CompTIA IT Fundamentals+ (ITF+) Exam Syllabus

IT Fundamentals+ PDF, FC0-U61 Dumps, FC0-U61 PDF, IT Fundamentals+ VCE, FC0-U61 Questions PDF, CompTIA FC0-U61 VCE, CompTIA ITF+ Dumps, CompTIA ITF+ PDFUse this quick start guide to collect all the information about CompTIA IT Fundamentals+ (FC0-U61) Certification exam. This study guide provides a list of objectives and resources that will help you prepare for items on the FC0-U61 CompTIA IT Fundamentals+ exam. The Sample Questions will help you identify the type and difficulty level of the questions and the Practice Exams will make you familiar with the format and environment of an exam. You should refer this guide carefully before attempting your actual CompTIA ITF+ certification exam.

The CompTIA IT Fundamentals+ certification is mainly targeted to those candidates who want to build their career in Core domain. The CompTIA IT Fundamentals+ exam verifies that the candidate possesses the fundamental knowledge and proven skills in the area of CompTIA ITF+.

CompTIA IT Fundamentals+ Exam Summary:

Exam Name CompTIA IT Fundamentals+
Exam Code FC0-U61
Exam Price $119 (USD)
Duration 60 mins
Number of Questions 75
Passing Score 650 / 900
Schedule Exam Pearson VUE
Sample Questions CompTIA IT Fundamentals+ Sample Questions
Practice Exam CompTIA FC0-U61 Certification Practice Exam

CompTIA FC0-U61 Exam Syllabus Topics:

Topic Details
IT Concepts and Terminology 17%
Compare and contrast notational systems. 1. Binary
2. Hexadecimal
3. Decimal
4. Data representation
  1. ASCII
  2. Unicode
Compare and contrast fundamental data types and their characteristics. 1. Char
2. Strings
3. Numbers
  1. Integers
  2. Floats

4. Boolean

Illustrate the basics of computing and processing. 1. Input
2. Processing
3. Output
4. Storage
Explain the value of data and information. 1. Data and information as assets
2. Importance of investing in security
3. Relationship of data to creating information
4. Intellectual property
  1. Trademarks
  2. Copyright
  3. Patents

5. Digital products
6. Data-driven business decisions

  1. Data capture and collection
  2. Data correlation
  3. Meaningful reporting
Compare and contrast common units of measure. 1. Storage unit
  1. Bit
  2. Byte
  3. KB
  4. MB
  5. GB
  6. TB
  7. PB

2. Throughput unit

  1. bps
  2. Kbps
  3. Mbps
  4. Gbps
  5. Tbps

3. Processing speed

  1. MHz
  2. GHz
Explain the troubleshooting methodology. 1. Identify the problem
  1. Gather information
  2. Duplicate the problem, if possible
  3. Question users
  4. Identify symptoms
  5. Determine if anything has changed
  6. Approach multiple problems individually

2. Establish a theory of probable cause

  1. Question the obvious
  2. Consider multiple approaches
  3. Divide and conquer

3. Test the theory to determine the cause

  1. Once the theory is confirmed (confirmed root cause), determine the next steps to resolve the problem
  2. If the theory is not confirmed, establish a new theory or escalate

4. Establish a plan of action to resolve the problem and identify potential effects
5. Implement the solution or escalate as necessary
6. Verify full system functionality and, if applicable, implement preventive measures
7. Document findings/lessons learned, actions, and outcomes

Infrastructure 22%
Classify common types of input/output device interfaces. 1. Networking
  1. Wired
    Telephone connector (RJ-11)
    Ethernet connector (RJ-45)
  2. Wireless
    Bluetooth
    NFC

2. Peripheral device

  1. USB
  2. FireWire
  3. Thunderbolt
  4. Bluetooth
  5. RF

3. Graphic device

  1. VGA
  2. HDMI
  3. DVI
  4. DisplayPort
  5. Mini DisplayPort
Given a scenario, set up and install common peripheral devices to a laptop/PC. 1. Devices
  1. Printer
  2. Scanner
  3. Keyboard
  4. Mouse
  5. Camera
  6. External hard drive
  7. Speakers
  8. Display

2. Installation types

  1. Plug-and-play vs. driver installation
  2. Other required steps
  3. IP-based peripherals
  4. Web-based configuration steps
Explain the purpose of common internal computing components. 1. Motherboard/system board
2. Firmware/BIOS
3. RAM
4. CPU
  1. ARM
    Mobile phone
    Tablet
  2. 32-bit
    Laptop
    Workstation
    Server
  3. 64-bit
    Laptop
    Workstation
    Server

5. Storage

  1. Hard drive
  2. SSD

6. GPU
7. Cooling
8. NIC

  1. Wired vs. wireless
  2. On-board vs. add-on card
Compare and contrast common Internet service types. 1. Fiber optic
2. Cable
3. DSL
4. Wireless
  1. Radio frequency
  2. Satellite
  3. Cellular
Compare and contrast storage types. 1. Volatile vs. non-volatile
2. Local storage types
  1. RAM
  2. Hard drive
    Solid state vs. spinning disk
  3. Optical
  4. Flash drive

3. Local network storage types

  1. NAS
  2. File server

4. Cloud storage service

Compare and contrast common computing devices and their purposes. 1. Mobile phones
2. Tablets
3. Laptops
4. Workstations
5. Servers
6. Gaming consoles
7. IoT
  1. Home appliances
  2. Home automation devices
    Thermostats
    Security systems
  3. Modern cars
  4. IP cameras
  5. Streaming media devices
  6. Medical devices
Explain basic networking concepts. 1. Basics of network communication
  1. Basics of packet transmission
  2. DNS
    URL-to-IP translation
  3. LAN vs. WAN

2. Device addresses

  1. IP address
  2. MAC address

3. Basic protocols

  1. HTTP/S
  2. POP3
  3. IMAP
  4. SMTP

4. Devices

  1. Modem
  2. Router
  3. Switch
  4. Access point
  5. Firewall
Given a scenario, install, configure and secure a basic wireless network. 1. 802.11a/b/g/n/ac
  1. Older vs. newer standards
  2. Speed limitations
  3. Interference and attenuation factors

2. Best practices

  1. Change SSID
  2. Change default password
  3. Encrypted vs. unencrypted
    Open
    - Captive portal
    WEP
    WPA
    WPA2
Applications and Software 18%
Explain the purpose of operating systems. 1. Interface between applications and hardware
2. Disk management
3. Process management/scheduling
  1. Kill process/end task

4. Application management
5. Memory management
6. Device management
7. Access control/protection
8. Types of OS

  1. Mobile device OS
  2. Workstation OS
  3. Server OS
  4. Embedded OS
    Firmware
  5. Hypervisor (Type 1)
Compare and contrast components of an operating system. 1. File systems and features
  1. File systems
    NTFS
    FAT32
    HFS
    Ext4

2. Features

  1. Compression
  2. Encryption
  3. Permissions
  4. Journaling
  5. Limitations
  6. Naming rules

3. File management

  1. Folders/directories
  2. File types and extensions
  3. Permissions

4. Services
5. Processes
6. Drivers
7. Utilities

  1. Task scheduling

8. Interfaces

  1. Console/command line
  2. GUI
Explain the purpose and proper use of software. 1. Productivity software
  1. Word processing software
  2. Spreadsheet software
  3. Presentation software
  4. Web browser
  5. Visual diagramming software

2. Collaboration software

  1. Email client
  2. Conferencing software
  3. Instant messaging software
  4. Online workspace
  5. Document sharing

3. Business software

  1. Database software
  2. Project management software
  3. Business-specific applications
  4. Accounting software
Explain methods of application architecture and delivery models. 1. Application delivery methods
  1. Locally installed
    Network not required
    Application exists locally
    Files saved locally
  2. Local network hosted
    Network required
    Internet access not required
  3. Cloud hosted
    Internet access required
    Service required
    Files saved in the cloud

2. Application architecture models

  1. One tier
  2. Two tier
  3. Three tier
  4. n-tier
Given a scenario, configure and use web browsers. 1. Caching/clearing cache
2. Deactivate client-side scripting
3. Browser add-ons/extensions
  1. Add
  2. Remove
  3. Enable/disable

4. Private browsing
5. Proxy settings
6. Certificates

  1. Valid
  2. Invalid

7. Popup blockers
8. Script blockers
9. Compatible browser for application(s)

Compare and contrast general application concepts and uses. 1. Single-platform software
2. Cross-platform software
  1. Compatibility concerns

3. Licensing

  1. Single use
  2. Group use/site license
  3. Concurrent license
  4. Open source vs. proprietary
  5. Subscription vs. one-time purchase
  6. Product keys and serial numbers

4. Software installation best practices

  1. Reading instructions
  2. Reading agreements
  3. Advanced options
Software Development 12%
Compare and contrast programming language categories. 1. Interpreted
  1. Scripting languages
  2. Scripted languages
  3. Markup languages

2. Compiled programming languages
3. Query languages
4. Assembly language

Given a scenario, use programming organizational techniques and interpret logic. 1. Organizational techniques
  1. Pseudocode concepts
  2. Flow-chart concepts
    Sequence

2. Logic components

  1. Branching
  2. Looping
Explain the purpose and use of programming concepts. 1. Identifiers
  1. Variables
  2. Constants

2. Containers

  1. Arrays
  2. Vectors

3. Functions
4. Objects

  1. Properties
  2. Attributes
  3. Methods
Database Fundamentals 11%
Explain database concepts and the purpose of a database. 1. Usage of database
  1. Create
  2. Import/input
  3. Query
  4. Reports

2. Flat file vs. database

  1. Multiple concurrent users
  2. Scalability
  3. Speed
  4. Variety of data

3. Records
4. Storage

  1. Data persistence
Compare and contrast various database structures. 1. Structured vs. semi-structured vs. non-structured
2. Relational databases
  1. Schema
  2. Tables
    Rows/records
  3. Fields/columns
    Primary key
    Foreign key
  4. Constraints

3. Non-relational databases

  1. Key/value databases
  2. Document databases
Summarize methods used to interface with databases. 1. Relational methods
  1. Data manipulation
    Select
    Insert
    Delete
    Update
  2. Data definition
    Create
    Alter
    Drop
    Permissions

2. Database access methods

  1. Direct/manual access
  2. Programmatic access
  3. User interface/utility access
  4. Query/report builders

3. Export/import

  1. Database dump
  2. Backup
Security 20%
Summarize confidentiality, integrity and availability concerns. 1. Confidentiality concerns
  1. Snooping
  2. Eavesdropping
  3. Wiretapping
  4. Social engineering
  5. Dumpster diving

2. Integrity concerns

  1. Man-in-the-middle
  2. Replay attack
  3. Impersonation
  4. Unauthorized information alteration

3. Availability concerns

  1. Denial of service
  2. Power outage
  3. Hardware failure
  4. Destruction
  5. Service outage
Explain methods to secure devices and best practices. 1. Securing devices (mobile/workstation)
  1. Antivirus/Anti-malware
  2. Host firewall
  3. Changing default passwords
  4. Enabling passwords
  5. Safe browsing practices
  6. Patching/updates

2. Device use best practices

  1. Software sources
    Validating legitimate sources
    Researching legitimate sources
    OEM websites vs. third-party websites
  2. Removal of unwanted software
  3. Removal of unnecessary software
  4. Removal of malicious software
Summarize behavioral security concepts. 1. Expectations of privacy when using:
  1. The Internet
    Social networking sites
    Email
    File sharing
    Instant messaging
  2. Mobile applications
  3. Desktop software
  4. Business software
  5. Corporate network

2. Written policies and procedures
3. Handling of confidential information

  1. Passwords
  2. Personal information
  3. Customer information
  4. Company confidential information
Compare and contrast authentication, authorization, accounting and non-repudiation concepts. 1. Authentication
  1. Single factor
  2. Multifactor
  3. Examples of factors
    Password
    PIN
    One-time password
    Software token
    Hardware token
    Biometrics
    Specific location
    Security questions
  4. Single sign-on

2. Authorization

  1. Permissions
  2. Least privilege model
  3. Role-based access
    User account types
  4. Rule-based access
  5. Mandatory access controls
  6. Discretionary access controls

3. Accounting

  1. Logs
  2. Tracking
  3. Web browser history

4. Non-repudiation

  1. Video
  2. Biometrics
  3. Signature
  4. Receipt
Explain password best practices. 1. Password length
2. Password complexity
3. Password history
4. Password expiration
5. Password reuse across sites
6. Password managers
7. Password reset process
Explain common uses of encryption. 1. Plain text vs. cipher text
2. Data at rest
  1. File level
  2. Disk level
  3. Mobile device

3. Data in transit

  1. Email
  2. HTTPS
  3. VPN
  4. Mobile application
Explain business continuity concepts. 1. Fault tolerance
  1. Replication
  2. Redundancy
    Data
    Network
    Power
  3. Backup considerations
    Data
    - File backups
    - Critical data
    - Database
    - OS backups
    Location
    - Stored locally
    - Cloud storage
    - On-site vs. off-site
  4. Contingency plan

2. Disaster recovery

  1. Data restoration
  2. Prioritization
  3. Restoring access

To ensure success in CompTIA ITF+ certification exam, we recommend authorized training course, practice test and hands-on experience to prepare for CompTIA IT Fundamentals+ (FC0-U61) exam.

Rating: 4.9 / 5 (22 votes)