33,99 €
NOTE: The name of the exam has changed from IT Fundamentals to IT Fundamentals+ (ITF+). However, the FC0-U61 exam objectives are exactly the same. After the book was printed with IT Fundamentals in the title, CompTIA changed the name to IT Fundamentals+ (ITF+). We have corrected the title to IT Fundamentals+ (ITF+) in subsequent book printings, but earlier printings that were sold may still show IT Fundamentals in the title. Please rest assured that the book content is 100% the same. The ultimate study guide for the essential entry-level IT cert! The CompTIA IT Fundamentals Study Guide: Exam FC0-U61, Second Edition is your ideal companion for comprehensive exam preparation. Covering 100 percent of the latest exam objectives, this book contains everything you need to know to pass with flying colors--the first time! Clear, concise language breaks down fundamental IT concepts to help you truly grasp important concepts, and practical examples illustrate how each new skill is applied in real-world situations. You'll learn your way around hardware and software, conduct installations, and connect to networks to get a workstation up and running smoothly; you'll also develop the knowledge base needed to identify compatibility and security issues, mitigate risks, and conduct all-important preventative maintenance that keeps the end-user problem-free. The CompTIA IT Fundamentals certification validates your skills as a systems support specialist, and gets your foot in the door to a successful IT career. This book is your ultimate preparation resource, with expert guidance backed by online tools to take your preparation to the next level! * Master 100 percent of Exam FC0-U61 objectives * Learn real-world applications and practical on-the-job skills * Know what to expect with exam highlights and review questions * Includes 1 year free access to Sybex's online study tools including flashcards, chapter tests, and a practice exam, all supported by Wiley's support agents who are available 24x7 via email or live chat to assist with access and login questions The IT department is instrumental in keeping any organization on its feet. As support staff, you will be called upon to assess and repair common problems, set up and configure workstations, address individual issues, and much more. If you decide to continue on to more advanced IT positions, the CompTIA IT Fundamentals certification is a great springboard; if you're ready to launch your career, the CompTIA IT Fundamentals Study Guide offers complete, practical prep to help you face the exam with confidence.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 1036
Veröffentlichungsjahr: 2018
Second Edition
Quentin Docter
Senior Acquisitions Editor: Kenyon Brown
Development Editor: Gary Schwartz
Technical Editors: Chris Crayton and Jon Buhagiar
Senior Production Editor: Christine O'Connor
Copy Editor: Kim Wimpsett
Content Enablement and Operations Manager: Pete Gaughan
Production Manager: Kathleen Wisor
Executive Editor: Jim Minatel
Book Designers: Judy Fung and Bill Gibson
Proofreader: Nancy Carrasco
Indexer: Ted Laux
Project Coordinator, Cover: Brent Savage
Cover Designer: Wiley
Cover Image: Getty Images Inc./Jeremy Woodhouse
Copyright © 2018 by John Wiley & Sons, Inc., Indianapolis, Indiana
Published simultaneously in Canada
ISBN: 978-1-119-51312-4ISBN: 978-1-119-51305-6 (ebk.)ISBN: 978-1-119-51309-4 (ebk.)
Manufactured in the United States of America
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.
Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Web site is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Web site may provide or recommendations it may make. Further, readers should be aware that Internet Web sites listed in this work may have changed or disappeared between when this work was written and when it is read.
For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S. at (877) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002.
Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included with standard print versions of this book may not be included in e-books or in print-on-demand. If this book refers to media such as a CD or DVD that is not included in the version you purchased, you may download this material at http://booksupport.wiley.com. For more information about Wiley products, visit www.wiley.com.
Library of Congress Control Number: 2018950282
TRADEMARKS: Wiley, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. CompTIA is a registered trademark of CompTIA, Inc. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.
In memory of grandpa Joe, who taught me the fundamentals of IT and so much more.
First and foremost, I need to thank my family. Without their support and patience, I would never be able to work on projects like this.
This edition was more special than most, in that it left me with an unusual sense of pride as well as a realization of how long the road has been. When I wrote my first book, I dedicated it to my still-baking-in-the-oven oldest daughter. Now, she has enough expertise to be my SME and first proofreader for the programming chapter. She can code circles around me, and I’m proud of her (and my other kids too!).
They say it takes a village to produce a book, and it always amazes me at the number of people who are involved. I have been fortunate to work with a great Sybex crew yet again. Gary Schwartz was the development editor. Thanks, Gary, for keeping me on track and answering all of my mundane questions. Kenyon Brown was the acquisitions editor for this book—thank you, Kenyon, for asking me to take on this book.
In addition, Christine O’Connor was an excellent production editor; I appreciate her professionalism and pragmatism. Jon Buhagiar and Chris Crayton were my technical editors—thank you both for all of your ideas; you really made this book better. To Kim Wimpsett, the copy editor, thank you so much for dealing with my consistent grammar mistakes. I may not have the best grammar, but at least I am consistent about it!
Quentin Docter started in the IT industry as a tech support agent for Packard Bell in 1994. Since then he has worked in tech support, network administration, consulting, training, web development, and project management. During his career, he has achieved certifications from CompTIA (including IT Fundamentals+ (ITF+)), Microsoft, Cisco, Novell, and Sun Microsystems. He is the author of several books, including the CompTIA A+ Complete Study Guide by Sybex, an imprint of Wiley.
Acknowledgments
About the Author
Introduction
Assessment Test
Answers to the Assessment Test
Chapter 1 Core Hardware Components
Introducing Internal Components
Exploring Motherboards, Processors, and Memory
Exploring Storage and Expansion Devices
Exploring Power and Cooling
Summary
Exam Essentials
Chapter 1 Written Lab
Review Questions
Chapter 2 Peripherals and Connectors
Understanding Common Peripherals, Interfaces, and Connectors
Summary
Exam Essentials
Chapter 2 Lab
Review Questions
Chapter 3 Computing Devices and the Internet of Things
Exploring Common Computing Devices
Understanding the Internet of Things
Summary
Exam Essentials
Chapter 3 Lab
Review Questions
Chapter 4 Operating Systems
Operating System Fundamentals
Managing an Operating System
Summary
Exam Essentials
Chapter 4 Lab
Review Questions
Chapter 5 Software Applications
Understanding Application Architecture and Installation
Exploring Common Application Types
Summary
Exam Essentials
Chapter 5 Lab
Review Questions
Chapter 6 Software Development
Exploring Programming Languages
Understanding Programming Concepts and Techniques
Summary
Exam Essentials
Chapter 6 Lab
Review Questions
Chapter 7 Database Fundamentals
Understanding Databases
Summary
Exam Essentials
Chapter 7 Lab
Review Questions
Chapter 8 Networking Concepts and Technologies
Exploring Connection Types and Features
Understanding Network Connectivity Essentials
Setting Up a Wireless Network
Summary
Exam Essentials
Chapter 8 Lab
Review Questions
Chapter 9 Security Concepts and Threats
Understanding Hackers and Motives
Understanding Security Threats
Understanding Access Control
Summary
Exam Essentials
Chapter 9 Lab
Review Questions
Chapter 10 Security Best Practices
Understanding Security Best Practices
Summary
Exam Essentials
Chapter 10 Lab
Review Questions
Chapter 11 Business Continuity and Computer Support
Understanding Business Continuity
Exploring Computer Support Concepts
Summary
Exam Essentials
Chapter 11 Lab
Review Questions
Appendix A Answers to Written Labs
Chapter 1: Core Hardware Components
Chapter 2: Peripherals and Connectors
Chapter 3: Computing Devices and the Internet of Things
Chapter 4: Operating Systems
Chapter 5: Software Applications
Chapter 6: Software Development
Chapter 7: Database Fundamentals
Chapter 8: Networking Concepts and Technologies
Chapter 9: Security Concepts and Threats
Chapter 10: Security Best Practices
Chapter 11: Business Continuity and Computer Support
Appendix B Answers to Review Questions
Chapter 1: Core Hardware Components
Chapter 2: Peripherals and Connectors
Chapter 3: Computing Devices and the Internet of Things
Chapter 4: Operating Systems
Chapter 5: Software Applications
Chapter 6: Software Development
Chapter 7: Database Fundamentals
Chapter 8: Networking Concepts and Technologies
Chapter 9: Security Concepts and Threats
Chapter 10: Security Best Practices
Chapter 11: Business Continuity and Computer Support
Index
Advert
End User License Agreement
Chapter 1
Table 1.1
Table 1.2
Table 1.3
Table 1.4
Chapter 2
Table 2.1
Table 2.2
Table 2.3
Chapter 3
Table 3.1
Table 3.2
Chapter 4
Table 4.1
Table 4.2
Table 4.3
Table 4.4
Table 4.5
Table 4.6
Table 4.7
Chapter 5
Table 5.1
Table 5.2
Table 5.3
Table 5.4
Chapter 6
Table 6.1
Table 6.2
Table 6.3
Table 6.4
Chapter 7
Table 7.1
Table 7.2
Chapter 8
Table 8.1
Table 8.2
Table 8.3
Table 8.4
Table 8.5
Chapter 1
Figure 1.1 A motherboard
Figure 1.2 Northbridge and Southbridge
Figure 1.3 CPU sockets
Figure 1.4 DIMM slots
Figure 1.5 SODIMM slots
Figure 1.6 PCI expansion slots
Figure 1.7 An AGP slot compared to a PCI slot
Figure 1.8 PCIe expansion slots
Figure 1.9 IDE hard drive connectors
Figure 1.10 SATA hard drive connectors
Figure 1.11 A 24-pin ATX power connector
Figure 1.12 A BIOS chip on a motherboard
Figure 1.13 An example of a BIOS boot screen
Figure 1.14 Computer back panel
Figure 1.15 AMD Athlon processor
Figure 1.16 Calculator in Programmer view
Figure 1.17 System information
Figure 1.18 Virtual memory
Figure 1.19 Memory module form factors
Figure 1.20 Inside a hard drive
Figure 1.21 PATA/IDE and SATA hard drives
Figure 1.22 PATA and SATA data cables
Figure 1.23 Installed disk drives
Figure 1.24 Hard disk properties
Figure 1.25 Disk drives
Figure 1.26 A DVD-ROM
Figure 1.27 A video card
Figure 1.28 A legacy sound card
Figure 1.29 A wireless desktop NIC
Figure 1.30 A modem
Figure 1.31 A desktop power supply
Figure 1.32 Power supply in the case
Figure 1.33 A 20-pin ATX power connector
Figure 1.34 Peripheral power connectors
Figure 1.35 Laptop power supply
Figure 1.36 System unit airflow
Figure 1.37 CPU heat sink
Chapter 2
Figure 2.1 Audio connectors
Figure 2.2 Sound card with game port
Figure 2.3 Cutaway of a CRT monitor
Figure 2.4 VGA connectors
Figure 2.5 DVI connector
Figure 2.6 HDMI cable (top) and port (bottom)
Figure 2.7 DisplayPort port
Figure 2.8 Two Thunderbolt ports
Figure 2.9 Video adjustment keys including F4 (LCD toggle), F7 (dim), and F8 (brighten)
Figure 2.10 Fn key
Figure 2.11 Laptop video toggle
Figure 2.12 Screen Resolution
Figure 2.13 Multiple displays
Figure 2.14 Keep Changes button
Figure 2.15 Rearranging monitors
Figure 2.16 Two flash drives
Figure 2.17 SD memory cards
Figure 2.18 SD memory card slot and USB port
Figure 2.19 External hard drive
Figure 2.20 Netgear NAS device
Figure 2.21 eSATA port (bottom)
Figure 2.22 USB over eSATA
Figure 2.23 RJ-11 and RJ-45 connectors
Figure 2.24 RJ ports
Figure 2.25 Wireless USB receiver
Figure 2.26 Keyboard and mouse PS/2 ports
Figure 2.27 A natural keyboard
Figure 2.28 Changing your language preferences
Figure 2.29 Adding an input method
Figure 2.30 Keyboard layout preview
Figure 2.31 Changing the input type
Figure 2.32 Wireless optical mouse
Figure 2.33 Touchpad
Figure 2.34 Hardware And Sound
Figure 2.35 Device Settings tab of the Mouse Properties window
Figure 2.36 Touchpad configuration options
Figure 2.37 A trackball
Figure 2.38 Mouse Properties window
Figure 2.39 Pointer Options tab
Figure 2.40 Inkjet printer cartridges
Figure 2.41 Back-panel connectors, including serial and parallel ports
Figure 2.42 Parallel cable
Figure 2.43 Adding a new printer
Figure 2.44 Entering the IP address of the printer
Figure 2.45 HP ePrint configuration
Chapter 3
Figure 3.1 Laptop AC power adapter
Figure 3.2 Polarity symbols
Figure 3.3 The back and front of a docking station
Figure 3.4 Cable lock
Figure 3.5 Cable lock insertion point
Figure 3.6 Audio adjustment keys F7 (quieter), F8 (louder), and F9 (microphone mute)
Figure 3.7 iOS 11 home screen
Figure 3.8 Android home screen
Figure 3.9 Portrait mode
Figure 3.10 Landscape mode
Figure 3.11 iOS security lock
Figure 3.12 iPhone Settings
Figure 3.13 Touch ID & Passcode
Figure 3.14 iOS Settings
Figure 3.15 Wi-Fi is off.
Figure 3.16 Wi-Fi is on, with available networks.
Figure 3.17 Android Settings
Figure 3.18 Bluetooth device found
Figure 3.19 Entering the PIN
Figure 3.20 Paired Bluetooth
Figure 3.21 Airplane mode on iOS 11
Figure 3.22 iPhone Control Center
Figure 3.23 Airplane mode in Android
Figure 3.24 iTunes app store
Figure 3.25 Google Play Store
Figure 3.26 Installing an app
Figure 3.27 iOS 11 cellular data options
Figure 3.28 iTunes sync
Figure 3.29 Settings apps on Android
Figure 3.30 1ClickSync options
Figure 3.31 Pong
Figure 3.32 Roku 3
Figure 3.33 Nest smart thermostat
Figure 3.34 Electronic toll system
Chapter 4
Figure 4.1 The operating system interacts with hardware.
Figure 4.2 ENIAC
Figure 4.3 The first PC graphical user interface
Figure 4.4 Windows Performance Monitor
Figure 4.5 Lubuntu desktop
Figure 4.6 macOS High Sierra
Figure 4.7 Windows 3.11 Program Manager
Figure 4.8 Windows 95 desktop
Figure 4.9 Windows 8.1 Start screen
Figure 4.10 Google Chrome OS
Figure 4.11 iOS 11 home screen
Figure 4.12 Android 8.0 home screen
Figure 4.13 Type 1 and Type 2 hypervisors
Figure 4.14 User accounts in Windows 7
Figure 4.15 User settings in macOS
Figure 4.16 Ubuntu user properties
Figure 4.17 User account creation
Figure 4.18 Creating a password
Figure 4.19 Your info in Windows 10
Figure 4.20 Creating a new user in Windows 10
Figure 4.21 Entering username and password
Figure 4.22 User Account Control
Figure 4.23 Making changes to your user account
Figure 4.24 User Account Control Settings
Figure 4.25 Programs And Features
Figure 4.26 Task Manager
Figure 4.27 Task Scheduler
Figure 4.28 Task trigger
Figure 4.29 Starting a program
Figure 4.30 Services tab of Task Manager
Figure 4.31 Services management console
Figure 4.32 Devices in Windows Settings
Figure 4.33 Device Manager
Figure 4.34 Driver details
Figure 4.35 Disk Management
Figure 4.36 System screen
Figure 4.37 Performance options
Figure 4.38 Virtual Memory settings
Figure 4.39 C: Properties
Figure 4.40 Disk Cleanup
Figure 4.41 Computer window
Figure 4.42 Directories in the C: drive
Figure 4.43 Several folders
Figure 4.44 Right-clicking a file
Figure 4.45 File properties
Figure 4.46 File security
Figure 4.47 Browsing for a folder or file
Figure 4.48 New shortcut
Figure 4.49 VirtualBox preconfiguration
Figure 4.50 VirtualBox with a virtual drive
Figure 4.51 Lubuntu - Settings dialog
Figure 4.52 Installing Lubuntu
Chapter 5
Figure 5.1 Google Drive settings
Figure 5.2 Google Docs changes saved in Drive
Figure 5.3 Three-tier architecture model
Figure 5.4 Microsoft product key
Figure 5.5 Turning Windows features on or off
Figure 5.6 Uninstalling an application
Figure 5.7 Devices And Printers window
Figure 5.8 Windows Update
Figure 5.9 Installed updates
Figure 5.10 Uninstalling a Windows update
Figure 5.11 Device Manager
Figure 5.12 Updating the drivers screen
Figure 5.13 Driver management
Figure 5.14 Default Apps window
Figure 5.15 Choosing default apps by file type
Figure 5.16 Word document
Figure 5.17 Microsoft Excel
Figure 5.18 Microsoft PowerPoint
Figure 5.19 HR hiring process flowchart example
Figure 5.20 Zoho Projects software
Figure 5.21 Microsoft Publisher
Figure 5.22 Norton Internet Security
Figure 5.23 Automatic updates are on.
Figure 5.24 Two ways to configure a DMZ
Figure 5.25 Windows Defender Firewall
Figure 5.26 7-Zip file manager
Figure 5.27 7-Zip archive options
Figure 5.28 Creating a PDF file from Word 2010
Figure 5.29 Viewing a PDF file
Figure 5.30 Microsoft Edge options
Figure 5.31 Chrome version 65 options
Figure 5.32 Microsoft Edge version
Figure 5.33 About Chrome
Figure 5.34 Three extensions installed in Chrome
Figure 5.35 Proxy settings
Figure 5.36 LAN settings
Figure 5.37 Clear Browsing Data window
Figure 5.38 Cookie acceptance settings
Figure 5.39 Clearing browsing data in Chrome
Figure 5.40 Edge pop-up blocker
Figure 5.41 Chrome’s pop-up blocker
Figure 5.42 A secure website using HTTPS
Figure 5.43 Wiley security certificate information
Figure 5.44 Invalid security certificate example
Figure 5.45 InPrivate browsing
Figure 5.46 Incognito browsing
Chapter 6
Figure 6.1 Calculator in Programmer view
Figure 6.2 Hello, world!
Figure 6.3 “Hello, world!” JavaScript alert
Figure 6.4 Flowchart
Chapter 7
Figure 7.1 Simple data in a spreadsheet
Figure 7.2 Simple data in Microsoft Access
Figure 7.3 Logical relational database schema
Figure 7.4 Logical schema with primary keys
Figure 7.5 Microsoft Access table
Figure 7.6 Form in Microsoft Access
Figure 7.7 Microsoft Access 2016
Figure 7.8 Empty database
Figure 7.9 Two tables
Figure 7.10 Get External Data window
Figure 7.11 Imported Customers table
Figure 7.12 Backing up a database
Figure 7.13 Installing Northwind
Figure 7.14 Customer details
Chapter 8
Figure 8.1 A DSL modem
Figure 8.2 The back of the DSL modem
Figure 8.3 MiFi hotspot
Figure 8.4 Bluetooth USB adapter
Figure 8.5 Infrared port
Figure 8.6 Eight-port switch
Figure 8.7 Sample network with routers and switches
Figure 8.8 A wireless router
Figure 8.9 TCP/IP protocol suite
Figure 8.10
tracert
output
Figure 8.11
ipconfig
output
Figure 8.12 NETGEAR NAS device
Figure 8.13 Google Drive
Figure 8.14 Sharing a folder on Google Drive
Figure 8.15 Router setup initial screen
Figure 8.16 Verifying the wired connection
Figure 8.17 Connecting to the router
Figure 8.18 Error message: Can’t find router
Figure 8.19 The router is configured.
Figure 8.20 Creating a Linksys account
Figure 8.21 Your network is not secure.
Figure 8.22 Signing in to the router
Figure 8.23 Linksys Smart Wi-Fi configuration screen
Figure 8.24 Wireless configuration
Figure 8.25 Connectivity options
Figure 8.26 Wireless Network Connection window
Figure 8.27 Wireless networks on an iPhone
Figure 8.28 Guest network configuration
Figure 8.29 DHCP configuration
Figure 8.30 NAT enabled
Figure 8.31 Firewall settings
Chapter 9
Figure 9.1 The CIA triad
Figure 9.2 A laptop security cable
Figure 9.3 Virus spreading from an infected system
Figure 9.4 Email viruses can spread quickly.
Figure 9.5 RSA SecurID
Figure 9.6 PingID
Figure 9.7 Security log in Event Viewer
Figure 9.8 Microsoft Edge site-viewing history
Chapter 10
Figure 10.1 Windows Update
Figure 10.2 An iOS update is available.
Figure 10.3 Details on iOS version 11.3
Figure 10.4 Touch ID & Passcode
Figure 10.5 Windows 10 Lock Screen window
Figure 10.6 Screen Saver Settings dialog box
Figure 10.7 Security and Maintenance screen
Figure 10.8 Uninstalling an application
Figure 10.9 Printer driver search results
Figure 10.10 Disabled Bluetooth in iOS
Figure 10.11 Disabled Bluetooth in Android
Figure 10.12 Windows Services
Figure 10.13 Bluetooth Support Service properties
Figure 10.14 AutoPlay options
Figure 10.15 Autofill in Chrome
Figure 10.16 Save Form Entries switch
Figure 10.17 Autocomplete settings in IE
Figure 10.18 SmartScreen filter
Figure 10.19 Chrome privacy and security settings
Figure 10.20 Select Users Or Groups dialog
Figure 10.21 User permissions
Figure 10.22 Advanced Attributes dialog
Figure 10.23 Windows Certificate Manager
Figure 10.24 The Mac FileVault
Chapter 11
Figure 11.1 RAID 1 and RAID 5
Figure 11.2 An uninterruptible power supply
Figure 11.3 The back of an uninterruptible power supply
Figure 11.4 Advanced file attributes
Figure 11.5 Windows File History (backup) options
Figure 11.6 Selecting a drive for backups
Figure 11.7 Backup options
Figure 11.8 File History options
Figure 11.9 System Protection tab
Figure 11.10 Choosing a restore point
Figure 11.11 System Configuration utility
Figure 11.12 Task Manager Startup tab
Figure 11.13 Configuring an application for compatibility mode
Figure 11.14 Pinging the loopback address
Figure 11.15
ipconfig
results
Figure 11.16 Successful
ping
results
Figure 11.17 Successful
tracert
results
Cover
Table of Contents
Introduction
iv
v
vii
ix
xix
xx
xxi
xxii
xxiii
xxiv
xxv
xxvi
xxvii
xxviii
xxix
xxx
xxxi
xxxii
xxxiii
xxxiv
xxxv
xxxvi
xxxvii
xxxviii
xxxix
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
589
590
591
592
593
594
595
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
EXERCISE 1.1
Converting Between Decimal and Other Numbering Systems
EXERCISE 1.2
Assessing Your Computer’s RAM and Virtual Memory
EXERCISE 1.3
Determining the Type of Installed RAM
EXERCISE 1.4
Examining Hard Drives in Windows
EXERCISE 2.1
Adjusting a Desktop Monitor
EXERCISE 2.2
Changing the Settings for Multiple Monitors
EXERCISE 2.3
Changing Your Keyboard Layout in Windows 10
EXERCISE 2.4
Disabling a Touchpad in Windows 10
EXERCISE 2.5
Configuring a Mouse
EXERCISE 2.6
Installing an IP Printer
EXERCISE 3.1
Changing Security Settings on IOS 11
EXERCISE 4.1
Creating a User Account in Windows 7
EXERCISE 4.2
Creating a User Account in Windows 10
EXERCISE 4.3
Changing Windows User Account Control
EXERCISE 4.4
Creating a Task with Task Scheduler
EXERCISE 4.5
Managing Virtual Memory in Windows 10
EXERCISE 4.6
Managing Storage Space in Windows 10
EXERCISE 4.7
Manipulating Files in Windows 10
EXERCISE 4.8
Creating a Shortcut in Windows 10
EXERCISE 5.1
Installing and Uninstalling Operating System Features
EXERCISE 5.2
Installing 7-Zip
EXERCISE 5.3
Installing Free Applications
EXERCISE 5.4
Configuring Windows Update
EXERCISE 5.5
Using 7-Zip to Create an Archive
EXERCISE 5.6
Downloading and Installing Adobe Acrobat Reader
EXERCISE 5.7
Managing Cookies and Cache in Microsoft Edge
EXERCISE 5.8
Configuring the Edge Pop-Up Blocker
EXERCISE 6.1
Converting Between Decimal and Other Numbering Systems
EXERCISE 6.2
Creating “Hello, world!” in HTML
EXERCISE 7.1
Creating a Database and Tables in Microsoft Access 2016
EXERCISE 7.2
Importing Data from Excel to Access
EXERCISE 8.1
Pricing Internet Connectivity
EXERCISE 8.2
The Cost of Networking
EXERCISE 8.3
Finding Your IP Configuration Information in Windows 10
EXERCISE 9.1
Testing Social Engineering
EXERCISE 10.1
Securing a Windows 10 PC from Unauthorized Local Use
EXERCISE 10.2
Starting and Stopping Services in Windows 10
EXERCISE 10.3
Configuring SmartScreen in Microsoft Edge
EXERCISE 10.4
Encrypting Local Folders in Windows 10
EXERCISE 10.5
Backing Up a Windows Security Certificate
EXERCISE 11.1
Setting Up a Backup in Windows 10
EXERCISE 11.2
Booting into Safe Mode in Windows 10
EXERCISE 11.3
Using System Restore in Windows 10
EXERCISE 11.4
Using the System Configuration Utility in Windows 10
EXERCISE 11.5
Creating a Desktop Shortcut for MSCONFIG
EXERCISE 11.6
Running an Application in Compatibility Mode
EXERCISE 11.7
Checking TCP/IP Connectivity
If you’re picking up this book, it means it’s likely that either you’re thinking about getting into the IT industry or you are relatively new to it. Either way, you are probably getting advice from nearly everyone you meet. One of the common refrains you probably hear is “Get certified!” With so many certifications out there, you might wonder where to start—CompTIA IT Fundamentals+ (ITF+) is that place.
Certification is one of the best things you can do for your career if you are working in, or want to break into, the IT profession, because it proves that you know what you’re talking about regarding the subjects in which you’re certified. It also powerfully endorses you as a professional in a way that’s similar to a physician being board certified in a certain area of expertise. It can add to your résumé and make you more attractive to potential employers and more valuable as an employee. In these challenging economic times, keeping ahead of the competition—even standing out among your present colleagues—could make a big difference in whether you gain a promotion or not!
In this book, you’ll find out what the IT Fundamentals+ (ITF+) exam is all about because each chapter covers a part of the exam. I’ve included some great review questions at the end of each chapter to help crystallize the information you learned and solidly prepare you to ace the exam. This book covers more than just the exam, though. I believe in providing my students with a foundation of IT knowledge that will prepare them for real jobs, not just to pass a test. After all, life is not a multiple-choice test with the answers clearly laid out in front of you!
A really cool thing about working in IT is that it’s constantly evolving, so there are always new things to learn and fresh challenges to master. Once you obtain your IT Fundamentals+ (ITF+) certification and discover that you’re interested in taking it further by getting into more complex topics (and making more money), the CompTIA A+ certification is definitely your next step.
IT Fundamentals+ (ITF+) is a certification developed by the Computing Technology Industry Association (CompTIA) that exists to provide resources and education for the computer and technology community. This is the same body that developed the A+ exam for PC technicians, Network+ for networking experts, and Security+ for security practitioners.
Way back in 1995, members of the organization got together to develop a new certification that tests skills for IT. To ensure industry-wide support, it was sponsored by many past and present IT industry leaders like these:
Compaq Computers
Digital Equipment Corporation (a part of Compaq)
IBM
Lotus
Microsoft
Novell
TSS
U.S. Robotics
US West
Wave Technologies
The IT Fundamentals+ (ITF+) exam was designed to test the skills of those with little to no experience in the field but who want to show that they have a broad general understanding of core IT topics. It tests areas such as computer hardware, operating systems and applications, basic networking, security, and setting up and maintaining a computer.
Because CompTIA is a well-respected developer of vendor-neutral industry certifications, becoming IT Fundamentals+ (ITF+) certified proves that you have a base level of knowledge in the specific areas tested by the IT Fundamentals+ (ITF+) objectives.
Four major benefits are associated with becoming IT Fundamentals+ (ITF+) certified:
Proof of Professional Achievement Computer professionals are pretty competitive when it comes to collecting more certifications than their peers. And because the IT Fundamentals+ (ITF+) certification broadly covers the entire field of computers, it’s a great stepping-stone to prove that you have what it takes to succeed in this industry. Because it’s rare to gain something that’s worth a lot with little effort, I’ll be honest—preparing for the IT Fundamentals+ (ITF+) exam isn’t exactly a lazy day at the beach. But passing the test is worth it because it will get the attention of potential employers.
Opportunity for Advancement We all like to get ahead in our careers—advancement results in more responsibility and prestige, and it usually means a fatter paycheck, greater opportunities, and added options. In the IT sector, a great way to make sure all that good stuff happens is by earning a lot of technology certifications, including IT Fundamentals+ (ITF+).
Fulfillment of Training Requirements IT Fundamentals+ (ITF+), because of its wide-reaching industry support, is recognized as a baseline of computer knowledge. This can potentially fulfill IT-related training requirements set forth by your company.
Customer Confidence As companies discover the CompTIA advantage, they will undoubtedly require qualified staff to achieve these certifications. Many companies outsource their work to consulting firms with experience working with security. Firms that have certified staff have a definite advantage over firms that don’t.
As this book goes to press, Pearson VUE is the sole IT Fundamentals+ (ITF+) exam provider. The following is the necessary contact information and exam-specific details for registering. Exam pricing might vary by country or by CompTIA membership.
Vendor
Website
Phone Number
Pearson VUE
www.pearsonvue.com/comptia
U.S. and Canada: 877-551-PLUS (7587)
When you schedule the exam, you’ll receive instructions regarding appointment and cancellation procedures, ID requirements, and information about the testing center location. In addition, you’ll receive a registration and payment confirmation letter. Exams can be scheduled up to six weeks out or as late as the next day (or, in some cases, even the same day).
Exam prices and codes may vary based on the country in which the exam is administered. For detailed pricing and exam registration procedures, refer to CompTIA’s website at www.comptia.org.
After you’ve successfully passed your IT Fundamentals+ (ITF+) exam, CompTIA will award you a certification. Within four to six weeks of passing the exam, you’ll receive your official CompTIA IT Fundamentals+ (ITF+) certificate and ID card. (If you don’t receive these within eight weeks of taking the test, contact CompTIA directly using the information found in your registration packet.)
Here are some general tips for taking your exam successfully:
Bring two forms of ID with you. One must be a photo ID, such as a driver’s license. The other can be a major credit card or a passport. Both forms must include a signature.
Arrive early at the exam center so you can relax and review your study materials, particularly tables and lists of exam-related information. Once you are ready to enter the testing room, you will need to leave everything outside; you won’t be able to bring any materials into the testing area.
Read the questions carefully. Don’t be tempted to jump to an early conclusion. Make sure you know exactly what each question is asking.
Don’t leave any unanswered questions. Unanswered questions are scored against you. There will be questions with multiple correct responses. When there is more than one correct answer, a message at the bottom of the screen will prompt you either to “choose two” or “choose all that apply.” Be sure to read the messages displayed to know how many correct answers you must choose.
When answering multiple-choice questions about which you’re unsure, use a process of elimination to get rid of the obviously incorrect answers first. Doing so will improve your odds if you need to make an educated guess.
On form-based tests (nonadaptive), because the hard questions will take the most time, save them for last. You can move forward and backward through the exam.
For the latest pricing on the exams and updates to the registration procedures, visit CompTIA’s website at
www.comptia.org
.
You—if want to pass the IT Fundamentals+ (ITF+) exam and pass it confidently! This book is chock-full of the exact information you need and directly maps to IT Fundamentals+ (ITF+) exam objectives (listed later in this Introduction), so if you use it to study for the exam, your odds of passing shoot way up.
In addition to including every bit of knowledge you need to learn to pass the exam, I’ve included some really great tips and solid wisdom to equip you even further to work successfully in the real IT world.
This book covers everything you need to know to pass the CompTIA IT Fundamentals+ (ITF+) exam. But in addition to studying the book, it’s a good idea to practice on actual computers if you can.
Here’s a list of the 11 chapters in this book:
Chapter 1, “Core Hardware Components” This chapter introduces you to the core insides of a computer, specifically motherboards, processors, memory, storage, expansion slots, power, and cooling systems.
Chapter 2, “Peripherals and Connectors” While core hardware is important, users can truly customize their computer experience by adding peripheral hardware. To connect all of those toys to your system, you need to know which connectors to use, and this chapter teaches you all of that.
Chapter 3, “Computing Devices and the Internet of Things” Now that you’ve learned about all of the individual hardware components, how do they all work together? This chapter discusses features of servers, workstations, laptops, tablets, smartphones, and gaming consoles. It also introduces the Internet of Things (IoT), which can turn practically anything into a device.
Chapter 4, “Operating Systems” Without an operating system, computer hardware makes a pretty good doorstop. The operating system is the most critical piece of software on a computer, because it coordinates the efforts of the hardware and provides an interface for the user to interact with the machine.
Chapter 5, “Software Applications” This chapter covers a variety of common application types that reside on computers, such as productivity software, collaboration software, business software, anti-malware utilities, and web browsers. It also teaches you about application design concepts, software management, and the proper ways to install, uninstall, and manage applications.
Chapter 6, “Software Development” Have you ever wondered how applications get created? This chapter will teach you the characteristics of several classes of programming languages. You will also see examples of code, programming logic, and organizational methods.
Chapter 7, “Database Fundamentals” Databases are a key part of computing systems today. Data is the new currency, and therefore databases are like a bank vault. This chapter walks you through database concepts and structures, and it shows you some methods to interact with databases.
Chapter 8, “Networking Concepts and Technologies” Who doesn’t want to get on the Internet? Wireless networks are popular today as a method to get Internet connectivity. You’ll learn about key networking technologies and how to configure a wireless router in this chapter.
Chapter 9, “Security Concepts and Threats” The downside to computers is that it seems like hackers are everywhere. This chapter will introduce you to common threats posed by would-be attackers so you know how to avoid them. It also introduces a security framework and access control concepts.
Chapter 10, “Security Best Practices” This chapter builds on Chapter 9 by showing you how to set up your system to protect it against attacks. You will learn about hardening devices, managing users, and using data encryption.
Chapter 11, “Business Continuity and Computer Support” Inevitably, computers will run into problems—it’s the nature of electronic components. This chapter will show you how to troubleshoot any issues that pop up. Warning: After reading this chapter, all of your family members will call on you for technical support (if they don’t already)! This chapter also shows you how to plan for eventual computer problems so that you don’t totally lose your data.
I’ve included the following study tools throughout the book:
Assessment Test At the end of this Introduction is an Assessment Test that you can use to check your readiness for the exam. Take this test before you start reading the book; it will help you determine the areas where you might need to brush up. The answers to the Assessment Test questions appear on separate pages after the last question of the test. Each answer includes an explanation and a note telling you the chapter in which the material appears.
Objective Map and Opening List of Objectives Just before the Assessment Test, you’ll find a detailed exam objective map, showing you where each of the CompTIA exam objectives is covered in this book. In addition, each chapter opens with a list of the exam objectives it covers. Use these to see exactly where each of the exam topics is covered.
Exam Essentials Each chapter, just after the summary, includes a number of exam essentials. These are the key topics that you should take from the chapter in terms of areas to focus on when preparing for the exam.
Lab Exercises Each chapter includes a hands-on lab to give you more experience. These exercises map to the exam objectives. Some ask specific questions, and you can find the answers to those questions in Appendix A.
Chapter Review Questions To test your knowledge as you progress through the book, there are 20 review questions at the end of each chapter. As you finish each chapter, answer the review questions and then check your answers—the correct answers and explanations are in Appendix B. You can go back to reread the section that deals with each question you got wrong in order to ensure that you answer correctly the next time you’re tested on the material.
The interactive online learning environment that accompanies CompTIA IT Fundamentals+ (ITF+) Study Guide: Exam FC0-U61, Second Edition, provides a test bank with study tools to help you prepare for the certification exam and increase your chances of passing it the first time! The test bank includes the following:
Sample Tests All of the questions in this book are provided online, including the Assessment Test, which you’ll find at the end of this Introduction, and the Chapter Tests, which include the review questions at the end of each chapter. In addition, there are two Practice Exams. Use these questions to test your knowledge of the study guide material. The online test bank runs on multiple devices.
Flashcards Questions are provided in digital flashcard format (a question followed by a single correct answer). You can use the flashcards to reinforce your learning and provide last-minute test prep before the exam.
Other Study Tools A glossary of key terms from this book and their definitions is available as a fully searchable PDF.
Go to www.wiley.com/go/sybextestprep to register and gain access to this interactive online learning environment and test bank with study tools.
If you want a solid foundation for the serious effort of preparing for the IT Fundamentals+ (ITF+) exam, then look no further because I’ve spent countless hours putting together this book with the sole intention of helping you to pass it!
This book is loaded with valuable information, and you will get the most out of your study time if you understand how I put the book together. Here’s a list that describes how to approach studying:
Take the Assessment Test immediately following this Introduction. (The answers are at the end of the test, but no peeking!) It’s okay if you don’t know any of the answers—that’s what this book is for. Carefully read over the explanations for any question you get wrong, and make note of the chapters where that material is covered.
Study each chapter carefully, making sure you fully understand the information and the exam objectives listed at the beginning of each one. Again, pay extra-close attention to any chapter that includes material covered in questions you missed on the Assessment Test.
Complete the lab exercise at the end of each chapter. Do
not
skip these exercises. One reason is that they directly map to the CompTIA objectives and reinforce the material. Another reason is that it gives you hands-on experience, which is crucial.
Answer all the review questions related to each chapter. Specifically, note any questions that confuse you, and study the corresponding sections of the book again. And don’t just skim these questions—make sure you understand each answer completely.
Try your hand at the Practice Exams. The more questions you practice, the better you will be when you sit for the real exam.
Test yourself using all of the electronic flashcards. This is a new and updated flashcard program to help you prepare for the latest CompTIA IT Fundamentals+ (ITF+) exam, and it is a really great study tool.
Learning every bit of the material in this book is going to require you to apply yourself with a good measure of discipline. So, try to set aside the same time period every day to study, and select a comfortable and quiet place to do so. If you work hard, you will be surprised at how quickly you learn this material.
If you follow the steps listed here and study with the Review Questions, Practice Exams, electronic flashcards, and all of the written labs, you would almost have to try to fail the CompTIA IT Fundamentals+ (ITF+) exam. However, studying for the IT Fundamentals+ (ITF+) exam is like training for a marathon—if you don’t go for a good run every day, you’re not likely to finish very well.
Speaking of objectives, you’re probably pretty curious about them, right? CompTIA asked groups of IT professionals to fill out a survey rating the skills they felt were important in their jobs, and the results were grouped into objectives for the exam and divided into six domains.
This table gives you the extent by percentage in which each domain is represented on the actual examination.
Domain
% of Examination
1.0 IT Concepts and Terminology
17%
2.0 Infrastructure
22%
3.0 Applications and Software
18%
4.0 Software Development
12%
5.0 Database Fundamentals
11%
6.0 Security
20%
Total
100%
Exam objectives are subject to change at any time without prior notice and at CompTIA’s sole discretion. Please visit CompTIA’s website (www.comptia.org) for the most current listing of exam objectives.
Objective
Chapter
1.0 IT Concepts and Terminology
1.1 Compare and contrast notational systems.
6
1.2 Compare and contrast fundamental data types and their characteristics.
6
1.3 Illustrate the basics of computing and processing.
1
1.4 Explain the value of data and information.
9
1.5 Compare and contrast common units of measure.
1, 2
1.6 Explain the troubleshooting methodology.
11
2.0 Infrastructure
2.1 Classify common types of input/output device interfaces.
2
2.2 Given a scenario, set up and install common peripheral devices to a laptop/PC.
2
2.3 Explain the purpose of common internal computing components.
1
2.4 Compare and contrast common Internet service types.
8
2.5 Compare and contrast storage types.
1, 8
2.6 Compare and contrast common computing devices and their purposes.
3
2.7 Explain basic networking concepts.
8
2.8 Given a scenario, install, configure and secure a basic wireless network.
8
3.0 Applications and Software
3.1 Manage applications and software.
4
3.2 Compare and contrast components of an operating system.
4
3.3 Explain the purpose and proper use of software.
5
3.4 Explain methods of application architecture and delivery models.
5
3.5 Given a scenario, configure and use web browsers.
5
3.6 Compare and contrast general application concepts and uses.
5
4.0 Software Development Concepts
4.1 Compare and contrast programming language categories.
6
4.2 Given a scenario, use programming organizational techniques and interpret logic.
6
4.3 Explain the purpose and use of programming concepts.
6
5.0 Database Fundamentals
5.1 Explain database concepts and the purpose of a database.
7
5.2 Compare and contrast various database structures.
7
5.3 Summarize methods used to interface with databases.
7
6.0 Security
6.1 Summarize confidentiality, integrity, and availability concepts.
9
6.2 Explain methods to secure devices and best practices.
10
6.3 Summarize behavioral security concepts.
10
6.4 Compare and contrast authentication, authorization, accounting, and non-repudiation concepts.
9
6.5 Explain password best practices.
10
6.6 Explain common uses of encryption.
10
6.7 Explain business continuity concepts.
11
Which of the following optical discs will store the most data?
CD-ROMDVD-ROM DLDVD-ROM DSRS-ROMWhich of the following devices are used for persistent user data storage in a computer? (Choose two.)
HDDRAMROMSSDWhich of the following on your computer is considered firmware?
RAMSSDCMOSBIOSWhat was the first widely adopted video connector standard?
CGAVGAXGADVIWhat type of removable storage is often used in digital cameras?
Flash driveNASMemory cardMobile media cardWhich of the following peripherals is considered an input device?
ScannerPrinterTouchscreenFlash driveAngela has an iPhone with a biometric scanner enabled. She powered the device off and just turned it back on. What methods can she use to unlock her phone?
Fingerprint onlyPasscode onlyFingerprint or passcodeFingerprint, passcode, or iris scanYou are setting up a new Wi-Fi connection on your iPad. What is the first step in the process?
Enter wireless passwordVerify Internet connectionVerify wireless capabilitiesLocate SSIDTurn on Wi-FiWhat type of security is involved when pairing two Bluetooth devices together?
SSL certificates are exchanged.A PIN is provided by the Bluetooth device.The Bluetooth security layer negotiates the security mechanism.There is no security involved.Which operating system named its versions after large cats?
iOSOS XAndroidChrome OSYour computer has a 64-bit CPU. Which statement is true regarding which operating systems you can install on it?
64-bit operating systems only64-bit or 32-bit operating systems32-bit operating systems onlyIt depends on how much RAM is in your system.Which type of operating system allows you to run multiple operating systems at once on one computer?
Embedded OSServer OSHypervisorMobile device OSWhich of the following is not considered productivity software?
Spreadsheet softwareWeb browserOnline workspaceVisual diagramming softwareWhich of the following is required for a website to show up as a secure website in a browser?
Private browsingClient-side scriptingValid certificateCompatible browserWhich of the following terms best describes an application with separate database, business logic, and application layers?
N-tierCloud hostedLocal network hostedThree tierWhich data type exists only in true and false states?
BinaryBooleanCharFloatCode that is not part of the functionality of the program but is intended to be easy for people to read is called what?
CompiledInterpretedCommentedPseudocodeWhich of the following container types has a fixed length?
ConstantArrayVectorStringWhen creating a relational database, what is the name of the rules and structure?
FormsTablesSchemaConstraintsWhich of the following statements is true regarding a foreign key in a relational database?
They are required.There can be only one per table.They are automatically indexed.Null values are allowed.David, a database administrator, needs to remove a column from an existing database. Which command should he use?
ALTERDELETEDROPREMOVEYou open your web browser and type in www.google.com, but your computer can’t find the website. Your neighbor’s computer finds it just fine. What is most likely the cause?
Incorrect DNS configurationIncorrect DHCP configurationIncorrect WPA2 configurationThe website is down.Your friend Marcos asks you which of the following are the most secure. What do you tell him?
802.11nInfraredFiber-opticUTPYour need to set up a wireless router for a friend. He wants to be sure that his network is secure. Which wireless security method should you implement?
WPA2WPANATWEPYou have just created a new logo for your company. What should you get to protect the intellectual property?
TrademarkCopyrightPatentAsset protectionA user has been accused of hacking into a server. Which of the following would keep him from denying that he did it?
AuthenticationAuthorizationAccountingNonrepudiationYour manager read about a replay attack and is worried a hacker will try to use it on your network. What type of concern is this?
ConfidentialityIntegrityAvailabilityAuthenticationWhich of the following are considered device-hardening techniques? (Choose two.)
Disabling BluetoothRequiring complex passwordsEnabling single sign-onInstalling antispyware softwareFor security purposes, which of the following user accounts are disabled by default?
GuestUsersPower UsersAdministratorYou are browsing the Internet to purchase a gift for a friend. What two things should you look for to ensure that it’s safe to enter your credit card information? (Choose two.)
Security seal of approvalRSA Secure Access symbolA lock symbolHTTPS://You just installed a new HP printer on your Dell computer and it’s not printing. What is the first source to check for information on the problem?
Dell’s websiteHP’s websiteGoogle searchInternet technical community groupsWhen configuring a backup solution for your computer, you decide that speed is the most important factor. Which storage option should you choose?
Locally attached storageNetwork attached storageCloud storageOffline storageYou have just completed a backup of your PC onto an optical disc. What is the next step you need to take?
Store the backup in a secure location.Burn the disc to ensure the data is saved.Test the backup to verify it works.Copy the backup data to a cloud.C. A double-sided DVD-ROM can store more data than a dual-layer DVD-ROM, and both can store much more than a CD-ROM. There is no RS-ROM. See Chapter 1 for more information.
A, D. Hard disk drives (HDDs) are used to store user data in a persistent manner, meaning that data is retained after the power is turned off. Solid-state drives (SSDs) are one type of hard drive. See Chapter 1 for more information.
D. The basic input output system (BIOS) is firmware. It’s stored on a hardware chip called the CMOS. See Chapter 1 for more information.
B. VGA was the first widely used video connector standard, and it was released in 1987. See Chapter 2 for more information.
C. Digital cameras use memory cards. The most popular form of memory card on the market today is the SD card. See Chapter 2 for more information.
A. Scanners are input devices. Printers produce output. Touchscreens and flash drives are both input and output devices. See Chapter 2 for more information.