
AX350 Day 2
Authored by oooo oooo
Other
Professional Development

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the recommended hardware requirements for running Axiom?
Screen Res; 2160p
Processor; Intel Xeon
RAM; 4 GB
Storage; SCSI
Screen Res; 1080p
Processor; 16-32 logical cores
RAM; 32-64 GB
Storage; RAID 0 or SSD
Screen Res; 720p
Processor; 8 logical cores
RAM; 8 GB
Storage; IDE or SATA
Screen Res; 1920p
Processor; 64 logical cores
RAM; 64-128 GB
Storage; NVMe M.2
Answer explanation
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
As a general recommendation how much RAM should be allocated per processing core to run Axiom?
1GB
2GB
3GB
4GB
Answer explanation
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Where can I find help about Axiom's artifacts and how to do exam tasks?
Axiom Examine/Process -->
Help -->
Check for updates
Axiom Examine/Process --> Help -->
Licensing
Axiom Examine/Process --> Help -->
About Axiom
Axiom Examine/Process --> Help --> Documentation --> User Guide or Artifact Refence
Answer explanation
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
macOS primarily stores it's configuration files in what format?
plists
.ini
.reg
.conf
Answer explanation
macOS primarily uses Property Lists or plists which can be viewed with the plist viewer built into File System Explorer as a PREVIEW card in the Details pane of AXIOM Examine
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
True / False
macOS uses drive letters to label its volumes.
True
False
Answer explanation
Unix doesn’t use drive letters, which aren’t drives in the first place. macOS mounts file systems by default under the parent folder Volumes on the system volume.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What encryption method does macOS employ?
Bitlocker
TrueCrypt
FileVault / FileVault 2
VeraCrypt
Answer explanation
Macintosh native encryption comes in two forms depending on the version of operating system, FileVault or FileVault 2.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What security device does Apple employ to prevent unauthorized access to its storage?
Trusted Platform Module
Apple T2 Security Chip
Hardware Security Modules
Secure Security Chip
Answer explanation
In 2018, Apple introduced the Apple T2 Security Chip 2 which is like the Windows Trusted Platform Module (TPM) in the way they add an additional physical layer of security.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?