00:20:00

CompTIA Tech+ Practice Test (FC0-U71)

Use the form below to configure your CompTIA Tech+ Practice Test (FC0-U71). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Tech+ FC0-U71 (V6)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Tech+ FC0-U71 (V6) Information

The CompTIA Tech+ Certification (formerly ITF+) is an entry-level certification designed to introduce individuals to the essential IT concepts and terminology. This certification is particularly suited for those who are new to the world of information technology and seeking to gain a basic understanding of IT. It covers a broad range of topics, including hardware, software, networking, cybersecurity, and basic IT literacy. This certification is ideal for individuals considering a career in IT, students in other fields who require a foundational understanding of IT, or professionals in other industries who want to gain a basic knowledge of IT to complement their primary skills.

CompTIA Tech+ FC0-U71 (V6) Logo
  • Free CompTIA Tech+ FC0-U71 (V6) Practice Test

  • 20 Questions
  • Unlimited time
  • IT Concepts and Terminology
    Infrastructure
    Applications and Software
    Software Development Concepts
    Data and Database Fundamentals
    Security
Question 1 of 20

You are performing a routine clean-up on your computer. Which of the following is the BEST method to remove unwanted software so it no longer occupies disk space or loads at startup?

  • Defragmenting the hard drive

  • Deleting the program's desktop shortcut

  • Using the operating system's uninstall feature

  • Rebooting the computer

Question 2 of 20

At the BlueTech company, an employee named Maya is assigned the role of 'Marketing Analyst.' Which of the following best describes how the system should enforce Maya's access to the company's digital marketing platform?

  • Granting unrestricted access to all features of the platform because she might need them in the future

  • Setting custom user settings for Maya's user account based on her personal preferences

  • Using role-based access control to provide specific permissions associated with the 'Marketing Analyst' role

  • Applying least privilege model by manually adjusting permissions for each task she needs to perform

Question 3 of 20

A technician is debugging a piece of software and needs to convert an error code from decimal to octal format. The error code is 10 in decimal. What is the corresponding value in octal?

  • 12

  • 10

  • 14

  • 8

Question 4 of 20

A technician is setting up a new SOHO wireless router. Which of the following is the MOST important initial step to secure the network from unauthorized administrative access?

  • Place the router in the center of the building.

  • Change the router's default administrator password.

  • Disable the SSID broadcast.

  • Enable the 5GHz frequency band.

Question 5 of 20

A programmer needs to store a list of usernames that will be processed one by one in a program. The number of usernames is known and will not change. Which data structure offers the best performance for sequentially iterating over this fixed-size list?

  • Array

  • Hash table

  • Linked list

  • Queue

Question 6 of 20

A project at work requires team members to use a portable device for taking notes during meetings and accessing documents on the go. Which type of device would be most suitable for this situation?

  • Gaming consoles

  • Smartphones

  • Tablets

  • Laptops

Question 7 of 20

What is the primary purpose of pseudocode in the development process?

  • To encrypt the program's code for security purposes.

  • To debug programs once they have been written.

  • To compile the program into binary code that computers can execute.

  • To outline the program's logic in human-readable format before coding.

Question 8 of 20

Which of the following values represents the number one hundred and eleven in the decimal notational system?

  • 1101111

  • 111

  • 6F

  • 1011

Question 9 of 20

When managing a customer database, what practice should be implemented to protect their personal information from unauthorized access?

  • Regularly changing the network cables to ensure a stable connection

  • Encrypting the data at rest

  • Making sure the server room is clean and dust-free

  • Using a very strong password for the database administrator account

Question 10 of 20

In a company's inventory management system, a programmer needs to create a process that checks each item's stock level and alerts the manager if the quantity is below 10. Which type of programming structure is most suitable for this task?

  • Using a loop to iterate through all the items

  • Using a single if-else statement

  • Declaring a variable for each item

  • Creating a constant for the number 10

Question 11 of 20

A system administrator configures a security policy that requires all users to change their passwords every 90 days. Which of the following password best practices does this policy enforce?

  • Password history

  • Password reuse

  • Password complexity

  • Password expiration

Question 12 of 20

In a professional office setting, you are responsible for ensuring the company's financial records are preserved against accidental loss. Which of the following backup strategies should you recommend to safeguard these critical files?

  • Regular backups to cloud storage

  • On-demand backups before major updates

  • Daily on-site backups only

  • Weekly backups to an external hard drive

Question 13 of 20

Which action is the most effective way to protect your personal information when you use social networking platforms?

  • Avoid using password or authentication features to simplify access.

  • Post personal details as it increases online engagement.

  • Share your profile with everyone to gain more followers.

  • Make your profile private and limit post sharing to friends or trusted contacts.

Question 14 of 20

A system administrator wants to minimize the risk of data corruption if the company server loses power unexpectedly. Which advantage is provided by selecting a file system that supports journaling?

  • It encrypts files for added security

  • It maintains a log of file system changes to help recover from crashes

  • It compresses files to save disk space

  • It increases the maximum size of files that can be stored

Question 15 of 20

What is the primary purpose of a product key when installing software?

  • To provide a password for accessing the installed application

  • To activate additional features not included in the base version of the software

  • To uniquely identify each user who installs the software

  • To verify the legitimacy of the software and ensure it is not used beyond its licensed agreement

Question 16 of 20

Your company is growing and you expect the amount of data you store to triple within the next year. Which feature of a database system should be most important to accommodate this growth?

  • Data persistence

  • Primary key

  • Scalability

Question 17 of 20

Which of the following is the BEST example of a public IP address?

  • 169.254.0.1

  • 10.0.0.1

  • 203.0.113.1

  • 192.168.1.1

Question 18 of 20

In a corporate setting, when an employee is unable to see if their colleagues are online or busy in their instant messaging software, what should they check first to resolve this issue?

  • See if the firewall is blocking the instant messaging application

  • Verify if the status visibility feature is enabled in the settings

  • Ensure that their workstation's operating system is updated to the latest version

  • Check if the email client is synchronized with the instant messaging software

Question 19 of 20

What is the purpose of an identifier in a computer programming language?

  • To perform calculations within the program

  • To provide a unique name to a variable, function, or other elements

  • To determine the type of data a variable can hold

  • To serve as a placeholder for values that will be input later

Question 20 of 20

A retail company collects customer purchase histories to improve marketing strategies. What is one key benefit of using this information?

  • It helps the company cut costs by removing customer service altogether.

  • It provides insights into customer preferences, enabling better marketing efforts.

  • It makes it easier to hire additional staff without justification.

  • It allows the company to decide on future locations for their stores.