ACSP (Apple Certified Support Professional) exam study guide fully solved & verified for accuracy 2024
System Profiler Collect a list of installed applications. Time Machine Used to run recurring backups. What you should use if you are reinstalling OSX Spotlight Search Command Spacebar is the shortcut Command Shift H Navigate to your home folder Command N New Finder Window Command + Shift + 3 Screen Shot to desktop. Hold down control to store to clipboard. Command + Shift + 4 User Defined Screen Shot. Hold down control to store to clipboard. Command + Shift + 4 + Spacebar Command + Shift + 4 (release) then Spacebar Takes a screenshot of the windows that is open or the entire desktop if you are on that. The second command shows a camera icon and highlights the area it will screen capture. Steps before updating OSX - Verify Application Compatibility - Backup Important Files and Folders - Backup Critical Settings such as your network settings - Check for Apple software and firmware updates Firmware Low level software that facilitates the startup and management of system hardware. You can determine if you have the latest firmware by going to the apple support article. Firmware Boot ROM For the extensible firmware interface (EFI) which is responsible for general hardware management and system startup. Firmware SMC Version For the System Management Controller which is responsible for managing hardware, cooling and power. Installation Support For the most recent information on install process. Re-install OSX prep Prepare the system disk. It must be partitioned via the GUID partition table and contain at least one Mac OS Extended (journalled) formatted volume. You use the disk utility for both erasing and repartitioning. Re-install OSX requirements - Must be running 10.6.8 or higher - Connected to the internet - Sign in with an Apple ID Then download from App store. OSX Erase and Install (Clean Installation) You must manually erase the destination system disk using Disk Utility before running the OSX Installer. OSX Recovery System (Command R) On reboot this command initiates the OSX Recovery system. Includes a variety of administration and troubleshooting utilities. TCP/IP Transmission Control Protocol / Internet Protocol. Became the universal language that allows computers to communicate across the internet. Network Interface Network medium through which network data flows. Network interfaces can be physical or virtual. Ethernet and wifi are the most common physical network interfaces. Network Protocol A protocol defines a set of standard rules used for data representation, signalling, authentication, or error detection across network interfaces. Network Service Describes a configuration assigned to a network interface. A fundamental feature of OSX is the ability to support multiple network services or connections for each individual network interface. MAC Address Media Access Control Address is used to uniquely identify a physical network interface on a local network. Each physical network interface has at least one MAC address associated with it. 48 bit number represented by 6 groups of two digit hexadecimal numbers separated by colons. IP Address Communicating with computers on both local and remote networks requires an IP address. IP addresses, unlike MAC addresses are not permanently tied to a network interface. Instead they are assigned to the network interface based on the local networks it's connected to. IPv4 IPv4 was the first widely used IP addressing scheme and is the most common today. It is a 32-bit number represented by four groups of three digit numbers, also known as octets, separated by periods. Each octet has a value between 0 and 255. 4 billion unique addresses. IPv6 128 bit number that is presented in eight groups of four-digit hexadecimal number separated by colons. Hexadecimal numbers use a base-16 digit system so after the number 9 you use the letters A-F. Subnet Mask A computer uses the subnet mask to determine the IPv4 address range of the local network. A subnet mask, also referred to as an address mask, is a 32-bit value that is used to distinguish the network ID from the host ID in an arbitrary IP address. Router Address Routers are network devices that manage connections between separate networks. They route traffic between the networks they bridge. Routing tables are maintained by routers to determine where network traffic goes. TCP TCP is the primary protocol used to facilitate end to end data connectivity between two IP devices. UDP User Datagram Protocol is also attached to the TCP/IP suite. UDP is a simpler protocol that does not guarantee the reliability or ordering of data sent across networks. It does however provide better performance. Manually Download all Apple Software Updates Here - Support.A Installer Log Command + i Install History The complete install history is available via system information. User account types Standard, Admin, Guest, sharing only, root account User Account - Standard User Account - Admin User Account - Guest User Account - Sharing Only Special account that only has access to you guessed it shared files and folders :) No home folder, no access to terminal. User Account - Root Unlimited access to everything (read, write, delete). Use directory utility application to enable root. Enable filevault or set a firmware password to restrict access. Local Group Accounts A list of user accounts. Primarily used to allow
Written for
- Institution
- Apple Device support
- Course
- Apple Device support
Document information
- Uploaded on
- April 3, 2024
- Number of pages
- 24
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
acsp apple certified support professional exam
Also available in package deal