CompTIA Tech+ (FC0-U71) Practice Questions: Security Domain
Test your CompTIA Tech+ (FC0-U71) knowledge with 10 practice questions from the Security domain. Includes detailed explanations and answers.
CompTIA Tech+ (FC0-U71) Practice Questions
Master the Security Domain
Test your knowledge in the Security domain with these 10 practice questions. Each question is designed to help you prepare for the CompTIA Tech+ (FC0-U71) certification exam with detailed explanations to reinforce your learning.
Question 1
What is the primary purpose of two-factor authentication (2FA)?
Show Answer & Explanation
Correct Answer: B
Explanation: Two-factor authentication (2FA) enhances security by requiring users to provide two different types of information to verify their identity. This could be something they know (like a password) and something they have (like a mobile phone). It does not store passwords, encrypt data, or limit login attempts.
Question 2
What is phishing?
Show Answer & Explanation
Correct Answer: C
Explanation: Phishing is a fraudulent attempt, often made through email, to steal personal information by pretending to be a trustworthy source. It is not related to encryption, malware, or data backup (options A, B, D).
Question 3
What is the primary purpose of encryption in data security?
Show Answer & Explanation
Correct Answer: B
Explanation: Encryption is used to protect data by converting it into a code to prevent unauthorized access. It ensures that only authorized parties can read the data by decrypting it with the correct key. Increasing storage, speeding up transmission, and reducing redundancy are not related to encryption.
Question 4
Which of the following best describes the role of a firewall in network security?
Show Answer & Explanation
Correct Answer: B
Explanation: A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules. Its primary function is to establish a barrier between a trusted internal network and untrusted external networks, such as the internet. It does not physically protect cables, encrypt data, or monitor productivity.
Question 5
What is the primary purpose of a Virtual Private Network (VPN)?
Show Answer & Explanation
Correct Answer: B
Explanation: A Virtual Private Network (VPN) is primarily used to provide secure remote access to a network by encrypting the data transmitted between the user and the network, ensuring privacy and security. While a VPN can sometimes affect internet speed, its main purpose is not to increase it. Options A, C, and D are incorrect because a VPN does not block advertisements or monitor network traffic.
Question 6
Which of the following best describes two-factor authentication (2FA)?
Show Answer & Explanation
Correct Answer: B
Explanation: Two-factor authentication (2FA) enhances security by requiring two forms of verification: something you know (like a password) and something you have (like a physical token or mobile app). This approach provides an additional layer of security beyond just a password.
Question 7
What is a common sign that a website is secure for online transactions?
Show Answer & Explanation
Correct Answer: B
Explanation: 'https://' in a URL indicates that the website uses SSL/TLS encryption to secure data transmitted between the user's browser and the server, making it safer for online transactions. Options A, C, and D do not indicate security.
Question 8
What is the primary purpose of a strong password policy?
Show Answer & Explanation
Correct Answer: C
Explanation: A strong password policy is designed to prevent unauthorized access by ensuring that users create passwords that are difficult for attackers to guess or crack. Strong passwords typically include a mix of letters, numbers, and special characters. Options A, B, and D are incorrect because a strong password policy may actually make passwords harder to remember, does not directly affect system performance, and does not simplify user management.
Question 9
What is the main purpose of encryption?
Show Answer & Explanation
Correct Answer: C
Explanation: The main purpose of encryption is to convert data into a secure format that cannot be read by unauthorized users without the correct decryption key. Encryption does not compress files, hide them from the operating system, or improve processing speed.
Question 10
Which of the following describes a 'man-in-the-middle' attack?
Show Answer & Explanation
Correct Answer: A
Explanation: A 'man-in-the-middle' attack occurs when an attacker secretly intercepts and relays messages between two parties who believe they are directly communicating with each other. This allows the attacker to eavesdrop or alter the communication. It is different from distributed attacks, physical access breaches, or malware installation.
Ready to Accelerate Your CompTIA Tech+ (FC0-U71) Preparation?
Join thousands of professionals who are advancing their careers through expert certification preparation with FlashGenius.
- ✅ Unlimited practice questions across all CompTIA Tech+ (FC0-U71) domains
- ✅ Full-length exam simulations with real-time scoring
- ✅ AI-powered performance tracking and weak area identification
- ✅ Personalized study plans with adaptive learning
- ✅ Mobile-friendly platform for studying anywhere, anytime
- ✅ Expert explanations and study resources
Already have an account? Sign in here
About CompTIA Tech+ (FC0-U71) Certification
The CompTIA Tech+ (FC0-U71) certification validates your expertise in security and other critical domains. Our comprehensive practice questions are carefully crafted to mirror the actual exam experience and help you identify knowledge gaps before test day.