CompTIA Tech+ Practice Test (FC0-U71)
Use the form below to configure your CompTIA Tech+ Practice Test (FC0-U71). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Tech+ FC0-U71 (V6) Information
The CompTIA Tech+ Certification (formerly ITF+) is an entry-level certification designed to introduce individuals to the essential IT concepts and terminology. This certification is particularly suited for those who are new to the world of information technology and seeking to gain a basic understanding of IT. It covers a broad range of topics, including hardware, software, networking, cybersecurity, and basic IT literacy. This certification is ideal for individuals considering a career in IT, students in other fields who require a foundational understanding of IT, or professionals in other industries who want to gain a basic knowledge of IT to complement their primary skills.
Free CompTIA Tech+ FC0-U71 (V6) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:IT Concepts and TerminologyInfrastructureApplications and SoftwareSoftware Development ConceptsData and Database FundamentalsSecurity
Free Preview
This test is a free preview, no account required.
Subscribe to unlock all content, keep track of your scores, and access AI features!
A small law firm requires a solution that permits its staff to access and save client files from any workstation in the office. As a very small business they do not have any centralized servers or a data center. Which device best fits this requirement?
A centralized storage management software on the main office workstation
A USB storage device shared through one user's workstation
A modem with file sharing capabilities
A Network Attached Storage (NAS) device
Answer Description
A Network Attached Storage (NAS) device is specifically designed to connect to a network to provide access to files across multiple users simultaneously without the need for a direct connection to a central computing resource like a workstation or dedicated server. A flash drive is for single-user, local storage; a file server would necessitate a dedicated system; and a modem is a device that facilitates internet connections without providing file storage services.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a NAS device and how does it work?
What advantages does a NAS have over a USB storage device?
What are the key differences between NAS and centralized storage management software?
Which file system characteristic helps protect data integrity by recording intended changes in a dedicated log so the system can be quickly restored after a crash or power failure?
Compression
File system fragmentation
Journaling
Disk mirroring
Answer Description
Journaling file systems write the details or "intent" of each change to a special log (the journal) before committing the change to the main file system structures. If the system loses power or crashes mid-operation, the OS replays or rolls back the journal on reboot, bringing the file system back to a consistent state and greatly reducing the chance of corruption. Compression, fragmentation, and disk mirroring do not provide this transaction-style recovery capability.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some common file systems that use journaling?
How does journaling differ from traditional file systems?
What are the types of journaling methods used in file systems?
What should you do to protect your personal information when using social networking platforms?
Make your profile private and limit post sharing to friends or trusted contacts.
Post personal details as it increases online engagement.
Share your profile with everyone to gain more followers.
Avoid using password or authentication features to simplify access.
Answer Description
Making your profile private and limiting post sharing to friends or trusted contacts helps maintain your privacy and reduces the risk of your information being misused. The other practices provided can compromise your security by exposing more of your information than intended.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to limit post sharing on social networking platforms?
What specific settings should I adjust to make my profile private?
What are the potential risks of not using password or authentication features?
A small architecture firm requires a CAD software that will be used by various employees at different times, but never by more than one employee simultaneously. They are looking to minimize cost without violating any licensing agreements. Which licensing model should they consider?
Single use license
Subscription license
Group use/site license
Concurrent license
Answer Description
A concurrent license is ideal for the firm's situation because it allows a set number of copies of the software to be in use at the same time. Since the firm's employees will not be using the software simultaneously, this model provides a cost-effective solution that adheres to legal agreements. A single use license would not work for multiple users, even if used at different times. A group use/site license could be more expensive as it allows for more simultaneous usage than the firm requires. A subscription license might introduce unnecessary recurring fees.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a concurrent license?
How does a single use license differ from a concurrent license?
What are the potential downsides of a subscription license?
Before you physically attach a brand-new USB printer to your Windows laptop, what should be your first action?
Run a test print from a simple application to verify basic functionality.
Determine whether Windows can install the printer automatically through Plug-and-Play.
Download and install the manufacturer's full driver package before connecting the printer.
Connect the USB cable and power on the printer so the laptop detects the device.
Answer Description
You should first confirm whether the operating system will recognize and install the printer automatically by using Plug-and-Play. If Windows can supply an in-box or Windows Update driver, no manual driver installation is required. If the printer is not Plug-and-Play compatible, you would instead obtain and install the correct driver package before making the connection. Simply connecting the cable, adding the printer manually, or printing a test page are later steps that assume driver availability.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'plug-and-play' mean in the context of printers?
How can I find out if my printer supports plug-and-play?
What should I do if my printer doesn't support plug-and-play?
Which feature of a database is essential for handling a growing number of users without performance degradation?
Fixed data types
Multiple query options
Scalability
Single user access
Answer Description
Scalability is the feature that allows a database to accommodate an increasing load of data or users. A scalable database can handle growth smoothly, maintaining performance and avoiding bottleneck issues. Flat file systems, which do not usually support multiple concurrent users or significant amounts of data, tend to lack scalability. Query options, while important for interacting with the database, do not directly relate to how well the database performs under larger loads.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does scalability mean in the context of databases?
What are the consequences of a non-scalable database?
How can I ensure that a database is scalable before implementation?
In a relational database designed for a healthcare clinic, there are two tables: "Patients" and "Appointments." The "Patients" table has a "PatientID" field that uniquely identifies each patient. How should this field be properly used in the "Appointments" table to maintain a relationship between the two tables?
Copy all patient information into the "Appointments" table for each appointment
Include "PatientID" as a foreign key in the "Appointments" table
Create a new "AppointmentID" field in the "Patients" table
Generate a random unique identifier for each appointment separately from "PatientID"
Answer Description
In a relational database, a primary key uniquely identifies each record in its own table. To relate those records to another table, that primary key is stored in the other table as a foreign key. Adding the "PatientID" field to the "Appointments" table as a foreign key enforces referential integrity, ensuring that every appointment is linked to an existing patient. The other choices either duplicate data, add unnecessary fields, or fail to create this required link.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Foreign Key?
What is referential integrity?
Why shouldn't I create a new AppointmentID field in the 'Patients' table?
When downloading software for your computer, what is a best practice to ensure the software is legitimate?
Download the software from the official vendor's website.
Download the software from a file-sharing service.
Download the software from a pop-up advertisement that appears while browsing.
Download the software from a link in your email.
Answer Description
Checking that the software is being downloaded from the official vendor's website is correct because official websites are more likely to provide genuine, malware-free software. This practice reduces the risk of downloading malicious or counterfeit applications that can compromise a system's security. Downloading software from a pop-up advertisement or a link sent via email increases the risk of obtaining software from an untrusted or potentially harmful source, which can lead to security breaches.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to download software from the official vendor's website?
What are some signs that a software website may not be legitimate?
What can happen if I download software from untrusted sources?
Which of the following best describes the primary function of word processing software?
Managing and storing data in tables
Sending and receiving emails
Conducting video calls
Creating and editing documents
Answer Description
The correct answer is 'Creating and editing documents.' This is the primary function because word processing software is designed to allow users to enter, modify, format, and output text, often with additional features like spell check and text formatting options. Other choices given might relate to functions available in different types of software. For instance, managing databases is a function associated with database software, not word processing software, and while functions like email or video calls can be performed on the same device, they are not the purpose of word processing software.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What features are commonly found in word processing software?
What are the differences between word processing software and spreadsheet software?
Can word processing software be used for collaboration?
A technician is upgrading the storage system for a company's database server that requires a minimum of 1 200 gigabytes of space. The company decided to purchase a new hard drive. Which of the following should the technician recommend?
1 TB hard drive
200 GB hard drive
2 TB hard drive
500 GB hard drive
Answer Description
Manufacturers use the decimal system, where 1 terabyte (TB) equals 1 000 gigabytes (GB). A 1 TB drive therefore provides only about 1 000 GB, which is less than the 1 200 GB minimum. A 2 TB drive supplies roughly 2 000 GB, meeting the requirement and leaving headroom for future growth. Drives of 500 GB or 200 GB fall far short of the needed capacity.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between gigabytes and terabytes?
Why would a technician recommend a hard drive larger than the minimum required?
What are some factors to consider when selecting a hard drive for a server?
What number does the binary representation '1010' correspond to in decimal?
10
8
5
12
Answer Description
The binary number '1010' represents the decimal number 10. Each position in a binary number corresponds to a power of 2, starting from the rightmost digit. So, in '1010', the leftmost '1' represents 23 (8), and the second digit '0' represents 22 (0), the third '1' represents 21 (2), and the last '0' represents 20 (0). Adding these together (8 + 0 + 2 + 0) gives us 10. The other options either represent different binary values or do not correspond correctly to '1010'.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does binary counting work?
What is the significance of the binary system in computing?
Can you explain how to convert binary to decimal manually?
Which of the following is the BEST method to restrict access to certain files on a computer to authorized users only?
Applying full disk encryption
Implementing biometric authentication
Adjusting firewall rules
Setting file permissions for user access
Answer Description
Setting proper file permissions is the best method to ensure that only authorized users have access to certain files. Permissions can be adjusted to grant specific rights, such as read, write, and execute, to specific users or groups of users, thereby effectively controlling who can access the files. Biometric authentication is more related to accessing the device itself rather than individual files. Firewall rules protect against external threats and manage network traffic but do not control access to files on a computer. Full disk encryption is essential for protecting the data if the device is stolen or lost, but it does not specifically restrict file access while the operating system is running.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are file permissions and how do they work?
What is the difference between user access and biometric authentication?
What role do firewall rules play in computer security?
A team is evaluating different data storage options for a project that will require holding a significant amount of information. Which unit of measure would be most appropriate for assessing larger data volume requirements?
Megabytes (MB)
Kilobytes (KB)
Gigabytes (GB)
Terabytes (TB)
Answer Description
The correct answer highlights terabytes (TB) as a suitable unit for larger datasets, such as those typically encountered in substantial projects. While gigabytes (GB) are also a measure of data, terabytes are used to describe much larger volumes, making them more applicable in this scenario. Choosing megabytes (MB) would be insufficient due to the relatively small size they represent, while kilobytes (KB) are far too small for substantial data needs.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a terabyte (TB)?
What is the difference between a gigabyte (GB) and a terabyte (TB)?
Why are smaller units like megabytes (MB) and kilobytes (KB) insufficient for large data volume requirements?
Which feature of a web browser should be used when you want to visit websites without saving the history, cookies, or temporary files related to your activities during that session?
Using extensions
Popup blockers
Private browsing
Clearing cache
Answer Description
Private browsing is a feature available in most web browsers that allows users to browse the internet without recording the history or storing cookies and temporary files that track their activities. When a private browsing session ends, this information is typically discarded. Clearing the cache happens after browsing, extensions can add functionality but do not erase session data by default, and popup blockers simply suppress unwanted windows; none of these provide the same privacy during the session.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is private browsing, and how does it work?
Are there any limitations to private browsing?
What are cookies, and why are they important?
A technician receives a task to convert the hexadecimal number '1F' to its equivalent in binary. Given that each hexadecimal digit represents four binary digits, which binary number is the correct representation?
10111111
10011111
00011111
00111111
Answer Description
Hexadecimal digits can be directly converted to binary four-digit groupings. '1' in hexadecimal converts to '0001' in binary, and 'F' converts to '1111'. When combined, the binary representation of the hexadecimal '1F' is '00011111'.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How do you convert a hexadecimal number to binary?
What is hexadecimal, and why is it used?
Why do we represent hexadecimal digits in binary with only four bits?
Smashing!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.