9L0-415 Exam Details

  • Exam Code
    :9L0-415
  • Exam Name
    :OS X Support Essentials 10.9
  • Certification
    :Apple Certifications
  • Vendor
    :Apple
  • Total Questions
    :218 Q&As
  • Last Updated
    :Jan 23, 2026

Apple 9L0-415 Online Questions & Answers

  • Question 1:

    Keychains can be managed from the /Applications/Utilities/Keychain Access application.

    A. What two methods are used to hide items from the Finder?
    B. What application is used to manage keychain settings?
    C. What backup destination disks does Time Machine support?
    D. What's used to identify a Wi-Fi network?

  • Question 2:

    Which users are allowed to unlock a FileVault 2 protected system?

    A. Any user that's FileVault enabled is allowed to unlock a FileVault 2-protected system. This includes any local or cached network user account that was enabled when FileVault 2 was set up or created after FileVault 2 was enabled. Further, administrators may return to Security and Privacy preferences to enable additional accounts.
    B. Secure Empty Trash will perform a 7-pass erase on the contents of the Trash folder.
    C. All Apple software updates are handled via the Mac App Store.
    D. An item's ownership and permissions can be identified using the Info or Inspector windows in the Finder.

  • Question 3:

    How can you verify that the system can establish a connection to a remote network host?

    A. All Apple software updates are handled via the Mac App Store.
    B. The Activity Monitor application is used to monitor open processes and applications.
    C. The Traceroute tab of Network Utility allows you to verify the connection hops between your Mac and a remote host.
    D. A Safe Boot is initiated by holding down the Shift key during system startup

  • Question 4:

    Which application is used to examine open applications on OS X?

    A. The Disk Utility Verify and Repair feature is used to verify or repair the partition scheme and directory structure of a volume. These elements contain the information used to locate files and folders on the volume.
    B. AppleTalk works only with OS X v10.5 or earlier.
    C. The master password is used to reset local account passwords.
    D. The Activity Monitor application is used to monitor open processes and applications.

  • Question 5:

    What three security options does the Gatekeeper system allow? Which Gatekeeper option is the OS X default?

    A. Any item downloaded using one of the built-in OS X applications will be marked for quarantine. Third-party applications may not mark downloaded items for quarantine.
    B. Gatekeeper can restrict software to Mac App Store applications only, or Mac App Store and identified developer applications only (this is the default option), or any application regardless of origin.
    C. A device driver is software specially designed to facilitate the communication between OS X and a peripheral. Device drivers can be kernel extensions, framework plug-ins, or standalone applications.
    D. You can prevent automatic updates for all users by disabling the options in App Store preferences. You can further restrict a user's ability to use the Mac App Store by configuring Parental Controls for the user's account.

  • Question 6:

    How can you limit a user account from having full access to all applications?

    A. Parental Controls can further limit a user account. Examples include enforcing a simple Finder, limiting applications and widgets, limiting Mac App Store content, setting time limits, and content filtering for several applications included in OS X.
    B. The Archive option in the Finder creates compressed zip archive files.
    C. Resource contention occurs when fast user switching is enabled and a user tries to access an item another user already has open in the background. Document contention occurs when a user attempts to open a document another user has already opened. Peripheral contention occurs when a user attempts to access a peripheral already in use by another user's open application. Application contention occurs when the second user attempts to access an application designed to run only once on a system.
    D. By default on OS X, opens Archive Utility, the default application for opening zip archive files. Archive Utility, expands the contents of the zip archive next to the same location as the original zip archive.

  • Question 7:

    Local account passwords can be reset by an administrator in Users and Groups, the master password at login, an Apple ID at login, a FileVault 2 recovery key at startup, and by the Reset Password application in OS X Recovery.

    A. What three methods can be used to uninstall applications?
    B. What does OS X use bundles or packages for?
    C. What methods can be used to reset a user's lost account password?
    D. What four methods can be used to restore from a Time Machine backup?

  • Question 8:

    Where are application preferences stored?

    A. The locked file flag prevents anyone, including the item's owner, from editing an item. Only the item's owner can unlock the item to then allow modification.
    B. Code-signed items include a digital signature that the system can use to verify the authenticity and integrity of the application or process and its resources.
    C. Spotlight metadata index databases are stored at the root of every volume in a /.Spotlight-V100 folder. However, a Legacy FileVault user's database is stored in his encrypted home folder. And the Mail application maintains its own database in each user's home folder at ~/Library/Mail/V2/MailData/Envelope Index. Spotlight plug-ins can be located in any of the Library folders in a folder named Spotlight.
    D. Application preferences are almost always stored in the user's Library folder in the ~/Library/Preferences folder. Newer sandboxed applications must always store their preferences in a ~/Library/Containers//Data/Library/ Preferences folder, where "" is the unique bundle identifier for the application.

  • Question 9:

    When deleting a local user account, what three options does Users and Groups preferences give you for dealing with the user's home folder content?

    A. When a user changes his own account password, the system will keep his login keychain password in sync.
    B. When performing a Safe Boot, OS X doesn't load third-party KEXTs, third-party launch agents, third-party launch daemons, third-party startup items, third-party fonts, any user login items, or any user-specific launch agents.
    C. When deleting a local user account, OS X can archive the home folder content into a compressed disk image, leave the home folder content in the /Users folder, or delete the home folder content. Optionally, OS X can perform a secure erase on the home folder content.
    D. The Font Book application shows a small dot next to the name of any font that has duplicate resources.

  • Question 10:

    Improperly unmounting or ejecting a drive or volume may cause data corruption. The system automatically verifies and repairs an improperly unmounted or ejected volume the next time it becomes available to the Mac.

    A. What types of files are omitted from Time Machine backups?
    B. What role does the system launchd process serve during system startup?
    C. What's required to set up the iCloud Keychain service on multiple Apple devices?
    D. What's the potential side effect of improperly unmounting or ejecting a disk or volume?

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Apple exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 9L0-415 exam preparations and Apple certification application, do not hesitate to visit our Vcedump.com to find your solutions here.