CompTIA FC0-U71 Practice Test 2026

Updated On : 5-May-2026

Prepare smarter and boost your chances of success with our CompTIA FC0-U71 practice test 2026. These CompTIA Tech+ Certification Exam test questions helps you assess your knowledge, pinpoint strengths, and target areas for improvement. Surveys and user data from multiple platforms show that individuals who use FC0-U71 practice exam are 40–50% more likely to pass on their first attempt.

Start practicing today and take the fast track to becoming CompTIA FC0-U71 certified.

11440 already prepared

144 Questions
CompTIA Tech+ Certification Exam
4.8/5.0

Page 1 out of 15 Pages

Timed Practice Test

Think You're Ready?

Your Final Exam Before the Final Exam.
Dare to Take It?

Which of the following is commonly used to measure the RAM capacity of a smartphone?

A. GB

B. KB

C. MB

D. TB

A.   GB

Explanation:
The RAM (Random Access Memory) capacity of modern smartphones is commonly measured in gigabytes (GB). This is because smartphones typically have RAM sizes ranging from 2GB to 16GB or more, depending on the model and specifications. For example:

Entry-level smartphones might have 2-4 GB of RAM.

Mid-range to high-end devices often have 6-12 GB of RAM.

Flagship models may feature 16 GB or more.

GB is the appropriate unit for this scale, as it provides a practical measure for the substantial memory required to run apps and processes smoothly.

Why the other options are incorrect:

B. KB (Kilobytes):
KB is far too small for smartphone RAM. 1 GB = 1,000,000 KB, so KB is used for very small files or data, not system memory.

C. MB (Megabytes):
While older or very basic phones might have RAM measured in MB (e.g., 512 MB), modern smartphones have long surpassed this. 1 GB = 1,000 MB, so MB is outdated for current devices.

D. TB (Terabytes):
TB is an enormous unit (1 TB = 1,000 GB). It is used for large storage capacities (e.g., hard drives or cloud storage), not RAM. Smartphone RAM is nowhere near this size.

Reference:
This aligns with CompTIA ITF+ Objective 2.1: "Compare and contrast common computing devices and their purposes," which includes understanding hardware specifications like RAM in mobile devices. GB is the standard unit for measuring smartphone RAM in the industry.

Which of the following is used for predictive text?

A. Extensions

B. Big data

C. Artificial intelligence

D. Generated code

C.   Artificial intelligence

Explanation:
Predictive text is a technology that suggests words or phrases a user might want to type next, based on the initial letters typed, common language patterns, and the user's personal typing history.

Why C is Correct:
Modern predictive text systems rely heavily on Artificial Intelligence, specifically a branch of AI called Natural Language Processing (NLP) and machine learning. These systems are trained on massive datasets of text (e.g., books, articles, websites). They use this training to learn language patterns, grammar, context, and even personal style to predict the most likely next word efficiently. The system continuously learns and improves its predictions based on user input, which is a hallmark of AI.

Why A is Incorrect:
Extensions are small software programs that add functionality to a larger application (e.g., a browser extension). While an extension might use predictive text, the predictive text capability itself is powered by underlying AI algorithms, not by the extension format itself.

Why B is Incorrect:
Big data is a related concept but is not the direct answer. Big data refers to the immense volumes of data that are processed. AI systems use big data as their training material to become effective. The predictive text feature is the intelligent application of insights derived from that data, not the data itself.

Why D is Incorrect:
Generated code typically refers to source code that is automatically produced by another tool. This is unrelated to the core function of analyzing language and making contextual predictions. The AI that powers predictive text is programmed with code, but it doesn't function by "generating code" for each prediction.

Reference:
This question falls under the IT Concepts and Terminology domain of the ITF+ exam, specifically testing knowledge of emerging technologies like artificial intelligence and their practical, everyday applications.

A company implements a tool to allow employees to conduct meetings over the internet. Which of the following tools did the company implement?

A. Web browsing

B. Document sharing

C. Remote assistance

D. Conferencing software

D.   Conferencing software

Explanation:
Conferencing software is specifically designed to allow multiple participants to conduct meetings over the internet. It enables real-time communication through features such as:

Video and audio calls

Screen sharing

Virtual whiteboards

Chat and collaboration tools

Examples include Zoom, Microsoft Teams, Cisco Webex, and Google Meet. These tools are optimized for group interactions, making them ideal for business meetings, presentations, and collaborative sessions.

Why the other options are incorrect:

A. Web browsing:
Web browsers (e.g., Chrome, Firefox) are used to access websites and online content but do not inherently support interactive group meetings.

B. Document sharing:
This refers to tools like Google Drive or SharePoint that allow users to collaborate on files asynchronously. While they may integrate with conferencing tools, they do not provide real-time meeting capabilities.

C. Remote assistance:
Software like TeamViewer or Remote Desktop is designed for one-on-one technical support and control of another device, not for group meetings.

Reference:
This aligns with CompTIA ITF+ Objective 3.2: "Compare and contrast common applications," which includes understanding the purpose of conferencing software for virtual collaboration. Businesses rely on these tools to facilitate remote communication and teamwork.

A user has concerns about device theft because they are working on a laptop at a local coffee shop. Which of the following physical devices would be best to protect the laptop?

A. Firewall

B. Privacy shield

C. USB lock

D. Cable lock

D.   Cable lock

Explanation:
The question is specifically about mitigating the risk of physical theft of the entire laptop device in a public setting.

Why D is Correct:
A cable lock (also known as a Kensington lock or security cable) is a physical security device designed explicitly to prevent theft. It consists of a strong cable that attaches to a secure, immovable object (like a heavy table) and locks into a special security slot (Kensington slot) built into most laptops. This physically tethers the laptop, making it extremely difficult for someone to quickly snatch and steal it.

Why A is Incorrect:
A firewall is a network security device or software that monitors and controls incoming and outgoing network traffic based on security rules. It protects against digital threats like hackers and malware, but it provides zero protection against the physical theft of the hardware itself.

Why B is Incorrect:
A privacy shield (or privacy filter) is a thin piece of plastic that attaches to a screen to narrow the viewing angle. This protects against "shoulder surfing" and prevents others from seeing sensitive information on the screen. While important for data confidentiality, it does nothing to prevent someone from physically stealing the laptop.

Why C is Incorrect:
A USB lock (or USB blocker) is a device that physically blocks USB ports to prevent unauthorized use of USB devices, such as thumb drives that could be used to introduce malware or steal data. This is a data security measure, not an anti-theft device for the physical laptop.

Reference:
This question tests knowledge from the Security domain of the ITF+ exam, specifically under the objective of implementing basic physical security measures to protect equipment. It highlights the difference between physical security (protecting the hardware) and logical security (protecting the data).

Which of the following is the number of bits in a byte of data?

A. 2

B. 4

C. 8

D. 16

C.   8

Explanation:
This is a fundamental question about data representation in computing.

Why C is Correct:
By universal standard, a byte is a unit of digital information that consists of 8 bits. This is a foundational definition in computer science.

Why A is Incorrect:
2 bits is a unit that can represent 4 different values (00, 01, 10, 11). This is too small for a standard byte. Historically, byte sizes could vary, but 8 bits has been the standard for decades.

Why B is Incorrect:
4 bits is known as a nibble (or nybble). A nibble is half of a standard byte and can represent 16 different values (0-15 in hexadecimal).

Why D is Incorrect:
16 bits is typically referred to as a word (or specifically a "double byte" or "2 bytes") on many modern systems. The size of a "word" is architecture-dependent, but it is always larger than a single byte.

Reference:
This question falls under the IT Concepts and Terminology domain of the ITF+ exam. It tests core knowledge of basic data units, specifically the definition of a byte versus a bit and other related terms like nibble. This is essential for understanding data storage, memory, and networking concepts where capacities and speeds are measured in bytes and bits.

A user needs to transfer a 100GB data file to a coworker, but the network is down. Which of the following should the user most likely use instead?

A. NAS

B. Flash drive

C. RAM

D. Cloud

B.   Flash drive

Explanation:
When the network is down, transferring a large file (100GB) requires a physical medium that can store and transport the data efficiently. A flash drive (also known as a USB drive or thumb drive) is the most practical solution because:

It is portable and can be easily carried to the coworker.

It has sufficient capacity (many flash drives offer 128GB or more, which can handle a 100GB file).

It does not rely on network connectivity, making it ideal for offline transfers.

Why the other options are incorrect:

A. NAS (Network Attached Storage):
A NAS device is accessed over the network. Since the network is down, the user cannot use NAS to transfer the file.

C. RAM (Random Access Memory):
RAM is volatile memory used for temporary data storage while a computer is running. It cannot permanently store or transfer files; its contents are lost when the computer is powered off.

D. Cloud:
Cloud storage (e.g., Google Drive, Dropbox) requires an active network connection to upload and download files. Since the network is down, cloud services are inaccessible.

Reference:
This aligns with CompTIA ITF+ Objective 5.6: "Explain data backup and recovery methods," which includes understanding offline storage options like external drives. Flash drives are a common tool for physically transferring large files when network options are unavailable.

A refrigerator sends an alert to a user's phone when there is no more milk. Which of the following OS types is being used in the refrigerator?

A. Server

B. Embedded

C. Mobile

D. Workstation

B.   Embedded

Explanation:
An embedded operating system is a specialized OS designed to perform specific tasks within a larger system or device, often with limited resources (e.g., memory, processing power). It is typically built into hardware to control dedicated functions. In this case, the refrigerator uses an embedded OS to:

Monitor sensors (e.g., weight, optical sensors) detecting milk levels.

Trigger alerts (e.g., via Wi-Fi/Bluetooth) to the user’s phone when milk is low.

Embedded OSs are common in IoT (Internet of Things) devices like smart appliances, where reliability and efficiency are prioritized over general-purpose computing.

Why the other options are incorrect:

A. Server:
Server OSs (e.g., Windows Server, Linux) are designed to manage networks, resources, and services for multiple users or clients, not to control individual appliances.

C. Mobile:
Mobile OSs (e.g., Android, iOS) are for smartphones and tablets, focusing on touch interfaces, apps, and connectivity. The refrigerator itself does not run a mobile OS; it communicates with a device that does.

D. Workstation:
Workstation OSs (e.g., Windows 10, macOS) are for general-purpose computing, productivity, and multimedia. They are not optimized for dedicated hardware control like an appliance.

Reference:
This aligns with CompTIA ITF+ Objective 2.6: "Explain the purpose and use of embedded systems," which highlights how embedded OSs are used in devices such as smart appliances, medical equipment, and automotive systems for specialized, automated tasks.

A user's internet speed is slow. The user logs in to the router's administrator portal and sees that unauthorized devices are connected to the network. Which of the following actions should the user take to prevent unauthorized use of the network?

A. Call the internet provider's support line.

B. Decrease the Wi-Fi signal range.

C. Change the password.

D. Reset the router.

C.   Change the password.

Explanation:
The core issue is that unauthorized devices have gained access to the network. This almost always means the current Wi-Fi password (the Pre-Shared Key or PSK) has been compromised—either it's too weak, was shared with someone who shouldn't have it, or was bypassed.

Why C is Correct:
Changing the password is the most direct and effective immediate action. It will immediately disconnect all devices (both authorized and unauthorized) from the wireless network. The user can then provide the new, stronger password only to their authorized devices. This severs the access that the unauthorized devices were exploiting.

Why A is Incorrect:
While the internet provider's support might offer general advice, this is not a problem with the internet service itself. The issue is local, within the user's control (their router's security). Calling support would be an inefficient and likely unnecessary step.

Why B is Incorrect:
Decreasing the Wi-Fi signal range might make it harder for a neighbor to connect, but it is an unreliable and ineffective security measure. A determined individual with a good antenna could still pick up the signal, and if the password is still weak or known, they can still connect. Furthermore, this could negatively impact the user's own wireless coverage in their home.

Why D is Incorrect:
Resetting the router (usually with a pinhole button) will often restore it to its factory default settings. This will indeed disconnect all devices, but it also eliminates all other custom settings (like the network name/SSID). Crucially, it will change the password back to the default password printed on the router's label, which is often well-known and extremely weak. This would make the network even less secure unless the user immediately logs in and configures a new, strong password.

Reference:
This question tests knowledge from the Security domain of the ITF+ exam. It covers the concepts of wireless security practices, specifically the importance of using strong, unique passwords to prevent unauthorized network access and mitigate bandwidth theft.

Given the following data sequence: 1, 10, 2, 3, 4, 5, 6, 7, 8, 9 Which of the following data types are these values an example of?

A. Float

B. ASCII

C. Boolean

D. String

D.   String

Explanation:
The data sequence 1, 10, 2, 3, 4, 5, 6, 7, 8, 9 is an example of a string data type. Here's why:

String Definition:
A string is a sequence of characters (e.g., digits, letters, symbols) treated as text rather than numerical values. In this case, the values are listed as a comma-separated sequence, which is a common representation for strings, especially in contexts like arrays or lists where digits might be part of identifiers or labels (e.g., "1", "10", "2").

Context Clue:
The sequence includes 10 placed early (after 1), which breaks numerical order. This suggests the digits are not intended for arithmetic but are likely textual labels or elements in a string-based list (e.g., sorting as strings would place "10" before "2" due to lexicographical order).

Why the other options are incorrect:

A. Float:
Float (floating-point) represents decimal numbers (e.g., 3.14). The given values are integers without decimals, and the sequence order is atypical for numerical data.

B. ASCII:
ASCII refers to a character encoding standard (e.g., 'A' = 65). While digits in strings use ASCII codes, the question asks for the data type of the values themselves, not their encoding. The sequence is not presented as ASCII codes (e.g., 65, 66) but as digit characters.

C. Boolean:
Boolean represents binary values (true/false or 1/0). The sequence contains multiple values beyond 0 and 1, and it is not limited to two states.

Reference:
This aligns with CompTIA ITF+ Objective 4.3: "Compare and contrast fundamental data types and their characteristics," which includes understanding strings as sequences of characters. Strings are often used for non-numerical data, even if the characters are digits (e.g., phone numbers, ZIP codes). The irregular order hints at string-based sorting behavior.

A user is unable to connect from one workstation to another workstation. Which of the following should be configured to fix this issue?

A. Firewall

B. Database

C. Anti-malware

D. Certificate

A.   Firewall

Explanation:
The scenario describes a connectivity issue between two workstations on a network. This is a classic symptom of a network-level barrier preventing communication.

Why A is Correct:
A firewall is software (often built into the operating system) that monitors and controls incoming and outgoing network traffic based on predetermined security rules. If the firewall rules on one or both workstations are too restrictive, they can block the specific network packets or protocols needed for the two machines to communicate, even if they are on the same local network. Configuring the firewall to allow the necessary traffic is a primary step in troubleshooting this issue.

Why B is Incorrect:
A database is an organized collection of data stored and accessed electronically. It is an application, not a network configuration tool. It has no bearing on the fundamental ability of two computers to see each other on a network.

Why C is Incorrect:
Anti-malware software is designed to prevent, detect, and remove malicious software. While some advanced anti-malware suites might have network inspection features that could potentially block traffic, its primary function is not network connectivity. The firewall is a much more direct and common cause of this specific issue.

Why D is Incorrect:
A certificate (digital certificate) is used to establish a secure, encrypted connection (e.g., HTTPS) and to verify the identity of a remote party. It is related to security and encryption, not basic network connectivity. A missing or invalid certificate would typically cause an encryption or trust error after a connection is attempted, not a complete failure to connect.

Reference:
This question tests knowledge from the Infrastructure and Security domains of the ITF+ exam. It addresses common network troubleshooting steps, emphasizing that software firewalls on individual devices are a frequent culprit when connectivity between two devices on the same network fails.

Page 1 out of 15 Pages

CompTIA Tech+ Certification Exam Practice Questions

CompTIA Tech+ FC0-U71 Official Exam Blueprint And Our Practice Questions


CompTIA Tech+ FC0-U71 Domain Official Exam Weight Our Practice Questions
Tech Concepts and Terminology 13% 15
Our Practice Questions Covers Subtopics: Computing basics, Notational systems, Units of measure, Troubleshooting methodology, IT concepts, Technical terminology
Infrastructure 24% 42
Our Practice Questions Covers Subtopics: Computing devices, Internal components, Storage types, Peripheral setup, Device interfaces, Virtualization, Cloud computing, Networking basics, Wireless networks
Applications and Software 18% 24
Our Practice Questions Covers Subtopics: Operating systems, OS components, File systems, GUI and command line interfaces, Utilities, Drivers, Productivity software, Collaboration apps, Web browsers, Artificial intelligence tools
Software Development Concepts 13% 21
Our Practice Questions Covers Subtopics: Programming languages, Data types, Variables, Constants, Arrays, Functions, Objects, Pseudocode, Flowcharts, Object-oriented methods, Branching, Looping
Data and Database Fundamentals 13% 16
Our Practice Questions Covers Subtopics: Value of data, Data-driven decisions, Reporting, Monetization, Relational databases, Non-relational databases, Tables, Rows, Fields, Primary keys, Foreign keys, Queries, Reports, Backup concepts
Security 19% 26
Our Practice Questions Covers Subtopics: Confidentiality, Integrity, Availability, Authentication, Authorization, Anti-malware, Firewalls, Patching, Physical security, Safe browsing, Password practices, Password managers, Encryption, HTTPS, VPNs

New to IT and preparing for your first certification? This practice test covers the FC0-U71 exam objectives: IT concepts, infrastructure, applications, software development, and database fundamentals. You will work through questions on basic networking, security best practices, hardware components, and troubleshooting logic. Each answer includes clear explanations that build foundational understanding—not just memorization. By simulating the real exam environment, it builds your confidence and time management skills. Identify which concepts need more attention before test day. Stop second-guessing your readiness and start your IT career journey on solid ground.

Our Happy Customers


Starting from zero IT knowledge, I needed a resource that would build my confidence. Preptia IT Fundamentals practice exam covered basic concepts, software, and security in an accessible way. I passed easily and now have the foundation to pursue A+. Thank you Preptia!
Emily Rodriguez, Career Changer | Miami, FL

Getting started in IT felt less overwhelming with Preptia.com practice tests for IT Fundamentals (FC0-U71). The beginner-friendly questions explained basic computing and software concepts clearly.
Laura Jensen | Denmark