CompTIA Tech+ Practice Test (FC0-U71)
Use the form below to configure your CompTIA Tech+ Practice Test (FC0-U71). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Tech+ FC0-U71 (V6) Information
The CompTIA Tech+ Certification (formerly ITF+) is an entry-level certification designed to introduce individuals to the essential IT concepts and terminology. This certification is particularly suited for those who are new to the world of information technology and seeking to gain a basic understanding of IT. It covers a broad range of topics, including hardware, software, networking, cybersecurity, and basic IT literacy. This certification is ideal for individuals considering a career in IT, students in other fields who require a foundational understanding of IT, or professionals in other industries who want to gain a basic knowledge of IT to complement their primary skills.

Free CompTIA Tech+ FC0-U71 (V6) Practice Test
- 20 Questions
- Unlimited
- IT Concepts and TerminologyInfrastructureApplications and SoftwareSoftware Development ConceptsData and Database FundamentalsSecurity
A user has just physically connected a new external webcam to their laptop. What is the BEST next step to ensure the device will function correctly with all of its intended features?
Install or verify the latest drivers from the webcam manufacturer.
Clean the webcam lens to improve image quality.
Adjust the camera's angle to capture the desired view.
Select the new webcam as the video source in a conferencing application.
Answer Description
The best next step is to install or verify the latest drivers from the webcam manufacturer. While modern operating systems often install generic Plug-and-Play drivers automatically, these may not support all of the device's specific features. Installing the manufacturer's official drivers ensures the webcam is fully functional as advertised. Selecting the webcam in an application is a necessary step, but it can only be done after the system properly recognizes the device via its drivers. Adjusting the camera's angle and cleaning the lens are usability and maintenance tasks performed after the webcam is confirmed to be working.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why are drivers necessary for devices like webcams?
How can you verify if the correct drivers for a webcam are installed?
What should you do if the drivers for a webcam are outdated or unavailable?
A technician needs to send a new employee's contract, which contains Personally Identifiable Information (PII), to the HR department via email. Which of the following is the BEST method to ensure the confidentiality of this sensitive data during transit?
Encrypt the email before sending it.
Save the contract on a public file-sharing site and email the link.
Include all the sensitive details directly in the email's subject line for clarity.
Send the contract as a password-protected file attachment.
Answer Description
Using encryption is the best practice for securing sensitive email content during transit. Encryption transforms the message into a format that is unreadable to unauthorized parties who might intercept it. While sending a password-protected file is a form of protection, encrypting the entire email provides a more comprehensive security layer. Sending information in plain text or including it in the subject line are insecure practices that expose sensitive data to risk.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is email encryption?
How does encryption ensure data confidentiality?
What risks are associated with sending plain text emails containing sensitive information?
You are working in an office and have been asked to digitize a stack of documents. In this scenario, which sequence of computing steps correctly defines how a computer processes these documents into electronic files?
Storage → Output → Processing → Input
Output → Storage → Input → Processing
Input → Processing → Output → Storage
Processing → Input → Storage → Output
Answer Description
A computer follows a sequence of input, processing, output, and storage when handling data. First, the scanner captures the image of the document (input). Then, the computer converts this raw data into a format that is usable, such as a PDF or JPEG file (processing). Following this, the electronic file is displayed on the monitor (output), and lastly, it is saved onto a hard drive for future access (storage).
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'Input' mean in the context of computing steps?
What happens during the 'Processing' step of computing?
Why is 'Output' important before moving to 'Storage' in computing steps?
A group of employees needs to update a project document while sharing feedback instantly during a meeting. Which software would most effectively support their requirements?
Spreadsheet software
Collaboration software
Presentation software
Document viewer software
Answer Description
The right software enables simultaneous updates and real-time communication, which is crucial for teamwork and immediate feedback. Tools dedicated to sharing documents and facilitating discussions, known as collaboration software, provide a more integrated solution than standard document creation software that may lack these interactive features. Other options like spreadsheet or presentation software have specific functions and do not primarily focus on team input and interaction during document updating.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What features make collaboration software suitable for real-time teamwork?
How does collaboration software differ from document viewer software?
Can spreadsheet or presentation software be used for collaboration? Why are they less effective in this context?
What term describes the characteristic of a database to retain data over time, even when the power is turned off or the system is restarted?
Data volatility
Data redundancy
Data persistence
Data transience
Answer Description
The correct answer is 'Data persistence'. Data persistence refers to the characteristic of databases to save data in a way that it is preserved over time, despite events like power outages or system restarts. Without data persistence, information would be lost when the database is closed, which would defeat the purpose of long-term data storage. 'Data redundancy' refers to having the same piece of data stored in two or more places, which can be a part of backup strategies but is not the same as persistence. 'Data transience' and 'Data volatility' are not standard terms related to the long-term retention of data in databases.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does a database ensure data persistence?
What is the difference between data persistence and data redundancy?
What situations might compromise data persistence in a database?
A technician receives a task to convert the hexadecimal number '1F' to its equivalent in binary. Given that each hexadecimal digit represents four binary digits, which binary number is the correct representation?
00011111
00111111
10111111
10011111
Answer Description
Hexadecimal digits can be directly converted to binary four-digit groupings. '1' in hexadecimal converts to '0001' in binary, and 'F' converts to '1111'. When combined, the binary representation of the hexadecimal '1F' is '00011111'.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is hexadecimal and how is it different from binary?
Why does each hexadecimal digit represent four binary digits?
How do you manually convert hexadecimal to binary?
A company's data center has a critical server that must remain operational at all times. Which of the following solutions should the company implement to ensure that the server remains available during an unexpected power outage?
Additional cooling systems
Uninterruptible power supply (UPS)
Cloud storage subscription
Surge protector
Answer Description
An uninterruptible power supply (UPS) is designed to provide emergency battery power when the main power source fails. A UPS can keep a server running through brief outages and gives administrators time to shut the system down properly if the blackout lasts longer. A surge protector only shields equipment from voltage spikes and does not supply electricity. Cloud storage preserves copies of data but cannot power on-premises equipment. Additional cooling systems help regulate temperature but do nothing to maintain electrical availability during a power loss.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does a UPS ensure continuity during power outages?
What are the key differences between a UPS and a surge protector?
Why is cloud storage not a substitute for a UPS in this scenario?
In a database, what best describes a record?
Comprehensive data types encompassing a single entry
A single, uniquely identifiable entry containing one or more values
All the data stored within a database
A placeholder for future data within a table
Answer Description
A record in a database represents a single, uniquely identifiable entry that can contain one or more values in fields. It is equivalent to a row in a table within a relational database. Option 'Comprehensive data types encompassing a single entry' is incorrect because it does not accurately represent the idea of a record, which is an entry, not a data type. 'A placeholder for future data' is also incorrect as records contain actual data, not placeholders. 'All data within a database' is not correct because a record is just one entry among potentially many within a database.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between a record and a field in a database?
How do records and tables relate to each other in a relational database?
Why is a record uniquely identifiable in a database?
Your company is seeking to improve employee experience by reducing the number of times users need to authenticate when accessing various internal services throughout the day. Which feature would be most effective to implement while considering access control best practices?
Single Sign-On (SSO) feature
Kerberos authentication
Lightweight Directory Access Protocol (LDAP) implementation
Password manager integration
Answer Description
Single Sign-On (SSO) allows users to authenticate once and gain access to multiple services without needing to log in repeatedly. This increases productivity and user satisfaction by streamlining access to authorized resources. LDAP, while used for managing user information, is not specifically a single login solution. Kerberos is a network authentication protocol designed to provide strong authentication for client/server applications but does not, by itself, provide the full SSO user experience. A password manager assists in creating and storing strong passwords but does not enable unified access to multiple services with a single authentication event like SSO does.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Single Sign-On (SSO)?
How does Kerberos provide authentication, and why isn’t it considered full SSO?
What is LDAP, and how does it differ from SSO?
During a basic PC orientation, a technician tells a trainee to choose the peripheral that allows users to type commands and text into the computer. Which of the following devices is classified as an input device?
Speaker
Monitor
Keyboard
Printer
Answer Description
Input devices provide data and control signals to the computer. A keyboard fits this definition because pressing its keys sends alphanumeric data to the system. By contrast, a monitor displays visual output, a speaker produces audio output, and a printer generates printed output, so none of those devices serve as input in this context.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are other examples of input devices besides a keyboard?
How does an input device differ from an output device?
Can a device be both an input and an output device?
What is the primary function of permissions in file management?
To control user access to files and directories
To define the type of file based on its extension
To determine the location where files are stored
To secure files from being viewed
Answer Description
Permissions control who can read, write, or execute a file. They are important as they help protect sensitive information and ensure that only authorized users can make changes. On the other hand, options like 'location storage' do not influence user access, while' encryption' pertains to securing data rather than managing access. 'File extension' denotes the type of file rather than permissions associated with it.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the different types of permissions in file management?
How are file permissions managed in Linux?
What is the difference between encryption and permissions?
An IT professional is setting up a new server that will run an open-source operating system. The server needs a robust file system capable of handling large files and large volumes of small files while providing journaling capabilities to maintain data integrity. Which file system should the IT professional consider using?
Ext4
NTFS
FAT32
Ext3
Answer Description
Ext4 is the correct answer because it is designed for Linux systems and provides large file and volume support, as well as journaling capabilities, which help protect the data against power outages and system crashes by keeping a record of changes not yet committed to the file system. Although NTFS also provides journaling and can support large files, it is primarily used with Windows operating systems. FAT32 is an older file system without journaling capability and it has a maximum file size limit of 4GB, which makes it unsuitable for handling very large files. Ext3 would be a viable alternative but does not support larger volumes and files as efficiently as Ext4.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does journaling in a file system mean?
How does Ext4 support large files and volumes compared to Ext3?
Why is FAT32 unsuitable for modern server environments?
As an IT support specialist, you've been tasked with securing company workstations. Which of the following actions would MOST effectively improve the security posture of the workstations?
Install anti-malware software but avoid frequent updates to reduce network bandwidth usage.
Frequently perform factory resets on the devices to ensure a clean state.
Change the devices' names on the network every week.
Regularly apply patching and updates to software on the devices.
Answer Description
Ensuring patching and updates are regularly applied is critical for maintaining the security of a system, as it closes vulnerabilities that could be exploited by attackers. Keeping software up to date includes installing security patches that software developers release to fix security holes in their programs. Anti-malware software protects against malicious software but relies on up-to-date virus definitions, which come from updates. Changing device names, while a part of disguising system information from potential attackers, offers less impact on security than patching does. Factory resetting devices frequently is impractical and disruptive to productivity, and while it would remove any compromised systems, it would not prevent new exploits.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why are software patching and updates so critical for security?
How does anti-malware software improve workstation security?
What are the drawbacks of frequent factory resets on workstations?
As an IT administrator, you notice that unauthorized changes have been made to several important company files. To identify the party responsible for these changes, which practice would be the most effective?
Performing regular system audits
Maintaining and reviewing logs
Enforcing frequent password changes for all user accounts
Restoring the files from the most recent backup
Implementing stricter firewall rules
Answer Description
Maintaining and reviewing logs is the correct answer because logs track user activity, changes made to files, and system events. This information can be used to pinpoint when the unauthorized changes were made and by which user account, facilitating a proper investigation of the incident. It is an essential part of IT security to ensure accountability. Regular audits would involve reviewing such logs but they are not as direct in addressing the specific incident. Password changes, while important for security, would not directly reveal who made the file changes. Firewalls and backup restorations do not provide information about specific user activities.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What types of information can logs provide?
How often should logs be reviewed, and why?
How are logs stored and protected from tampering?
A programmer is writing a script and needs to store a single letter of the alphabet in a variable. Which of the following fundamental data types is the most appropriate for this task?
Integer
String
Float
Char
Answer Description
The correct answer is 'Char'. The 'Char' data type is specifically designed to store a single character, such as a letter or symbol. 'String' is used for a sequence of characters. 'Integer' and 'Float' are numeric types for whole numbers and decimal numbers, respectively, and are not suitable for storing a character.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the main purpose of the 'char' data type?
How is 'char' different from a 'string' data type?
In what situations would you use a 'char' instead of a 'string'?
In a company's payroll system, an employee's name is stored as 'John Smith'. Which data type best describes this kind of information?
Boolean
Integers
Char
String
Answer Description
The data type that best describes a sequence of characters, such as 'John Smith', is a String. Strings are used to represent and work with text. A Char represents a single character, while Types Integers and Floats are used to store numerical data, and a Boolean represents true or false values, none of which are suitable for representing a full name.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between a String and a Char?
How are Integers and Strings different in programming?
Why isn’t a Boolean suitable for storing a name in a payroll system?
During disaster recovery, an organization may have limited staff, equipment, and time to bring systems back online. Why is it essential to establish restoration priorities before beginning recovery activities?
It ensures the most business-critical services and data are restored first, minimizing downtime and revenue loss.
It allows technicians to work through systems alphabetically, creating an orderly work log.
It spreads recovery resources evenly across all systems so every department is treated the same, regardless of impact.
It decides which backup media should be moved off-site after the recovery is finished.
Answer Description
Prioritization is based on the business impact analysis and identifies which systems and data are most critical for keeping the organization operational. By restoring these high-priority services first, the business can resume essential functions quickly, meet recovery-time objectives, and reduce financial and operational losses. Tasks or resources that do not directly support critical functions can be addressed later once core services are running.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a business impact analysis (BIA)?
What are recovery time objectives (RTOs) and why are they important?
How do organizations decide which systems are most business-critical?
A programmer needs to create a reusable block of code within an object that calculates the total price of an order and provides the result to other parts of the application. Which of the following programming concepts should the programmer use?
Boolean
Constant
Array
Method
Answer Description
The correct choice is a method. In object-oriented programming, a method is a procedure or function associated with an object that can perform actions and/or calculate and return data. In this scenario, the code block calculates and returns a value, which is a primary use case for a method. A constant is a value that cannot be altered, a Boolean is a data type with only two possible values (true or false), and an array is a data structure used to store a collection of items.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a method in object-oriented programming?
How does a method differ from a constant in programming?
When should an array be used instead of a method?
In a company's database, you have been instructed to delete an entire table named 'EmployeeRecords' that is no longer needed. Which statement would you execute to accomplish this task?
DELETE FROM EmployeeRecords;
DROP TABLE EmployeeRecords;
REMOVE TABLE EmployeeRecords;
TRUNCATE TABLE EmployeeRecords;
Answer Description
The correct answer, DROP TABLE EmployeeRecords;, is the standard SQL command to delete an entire table from a database. The command removes the table and its data, so it should be used with caution. The incorrect answers involve either syntax errors, incorrect commands, or operations that perform actions other than deleting an entire table. DELETE FROM EmployeeRecords; would remove all the data in the table but not the table itself. REMOVE TABLE EmployeeRecords; is not a valid SQL command. TRUNCATE TABLE EmployeeRecords; would delete all the data in the table, but the table structure would remain.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between DROP and DELETE in SQL?
What happens if you execute TRUNCATE instead of DROP?
Is REMOVE TABLE valid in SQL?
A user reports that a shared network printer, which was working yesterday, is no longer accessible. After identifying the problem, the technician's next step is to establish a theory of probable cause. Which of the following actions best represents this step?
Ask the user and check system logs for any recent changes, such as software updates or network modifications.
Establish a plan of action to replace the printer with a newer model.
Implement a solution by reinstalling the printer on the user's computer.
Verify full system functionality by sending a test print from another computer.
Answer Description
According to the CompTIA troubleshooting methodology, after identifying a problem, the next step is to establish a theory of probable cause. A key technique for this step is to determine what has recently changed in the environment. Asking the user and checking logs for updates or modifications is a direct action to gather information to form a theory. The other options represent later stages of the troubleshooting process, such as implementing a solution, verifying functionality, or establishing a plan of action.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are printer drivers and why are they important?
How do I check if the printer driver needs an update?
What should I do if updating the printer driver doesn’t solve the issue?
Gnarly!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.