00:15:00

CompTIA Tech+ Practice Test (FC0-U71)

Use the form below to configure your CompTIA Tech+ Practice Test (FC0-U71). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Tech+ FC0-U71
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Tech+ FC0-U71 Information

The CompTIA Tech+ Certification (formerly ITF+) is an entry-level certification designed to introduce individuals to the essential IT concepts and terminology. This certification is particularly suited for those who are new to the world of information technology and seeking to gain a basic understanding of IT. It covers a broad range of topics, including hardware, software, networking, cybersecurity, and basic IT literacy. This certification is ideal for individuals considering a career in IT, students in other fields who require a foundational understanding of IT, or professionals in other industries who want to gain a basic knowledge of IT to complement their primary skills.

Free CompTIA Tech+ FC0-U71 Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    IT Concepts and Terminology
    Infrastructure
    Applications and Software
    Software Development Concepts
    Data and Database Fundamentals
    Security
Question 1 of 15

A device connected to a network via an Ethernet cable requires a wireless NIC to communicate with other devices on the network.

  • You selected this option

    True

  • You selected this option

    False

Question 2 of 15

What is the primary purpose of implementing rule-based access controls in a company's IT system?

  • You selected this option

    To track and record the digital footprints of users across the system

  • You selected this option

    To authenticate users through various factors like fingerprints or PIN codes

  • You selected this option

    To allow all users unrestricted access to every system resource

  • You selected this option

    To automatically decide whether access is allowed based on a set of predefined rules

Question 3 of 15

What should you do to protect your personal information when using social networking platforms?

  • You selected this option

    Share your profile with everyone to gain more followers.

  • You selected this option

    Post personal details as it increases online engagement.

  • You selected this option

    Avoid using password or authentication features to simplify access.

  • You selected this option

    Make your profile private and limit post sharing to friends or trusted contacts.

Question 4 of 15

A company has two tables in their database: 'Employees' and 'Departments'. Each employee is assigned to one department. To ensure that the 'Employees' table references the correct department data, what kind of special field should be included in the 'Employees' table?

  • You selected this option

    A unique key in the 'Employees' table for each department

  • You selected this option

    A foreign key that references the 'Departments' primary key

  • You selected this option

    An additional primary key in the 'Employees' table for department data

  • You selected this option

    A composite key made from combining employee and department data

Question 5 of 15

What is the role of methods in programming?

  • You selected this option

    They are used to store pieces of data for an object in object-oriented programming.

  • You selected this option

    They provide the main structure and definition for objects in object-oriented programming.

  • You selected this option

    They are commands used to manipulate the user interface of an application.

  • You selected this option

    They define a set of instructions that perform a specific task when called upon in a program.

Question 6 of 15

In a corporate environment, specific guidelines stipulate that only employees from a designated department are allowed to access sensitive employee records, while the general workforce should have permissions to view standard operational procedures. How should the access controls be configured to align with this policy?

  • You selected this option

    Apply a blanket policy that requires two-factor authentication for any document access, regardless of document type or employee role

  • You selected this option

    Implement access rules segregating permission to view sensitive documents based on departmental association, while granting universal access to operational guidelines

  • You selected this option

    Allow complete access to all documents for every employee to ensure maximum availability

  • You selected this option

    Restrict all document access to top management only, with no access for regular employees

Question 7 of 15

In a corporate setting, when an employee is unable to see if their colleagues are online or busy in their instant messaging software, what should they check first to resolve this issue?

  • You selected this option

    See if the firewall is blocking the instant messaging application

  • You selected this option

    Check if the email client is synchronized with the instant messaging software

  • You selected this option

    Ensure that their workstation's operating system is updated to the latest version

  • You selected this option

    Verify if the status visibility feature is enabled in the settings

Question 8 of 15

Which language would you typically utilize to enhance a web page with interactive elements such as dynamic content updates, form validation, and animated graphics?

  • You selected this option

    JavaScript

  • You selected this option

    PHP

  • You selected this option

    Perl

  • You selected this option

    CSS

Question 9 of 15

What type of security threat involves an attacker secretly relaying and possibly altering the communication between two parties who believe they are directly communicating with each other?

  • You selected this option

    Phishing attack

  • You selected this option

    Man-in-the-middle attack

  • You selected this option

    Replay attack

  • You selected this option

    Spoofing attack

Question 10 of 15

An office manager is tasked with setting up a new wireless network for the company. The manager wants to ensure the network is secured against unauthorized access while maintaining a high level of performance. Which encryption standard should be used for the office's Wi-Fi network?

  • You selected this option

    Open network

  • You selected this option

    WPA2

  • You selected this option

    WPA

  • You selected this option

    WEP

Question 11 of 15

A graphic designer needs a computer that can handle demanding visual applications and tasks with significant processing power. Which type of computer would be the most suitable for this role?

  • You selected this option

    Gaming laptop

  • You selected this option

    Tablet

  • You selected this option

    Desktop computer

  • You selected this option

    Workstation

Question 12 of 15

Which data representation format would be used to encode the text characters into a document, ensuring that characters from multiple languages can be used, including those beyond the basic Latin alphabet?

  • You selected this option

    Binary

  • You selected this option

    ASCII

  • You selected this option

    Unicode

  • You selected this option

    Hexadecimal

Question 13 of 15

Which of the following best describes the capabilities of a vector in a programming environment?

  • You selected this option

    Dynamically resizes to accommodate new elements

  • You selected this option

    Allows only sequential access to its elements

  • You selected this option

    Stores elements based on a key and allows for element retrieval by key

  • You selected this option

    Has a fixed capacity that cannot be exceeded

Question 14 of 15

A team is evaluating different data storage options for a project that will require holding a significant amount of information. Which unit of measure would be most appropriate for assessing larger data volume requirements?

  • You selected this option

    Kilobytes (KB)

  • You selected this option

    Terabytes (TB)

  • You selected this option

    Gigabytes (GB)

  • You selected this option

    Megabytes (MB)

Question 15 of 15

Which type of cable should be used to connect a monitor to a PC for a high-definition video but without audio?

  • You selected this option

    VGA

  • You selected this option

    Thunderbolt

  • You selected this option

    DVI

  • You selected this option

    HDMI

  • You selected this option

    DisplayPort