Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Apple 9L0-402 Exam - Cheat-Test.com

Free 9L0-402 Sample Questions:

Q: 1 Which of these can you use to determine whether there is network connectivity between your computer and a web server on the Internet?
A. Whois
B. Finger
C. Lookup
D. Traceroute
Answer: D

Q: 2 You are an admin user, and have enabled the Ignore Volume Ownership option for an external FireWire hard disk. What will happen the next time a standard user attempts to mount the disk?
A. The disk will mount, and the user will be able to read, modify, and delete any file on the disk.
B. The disk will mount, and the user will be able to read any file on the disk; the user will be required to enter an administrator password to modify or delete files on the disk.
C. The user will be required to enter an administrator password to mount the disk; once the disk is mounted the user will be able to read, modify, and delete any file on the disk.
D. The user will be required to enter an administrator password to mount the disk; once the disk is mounted, the user will be able to read any file on the disk, but will be required to re-enter an administrator password to modify or delete files.
Answer: A

Q: 3 Which procedure can help you identify an application that will run with Rosetta?
A. Control-click the application icon, and choose Display Environment; if the Finder displays the Rosetta icon, the application will run with Rosetta.
B. From the command line, run ls in the directory where the application resides; if the application type is X11, the application will run with Rosetta.
C. Click the application icon, then choose Get Info from the Finders File menu; if the Kind fields says, Application (PowerPC), the application will run with Rosetta.
D. Click the application icon, then choose Get Info form the Finders File menu; if the Application Environment field says, Rosetta, the application will run with Rosetta.
Answer: C

Q: 4 Mac OS X v10.5 can read files on a volume that is ______ -formatted, but it cannot write to files on the volume.
A. UFS
B. NTFS
C. EXT2
D. FAT32
Answer: B

Q: 5 Which procedure will let someone who does not have a local user account log in to a local admin user account on a Mac OS X v10.5 computer that does NOT have a firmware password enabled?
A. Log in to the computer with the user name “root” and the master password, open Accounts preferences, and reset the admin user password.
B. Remove a RAM DIMM from one of the computers RAM slots, restart the computer while holding down the Command-Option-O-F keys until you hear the startup sound, then type “reset-all” at the prompt.
C. Start the computer from the internal hard disk, log into a guest user account, open the Reset Password utility in the /Applications/Utilities folder, then reset the password on the admin user account that resides on the hard disk volume.
D. Press the C key while restarting the computer with the Mac OS X v10.5 Install DVD inserted, then choose Reset Password from the Utilities menu. Select the hard disk volume and the admin user account, then enter a new password for the account and click Save.
Answer: D

Q: 6 You have configured your Mac OS X v10.5 computer to share its connected USB printer. Mac OS X users can locate and print to it, but Windows users can not. What additional step must you take to allow Windows users to print to it?
A. In Sharing preferences, enable file sharing over SMB.
B. In Print & Fax preferences, enable the SMB printer driver.
C. In Printer Setup Utility, enable Windows Printing from the Printers menu.
D. In Print & Fax preferences, configure the Windows Printer name and queue.
Answer: A

Q: 7 Which TWO statements are true of file and folder permissions in the Finder in Mac OS X v10.5? (Choose TWO.)
A. A user with Write only permissions to a folder can delete any file in that folder.
B. A user with Write only permissions to a folder can rename any file in that folder.
C. A user with Write only permissions to a folder cannot view any files in that folder.
D. A user with Read only permissions to a folder cannot view any files in that folder.
D. A user with Read only permissions to a folder cannot rename any files in that folder.
Answer: C, E

Q: 8 Tom wants to share a document with Harriet. Both have standard user accounts on the same Mac OS X v10.5 computer. Which of these is NOT a location where Tom can store the document so that Harriet can read it?
A. /Users/Shared/
B. /Users/tom/Public/
C. /Users/harriet/Public/
D. /Users/harriet/Public/Drop Box/
Answer: C

Q: 9 The primary role of the master password in Mac OS X v10.5 is to let you ______.
A. access all the passwords stored in a local keychain
B. reset the password of an account that has FileVault enabled
C. change the startup device by holding down the Option key while the computer starts up
D. connect to any password-protected web server whose password is stored in a local keychain
Answer: B

Q: 10 Which statement identifies a potential effect of resetting the master password for a Mac OS X v10.5 computer?
A. Users with keychain files created before you changed the master password must use the old master password to unlock their keychains.
B. Users who enabled FileVault before you changed he master password will not be able to access their home folder if they have forgotten their account password.
C. Users with keychain files created before you changed the master password will have their keychain passwords automatically updated to match the new master password.
D. Users whose accounts were created before you changed the master password must use the firmware password to access their home folder if they have forgotten their account password.
Answer: B

Q: 11 Migration Assistant is running on a Mac OS X v10.5 computer. It CANNOT migrate user files from ______.
A. another volume on the same computer
B. a Time Machine archive on the same computer
C. another Macintosh connected in target disk mode to the computer where Migration Assistant is running
D. an archive created by the Backup utility on a .Mac user’s mounted iDisk
Answer: D

Q: 12 In what order does Mac OS X v10.5 search the folders in the local file system for resources such as fonts?
A. ~/Library, /Library, /System/Library
B. /Library, ~/Library, /System/Library
C. /System/Library, ~/Library, /Library
D. /Library, /System/Library, ~/Library
Answer: A

Q: 13 Which information must you know about a corporate VPN server before configuring the VPN software on a users computer to access the corporate network?
A. If the corporate VPN server supports PPPoE
B. If the corporate VPN server supports DNSsec
C. If the corporate VPN server supports L2TP or PPTP
D. Which network protocols will be encrypted by the corporate VPN
Answer: C

Q: 14 What are TWO reasons a system administrator might choose to store user accounts on a directory server? (Choose TWO – partial credit possible.)
A. So that users can access their FileVault-protected home directories quickly.
B. So that users can access a variety of services using the same account credentials.
C. So that the admin user can manage user accounts centrally on the directory server, rather than individually on each client workstation.
D. So that the admin user can implement Windows-style hashes for SMB/CIFS file sharing; hashes are supported for directory accounts, but not for local accounts.
E. So that the admin user can use parental controls to manage users; parental controls restrictions can only be implemented on accounts stored on a directory server.
Answer: B, C

Q: 15 Which statement presents a benefit of protected memory?
A. Applications that crash automatically save open files.
B. Data in memory used by running applications is encrypted.
C. Applications that crash have the data in memory saved to a new file.
D. Applications that crash do not adversely affect other running applications.
Answer: D


© 2014 Cheat-Test.com, All Rights Reserved