On a MacBook Pro (Retina, 13-inch, Late 2013) with no peripherals attached, which of the following
are services that are able to be configured in Network Preferences? SELECT THREE.
Sarah cannot remember the iCIoud security code associated with iCloud or have access to any other
devices with iCIoud Keychain enabled. What can Sarah do next?
Francine changed Internet service providers and just set up the equipment in the home. She is
calling you because she is unable to connect to the Internet from her iMac (Late 2013). You probe
further to find out that her roommate is able to connect to the Internet using a PC and Francine is
able to connect using he iPad 2. Which of the following troubleshooting tools or techniques would
you recommend to Francine to help her further diagnose the networking issue with the iMac?
Which of the following is the correct definition of a router?
Andrew has updated his iPhone 4s to iOS 8. He has set a passcode and signed in to iCIoud. Andrew is
trying to Handoff an email from his Mac to his iPhone. Andrew’s Mac is running OS X Yosemite and
Bluetooth is on. Why is the Mail app not appearing in the corner of the iPhone lock screen?
Randall is using OS X Yosemite v10.10 on a MacBook Air (Late 2010). He would like to AirDrop a 7GB
file to a colleague. The colleague is using OS X Mountain Lion v10.8.5 on an iMac (Early 2009).
Randall cannot locate the colleague’s iMac in AirDrop. Which of the following is preventing this
Select the key combinations used to access the Recovery System and Internet Recovery. SELECT
Bradley has installed OS X on his Mac and would like to set up a Firmware Password. Where can he
find the Firmware Password Utility?
Diane is using an app that was developed by her company for internal use. She is running the app on
her MacBook Air (13-inch, Mid 2013). The app quits unexpectedly but never displays any error
messages. The other apps on her machine work without issue and she has reproduced the issue with
the app on another machine. She wants to help her development group isolate the issue. Which of
the following troubleshooting tools or techniques would you advise that she use to best isolate the
Which of the following are features of OS X designed to enhance the security and privacy of user
content? SELECT THREE,