CompTIA Tech+ Practice Test (FC0-U71)
Use the form below to configure your CompTIA Tech+ Practice Test (FC0-U71). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Tech+ FC0-U71 (V6) Information
The CompTIA Tech+ Certification (formerly ITF+) is an entry-level certification designed to introduce individuals to the essential IT concepts and terminology. This certification is particularly suited for those who are new to the world of information technology and seeking to gain a basic understanding of IT. It covers a broad range of topics, including hardware, software, networking, cybersecurity, and basic IT literacy. This certification is ideal for individuals considering a career in IT, students in other fields who require a foundational understanding of IT, or professionals in other industries who want to gain a basic knowledge of IT to complement their primary skills.

Free CompTIA Tech+ FC0-U71 (V6) Practice Test
- 20 Questions
- Unlimited time
- IT Concepts and TerminologyInfrastructureApplications and SoftwareSoftware Development ConceptsData and Database FundamentalsSecurity
You are performing a routine clean-up on your computer. Which of the following is the BEST method to remove unwanted software so it no longer occupies disk space or loads at startup?
Defragmenting the hard drive
Deleting the program's desktop shortcut
Using the operating system's uninstall feature
Rebooting the computer
Answer Description
Using the operating system's uninstall tool (such as Apps & Features or Programs and Features in Windows) launches the software's own uninstaller and deregisters it from the system. This process removes the program's executable files and related registry entries, freeing disk space and preventing the application from loading automatically. Simply rebooting the computer, deleting a desktop shortcut, or defragmenting the hard drive does not remove the underlying program, so the software would still remain on the drive and could continue consuming resources.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is using the operating system's uninstall feature better than manually deleting files?
What are residual files and why are they problematic?
Does defragmenting the hard drive improve software removal?
At the BlueTech company, an employee named Maya is assigned the role of 'Marketing Analyst.' Which of the following best describes how the system should enforce Maya's access to the company's digital marketing platform?
Granting unrestricted access to all features of the platform because she might need them in the future
Setting custom user settings for Maya's user account based on her personal preferences
Using role-based access control to provide specific permissions associated with the 'Marketing Analyst' role
Applying least privilege model by manually adjusting permissions for each task she needs to perform
Answer Description
Role-based access control is correct because it links access permissions to the employee's role within the organization. In this case, as a 'Marketing Analyst,' Maya would have access rights specific to her role, which enables her to perform her job functions. Least privilege model is incorrect as it is a principle and not a method. Custom user settings refer to individual settings tailored for a user and are not based on roles. Unrestricted access would grant Maya more permissions than necessary, violating security best practices.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is role-based access control (RBAC)?
Why is the least privilege model not the same as RBAC?
What is the risk of granting unrestricted access to a system?
A technician is debugging a piece of software and needs to convert an error code from decimal to octal format. The error code is 10 in decimal. What is the corresponding value in octal?
12
10
14
8
Answer Description
The correct answer is 12. Octal is a base-8 number system that uses digits from 0 to 7. To convert the decimal number 10 to octal, you divide 10 by 8, which results in a quotient of 1 and a remainder of 2. The next step is to divide the quotient (1) by 8, which gives a remainder of 1. Reading the remainders from bottom to top yields 12. Alternatively, converting the octal number 12 back to decimal confirms the answer: (1 * 81) + (2 * 80) = 8 + 2 = 10.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does base-8 (octal) number system mean?
How do you convert a decimal number to octal?
Why is base conversion useful in debugging software?
A technician is setting up a new SOHO wireless router. Which of the following is the MOST important initial step to secure the network from unauthorized administrative access?
Place the router in the center of the building.
Change the router's default administrator password.
Disable the SSID broadcast.
Enable the 5GHz frequency band.
Answer Description
The correct answer is to change the router's default administrator password. Manufacturer default passwords are often publicly known and can be easily found online. Leaving the default password unchanged creates a significant vulnerability, allowing unauthorized individuals to access the router's configuration, monitor traffic, or launch attacks. Disabling the SSID broadcast is a form of 'security through obscurity' and is not considered a strong security measure, as hidden networks can still be detected by determined attackers. Placing the router centrally is a best practice for signal coverage, not security. Enabling the 5GHz band improves performance and can reduce interference but is not a primary security measure.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is changing the default administrator password the MOST important step?
Why is disabling the SSID broadcast not considered a strong security measure?
What makes enabling the 5GHz frequency band unrelated to security?
A programmer needs to store a list of usernames that will be processed one by one in a program. The number of usernames is known and will not change. Which data structure offers the best performance for sequentially iterating over this fixed-size list?
Array
Hash table
Linked list
Queue
Answer Description
An array is ideal when the number of elements is fixed. Because its elements are stored in contiguous memory, each username can be accessed directly by index in O(1) time, giving the fastest possible iteration performance. A linked list must follow pointers from node to node, a hash table provides no defined order, and a queue enforces FIFO removal rather than random indexed access, all of which make them less efficient for this scenario.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is an array the best choice for fixed-size data?
What does O(1) time complexity mean?
How does a linked list differ from an array in terms of memory and access?
A project at work requires team members to use a portable device for taking notes during meetings and accessing documents on the go. Which type of device would be most suitable for this situation?
Gaming consoles
Smartphones
Tablets
Laptops
Answer Description
The correct answer is appropriate because tablets are designed for portability and are well-suited for tasks such as note-taking and document access, making them ideal for use during meetings. Laptops, while portable, are bulkier and not as convenient for quick notes. Smartphones may be useful but have a smaller screen which can limit usability for document viewing. Gaming consoles are not designed for productivity tasks and are therefore unsuitable.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why are tablets better suited for note-taking compared to laptops?
How does the screen size of tablets compare to smartphones for productivity tasks?
Can tablets connect to accessories like keyboards for enhanced productivity?
What is the primary purpose of pseudocode in the development process?
To encrypt the program's code for security purposes.
To debug programs once they have been written.
To compile the program into binary code that computers can execute.
To outline the program's logic in human-readable format before coding.
Answer Description
The correct answer is 'To outline the program's logic in human-readable format before coding.' Pseudocode is used for planning and explaining a program's structure without delving into the specifics of programming language syntax. It's a high-level description of what a program will do and helps programmers and others involved in the development to understand how the program will function. 'To debug programs' is incorrect because pseudocode itself is not used for debugging; it is a tool for design and planning. 'To compile the program into binary' is incorrect as pseudocode is not compilable; it is merely a human-readable description. 'To encrypt the program's code' is also incorrect since pseudocode has nothing to do with encryption; it is meant for readability and clarity of program logic.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does pseudocode help in program design?
What are the key differences between pseudocode and actual code?
Who benefits the most from the use of pseudocode in a project?
Which of the following values represents the number one hundred and eleven in the decimal notational system?
1101111
111
6F
1011
Answer Description
The correct answer is 111. The decimal system (base-10) is the standard system for representing numbers using digits 0-9. The number one hundred and eleven is written as 111 in this system. '6F' is the correct representation of one hundred and eleven in the hexadecimal (base-16) system. '1101111' is the correct representation of one hundred and eleven in the binary (base-2) system. '1011' is a decimal number, but it represents the value eleven.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the decimal number system?
How does binary differ from decimal?
What does 6F represent in hexadecimal?
When managing a customer database, what practice should be implemented to protect their personal information from unauthorized access?
Regularly changing the network cables to ensure a stable connection
Encrypting the data at rest
Making sure the server room is clean and dust-free
Using a very strong password for the database administrator account
Answer Description
Encrypting data adds a layer of security that ensures that even if the data is accessed by an unauthorized user, it cannot be easily understood without the appropriate decryption key. Other methods, like keeping the server room clean or using strong passwords, contribute to security but on their own do not protect the data at rest from being accessed and understood.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'data at rest' mean?
What is encryption and how does it protect data?
What is a decryption key and why is it important?
In a company's inventory management system, a programmer needs to create a process that checks each item's stock level and alerts the manager if the quantity is below 10. Which type of programming structure is most suitable for this task?
Using a loop to iterate through all the items
Using a single if-else statement
Declaring a variable for each item
Creating a constant for the number 10
Answer Description
A loop structure is suitable for this task because it allows the system to go through each item in the inventory one by one and perform the same check repeatedly until all items have been accounted for. Using a loop prevents the need to write repetitive code for each item, thus enhancing efficiency and maintainability. Other structures, such as a single if-else statement, individual variables, or merely creating a constant, do not provide the iterative functionality required for this scenario.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a programming loop?
How does a loop enhance efficiency in programming?
What is the difference between a for loop and a while loop?
A system administrator configures a security policy that requires all users to change their passwords every 90 days. Which of the following password best practices does this policy enforce?
Password history
Password reuse
Password complexity
Password expiration
Answer Description
Password expiration is a policy that requires users to change their passwords after a set period, such as 90 days, to limit the time a compromised password remains valid. Password complexity refers to the requirements for characters, such as uppercase letters, numbers, and symbols. Password history prevents users from reusing their most recent passwords. Password reuse is the practice of using the same password across different sites, which is discouraged.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is password expiration important for security?
How does password expiration relate to password policies?
What is the risk of allowing non-expiring passwords?
In a professional office setting, you are responsible for ensuring the company's financial records are preserved against accidental loss. Which of the following backup strategies should you recommend to safeguard these critical files?
Regular backups to cloud storage
On-demand backups before major updates
Daily on-site backups only
Weekly backups to an external hard drive
Answer Description
Regular backups to cloud storage ensure that critical files are not only saved frequently but are also stored off-site, which protects against local disasters like fire, theft, or hardware failure. This approach adheres to the best practices for backing up essential data and provides a resilient recovery option. Daily on-site backups, while important, do not provide adequate protection against local disasters. Weekly backups might not provide frequent enough data recovery points for critical financial records, leading to potential data loss. On-demand backups rely on manual intervention and may not occur with the necessary regularity for important documents.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is cloud storage considered a better option compared to on-site backups?
What types of disasters can cloud backups protect against that on-site backups cannot?
How does automation in cloud backups improve data safety?
Which action is the most effective way to protect your personal information when you use social networking platforms?
Avoid using password or authentication features to simplify access.
Post personal details as it increases online engagement.
Share your profile with everyone to gain more followers.
Make your profile private and limit post sharing to friends or trusted contacts.
Answer Description
Making your profile private and limiting post sharing to friends or trusted contacts helps maintain your privacy and reduces the risk of your information being misused. The other practices listed can compromise your security by exposing more of your information than intended.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to make your social media profile private?
What are some examples of personal information you should avoid sharing publicly on social media?
How do multi-factor authentication (MFA) enhance security on social media platforms?
A system administrator wants to minimize the risk of data corruption if the company server loses power unexpectedly. Which advantage is provided by selecting a file system that supports journaling?
It encrypts files for added security
It maintains a log of file system changes to help recover from crashes
It compresses files to save disk space
It increases the maximum size of files that can be stored
Answer Description
Journaling file systems keep a log of pending changes. If a crash or power failure occurs before writes complete, the system can replay or roll back the log to return the file system to a consistent state, greatly reducing the chance of corruption or data loss. Compression, encryption, and larger file-size limits are unrelated features that do not come automatically from journaling.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is journaling important for file systems?
How does journaling differ from regular file system operations?
What are some examples of popular journaling file systems?
What is the primary purpose of a product key when installing software?
To provide a password for accessing the installed application
To activate additional features not included in the base version of the software
To uniquely identify each user who installs the software
To verify the legitimacy of the software and ensure it is not used beyond its licensed agreement
Answer Description
A product key is a unique code used to verify that a copy of a software program is legitimate and is being used according to the license agreement. This is a primary method used by software publishers to prevent piracy. In contrast, a password protects a user's access to an already installed application or system and does not verify the software's license. While terms like 'activation key' and 'serial number' are sometimes used interchangeably with 'product key', the main function of the product key is to validate the right to use the software.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is a product key important for software installation?
What is the difference between a product key and an activation key?
How do product keys prevent software piracy?
Your company is growing and you expect the amount of data you store to triple within the next year. Which feature of a database system should be most important to accommodate this growth?
Data persistence
Primary key
Scalability
Answer Description
Scalability is the feature of a database system that allows it to handle a growing amount of work by adding resources to the system. It is essential for a database to be scalable to accommodate increased data and user load as a company grows. Vertical scaling refers to adding more power (CPU, RAM) to an existing machine, and horizontal scaling means adding more machines to a network to distribute the load. Without scalability, a database system can become slow or unresponsive as demand exceeds its capacity. A database that offers good scalability can grow with the company's needs without requiring a complete overhaul of the system.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between vertical and horizontal scaling in databases?
Why is scalability so critical for growing businesses using databases?
What are some common database systems designed for scalability?
Which of the following is the BEST example of a public IP address?
169.254.0.1
10.0.0.1
203.0.113.1
192.168.1.1
Answer Description
Public IP addresses are assigned to devices on the Internet by ISPs and are routable on the global Internet. 192.168.1.1 is a private IP address used within a local network and not routable on the Internet. 169.254.0.1 is an Automatic Private IP Addressing (APIPA) address used when DHCP fails, and is not routable. 10.0.0.1 is a private IP address. 203.0.113.1 is within the range designated for documentation and exemplification, and it is commonly used as a public IP address in examples.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between a public IP address and a private IP address?
What is an APIPA address, and when is it used?
Why is '203.0.113.1' used in examples, and what does it mean?
In a corporate setting, when an employee is unable to see if their colleagues are online or busy in their instant messaging software, what should they check first to resolve this issue?
See if the firewall is blocking the instant messaging application
Verify if the status visibility feature is enabled in the settings
Ensure that their workstation's operating system is updated to the latest version
Check if the email client is synchronized with the instant messaging software
Answer Description
In most instant messaging applications, the 'status visibility' or 'presence feature' controls whether you can see if your contacts are online, busy, or away. If an employee cannot see their colleagues' statuses, they should first check if this feature is enabled in their application settings. The other options provided do not primarily affect the visibility of user statuses in the context of instant messaging software.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the 'status visibility' or 'presence feature' in instant messaging?
How can users enable the 'status visibility' feature in instant messaging software?
Why wouldn’t factors like firewall settings or operating system updates affect status visibility in instant messaging?
What is the purpose of an identifier in a computer programming language?
To perform calculations within the program
To provide a unique name to a variable, function, or other elements
To determine the type of data a variable can hold
To serve as a placeholder for values that will be input later
Answer Description
An identifier is used to name elements in a program, such as variables and functions, allowing a programmer to refer to them in other parts of the code. It's not used for calculations or defining the type of data but rather for providing a unique name to differentiate one element from another.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an identifier in programming?
What are the rules for naming identifiers?
How are identifiers different from variables?
A retail company collects customer purchase histories to improve marketing strategies. What is one key benefit of using this information?
It helps the company cut costs by removing customer service altogether.
It provides insights into customer preferences, enabling better marketing efforts.
It makes it easier to hire additional staff without justification.
It allows the company to decide on future locations for their stores.
Answer Description
Using customer purchase histories allows the retail company to create targeted marketing campaigns that better meet customer needs. This data-driven approach can increase customer satisfaction and boost sales. The other options do not accurately reflect how well-informed decisions based on data can positively impact business strategy.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is targeted marketing, and how does it work?
What kinds of customer data are most useful for improving marketing strategies?
How do data-driven approaches boost customer satisfaction?
Wow!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.