FlashGenius Logo FlashGenius
Login Sign Up

CompTIA Tech+ (FC0-U71) Practice Questions: Security Domain

Test your CompTIA Tech+ (FC0-U71) knowledge with 10 practice questions from the Security domain. Includes detailed explanations and answers.

CompTIA Tech+ (FC0-U71) Practice Questions

Master the Security Domain

Test your knowledge in the Security domain with these 10 practice questions. Each question is designed to help you prepare for the CompTIA Tech+ (FC0-U71) certification exam with detailed explanations to reinforce your learning.

Question 1

What is the primary purpose of two-factor authentication (2FA)?

A) To store passwords securely

B) To verify user identity using two different methods

C) To encrypt data during transmission

D) To limit the number of login attempts

Show Answer & Explanation

Correct Answer: B

Explanation: Two-factor authentication (2FA) enhances security by requiring users to provide two different types of information to verify their identity. This could be something they know (like a password) and something they have (like a mobile phone). It does not store passwords, encrypt data, or limit login attempts.

Question 2

What is phishing?

A) A method of encrypting data

B) A type of malware

C) A scam to obtain sensitive information by pretending to be a trustworthy entity

D) A process of backing up data

Show Answer & Explanation

Correct Answer: C

Explanation: Phishing is a fraudulent attempt, often made through email, to steal personal information by pretending to be a trustworthy source. It is not related to encryption, malware, or data backup (options A, B, D).

Question 3

What is the primary purpose of encryption in data security?

A) To increase data storage capacity

B) To prevent unauthorized access to data

C) To speed up data transmission

D) To reduce data redundancy

Show Answer & Explanation

Correct Answer: B

Explanation: Encryption is used to protect data by converting it into a code to prevent unauthorized access. It ensures that only authorized parties can read the data by decrypting it with the correct key. Increasing storage, speeding up transmission, and reducing redundancy are not related to encryption.

Question 4

Which of the following best describes the role of a firewall in network security?

A) To physically protect network cables

B) To filter and control incoming and outgoing network traffic

C) To encrypt data before transmission

D) To monitor employee productivity

Show Answer & Explanation

Correct Answer: B

Explanation: A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules. Its primary function is to establish a barrier between a trusted internal network and untrusted external networks, such as the internet. It does not physically protect cables, encrypt data, or monitor productivity.

Question 5

What is the primary purpose of a Virtual Private Network (VPN)?

A) To increase internet speed

B) To provide secure remote access

C) To block unwanted advertisements

D) To monitor network traffic

Show Answer & Explanation

Correct Answer: B

Explanation: A Virtual Private Network (VPN) is primarily used to provide secure remote access to a network by encrypting the data transmitted between the user and the network, ensuring privacy and security. While a VPN can sometimes affect internet speed, its main purpose is not to increase it. Options A, C, and D are incorrect because a VPN does not block advertisements or monitor network traffic.

Question 6

Which of the following best describes two-factor authentication (2FA)?

A) Using two different passwords for login

B) Combining a password with a physical token

C) Encrypting data with two keys

D) Using two firewalls for added security

Show Answer & Explanation

Correct Answer: B

Explanation: Two-factor authentication (2FA) enhances security by requiring two forms of verification: something you know (like a password) and something you have (like a physical token or mobile app). This approach provides an additional layer of security beyond just a password.

Question 7

What is a common sign that a website is secure for online transactions?

A) The website loads quickly

B) The presence of 'https://' in the URL

C) The website has a colorful design

D) The website has many advertisements

Show Answer & Explanation

Correct Answer: B

Explanation: 'https://' in a URL indicates that the website uses SSL/TLS encryption to secure data transmitted between the user's browser and the server, making it safer for online transactions. Options A, C, and D do not indicate security.

Question 8

What is the primary purpose of a strong password policy?

A) To make it easier to remember passwords

B) To enhance system performance

C) To prevent unauthorized access

D) To simplify user management

Show Answer & Explanation

Correct Answer: C

Explanation: A strong password policy is designed to prevent unauthorized access by ensuring that users create passwords that are difficult for attackers to guess or crack. Strong passwords typically include a mix of letters, numbers, and special characters. Options A, B, and D are incorrect because a strong password policy may actually make passwords harder to remember, does not directly affect system performance, and does not simplify user management.

Question 9

What is the main purpose of encryption?

A) To compress files for storage

B) To hide files from the operating system

C) To convert data into a secure format that is unreadable without a decryption key

D) To improve data processing speed

Show Answer & Explanation

Correct Answer: C

Explanation: The main purpose of encryption is to convert data into a secure format that cannot be read by unauthorized users without the correct decryption key. Encryption does not compress files, hide them from the operating system, or improve processing speed.

Question 10

Which of the following describes a 'man-in-the-middle' attack?

A) An attacker intercepts communication between two parties

B) An attacker uses multiple computers to attack a single target

C) An attacker gains physical access to a server

D) An attacker installs malware on a user's device

Show Answer & Explanation

Correct Answer: A

Explanation: A 'man-in-the-middle' attack occurs when an attacker secretly intercepts and relays messages between two parties who believe they are directly communicating with each other. This allows the attacker to eavesdrop or alter the communication. It is different from distributed attacks, physical access breaches, or malware installation.

Ready to Accelerate Your CompTIA Tech+ (FC0-U71) Preparation?

Join thousands of professionals who are advancing their careers through expert certification preparation with FlashGenius.

  • ✅ Unlimited practice questions across all CompTIA Tech+ (FC0-U71) domains
  • ✅ Full-length exam simulations with real-time scoring
  • ✅ AI-powered performance tracking and weak area identification
  • ✅ Personalized study plans with adaptive learning
  • ✅ Mobile-friendly platform for studying anywhere, anytime
  • ✅ Expert explanations and study resources
Start Free Practice Now

Already have an account? Sign in here

About CompTIA Tech+ (FC0-U71) Certification

The CompTIA Tech+ (FC0-U71) certification validates your expertise in security and other critical domains. Our comprehensive practice questions are carefully crafted to mirror the actual exam experience and help you identify knowledge gaps before test day.