FC0-U61 CompTIA IT Fundamentals+ Certification Exam Updated Version Syllabus

Posted by

CompTIA IT Fundamentals+ Exam Summary:
Exam Name CompTIA IT Fundamentals+
Exam Code FC0-U61
Exam Price $126 (USD)
Duration 60 mins
Number of Questions 75
Passing Score 650 / 900
Schedule Exam Pearson VUE
Sample Questions CompTIA IT Fundamentals+ Sample Questions
Practice Exam CompTIA FC0-U61 Certification Practice Exam

CompTIA IT Fundamentals (ITF+) is an introduction to basic IT knowledge and skills.

Why is it different?
CompTIA ITF+ helps professionals to decide if a career in IT is right for them or to develop a broader understanding of IT.

ITF+ is the only pre-career certification that helps students or career changers determine if they have a competency for information technology and if it is the right career path for them.
ITF+ is the only single certification that covers all areas of IT foundations, creating a broader understanding of IT making it ideal for non-technical professionals.
ITF+ establishes an IT education framework for students in secondary and post-secondary settings.

About the exam
The CompTIA IT Fundamentals exam focuses on the essential IT skills and knowledge needed to perform tasks commonly performed by advanced end-users and entry-level IT professionals alike, including:

Using features and functions of common operating systems and establishing network connectivity
Identifying common software applications and their purpose
Using security and web browsing best practices

This exam is intended for candidates who are advanced end users and/or are considering a career in IT. The exam is also a good fit for individuals interested in pursuing professional-level certifications, such as A+.


Use this quick start guide to collect all the information about CompTIA IT Fundamentals+ (FC0-U61) Certification exam. This study guide provides a list of objectives and resources that will help you prepare for items on the FC0-U61 CompTIA IT Fundamentals+ exam. The Sample Questions will help you identify the type and difficulty level of the questions and the Practice Exams will make you familiar with the format and environment of an exam. You should refer this guide carefully before attempting your actual CompTIA ITF+ certification exam.

The CompTIA IT Fundamentals+ certification is mainly targeted to those candidates who want to build their career in Core domain. The CompTIA IT Fundamentals+ exam verifies that the candidate possesses the fundamental knowledge and proven skills in the area of CompTIA ITF+.

IT Concepts and Terminology – 17%
Compare and contrast notational systems. 1. Binary
2. Hexadecimal
3. Decimal
4. Data representation

ASCII Unicode

Compare and contrast fundamental data types and their characteristics.
1. Char
2. Strings
3. Numbers
4. Boolean Illustrate the basics of computing and processing.

Integers Floats
1. Input
2. Processing
3. Output
4. Storage

Explain the value of data and information.
1. Data and information as assets
2. Importance of investing in security
3. Relationship of data to creating information
4. Intellectual property
5. Digital products
6. Data-driven business decisions

Data capture and collection
Data correlation
Meaningful reporting

Compare and contrast common units of measure.

1. Storage unit
Bit
Byte
KB
MB
GB
TB
PB

2. Throughput unit
bps
Kbps
Mbps
Gbps
Tbps

3. Processing speed
MHz
GHz

Explain the troubleshooting methodology.

1. Identify the problem
Gather information
Duplicate the problem, if possible
Question users
Identify symptoms
Determine if anything has changed
Approach multiple problems individually

2. Establish a theory of probable cause

Question the obvious
Consider multiple approaches
Divide and conquer

3. Test the theory to determine the cause

Once the theory is confirmed (confirmed root cause), determine the next steps to resolve the problem
If the theory is not confirmed, establish a new theory or escalate

4. Establish a plan of action to resolve the problem and identify potential effects
5. Implement the solution or escalate as necessary
6. Verify full system functionality and, if applicable, implement preventive measures
7. Document findings/lessons learned, actions, and outcomes

Infrastructure – 22%


Classify common types of input/output device interfaces. 1. Networking
Wired
Telephone connector (RJ-11)
Ethernet connector (RJ-45)
Wireless
Bluetooth
NFC

2. Peripheral device
USB
FireWire
Thunderbolt
Bluetooth
RF

3. Graphic device
VGA
HDMI
DVI
DisplayPort
Mini DisplayPort

Given a scenario, set up and install common peripheral devices to a laptop/PC.

1. Devices
Printer
Scanner
Keyboard
Mouse
Camera
External hard drive
Speakers
Display

2. Installation types
Plug-and-play vs. driver installation
Other required steps
IP-based peripherals
Web-based configuration steps

Explain the purpose of common internal computing components.

1. Motherboard/system board
2. Firmware/BIOS
3. RAM
4. CPU
5. Storage Hard drive SSD6. GPU
7. Cooling
8. NIC

ARM
Mobile phone
Tablet
32-bit
Laptop
Workstation
Server
64-bit
Laptop
Workstation
Server

Wired vs. wireless
On-board vs. add-on card

Compare and contrast common Internet service types.
1. Fiber optic
2. Cable
3. DSL
4. Wireless

Radio frequency
Satellite
Cellular

Compare and contrast storage types.
1. Volatile vs. non-volatile
2. Local storage types
3. Local network storage types
4. Cloud storage service

RAM
Hard drive
Solid state vs. spinning disk
Optical
Flash drive
NAS
File server

Compare and contrast common computing devices and their purposes.
1. Mobile phones
2. Tablets
3. Laptops
4. Workstations
5. Servers
6. Gaming consoles
7. IoT

Home appliances
Home automation devices
Thermostats
Security systems
Modern cars
IP cameras
Streaming media devices
Medical devices

Explain basic networking concepts.
1. Basics of network communication

Basics of packet transmission
DNS
URL-to-IP translation
LAN vs. WAN

2. Device addresses
IP address
MAC address

3. Basic protocols
HTTP/S
POP3
IMAP
SMTP

4. Devices
Modem
Router
Switch
Access point
Firewall

Given a scenario, install, configure and secure a basic wireless network.
1. 802.11a/b/g/n/ac

Older vs. newer standards
Speed limitations
Interference and attenuation factors

2. Best practices
Change SSID
Change default password
Encrypted vs. unencrypted
Open – Captive portal
WEP
WPA
WPA2

Applications and Software – 18%

Explain the purpose of operating systems. 1. Interface between applications and hardware
2. Disk management
3. Process management/scheduling
4. Application management
5. Memory management
6. Device management
7. Access control/protection
8. Types of OS

Kill process/end task
Mobile device OS
Workstation OS
Server OS
Embedded OS
Firmware
Hypervisor (Type 1)

Compare and contrast components of an operating system.

1. File systems and features
File systems
NTFS
FAT32
HFS
Ext4

2. Features
Compression
Encryption
Permissions
Journaling
Limitations
Naming rules

3. File management
Folders/directories
File types and extensions
Permissions

4. Services
5. Processes
6. Drivers
7. Utilities

Task scheduling

8. Interfaces

Console/command line
GUI

Explain the purpose and proper use of software. 1. Productivity software

Word processing software
Spreadsheet software
Presentation software
Web browser
Visual diagramming software

2. Collaboration software

Email client
Conferencing software
Instant messaging software
Online workspace
Document sharing

3. Business software

Database software
Project management software
Business-specific applications
Accounting software

Explain methods of application architecture and delivery models. 1. Application delivery methods

Locally installed
Network not required
Application exists locally
Files saved locally
Local network hosted
Network required
Internet access not required
Cloud hosted
Internet access required
Service required
Files saved in the cloud

2. Application architecture models

One tier
Two tier
Three tier
n-tier

Given a scenario, configure and use web browsers. 1. Caching/clearing cache
2. Deactivate client-side scripting
3. Browser add-ons/extensions

Add
Remove
Enable/disable

4. Private browsing
5. Proxy settings
6. Certificates

Valid
Invalid

7. Popup blockers
8. Script blockers
9. Compatible browser for application(s)
Compare and contrast general application concepts and uses. 1. Single-platform software
2. Cross-platform software

Compatibility concerns

3. Licensing

Single use
Group use/site license
Concurrent license
Open source vs. proprietary
Subscription vs. one-time purchase
Product keys and serial numbers

4. Software installation best practices

Reading instructions
Reading agreements
Advanced options

Software Development Concepts – 12%
Compare and contrast programming language categories. 1. Interpreted

Scripting languages
Scripted languages
Markup languages

2. Compiled programming languages
3. Query languages
4. Assembly language
Given a scenario, use programming organizational techniques and interpret logic. 1. Organizational techniques

Pseudocode concepts
Flow-chart concepts
Sequence

2. Logic components

Branching
Looping

Explain the purpose and use of programming concepts. 1. Identifiers

Variables
Constants

2. Containers

Arrays
Vectors

3. Functions
4. Objects

Properties
Attributes
Methods

Database Fundamentals – 11%
Explain database concepts and the purpose of a database. 1. Usage of database

Create
Import/input
Query
Reports

2. Flat file vs. database

Multiple concurrent users
Scalability
Speed
Variety of data

3. Records
4. Storage

Data persistence

Compare and contrast various database structures. 1. Structured vs. semi-structured vs. non-structured

2. Relational databases
Schema
Tables
Rows/records
Fields/columns
Primary key
Foreign key
Constraints

3. Non-relational databases

Key/value databases
Document databases

Summarize methods used to interface with databases. 1. Relational methods

Data manipulation
Select
Insert
Delete
Update
Data definition
Create
Alter
Drop
Permissions

2. Database access methods

Direct/manual access
Programmatic access
User interface/utility access
Query/report builders

3. Export/import

Database dump
Backup

Security – 20%
Summarize confidentiality, integrity and availability concerns. 1. Confidentiality concerns

Snooping
Eavesdropping
Wiretapping
Social engineering
Dumpster diving

2. Integrity concerns

Man-in-the-middle
Replay attack
Impersonation
Unauthorized information alteration

3. Availability concerns

Denial of service
Power outage
Hardware failure
Destruction
Service outage

Explain methods to secure devices and best practices. 1. Securing devices (mobile/workstation)

Antivirus/Anti-malware
Host firewall
Changing default passwords
Enabling passwords
Safe browsing practices
Patching/updates

2. Device use best practices

Software sources
Validating legitimate sources
Researching legitimate sources
OEM websites vs. third-party websites
Removal of unwanted software
Removal of unnecessary software
Removal of malicious software

Summarize behavioral security concepts. 1. Expectations of privacy when using:

The Internet
Social networking sites
Email
File sharing
Instant messaging
Mobile applications
Desktop software
Business software
Corporate network

2. Written policies and procedures
3. Handling of confidential information

Passwords
Personal information
Customer information
Company confidential information

Compare and contrast authentication, authorization, accounting and non-repudiation concepts. 1. Authentication

Single factor
Multifactor
Examples of factors
Password
PIN
One-time password
Software token
Hardware token
Biometrics
Specific location
Security questions
Single sign-on

2. Authorization

Permissions
Least privilege model
Role-based access
User account types
Rule-based access
Mandatory access controls
Discretionary access controls

3. Accounting

Logs
Tracking
Web browser history

4. Non-repudiation

Video
Biometrics
Signature
Receipt

Explain password best practices. 1. Password length
2. Password complexity
3. Password history
4. Password expiration
5. Password reuse across sites
6. Password managers
7. Password reset process
Explain common uses of encryption. 1. Plain text vs. cipher text
2. Data at rest

File level
Disk level
Mobile device

3. Data in transit

Email
HTTPS
VPN
Mobile application

Explain business continuity concepts. 1. Fault tolerance

Replication
Redundancy
Data
Network
Power
Backup considerations
Data
– File backups
– Critical data
– Database
– OS backups
Location
– Stored locally
– Cloud storage
– On-site vs. off-site
Contingency plan

2. Disaster recovery

Data restoration
Prioritization
Restoring access

To ensure success in CompTIA ITF+ certification exam, we recommend authorized training course, practice test and hands-on experience to prepare for CompTIA IT Fundamentals+ (FC0-U61) exam.

QUESTION 1
Which of the following is primarily a confidentiality concern?

A. Eavesdropping
B. Impersonating
C. Destructing
D. Altering

Correct Answer: A

QUESTION 2
A software developer develops a software program and writes a document with step-by-step instructions on
how to use the software. The developer wants to ensure no other person or company will publish this
document for public use. Which of the following should the developer use to BEST protect the document?

A. Patent
B. Trademark
C. Watermark
D. Copyright

Correct Answer: D

QUESTION 3
Which of the following database concepts would MOST likely use a CSV file?

A. Data querying
B. Data reports
C. Data importing
D. Data persistence

Correct Answer: B

Examkingdom CompTIA FC0-U61 Exam pdf, Certkingdom CompTIA FC0-U61 PDF

MCTS Training, MCITP Trainnig

Best Comptia FC0-U61 Certification, Comptia FC0-U61 Training at certkingdom.com

Click to rate this post!
[Total: 0 Average: 0]