CompTIA ITF+ CertMike: Exam FC0-U61 (2023)
CompTIA ITF+ CertMike: Exam FC0-U61 (2023) is your shortcut to certification success—start preparing today!
Sofia Garcia
Contributor
4.5
144
about 2 months ago
Preview (31 of 464)
Sign in to access the full document!
Table of Contents
COVER
TITLE PAGE
COPYRIGHT
DEDICATION
ACKNOWLEDGMENTS
ABOUT THE AUTHORS
ABOUT THE TECHNICAL EDITOR
INTRODUCTION
THE ITF+ EXAM
WHAT DOES THIS BOOK COVER?
EXAM FC0-U61 EXAM OBJECTIVES
FC0-U61 CERTIFICATION EXAM OBJECTIVE MAP
HOW TO CONTACT THE PUBLISHER
PART I: Domain 1.0: IT Concepts and Terminology
CHAPTER 1: Notational Systems
STORING DATA
CHARACTER ENCODING
CHAPTER 2: Data Types
DATA TYPES
CHAPTER 3: Computing Basics
COMPUTER ACTIONS
CHAPTER 4: Value of Data
DATA AND INFORMATION
INTELLECTUAL PROPERTY
SECURING DATA
CHAPTER 5: Units of Measure
MEASURING DATA STORAGE
COVER
TITLE PAGE
COPYRIGHT
DEDICATION
ACKNOWLEDGMENTS
ABOUT THE AUTHORS
ABOUT THE TECHNICAL EDITOR
INTRODUCTION
THE ITF+ EXAM
WHAT DOES THIS BOOK COVER?
EXAM FC0-U61 EXAM OBJECTIVES
FC0-U61 CERTIFICATION EXAM OBJECTIVE MAP
HOW TO CONTACT THE PUBLISHER
PART I: Domain 1.0: IT Concepts and Terminology
CHAPTER 1: Notational Systems
STORING DATA
CHARACTER ENCODING
CHAPTER 2: Data Types
DATA TYPES
CHAPTER 3: Computing Basics
COMPUTER ACTIONS
CHAPTER 4: Value of Data
DATA AND INFORMATION
INTELLECTUAL PROPERTY
SECURING DATA
CHAPTER 5: Units of Measure
MEASURING DATA STORAGE
MEASURING DATA THROUGHPUT
MEASURING PROCESSOR SPEED
CHAPTER 6: Troubleshooting Methodology
TROUBLESHOOTING METHODOLOGY
PART II: Domain 2.0: Infrastructure
CHAPTER 7: Input/Output Device Interfaces
NETWORK INTERFACES
PERIPHERAL INTERFACES
GRAPHIC INTERFACES
CHAPTER 8: Installing Peripherals
PERIPHERAL TYPES
INSTALLING AND CONFIGURING PERIPHERALS
CHAPTER 9: Internal Computing Components
CPU
MOTHERBOARD
FIRMWARE
MEMORY
DISK DRIVES
NETWORK INTERFACE CARDS
GPU
POWER AND COOLING
CHAPTER 10: Internet Service Types
SERVICE TYPES
CHAPTER 11: Storage
VOLATILE STORAGE
NONVOLATILE STORAGE
CHAPTER 12: Computing Devices
COMPUTING DEVICE TYPES
INTERNET OF THINGS
MEASURING PROCESSOR SPEED
CHAPTER 6: Troubleshooting Methodology
TROUBLESHOOTING METHODOLOGY
PART II: Domain 2.0: Infrastructure
CHAPTER 7: Input/Output Device Interfaces
NETWORK INTERFACES
PERIPHERAL INTERFACES
GRAPHIC INTERFACES
CHAPTER 8: Installing Peripherals
PERIPHERAL TYPES
INSTALLING AND CONFIGURING PERIPHERALS
CHAPTER 9: Internal Computing Components
CPU
MOTHERBOARD
FIRMWARE
MEMORY
DISK DRIVES
NETWORK INTERFACE CARDS
GPU
POWER AND COOLING
CHAPTER 10: Internet Service Types
SERVICE TYPES
CHAPTER 11: Storage
VOLATILE STORAGE
NONVOLATILE STORAGE
CHAPTER 12: Computing Devices
COMPUTING DEVICE TYPES
INTERNET OF THINGS
Loading page 4...
CHAPTER 13: TCP/IP Networking
NETWORK TYPES
TCP/IP NETWORKING
NETWORK ADDRESSING
CHAPTER 14: Application Protocols
APPLICATION PROTOCOLS
CHAPTER 15: Network Devices
MODEMS
SWITCHES
ROUTERS
FIREWALLS
ACCESS POINTS
CHAPTER 16: Wireless Networks
WIRELESS NETWORKING
WIRELESS SIGNAL PROPAGATION
WIRELESS SECURITY
WIRELESS ENCRYPTION
PART III: Domain 3.0: Applications and Software
CHAPTER 17: Operating Systems
OPERATING SYSTEM ROLES
OPERATING SYSTEM TYPES
CHAPTER 18: Virtualization
VIRTUALIZATION
CHAPTER 19: Filesystems
FILES AND FILESYSTEMS
FILESYSTEM FEATURES
FILESYSTEM TYPES
CHAPTER 20: Services and Processes
APPLICATIONS
NETWORK TYPES
TCP/IP NETWORKING
NETWORK ADDRESSING
CHAPTER 14: Application Protocols
APPLICATION PROTOCOLS
CHAPTER 15: Network Devices
MODEMS
SWITCHES
ROUTERS
FIREWALLS
ACCESS POINTS
CHAPTER 16: Wireless Networks
WIRELESS NETWORKING
WIRELESS SIGNAL PROPAGATION
WIRELESS SECURITY
WIRELESS ENCRYPTION
PART III: Domain 3.0: Applications and Software
CHAPTER 17: Operating Systems
OPERATING SYSTEM ROLES
OPERATING SYSTEM TYPES
CHAPTER 18: Virtualization
VIRTUALIZATION
CHAPTER 19: Filesystems
FILES AND FILESYSTEMS
FILESYSTEM FEATURES
FILESYSTEM TYPES
CHAPTER 20: Services and Processes
APPLICATIONS
Loading page 5...
PROCESSES
SERVICES
CHAPTER 21: Drivers, Utilities, and Interfaces
DRIVERS
INTERFACES
UTILITIES
CHAPTER 22: Software Types
SOFTWARE
CHAPTER 23: Application Architecture and Delivery
APPLICATION DELIVERY
APPLICATION ARCHITECTURE
CHAPTER 24: Web Browsers
HOW THE WEB WORKS
CONFIGURING WEB BROWSERS
PROXY SERVERS
DIGITAL CERTIFICATES
CHAPTER 25: Application Concepts and Uses
SOFTWARE COMPATIBILITY
SOFTWARE INSTALLATION BEST PRACTICES
SOFTWARE LICENSING
PART IV: Domain 4.0: Software Development Concepts
CHAPTER 26: Programming Languages
PROGRAMMING LANGUAGE CATEGORIES
SPECIALIZED LANGUAGES
IDENTIFYING LANGUAGES
CHAPTER 27: Programming Organizational Techniques
PSEUDOCODE
FLOWCHARTS
CHAPTER 28: Logic Components
SERVICES
CHAPTER 21: Drivers, Utilities, and Interfaces
DRIVERS
INTERFACES
UTILITIES
CHAPTER 22: Software Types
SOFTWARE
CHAPTER 23: Application Architecture and Delivery
APPLICATION DELIVERY
APPLICATION ARCHITECTURE
CHAPTER 24: Web Browsers
HOW THE WEB WORKS
CONFIGURING WEB BROWSERS
PROXY SERVERS
DIGITAL CERTIFICATES
CHAPTER 25: Application Concepts and Uses
SOFTWARE COMPATIBILITY
SOFTWARE INSTALLATION BEST PRACTICES
SOFTWARE LICENSING
PART IV: Domain 4.0: Software Development Concepts
CHAPTER 26: Programming Languages
PROGRAMMING LANGUAGE CATEGORIES
SPECIALIZED LANGUAGES
IDENTIFYING LANGUAGES
CHAPTER 27: Programming Organizational Techniques
PSEUDOCODE
FLOWCHARTS
CHAPTER 28: Logic Components
Loading page 6...
BRANCHING
LOOPING
CHAPTER 29: Programming Concepts
VARIABLES AND ARRAYS
DATA TYPES
FUNCTIONS
OBJECTS
PART V: Domain 5.0: Database Fundamentals
CHAPTER 30: Database Concepts
DATABASES
USING A DATABASE
CHAPTER 31: Database Structures
STRUCTURING DATA
RELATIONAL DATABASES
NONRELATIONAL DATABASES
CHAPTER 32: Database Interfaces
STRUCTURED QUERY LANGUAGE (SQL)
DATABASE ACCESS METHODS
PART VI: Domain 6.0: Security
CHAPTER 33: Confidentiality, Integrity, and Availability
THE CIA TRIAD
CONFIDENTIALITY
INTEGRITY
AVAILABILITY
CHAPTER 34: Securing Devices
DEVICE SECURITY
SOFTWARE SECURITY
CHAPTER 35: Behavioral Security
PRIVACY
LOOPING
CHAPTER 29: Programming Concepts
VARIABLES AND ARRAYS
DATA TYPES
FUNCTIONS
OBJECTS
PART V: Domain 5.0: Database Fundamentals
CHAPTER 30: Database Concepts
DATABASES
USING A DATABASE
CHAPTER 31: Database Structures
STRUCTURING DATA
RELATIONAL DATABASES
NONRELATIONAL DATABASES
CHAPTER 32: Database Interfaces
STRUCTURED QUERY LANGUAGE (SQL)
DATABASE ACCESS METHODS
PART VI: Domain 6.0: Security
CHAPTER 33: Confidentiality, Integrity, and Availability
THE CIA TRIAD
CONFIDENTIALITY
INTEGRITY
AVAILABILITY
CHAPTER 34: Securing Devices
DEVICE SECURITY
SOFTWARE SECURITY
CHAPTER 35: Behavioral Security
PRIVACY
Loading page 7...
SECURITY POLICIES AND PROCEDURES
CHAPTER 36: Authentication, Authorization, Accounting,
and Nonrepudiation
ACCESS CONTROL
AUTHENTICATION FACTORS
AUTHORIZATION
ACCOUNT TYPES
NONREPUDIATION
CHAPTER 37: Password Best Practices
PASSWORD POLICIES
CHAPTER 38: Encryption
CRYPTOGRAPHY
USES OF ENCRYPTION
CHAPTER 39: Business Continuity and Disaster Recovery
BUSINESS CONTINUITY
DISASTER RECOVERY
INDEX
END USER LICENSE AGREEMENT
List of Tables
Chapter 1
TABLE 1.1 Decimal conversion of 2-bit values
TABLE 1.2 Decimal conversion of 3-bit values
TABLE 1.3 Binary, decimal, and hexadecimal equivalent
values
Chapter 2
TABLE 2.1 Product information
Chapter 5
CHAPTER 36: Authentication, Authorization, Accounting,
and Nonrepudiation
ACCESS CONTROL
AUTHENTICATION FACTORS
AUTHORIZATION
ACCOUNT TYPES
NONREPUDIATION
CHAPTER 37: Password Best Practices
PASSWORD POLICIES
CHAPTER 38: Encryption
CRYPTOGRAPHY
USES OF ENCRYPTION
CHAPTER 39: Business Continuity and Disaster Recovery
BUSINESS CONTINUITY
DISASTER RECOVERY
INDEX
END USER LICENSE AGREEMENT
List of Tables
Chapter 1
TABLE 1.1 Decimal conversion of 2-bit values
TABLE 1.2 Decimal conversion of 3-bit values
TABLE 1.3 Binary, decimal, and hexadecimal equivalent
values
Chapter 2
TABLE 2.1 Product information
Chapter 5
Loading page 8...
TABLE 5.1 Possible combinations of 2 bits
TABLE 5.2 Possible combinations of 3 bits
TABLE 5.3 Data storage units
TABLE 5.4 Data throughput units
Chapter 11
TABLE 11.1 Common disc types
Chapter 16
TABLE 16.1 Wireless standard frequencies and speed
TABLE 16.2 Wireless encryption options
Chapter 19
TABLE 19.1 Summary of filesystem characteristics
Chapter 30
TABLE 30.1
TABLE 30.2 Customer contact information stored in a
database table
TABLE 30.3 Restaurant location information stored in a
database table
TABLE 30.4 Product inventory information stored in a
database table
List of Illustrations
Chapter 1
FIGURE 1.1 A single bit can only hold two values: 0 and 1.
FIGURE 1.2 Two bits can hold four possible values.
FIGURE 1.3 One decimal digit can hold 10 possible values.
FIGURE 1.4 A single hexadecimal digit can hold 16 possible
values.
TABLE 5.2 Possible combinations of 3 bits
TABLE 5.3 Data storage units
TABLE 5.4 Data throughput units
Chapter 11
TABLE 11.1 Common disc types
Chapter 16
TABLE 16.1 Wireless standard frequencies and speed
TABLE 16.2 Wireless encryption options
Chapter 19
TABLE 19.1 Summary of filesystem characteristics
Chapter 30
TABLE 30.1
TABLE 30.2 Customer contact information stored in a
database table
TABLE 30.3 Restaurant location information stored in a
database table
TABLE 30.4 Product inventory information stored in a
database table
List of Illustrations
Chapter 1
FIGURE 1.1 A single bit can only hold two values: 0 and 1.
FIGURE 1.2 Two bits can hold four possible values.
FIGURE 1.3 One decimal digit can hold 10 possible values.
FIGURE 1.4 A single hexadecimal digit can hold 16 possible
values.
Loading page 9...
Chapter 2
FIGURE 2.1 Data type flowchart
Chapter 4
FIGURE 4.1 A spreadsheet of temperature readings is only
data.
FIGURE 4.2 Plotting data over time is one way we can
transform it into infor...
FIGURE 4.3 Information can drive action.
FIGURE 4.4 Copyright symbol
FIGURE 4.5 Symbols used to denote (a) trademarks and (b)
registered trademar...
Chapter 6
FIGURE 6.1 CompTIA's eight-step troubleshooting
methodology
Chapter 7
FIGURE 7.1 Wall plate containing four network jacks
FIGURE 7.2 RJ-45 network connector
FIGURE 7.3 RJ-11 telephone connector
FIGURE 7.4 USB connectors
FIGURE 7.5 FireWire connectors
FIGURE 7.6 SATA and eSATA connectors
FIGURE 7.7 VGA connector
FIGURE 7.8 DVI connectors
FIGURE 7.9 HDMI connector
FIGURE 7.10 DisplayPort and Mini DisplayPort connectors
Chapter 8
FIGURE 8.1 Keyboard and mouse
FIGURE 2.1 Data type flowchart
Chapter 4
FIGURE 4.1 A spreadsheet of temperature readings is only
data.
FIGURE 4.2 Plotting data over time is one way we can
transform it into infor...
FIGURE 4.3 Information can drive action.
FIGURE 4.4 Copyright symbol
FIGURE 4.5 Symbols used to denote (a) trademarks and (b)
registered trademar...
Chapter 6
FIGURE 6.1 CompTIA's eight-step troubleshooting
methodology
Chapter 7
FIGURE 7.1 Wall plate containing four network jacks
FIGURE 7.2 RJ-45 network connector
FIGURE 7.3 RJ-11 telephone connector
FIGURE 7.4 USB connectors
FIGURE 7.5 FireWire connectors
FIGURE 7.6 SATA and eSATA connectors
FIGURE 7.7 VGA connector
FIGURE 7.8 DVI connectors
FIGURE 7.9 HDMI connector
FIGURE 7.10 DisplayPort and Mini DisplayPort connectors
Chapter 8
FIGURE 8.1 Keyboard and mouse
Loading page 10...
FIGURE 8.2 Typical computer display
FIGURE 8.3 Computer speakers
FIGURE 8.4 Typical desktop printer
FIGURE 8.5 Typical desktop scanner
FIGURE 8.6 Camera used to capture still images and video
Chapter 9
FIGURE 9.1 Central processing unit (CPU)
FIGURE 9.2 Motherboard
FIGURE 9.3 Dual in-line memory module (DIMM)
FIGURE 9.4 Hard disk drive (HDD)
FIGURE 9.5 Solid-state drive (SSD)
FIGURE 9.6 Network interface card (NIC)
FIGURE 9.7 Graphics processing unit (GPU)
FIGURE 9.8 Computer power supply unit (PSU)
Chapter 11
FIGURE 11.1 Magnetic hard disk drive (HDD)
FIGURE 11.2 Solid-state drive (SDD)
FIGURE 11.3 USB flash drive
FIGURE 11.4 SD card
FIGURE 11.5 Optical disc
FIGURE 11.6 Network attached storage (NAS) array
Chapter 12
FIGURE 12.1 Desktop computer system
FIGURE 12.2 Server racks in a data center
FIGURE 12.3 Laptop computer
FIGURE 12.4 Smartphone
FIGURE 8.3 Computer speakers
FIGURE 8.4 Typical desktop printer
FIGURE 8.5 Typical desktop scanner
FIGURE 8.6 Camera used to capture still images and video
Chapter 9
FIGURE 9.1 Central processing unit (CPU)
FIGURE 9.2 Motherboard
FIGURE 9.3 Dual in-line memory module (DIMM)
FIGURE 9.4 Hard disk drive (HDD)
FIGURE 9.5 Solid-state drive (SSD)
FIGURE 9.6 Network interface card (NIC)
FIGURE 9.7 Graphics processing unit (GPU)
FIGURE 9.8 Computer power supply unit (PSU)
Chapter 11
FIGURE 11.1 Magnetic hard disk drive (HDD)
FIGURE 11.2 Solid-state drive (SDD)
FIGURE 11.3 USB flash drive
FIGURE 11.4 SD card
FIGURE 11.5 Optical disc
FIGURE 11.6 Network attached storage (NAS) array
Chapter 12
FIGURE 12.1 Desktop computer system
FIGURE 12.2 Server racks in a data center
FIGURE 12.3 Laptop computer
FIGURE 12.4 Smartphone
Loading page 11...
FIGURE 12.5 Tablet computer
FIGURE 12.6 Convertible laptop being used as a tablet
FIGURE 12.7 Gaming console
Chapter 13
FIGURE 13.1 Communication from a user to a web server
FIGURE 13.2 Communication from a web server to a user
Chapter 15
FIGURE 15.1 Cable modem
FIGURE 15.2 Network switches
FIGURE 15.3 Network firewall deployment
FIGURE 15.4 Wireless access point
Chapter 16
FIGURE 16.1 SOHO wireless access point
Chapter 19
FIGURE 19.1 Directory structure
FIGURE 19.2 File permission settings
FIGURE 19.3 Uncompressed Macbeth script
FIGURE 19.4 Compressed Macbeth script
Chapter 20
FIGURE 20.1 Activity Monitor on a Mac
FIGURE 20.2 Windows Task Manager
Chapter 21
FIGURE 21.1 GUI on a Mac
FIGURE 21.2 GUI on a Windows system
FIGURE 21.3 Terminal on a Mac
FIGURE 21.4 Command shell on a Windows system
FIGURE 12.6 Convertible laptop being used as a tablet
FIGURE 12.7 Gaming console
Chapter 13
FIGURE 13.1 Communication from a user to a web server
FIGURE 13.2 Communication from a web server to a user
Chapter 15
FIGURE 15.1 Cable modem
FIGURE 15.2 Network switches
FIGURE 15.3 Network firewall deployment
FIGURE 15.4 Wireless access point
Chapter 16
FIGURE 16.1 SOHO wireless access point
Chapter 19
FIGURE 19.1 Directory structure
FIGURE 19.2 File permission settings
FIGURE 19.3 Uncompressed Macbeth script
FIGURE 19.4 Compressed Macbeth script
Chapter 20
FIGURE 20.1 Activity Monitor on a Mac
FIGURE 20.2 Windows Task Manager
Chapter 21
FIGURE 21.1 GUI on a Mac
FIGURE 21.2 GUI on a Windows system
FIGURE 21.3 Terminal on a Mac
FIGURE 21.4 Command shell on a Windows system
Loading page 12...
Chapter 22
FIGURE 22.1 Editing a chapter in Microsoft Word
FIGURE 22.2 Creating a pie chart in Google Sheets
FIGURE 22.3 Editing a slide deck in Apple Keynote
FIGURE 22.4 Accessing comptia.org using Google Chrome
FIGURE 22.5 Creating a network diagram in Lucidchart
FIGURE 22.6 Conferencing software hosting a video meeting
FIGURE 22.7 Collaborating with Microsoft Teams
Chapter 23
FIGURE 23.1 Two-tier applications involve the client and one
server.
FIGURE 23.2 Three-tier applications involve the client and
two tiers of serv...
Chapter 24
FIGURE 24.1 Retrieving a web page
FIGURE 24.2 Clearing browsing data in Chrome
FIGURE 24.3 Activating incognito mode in Chrome
FIGURE 24.4 Deactivating client-side scripting in Chrome
FIGURE 24.5 Managing browser extensions in Chrome
FIGURE 24.6 Disabling pop-ups and redirects in Chrome
FIGURE 24.7 Configuring a proxy server on a Mac
FIGURE 24.8 Valid certificate for CertMike.com
FIGURE 24.9 Invalid certificate warning for
wrong.host.badssl.com
Chapter 26
FIGURE 26.1 Code written in the R programming language
FIGURE 26.2 Web page written in HTML
FIGURE 22.1 Editing a chapter in Microsoft Word
FIGURE 22.2 Creating a pie chart in Google Sheets
FIGURE 22.3 Editing a slide deck in Apple Keynote
FIGURE 22.4 Accessing comptia.org using Google Chrome
FIGURE 22.5 Creating a network diagram in Lucidchart
FIGURE 22.6 Conferencing software hosting a video meeting
FIGURE 22.7 Collaborating with Microsoft Teams
Chapter 23
FIGURE 23.1 Two-tier applications involve the client and one
server.
FIGURE 23.2 Three-tier applications involve the client and
two tiers of serv...
Chapter 24
FIGURE 24.1 Retrieving a web page
FIGURE 24.2 Clearing browsing data in Chrome
FIGURE 24.3 Activating incognito mode in Chrome
FIGURE 24.4 Deactivating client-side scripting in Chrome
FIGURE 24.5 Managing browser extensions in Chrome
FIGURE 24.6 Disabling pop-ups and redirects in Chrome
FIGURE 24.7 Configuring a proxy server on a Mac
FIGURE 24.8 Valid certificate for CertMike.com
FIGURE 24.9 Invalid certificate warning for
wrong.host.badssl.com
Chapter 26
FIGURE 26.1 Code written in the R programming language
FIGURE 26.2 Web page written in HTML
Loading page 13...
FIGURE 26.3 Document written in XML
FIGURE 26.4 Language summary chart
Chapter 27
FIGURE 27.1 Temperature adjustment flowchart
FIGURE 27.2 Common flowchart shapes
Chapter 29
FIGURE 29.1 The Product object
FIGURE 29.2 Instances of the Product object for a bicycle and
a TV
FIGURE 29.3 Updated instances of the Product object for a
bicycle and a TV
Chapter 30
FIGURE 30.1 Recipe example
Chapter 31
FIGURE 31.1 Microsoft Excel spreadsheet
FIGURE 31.2 AdventureWorks database schema
FIGURE 31.3 Customers database table
FIGURE 31.4 Orders database table
FIGURE 31.5 CustomerID is a foreign key from the Orders
table to the Custome...
FIGURE 31.6 Table from a key-value store
Chapter 32
FIGURE 32.1 SQL command summary
FIGURE 32.2 Executing a SQL command in Azure Data
Studio
Chapter 33
FIGURE 33.1 The CIA triad summarizes the three main
concerns of cybersecurit...
FIGURE 26.4 Language summary chart
Chapter 27
FIGURE 27.1 Temperature adjustment flowchart
FIGURE 27.2 Common flowchart shapes
Chapter 29
FIGURE 29.1 The Product object
FIGURE 29.2 Instances of the Product object for a bicycle and
a TV
FIGURE 29.3 Updated instances of the Product object for a
bicycle and a TV
Chapter 30
FIGURE 30.1 Recipe example
Chapter 31
FIGURE 31.1 Microsoft Excel spreadsheet
FIGURE 31.2 AdventureWorks database schema
FIGURE 31.3 Customers database table
FIGURE 31.4 Orders database table
FIGURE 31.5 CustomerID is a foreign key from the Orders
table to the Custome...
FIGURE 31.6 Table from a key-value store
Chapter 32
FIGURE 32.1 SQL command summary
FIGURE 32.2 Executing a SQL command in Azure Data
Studio
Chapter 33
FIGURE 33.1 The CIA triad summarizes the three main
concerns of cybersecurit...
Loading page 14...
Chapter 36
FIGURE 36.1 Fingerprint authentication on a smartphone
FIGURE 36.2 Eye scan authentication entering a facility
FIGURE 36.3 Microsoft Windows access control list
Chapter 37
FIGURE 37.1 Creating a password in LastPass
Chapter 38
FIGURE 38.1 Plain text message
FIGURE 38.2 Ciphertext message obtained by encrypting the
plain text in Figu...
FIGURE 36.1 Fingerprint authentication on a smartphone
FIGURE 36.2 Eye scan authentication entering a facility
FIGURE 36.3 Microsoft Windows access control list
Chapter 37
FIGURE 37.1 Creating a password in LastPass
Chapter 38
FIGURE 38.1 Plain text message
FIGURE 38.2 Ciphertext message obtained by encrypting the
plain text in Figu...
Loading page 15...
Loading page 16...
Loading page 17...
WILEY BOOKS IN THE CERTMIKE SERIES
CompTIA ITF+ CertMike: Prepare. Practice.
Pass the Test! Get Certified! Exam FC0-U61
by Mike Chapple
(ISBN 9781119897811)
CompTIA A+ CertMike: Prepare. Practice.
Pass the Test! Get Certified! Core 1 Exam 220-
1101
by Mike Chapple and Mark Soper
(ISBN 9781119898092)
CompTIA A+ CertMike: Prepare. Practice.
Pass the Test! Get Certified! Core 2 Exam 220-
1102
by Mike Chapple and Mark Soper
(ISBN 9781119898122)
CompTIA Network+ CertMike: Prepare.
CompTIA ITF+ CertMike: Prepare. Practice.
Pass the Test! Get Certified! Exam FC0-U61
by Mike Chapple
(ISBN 9781119897811)
CompTIA A+ CertMike: Prepare. Practice.
Pass the Test! Get Certified! Core 1 Exam 220-
1101
by Mike Chapple and Mark Soper
(ISBN 9781119898092)
CompTIA A+ CertMike: Prepare. Practice.
Pass the Test! Get Certified! Core 2 Exam 220-
1102
by Mike Chapple and Mark Soper
(ISBN 9781119898122)
CompTIA Network+ CertMike: Prepare.
Loading page 18...
Practice.
Pass the Test! Get Certified! Exam N10-008
by Mike Chapple and Craig Zacker
(ISBN 9781119898153)
Pass the Test! Get Certified! Exam N10-008
by Mike Chapple and Craig Zacker
(ISBN 9781119898153)
Loading page 19...
CompTIA® ITF+ CertMike
Prepare. Practice. Pass the Test! Get
Certified!
Exam FC0-U61
Mike Chapple
Prepare. Practice. Pass the Test! Get
Certified!
Exam FC0-U61
Mike Chapple
Loading page 20...
Copyright © 2023 by John Wiley & Sons, Inc. All rights reserved.
Published by John Wiley & Sons, Inc., Hoboken, New Jersey.
Published simultaneously in Canada and the United Kingdom.
ISBN: 978-1-119-89781-1
ISBN: 978-1-119-89783-5 (ebk.)
ISBN: 978-1-119-89782-8 (ebk.)
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in
any form or by any means, electronic, mechanical, photocopying, recording, scanning, or
otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright
Act, without either the prior written permission of the Publisher, or authorization through
payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222
Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4470, or on the web at
www.copyright.com. Requests to the Publisher for permission should be addressed to the
Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030,
(201) 748-6011, fax (201) 748-6008, or online at www.wiley.com/go/permission.
Trademarks: WILEY, the Wiley logo, and the Sybex logo are trademarks or registered
trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other
countries, and may not be used without written permission. CompTIA is a registered
trademark of The Computing Technology Industry Association, Inc. All other trademarks are
the property of their respective owners. John Wiley & Sons, Inc. is not associated with any
product or vendor mentioned in this book.
Limit of Liability/Disclaimer of Warranty: While the publisher and author have used
their best efforts in preparing this book, they make no representations or warranties with
respect to the accuracy or completeness of the contents of this book and specifically disclaim
any implied warranties of merchantability or fitness for a particular purpose. No warranty
may be created or extended by sales representatives or written sales materials. The advice and
strategies contained herein may not be suitable for your situation. You should consult with a
professional where appropriate. Further, readers should be aware that websites listed in this
work may have changed or disappeared between when this work was written and when it is
read. Neither the publisher nor authors shall be liable for any loss of profit or any other
commercial damages, including but not limited to special, incidental, consequential, or other
damages.
For general information on our other products and services or for technical support, please
contact our Customer Care Department within the United States at (800) 762-2974, outside
the United States at (317) 572-3993 or fax (317) 572-4002.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in
print may not be available in electronic formats. For more information about Wiley products,
visit our web site at www.wiley.com.
Library of Congress Control Number: 2022935720
Cover design: Wiley
Published by John Wiley & Sons, Inc., Hoboken, New Jersey.
Published simultaneously in Canada and the United Kingdom.
ISBN: 978-1-119-89781-1
ISBN: 978-1-119-89783-5 (ebk.)
ISBN: 978-1-119-89782-8 (ebk.)
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in
any form or by any means, electronic, mechanical, photocopying, recording, scanning, or
otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright
Act, without either the prior written permission of the Publisher, or authorization through
payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222
Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4470, or on the web at
www.copyright.com. Requests to the Publisher for permission should be addressed to the
Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030,
(201) 748-6011, fax (201) 748-6008, or online at www.wiley.com/go/permission.
Trademarks: WILEY, the Wiley logo, and the Sybex logo are trademarks or registered
trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other
countries, and may not be used without written permission. CompTIA is a registered
trademark of The Computing Technology Industry Association, Inc. All other trademarks are
the property of their respective owners. John Wiley & Sons, Inc. is not associated with any
product or vendor mentioned in this book.
Limit of Liability/Disclaimer of Warranty: While the publisher and author have used
their best efforts in preparing this book, they make no representations or warranties with
respect to the accuracy or completeness of the contents of this book and specifically disclaim
any implied warranties of merchantability or fitness for a particular purpose. No warranty
may be created or extended by sales representatives or written sales materials. The advice and
strategies contained herein may not be suitable for your situation. You should consult with a
professional where appropriate. Further, readers should be aware that websites listed in this
work may have changed or disappeared between when this work was written and when it is
read. Neither the publisher nor authors shall be liable for any loss of profit or any other
commercial damages, including but not limited to special, incidental, consequential, or other
damages.
For general information on our other products and services or for technical support, please
contact our Customer Care Department within the United States at (800) 762-2974, outside
the United States at (317) 572-3993 or fax (317) 572-4002.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in
print may not be available in electronic formats. For more information about Wiley products,
visit our web site at www.wiley.com.
Library of Congress Control Number: 2022935720
Cover design: Wiley
Loading page 21...
To all of my students at Notre Dame. The energy, enthusiasm, and
experiences you bring to the classroom make me a better teacher and
writer.
—Mike
experiences you bring to the classroom make me a better teacher and
writer.
—Mike
Loading page 22...
ACKNOWLEDGMENTS
This book marks the start of a new test prep series called CertMike:
Prepare. Practice. Pass the Test! Get Certified!, and I'd first like to
thank the people who helped shape the vision for this series. The
original idea was hatched over breakfast with two very supportive
editors from the Wiley team: Ken Brown and Jim Minatel. I've worked
with both Jim and Ken on many books over many years, and they're
both insightful industry experts who know what it takes to produce a
great book.
I'd also like to extend a special thank-you to my agent, Carole Jelen of
Waterside Productions. Carole is also an experienced industry pro who
can deftly navigate the murky waters of publishing. Carole is the one
who pushed me to create my own series.
Of course, the creation of any book involves a tremendous amount of
effort from many people other than the author. I truly appreciate the
work of Adaobi Obi Tulton, the project editor. Adaobi and I have now
worked together on many books, and she keeps the train on the tracks!
I'd also like to thank Audrey O'Shea, the technical editor, who
provided insightful advice and gave wonderful feedback throughout
the book, and Archana Pragash, production editor, who guided me
through layouts, formatting, and final cleanup to produce a great
book. I would also like to thank the many behind-the-scenes
contributors, including the graphics, production, and technical teams
who make the book and companion materials into a finished product.
Finally, I would like to thank my family, who supported me through
the late evenings, busy weekends, and long hours that a book like this
requires to write, edit, and get to press.
This book marks the start of a new test prep series called CertMike:
Prepare. Practice. Pass the Test! Get Certified!, and I'd first like to
thank the people who helped shape the vision for this series. The
original idea was hatched over breakfast with two very supportive
editors from the Wiley team: Ken Brown and Jim Minatel. I've worked
with both Jim and Ken on many books over many years, and they're
both insightful industry experts who know what it takes to produce a
great book.
I'd also like to extend a special thank-you to my agent, Carole Jelen of
Waterside Productions. Carole is also an experienced industry pro who
can deftly navigate the murky waters of publishing. Carole is the one
who pushed me to create my own series.
Of course, the creation of any book involves a tremendous amount of
effort from many people other than the author. I truly appreciate the
work of Adaobi Obi Tulton, the project editor. Adaobi and I have now
worked together on many books, and she keeps the train on the tracks!
I'd also like to thank Audrey O'Shea, the technical editor, who
provided insightful advice and gave wonderful feedback throughout
the book, and Archana Pragash, production editor, who guided me
through layouts, formatting, and final cleanup to produce a great
book. I would also like to thank the many behind-the-scenes
contributors, including the graphics, production, and technical teams
who make the book and companion materials into a finished product.
Finally, I would like to thank my family, who supported me through
the late evenings, busy weekends, and long hours that a book like this
requires to write, edit, and get to press.
Loading page 23...
ABOUT THE AUTHORS
Mike Chapple, Ph.D., is author of the best-selling CISSP (ISC)2
Certified Information Systems Security Professional Official Study
Guide (Sybex, 2021) and the CISSP (ISC)2 Official Practice Tests
(Sybex, 2021). He is an information technology professional with two
decades of experience in higher education, the private sector, and
government.
Mike currently serves as Teaching Professor in the IT, Analytics, and
Operations department at the University of Notre Dame's Mendoza
College of Business, where he teaches undergraduate and graduate
courses on cybersecurity, cloud computing, data management, and
business analytics.
Before returning to Notre Dame, Mike served as executive vice
president and chief information officer of the Brand Institute, a
Miami-based marketing consultancy. Mike also spent four years in the
information security research group at the National Security Agency
and served as an active duty intelligence officer in the U.S. Air Force.
Mike has written more than 25 books. He earned both his B.S. and
Ph.D. degrees from Notre Dame in computer science and engineering.
Mike also holds an M.S. in computer science from the University of
Idaho and an MBA from Auburn University. Mike holds the IT
Fundamentals (ITF+), Cybersecurity Analyst+ (CySA+), Data+,
Security+, Certified Information Security Manager (CISM), Certified
Cloud Security Professional (CCSP), and Certified Information
Systems Security Professional (CISSP) certifications.
Learn more about Mike and his other security certification materials at
his website, CertMike.com.
Mike Chapple, Ph.D., is author of the best-selling CISSP (ISC)2
Certified Information Systems Security Professional Official Study
Guide (Sybex, 2021) and the CISSP (ISC)2 Official Practice Tests
(Sybex, 2021). He is an information technology professional with two
decades of experience in higher education, the private sector, and
government.
Mike currently serves as Teaching Professor in the IT, Analytics, and
Operations department at the University of Notre Dame's Mendoza
College of Business, where he teaches undergraduate and graduate
courses on cybersecurity, cloud computing, data management, and
business analytics.
Before returning to Notre Dame, Mike served as executive vice
president and chief information officer of the Brand Institute, a
Miami-based marketing consultancy. Mike also spent four years in the
information security research group at the National Security Agency
and served as an active duty intelligence officer in the U.S. Air Force.
Mike has written more than 25 books. He earned both his B.S. and
Ph.D. degrees from Notre Dame in computer science and engineering.
Mike also holds an M.S. in computer science from the University of
Idaho and an MBA from Auburn University. Mike holds the IT
Fundamentals (ITF+), Cybersecurity Analyst+ (CySA+), Data+,
Security+, Certified Information Security Manager (CISM), Certified
Cloud Security Professional (CCSP), and Certified Information
Systems Security Professional (CISSP) certifications.
Learn more about Mike and his other security certification materials at
his website, CertMike.com.
Loading page 24...
ABOUT THE TECHNICAL EDITOR
Audrey O'Shea holds CompTIA A+, ITF+, Network+, Security+,
Project+, and other industry certifications. The former owner of a
computer consulting company, she holds two degrees and a New York
State teaching license. Audrey chose to become an educator to share
her knowledge with the next wave of IT professionals. She has taught
at the college level, in technical schools, and adult seminars with
courses ranging from Electrical Theory and Practice for Energy
Workers, to Microsoft Office, CompTIA A+, Introduction to
Cybersecurity, and CISCO certification. Audrey is a teacher, author,
consultant, and entrepreneur, and has helped many students learn
what they need to know to pass their certification exams.
Audrey has authored two technical books: A Geek Girl’s Guide to
Electronics and the Internet of Things (Wiley, 2020) and CompTIA
A+ Complete Practice Tests, 3rd Edition (Wiley, 2022). She has also
served as technical editor on two other books leading to CompTIA
certifications.
Audrey lives in upstate New York with her significant other and their
fur babies. When she isn't behind a computer you can find her hiking
in the Adirondack Mountains or kayaking on a lake somewhere.
Audrey O'Shea holds CompTIA A+, ITF+, Network+, Security+,
Project+, and other industry certifications. The former owner of a
computer consulting company, she holds two degrees and a New York
State teaching license. Audrey chose to become an educator to share
her knowledge with the next wave of IT professionals. She has taught
at the college level, in technical schools, and adult seminars with
courses ranging from Electrical Theory and Practice for Energy
Workers, to Microsoft Office, CompTIA A+, Introduction to
Cybersecurity, and CISCO certification. Audrey is a teacher, author,
consultant, and entrepreneur, and has helped many students learn
what they need to know to pass their certification exams.
Audrey has authored two technical books: A Geek Girl’s Guide to
Electronics and the Internet of Things (Wiley, 2020) and CompTIA
A+ Complete Practice Tests, 3rd Edition (Wiley, 2022). She has also
served as technical editor on two other books leading to CompTIA
certifications.
Audrey lives in upstate New York with her significant other and their
fur babies. When she isn't behind a computer you can find her hiking
in the Adirondack Mountains or kayaking on a lake somewhere.
Loading page 25...
INTRODUCTION
If you're preparing to take the ITF+ (IT Fundamentals+) exam, you
might find yourself overwhelmed with information. This exam covers a
very broad range of topics, and it's possible to spend weeks studying
each one of them. Fortunately, that's not necessary!
As part of the CertMike: Prepare. Practice. Pass the Test! Get Certified!
series, this book is designed to help you focus on the specific
knowledge that you'll need to pass the ITF+ exam. CompTIA publishes
a detailed list of exam objectives, and this book is organized around
those objectives. Each chapter clearly states the single objective that it
covers and then, in a few pages, covers the material you need to know
about that objective.
You'll find two important things at the end of each chapter: CertMike
Exam Essentials and Practice Questions. The CertMike Exam
Essentials distill the major points from the chapter into just a few
bullet points. Reviewing these CertMike Exam Essentials is a great
way to prepare yourself right before taking the exam.
I've also recorded an audio version of the CertMike Exam Essentials
that you can access online at www.wiley.com/go/sybextestprep after
registering and logging on. You can listen to the audio review when
you're in the car, at the gym, or mowing the lawn!
Each chapter concludes with two practice questions that are designed
to give you a taste of what it's like to take the exam. You'll find that
they're written in the same style as the ITF+ exam questions and have
very detailed explanations to help you understand the correct answer.
Be sure to take your time and thoroughly study these questions.
Finally, the book's online test bank (www.wiley.com/go/sybextestprep)
includes a full-length practice exam that you can use to assess your
knowledge when you're ready to take the test. Good luck on the ITF+
exam!
If you're preparing to take the ITF+ (IT Fundamentals+) exam, you
might find yourself overwhelmed with information. This exam covers a
very broad range of topics, and it's possible to spend weeks studying
each one of them. Fortunately, that's not necessary!
As part of the CertMike: Prepare. Practice. Pass the Test! Get Certified!
series, this book is designed to help you focus on the specific
knowledge that you'll need to pass the ITF+ exam. CompTIA publishes
a detailed list of exam objectives, and this book is organized around
those objectives. Each chapter clearly states the single objective that it
covers and then, in a few pages, covers the material you need to know
about that objective.
You'll find two important things at the end of each chapter: CertMike
Exam Essentials and Practice Questions. The CertMike Exam
Essentials distill the major points from the chapter into just a few
bullet points. Reviewing these CertMike Exam Essentials is a great
way to prepare yourself right before taking the exam.
I've also recorded an audio version of the CertMike Exam Essentials
that you can access online at www.wiley.com/go/sybextestprep after
registering and logging on. You can listen to the audio review when
you're in the car, at the gym, or mowing the lawn!
Each chapter concludes with two practice questions that are designed
to give you a taste of what it's like to take the exam. You'll find that
they're written in the same style as the ITF+ exam questions and have
very detailed explanations to help you understand the correct answer.
Be sure to take your time and thoroughly study these questions.
Finally, the book's online test bank (www.wiley.com/go/sybextestprep)
includes a full-length practice exam that you can use to assess your
knowledge when you're ready to take the test. Good luck on the ITF+
exam!
Loading page 26...
NOTE
Don't just study the questions and answers! The questions on the
actual exam will be different from the practice questions included
in this book. The exam is designed to test your knowledge of a
concept or objective, so use this book to learn the objectives behind
the questions.
THE ITF+ EXAM
The ITF+ exam is designed to be a vendor-neutral certification for
those seeking to enter the information technology field. CompTIA
recommends this certification for three types of people:
Students considering starting a career in information technology
Professionals working in fields that require an understanding of
information technology
Sales, marketing, and operations professionals in IT-focused
companies
The exam covers six major domains of knowledge:
1. IT Concepts and Terminology
2. Infrastructure
3. Applications and Software
4. Software Development Concepts
5. Database Fundamentals
6. Security
These six areas include a range of topics, from installing printers to
securing networks, while focusing heavily on the basic knowledge
expected of all IT professionals. That's why CompTIA recommends the
ITF+ certification for those in any IT-related field.
The ITF+ exam uses only standard multiple-choice questions. Unlike
Don't just study the questions and answers! The questions on the
actual exam will be different from the practice questions included
in this book. The exam is designed to test your knowledge of a
concept or objective, so use this book to learn the objectives behind
the questions.
THE ITF+ EXAM
The ITF+ exam is designed to be a vendor-neutral certification for
those seeking to enter the information technology field. CompTIA
recommends this certification for three types of people:
Students considering starting a career in information technology
Professionals working in fields that require an understanding of
information technology
Sales, marketing, and operations professionals in IT-focused
companies
The exam covers six major domains of knowledge:
1. IT Concepts and Terminology
2. Infrastructure
3. Applications and Software
4. Software Development Concepts
5. Database Fundamentals
6. Security
These six areas include a range of topics, from installing printers to
securing networks, while focusing heavily on the basic knowledge
expected of all IT professionals. That's why CompTIA recommends the
ITF+ certification for those in any IT-related field.
The ITF+ exam uses only standard multiple-choice questions. Unlike
Loading page 27...
other CompTIA exams, you won't find performance-based questions
(PBQs) on the ITF+ exam. This exam is designed to be straightforward
and not to trick you. If you know the material in this book, you will
pass the exam.
The exam costs $130 in the United States, with roughly equivalent
prices in other locations around the globe. More details about the
ITF+ exam and how to take it can be found at
www.comptia.org/certifications/it-fundamentals.
You'll have 50 minutes to take the exam and will be asked to answer
up to 75 questions during that time period. Your exam will be scored
on a scale ranging from 100 to 900, with a passing score of 650.
NOTE
CompTIA frequently does what is called item seeding, which is
the practice of including unscored questions on exams. It does so
to gather psychometric data, which is then used when developing
new versions of the exam. Before you take the exam, you will be
told that your exam may include these unscored questions. So, if
you come across a question that does not appear to map to any of
the exam objectives—or for that matter, does not appear to belong
in the exam—it is likely a seeded question. You never really know
whether or not a question is seeded, however, so always make your
best effort to answer every question.
Taking the Exam
Once you are fully prepared to take the exam, you can visit the
CompTIA website to purchase your exam voucher:
https://store.comptia.org
Currently, CompTIA offers two options for taking the exam: an in-
person exam at a testing center and an at-home exam that you take on
your own computer.
TIP
(PBQs) on the ITF+ exam. This exam is designed to be straightforward
and not to trick you. If you know the material in this book, you will
pass the exam.
The exam costs $130 in the United States, with roughly equivalent
prices in other locations around the globe. More details about the
ITF+ exam and how to take it can be found at
www.comptia.org/certifications/it-fundamentals.
You'll have 50 minutes to take the exam and will be asked to answer
up to 75 questions during that time period. Your exam will be scored
on a scale ranging from 100 to 900, with a passing score of 650.
NOTE
CompTIA frequently does what is called item seeding, which is
the practice of including unscored questions on exams. It does so
to gather psychometric data, which is then used when developing
new versions of the exam. Before you take the exam, you will be
told that your exam may include these unscored questions. So, if
you come across a question that does not appear to map to any of
the exam objectives—or for that matter, does not appear to belong
in the exam—it is likely a seeded question. You never really know
whether or not a question is seeded, however, so always make your
best effort to answer every question.
Taking the Exam
Once you are fully prepared to take the exam, you can visit the
CompTIA website to purchase your exam voucher:
https://store.comptia.org
Currently, CompTIA offers two options for taking the exam: an in-
person exam at a testing center and an at-home exam that you take on
your own computer.
TIP
Loading page 28...
This book includes a coupon that you may use to save 10 percent
on your CompTIA exam registration.
In-Person Exams
CompTIA partners with Pearson VUE's testing centers, so your next
step will be to locate a testing center near you. In the United States,
you can do this based on your address or your ZIP code, while non-
U.S. test takers may find it easier to enter their city and country. You
can search for a test center near you at the Pearson Vue website, where
you will need to navigate to “Find a test center”:
www.pearsonvue.com/comptia
Now that you know where you'd like to take the exam, simply set up a
Pearson VUE testing account and schedule an exam on their site.
On the day of the test, take two forms of identification, and make sure
to show up with plenty of time before the exam starts. Remember that
you will not be able to take your notes, electronic devices (including
smartphones and watches), or other materials in with you.
At-Home Exams
CompTIA began offering online exam proctoring in 2020 in response
to the coronavirus pandemic. As of the time this book went to press,
the at-home testing option was still available and appears likely to
continue. Candidates using this approach will take the exam at their
home or office and be proctored over a webcam by a remote proctor.
Due to the rapidly changing nature of the at-home testing experience,
candidates wishing to pursue this option should check the CompTIA
website for the latest details.
After the ITF+ Exam
Once you have taken the exam, you will be notified of your score
immediately, so you'll know if you passed the test right away. You
should keep track of your score report with your exam registration
records and the email address you used to register for the exam.
on your CompTIA exam registration.
In-Person Exams
CompTIA partners with Pearson VUE's testing centers, so your next
step will be to locate a testing center near you. In the United States,
you can do this based on your address or your ZIP code, while non-
U.S. test takers may find it easier to enter their city and country. You
can search for a test center near you at the Pearson Vue website, where
you will need to navigate to “Find a test center”:
www.pearsonvue.com/comptia
Now that you know where you'd like to take the exam, simply set up a
Pearson VUE testing account and schedule an exam on their site.
On the day of the test, take two forms of identification, and make sure
to show up with plenty of time before the exam starts. Remember that
you will not be able to take your notes, electronic devices (including
smartphones and watches), or other materials in with you.
At-Home Exams
CompTIA began offering online exam proctoring in 2020 in response
to the coronavirus pandemic. As of the time this book went to press,
the at-home testing option was still available and appears likely to
continue. Candidates using this approach will take the exam at their
home or office and be proctored over a webcam by a remote proctor.
Due to the rapidly changing nature of the at-home testing experience,
candidates wishing to pursue this option should check the CompTIA
website for the latest details.
After the ITF+ Exam
Once you have taken the exam, you will be notified of your score
immediately, so you'll know if you passed the test right away. You
should keep track of your score report with your exam registration
records and the email address you used to register for the exam.
Loading page 29...
After you earn the ITF+ certification, you're certified for life! Unlike
many other CompTIA certifications that must be renewed on a
periodic basis, the ITF+ certification is permanent and remains with
you throughout your career.
Many people who earn the ITF+ credential use it as a stepping-stone
to earning other certifications in their areas of interest. Those
interested in technical support roles pursue the A+ certification, those
interested in networking work toward the Network+ credential, and
the Security+ certification is a gateway to a career in cybersecurity.
many other CompTIA certifications that must be renewed on a
periodic basis, the ITF+ certification is permanent and remains with
you throughout your career.
Many people who earn the ITF+ credential use it as a stepping-stone
to earning other certifications in their areas of interest. Those
interested in technical support roles pursue the A+ certification, those
interested in networking work toward the Network+ credential, and
the Security+ certification is a gateway to a career in cybersecurity.
Loading page 30...
WHAT DOES THIS BOOK COVER?
This book covers everything you need to know to pass the ITF+ exam.
It is organized into six parts, each corresponding to one of the six ITF+
domains.
Part I: Domain 1.0: IT Concepts and Terminology
Chapter 1: Notational Systems
Chapter 2: Data Types
Chapter 3: Computing Basics
Chapter 4: Value of Data
Chapter 5: Units of Measure
Chapter 6: Troubleshooting
Part II: Domain 2.0: Infrastructure
Chapter 7: Input/Output Device Interfaces
Chapter 8: Installing Peripherals
Chapter 9: Internal Computing Components
Chapter 10: Internet Service Types
Chapter 11: Storage
Chapter 12: Computing Devices
Chapter 13: TCP/IP Networking
Chapter 14: Application Protocols
Chapter 15: Network Devices
Chapter 16: Wireless Networks
Part III: Domain 3.0: Applications and Software
Chapter 17: Operating Systems
Chapter 18: Virtualization
This book covers everything you need to know to pass the ITF+ exam.
It is organized into six parts, each corresponding to one of the six ITF+
domains.
Part I: Domain 1.0: IT Concepts and Terminology
Chapter 1: Notational Systems
Chapter 2: Data Types
Chapter 3: Computing Basics
Chapter 4: Value of Data
Chapter 5: Units of Measure
Chapter 6: Troubleshooting
Part II: Domain 2.0: Infrastructure
Chapter 7: Input/Output Device Interfaces
Chapter 8: Installing Peripherals
Chapter 9: Internal Computing Components
Chapter 10: Internet Service Types
Chapter 11: Storage
Chapter 12: Computing Devices
Chapter 13: TCP/IP Networking
Chapter 14: Application Protocols
Chapter 15: Network Devices
Chapter 16: Wireless Networks
Part III: Domain 3.0: Applications and Software
Chapter 17: Operating Systems
Chapter 18: Virtualization
Loading page 31...
30 more pages available. Scroll down to load them.
Preview Mode
Sign in to access the full document!
100%
Study Now!
XY-Copilot AI
Unlimited Access
Secure Payment
Instant Access
24/7 Support
AI Assistant
Document Details
Subject
CompTIA Certifications