00:20:00

CompTIA Tech+ Practice Test (FC0-U71)

Use the form below to configure your CompTIA Tech+ Practice Test (FC0-U71). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Tech+ FC0-U71 (V6)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Tech+ FC0-U71 (V6) Information

The CompTIA Tech+ Certification (formerly ITF+) is an entry-level certification designed to introduce individuals to the essential IT concepts and terminology. This certification is particularly suited for those who are new to the world of information technology and seeking to gain a basic understanding of IT. It covers a broad range of topics, including hardware, software, networking, cybersecurity, and basic IT literacy. This certification is ideal for individuals considering a career in IT, students in other fields who require a foundational understanding of IT, or professionals in other industries who want to gain a basic knowledge of IT to complement their primary skills.

Free CompTIA Tech+ FC0-U71 (V6) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 20
  • Time: Unlimited
  • Included Topics:
    IT Concepts and Terminology
    Infrastructure
    Applications and Software
    Software Development Concepts
    Data and Database Fundamentals
    Security
Question 1 of 20

A company is looking to upgrade its wireless infrastructure to improve the network's speed and range within their office space. The current routers only support up to the 802.11g standard. Which wireless standard should they upgrade to for the best increase in speed and range considering modern devices?

  • Revert to 802.11b to improve compatibility with older devices.

  • Switch to 802.11a to prioritize range over speed.

  • Remain on 802.11g, as it is sufficient for most office applications.

  • Upgrade to 802.11ac for the best increase in speed and range.

  • Upgrade to 802.11n for a moderate increase in speed and range.

Question 2 of 20

Which process allows data to be stored in a smaller amount of space on a storage device?

  • Fragmentation

  • Decryption

  • Compression

  • Encryption

Question 3 of 20

Which of the following best describes a workstation in a computing environment?

  • A portable device primarily used for communication and entertainment.

  • A device that controls and manages network traffic.

  • A machine that provides data and services to other computers over a network.

  • A high-performance computer designed for intensive tasks like graphic design and 3-D modeling.

Question 4 of 20

In a project management application, each 'Project' object needs to have a unique code to identify it among others. Which aspect of the 'Project' object is best suited to store this unique identification code?

  • Array

  • Function

  • Attribute

  • Method

Question 5 of 20

Which software is used for creating flowcharts, organizational charts, and other visual representations of processes or systems?

  • McAfee Antivirus

  • Adobe Photoshop

  • Microsoft Word

  • Lucidchart

Question 6 of 20

A team member at your company has just set up a new workstation. To follow security best practices, what should they do next to secure their system?

  • Schedule regular data backups to an external hard drive.

  • Configure the host firewall to manage incoming and outgoing network traffic.

  • Set a strong password for the user account on the workstation.

  • Organize the desktop icons for easier navigation.

Question 7 of 20

A coworker emails you four attachments and asks you to review the one created in Microsoft Excel 2021. Based solely on the file extensions, which attachment should you open?

  • .xls

  • .csv

  • .ods

  • .xlsx

Question 8 of 20

When you use a calculator to add two numbers together, the calculator performs a function. What is this function called in the context of computing?

  • Inputting

  • Outputting

  • Saving

  • Processing

Question 9 of 20

You plan to email a document containing personal data to a colleague by uploading it to a free cloud file-sharing service. Why is it important to evaluate the security of this method before sending the file?

  • To make sure the recipient can download the file faster than via email

  • To ensure the file cannot be viewed or modified by unauthorized users during storage or transfer

  • To verify that the service will compress the file, saving bandwidth and storage space

  • To confirm that the upload will not slow down your Internet connection

Question 10 of 20

In a corporate setting, when an employee is unable to see if their colleagues are online or busy in their instant messaging software, what should they check first to resolve this issue?

  • Ensure that their workstation's operating system is updated to the latest version

  • Check if the email client is synchronized with the instant messaging software

  • See if the firewall is blocking the instant messaging application

  • Verify if the status visibility feature is enabled in the settings

Question 11 of 20

Which of the following best describes the practice of password expiration?

  • Providing users a way to retrieve their password if they forget it

  • The method by which user passwords are stored in the system

  • Requiring users to change their passwords after a set amount of time

  • Giving users the option to keep passwords forever by setting them to never expire

Question 12 of 20

Which of the following best describes the role of a service within an operating system?

  • A protocol that defines how data is transmitted over the internet

  • A graphical interface that allows users to interact with the system

  • A program that operates in the background to perform system tasks

  • A type of software that requires regular user input to function

Question 13 of 20

What unit of measurement is used to describe the clock speed of a computer's central processing unit (CPU)?

  • KB

  • Gbps

  • GHz

  • RPM

Question 14 of 20

Which of the following statements best describes a key feature of compiled programming languages?

  • They require a web server to run the code effectively.

  • They convert source code into machine code for execution by the computer.

  • They work with specific types of hardware.

  • They execute code line-by-line during runtime, which allows for quick execution.

Question 15 of 20

Which of the following is the BEST example of a markup language used to structure and format content on webpages?

  • Cascading Style Sheets (CSS)

  • Hypertext Markup Language (HTML)

  • Java

  • eXtensible Markup Language (XML)

Question 16 of 20

You are tasked to write a simple program that can automate everyday tasks on your computer. Which type of programming language would you most likely use to achieve this?

  • Query language

  • Assembly language

  • Compiled programming language

  • Scripting language

Question 17 of 20

While setting up secure access to a company's internal financial records, the security administrator decides to use a method that requires employees to present two forms of verification before they are granted access. Which of the following best describes this method?

  • Personality verification

  • Multifactor authentication

  • Single-factor authentication

  • Continuous authentication

Question 18 of 20

When defining an identifier in a programming language, which of the following best represents a rule generally applied across many programming languages?

  • Can contain spaces between words

  • Must start with a letter or an underscore

  • Can begin with a number

  • Allows special characters like @, $, % within the name

Question 19 of 20

What is a software component that helps the operating system communicate with hardware devices?

  • Service

  • Utility

  • Process

  • Driver

Question 20 of 20

What type of security threat involves an attacker secretly relaying and possibly altering the communication between two parties who believe they are directly communicating with each other?

  • Replay attack

  • Phishing attack

  • Spoofing attack

  • Man-in-the-middle attack