FC0-U51 IT Fundamentals Exam Syllabus

IT Fundamentals PDF, FC0-U51 Dumps, FC0-U51 PDF, IT Fundamentals VCE, FC0-U51 Questions PDF, CompTIA FC0-U51 VCE, CompTIA IT Fundamentals Dumps, CompTIA IT Fundamentals PDFUse this quick start guide to collect all the information about CompTIA IT Fundamentals (FC0-U51) certification exam. This study guide provides a list of objectives and resources that will help you prepare for items on the FC0-U51 IT Fundamentals exam. The Sample Questions will help you identify the type and difficulty level of the questions and the Practice Exams will make you familiar with the format and environment of an exam. You should refer this guide carefully before attempting your actual CompTIA IT Fundamentals certification exam.

The CompTIA IT Fundamentals certification is mainly targeted to those candidates who want to build their career in IT Infrastructure domain. The CompTIA IT Fundamentals exam verifies that the candidate possesses the fundamental knowledge and proven skills in the area of CompTIA IT Fundamentals.

CompTIA IT Fundamentals Exam Summary:

Exam Name CompTIA IT Fundamentals
Exam Code FC0-U51
Exam Price $119 (USD)
Duration 60 mins
Number of Questions 75
Passing Score 650 / 900
Schedule Exam CompTIA Marketplace
Sample Questions CompTIA IT Fundamentals Sample Questions
Practice Exam CompTIA FC0-U51 Certification Practice Exam

CompTIA FC0-U51 Exam Syllabus Topics:

Topic Details
Software 21%
Compare and contrast common operating systems and their functions and features.
1. Types
  1. Mobile
  2. Apple iOS
  3. Android
  4. Windows phone
  5. Blackberry
  6. Workstation
  7. Windows
  8. Mac
  9. Linux
  10. Chrome OS
  11. Open source vs. commercial
2. Software compatibility for different OS types and versions
3. Awareness of hardware compatibility for OS support
  1. 32-bit vs. 64-bit operating systems
4. Basic functions of an operating system
  1. Interface between user and machine
  2. Coordination of hardware components
  3. Provides environment for software to function
  4. Monitors system health and functionality
  5. Displays structure/directories for data management
Identify common programs, applications and their purpose. 1. Types
  1. Productivity software
  2. Word processing
  3. Spreadsheet software
  4. Email software
  5. Basic database software
  6. PDF viewers/creators
  7. Presentation software
  8. Desktop publishing software
  9. Personal information manager
  10. Remote desktop software
  11. Collaboration software
  12. Online workspace
  13. Document storage/sharing
  14. Screen sharing software
  15. Video conferencing software
  16. Instant messaging software
  17. Email software
  18. Utility software
  19. Anti-malware
  20. Software firewalls
  21. Diagnostic/maintenance software
  22. Compression software
  23. Specialized software
  24. CAD
  25. Graphic design
  26. Medical
  27. Scientific
  28. Financial
  29. Gaming
  30. Entertainment
  31. Open source vs. commercial
2. Platforms
  1. Mobile
  2. Desktop
  3. Web-based
3. Common file types
  1. Documents
  2. txt
  3. rtf
  4. doc/docx
  5. xls/xlsx
  6. ppt/pptx
  7. pdf
  8. Audio
  9. mp3
  10. wav
  11. flac
  12. aac
  13. m4a
  14. Images
  15. jpg
  16. gif
  17. tiff
  18. png
  19. bmp
  20. Video
  21. mpg
  22. mp4
  23. flv
  24. wmv
  25. avi
  26. Executables
  27. exe
  28. msi
  29. app
  30. bat
  31. scexe
  32. Compression formats
  33. rar
  34. tar
  35. zip
  36. dmg
  37. iso
  38. 7zip/7z
  39. gzip/gz
  40. jar
Given a scenario, use software management best practices. 1. Install/uninstall
  1. OS features
  2. Applications
  3. Drivers
2. Patching/updates for OS, drivers, applications and security software
  1. Scheduling
  2. Frequency
  3. Automatic updates
3. Software version identification and compatibility
4. Licensing
  1. Product keys
  2. Single/multi-license
Identify the following alternative technologies and their purpose. 1. Virtualization
  1. Physical machine vs. virtual machine

2. Cloud computing

  1. Streaming media (audio/video)

3. Web applications

4. VoIP
5. Telepresence
​6. Gesture-based interaction
  1. Swiping
  2. Pinch-to-zoom
  3. Kinetics
Explain the basic software features and functions of wireless devices. 1. Unlocking/security
2. Bluetooth pairing
  1. Hands-free
  2. Data transfer
3. Wireless connection setup
  1. Verify wireless capabilities
  2. Turn on WiFi
  3. Locate SSID
  4. Enter wireless password (if applicable)
  5. Verify Internet connection
4. Email configuration
  1. POP3
  2. IMAP
  3. SMTP
5. Screen orientation
6. Synchronization configuration
7. Airplane mode
8. Stores for mobile applications
Hardware 18%
Identify basic wired and wireless peripherals and their purpose. 1. Output devices
  1. Printer
  2. Laser
  3. Inkjet
  4. Thermal
  5. Display devices
  6. Flatscreen
  7. CRT
  8. Projector
  9. Speakers
2. Input devices
  1. Keyboard
  2. Pointing devices
  3. Mouse
  4. Touchpad
  5. Joystick
  6. Stylus pen
  7. Trackball
  8. Scanner
  9. Microphone
  10. Webcam
3. Input and output devices
  1. Fax
  2. External storage devices
  3. Flash drive
  4. External hard drive
  5. CD/DVD/Blu-ray
  6. Network attached storage
  7. Memory card
  8. Mobile media players
  9. Smartphone
  10. Touchscreen display
Compare and contrast common computer connector types. 1. Video
  1. VGA
  2. DVI
  3. HDMI
  4. Display port/Thunderbolt
  5. USB
  6. S-video
  7. Component - RGB
​2. FireWire
3. eSATA
4. Thunderbolt
5. USB
6. PS/2
7. Parallel
8. Serial
9. RJ-45
10. RJ-11
11. Audio
12. Power
  1. AC/DC
Identify the purpose of internal computer components. 1. CPU
2. Power supply
3. RAM
4. Storage
  1. Optical drive
  2. Hard drive
  3. Solid state drive
5. Expansion cards
  1. Video card
  2. Audio card
  3. Network card
  4. Modem
6. Motherboard/mainboard
7. System cooling
  1. Case fans
  2. CPU fans
  3. Liquid cooling
Security 21%
Define basic security threats. 1. Malware
  1. Virus
  2. Trojan
  3. Spyware
  4. Ransomware
​2. Phishing
3. Social engineering
4. Spam
5. Password cracking
6. Physical security
  1. Hardware theft
  2. Software/license theft
  3. Shoulder surfing
  4. Dumpster diving
Given a scenario, use security best practices. 1. Password management
  1. Password complexity
  2. Change default passwords
  3. Password confidentiality
  4. Password expiration
  5. Password reuse
  6. Awareness of single sign-on
2. Device hardening
  1. Disable unused features
  2. Disable Bluetooth
  3. Disable NFC
  4. Timeout/lock options
  5. Enable security software/features
  6. Software firewall
  7. Anti-malware
  8. Encryption options
3. Open WiFi vs. secure WiFi
4. Multifactor authentication
5. Suspicious emails
  1. Attachments
  2. Hyperlinks
6. Act on security software alerts
7. Admin vs. user vs. guest account
Given a scenario, use web-browsing best practices. 1. Recognize a secure connection/website
  1. https
  2. lock symbol
2. Recognize invalid certificate warnings
3. Recognize suspicious links
4. Recognize suspicious banner ads
5. Recognize adware symptoms
  1. Constant popups
  2. Home page redirection
  3. Search engine redirection
6. Limit the use of Personally Identifiable Information (PII)
7. Update browsers and plugins
  1. Avoid use of legacy browsers
8. Disable unneeded/suspicious browser plugins, toolbars and extensions
9. Disable autofill forms/passwords
10. Clear browser cache/history/cookies
11. Recognize untrusted source warnings
12. Risks of using public workstations
Networking 16%
Given a scenario, set up and configure a basic SOHO router (wired/wireless).
1. Verify wired connection, if applicable
2. Set WEP vs. WPA vs. WPA2
3. Change SSID from default
4. Apply a new wireless password
5. Change admin password for router
6. Connect to the new network
7. Verify Internet connectivity
8. Update firmware if necessary
Compare and contrast cellular, wireless and wired data connections. 1. High vs. low mobility
2. High vs. low availability
3. High vs. low throughput/bandwidth
4. High vs. low reliability
5. Connection delay
6. Number of concurrent connections
7. Levels of security
Compare and contrast different methods of sharing and storage. 1. HTTP vs. HTTPS
  1. Browser-based file downloads

2. FTP vs. FTPS vs. SFTP

3. Local vs. hosted storage
  1. Cloud-based services
  2. Cloud-based collaborative applications
  3. Cloud-based storage
  4. File and print sharing
  5. Workgroup
  6. Homegroup
  7. Network drives
  8. Network attached storage
  9. Direct attached storage
  10. External hard drives
4. Peer-to-peer
  1. Local ad hoc network
  2. Bluetooth sharing
  3. Direct link (PC-to-PC)
  4. Online peer-to-peer network
5. Network vs. local printing
  1. USB
  2. Wireless/wired network
Basic IT Literacy 24%
Perform appropriate steps to set up a basic workstation. 1. Plug in cables
2. Power on computer
3. Follow initial operating system setup wizard
  1. Localization settings
  2. Screen resolution
  3. Audio settings
4. Install security software
5. Configure peripherals (if applicable)
6. Uninstall unneeded software (if applicable)
7. Configure and verify Internet connection
8. Install additional software (if applicable)
9. Run software and security updates
10. Other user accounts (if applicable)
11. Basic cable management
Explain the basic methods of navigating an operating system. 1. Executing programs
2. Difference between shortcuts and files
3. Manipulating files
  1. Open
  2. Edit
  3. Save
  4. Move
  5. Copy
  6. Cut
  7. Paste
  8. Delete
  9. Rename
4. Read-only vs. modifiable files
5. Navigate a file structure
6. Search, sort and display files
7. Create screen captures
8. Navigate with hot keys
9. Folder and file size
10. Accessibility options
11. Folder and file permissions
Given a scenario, implement basic support concepts. 1. Check for external issues
  1. Loose cables/connections
  2. Power
  3. Physical damage
2. Manufacturer documentation
3. Manufacturer websites
4. Technical community groups
5. Internet search engine
6. Contact technical support
Explain basic backup concepts. 1. Importance of backups
2. Scheduling
3. Frequency
4. Storage mediums
  1. Locally attached storage
  2. Offsite/cloud-based
  3. Network-attached storage
5. Backup verification and testing
Describe the importance and impact of various environmental and safety concepts.
1. Proper disposal methods
  1. RoHS
  2. CRT monitors
  3. Scanners
  4. Batteries
  5. Ink/toner
  6. Hard drives
2. Power
  1. Energy-efficient devices
  2. Power profiles
  3. Power options
  4. Sleep/hibernation
  5. UPS vs. surge protector vs. power strip
  6. Power limitations
  7. International power differences
3. Device placement
  1. Airflow
  2. Humidity
  3. Temperature
  4. Dust accumulation
  5. EMI
4. Electrostatic discharge concepts
5. Ergonomic concepts
  1. Proper keyboard and mouse placement
  2. Sitting positions
  3. Monitor level placement
6. Follow manufacturer safety guidelines

To ensure success in CompTIA IT Fundamentals certification exam, we recommend authorized training course, practice test and hands-on experience to prepare for IT Fundamentals (FC0-U51) exam.

Rating: 4.9 / 5 (35 votes)