Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

CompTIA 220-1202 Dumps

Page: 1 / 21
Total 213 questions

CompTIA A+ Core 2 2025 Exam Questions and Answers

Question 1

A technician needs to download and install a new web browser on a desktop. Which attribute should be used to verify the installer's authenticity?

Options:

A.

Date

B.

Hash

C.

Size

D.

Name

Question 2

A technician is 3-D printing high-strength, carbon fiber-based filament parts for a customer order. Which of the following is the most important for the technician to use?

Options:

A.

Steel-toed boots

B.

Air filter mask

C.

ESD mat

D.

Antistatic bags

Question 3

A company executive is currently attending a major music festival with a large number of attendees and is having trouble accessing a work email account. The email application is not downloading emails and also appears to become stuck during connection attempts. Which of the following is most likely causing the disruption?

Options:

A.

The phone has no storage space available.

B.

Company firewalls are configured to block remote access to email resources.

C.

Too many devices in the same area are trying to connect to the mobile network.

D.

The festival organizer prohibits internet usage during the event and has blocked the internet signal

Question 4

A technician is helping a remote user. The technician asks the user to open a specific folder on the root directory of the computer. The user cannot find a folder with that name. The technician explains that a few settings are needed to allow the folder to appear. Which of the following should the user do to be able to see the folder? (Select two).

Options:

A.

Adjust the display properties

B.

Open File Explorer

C.

Open the root drive properties

D.

Configure the system settings

E.

Set the view extensions to "on"

F.

Check the box to view hidden files

Question 5

A technician must install a legacy business application on a new computer. The new computer does not meet the application's requirements. Which of the following steps should the technician take to ensure the application installs and runs correctly?

Options:

A.

Use a virtual machine to emulate an older OS.

B.

Run the installation in safe mode to avoid driver conflicts.

C.

Increase the swap file size to manage potential memory issues.

D.

Use an application compatibility toolkit to address any software conflicts.

Question 6

Which of the following is used in addition to a password to implement MFA?

Options:

A.

Sending a code to the user's phone

B.

Verifying the user's date of birth

C.

Prompting the user to solve a simple math problem

D.

Requiring the user to enter a PIN

Question 7

A technician reviews an organization's incident management policy. The organization uses a third-party vendor with multiple tools to protect its assets. What service type is this?

Options:

A.

PaaS

B.

EDR

C.

MDR

D.

XDR

Question 8

Which of the following provides information to employees, such as permitted activities when using the organization's resources?

Options:

A.

AUP

B.

MNDA

C.

DRM

D.

EULA

Question 9

An end user is unable to access the intranet. A technician needs to confirm whether the Windows web server is online and functioning. Which of the following default remote access technologies would the technician most likely use to remotely connect to the server?

Options:

A.

SPICE

B.

VNC

C.

RDP

D.

SSH

Question 10

A user's computer is running slowly. Web pages take several seconds to open, and applications are slow to respond. A technician opens the Windows Task Manager and sees the following:

Disk: 2%

Network: 12%

GPU: 15%

CPU: 70%

Memory: 97%

Which of the following would a technician most likely do to resolve the issue?

Options:

A.

Clear browser cached data

B.

Upgrade the network connection

C.

Close unnecessary programs

D.

Delete temporary files

Question 11

A user is unable to upload files to the corporate servers from their mobile phone when outside the office, but uploading files works without issue in the office. The user saw an error notification but dismissed it. Which of the following should a technician do to determine the root cause?

Options:

A.

Check the data usage limit

B.

Enable airplane mode

C.

Verify the last device reboot

D.

Enable Bluetooth connectivity

Question 12

Which of the following describes a vulnerability that has been exploited before a patch or remediation is available?

Options:

A.

Spoofing

B.

Brute-force

C.

DoS

D.

Zero-day

Question 13

Which of the following is the quickest way to move from Windows 10 to Windows 11 without losing data?

Options:

A.

Using gpupdate

B.

Image deployment

C.

Clean install

D.

In-place upgrade

Question 14

Due to recent security issues, the finance department requires a shorter screensaver timeout. Which of the following should a technician use to accomplish this task?

Options:

A.

gpedit.msc

B.

certmgr.msc

C.

devmgmt.msc

D.

perfmon.msc

Question 15

A user cannot upload files to corporate servers from their mobile device when outside the office, but uploads work fine in-office. What should a technician do to determine the root cause?

Options:

A.

Check the data usage limit

B.

Enable airplane mode

C.

Verify the last device reboot

D.

Enable Bluetooth connectivity

Question 16

Which of the following methods would make data unrecoverable but allow the drive to be repurposed?

Options:

A.

Deleting the partitions

B.

Implementing EFS

C.

Performing a low-level format

D.

Degaussing the device

Question 17

An organization is creating a new application. As part of the deployment, the roles and responsibilities for supporting the application need to be documented. Which of the following is designed to contain this information?

Options:

A.

SOP

B.

NDA

C.

DRM

D.

EULA

Question 18

A security administrator teaches all of an organization's staff members to use BitLocker To Go. Which of the following best describes the reason for this training?

Options:

A.

To ensure that all removable media is password protected in case of loss or theft

B.

To enable Secure Boot and a BIOS-level password to prevent configuration changes

C.

To enforce VPN connectivity to be encrypted by hardware modules

D.

To configure all laptops to use the TPM as an encryption factor for hard drives

Question 19

An administrator received an email stating that the OS they are currently supporting will no longer be issued security updates and patches. Which of the following is most likely the reason the administrator received this message?

Options:

A.

Support from the computer’s manufacturer is expiring

B.

The OS will be considered end of life

C.

The built-in security software is being removed from the next OS version

D.

A new version of the OS will be released soon

Question 20

A user receives a new personal computer but is unable to run an application. An error displays saying that .NET Framework 3.5 is required and not found. Which of the following actions is the best way to resolve this issue?

Options:

A.

Resolve the dependency through the 'Turn Windows features on or off' menu.

B.

Download the dependency via a third-party repository.

C.

Ignore the dependency and install the latest version 4 instead.

D.

Forward the trouble ticket to the SOC team because the issue poses a great security risk.

Question 21

A technician thinks that an application a user downloaded from the internet may not be the legitimate one, even though the name is the same. The technician needs to confirm whether the application is legitimate. Which of the following should the technician do?

Options:

A.

Compare the hash value from the vendor.

B.

Run Task Manager and compare the process ID.

C.

Run the application in safe mode.

D.

Verify the file name is correct.

Question 22

What is the next step a technician should take after completing malware cleanup?

Options:

A.

Perform a secondary antivirus scan

B.

Educate the end user

C.

Reimage the computer

D.

Review system logs

Question 23

The screen of a previously working computer repeatedly displays an OS Not Found error message when the computer is started. Only a USB drive, a keyboard, and a mouse are plugged into the computer. Which of the following should a technician do first?

Options:

A.

Run data recovery tools on the disk

B.

Partition the disk using the GPT format

C.

Check boot options

D.

Switch from UEFI to BIOS

Question 24

The battery on a user’s smartphone discharges quickly during travel. The phone was replaced two weeks ago. What should the technician do first?

Options:

A.

Replace the battery with a higher capacity option

B.

Provide an external battery

C.

Ensure the charging port is working

D.

Look for applications that are reporting the highest utilization

Question 25

Why would a network engineering team provide a help desk technician with IP addresses for a wired network segment?

Options:

A.

Only specific DNS servers are allowed outbound.

B.

The network allow list is set to a specific address.

C.

DHCP is not enabled for this subnet.

D.

NAC servers only allow security updates to be installed.

Question 26

Performance on a user’s smartphone is degrading. Applications take a long time to start, and switching between windows also takes a long time. Which of the following diagnostic steps should a mobile technician take first?

Options:

A.

Restore the phone to factory settings

B.

Restart the phone

C.

Check the phone’s battery state

D.

Uninstall unneeded applications

Question 27

A technician needs to install an operating system on a large number of workstations. Which of the following is the fastest method?

Options:

A.

Physical media

B.

Mountable ISO

C.

Manual installation

D.

Image deployment

Question 28

A user is working from home and is unable to access work files on a company laptop. Which of the following should a technician configure to fix the network access issue?

Options:

A.

Wide-area network

B.

Wireless network

C.

Proxy network settings

D.

Virtual private network

Question 29

A technician is attempting to join a workstation to a domain but is receiving an error message stating the domain cannot be found. However, the technician is able to ping the server and access the internet. Given the following information:

IP Address – 192.168.1.210

Subnet Mask – 255.255.255.0

Gateway – 192.168.1.1

DNS1 – 8.8.8.8

DNS2 – 1.1.1.1

Server – 192.168.1.10

Which of the following should the technician do to fix the issue?

Options:

A.

Change the DNS settings.

B.

Assign a static IP address.

C.

Configure a subnet mask.

D.

Update the default gateway.

Question 30

Which of the following methods involves requesting a user’s approval via a push notification to verify the user’s identity?

Options:

A.

Call

B.

Authenticator

C.

Hardware token

D.

SMS

Question 31

An engineer notices that many websites prompt users to input login and payment details. The engineer wants to require the browser to encrypt communications. Which of the following best helps to protect sensitive data?

Options:

A.

Disabling all cookies

B.

Disabling JavaScript

C.

Enabling a pop-up blocker

D.

Enabling HTTPS-Only Mode

Question 32

An end user's laptop is having network drive connectivity issues in the office. The end user submits a help desk ticket, and a support technician is able to establish a remote connection and fix the issue. The following day, however, the network drive is disconnected again. Which of the following should the technician do next?

Options:

A.

Connect remotely to the user's computer to see whether the network drive is still connected.

B.

Send documentation about how to fix the issue in case it reoccurs.

C.

Escalate the ticket to the next level.

D.

Keep the ticket open until next day, then close the ticket.

Question 33

A user reports that after a recent software deployment to upgrade the Testing application, they can no longer use it. However, other employees can successfully

use the Testing program.

INSTRUCTIONS

Review the information in each tab to verify the results of the deployment and resolve

any issues discovered by selecting the:

· First command to resolve the issue

· Second command to resolve the issue

as

as

as

Options:

Question 34

You have been contacted through the help desk chat application. A user is setting up a replacement SOHO router. Assist the user with setting up the router.

INSTRUCTIONS

Select the most appropriate statement for each response. Click the send button after each response to continue the chat.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

as

Options:

Question 35

As a corporate technician, you are asked to evaluate several suspect email messages on a client's computer. Corporate policy requires the following:

>All phishing attempts must be reported.

>Future spam emails to users must be prevented.

INSTRUCTIONS

Review each email and perform the following within the email:

>Classify the emails

>Identify suspicious items, if applicable, in each email

>Select the appropriate resolution

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

as

as

as

as

as

as

Options:

Question 36

You are configuring a home network for a customer. The customer has requested the ability to access a Windows PC remotely, and needs all chat and optional functions to work in their game console.

INSTRUCTIONS

Use the drop-down menus to complete the network configuration for the customer. Each option may only be used once, and not all options will be used.

Then, click the + sign to place each device in its appropriate location.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Wireless AP LAN

as

Firewall Screened Subnet

as

as

Options:

Question 37

Welcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

INSTRUCTIONS

Click on individual tickets to see the ticket details, and view applicable attachments to

determine the problem.

Select the appropriate issue from the 'Issue' drop-down menu. Then, select the most

efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper

command or verification to remediate or confirm your fix of the issue from the

'Verify/Resolve' drop-down menu.

as

Options:

Question 38

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users’ audio issues are resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

as

as

as

as

as

as

as

as

as

as

as

Options:

Question 39

Welcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

INSTRUCTIONS

Click on individual tickets to see the ticket details, and view applicable attachments to

determine the problem.

Select the appropriate issue from the 'Issue' drop-down menu. Then, select the most

efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper

command or verification to remediate or confirm your fix of the issue from the

'Verify/Resolve' drop-down menu.

as

Options:

Page: 1 / 21
Total 213 questions