CompTIA Tech+ Practice Test (FC0-U71)
Use the form below to configure your CompTIA Tech+ Practice Test (FC0-U71). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Tech+ FC0-U71 (V6) Information
The CompTIA Tech+ Certification (formerly ITF+) is an entry-level certification designed to introduce individuals to the essential IT concepts and terminology. This certification is particularly suited for those who are new to the world of information technology and seeking to gain a basic understanding of IT. It covers a broad range of topics, including hardware, software, networking, cybersecurity, and basic IT literacy. This certification is ideal for individuals considering a career in IT, students in other fields who require a foundational understanding of IT, or professionals in other industries who want to gain a basic knowledge of IT to complement their primary skills.
Free CompTIA Tech+ FC0-U71 (V6) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 20
- Time: Unlimited
- Included Topics:IT Concepts and TerminologyInfrastructureApplications and SoftwareSoftware Development ConceptsData and Database FundamentalsSecurity
A company is looking to upgrade its wireless infrastructure to improve the network's speed and range within their office space. The current routers only support up to the 802.11g standard. Which wireless standard should they upgrade to for the best increase in speed and range considering modern devices?
Revert to 802.11b to improve compatibility with older devices.
Switch to 802.11a to prioritize range over speed.
Remain on 802.11g, as it is sufficient for most office applications.
Upgrade to 802.11ac for the best increase in speed and range.
Upgrade to 802.11n for a moderate increase in speed and range.
Answer Description
The 802.11ac standard is the most appropriate upgrade from 802.11g, as it provides significantly higher speeds and improved range. The 802.11ac operates on the 5GHz band, which has less interference compared to the 2.4GHz band used by 802.11g. The 802.11n standard also operates on 5GHz, providing better speed and range than 802.11g, but 802.11ac is superior to 802.11n in terms of overall performance. The 802.11a and 802.11b standards are outdated and would not offer the necessary improvements. The 802.11ax standard, also known as Wi-Fi 6, offers even better performance than 802.11ac but wasn't an option provided in the answer choices.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between 802.11ac and 802.11n?
Why does the 5GHz band have less interference compared to the 2.4GHz band?
What are the advantages of upgrading to 802.11ax (Wi-Fi 6) over 802.11ac?
Which process allows data to be stored in a smaller amount of space on a storage device?
Fragmentation
Decryption
Compression
Encryption
Answer Description
The correct answer is compression, which is a method used to reduce the size of files, making them occupy less space on a disk. This is particularly useful for saving storage space and can aid in quicker transmission of files. The other options, such as encryption, deal with securing data rather than reducing its size.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does compression reduce file size?
What is the difference between lossless and lossy compression?
How does compression impact file transmission over a network?
Which of the following best describes a workstation in a computing environment?
A portable device primarily used for communication and entertainment.
A device that controls and manages network traffic.
A machine that provides data and services to other computers over a network.
A high-performance computer designed for intensive tasks like graphic design and 3-D modeling.
Answer Description
A workstation is a powerful computer designed for technical or scientific applications. Workstations are typically used by one person at a time but are more powerful than a standard desktop computer, capable of handling complex tasks such as graphic design, 3-D modeling, and intensive computational processes. The incorrect options describe other types of computing devices, not a workstation. Mobile phones and tablets are portable devices with less computational power and are generally used for communication and entertainment, while servers are powerful machines that serve data to other computers on a network.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What makes a workstation different from a regular desktop computer?
What are common tasks performed on workstations?
What hardware typically defines a workstation?
In a project management application, each 'Project' object needs to have a unique code to identify it among others. Which aspect of the 'Project' object is best suited to store this unique identification code?
Array
Function
Attribute
Method
Answer Description
An attribute of an object is used to store data specific to that object. In this case, a unique code that identifies a project among others would be stored as an attribute of the 'Project' object. This would allow each 'Project' instance to have its own identification code. On the other hand, methods are used to define actions or behaviors of an object, not to store unique data.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an attribute in object-oriented programming?
How are methods different from attributes in object-oriented programming?
Why wouldn't a function, array, or method be suitable for storing unique object identifiers?
Which software is used for creating flowcharts, organizational charts, and other visual representations of processes or systems?
McAfee Antivirus
Adobe Photoshop
Microsoft Word
Lucidchart
Answer Description
Visual diagramming software is designed to help users create graphical representations of information. Lucidchart is an example of this type of software because it allows users to create a variety of diagrams, including flowcharts and organizational charts, which can be used for planning and illustrating processes or systems.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What features make Lucidchart suitable for creating flowcharts and diagrams?
Why is Adobe Photoshop not suitable for creating flowcharts or organizational charts?
What are some alternatives to Lucidchart for creating flowcharts and diagrams?
A team member at your company has just set up a new workstation. To follow security best practices, what should they do next to secure their system?
Schedule regular data backups to an external hard drive.
Configure the host firewall to manage incoming and outgoing network traffic.
Set a strong password for the user account on the workstation.
Organize the desktop icons for easier navigation.
Answer Description
Correctly setting up a strong password is essential to prevent unauthorized access to the device. Choosing a strong password will make it difficult for anyone other than the authorized user to gain access. The other options listed either do not directly contribute to securing the system (like organizing desktop icons), are too advanced for a typical user to do themselves (like configuring a host firewall), or are not immediately necessary after setting up a new workstation (like scheduling regular data backups, which is more about maintaining data availability).
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What makes a password 'strong' and secure?
Why isn't configuring a firewall the first step in securing a workstation?
When should regular data backups be prioritized in workstation setup?
A coworker emails you four attachments and asks you to review the one created in Microsoft Excel 2021. Based solely on the file extensions, which attachment should you open?
.xls
.csv
.ods
.xlsx
Answer Description
.xlsx is the default Office Open XML workbook format used by Microsoft Excel starting with Office 2007 and remains the standard in current versions. The .xls extension represents the older binary Excel format (Excel 97-2003), .csv is a plain-text comma-separated values file that many programs-including Excel-can open, and .ods belongs to the OpenDocument spreadsheet format used by LibreOffice and similar suites; none of these three identifies the modern native Excel workbook format.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the role of the .xlsx file extension in Microsoft Excel?
How does .xlsx differ from .xls?
What are some common alternatives to .xlsx for saving spreadsheets?
When you use a calculator to add two numbers together, the calculator performs a function. What is this function called in the context of computing?
Inputting
Outputting
Saving
Processing
Answer Description
In computing, the execution of such a function where data is manipulated to produce a result is known as processing. This is one of the basic operations a computer performs after receiving input (the numbers you want to add) before delivering an output (the sum of those numbers).
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does processing mean in computing?
What is the role of the CPU in processing?
How does processing differ from input or output in computing?
You plan to email a document containing personal data to a colleague by uploading it to a free cloud file-sharing service. Why is it important to evaluate the security of this method before sending the file?
To make sure the recipient can download the file faster than via email
To ensure the file cannot be viewed or modified by unauthorized users during storage or transfer
To verify that the service will compress the file, saving bandwidth and storage space
To confirm that the upload will not slow down your Internet connection
Answer Description
Using an unencrypted or unauthenticated file-sharing service means the document could be intercepted while in transit or accessed in the cloud by anyone who discovers the link or compromises the account. Preventing unauthorized disclosure protects confidentiality and helps you avoid identity theft, regulatory penalties, and reputational damage. Performance considerations such as speed or storage are secondary and do not address the core security risk, so those responses are incorrect.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are secure methods for file sharing over the internet?
What risks are associated with using untrusted file-sharing services?
How does encryption protect sensitive information during file sharing?
In a corporate setting, when an employee is unable to see if their colleagues are online or busy in their instant messaging software, what should they check first to resolve this issue?
Ensure that their workstation's operating system is updated to the latest version
Check if the email client is synchronized with the instant messaging software
See if the firewall is blocking the instant messaging application
Verify if the status visibility feature is enabled in the settings
Answer Description
In most instant messaging applications, the 'status visibility' or 'presence feature' controls whether you can see if your contacts are online, busy, or away. If an employee cannot see their colleagues' statuses, they should first check if this feature is enabled in their application settings. The other options provided do not primarily affect the visibility of user statuses in the context of instant messaging software.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the 'status visibility' or 'presence feature' in instant messaging?
How can users enable the 'status visibility' feature in instant messaging software?
Why wouldn’t factors like firewall settings or operating system updates affect status visibility in instant messaging?
Which of the following best describes the practice of password expiration?
Providing users a way to retrieve their password if they forget it
The method by which user passwords are stored in the system
Requiring users to change their passwords after a set amount of time
Giving users the option to keep passwords forever by setting them to never expire
Answer Description
Password expiration is the practice of setting a finite period after which a password must be changed. This is important to reduce the risk of a compromised password being used indefinitely by an unauthorized user. A 'Non-expiring password' is not recommended as it could potentially provide ongoing access if compromised. 'Password recovery' is a process to regain access when a password is forgotten, not a method of expiration. Lastly, 'Password storage' is about how passwords are kept, which is unrelated to how often they should be changed.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is password expiration important for security?
How does password expiration relate to password policies?
What is the risk of allowing non-expiring passwords?
Which of the following best describes the role of a service within an operating system?
A protocol that defines how data is transmitted over the internet
A graphical interface that allows users to interact with the system
A program that operates in the background to perform system tasks
A type of software that requires regular user input to function
Answer Description
A service within an operating system is a program that runs in the background and performs tasks that do not require user interaction. These tasks often include system operations and maintenance functions, which help ensure the operating system runs smoothly.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a service in the context of an operating system?
How does an operating system service differ from an application?
Can services in an operating system be manually managed?
What unit of measurement is used to describe the clock speed of a computer's central processing unit (CPU)?
KB
Gbps
GHz
RPM
Answer Description
The correct answer is GHz, which stands for gigahertz. It is the unit of frequency equivalent to one billion cycles per second and is commonly used to express the clock speed of CPUs. It indicates how many cycles a CPU can perform in a second, which relates to its overall performance. KB is a unit of storage capacity, not speed. Gbps measures data transfer rates for networks, not CPU speed. RPM is used for rotational speeds, such as in motors and hard disk drives, not for CPU clock speeds.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does GHz mean in the context of CPUs?
Why is GHz used for CPUs instead of other units like KB or Gbps?
Does a higher GHz always mean a faster CPU?
Which of the following statements best describes a key feature of compiled programming languages?
They require a web server to run the code effectively.
They convert source code into machine code for execution by the computer.
They work with specific types of hardware.
They execute code line-by-line during runtime, which allows for quick execution.
Answer Description
Compiled programming languages convert source code into machine code that the computer can execute, resulting in faster program performance compared to interpreted languages that run code line-by-line. This efficiency makes compiled languages suitable for performance-sensitive applications. The other options incorrectly describe other execution methods or limit capabilities inappropriately.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between compiled and interpreted programming languages?
Why are compiled languages better for performance-sensitive applications?
What happens during the compilation process?
Which of the following is the BEST example of a markup language used to structure and format content on webpages?
Cascading Style Sheets (CSS)
Hypertext Markup Language (HTML)
Java
eXtensible Markup Language (XML)
Answer Description
Hypertext Markup Language (HTML) is the correct answer because it is specifically designed to structure content on webpages using tags for headings, paragraphs, links, images, and more. XML is a flexible markup language intended primarily for storing and transporting data rather than rendering formatted web pages. CSS is a style sheet language that defines the presentation (layout, colors, fonts) of documents written in markup languages but is not itself a markup language. Java is a compiled, general-purpose programming language and is not used for markup or document structuring.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are HTML tags and how do they work?
How does XML differ from HTML?
Can CSS be used without HTML?
You are tasked to write a simple program that can automate everyday tasks on your computer. Which type of programming language would you most likely use to achieve this?
Query language
Assembly language
Compiled programming language
Scripting language
Answer Description
Scripting languages are typically used for writing programs to automate processes and tasks that would otherwise be executed manually one by one. Compared to compiled languages, scripting languages are generally more accessible to beginners and are executed at runtime, which can simplify and speed up the development of such automation scripts.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a scripting language?
How does a scripting language differ from a compiled language?
What are some examples of tasks typically automated with scripting languages?
While setting up secure access to a company's internal financial records, the security administrator decides to use a method that requires employees to present two forms of verification before they are granted access. Which of the following best describes this method?
Personality verification
Multifactor authentication
Single-factor authentication
Continuous authentication
Answer Description
Multifactor authentication requires two or more different forms of verification to authenticate the user. Having multiple factors enhances security by combining something the user knows, has, or is, making it much harder for unauthorized users to gain access. An example of this could be combining a password (something you know) with a fingerprint scan (something you are) or with a physical token (something you have). Single-factor authentication involves only one kind of credential, which is not as secure as multifactor. Personality verification isn't commonly recognized as a standard factor for secure authentication. Continuous authentication could involve multifactor methods but is specifically a process of ongoing authentication rather than being an authentication factor itself.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the three main categories of authentication factors?
Why is multifactor authentication more secure than single-factor authentication?
How does continuous authentication differ from multifactor authentication?
When defining an identifier in a programming language, which of the following best represents a rule generally applied across many programming languages?
Can contain spaces between words
Must start with a letter or an underscore
Can begin with a number
Allows special characters like @, $, % within the name
Answer Description
In many programming languages, identifiers, which include variable and function names, must start with a letter or an underscore. They cannot begin with a number, and though they can contain numbers, the first character must not be a number. Additionally, spaces are not allowed in identifiers; instead, underscores are often used to separate words.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why can't identifiers start with a number?
Why are spaces not allowed in identifiers?
What happens if special characters are used in identifiers?
What is a software component that helps the operating system communicate with hardware devices?
Service
Utility
Process
Driver
Answer Description
The correct answer is a driver, which is a specialized program that facilitates communication between the operating system and hardware devices. Without drivers, the OS wouldn't be able to control hardware components effectively. Other options, such as utilities and services, play different roles in system management but do not directly serve as a bridge between the OS and hardware.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the role of a driver in a computer system?
How do drivers differ from services in an operating system?
What happens if the correct driver is not installed for a hardware device?
What type of security threat involves an attacker secretly relaying and possibly altering the communication between two parties who believe they are directly communicating with each other?
Replay attack
Phishing attack
Spoofing attack
Man-in-the-middle attack
Answer Description
A man-in-the-middle attack occurs when an attacker inserts themselves in the communication pathway between two parties without their knowledge. This allows the attacker to intercept, send, and receive data meant for someone else, thus compromising the integrity of the data being exchanged. It is crucial to identify this type of attack to take preventive measures and secure communication channels.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does encryption help prevent man-in-the-middle attacks?
What are some common indicators of a man-in-the-middle attack?
What is the difference between a man-in-the-middle attack and a replay attack?
Cool beans!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.