CompTIA FC0-U71 Exam (page: 3)
CompTIA Tech+
Updated on: 31-Mar-2026

Viewing Page 3 of 25

Given the following pseudocode:

10 FOR Q=1 TO 100
20 PRINT Q
30 NEXT Q
40 EXIT

Which of the following best represents line 10?

  1. Attribute
  2. Sequence
  3. Branch
  4. Loop

Answer(s): D

Explanation:

Line 10 (FOR Q=1 TO 100) initializes a loop that iterates from 1 to 100.
Other options:
Sequence refers to a straight execution of instructions,
Branch involves decision-making (e.g., IF...THEN),
Attribute is a descriptive property, not a control structure.



A user is logged in but unable to access a shared folder on the network. Which of the following security concepts is in place?

  1. Authentication
  2. Authorization
  3. Accounting
  4. Non-repudiation

Answer(s): B

Explanation:

Authorization determines what a user is allowed to access after they have logged in. The user is already authenticated (logged in), but lacks permission to access the shared folder, indicating an authorization issue.
Other options:
Authentication verifies identity,
Accounting tracks user actions,
Non-repudiation ensures actions cannot be denied later.



Given the following table:



Which of the following fields best represents a primary key?

  1. ID
  2. Month
  3. Day
  4. Year
  5. Name

Answer(s): A

Explanation:

The ID field contains unique values for each record and is typically used as a primary key in a database. A primary key uniquely identifies each row in a table.
Month, Day, Year, and Name may have duplicates and do not guarantee uniqueness.



A technician needs to install input devices while setting up a new desktop PC. Which of the following should the technician install? (Choose two.)

  1. Printer
  2. Mouse
  3. Keyboard
  4. CPU
  5. Speaker
  6. SSD

Answer(s): B,C

Explanation:

A mouse and keyboard are standard input devices used to interact with a desktop PC.
Other options:
Printer and speaker are output devices,
CPU is a processing unit,
SSD is a storage device.



Users are discussing the birthdays and home addresses of notable public figures in a public chat room. Which of the following security concepts is being compromised?

  1. Confidentiality
  2. Integrity
  3. Privacy
  4. Availability

Answer(s): C

Explanation:

Discussing birthdays and home addresses of individuals -- even public figures -- violates privacy, which concerns the protection of personal or sensitive information.
Other options:
Confidentiality refers to restricting access to sensitive data, Integrity ensures data is not altered,
Availability ensures data and systems are accessible when needed.



Which of the following can best protect a computer when an infected file has been downloaded?

  1. Anti-malware
  2. Firewall
  3. Patching
  4. Permissions

Answer(s): A

Explanation:

Anti-malware software is specifically designed to detect, block, and remove malicious files, making it the best defense when an infected file has been downloaded.
Other options:
Firewall controls network traffic,
Patching prevents exploitation of known vulnerabilities but doesn't address already-downloaded malware, Permissions limit access but don't actively remove threats.



Which of the following is commonly used to measure the RAM capacity of a smartphone?

  1. GB
  2. KB
  3. MB
  4. TB

Answer(s): A

Explanation:

Gigabytes (GB) are the standard unit for measuring RAM capacity in modern smartphones, typically ranging from 2GB to 16GB.
KB and MB are too small, TB is used for large storage, not RAM.



A user identifies the reason a compute is not working, repairs it, and prints a test page. Which of the following steps should the user should take next?

  1. Submit a support ticket.
  2. Test the theory.
  3. Implement the solution.
  4. Document the actions taken.

Answer(s): D

Explanation:

After identifying the issue, repairing the computer, and verifying the fix (e.g., printing a test page), the next step is to document the actions taken. This is a key part of the troubleshooting process to ensure there's a record for future reference and accountability.



Viewing Page 3 of 25



Share your comments for CompTIA FC0-U71 exam with other users:

Prasad 9/29/2023 7:27:00 AM

please help with jn0-649 latest dumps
HONG KONG


GTI9982 7/31/2023 10:15:00 PM

please i need this dump. thanks
CANADA


Elton Riva 12/12/2023 8:20:00 PM

i have to take the aws certified developer - associate dva-c02 in the next few weeks and i wanted to know if the questions on your website are the same as the official exam.
Anonymous


Berihun Desalegn Wonde 7/13/2023 11:00:00 AM

all questions are more important
Anonymous


gr 7/2/2023 7:03:00 AM

ques 4 answer should be c ie automatically recover from failure
Anonymous


RS 7/27/2023 7:17:00 AM

very very useful page
INDIA


Blessious Phiri 8/12/2023 11:47:00 AM

the exams are giving me an eye opener
Anonymous


AD 10/22/2023 9:08:00 AM

3rd so far, need to cover more
Anonymous


Matt 11/18/2023 2:32:00 AM

aligns with the pecd notes
Anonymous


Sri 10/15/2023 4:38:00 PM

question 4: b securityadmin is the correct answer. https://docs.snowflake.com/en/user-guide/security-access-control-overview#access-control-framework
GERMANY


H.T.M. D 6/25/2023 2:55:00 PM

kindly please share dumps
Anonymous


Satish 11/6/2023 4:27:00 AM

it is very useful, thank you
Anonymous


Chinna 7/30/2023 8:37:00 AM

need safe rte dumps
FRANCE


1234 6/30/2023 3:40:00 AM

can you upload the cis - cpg dumps
Anonymous


Did 1/12/2024 3:01:00 AM

q6 = 1. download odt application 2. create a configuration file (xml) 3. setup.exe /download to download the installation files 4. setup.exe /configure to deploy the application
FRANCE


John 10/12/2023 12:30:00 PM

great material
Anonymous


Dinesh 8/1/2023 2:26:00 PM

could you please upload sap c_arsor_2302 questions? it will be very much helpful.
Anonymous


LBert 6/19/2023 10:23:00 AM

vraag 20c: rsa veilig voor symmtrische cryptografie? antwoord c is toch fout. rsa is voor asymmetrische cryptogafie??
NETHERLANDS


g 12/22/2023 1:51:00 PM

so far good
UNITED STATES


Milos 8/4/2023 9:33:00 AM

question 31 has obviously wrong answers. tls and ssl are used to encrypt data at transit, not at rest.
Serbia And Montenegro


Diksha 9/25/2023 2:32:00 AM

pls provide dump for 1z0-1080-23 planning exams
Anonymous


H 7/17/2023 4:28:00 AM

could you please upload the exam?
Anonymous


Anonymous 9/14/2023 4:47:00 AM

please upload this
UNITED STATES


Naveena 1/13/2024 9:55:00 AM

good material
Anonymous


WildWilly 1/19/2024 10:43:00 AM

lets see if this is good stuff...
Anonymous


Lavanya 11/2/2023 1:53:00 AM

useful information
UNITED STATES


Moussa 12/12/2023 5:52:00 AM

intéressant
BURKINA FASO


Madan 6/22/2023 9:22:00 AM

thank you for making the interactive questions
Anonymous


Vavz 11/2/2023 6:51:00 AM

questions are accurate
Anonymous


Su 11/23/2023 4:34:00 AM

i need questions/dumps for this exam.
Anonymous


LuvSN 7/16/2023 11:19:00 AM

i need this exam, when will it be uploaded
ROMANIA


Mihai 7/19/2023 12:03:00 PM

i need the dumps !
Anonymous


Wafa 11/13/2023 3:06:00 AM

very helpful
Anonymous


Alokit 7/3/2023 2:13:00 PM

good source
Anonymous