00:20:00

CompTIA Tech+ Practice Test (FC0-U71)

Use the form below to configure your CompTIA Tech+ Practice Test (FC0-U71). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Tech+ FC0-U71 (V6)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Tech+ FC0-U71 (V6) Information

The CompTIA Tech+ Certification (formerly ITF+) is an entry-level certification designed to introduce individuals to the essential IT concepts and terminology. This certification is particularly suited for those who are new to the world of information technology and seeking to gain a basic understanding of IT. It covers a broad range of topics, including hardware, software, networking, cybersecurity, and basic IT literacy. This certification is ideal for individuals considering a career in IT, students in other fields who require a foundational understanding of IT, or professionals in other industries who want to gain a basic knowledge of IT to complement their primary skills.

CompTIA Tech+ FC0-U71 (V6) Logo
  • Free CompTIA Tech+ FC0-U71 (V6) Practice Test

  • 20 Questions
  • Unlimited
  • IT Concepts and Terminology
    Infrastructure
    Applications and Software
    Software Development Concepts
    Data and Database Fundamentals
    Security
Question 1 of 20

A user has just physically connected a new external webcam to their laptop. What is the BEST next step to ensure the device will function correctly with all of its intended features?

  • Install or verify the latest drivers from the webcam manufacturer.

  • Clean the webcam lens to improve image quality.

  • Adjust the camera's angle to capture the desired view.

  • Select the new webcam as the video source in a conferencing application.

Question 2 of 20

A technician needs to send a new employee's contract, which contains Personally Identifiable Information (PII), to the HR department via email. Which of the following is the BEST method to ensure the confidentiality of this sensitive data during transit?

  • Encrypt the email before sending it.

  • Save the contract on a public file-sharing site and email the link.

  • Include all the sensitive details directly in the email's subject line for clarity.

  • Send the contract as a password-protected file attachment.

Question 3 of 20

You are working in an office and have been asked to digitize a stack of documents. In this scenario, which sequence of computing steps correctly defines how a computer processes these documents into electronic files?

  • Storage → Output → Processing → Input

  • Output → Storage → Input → Processing

  • Input → Processing → Output → Storage

  • Processing → Input → Storage → Output

Question 4 of 20

A group of employees needs to update a project document while sharing feedback instantly during a meeting. Which software would most effectively support their requirements?

  • Spreadsheet software

  • Collaboration software

  • Presentation software

  • Document viewer software

Question 5 of 20

What term describes the characteristic of a database to retain data over time, even when the power is turned off or the system is restarted?

  • Data volatility

  • Data redundancy

  • Data persistence

  • Data transience

Question 6 of 20

A technician receives a task to convert the hexadecimal number '1F' to its equivalent in binary. Given that each hexadecimal digit represents four binary digits, which binary number is the correct representation?

  • 00011111

  • 00111111

  • 10111111

  • 10011111

Question 7 of 20

A company's data center has a critical server that must remain operational at all times. Which of the following solutions should the company implement to ensure that the server remains available during an unexpected power outage?

  • Additional cooling systems

  • Uninterruptible power supply (UPS)

  • Cloud storage subscription

  • Surge protector

Question 8 of 20

In a database, what best describes a record?

  • Comprehensive data types encompassing a single entry

  • A single, uniquely identifiable entry containing one or more values

  • All the data stored within a database

  • A placeholder for future data within a table

Question 9 of 20

Your company is seeking to improve employee experience by reducing the number of times users need to authenticate when accessing various internal services throughout the day. Which feature would be most effective to implement while considering access control best practices?

  • Single Sign-On (SSO) feature

  • Kerberos authentication

  • Lightweight Directory Access Protocol (LDAP) implementation

  • Password manager integration

Question 10 of 20

During a basic PC orientation, a technician tells a trainee to choose the peripheral that allows users to type commands and text into the computer. Which of the following devices is classified as an input device?

  • Speaker

  • Monitor

  • Keyboard

  • Printer

Question 11 of 20

What is the primary function of permissions in file management?

  • To control user access to files and directories

  • To define the type of file based on its extension

  • To determine the location where files are stored

  • To secure files from being viewed

Question 12 of 20

An IT professional is setting up a new server that will run an open-source operating system. The server needs a robust file system capable of handling large files and large volumes of small files while providing journaling capabilities to maintain data integrity. Which file system should the IT professional consider using?

  • Ext4

  • NTFS

  • FAT32

  • Ext3

Question 13 of 20

As an IT support specialist, you've been tasked with securing company workstations. Which of the following actions would MOST effectively improve the security posture of the workstations?

  • Install anti-malware software but avoid frequent updates to reduce network bandwidth usage.

  • Frequently perform factory resets on the devices to ensure a clean state.

  • Change the devices' names on the network every week.

  • Regularly apply patching and updates to software on the devices.

Question 14 of 20

As an IT administrator, you notice that unauthorized changes have been made to several important company files. To identify the party responsible for these changes, which practice would be the most effective?

  • Performing regular system audits

  • Maintaining and reviewing logs

  • Enforcing frequent password changes for all user accounts

  • Restoring the files from the most recent backup

  • Implementing stricter firewall rules

Question 15 of 20

A programmer is writing a script and needs to store a single letter of the alphabet in a variable. Which of the following fundamental data types is the most appropriate for this task?

  • Integer

  • String

  • Float

  • Char

Question 16 of 20

In a company's payroll system, an employee's name is stored as 'John Smith'. Which data type best describes this kind of information?

  • Boolean

  • Integers

  • Char

  • String

Question 17 of 20

During disaster recovery, an organization may have limited staff, equipment, and time to bring systems back online. Why is it essential to establish restoration priorities before beginning recovery activities?

  • It ensures the most business-critical services and data are restored first, minimizing downtime and revenue loss.

  • It allows technicians to work through systems alphabetically, creating an orderly work log.

  • It spreads recovery resources evenly across all systems so every department is treated the same, regardless of impact.

  • It decides which backup media should be moved off-site after the recovery is finished.

Question 18 of 20

A programmer needs to create a reusable block of code within an object that calculates the total price of an order and provides the result to other parts of the application. Which of the following programming concepts should the programmer use?

  • Boolean

  • Constant

  • Array

  • Method

Question 19 of 20

In a company's database, you have been instructed to delete an entire table named 'EmployeeRecords' that is no longer needed. Which statement would you execute to accomplish this task?

  • DELETE FROM EmployeeRecords;

  • DROP TABLE EmployeeRecords;

  • REMOVE TABLE EmployeeRecords;

  • TRUNCATE TABLE EmployeeRecords;

Question 20 of 20

A user reports that a shared network printer, which was working yesterday, is no longer accessible. After identifying the problem, the technician's next step is to establish a theory of probable cause. Which of the following actions best represents this step?

  • Ask the user and check system logs for any recent changes, such as software updates or network modifications.

  • Establish a plan of action to replace the printer with a newer model.

  • Implement a solution by reinstalling the printer on the user's computer.

  • Verify full system functionality by sending a test print from another computer.