00:15:00

CompTIA Tech+ Practice Test (FC0-U71)

Use the form below to configure your CompTIA Tech+ Practice Test (FC0-U71). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Tech+ FC0-U71
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Tech+ FC0-U71 Information

The CompTIA Tech+ Certification (formerly ITF+) is an entry-level certification designed to introduce individuals to the essential IT concepts and terminology. This certification is particularly suited for those who are new to the world of information technology and seeking to gain a basic understanding of IT. It covers a broad range of topics, including hardware, software, networking, cybersecurity, and basic IT literacy. This certification is ideal for individuals considering a career in IT, students in other fields who require a foundational understanding of IT, or professionals in other industries who want to gain a basic knowledge of IT to complement their primary skills.

Free CompTIA Tech+ FC0-U71 Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    IT Concepts and Terminology
    Infrastructure
    Applications and Software
    Software Development Concepts
    Data and Database Fundamentals
    Security
Question 1 of 15

A company has several software programs running on their computers, and they need to ensure they can communicate effectively with the hardware they use. Which component is responsible for enabling this communication?

  • User interfaces

  • Disk management tools

  • Services

  • File storage systems

Question 2 of 15

What is the primary purpose of a folder/directory in an operating system?

  • To decrypt files automatically when accessed

  • To compress files to save disk space

  • To organize files into a manageable hierarchy

  • To increase the speed of the computer's processor

Question 3 of 15

A function in programming can execute a set of instructions multiple times when called within a program.

  • False

  • True

Question 4 of 15

A company's document management system is set to only allow access to financial reports after regular business hours to users within the finance department who have a managerial role. What type of access control does this scenario exemplify?

  • Rule-based access control

  • Role-based access control

  • Discretionary access control

  • Mandatory access control

Question 5 of 15

A marketing company maintains a large database of user preferences and behavior. Why is this database valuable to the company?

  • It can be utilized to drive data-driven business decisions.

  • It provides a list of customer names and dates.

  • It represents the amount of data entry work performed.

  • The larger the database, the more valuable it inherently is.

Question 6 of 15

An employee receives a suspicious message instructing them to verify their account by clicking a link and submitting their login details. Just last week, the staff had a seminar discussing the risks of deceptive electronic communications. What should the employee do next?

  • Follow the instructions in the message, assuming it is a standard security procedure

  • Access the link to verify its source but do not enter any login details

  • Inform the company's security personnel regarding the message

  • Send a response inquiring about the authenticity of the message

Question 7 of 15

What unit of measurement is used to describe the clock speed of a computer's central processing unit (CPU)?

  • RPM

  • KB

  • GHz

  • Gbps

Question 8 of 15

The system that translates a website's name into an IP address is known as packet transmission.

  • True

  • False

Question 9 of 15

What is the BEST method for someone who has limited technical experience to perform data entry into a database?

  • Composing a command in a text-based data manipulation interface

  • Designing a customized code snippet to automate data insertion

  • Using a graphical interface designed for data entry

  • Constructing a data insertion query with a specialized builder tool

Question 10 of 15

A new employee at your IT firm has been assigned the task of configuring a company-provided mobile phone for secure corporate use. The phone will be used for emails, scheduling, and accessing company applications. This employee is aware of different CPU architectures and knows that most mobile phones, including the one they are working on, typically use a specific type of CPU for efficiency and battery life. What type of CPU architecture is most commonly found in mobile phones?

  • Complex Instruction Set Computing (CISC)

  • ARM

  • x86

  • 64-bit

Question 11 of 15

An employee needs to transmit sensitive client data to a colleague at another branch. Out of the following methods, which is the MOST secure for preventing unauthorized access during transmission?

  • Trust the security provided by the email service provider's standard encryption protocols in place.

  • Send the email only when connected to a secure, trusted wireless network.

  • Place the sensitive data in a password-protected ZIP file before emailing it to the colleague.

  • Use digital signatures and encrypt the email using end-to-end encryption methods like PGP (Pretty Good Privacy) or S/MIME (Secure/Multipurpose Internet Mail Extensions).

Question 12 of 15

What is the role of a certificate when browsing the web?

  • Acts as a warranty for the safe purchase of items from the website.

  • Generates a key that users must have to access the website.

  • Confirms the security and authenticity of the website.

Question 13 of 15

What is the purpose of a query/report builder in a database?

  • To slow down the access to data for larger databases

  • To provide a graphical interface for users to generate specific views or reports from the data without writing code

  • To encrypt the data in the database for security purposes

  • To increase the storage capacity of the database

Question 14 of 15

When logging into a secure system, which method provides the highest level of security assurance?

  • Using a hardware token issued by the organization

  • Using a password

  • Receiving a one-time password via email or SMS

  • Multifactor authentication requiring both a password and a biometric verification

Question 15 of 15

Which of the following options provides the strongest level of security for user authentication?

  • Using a complex password

  • Employing a unique username alone for system access

  • Implementing multifactor authentication with a password and a biometric check

  • Using a simple four-digit PIN