Show Menu
Cheatography

CompTIA ITF + Fundamentals Essentials Cheat Sheet (DRAFT) by

CompTIA ITF + Fundamentals Essentials cheatsheet 2022

This is a draft cheat sheet. It is a work in progress and is not finished yet.

1.1

Compar­e/c­ontrast common OS's, functions & features
 
Mobile types:
Apple iOS
   
Android
   
Windows Phone
   
Blackberry
 
Workst­ation types:
Windows
   
Mac
   
Linux
   
Chrome OS
 
Open source vs commercial
Software compat­ibility for different OS types and versions
Awareness of hardware compat­ibility for OS support
32bit vs. 64bit operating systems
Basic functions of an operating system
Interface between user and machine
 
Coordi­nation of hardware components
 
Provides enviro­nment for software to function
 
Monitors system health and functi­onality
 
Displays structure / direct­ories for data management

1.2

dentify common programs, applic­ations and their purpose
Types:
Produc­tivity Software
- Word processing
   
- Spread­sheet software
   
- Email software
   
- Basic database software
   
- PDF viewer­s/c­reators
   
- Presen­tation software
   
- Desktop publishing software
   
- Personal Inform­ation Manager
   
- Remote desktop software
 
Collab­oration Software
- Online workspace
   
- Document storag­e/s­haring
   
- Screen sharing software
   
- Video confer­encing software
   
- nstant messaging software
   
- Email software
 
Utility Software
- Utility Software
   
- Software firewalls
   
- Diagno­sti­c/m­ain­tenance software
   
- Compre­ssion software
 
Specia­lized Software
- CAD
   
- Graphic design
   
- Medical
   
- Scientific
   
- Financial
   
- Gaming
   
- Entert­ainment
 
Open source vs. commercial
Platforms
Mobile
 
Desktop
 
Web-based
Common file-types
Documents
txt, rtf, doc/docx, xls/xlsx, ppt/pptx, pdf
 
Audio
mp3, wav, flac, aac, m4a
 
Images
jpg, gif, tiff, pag, bmp
 
Video
mpg, mp4, flv, wmv, avi
 
Execut­ables
exe, msi, app, bat, scexe
 
Compre­ssion formats
rar, tar, zip, dmg, iso, 7zip/7z, gzip/gz, jar

1.3

Given a scenario, use software management best practices
nstall / uninstall
OS features
 
Applic­ations
 
Drivers
Patching / updates for OS, drivers, applic­ations and security software
Scheduling
 
Frequency
 
Automatics updates
Software version identi­fic­ation and compat­ibility
Licensing
Products keys
 
Single­/mu­lti­-li­cense

1.4

Identify the following altern­ative techno­logies and their purpose
Virtua­liz­ation
Physical machine vs. virtual machine
Cloud Computing
Streaming media(­aud­io/­video)
Web applic­ations
VoIP
Telepr­esence
Gestur­e-based intera­ction
Swiping
 
Pinch-­to-zoom
 
Kinetics

1.5

Explain the basic software features and functions of wireless devices
Unlock­ing­/se­curity
Bluetooth pairing
Hands free
 
Data transfer
Wireless connection setup
Verify wireless capabi­lities
 
Turn on WiFi
 
Locate SSID
 
Enter wireless passwo­rd(if applic­able)
 
Verify Internet connection
Email config­uration
POP3
 
IMAP
 
SMTP
Screen orient­ation
Synchr­oni­zation config­uration
Airplane mode
Stores for mobile applic­ations
 

2.0

Identify basic wired and wireless periph­erals and their purpose
Putput devices
Printer:
- Laser
   
- Inkjet
   
- Thermal
 
Display devices:
- Flatscreen
   
- CRT
   
- Projection
 
Speakers
Input devices
Keyboard
 
Pointing devices
Mouse
   
Touchpad
   
- Joystick
   
Stylus pen
   
Trackball
 
Scanner
 
Microphone
 
Webcam
Input & Output devices
Fax
 
External storage devices
Flash drive
   
External hard drive
   
CD/DVD­/Bl­u-Ray
   
Network Attached Storage
   
Memory card
   
Mobile media players
   
Smart phone
 
Touchs­creen display

2.2

Compare and contrast common computer connector types
Video
VGA, DVI, HDMI, Display port/T­hun­der­bolt, USB, S-video, Component - RGB
FireWire
eSATA
Thunde­rbolt
USB
PS/2
Parallel
Serial
RJ-45
RJ-11
Audio
Power
AC/DC

2.3

Identify the purpose of internal computer components
CPU
Power Supply
RAM
Storage
- Optical drive
 
- Hard drive
 
- Solid state drive
Expansion cards
- Video card
 
- Audio card
 
- NEtwork card
 
- Modem
Mother­boa­rd/­mai­nboard
System cooling
- Case fans
 
CPU fans
 
Liquid cooling

3.1 Security

Define basic security threats
Malware
Virus
 
Trojan
 
Spyware
 
Ransomware
Phishing
Social engine­ering
Spam
Password cracking
Physical security
- Hardware theft
 
- Softwa­re/­license theft
 
- Shoulder surfing
 
- Dumpster diving

3.2

Given a scenario, use security best practices
Password management
Password complexity
 
Change default passwords
 
Password confid­ent­iality
 
Password expiration
 
Password reuse
 
Awareness of Single Sign On
Device hardening
Disable unused features
- Disable Bluetooth
   
- Disable NFC
 
Timeou­t/lock options
 
Enable security oftwar­e/f­eatures
- Software firewall
   
- Anti-m­alware
 
Encryption options
Open WiFi vs. secure WiFi
Multif­actor authen­tic­ation
Suspicious emails
- Attach­ments
 
- Hyperlinks
Act on security software alerts
Admin vs.user vs. guest account

3.3

Given a scenario, use web-br­owsing best practices
Recogn­ize...
... a secure connec­tio­n/w­ebsite
https, lock symbol
 
... invalid certif­icate warnings
 
...sus­picious links
 
...sus­picious banner ads
 
...adware symptoms
- constant popups
   
- homepage redire­ction
   
- Search engine redire­ctions
Limit the use of personal inform­ation (PII)
Update browsers and plugins
- Avoid use of legacy browsers
Disable unneed­ed/­sus­picious browser plugins, toolbars and extensions
Disable autofill forms/­pas­swords
Clear browser cache/­his­tor­y/c­ookies
Recognize untrusted source warnings
Risks of using public workst­ations
 

4.1

Given a scenario, set up and configure a basic SOHO router (wired / wireless)
 
- Verify wired connec­tion, if applicable
 
Set WEP vs. WPA vs. WPA2
 
Change SSID from default
 
Apply a new wireless password
 
Change admin password for router
 
Connect to the new network
 
Verify internet connec­tivity
 
Update firmware if necessary

4.2

Compare and contrast cellular, wireless and wired data connec­tions
 
High vs. low mobility
 
High vs. low availa­bility
 
High vs. low throug­hpu­t/b­and­width
 
High vs. low reliab­ility
 
Connection delay
 
Number of concurrent connec­tions
 
Levels of security

4.3

Compare and contrast different methods of sharing and storage
HTTP vs. HTTPS
- Browse­r-based file downloads
FTP vs. FTPS vs. SFTP (Secure File Transfer Protocol)
Local vs. hosted storage
Cloud-­based services
- Cloud-­based collab­orative applic­ations
   
Cloud-­based storage
 
File and print sharing
Workgroup
   
Homegroup
 
Network drives
 
Netword attached storage
 
Direct attached storage
 
External hard drives
Peer-t­o-peer
Local adhoc network
- Bluetooth sharing
 
Direct link(P­C-t­o-PC)
 
Online peer-t­o-peer network
Network vs. local printing
USB
 
Wirele­ss/­wired network

5.1

Perform approp­riate steps to set up a basic workst­ation
Plug in cables
Power on computer
Follow initial operating system setup wizard
-Local­ization settings
 
- Screen resolution
 
- Audio settings
Install security software
Configure periph­erals (if applic­able)
Uninstall unneeded software (if applic­able)
Configure and verify internet connection
Install additional software (if applic­able)
Run software and security updates
Other user accounts (if applic­able)
Basic cable management

5.2

Explain the basic methods of navigating an operating system
Executing programs
Difference between shortcuts and files
Manipu­lating files
Open
 
Edit
 
Save
 
Move
 
Copy
 
Cut
 
Paste
 
Delete
 
Rename
Read-only vs. modifiable files
Navigate a file structure
Search, sort and display files
Create screen captures
Navigate with hot keys
Folder and file size
Access­ibility options
Folder and file permis­sions

5.3

Given a scenario, implement basic support concepts
Check for external issues
Loose cables / connec­tions
 
Power
 
Physical damage
Manufa­cturer docume­ntation
Manufa­cturer websites
Technical community groups
Internet search engine
Contact technical support

5.4

Explain basic backup concepts
Importance of backups
Scheduling
Frequency
Storage mediums
- Locally attached storage
 
- Offsit­e/c­lou­d-based
 
-Network attached storage
Backup verifi­cation and testing

5.5

Describe the importance and impact of various enviro­nmental and safety concepts
Propoer disposal methods
RoHS
 
CRT monitors
 
Scanners
 
Batteries
 
Ink/Toner
 
Hard drives
Power
Energy efficient devices
 
Power profiles
Power options
   
Sleep/­Hib­ern­ation
 
UPS vs surge protector vs power strip
Power limita­tions
 
Intern­ational power differ­ences
Device placement
Airflow
 
Humidity
 
Temper­ature
 
Dust accumu­lation
 
EMI
Electr­ostatic discharge concepts
Ergonomic concepts
Proper keyboard and mouse placement
 
Sitting positions
 
Monitor level placement
Follow manufa­cturer safety guidelines