1/78
These Question-and-Answer flashcards cover all six ITF+ exam domains, including exam details, IT concepts, infrastructure, applications, software development, database fundamentals, and security topics, providing a broad review for FC0-U61 candidates.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
How many questions are on the CompTIA ITF+ FC0-U61 exam?
75 multiple-choice questions.
What is the passing score for the ITF+ exam on the 900-point scale?
650.
How long do candidates have to complete the ITF+ exam?
60 minutes.
Which ITF+ domain holds the greatest weight on the exam?
Infrastructure (22 %).
Name the three numbering systems ITF+ candidates must compare and contrast.
Binary, hexadecimal, and decimal.
Which two code sets are listed for data representation in ITF+ objectives?
ASCII and Unicode.
Give two examples of fundamental numeric data types covered by ITF+.
Integers and floating-point numbers (floats).
What are the four basic stages of computing and processing?
Input, processing, output, and storage.
Define intellectual property as it appears in the objectives.
Legally protected creations such as trademarks, copyrights, and patents.
Which unit represents 1,024 gigabytes?
A terabyte (TB).
What ITF+ troubleshooting step follows ‘Establish a theory of probable cause’?
Test the theory to determine the cause.
Name two common wired network connectors referenced in ITF+.
RJ-11 and RJ-45.
Bluetooth and NFC fall under which network category?
Wireless networking interfaces.
What installation method lets an OS recognize new hardware automatically?
Plug-and-play.
List three major internal computing components highlighted in the objectives.
Motherboard, CPU, and RAM.
Which two CPU architecture sizes must ITF+ candidates compare?
32-bit and 64-bit.
Give three common residential Internet service types compared in Domain 2.
Cable, DSL, and fiber-optic.
What key difference separates volatile and non-volatile storage?
Volatile storage (e.g., RAM) loses data when power is removed; non-volatile retains data.
Provide two local network storage types from the objectives.
NAS devices and file servers.
According to ITF+, what distinguishes a LAN from a WAN?
LAN covers a limited geographic area; WAN spans large or multiple geographic areas.
Name four basic network devices listed in the objectives.
Modem, router, switch, and access point.
Which wireless security protocol is more secure: WEP or WPA2?
WPA2.
What Wi-Fi standards immediately precede 802.11ac?
802.11n, 802.11g, 802.11b, and 802.11a.
State two best practices when setting up a wireless access point.
Change the default SSID and default administrator password, and enable encryption.
What is the primary role of an operating system per Domain 3?
To act as the interface between applications and hardware while managing resources.
List three file system examples covered in the objectives.
NTFS, FAT32, and Ext4 (HFS is also acceptable).
Which two types of OS are explicitly named for mobile devices?
Mobile device OS and embedded OS/firmware.
What utility lets users terminate unresponsive applications in most OSs?
'Kill process' or 'End task' from a task manager.
Name two types of productivity software highlighted in ITF+.
Word-processing software and spreadsheet software.
Differentiate ‘locally installed’ vs. ‘cloud-hosted’ application delivery.
Locally installed apps run and store files on the local machine; cloud-hosted apps require Internet access and store data remotely.
Define ‘single-platform software’.
Software designed to run on only one specific operating system or hardware platform.
What browser setting blocks unsolicited advertisement windows?
A popup blocker.
Give two common software license models compared in Domain 3.
Open-source vs. proprietary, and subscription vs. one-time purchase.
Which programming language category translates code at run time?
Interpreted (scripting) languages.
Provide two organizational techniques used in programming logic.
Pseudocode and flow charts.
What two logic components handle decision-making and repetition in code?
Branching (decision) and looping (iteration).
In programming, what is an ‘array’?
A container that stores multiple values of the same data type under one identifier.
Define an object’s ‘method’.
A function defined inside an object that performs actions on the object’s data.
What does CRUD stand for in database operations?
Create, Read, Update, Delete.
Differentiate flat files from databases regarding multiple users.
Flat files handle single-user access poorly, while databases support multiple concurrent users.
List the four primary SQL Data Manipulation Language (DML) commands.
SELECT, INSERT, DELETE, and UPDATE.
Which two non-relational database types are cited in ITF+?
Key/value databases and document databases.
Give three methods users can employ to access a database.
Direct/manual access, programmatic access, and GUI/query builder tools.
Summarize the CIA triad.
Confidentiality, Integrity, and Availability—three core information-security principles.
Provide two examples of confidentiality attacks.
Snooping and eavesdropping (wiretapping is also valid).
Name three workstation security measures in Domain 6.
Antivirus/anti-malware, host firewall, and patching/updating.
What security threat involves deceiving users to reveal information?
Social engineering.
Define the principle of ‘least privilege’.
Users receive only the minimum level of access rights needed to perform their jobs.
What is multifactor authentication?
Using two or more different authentication factors (e.g., password + fingerprint).
Which practice helps prevent password reuse across sites?
Using a password manager.
Distinguish plaintext from ciphertext.
Plaintext is readable data; ciphertext is data encrypted into an unreadable form.
Give two common examples of data in transit that should be encrypted.
Email and HTTPS web traffic (VPN tunnels also qualify).
What does UPS stand for, and why is it important to availability?
Uninterruptable Power Supply; it provides backup power to keep systems running during outages.
Differentiate replication from redundancy in fault tolerance.
Replication copies data to another location; redundancy duplicates critical components (data, power, or network) to prevent single points of failure.
List two backup location options compared in Domain 6.
On-site backups and off-site/cloud backups.
What is the first step in the formal ITF+ troubleshooting methodology?
Identify the problem.
Define ‘throughput’ in networking terms.
The amount of data transferred per second, measured in bps, Kbps, Mbps, Gbps, or Tbps.
Give two examples of peripheral device interfaces.
USB and Thunderbolt (FireWire is another example).
Which display connector transmits digital audio and video in a single cable?
HDMI (High-Definition Multimedia Interface).
Name the network protocol that translates URLs to IP addresses.
DNS (Domain Name System).
What Wi-Fi security setting requires a user to accept terms before browsing?
Captive portal.
State two common cable Internet competitors for home connections.
DSL and fiber-optic services.
Explain ‘driver installation’ as it applies to peripherals.
Adding the specific software that allows the OS to communicate with the hardware.
Which file system feature keeps a record of file changes to aid recovery?
Journaling (supported by NTFS and Ext4).
Give three examples of collaboration software.
Email client, video-conferencing software, and instant messaging/online workspace.
What is an IDE in software development?
Integrated Development Environment—software that combines code editing, debugging, and build tools.
Describe ‘private browsing’ in web browsers.
A mode that prevents the browser from storing history, cookies, or cache after the session.
State two scripting languages considered interpreted.
Python and JavaScript (other examples include Bash and PowerShell).
What does AES stand for?
Advanced Encryption Standard.
Define ‘NAS’.
Network Attached Storage—dedicated file-storage device on a network.
What port type is commonly used for analog monitors?
VGA (Video Graphics Array) connector.
Explain the purpose of a firewall.
To monitor and control incoming and outgoing network traffic based on security rules.
Which CompTIA policy warns against using unauthorized study materials?
CompTIA Authorized Materials Use Policy (anti-"brain dump" policy).
What factor does ‘Kb’ measure, and how many bits does it equal?
Kilobit; one kilobit equals 1,024 bits.
Identify two corporate expectations regarding user privacy.
Following written policies and properly handling confidential information such as PII or company data.
When installing software, why is reading the EULA important?
It outlines legal usage rights, restrictions, and responsibilities for the user.
Describe ‘single sign-on’ (SSO).
An authentication process that allows a user to access multiple applications with one set of credentials.
Name one hardware tool suggested for avoiding ESD in labs.
An ESD wrist strap.
What is the main benefit of journaling file systems like NTFS?
They help prevent data corruption and aid in recovery after improper shutdowns.