Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: wrap60

CompTIA 220-1202 Dumps

Page: 1 / 16
Total 157 questions

CompTIA A+ Core 2 2025 Exam Questions and Answers

Question 1

A company executive is currently attending a major music festival with a large number of attendees and is having trouble accessing a work email account. The email application is not downloading emails and also appears to become stuck during connection attempts. Which of the following is most likely causing the disruption?

Options:

A.

The phone has no storage space available.

B.

Company firewalls are configured to block remote access to email resources.

C.

Too many devices in the same area are trying to connect to the mobile network.

D.

The festival organizer prohibits internet usage during the event and has blocked the internet signal

Question 2

An application's performance is degrading over time. The application is slowing, but it never gives an error and does not crash. Which of the following tools should a technician use to start troubleshooting?

Options:

A.

Reliability history

B.

Computer management

C.

Resource monitor

D.

Disk

Question 3

MFA for a custom web application on a user's smartphone is no longer working. The last time the user remembered it working was before taking a vacation to another country. Which of the following should the technician do first?

Options:

A.

Verify the date and time settings

B.

Apply mobile OS patches

C.

Uninstall and reinstall the application

D.

Escalate to the website developer

Question 4

A user is unable to upload files to the corporate servers from their mobile phone when outside the office, but uploading files works without issue in the office. The user saw an error notification but dismissed it. Which of the following should a technician do to determine the root cause?

Options:

A.

Check the data usage limit

B.

Enable airplane mode

C.

Verify the last device reboot

D.

Enable Bluetooth connectivity

Question 5

The screen of a previously working computer repeatedly displays an OS Not Found error message when the computer is started. Only a USB drive, a keyboard, and a mouse are plugged into the computer. Which of the following should a technician do first?

Options:

A.

Run data recovery tools on the disk

B.

Partition the disk using the GPT format

C.

Check boot options

D.

Switch from UEFI to BIOS

Question 6

A user wants to dispose of a failed hard drive in a way that ensures the data is unrecoverable. Which of the following is the best at-home method?

Options:

A.

Standard formatting

B.

Low-level formatting

C.

Shredding

D.

Degaussing

E.

Drilling

Question 7

A technician is installing a cloud-based productivity suite and gets an error saying the installation is unavailable. What should be tried first?

Options:

A.

Reinstall the productivity suite

B.

Download an open-source alternative

C.

Check the license device limit

D.

Update the device OS

Question 8

A user logs in to a computer each morning and tries to print a daily report, but it will not print. The help desk resolves the issue each day temporarily. To fix this permanently, which of the following should the technician do? (Select two)

Options:

A.

Set the print spooler to have no dependencies

B.

Set the print spooler recovery to take no action

C.

Start the printer extensions and notifications service

D.

Start the print spooler service

E.

Set the print spooler to Automatic

F.

Set the print spooler log-on to the user's account

Question 9

A user wants to use a USB to move a 4.57GB .pst file from one Windows computer to another. Which of the following filesystems should the USB be formatted with?

Options:

A.

ext4

B.

NTFS

C.

FAT32

D.

APFS

Question 10

After using a third-party disk optimization software package, a technician restarts a laptop and receives the message "No operating system found." The technician verifies that the BIOS properly recognizes the SSD. Which of the following should the technician do next?

Options:

A.

Update BitLocker settings in the BIOS

B.

Replace the CMOS battery

C.

Boot from installation media and repair the MBR

D.

Isolate the system from the corporate network

Question 11

An employee is using a photo editing program. Certain features are disabled and require a log-in, which the employee does not have. Which of the following is a way to resolve this issue?

Options:

A.

License assignment

B.

VPN connection

C.

Application repair

D.

Program reinstallation

Question 12

After completing malware removal steps, what is the next step the technician should take?

Options:

A.

Perform a secondary antivirus scan

B.

Educate the end user

C.

Reimage the computer

D.

Review system logs

Question 13

A network technician notices that most of the company's network switches are now end-of-life and need to be upgraded. Which of the following should the technician do first?

Options:

A.

Implement the change

B.

Approve the change

C.

Propose the change

D.

Schedule the change

Question 14

A user switches from Linux to Windows and tries to migrate data using an external USB drive. Windows prompts that the device must be formatted. It works fine on Linux. What should the user do?

Options:

A.

Configure Windows firewall to allow data from Linux systems

B.

Replace the cable with Windows-supported hardware

C.

Apply a firmware update from the PC manufacturer

D.

Update the file allocation system to exFAT

Question 15

Which of the following is an example of an application publisher including undisclosed additional software in an installation package?

Options:

A.

Virus

B.

Ransomware

C.

Potentially unwanted program

D.

Trojan

Question 16

A technician is securing a newly deployed workstation. Only authorized users should access it. Which actions should the technician take? (Select two)

Options:

A.

Defragment the hard drive

B.

Enable SSH

C.

Enable screensaver locks

D.

Disable iCloud integration

E.

Enable the firewall

F.

Apply the BIOS password

Question 17

A user is experiencing issues with outdated images while browsing websites. Which of the following settings should a technician use to correct this issue?

Options:

A.

Administrative Tools

B.

Windows Defender Firewall

C.

Internet Options

D.

Ease of Access

Question 18

An organization is experiencing an increased number of issues. A technician notices applications that are not installed by default. Users are reporting an increased number of system prompts for software licensing. Which of the following would the security team most likely do to remediate the root cause?

Options:

A.

Deploy an internal PKI to filter encrypted web traffic.

B.

Remove users from the local admin group.

C.

Implement stronger controls to block suspicious websites.

D.

Enable stricter UAC settings on Windows.

Question 19

A technician is reviewing an organization's current incident management policy. The organization uses a third-party vendor to protect the organization's assets with multiple tools. Which of the following service types is the organization using?

Options:

A.

PaaS

B.

EDR

C.

MDR

D.

XDR

Question 20

You are configuring a home network for a customer. The customer has requested the ability to access a Windows PC remotely, and needs all chat and optional functions to work in their game console.

INSTRUCTIONS

Use the drop-down menus to complete the network configuration for the customer. Each option may only be used once, and not all options will be used.

Then, click the + sign to place each device in its appropriate location.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Wireless AP LAN

as

Firewall Screened Subnet

as

as

Options:

Question 21

Performance on a user’s smartphone is degrading. Applications take a long time to start, and switching between windows also takes a long time. Which of the following diagnostic steps should a mobile technician take first?

Options:

A.

Restore the phone to factory settings

B.

Restart the phone

C.

Check the phone’s battery state

D.

Uninstall unneeded applications

Question 22

A customer’s computer does not have an active connection to the network. A technician goes through a few troubleshooting steps but is unable to resolve the issue. The technician has exhausted their knowledge. The customer expresses frustration at the time taken to resolve this issue. Which of the following should the technician do?

Options:

A.

Escalate the issue to a senior team member and provide next steps to the customer.

B.

Dismiss the customer and reschedule another troubleshooting session at a later date.

C.

Interrupt the customer and express that troubleshooting support tickets can take time.

D.

Maintain a positive attitude and continue to ask questions regarding the scope of the issue.

Question 23

A technician needs to disable guest log-ins on domain-joined desktop machines. Which of the following should the technician use?

Options:

A.

Group Policy

B.

Firewall

C.

Microsoft Management Control

D.

MSConfig

Question 24

An administrator received an email stating that the OS they are currently supporting will no longer be issued security updates and patches. Which of the following is most likely the reason the administrator received this message?

Options:

A.

Support from the computer's manufacturer is expiring

B.

The OS will be considered end of life

C.

The built-in security software is being removed from the next OS version

D.

A new version of the OS will be released soon

Question 25

Which of the following are system folders on macOS? (Select two)

Options:

A.

Applications

B.

Spotlight

C.

Time Machine

D.

Library

E.

FileVault

F.

iCloud

Question 26

A user decides to switch to Windows from Linux and is trying to migrate data using an external USB hard disk. However, when the user connects the cable to the Windows machine, an error message appears stating the device must be formatted before it can be used. The hard disk works as expected when connected to the Linux machine. Which of the following should the user do to resolve this issue?

Options:

A.

Configure Windows firewall to allow data from Linux systems

B.

Replace the cable with Windows-supported hardware

C.

Apply a firmware update from the PC manufacturer

D.

Update the file allocation system to exFAT

Question 27

Which of the following methods would make data unrecoverable but allow the drive to be repurposed?

Options:

A.

Deleting the partitions

B.

Implementing EFS

C.

Performing a low-level format

D.

Degaussing the device

Question 28

A technician needs to map a shared drive from a command-line interface. Which of the following commands should the technician use?

Options:

A.

pathping

B.

nslookup

C.

net use

D.

tracert

Question 29

Which of the following provides information to employees, such as permitted activities when using the organization's resources?

Options:

A.

AUP

B.

MNDA

C.

DRM

D.

EULA

Question 30

Recently, the number of users sharing smartphone passcodes has increased. The management team wants a technician to deploy a more secure screen lock method. Which of the following technologies should the technician use?

Options:

A.

Pattern lock

B.

Facial recognition

C.

Device encryption

D.

Multifactor authentication

Question 31

Which of the following is used to store passwords in macOS?

Options:

A.

FileVault

B.

Keychain

C.

Accessibility

D.

Mission Control

Question 32

Which of the following authentication methods is the best way to prevent users from frequently entering their credentials?

Options:

A.

Access control list

B.

Single sign-on

C.

Multifactor authentication

D.

One-time password

Question 33

A help desk technician recently installed an SSH client on a workstation in order to access remote servers. What does this enable?

Options:

A.

To utilize an SSO connection

B.

To securely establish a console session

C.

To encrypt and decrypt protected messages

D.

To facilitate device log reviews

Question 34

Which of the following filesystem types does the Linux OS use?

Options:

A.

exFAT

B.

APFS

C.

ext4

D.

NTFS

Question 35

As a corporate technician, you are asked to evaluate several suspect email messages on a client's computer. Corporate policy requires the following:

>All phishing attempts must be reported.

>Future spam emails to users must be prevented.

INSTRUCTIONS

Review each email and perform the following within the email:

>Classify the emails

>Identify suspicious items, if applicable, in each email

>Select the appropriate resolution

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

as

as

as

as

as

as

Options:

Question 36

An administrator is investigating a technical outage. The management team wants information that includes the summary of the outage and actions taken. Which of the following documentation should the administrator provide to the management team?

Options:

A.

Knowledge base article

B.

Non-disclosure agreement

C.

Incident report

D.

Standard operating procedure

Question 37

A customer is unable to open some files on their system. Each time the customer attempts to open a file, the customer receives a message that the file is encrypted. Which of the following best describes this issue?

Options:

A.

Keylogger

B.

Ransomware

C.

Phishing

D.

Cryptominer

Question 38

A customer’s laptop will not turn on. The customer is distraught and panicking because the laptop contains family pictures that can never be replaced. Which of the following communication techniques is most important for the technician to demonstrate in this situation?

Options:

A.

The technician should provide the customer with the appropriate SLA

B.

The technician should inform the customer about replacement options for an increased cost

C.

The technician should project confidence and maintain a positive attitude

D.

The technician should be dressed in appropriate business casual attire

Question 39

A user's application only works with a legacy version of the OS. The OS is reaching its end-of-life date. For security reasons, the company is migrating to the current version of the OS. Which of the following is the most efficient way to complete the migration while maintaining accessibility to the application?

Options:

A.

Terminal server

B.

Bare-metal server

C.

Multiboot

D.

Virtualization

Question 40

A technician verifies that a malware incident occurred on some computers in a small office. Which of the following should the technician do next?

Options:

A.

Quarantine the infected systems

B.

Educate the end users

C.

Disable System Restore

D.

Update the anti-malware and scan the computers

Question 41

A technician thinks that an application a user downloaded from the internet may not be the legitimate one, even though the name is the same. The technician needs to confirm whether the application is legitimate. Which of the following should the technician do?

Options:

A.

Compare the hash value from the vendor.

B.

Run Task Manager and compare the process ID.

C.

Run the application in safe mode.

D.

Verify the file name is correct.

Question 42

What is the next step a technician should take after completing malware cleanup?

Options:

A.

Perform a secondary antivirus scan

B.

Educate the end user

C.

Reimage the computer

D.

Review system logs

Question 43

Which of the following is a protocol that provides AAA for network services?

Options:

A.

RADIUS

B.

Kerberos

C.

TKIP

D.

WPA3

Question 44

A help desk team was alerted that a company-owned cell phone has an unrecognized password-cracking application. Which of the following should the help desk team do to prevent further unauthorized installations from occurring?

Options:

A.

Configure Group Policy.

B.

Implement PAM.

C.

Install anti-malware software.

D.

Deploy MDM.

Question 45

A network technician notices that most of the company's network switches are now end-of-life and need to be upgraded. What should the technician do first?

Options:

A.

Implement the change

B.

Approve the change

C.

Document the change

D.

Schedule the change

Question 46

A user reports that the time on their computer does not match the time on their VoIP phone. What should a technician do?

Options:

A.

Confirm the user is logging in to the domain.

B.

Manually set the time on the phone to match the computer.

C.

Download and install the latest BIOS update.

D.

Configure access to an available NTP server.

Question 47

A company recently transitioned to a cloud-based productivity suite and wants to secure the environment from external threat actors. Which of the following is the most effective method?

Options:

A.

Multifactor authentication

B.

Encryption

C.

Backups

D.

Strong passwords

Page: 1 / 16
Total 157 questions