hold down the Option key, and click the "X" button In the Finder, drag the primary application to the Trash and then empty the Trash Use a custom-built uninstaller package
A. What four methods can be used to restore from a Time Machine backup?
B. What three methods can be used to uninstall applications?
C. Which two methods can be used to automatically connect a network share?
D. What three primary sources can Migration Assistant pull from?
正解:B
質問 6:
Three ways to forcibly quit an application from thegraphical interface are from the Force Quit Application dialog accessed from the Apple menu; from the Dock application shortcut menu accessed by Control-clicking or right-clicking the application's icon; or from the /Applications/Utilities/ Activity Monitor application.
A. What three ways can you forcibly quit an application from the graphical interface?
B. What four methods can be used to eject a volume or disk from the Finder?
C. What can you enable to locate a lost Mac system?
D. What three primary sources can Migration Assistant pull from?
正解:A
質問 7:
OS X software updates can be downloaded from the AppleSupport website using any modern web browser. Updatestake the form of installation packages that are installed viathe Installer application.
A. Which applications are used to manually acquire and install OS X software updates?
B. What four methods can be used to eject a volume or disk from the Finder?
C. Which items aren't loaded when OS X Safe Boots?
D. How can you prevent a user from installing software updates?
正解:A
質問 8:
How is 802.1X configured on OS X systems?
A. The Lookup tab of Network Utility allows you to test name resolution against the currently configured DNS server.
B. In the Mac App Store, you can view the current Apple ID by selecting Store from the menu bar. You can get further details regarding this Apple ID, by selecting View My Account in the same menu.
C. In OS X there are two configuration methods for 802.1X. The first method is automatic configuration via the selection of a Wi-Fi network that requires WPA/WPA2 Enterprise authentication. The second method is "semi-automatic" configuration via an 802.1X configuration profile provided by an administrator.
D. A network client uses the subnet mask to determine whether the destination IP address is on the LAN. If the destination IP address isn't on the LAN, it's assumed the destination address is on another network, and the client sends the data to the IP address of the local network router. The network router then sends the data, via a WAN connection, on to another router that it thinks is closer to the destination. This continues across WAN connections from router to router until the data reaches its destination.
正解:C
質問 9:
How can you limit a user account from having full access to all applications?
A. By default on OS X, opens Archive Utility, the default application for opening zip archive files. Archive Utility, expands the contents of the zip archive next to the same location as the original zip archive.
B. Resource contention occurs when fast user switching is enabled and a user tries to access an item another user already has open in the background. Document contention occurs when a user attempts to open a document another user has already opened. Peripheral contention occurs when a user attempts to access a peripheral already in use by another user's open application. Application contention occurs when the second user attempts to access an application designed to run only once on a system.
C. The Archive option in the Finder creates compressed zip archive files.
D. Parental Controls can further limit a user account. Examples include enforcing a simple Finder, limiting applications and widgets, limiting Mac App Store content, setting time limits, and content filtering for several applications included in OS X.
正解:D
竹乃** -
9L0-415試験に合格するために、Pass4Testは様々な工夫がなされており、合格から逆算されている。合格者の思考力が身に付く。