admin
No description.Please update your profile.
CompTIA IT Fundamentals+ Exam Summary:
Exam Name CompTIA IT Fundamentals+
Exam Code FC0-U61
Exam Price $126 (USD)
Duration 60 mins
Number of Questions 75
Passing Score 650 / 900
Schedule Exam Pearson VUE
Sample Questions CompTIA IT Fundamentals+ Sample Questions
Practice Exam CompTIA FC0-U61 Certification Practice Exam
CompTIA IT Fundamentals (ITF+) is an introduction to basic IT knowledge and skills.
Why is it different?
CompTIA ITF+ helps professionals to decide if a career in IT is right for them or to develop a broader understanding of IT.
ITF+ is the only pre-career certification that helps students or career changers determine if they have a competency for information technology and if it is the right career path for them.
ITF+ is the only single certification that covers all areas of IT foundations, creating a broader understanding of IT making it ideal for non-technical professionals.
ITF+ establishes an IT education framework for students in secondary and post-secondary settings.
About the exam
The CompTIA IT Fundamentals exam focuses on the essential IT skills and knowledge needed to perform tasks commonly performed by advanced end-users and entry-level IT professionals alike, including:
Using features and functions of common operating systems and establishing network connectivity
Identifying common software applications and their purpose
Using security and web browsing best practices
This exam is intended for candidates who are advanced end users and/or are considering a career in IT. The exam is also a good fit for individuals interested in pursuing professional-level certifications, such as A+.
Use this quick start guide to collect all the information about CompTIA IT Fundamentals+ (FC0-U61) Certification exam. This study guide provides a list of objectives and resources that will help you prepare for items on the FC0-U61 CompTIA IT Fundamentals+ exam. The Sample Questions will help you identify the type and difficulty level of the questions and the Practice Exams will make you familiar with the format and environment of an exam. You should refer this guide carefully before attempting your actual CompTIA ITF+ certification exam.
The CompTIA IT Fundamentals+ certification is mainly targeted to those candidates who want to build their career in Core domain. The CompTIA IT Fundamentals+ exam verifies that the candidate possesses the fundamental knowledge and proven skills in the area of CompTIA ITF+.
IT Concepts and Terminology – 17%
Compare and contrast notational systems. 1. Binary
2. Hexadecimal
3. Decimal
4. Data representation
ASCII Unicode
Compare and contrast fundamental data types and their characteristics.
1. Char
2. Strings
3. Numbers
4. Boolean Illustrate the basics of computing and processing.
Integers Floats
1. Input
2. Processing
3. Output
4. Storage
Explain the value of data and information.
1. Data and information as assets
2. Importance of investing in security
3. Relationship of data to creating information
4. Intellectual property
5. Digital products
6. Data-driven business decisions
Data capture and collection
Data correlation
Meaningful reporting
Compare and contrast common units of measure.
1. Storage unit
Bit
Byte
KB
MB
GB
TB
PB
2. Throughput unit
bps
Kbps
Mbps
Gbps
Tbps
3. Processing speed
MHz
GHz
Explain the troubleshooting methodology.
1. Identify the problem
Gather information
Duplicate the problem, if possible
Question users
Identify symptoms
Determine if anything has changed
Approach multiple problems individually
2. Establish a theory of probable cause
Question the obvious
Consider multiple approaches
Divide and conquer
3. Test the theory to determine the cause
Once the theory is confirmed (confirmed root cause), determine the next steps to resolve the problem
If the theory is not confirmed, establish a new theory or escalate
4. Establish a plan of action to resolve the problem and identify potential effects
5. Implement the solution or escalate as necessary
6. Verify full system functionality and, if applicable, implement preventive measures
7. Document findings/lessons learned, actions, and outcomes
Infrastructure – 22%
Classify common types of input/output device interfaces. 1. Networking
Wired
Telephone connector (RJ-11)
Ethernet connector (RJ-45)
Wireless
Bluetooth
NFC
2. Peripheral device
USB
FireWire
Thunderbolt
Bluetooth
RF
3. Graphic device
VGA
HDMI
DVI
DisplayPort
Mini DisplayPort
Given a scenario, set up and install common peripheral devices to a laptop/PC.
1. Devices
Printer
Scanner
Keyboard
Mouse
Camera
External hard drive
Speakers
Display
2. Installation types
Plug-and-play vs. driver installation
Other required steps
IP-based peripherals
Web-based configuration steps
Explain the purpose of common internal computing components.
1. Motherboard/system board
2. Firmware/BIOS
3. RAM
4. CPU
5. Storage Hard drive SSD6. GPU
7. Cooling
8. NIC
ARM
Mobile phone
Tablet
32-bit
Laptop
Workstation
Server
64-bit
Laptop
Workstation
Server
Wired vs. wireless
On-board vs. add-on card
Compare and contrast common Internet service types.
1. Fiber optic
2. Cable
3. DSL
4. Wireless
Radio frequency
Satellite
Cellular
Compare and contrast storage types.
1. Volatile vs. non-volatile
2. Local storage types
3. Local network storage types
4. Cloud storage service
RAM
Hard drive
Solid state vs. spinning disk
Optical
Flash drive
NAS
File server
Compare and contrast common computing devices and their purposes.
1. Mobile phones
2. Tablets
3. Laptops
4. Workstations
5. Servers
6. Gaming consoles
7. IoT
Home appliances
Home automation devices
Thermostats
Security systems
Modern cars
IP cameras
Streaming media devices
Medical devices
Explain basic networking concepts.
1. Basics of network communication
Basics of packet transmission
DNS
URL-to-IP translation
LAN vs. WAN
2. Device addresses
IP address
MAC address
3. Basic protocols
HTTP/S
POP3
IMAP
SMTP
4. Devices
Modem
Router
Switch
Access point
Firewall
Given a scenario, install, configure and secure a basic wireless network.
1. 802.11a/b/g/n/ac
Older vs. newer standards
Speed limitations
Interference and attenuation factors
2. Best practices
Change SSID
Change default password
Encrypted vs. unencrypted
Open – Captive portal
WEP
WPA
WPA2
Applications and Software – 18%
Explain the purpose of operating systems. 1. Interface between applications and hardware
2. Disk management
3. Process management/scheduling
4. Application management
5. Memory management
6. Device management
7. Access control/protection
8. Types of OS
Kill process/end task
Mobile device OS
Workstation OS
Server OS
Embedded OS
Firmware
Hypervisor (Type 1)
Compare and contrast components of an operating system.
1. File systems and features
File systems
NTFS
FAT32
HFS
Ext4
2. Features
Compression
Encryption
Permissions
Journaling
Limitations
Naming rules
3. File management
Folders/directories
File types and extensions
Permissions
4. Services
5. Processes
6. Drivers
7. Utilities
Task scheduling
8. Interfaces
Console/command line
GUI
Explain the purpose and proper use of software. 1. Productivity software
Word processing software
Spreadsheet software
Presentation software
Web browser
Visual diagramming software
2. Collaboration software
Email client
Conferencing software
Instant messaging software
Online workspace
Document sharing
3. Business software
Database software
Project management software
Business-specific applications
Accounting software
Explain methods of application architecture and delivery models. 1. Application delivery methods
Locally installed
Network not required
Application exists locally
Files saved locally
Local network hosted
Network required
Internet access not required
Cloud hosted
Internet access required
Service required
Files saved in the cloud
2. Application architecture models
One tier
Two tier
Three tier
n-tier
Given a scenario, configure and use web browsers. 1. Caching/clearing cache
2. Deactivate client-side scripting
3. Browser add-ons/extensions
Add
Remove
Enable/disable
4. Private browsing
5. Proxy settings
6. Certificates
Valid
Invalid
7. Popup blockers
8. Script blockers
9. Compatible browser for application(s)
Compare and contrast general application concepts and uses. 1. Single-platform software
2. Cross-platform software
Compatibility concerns
3. Licensing
Single use
Group use/site license
Concurrent license
Open source vs. proprietary
Subscription vs. one-time purchase
Product keys and serial numbers
4. Software installation best practices
Reading instructions
Reading agreements
Advanced options
Software Development Concepts – 12%
Compare and contrast programming language categories. 1. Interpreted
Scripting languages
Scripted languages
Markup languages
2. Compiled programming languages
3. Query languages
4. Assembly language
Given a scenario, use programming organizational techniques and interpret logic. 1. Organizational techniques
Pseudocode concepts
Flow-chart concepts
Sequence
2. Logic components
Branching
Looping
Explain the purpose and use of programming concepts. 1. Identifiers
Variables
Constants
2. Containers
Arrays
Vectors
3. Functions
4. Objects
Properties
Attributes
Methods
Database Fundamentals – 11%
Explain database concepts and the purpose of a database. 1. Usage of database
Create
Import/input
Query
Reports
2. Flat file vs. database
Multiple concurrent users
Scalability
Speed
Variety of data
3. Records
4. Storage
Data persistence
Compare and contrast various database structures. 1. Structured vs. semi-structured vs. non-structured
2. Relational databases
Schema
Tables
Rows/records
Fields/columns
Primary key
Foreign key
Constraints
3. Non-relational databases
Key/value databases
Document databases
Summarize methods used to interface with databases. 1. Relational methods
Data manipulation
Select
Insert
Delete
Update
Data definition
Create
Alter
Drop
Permissions
2. Database access methods
Direct/manual access
Programmatic access
User interface/utility access
Query/report builders
3. Export/import
Database dump
Backup
Security – 20%
Summarize confidentiality, integrity and availability concerns. 1. Confidentiality concerns
Snooping
Eavesdropping
Wiretapping
Social engineering
Dumpster diving
2. Integrity concerns
Man-in-the-middle
Replay attack
Impersonation
Unauthorized information alteration
3. Availability concerns
Denial of service
Power outage
Hardware failure
Destruction
Service outage
Explain methods to secure devices and best practices. 1. Securing devices (mobile/workstation)
Antivirus/Anti-malware
Host firewall
Changing default passwords
Enabling passwords
Safe browsing practices
Patching/updates
2. Device use best practices
Software sources
Validating legitimate sources
Researching legitimate sources
OEM websites vs. third-party websites
Removal of unwanted software
Removal of unnecessary software
Removal of malicious software
Summarize behavioral security concepts. 1. Expectations of privacy when using:
The Internet
Social networking sites
Email
File sharing
Instant messaging
Mobile applications
Desktop software
Business software
Corporate network
2. Written policies and procedures
3. Handling of confidential information
Passwords
Personal information
Customer information
Company confidential information
Compare and contrast authentication, authorization, accounting and non-repudiation concepts. 1. Authentication
Single factor
Multifactor
Examples of factors
Password
PIN
One-time password
Software token
Hardware token
Biometrics
Specific location
Security questions
Single sign-on
2. Authorization
Permissions
Least privilege model
Role-based access
User account types
Rule-based access
Mandatory access controls
Discretionary access controls
3. Accounting
Logs
Tracking
Web browser history
4. Non-repudiation
Video
Biometrics
Signature
Receipt
Explain password best practices. 1. Password length
2. Password complexity
3. Password history
4. Password expiration
5. Password reuse across sites
6. Password managers
7. Password reset process
Explain common uses of encryption. 1. Plain text vs. cipher text
2. Data at rest
File level
Disk level
Mobile device
3. Data in transit
Email
HTTPS
VPN
Mobile application
Explain business continuity concepts. 1. Fault tolerance
Replication
Redundancy
Data
Network
Power
Backup considerations
Data
– File backups
– Critical data
– Database
– OS backups
Location
– Stored locally
– Cloud storage
– On-site vs. off-site
Contingency plan
2. Disaster recovery
Data restoration
Prioritization
Restoring access
To ensure success in CompTIA ITF+ certification exam, we recommend authorized training course, practice test and hands-on experience to prepare for CompTIA IT Fundamentals+ (FC0-U61) exam.
QUESTION 1
Which of the following is primarily a confidentiality concern?
A. Eavesdropping
B. Impersonating
C. Destructing
D. Altering
Correct Answer: A
QUESTION 2
A software developer develops a software program and writes a document with step-by-step instructions on
how to use the software. The developer wants to ensure no other person or company will publish this
document for public use. Which of the following should the developer use to BEST protect the document?
A. Patent
B. Trademark
C. Watermark
D. Copyright
Correct Answer: D
QUESTION 3
Which of the following database concepts would MOST likely use a CSV file?
A. Data querying
B. Data reports
C. Data importing
D. Data persistence
Correct Answer: B
Examkingdom CompTIA FC0-U61 Exam pdf, Certkingdom CompTIA FC0-U61 PDF
Best Comptia FC0-U61 Certification, Comptia FC0-U61 Training at certkingdom.com
No description.Please update your profile.
@ 2016 Certkingdom.com-Developed By Certkingdom.com