Weekend Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > CompTIA > CompTIA Tech+ > FC0-U71

FC0-U71 CompTIA Tech+ Certification Exam Question and Answers

Question # 4

A technician identifies the potential cause of a problem. Which of the following troubleshooting steps should the technician take next?

A.

Test the theory.

B.

Create a plan of action.

C.

Document the findings.

D.

Verify system functionality.

Full Access
Question # 5

An application is unresponsive. Which of the following will close the application?

A.

Task management

B.

System utilities

C.

Remote assistance

D.

File permissions

Full Access
Question # 6

A user is unable to load the most recent version of a web page. The old page loads each time the screen is refreshed. Which of the following would the user most likely do to resolve the issue?

A.

Synchronize the profile.

B.

Disable browser extensions.

C.

Clear the cache.

D.

Enable the pop-up blocker.

Full Access
Question # 7

Which of the following is used to terminate a Cat 6 cable to an RJ45 connector?

A.

Crimper

B.

Cable tester

C.

Punchdown

D.

Wire cutter

Full Access
Question # 8

A user's device is experiencing slow processing performance when multiple applications are running at the same time. Which of the following components is causing this issue?

A.

Storage

B.

Motherboard

C.

NIC

D.

RAM

Full Access
Question # 9

Which of the following types of AI is used to edit images?

A.

Assistive

B.

Predictive

C.

Chatbot

D.

Generative

Full Access
Question # 10

Which of the following should be checked to ensure a user is authenticated by a web server?

A.

Account logs

B.

Browser history

C.

Permissions

D.

Firewall

Full Access
Question # 11

Which of the following represents the largest unit of storage?

A.

20TB

B.

200MB

C.

2,000GB

D.

2,000KB

Full Access
Question # 12

Which of the following makes a file readable only by select users who possess a key?

A.

Hidden folders

B.

File permissions

C.

Compression

D.

Encryption

Full Access
Question # 13

Which of the following must be included when backing up a workstation?

A.

Cloud-hosted files

B.

Application data

C.

Emails

D.

Installation files

Full Access
Question # 14

Which of the following display types is bidirectional?

A.

DisplayPort

B.

VGA

C.

DVI

D.

USB-C

Full Access
Question # 15

Which of the following is a touch screen used for? (Choose two.)

A.

Storage

B.

Input

C.

Output

D.

Networking

E.

Processing

F.

Logging

Full Access
Question # 16

Which of the following is the equivalent of 8 bits?

A.

GB

B.

Kilobyte

C.

Byte

D.

MHz

Full Access
Question # 17

A programmer needs to create a space in an application code to hold a value. The value will be updated periodically when the code is executed. Which of the following should the programmer use?

A.

Variable

B.

Sequence

C.

Loop

D.

Constant

Full Access
Question # 18

A user downloads an application from a website and intends to modify the application's code. Which of the following license types does the user need for this task?

A.

Subscription-based

B.

Proprietary

C.

Open-source

D.

Perpetual

Full Access
Question # 19

A user lives in a remote area that does not have cabling or towers available. The user wants to connect to the internet. Which of the following is the best solution?

A.

Fiber optic

B.

IDSL

C.

Cellular

D.

Satellite

Full Access
Question # 20

A user wants to access books and does not need printed, physical copies. The solution should be portable and lightweight. Which of the following is the best solution?

A.

E-reader

B.

Servers

C.

External drive

D.

Workstation

Full Access
Question # 21

Which of the following is used to measure the speed of an internet connection?

A.

802.11X

B.

Mbps

C.

MHz

D.

Bytes

Full Access
Question # 22

A computer is turned on, and a message states the system time is incorrect. Which of the following devices should be configured to resolve this message?

A.

Storage

B.

CPU

C.

BIOS

D.

RAM

Full Access
Question # 23

A user is typing a document using a keyboard. Which of the following describes this action?

A.

Input

B.

Storage

C.

Output

D.

Processing

Full Access
Question # 24

Which of the following internet services traditionally has the most challenges with latency?

A.

DSL

B.

Fiber

C.

Satellite

D.

Cable

Full Access
Question # 25

Which of the following is the smallest storage unit?

A.

Petabyte

B.

Terabyte

C.

Kilobyte

D.

Megabyte

Full Access
Question # 26

A programmer designs an application to record user actions in a log file for proper tracking. Which of the following best describes the recording component of the application?

A.

Accounting

B.

Authentication

C.

Authorization

D.

Non-repudiation

Full Access
Question # 27

Which of the following is used to measure the speed of a CPU?

A.

MHz

B.

MB

C.

Mbps

D.

MAC

Full Access
Question # 28

Which of the following is used to determine whether users accessed inappropriate online content?

A.

System logs

B.

Cookie data

C.

Location tracking

D.

Web browser history

Full Access
Question # 29

A programmer wants to write code that will be more efficient when executed at runtime. Which of the following language types should the programmer use?

A.

Markup

B.

Compiled

C.

Query

D.

Scripting

Full Access
Question # 30

A user needs to stop an application that is running on a laptop. Which of the following best describes the part of the OS that is needed to perform this operation?

A.

Task scheduling

B.

Disk management

C.

Access control

D.

Process management

Full Access
Question # 31

A technician is reviewing log files to track the number of times that a specific user has logged on to the networks. Which of the following security concepts is being used?

A.

Accounting

B.

Authorization

C.

Authentication

D.

Non-repudiation

Full Access
Question # 32

Which of the following is used to create a repetitive process within code?

A.

Loop

B.

Branch

C.

Comment

D.

Integrate

Full Access
Question # 33

A user deletes a suspicious email from an unknown address. Which of the following security best practices is being applied?

A.

Anti-malware

B.

Anti-phishing

C.

Authentication

D.

Firewall

Full Access
Question # 34

An employee attempts to install software on a PC. A prompt to enter a username and password appears on-screen. The employee then receives an “access denied” message and cannot install the software. Which of the following types of access would allow the employee to accomplish this task?

A.

Least privilege

B.

Administrator

C.

Single factor

D.

User

Full Access
Question # 35

All relational databases utilize unique identifiers. Which of the following is the best term for an identifier?

A.

Foreign key

B.

Record

C.

Primary key

D.

Key/value

Full Access
Question # 36

A manager wants to provide information to employees during a company meeting. Which of the following types of software is the best solution?

A.

Word processing

B.

Visual diagramming

C.

Conferencing

D.

Presentation

Full Access
Question # 37

Which of the following is an example of PII? (Choose two.)

A.

Full name

B.

Date of birth

C.

Employment status

D.

School attended

E.

Social media username

F.

City of residence

Full Access
Question # 38

Which of the following notational systems uses the numbers 0–9 and letters A–F?

A.

Octal

B.

Binary

C.

Decimal

D.

Hexadecimal

Full Access
Question # 39

A user needs to reconfigure local storage on an OS. Which of the following should be used?

A.

Process management

B.

Task management

C.

Device management

D.

Disk management

Full Access
Question # 40

Which of the following programming languages can be used to package a program?

A.

Query

B.

Assembly

C.

Scripting

D.

Compiled

Full Access
Question # 41

Given the following pseudocode:

10 FOR Q=1 TO 100

20 PRINT Q

30 NEXT Q

40 EXIT

Which of the following best represents line 10?

A.

Attribute

B.

Sequence

C.

Branch

D.

Loop

Full Access
Question # 42

A user is configuring a server OS. Which of the following should the user do after setting up the system?

A.

Change the default usernames and passwords.

B.

Synchronize the administrative log-ins with other servers on the domain.

C.

Disable the administrator password.

D.

Clear the password complexity database.

Full Access