Month End Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium CompTIA 220-1202 Dumps Questions Answers

Page: 1 / 6
Total 157 questions

CompTIA A+ Core 2 2025 Exam Questions and Answers

Question 1

Which of the following is used in addition to a password to implement MFA?

Options:

A.

Sending a code to the user's phone

B.

Verifying the user's date of birth

C.

Prompting the user to solve a simple math problem

D.

Requiring the user to enter a PIN

Buy Now
Question 2

Recently, the number of users sharing smartphone passcodes has increased. The management team wants a technician to deploy a more secure screen lock method. Which of the following technologies should the technician use?

Options:

A.

Pattern lock

B.

Facial recognition

C.

Device encryption

D.

Multifactor authentication

Question 3

A customer wants to be able to work from home but does not want to be responsible for bringingcompany equipment back and forth. Which of the following would allow the user to remotely access and use a Windows PC at the main office? (Choose two.)

Options:

A.

SPICE

B.

SSH

C.

RDP

D.

VPN

E.

RMM

F.

WinRM

Question 4

Which of the following is an example of an application publisher including undisclosed additional software in an installation package?

Options:

A.

Virus

B.

Ransomware

C.

Potentially unwanted program

D.

Trojan

Question 5

A security administrator teaches all of an organization's staff members to use BitLocker To Go. Which of the following best describes the reason for this training?

Options:

A.

To ensure that all removable media is password protected in case of loss or theft

B.

To enable Secure Boot and a BIOS-level password to prevent configuration changes

C.

To enforce VPN connectivity to be encrypted by hardware modules

D.

To configure all laptops to use the TPM as an encryption factor for hard drives

Question 6

A network technician notices that most of the company's network switches are now end-of-life and need to be upgraded. Which of the following should the technician do first?

Options:

A.

Implement the change

B.

Approve the change

C.

Propose the change

D.

Schedule the change

Question 7

Which of the following methods involves requesting a user's approval via a push notification to verify the user's identity?

Options:

A.

Call

B.

Authenticator

C.

Hardware token

D.

SMS

Question 8

A technician is attempting to join a workstation to a domain but is receiving an error message stating the domain cannot be found. However, the technician is able to ping the server and access the internet. Given the following information:

    IP Address – 192.168.1.210

    Subnet Mask – 255.255.255.0

    Gateway – 192.168.1.1

    DNS1 – 8.8.8.8

    DNS2 – 1.1.1.1

    Server – 192.168.1.10

Which of the following should the technician do to fix the issue?

Options:

A.

Change the DNS settings.

B.

Assign a static IP address.

C.

Configure a subnet mask.

D.

Update the default gateway.

Question 9

A small office reported a phishing attack that resulted in a malware infection. A technician is investigating the incident and has verified the following:

● All endpoints are updated and have the newest EDR signatures.

● Logs confirm that the malware was quarantined by EDR on one system.

● The potentially infected machine was reimaged.

Which of the following actions should the technician take next?

Options:

A.

Install network security tools to prevent downloading infected files from the internet

B.

Discuss the cause of the issue and educate the end user about security hygiene

C.

Flash the firmware of the router to ensure the integrity of network traffic

D.

Suggest alternate preventative controls that would include more advanced security software

Question 10

Which of the following prevents forced entry into a building?

Options:

A.

PIV card

B.

Motion-activated lighting

C.

Video surveillance

D.

Bollard

Question 11

Technicians are failing to document user contact information, device asset tags, and a clear description of each issue in the ticketing system. Which of the following should a help desk management team implement for technicians to use on every call?

Options:

A.

Service-level agreements

B.

Call categories

C.

Standard operating procedures

D.

Knowledge base articles

Question 12

After a recent mobile OS upgrade to a smartphone, a user attempts to access their corporate email, but the application does not open. A technician restarts the smartphone, but the issue persists. Which of the following is the most likely way to resolve the issue?

Options:

A.

Updating the failed software

B.

Registering the smartphone with an MDM solution

C.

Installing a third-party client

D.

Clearing the cache partition

Question 13

A customer is unable to open some files on their system. Each time the customer attempts to open a file, the customer receives a message that the file is encrypted. Which of the following best describes this issue?

Options:

A.

Keylogger

B.

Ransomware

C.

Phishing

D.

Cryptominer

Question 14

Which of the following provides information to employees, such as permitted activities when using the organization's resources?

Options:

A.

AUP

B.

MNDA

C.

DRM

D.

EULA

Question 15

Which of the following is used to apply corporate restrictions on an Apple device?

Options:

A.

App Store

B.

VPN configuration

C.

Apple ID

D.

Management profile

Question 16

A user reports some single sign-on errors to a help desk technician. Currently, the user is able tosign in to the company's application portal but cannot access a specific SaaS-based tool. Which of the following would the technician most likely suggest as a next step?

Options:

A.

Reenroll the user's mobile device to be used as an MFA token

B.

Use a private browsing window to avoid local session conflicts

C.

Bypass single sign-on by directly authenticating to the application

D.

Reset the device being used to factory defaults

Question 17

A technician is setting up a surveillance system for a customer. The customer wants access to the system's web interface on the LAN via the system’s IP address. Which of the following should the technician use to prevent external log-in attempts from the internet?

Options:

A.

Port mapping

B.

Subnetting

C.

Static IP

D.

Content filtering

Question 18

Which of the following describes an attack in which an attacker sets up a rogue AP that tricks users into connecting to the rogue AP instead of the legitimate network?

Options:

A.

Stalkerware

B.

Evil twin

C.

Tailgating

D.

Shoulder surfing

Question 19

A user reports getting a BSOD (Blue Screen of Death) error on their computer at least twice a day. Which of the following should the technician use to determine the cause?

Options:

A.

Event Viewer

B.

Performance Monitor

C.

System Information

D.

Device Manager

Question 20

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users’ audio issues are resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 21

Which of the following describes a vulnerability that has been exploited before a patch or remediation is available?

Options:

A.

Spoofing

B.

Brute-force

C.

DoS

D.

Zero-day

Question 22

The screen of a previously working computer repeatedly displays an OS Not Found error message when the computer is started. Only a USB drive, a keyboard, and a mouse are plugged into the computer. Which of the following should a technician do first?

Options:

A.

Run data recovery tools on the disk

B.

Partition the disk using the GPT format

C.

Check boot options

D.

Switch from UEFI to BIOS

Page: 1 / 6
Total 157 questions