00:15:00

Free CompTIA Tech+ FC0-U71 Practice Test

Prepare for the CompTIA Tech+ FC0-U71 exam with this free practice test. Randomly generated and customizable, this test allows you to choose the number of questions.

  • Questions: 15
  • Time: 15 minutes (60 seconds per question)
  • Included Objectives:
    • IT Concepts and Terminology
    • Infrastructure
    • Applications and Software
    • Software Development Concepts
    • Data and Database Fundamentals
    • Security
Question 1 of 15

Which of the following is an example of an interpreted language typically used for creating web pages by defining the structure and presentation of textual information?

  • C++

  • HTML

  • Python

  • PHP

Question 2 of 15

The content in RAM can be read faster than from a solid-state drive.

  • False

  • True

Question 3 of 15

When discussing sensitive company information over instant messaging, which practice should you follow to ensure the conversation remains confidential?

  • Discuss sensitive information openly since all instant messaging is secure

  • Prefer communicating sensitive information via personal email to avoid company surveillance

  • Write the information on paper and deliver it instead of using instant messaging

  • Use a company-approved instant messaging platform with encryption

Question 4 of 15

A company's policy requires that all workstations have a full backup of their operating system once a month. As an IT support technician, you are evaluating a backup plan to ensure that in the event of a system crash, the workstation can be restored to its last operational state with minimal data loss. Which of the following is the most important step to ensure adherence to the company’s backup policy?

  • Manually start the backup process at the end of every week.

  • Reinstall the operating system bi-monthly as a precaution.

  • Check that there is enough available storage space on the server every day.

  • Create a schedule for automatic backups to be performed monthly.

Question 5 of 15

What is the purpose of a query/report builder in a database?

  • To increase the storage capacity of the database

  • To slow down the access to data for larger databases

  • To encrypt the data in the database for security purposes

  • To provide a graphical interface for users to generate specific views or reports from the data without writing code

Question 6 of 15

A retail company wants to improve its sales strategy by making decisions based on information rather than gut feeling. What should the company focus on to best achieve this goal?

  • Collecting feedback without analyzing it.

  • Tracking customer purchases to identify trends.

  • Relying on previous sales data without updates.

  • Selecting popular items based on employee opinions.

Question 7 of 15

Using the drop statement on a table in a database would remove the table and all of its data indefinitely.

  • True

  • False

Question 8 of 15

When accessing a corporate network, which practice is MOST appropriate to ensure the confidentiality of sensitive company information?

  • Avoiding clicking on any suspicious links

  • Changing passwords every week

  • Reporting lost or stolen devices immediately

  • Using a VPN when accessing the network remotely

  • Logging off the network when not in use

Question 9 of 15

When configuring a new email client, which protocol should be used if the user needs to continuously sync and access email messages from multiple devices?

  • HTTP/S

  • POP3

  • SMTP

  • IMAP

Question 10 of 15

Scripting languages typically require an explicit compilation step before they can be executed on a computer.

  • True

  • False

Question 11 of 15

What type of software generally requires a licensing agreement that may restrict modifications and redistribution of its source code?

  • Proprietary software

  • Freeware

  • Open source software

  • Shareware

Question 12 of 15

A function in programming can execute a set of instructions multiple times when called within a program.

  • True

  • False

Question 13 of 15

While reviewing security policies, a company's IT administrator realizes that they need to improve the way they protect confidential emails being sent outside the organization. What method should the administrator recommend to ensure both the confidentiality and integrity of the emails?

  • Restrict email communications to internal servers only, barring all external communication.

  • Schedule regular data backups of all email correspondence.

  • Enforce a policy of two-factor authentication for email account access.

  • Implement email encryption and require digital signatures.

Question 14 of 15

Which type of programming language requires a specific type of assembler to convert its instructions into machine code for execution on a particular type of CPU?

  • Interpreted language

  • High-level programming language

  • Assembly language

  • Query language

Question 15 of 15

Which action is directly influenced by configuring permissions in a database system?

  • Ensuring that a table can only store data of a specific format

  • Upgrading the database management system software to a newer version

  • Reducing network latency when querying the database

  • Automatically backing up the database at regular intervals

  • Determining whether a user can view specific data within a table

  • Expanding the storage capacity available to the database