Pre-Summer Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

CompTIA 220-1202 Dumps

Page: 1 / 30
Total 301 questions

CompTIA A+ Core 2 (2026 Exam Update) Questions and Answers

Question 1

A technician is unable to join a computer to the Windows domain. However, the computer can ping the domain controller by IP address. Which of the following is the most likely reason?

Options:

A.

The DNS settings are incorrect.

B.

The firewall configuration is wrong.

C.

IPv6 is enabled on the computer.

D.

The computer is not connected to the network.

Question 2

A senior administrator asks a help desk technician to run a set of commands on a remote network switch. After running the commands, the technician needs to collect the output and provide it to the administrator. Which of the following should the technician use to fulfill the administrator ' s request?

Options:

A.

RDP

B.

WinRM

C.

SSH

D.

VNC

Question 3

A support technician must install software that allows a user to deliver a project status presentation to external stakeholders. Which of the following software types should the technician install?

Options:

A.

WinRM

B.

RMM

C.

Videoconferencing

D.

Secure file transfer

Question 4

A desktop technician is mapping a remote Windows share \\WinNAS\shared as local drive Z:. Which command should the technician run?

Options:

A.

nslookup -opt 3: \WinNAS\shared

B.

net use 3: \WinNAS\shared

C.

chkdsk /R 2: \WinNAS\shared

D.

sfc /offwindir 3: \WinNAS\shared

Question 5

After a recent system update, a user ' s Windows 11 computer begins to experience slower boot times. The user notices additional icons are in the system tray. Which of the following should a technician do first to resolve the issue?

Options:

A.

Disable unnecessary startup applications.

B.

Uninstall the recent system update.

C.

Run a full system antivirus scan.

D.

Increase virtual memory allocation.

E.

Perform a system restore to a point before the update.

Question 6

A technician needs to configure settings for password complexity and failed log-in attempts before a user is locked out. These settings cannot be changed by standard users. Which of the following MMC snap-ins should the technician use?

Options:

A.

taskschd

B.

lusrmgr

C.

perfmon

D.

gpedit

Question 7

A malicious actor uses multiple endpoints to target a single endpoint. Which of the following describes this threat?

Options:

A.

On-path attack

B.

Structured Query Language injection

C.

Brute-force attack

D.

Distributed Denial of Service

Question 8

The battery on a user’s smartphone discharges quickly when the user travels. The smartphone was replaced two weeks ago. Which of the following should a technician do first?

Options:

A.

Replace the battery with a higher capacity option

B.

Provide an external battery to extend the usage time

C.

Ensure that the charging port is working as expected

D.

Look for applications that are reporting the highest utilization

Question 9

Users are reporting that an unsecured network is broadcasting with the same name as the normal wireless network. They are able to access the internet but cannot connect to the file share servers. Which of the following best describes this issue?

Options:

A.

Unreachable DNS server

B.

Virtual local area network misconfiguration

C.

Incorrect IP address

D.

Rogue wireless access point

Question 10

A user reports that their computer is running extremely slowly. They are also often redirected to unknown websites when attempting to access internal applications. The computer ' s antivirus software is outdated, and the user cannot access certain security-related settings. A network administrator confirms that all other workstations are operating normally, and network diagnostics show no issues. Which of the following should the administrator do next to troubleshoot these issues?

Options:

A.

Check the firewall settings for unauthorized changes or blocked applications.

B.

Clear the browser’s cookies and cache and test access to internal applications again.

C.

Disconnect the device from the network and investigate further.

D.

Set the security settings to the highest level and restart the computer.

Question 11

A help desk technician recently installed an SSH client on a workstation in order to access remote servers. What does this enable?

Options:

A.

To utilize an SSO connection

B.

To securely establish a console session

C.

To encrypt and decrypt protected messages

D.

To facilitate device log reviews

Question 12

After a technician upgrades the RAM on a user ' s workstation, the system shows a “No boot device found” message. Which of the following is most likely the cause?

Options:

A.

The installation disk is not available

B.

The SATA HDD power cable is disconnected

C.

The drive needs to be reformatted

D.

The boot order needs to be changed

Question 13

An endpoint ' s screensaver no longer activates automatically. The global security policy states that the screensaver should activate after the endpoint has been idle for an hour. Which of the following commands should the technician run on the endpoint to investigate this issue?

Options:

A.

msinfo32.exe

B.

gpresult

C.

sfc /scannow

D.

whoami

Question 14

A customer wants to format an external hard drive to work on both Windows and macOS. Which of the following filesystems is the best to use?

Options:

A.

NTFS

B.

exFAT

C.

APFS

D.

XFS

Question 15

Technicians are failing to document user contact information, device asset tags, and a clear description of each issue in the ticketing system. Which of the following should a help desk management team implement for technicians to use on every call?

Options:

A.

Service-level agreements

B.

Call categories

C.

Standard operating procedures

D.

Knowledge base articles

Question 16

A customer must access the contents of the AppData folder, which is in the local user profile. Which of the following should a technician configure so the customer can easily navigate to this location?

Options:

A.

Indexing

B.

File Explorer Options

C.

Privacy

D.

Ease of Access

Question 17

Which of the following file types would a desktop support technician most likely use to automate tasks for a Windows user log-in?

Options:

A.

.bat

B.

.sh

C.

.py

D.

.js

Question 18

Which of the following file systems allows macOS to write data?

Options:

A.

NTFS

B.

ReFS

C.

exFAT

D.

XFS

Question 19

An international traveler is concerned about others accessing the contents of their smartphone if it is lost or stolen. The traveler has enabled biometrics. Which of the following additional security measures further reduces the risk of unauthorized data access?

Options:

A.

Remote backups

B.

Location tracking

C.

PIN code screen lock

D.

Device encryption

Question 20

Which of the following filesystems is a successor to NTFS?

Options:

A.

ReFS

B.

XFS

C.

APFS

D.

exFAT

Question 21

Which of the following helps to maintain integrity during a forensic investigation?

Options:

A.

Acceptable use policy

B.

Business compliance requirements

C.

Chain of custody

D.

After-action report

Question 22

Which of the following describes an attack in which an attacker sets up a rogue AP that tricks users into connecting to the rogue AP instead of the legitimate network?

Options:

A.

Stalkerware

B.

Evil twin

C.

Tailgating

D.

Shoulder surfing

Question 23

Which of the following is the best way to distribute custom images to 800 devices that include four device vendor classes with two types of user groups?

Options:

A.

Use xcopy to clone the hard drives from one to another

B.

Use robocopy to move the files to each device

C.

Use a local image deployment tool for each device

D.

Use a network-based remote installation tool

Question 24

After completing malware removal steps, what is the next step the technician should take?

Options:

A.

Perform a secondary antivirus scan

B.

Educate the end user

C.

Reimage the computer

D.

Review system logs

Question 25

An end user is unable to access the intranet. A technician needs to confirm whether the Windows web server is online and functioning. Which of the following default remote access technologies would the technician most likely use to remotely connect to the server?

Options:

A.

SPICE

B.

VNC

C.

RDP

D.

SSH

Question 26

A user is working from home and is unable to access work files on a company laptop. Which of the following should a technician configure to fix the network access issue?

Options:

A.

Wide-area network

B.

Wireless network

C.

Proxy network settings

D.

Virtual private network

Question 27

After using a third-party disk optimization software package, a technician restarts a laptop and receives the message “No operating system found.” The technician verifies that the BIOS properly recognizes the SSD. Which of the following should the technician do next?

Options:

A.

Update BitLocker settings in the BIOS

B.

Replace the CMOS battery

C.

Boot from installation media and repair the MBR

D.

Isolate the system from the corporate network

Question 28

After a user installs a mobile application from an advertisement, the phone ' s battery dies a few hours later and becomes hot to touch, even when not in use. Which of the following should a technician do first?

Options:

A.

Check for unauthorized device administrators

B.

Contact the software developer

C.

Run a mobile malware scan on the phone

D.

Ensure appropriate MDM policies are applied

Question 29

A customer laptop has been shutting down unexpectedly. The customer explains that a blue screen appears just before the laptop turns off, but the screen disappears too quickly to see anything. Which of the following tools should a technician use to find details about the error?

Options:

A.

Performance Monitor

B.

Device Manager

C.

Event Viewer

D.

System Information

Question 30

A user needs to install and uninstall software on their Windows laptop but does not need to manage user accounts. The company follows least-privilege principles. Which of the following account types meets these requirements?

Options:

A.

Guest

B.

Power user

C.

Service

D.

Administrator

Question 31

A company wants to perform an in-place upgrade of operating systems on all workstations. All types of removable storage are disabled for security reasons. Which of the following is the best way to upgrade while keeping security settings in place?

Options:

A.

Using an external hard drive to upgrade the OS

B.

Copying the ISO file to each workstation and executing

C.

Setting up image deployment for PXE

D.

Using a hardware token to access upgrade files

Question 32

A technician must install a legacy business application on a new computer. The new computer does not meet the application ' s requirements. Which of the following steps should the technician take to ensure the application installs and runs correctly?

Options:

A.

Use a virtual machine to emulate an older OS.

B.

Run the installation in safe mode to avoid driver conflicts.

C.

Increase the swap file size to manage potential memory issues.

D.

Use an application compatibility toolkit to address any software conflicts.

Question 33

A user requires a temporary computer to perform duties. Which of the following is a way to leave minimal user data on the computer?

Options:

A.

Passwordless login

B.

Secure DNS

C.

Private browser

D.

Syncing user data

Question 34

A town clerk wants to work from home and access documents on a town hall server. What should a technician set up?

Options:

A.

VNC

B.

RDP

C.

VPN

D.

SSH

Question 35

Which of the following are system folders on macOS? (Select two)

Options:

A.

Applications

B.

Spotlight

C.

Time Machine

D.

Library

E.

FileVault

F.

iCloud

Question 36

A technician is assisting a user who is growing increasingly frustrated because an application continuously crashes. The technician must coordinate with another department to resolve the issue. Which of the following actions should the technician take to effectively and professionally communicate with the user?

Options:

A.

Transfer the user to the next tier.

B.

Ask the user to submit a formal complaint about the issue.

C.

Continue working on the issue independently.

D.

Explain the issue and the need for collaboration.

Question 37

Which of the following allows users to prevent malware installation and the disclosure of sensitive information?

Options:

A.

Secure Boot

B.

Threat education

C.

Email security gateway

D.

Firewall

Question 38

An administrator must rename the administrator account on a Windows desktop. Which tool is best for this?

Options:

A.

lusrmgr.msc

B.

devmgmt.msc

C.

gpedit.msc

D.

eventvwr.msc

Question 39

A customer is unable to open some files on their system. Each time the customer attempts to open a file, the customer receives a message that the file is encrypted. Which of the following best describes this issue?

Options:

A.

Keylogger

B.

Ransomware

C.

Phishing

D.

Cryptominer

Question 40

Which of the following is found in an MSDS sheet for a battery backup?

Options:

A.

Installation instructions

B.

Emergency procedures

C.

Configuration steps

D.

Voltage specifications

Question 41

A customer’s laptop will not turn on. The customer is distraught and panicking because the laptop contains family pictures that can never be replaced. Which of the following communication techniques is most important for the technician to demonstrate in this situation?

Options:

A.

The technician should provide the customer with the appropriate SLA

B.

The technician should inform the customer about replacement options for an increased cost

C.

The technician should project confidence and maintain a positive attitude

D.

The technician should be dressed in appropriate business casual attire

Question 42

An administrator received an email stating that the OS they are currently supporting will no longer be issued security updates and patches. Which of the following is most likely the reason the administrator received this message?

Options:

A.

Support from the computer ' s manufacturer is expiring

B.

The OS will be considered end of life

C.

The built-in security software is being removed from the next OS version

D.

A new version of the OS will be released soon

Question 43

Which of the following must be followed during incident response to ensure the collected evidence is properly handled and accounted for?

Options:

A.

Order of volatility for data

B.

Law enforcement notification procedures

C.

Data integrity best practices

D.

Chain of custody process

Question 44

A user takes an iOS-based smartphone to a repair shop due to performance issues. The technician observes:

Battery charge: 25%

Battery health: 90%

Hotspot: On

Used space: 63.76GB / 64GB

Which of the following is the most likely cause of the performance issue?

Options:

A.

The device is running out of free space

B.

The battery health is low

C.

The phone is not sufficiently charged

D.

The hotspot is degrading the performance

E.

Too many applications are open

Question 45

A technician needs to map a shared drive from a command-line interface. Which of the following commands should the technician use?

Options:

A.

pathping

B.

nslookup

C.

net use

D.

tracert

Question 46

You are configuring a home network for a customer. The customer has requested the ability to access a Windows PC remotely, and needs all chat and optional functions to work in their game console.

INSTRUCTIONS

Use the drop-down menus to complete the network configuration for the customer. Each option may only be used once, and not all options will be used.

Then, click the + sign to place each device in its appropriate location.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Wireless AP LAN

as

Firewall Screened Subnet

as

as

Options:

Question 47

Welcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

INSTRUCTIONS

Click on individual tickets to see the ticket details, and view applicable attachments to

determine the problem.

Select the appropriate issue from the ' Issue ' drop-down menu. Then, select the most

efficient resolution from the ' Resolution ' drop-down menu. Finally, select the proper

command or verification to remediate or confirm your fix of the issue from the

' Verify/Resolve ' drop-down menu.

as

Options:

Question 48

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users’ audio issues are resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

as

as

as

as

as

as

as

as

as

as

as

Options:

Question 49

A user reports that after a recent software deployment to upgrade the Testing application, they can no longer use it. However, other employees can successfully

use the Testing program.

INSTRUCTIONS

Review the information in each tab to verify the results of the deployment and resolve

any issues discovered by selecting the:

· First command to resolve the issue

· Second command to resolve the issue

as

as

as

Options:

Question 50

You have been contacted through the help desk chat application. A user is setting up a replacement SOHO router. Assist the user with setting up the router.

INSTRUCTIONS

Select the most appropriate statement for each response. Click the send button after each response to continue the chat.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

as

Options:

Question 51

As a corporate technician, you are asked to evaluate several suspect email messages on a client ' s computer. Corporate policy requires the following:

> All phishing attempts must be reported.

> Future spam emails to users must be prevented.

INSTRUCTIONS

Review each email and perform the following within the email:

> Classify the emails

> Identify suspicious items, if applicable, in each email

> Select the appropriate resolution

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

as

as

as

as

as

as

Options:

Question 52

Welcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

INSTRUCTIONS

Click on individual tickets to see the ticket details, and view applicable attachments to

determine the problem.

Select the appropriate issue from the ' Issue ' drop-down menu. Then, select the most

efficient resolution from the ' Resolution ' drop-down menu. Finally, select the proper

command or verification to remediate or confirm your fix of the issue from the

' Verify/Resolve ' drop-down menu.

as

Options:

Page: 1 / 30
Total 301 questions