최신 ACTC 9L0-528 무료샘플문제:
1. You are logged into a MacBook Pro as a standard user. How can you display the OS X Mountain Lion build number?
A) Choose About This Mac from the Apple menu, and then click the text directly under OS X until the build number is revealed.
B) In the General pane of System Preferences, click the Info disclosure triangle to reveal the build number.
C) Type build_number in Spotlight, and then scroll through the resulting information until the build number is revealed.
D) Choose Software Update from the Apple menu, and then choose Build Number from the Update menu.
2. You are configuring an OS X Mountain Lion computer that will be located in a public space. You want anyone to be able to log in and use Safari, but you do NOT want their Safari browser history to remain on the computer after users log out. Which action will let the computer function in the desired manner?
A) Create a managed account with Parental Controls.
B) Enable the Guest account for login.
C) Create a Sharing Only account.
D) Create a Guest account.
3. You can configure Time Machine to delete versions of files as soon as they reach a specified age.
A) True
B) False
4. Your Mac is started up from its OS X Recovery partition. You need to repair the hard disk. Which procedure will let you perform the repair?
A) Quit the Recovery app, then open Disk Utility from the /Applications/Utilities/ folder on the Macintosh HD partition, select the hard disk, and click Repair Disk.
B) Quit the Recovery app, then open Disk Utility from the /Applications/Utilities/ folder on the OS X Recovery partition, select the hard disk, and click Repair Disk.
C) Select Disk Utility in the OS X Utilities window, click Continue, select the hard disk, and click Repair Disk.
D) In the OS X Utilities window, click Select Volume, click Continue, select the hard disk, and click Verify & Repair.
5. In OS X Mountain Lion, Safe Boot ________.
A) prevents users from accessing sensitive system files by loading Simple Finder instead of Finder at startup
B) increases data security by modifying Sharing settings, so only essential protocols are enabled at startup
C) increases data security by assigning all standard users Read-only privileges to mounted local volumes
D) facilitates troubleshooting by preventing loading of third-party components in the operating system at startup
질문과 대답:
질문 # 1 정답: A | 질문 # 2 정답: A,B,D | 질문 # 3 정답: B | 질문 # 4 정답: C | 질문 # 5 정답: D |