A+ Sub-Objective 1.9

A+ Sub-Objective 1.9 – Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems.

Welcome to ExamNotes by CertBlaster! The objectives we will cover in this section focus on best practices, tools, and commands used on the Mac and Linux. Boredom alert! Because this exam objective focuses on commands, there are no pictures. So to compensate a little for the dryness, we have put a short video at the very bottom of this post.

Click here for the A+ Practice Test Bundle for A+ Exams 220-1001 & 220-1002

Best practices

Scheduled backups

Backups can be scheduled and maintained using the system tools listed in the tools section below.

Scheduled disk maintenance

In OS X, scheduled disk maintenance is performed using the Disk Utility app located using the Finder in the Utilities folder. Within the Disk Utility tool on the First Aid tab, disk permissions can be verified/ repaired or the entire disk itself can be verified. Disk permissions can become corrupted after multiple software installs or uninstalls.

System updates/App store

In Linux, system updates can be obtained from the Terminal using the sudo apt-get update command. On Macs, OS X updates can be downloaded and installed automatically in much the same way that Windows systems handle updates. OS X updates are obtained from the App store.

Patch management

Patch management is the process of reviewing and controlling software and driver fixes for repairing or patching hardware/software. In the case of urgent security fixes, patches are often pushed onto the machine. Usually, patches can be scheduled or separately downloaded to be installed manually.

Driver/firmware updates

Just as previously described for software, hardware manufacturers release updated drivers and firmware for system hardware. These updates are usually in response to a problem/bug or at times, to add new features or capabilities.

Antivirus/ Antimalware updates

Although many believe that non-Windows operating systems are immune to malware and viruses, it is still not recommended to access the Internet without antivirus and anti-malware programs installed. These programs are frequently updated, often during the discovery of a new threat. There are many programs to choose from. The key is to find one that fits your needs.

For example, most programs offer free full feature versions of their product for evaluation. These trials have time limits and will require purchase or downgrading to a more basic version once the trial period has elapsed. If you require automatic updates, this feature is usually not available in free versions. There was one virus scanner whose free version would detect viruses. However, the paid version would be required to remove the viruses.

Tools

Backup/Time Machine

Backup, or Time Machine, is a Mac OS system backup utility where regular backups can be scheduled or manual backups can be initiated. Drives can be backed up to internal drives, DVDs, or any USB, FireWire, or Thunderbolt devices that are accessible by the system.

Restore/snapshot

Time Capsule creates periodic snapshots of your critical data and backs it up to a specified location. Files can also be restored from Time Machine’s backup images. In order to do this, open Time Machine, locate the target data by time, and choose Restore.

Image recovery

In a worst case scenario, Time Machine can also recover and restore a complete system. Hopefully, there are many recovery images to choose from. Holding the Command key and R during boot will show the recovery option menu. From there, the system can be restored from a Time Machine Backup, the system’s OS can be reinstalled, the user can ask for help online, or the system will open up the Disk Utility.

Disk maintenance utilities

On a Mac, these are primarily accessed through the Applications folder by choosing Utilities > Disk Utility. Although there are other methods of accessing Disk maintenance, this is the recommended way. These tools are used to partition, erase, or format a disk. This utility can also be used to write zeroes to the free space on the drive.

In First Aid, the disk itself can be verified and the disk permissions can be verified or repaired. Other disk utilities can be accessed in the operating system. The trash can be emptied using the Trash icon in the Finder. The amount of free space can be viewed by Clicking About this Mac and accessing the Storage menu.

Be aware of your disk capacity and the amount of space you are using. Utilities such as Time Machine will ensure that your disk is never full by deleting the oldest backup image and by maintaining a minimum of at least 15% free space.

Disk maintenance utilities are not generally required in Linux. fsck (file system check) can be run periodically in order to make sure everything in the file system is in order. Routine tasks, such as cleaning up temporary files, are automatic in Linux distributions. There are downloadable maintenance packages that can be run, however, these are more relevant to servers than workstations.

Click here for the A+ Practice Test Bundle for A+ Exams 220-1001 & 220-1002

Shell/Terminal

A shell provides an environment for users to interact with the operating systems. This interaction can be in the form of a command prompt that uses a command interpreter to process input. This interaction can also be graphical, in the case of Windows, Linux, or Mac based GUIs.

Screen sharing

Screen sharing in Macs is performed in much the same way as it is for Windows Remote assistance. Screen sharing is enabled on a Mac in System Preferences > Sharing. Screen sharing options are available in addition to file, print, remote, Internet, and Bluetooth sharing options.

Force Quit

Force Quit can be used if your Mac is not behaving as expected. Click the Apple menu and choose Force Quit. The key combination Command – Option – Esc can also be used to activate Force Quit and is the equivalent to Ctrl + Alt + Del in Windows.

Features

Multiple desktops/Mission Controls

This is a Mac’s process for creating multiple open “Spaces.” Mission Control allows for multiple desktops to be created. This is accomplished by opening Mission Control with the Control + Up Arrow. At first, one thumbnail window will appear at the top of the workspace. Dragging an open window up and to the right of the initial Space will create a second thumbnail or Space. The user can switch between the multiple desktops by hitting Control and the Right or Left-directional arrows.

Keychain

Keychain is the MacOS password management system. Keychain can manage passwords and credentials for the local machine, wireless network, email, and now iCloud. Keychain can automatically synchronize passwords when they are changed for the main login.

Spotlight

Spotlight is the MacOS search feature which has been upgraded to include location sensitive search results. Fundamentally, Spotlight is a search utility that can help find files or folders that are lost or forgotten locally as well as any content on the web if connected.

iCloud

iCloud provides online storage and is available to anyone with an Apple ID. On an OS X device, the iCloud drive will appear with your regular drives and the folder structure can be fully manipulated. iPhones and iPads can sync content but cannot modify the file structure.

Gestures

Gestures can be used on a touchscreen or touchpad. Let’s consider the touchpad example here.

Example gestures are described below. A right (or secondary) click can be performed by tapping on the lower right hand side of the touchpad. Scroll up or down the screen by swiping two fingers up or down on the touchpad. Zooming in is performed by touching the pad with two fingers and moving your fingertips apart. Zooming out is performed by pulling your fingertips together. Swiping can produce a variety of results depending on the direction of the swipe and number of fingers used. For example, scroll through a photo album by swiping left or right with two fingers. Swiping up with three fingers launches Mission Control.

Finder

Finder is the file manager for OS X and is comparable to File Explorer in Windows.

Remote Disc

Remote Disc allows access to shared optical drives on Windows or Mac machines. Remote Disc also allows connection of external Apple USB Super Drives.

Dock

The dock is a bar that runs across the bottom of the screen on MacOS machines and contains application shortcut icons. The dock contains a default set of applications that can be launched by clicking or tapping them. If a program is used frequently, you may want it added to the dock. This is accomplished by dragging the desired application’s icon down from Launchpad to the dock. Items can be removed from the doc by dragging them out to free space on the desktop, waiting for the “remove” option to appear, and releasing the icon.

Boot Camp

Boot Camp is the OS X utility that allows Windows to be installed and run on a Mac. Disk space will need to be allocated for the Windows installation. Windows can be installed from an ISO image of the Windows OS or from a bootable USB drive that has the necessary files. After installation, the system will be dual boot capable and can boot to OS X or Windows.

Basic Linux commands

Let’s look at some of the Linux commands you’ll need to understand and use in order to navigate a Linux environment. The following commands can be executed at the Terminal window or shell prompt.

ls

The ls command, when used without modifiers, displays a file listing of the pwd (present working directory). Adding the –l modifier provides additional information regarding the files contained in the directory.

grep

Provides search capabilities within files.

cd

cd stands for “Change Directory” and changes from the PWD to a specified target directory.

shutdown

shutdown halts the system. A time value to wait and a message before performing the action can be set here. For example, Shutdown –h +15 “Please logout now. System will shut down in 15 minutes” can be entered in order to set a waiting time t and to show a message.

Click here for the A+ Practice Test Bundle for A+ Exams 220-1001 & 220-1002

pwd vs. passwd

This is a source of confusion for new users. Pwd is the present working directory (not password) while passwd is the file that tracks every registered user that has access to the system. The user name and User ID (UID) are stored in passwd as well as the encrypted password. This information can be found in the Shadow file.

mv

Moves a file or renames it if the source and destination are the same directory. Example usage is mv <source> <destination>

cp

cp is used to copy a file. The source and destination for the operation must be identified.

rm

rm is used to delete or remove files at the command line.

chmod

chmod changes the mode of files and directories, making them more or less useful by changing the permissions. The permissions consist of d, if the object is a directory, and r-x-w which correspond to read , write, and execute. These permissions are applied to the owner, group, or other users.

chown

chown is used to change the owner or group of a given file.

iwconfig/ifconfig

iwconfig/ifconfig are network configuration commands. Ifconfig modifies any value associated with the Ethernet card (eth0). Iwconfig changes values associated with wireless network interfaces.

ps

ps is process status. This command will display running commands and their Process ID (PID) by the current user. Using ps -aux will display running commands for all users.

su/sudo

su stands for substitute user and is used to change from the current user account to another account. A good example of this would be su root which is used to change to the root user. su mine is used to switch back to the mine account.

sudo

sudo permits a substitute user to “do” a command. By default the sudo user is the super user.

apt-get

apt-get is used at the command line interface to retrieve, install, or remove packages in Linux.

vi

vi opens the vi text editor. vi has two modes of operation: insert mode, which allows text to be added or inserted into a file, and Command mode, which is used to take action on a file.

dd

dd is the built in “data duplicator” for Linux. It can be used to back up data to drives, CDs, or DVDs.

Click here for the A+ Practice Test Bundle for A+ Exams 220-1001 & 220-1002

kill

Halts a program or process.And that concludes A+ 220-1002 Sub-objective 1.9. You’ve now completed the first main objective domain of 220-1002!! Congratulations! Keep it up! Good luck on the exam!

By continuing to browse this site, you accept the use of cookies and similar technologies that will allow the use of your data by CertBlaster in order to produce audience statistics- see our privacy policy.