CompTIA IT Fundamentals (ITF+) – FC0-U61 Exam Objectives

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/78

flashcard set

Earn XP

Description and Tags

These Question-and-Answer flashcards cover all six ITF+ exam domains, including exam details, IT concepts, infrastructure, applications, software development, database fundamentals, and security topics, providing a broad review for FC0-U61 candidates.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

79 Terms

1
New cards

How many questions are on the CompTIA ITF+ FC0-U61 exam?

75 multiple-choice questions.

2
New cards

What is the passing score for the ITF+ exam on the 900-point scale?

650.

3
New cards

How long do candidates have to complete the ITF+ exam?

60 minutes.

4
New cards

Which ITF+ domain holds the greatest weight on the exam?

Infrastructure (22 %).

5
New cards

Name the three numbering systems ITF+ candidates must compare and contrast.

Binary, hexadecimal, and decimal.

6
New cards

Which two code sets are listed for data representation in ITF+ objectives?

ASCII and Unicode.

7
New cards

Give two examples of fundamental numeric data types covered by ITF+.

Integers and floating-point numbers (floats).

8
New cards

What are the four basic stages of computing and processing?

Input, processing, output, and storage.

9
New cards

Define intellectual property as it appears in the objectives.

Legally protected creations such as trademarks, copyrights, and patents.

10
New cards

Which unit represents 1,024 gigabytes?

A terabyte (TB).

11
New cards

What ITF+ troubleshooting step follows ‘Establish a theory of probable cause’?

Test the theory to determine the cause.

12
New cards

Name two common wired network connectors referenced in ITF+.

RJ-11 and RJ-45.

13
New cards

Bluetooth and NFC fall under which network category?

Wireless networking interfaces.

14
New cards

What installation method lets an OS recognize new hardware automatically?

Plug-and-play.

15
New cards

List three major internal computing components highlighted in the objectives.

Motherboard, CPU, and RAM.

16
New cards

Which two CPU architecture sizes must ITF+ candidates compare?

32-bit and 64-bit.

17
New cards

Give three common residential Internet service types compared in Domain 2.

Cable, DSL, and fiber-optic.

18
New cards

What key difference separates volatile and non-volatile storage?

Volatile storage (e.g., RAM) loses data when power is removed; non-volatile retains data.

19
New cards

Provide two local network storage types from the objectives.

NAS devices and file servers.

20
New cards

According to ITF+, what distinguishes a LAN from a WAN?

LAN covers a limited geographic area; WAN spans large or multiple geographic areas.

21
New cards

Name four basic network devices listed in the objectives.

Modem, router, switch, and access point.

22
New cards

Which wireless security protocol is more secure: WEP or WPA2?

WPA2.

23
New cards

What Wi-Fi standards immediately precede 802.11ac?

802.11n, 802.11g, 802.11b, and 802.11a.

24
New cards

State two best practices when setting up a wireless access point.

Change the default SSID and default administrator password, and enable encryption.

25
New cards

What is the primary role of an operating system per Domain 3?

To act as the interface between applications and hardware while managing resources.

26
New cards

List three file system examples covered in the objectives.

NTFS, FAT32, and Ext4 (HFS is also acceptable).

27
New cards

Which two types of OS are explicitly named for mobile devices?

Mobile device OS and embedded OS/firmware.

28
New cards

What utility lets users terminate unresponsive applications in most OSs?

'Kill process' or 'End task' from a task manager.

29
New cards

Name two types of productivity software highlighted in ITF+.

Word-processing software and spreadsheet software.

30
New cards

Differentiate ‘locally installed’ vs. ‘cloud-hosted’ application delivery.

Locally installed apps run and store files on the local machine; cloud-hosted apps require Internet access and store data remotely.

31
New cards

Define ‘single-platform software’.

Software designed to run on only one specific operating system or hardware platform.

32
New cards

What browser setting blocks unsolicited advertisement windows?

A popup blocker.

33
New cards

Give two common software license models compared in Domain 3.

Open-source vs. proprietary, and subscription vs. one-time purchase.

34
New cards

Which programming language category translates code at run time?

Interpreted (scripting) languages.

35
New cards

Provide two organizational techniques used in programming logic.

Pseudocode and flow charts.

36
New cards

What two logic components handle decision-making and repetition in code?

Branching (decision) and looping (iteration).

37
New cards

In programming, what is an ‘array’?

A container that stores multiple values of the same data type under one identifier.

38
New cards

Define an object’s ‘method’.

A function defined inside an object that performs actions on the object’s data.

39
New cards

What does CRUD stand for in database operations?

Create, Read, Update, Delete.

40
New cards

Differentiate flat files from databases regarding multiple users.

Flat files handle single-user access poorly, while databases support multiple concurrent users.

41
New cards

List the four primary SQL Data Manipulation Language (DML) commands.

SELECT, INSERT, DELETE, and UPDATE.

42
New cards

Which two non-relational database types are cited in ITF+?

Key/value databases and document databases.

43
New cards

Give three methods users can employ to access a database.

Direct/manual access, programmatic access, and GUI/query builder tools.

44
New cards

Summarize the CIA triad.

Confidentiality, Integrity, and Availability—three core information-security principles.

45
New cards

Provide two examples of confidentiality attacks.

Snooping and eavesdropping (wiretapping is also valid).

46
New cards

Name three workstation security measures in Domain 6.

Antivirus/anti-malware, host firewall, and patching/updating.

47
New cards

What security threat involves deceiving users to reveal information?

Social engineering.

48
New cards

Define the principle of ‘least privilege’.

Users receive only the minimum level of access rights needed to perform their jobs.

49
New cards

What is multifactor authentication?

Using two or more different authentication factors (e.g., password + fingerprint).

50
New cards

Which practice helps prevent password reuse across sites?

Using a password manager.

51
New cards

Distinguish plaintext from ciphertext.

Plaintext is readable data; ciphertext is data encrypted into an unreadable form.

52
New cards

Give two common examples of data in transit that should be encrypted.

Email and HTTPS web traffic (VPN tunnels also qualify).

53
New cards

What does UPS stand for, and why is it important to availability?

Uninterruptable Power Supply; it provides backup power to keep systems running during outages.

54
New cards

Differentiate replication from redundancy in fault tolerance.

Replication copies data to another location; redundancy duplicates critical components (data, power, or network) to prevent single points of failure.

55
New cards

List two backup location options compared in Domain 6.

On-site backups and off-site/cloud backups.

56
New cards

What is the first step in the formal ITF+ troubleshooting methodology?

Identify the problem.

57
New cards

Define ‘throughput’ in networking terms.

The amount of data transferred per second, measured in bps, Kbps, Mbps, Gbps, or Tbps.

58
New cards

Give two examples of peripheral device interfaces.

USB and Thunderbolt (FireWire is another example).

59
New cards

Which display connector transmits digital audio and video in a single cable?

HDMI (High-Definition Multimedia Interface).

60
New cards

Name the network protocol that translates URLs to IP addresses.

DNS (Domain Name System).

61
New cards

What Wi-Fi security setting requires a user to accept terms before browsing?

Captive portal.

62
New cards

State two common cable Internet competitors for home connections.

DSL and fiber-optic services.

63
New cards

Explain ‘driver installation’ as it applies to peripherals.

Adding the specific software that allows the OS to communicate with the hardware.

64
New cards

Which file system feature keeps a record of file changes to aid recovery?

Journaling (supported by NTFS and Ext4).

65
New cards

Give three examples of collaboration software.

Email client, video-conferencing software, and instant messaging/online workspace.

66
New cards

What is an IDE in software development?

Integrated Development Environment—software that combines code editing, debugging, and build tools.

67
New cards

Describe ‘private browsing’ in web browsers.

A mode that prevents the browser from storing history, cookies, or cache after the session.

68
New cards

State two scripting languages considered interpreted.

Python and JavaScript (other examples include Bash and PowerShell).

69
New cards

What does AES stand for?

Advanced Encryption Standard.

70
New cards

Define ‘NAS’.

Network Attached Storage—dedicated file-storage device on a network.

71
New cards

What port type is commonly used for analog monitors?

VGA (Video Graphics Array) connector.

72
New cards

Explain the purpose of a firewall.

To monitor and control incoming and outgoing network traffic based on security rules.

73
New cards

Which CompTIA policy warns against using unauthorized study materials?

CompTIA Authorized Materials Use Policy (anti-"brain dump" policy).

74
New cards

What factor does ‘Kb’ measure, and how many bits does it equal?

Kilobit; one kilobit equals 1,024 bits.

75
New cards

Identify two corporate expectations regarding user privacy.

Following written policies and properly handling confidential information such as PII or company data.

76
New cards

When installing software, why is reading the EULA important?

It outlines legal usage rights, restrictions, and responsibilities for the user.

77
New cards

Describe ‘single sign-on’ (SSO).

An authentication process that allows a user to access multiple applications with one set of credentials.

78
New cards

Name one hardware tool suggested for avoiding ESD in labs.

An ESD wrist strap.

79
New cards

What is the main benefit of journaling file systems like NTFS?

They help prevent data corruption and aid in recovery after improper shutdowns.