CompTIA Tech+ Exam Syllabus

Tech+ PDF, FC0-U71 Dumps, FC0-U71 PDF, Tech+ VCE, FC0-U71 Questions PDF, CompTIA FC0-U71 VCE, CompTIA Tech Plus Dumps, CompTIA Tech Plus PDFUse this quick start guide to collect all the information about CompTIA Tech+ (FC0-U71) Certification exam. This study guide provides a list of objectives and resources that will help you prepare for items on the FC0-U71 CompTIA Tech+ exam. The Sample Questions will help you identify the type and difficulty level of the questions and the Practice Exams will make you familiar with the format and environment of an exam. You should refer this guide carefully before attempting your actual CompTIA Tech Plus certification exam.

The CompTIA Tech+ certification is mainly targeted to those candidates who want to build their career in Digital Skills domain. The CompTIA Tech+ exam verifies that the candidate possesses the fundamental knowledge and proven skills in the area of CompTIA Tech Plus.

CompTIA Tech+ Exam Summary:

Exam Name CompTIA Tech+
Exam Code FC0-U71
Exam Price $125 (USD)
Duration 60 mins
Number of Questions 70
Passing Score 650 / 900
Books / Training CompTIA CertMaster Learn
Schedule Exam Pearson VUE
Sample Questions CompTIA Tech+ Sample Questions
Practice Exam CompTIA FC0-U71 Certification Practice Exam

CompTIA FC0-U71 Exam Syllabus Topics:

Topic Details

IT Concepts and Terminology - 13%

Explain the basics of computing. - Input
- Processing
- Output
- Storage
Identify notational systems. - Binary
- Hexadecimal
- Decimal
- Octal
Compare and contrast common units of measure. - Storage unit
  • Bit
  • Byte
  • Kilobyte (KB)
  • Megabyte (MB)
  • Gigabyte (GB)
  • Terabyte (TB)
  • Petabyte (PB

- Throughput unit

  • Bits per second (bps)
  • Kilobits per second (Kbps)
  • Megabits per second (Mbps)
  • Gigabits per second (Gbps)
  • Terabytes per second (Tbps)

- Processing speed

  • Megahertz (MHz)
  • Gigahertz (GHz)
Explain the troubleshooting methodology. - Identify the problem.
- Establish a theory of probable cause (question the obvious).
  • Research knowledge base/internet, if applicable.

- Test the theory to determine the cause.
- Establish a plan of action to resolve the problem and implement the solution.
- Verify full system functionality and, if applicable, implement preventive measures.
- Document findings/lessons learned, actions, and outcomes.

Infrastructure - 24%

Explain common computing devices and their purposes. - Smartphones
- Tablets
- E-readers
- Laptops
- Workstations
- Servers
- Gaming consoles
- Virtual reality systems
- Augmented reality systems
- Internet of Things (IoT)
  • Home appliances
  • Home automation devices
    - Thermostats
    - Security systems
    - Home assistants
    - Deadbolts/door locks
    - Video doorbells
  • - Vehicles
  • Internet Protocol (IP)/ security cameras
  • Streaming media devices
  • Medical devices
  • Exercise equipment
  • Wearable devices
Explain the purpose of common internal computing components. - Motherboard/system board
- Firmware/basic input/ output system (BIOS)
- Random-access memory (RAM)
- Central processing unit (CPU)
- Graphics processing unit (GPU)
- Storage
- Network interface card (NIC)
  • Wired vs. wireless
  • Onboard vs. expansion card
Compare and contrast storage types. - Volatile vs. non-volatile
- Local storage
  • RAM
  • Read-only memory (ROM)
  • Storage drive
    - Magnetic disks/hard disk drive (HDD)
    - Solid-state drive (SSD)
    - Non-volatile memory express (NVMe)
  • Optical
  • External flash drives

- Local network storage

  • Network-attached storage (NAS)
  • File server
  • Cloud storage service
Given a scenario, install and configure common peripheral devices. - Devices
  • Printer
  • Scanner
  • Keyboard
  • Mouse
  • Web camera
  • External drive
  • Speakers/headset
  • Display
    - Smart TV
    - Projector
    - Monitor
  • Uninterruptable power supply (UPS)

- Installation types

  • Plug-n-play vs. driver installation
  • Other required steps
  • IP-based peripherals
  • Web-based configuration steps
Compare and contrast common types of input/output device interfaces. - Networking
  • Wired
    - Ethernet connector (RJ45)
    - Fiber connector small form-factor pluggable (SFP)
  • Wireless
    - Bluetooth
    - Near-field communication (NFC)
    - 802.11X
  • Networking devices and tools
    - Crimpers
    - Cable testers

- Peripheral devices

  • USB (A/B/C)
  • Thunderbolt
  • Bluetooth
  • Radio frequency (RF)
  • Lightning

- Display ports

  • Video Graphics Array (VGA)
  • Digital Visual Interface (DVI)
  • High Definition Media Interface (HDMI)
  • DisplayPort
  • USB-C

- Display technology

  • Mirroring
  • Casting
Compare and contrast virtualization and cloud technologies. - Virtualization
  • Hypervisor
  • Guest operating system (OS)

- Cloud concepts

  • Platform as a Service (PaaS)
  • Infrastructure as a Service (IaaS)
  • Software as a Service (SaaS)

- Deployment models

  • On premises
  • Cloud
  • Hybrid
Compare and contrast common internet service types. - Fiber optic
- Cable
- Digital subscriber line (DSL)
- Wireless
  • RF
  • Satellite
  • Cellular
Identify basic networking concepts. - Basics of network communication
- Network identifiers
  • IP address
  • Media access control (MAC) address
  • Ports

- Basic network services

  • Secure web browsing
  • File transfer
  • Email

- Networking devices

  • Modem
  • Router
  • Switch
  • Access point
  • Firewall

- Networking models

  • Client/server
  • Peer-to-peer

- Local area network (LAN)
- Wide area network (WAN)

Explain the basic capabilities of a small wireless network. - 802.11n/ac/ax
  • Speed considerations
  • Interference and attenuation factors

- Older vs. newer standards
- Band options

  • 2.4GHz
  • 5GHz
  • 6GHz

Applications and Software - 18%

Identify components of an OS. - Filesystem characteristics
  • Compression
  • Encryption
  • Types and extensions

- File management

  • Folders/directories
  • Permissions
  • Naming restrictions

- System applications and utilities
- Services
- Processes
- Drivers
- Interfaces

  • Console/command line
  • Graphical user interface (GUI)
  • File attributes and properties
Explain the purpose of operating systems. - Interface between applications and hardware
- Disk management
- Task and process management
- Application management
- Device management
- Access control
- OS types
  • Mobile device
  • Desktop/workstation
  • Server
  • Embedded
Explain the purpose and proper use of software. - Productivity software
  • Word processing
  • Spreadsheet
  • Presentation
  • Visual diagramming

- Collaboration software

  • Email client
  • Conferencing
  • Online workspace
  • Document sharing

- Instant messaging software
- Web-browsing software
- Remote support software

Given a scenario, configure and use web browser features. - Private browsing
- Browser add-ons/extensions
  • Add
  • Remove
  • Enable/disable

- Caching/clearing cache
- Pop-up blockers
- Compatible browser for application(s)
- Profile synchronization
- Organizing features

  • Bookmarks

- Default search engine
- Password management
- Accessibility
- Appearance

Identify common uses of artificial intelligence (AI). - AI chatbots
- AI assistants
- Generative AI
  • AI-generated code
  • AI-generated content

- AI predictions and suggestions

Software Development Concepts - 13%

Compare and contrast programming language categories. - Interpreted
  • Scripting languages
  • Markup languages

- Compiled programming languages
- Query languages

  • Assembly languages
Identify fundamental data types and their characteristics. - Char
- Strings
- Numbers
  • Integers
  • Floats

- Boolean

Explain the purpose and use of programming concepts. - Identifiers
  • Variables
  • Constants

- Arrays
- Functions
- Objects

  • Properties
  • Attributes
  • Methods
Identify programming organizational techniques and logic concepts. - Organizational techniques
  • Pseudo code concepts
  • Object-oriented methods
  • Comments and documentation
  • Flow chart concepts
    - Sequence

- Logic concepts

  • Branching
  • Looping

Data and Database Fundamentals - 13%

Explain the value of data and information. - Data and information as an asset
  • Critical vs. non-critical data

- Data-driven business decisions

  • Data capture and collection
  • Data correlation
  • Meaningful reporting

- Data monetization
- Data analytics
- Big Data

Explain database concepts and the purpose of a database. - Database uses
  • Create
  • Import/input
  • Query
  • Reports

- Flat file vs. database

  • Multiple concurrent users
  • Scalability
  • Speed
  • Variety of data

- Database records
- Storage

  • Data persistence

- Data availability

  • Cloud vs. local
  • Online vs. offline
Compare and contrast various database structures. - Structured vs. semistructured vs. non-structured
- Relational databases
  • Schema
  • Tables
    - Rows/records
    - Fields/columns
    1. Primary key
    2. Foreign key
    - Constraints

- Non-relational databases

  • Key/value databases
  • Document databases
Explain basic data backup concepts. - Data
  • File backups
  • System backups Restoring data

- Location

  • Stored locally
    - Flash drive
    - External hard drive
    - Secure digital (SD) card
  • Cloud storage

Security - 19%

Explain fundamental security concepts and frameworks. - Confidentiality, integrity, and availability
- Privacy
  • Social networking sites
  • Email
  • File sharing
  • Instant messaging
  • Personally identifiable information (PII)
  • Government regulations (e.g., General Data Protection Regulations [GDPR])
  • Cookie consent

- Authentication, authorization, accounting, and nonrepudiation concepts

  • Authentication
    - Single factor
    - Multifactor
    - Single sign-on
  • Authorization
    - Permissions
    1. Administrator vs. user accounts
    - Least privilege model
  • Accounting
    - Logs
    - Location tracking
    - Web browser history
Explain methods to secure devices and security best practices. - Security awareness
  • Social engineering
    - Phishing
  • Malicious or compromised content

- Securing devices (mobile/ workstation)

  • Authentication
  • Anti-malware
  • Firewall
  • Patching/updating
  • Physical device security
    - Cable locks
    - USB locks

- Device use best practices

  • Licensing
    - Open source vs. proprietary
    - Subscription vs. one-time purchase vs. perpetual
    - Product keys and serial numbers
  • Software sources
    - Researching and validating legitimate sources
    - Original equipment manufacturer (OEM) websites vs. third-party websites
    - Application stores
  • Removal of software
    - Unwanted
    - Unnecessary
    - Malicious
  • Software piracy

- Safe browsing practices

  • Certificates
    - Valid

- Invalid
- Privacy considerations

  • Social networking sites
  • Email
  • File sharing
  • Instant messaging
  • AI
Explain password best practices. - Password length
- Password complexity
- Password history
- Password expiration
- Password reuse across sites
- Password managers
- Password privacy
- Password reset process
- Changing default usernames and passwords
- Enabling passwords
Identify common use cases for encryption. - Plain text vs. cipher text
- Data at rest
  • File level
  • Disk level
  • Mobile device

- Data in transit

  • Email
  • HTTPS
  • VPN
  • Mobile application
Given a scenario, configure security settings for a small wireless network. - Changing the service set identifier (SSID)
- Changing the default password
- Encrypted vs. unencrypted
  • Open
  • Pre-shared key
  • Wireless Protected Access (WPA)
  • Wireless Protected Access 2 (WPA2)
  • Wireless Protected Access 3 (WPA3)

To ensure success in CompTIA Tech Plus certification exam, we recommend authorized training course, practice test and hands-on experience to prepare for CompTIA Tech+ (FC0-U71) exam.

Rating: 5 / 5 (1 vote)