Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium CompTIA 220-1202 Dumps Questions Answers

Page: 1 / 10
Total 269 questions

CompTIA A+ Core 2 2025 Exam Questions and Answers

Question 1

You have been contacted through the help desk chat application. A user is setting up a replacement SOHO router. Assist the user with setting up the router.

INSTRUCTIONS

Select the most appropriate statement for each response. Click the send button after each response to continue the chat.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Question 2

You are configuring a home network for a customer. The customer has requested the ability to access a Windows PC remotely, and needs all chat and optional functions to work in their game console.

INSTRUCTIONS

Use the drop-down menus to complete the network configuration for the customer. Each option may only be used once, and not all options will be used.

Then, click the + sign to place each device in its appropriate location.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Wireless AP LAN

Firewall Screened Subnet

Options:

Question 3

Welcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

INSTRUCTIONS

Click on individual tickets to see the ticket details, and view applicable attachments to

determine the problem.

Select the appropriate issue from the ' Issue ' drop-down menu. Then, select the most

efficient resolution from the ' Resolution ' drop-down menu. Finally, select the proper

command or verification to remediate or confirm your fix of the issue from the

' Verify/Resolve ' drop-down menu.

Options:

Question 4

Welcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

INSTRUCTIONS

Click on individual tickets to see the ticket details, and view applicable attachments to

determine the problem.

Select the appropriate issue from the ' Issue ' drop-down menu. Then, select the most

efficient resolution from the ' Resolution ' drop-down menu. Finally, select the proper

command or verification to remediate or confirm your fix of the issue from the

' Verify/Resolve ' drop-down menu.

Options:

Question 5

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users’ audio issues are resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 6

As a corporate technician, you are asked to evaluate several suspect email messages on a client ' s computer. Corporate policy requires the following:

> All phishing attempts must be reported.

> Future spam emails to users must be prevented.

INSTRUCTIONS

Review each email and perform the following within the email:

> Classify the emails

> Identify suspicious items, if applicable, in each email

> Select the appropriate resolution

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 7

A user reports that after a recent software deployment to upgrade the Testing application, they can no longer use it. However, other employees can successfully

use the Testing program.

INSTRUCTIONS

Review the information in each tab to verify the results of the deployment and resolve

any issues discovered by selecting the:

· First command to resolve the issue

· Second command to resolve the issue

Options:

Question 8

Options:

A.

Linux

B.

Chrome OS

C.

Windows

D.

macOS

Question 9

A user reports that double-clicking an application ' s shortcut fails to launch the program. A technician believes the application process is running in the background in an unresponsive state. Which of the following tools should the technician use to resolve the issue?

Options:

A.

Resource Monitor

B.

Task Manager

C.

Event Viewer

D.

Registry Editor

Question 10

A technician needs to provide remote support for a legacy Linux-based operating system from their Windows laptop. The solution needs to allow the technician to see what the user is doing and provide the ability to interact with the user ' s session. Which of the following remote access technologies would support the use case?

Options:

A.

VPN

B.

VNC

C.

SSH

D.

RDP

Question 11

A technician thinks that an application a user downloaded from the internet may not be the legitimate one, even though the name is the same. The technician needs to confirm whether the application is legitimate. Which of the following should the technician do?

Options:

A.

Compare the hash value from the vendor.

B.

Run Task Manager and compare the process ID.

C.

Run the application in safe mode.

D.

Verify the file name is correct.

Question 12

A technician is securing a newly deployed workstation. Only authorized users should access it. Which actions should the technician take? (Select two)

Options:

A.

Defragment the hard drive

B.

Enable SSH

C.

Enable screensaver locks

D.

Disable iCloud integration

E.

Enable the firewall

F.

Apply the BIOS password

Question 13

Options:

A.

WinRM

B.

RMM

C.

Videoconferencing

D.

Secure file transfer

Question 14

A technician is working on a complex, large-scale software deployment. In which of the following places would the technician most likely reference deployment instructions?

Options:

A.

File server

B.

User ' s desktop

C.

Email

D.

Internal wiki

Question 15

A technician wants to create new partitions on a device so that a user can keep work data and personal data separate. Which of the following tools should the technician use?

Options:

A.

perfmon.msc

B.

diskmgmt.msc

C.

lusrmgr.msc

D.

devmgmt.msc

Question 16

A Windows 11 Home device is receiving constant pop-ups about an urgent need to update antivirus software to remove a detected threat. The user has been clicking the " X " button in the window frame but it always reappears. The pop-up includes an " OK " button to install the update and remove the threat. Which of the following should the user do next?

Options:

A.

Click the " OK " button to install the update

B.

Reinstall the Windows Operating System

C.

Run System File Checker

D.

Verify the current status and settings of protection measures

Question 17

Options:

A.

ReFS

B.

XFS

C.

APFS

D.

exFAT

Question 18

A user wants to dispose of a failed hard drive in a way that ensures the data is unrecoverable. Which of the following is the best at-home method?

Options:

A.

Standard formatting

B.

Low-level formatting

C.

Shredding

D.

Degaussing

E.

Drilling

Question 19

A technician completes the installation of an OS that appears to be successful. However, when the technician removes the USB drive that was used for the installation and restarts the system, the error “No boot device found” appears. Which of the following should the technician do next to resolve the issue?

Options:

A.

Reinstall the OS from a new ISO

B.

Enable UEFI devices in the BIOS

C.

Restart in recovery mode and troubleshoot

D.

Install storage drivers for the motherboard

E.

Reseat the SATA cable

Question 20

A user takes an iOS-based smartphone to a repair shop due to performance issues. The technician observes:

Battery charge: 25%

Battery health: 90%

Hotspot: On

Used space: 63.76GB / 64GB

Which of the following is the most likely cause of the performance issue?

Options:

A.

The device is running out of free space

B.

The battery health is low

C.

The phone is not sufficiently charged

D.

The hotspot is degrading the performance

E.

Too many applications are open

Question 21

Options:

A.

The DNS settings are incorrect.

B.

The firewall configuration is wrong.

C.

IPv6 is enabled on the computer.

D.

The computer is not connected to the network.

Question 22

Why would a network engineering team provide a help desk technician with IP addresses for a wired network segment?

Options:

A.

Only specific DNS servers are allowed outbound.

B.

The network allow list is set to a specific address.

C.

DHCP is not enabled for this subnet.

D.

NAC servers only allow security updates to be installed.

Question 23

Options:

A.

Folder permissions

B.

Outdated definitions

C.

Port security not enabled

D.

User account permissions

Question 24

Which of the following prevents forced entry into a building?

Options:

A.

PIV card

B.

Motion-activated lighting

C.

Video surveillance

D.

Bollard

Question 25

Which of the following Microsoft Windows versions would most likely be installed on a server?

Options:

A.

Windows 10 Enterprise

B.

Windows 11 Pro

C.

Windows Server 2022

D.

Windows 22H2

Question 26

An administrator is investigating a technical outage. The management team wants information that includes the summary of the outage and actions taken. Which of the following documentation should the administrator provide?

Options:

A.

Knowledge base article

B.

Non-disclosure agreement

C.

Incident report

D.

Standard operating procedure

Question 27

Options:

A.

Privacy

B.

Accessibility

C.

Finder

D.

iCloud (corrected from “iCIoud”)

Question 28

Options:

A.

Windows 10 Home

B.

Windows 11 Home

C.

Windows 11 Pro

D.

Windows 11 SE

Question 29

After using a third-party disk optimization software package, a technician restarts a laptop and receives the message " No operating system found. " The technician verifies that the BIOS properly recognizes the SSD. Which of the following should the technician do next?

Options:

A.

Update BitLocker settings in the BIOS

B.

Replace the CMOS battery

C.

Boot from installation media and repair the MBR

D.

Isolate the system from the corporate network

Question 30

A user hears an unexpected noise coming from their desktop computer. To troubleshoot the issue, a technician needs to open the case. Which of the following actions should the technician take next?

Options:

A.

Open the system cover

B.

Ground the system

C.

Disconnect the power

D.

Remove any peripheral devices

Question 31

A user ' s application only works with a legacy version of the OS. The OS is reaching its end-of-life date. For security reasons, the company is migrating to the current version of the OS. Which of the following is the most efficient way to complete the migration while maintaining accessibility to the application?

Options:

A.

Terminal server

B.

Bare-metal server

C.

Multiboot

D.

Virtualization

Question 32

A technician is setting up a Windows server to allow remote desktop connections for multiple users. Which of the following should the technician configure on the workstation?

Options:

A.

Firewall

B.

Computer Management

C.

User Accounts

D.

Ease of Access

Question 33

A user installed a free application from an unofficial application store. Now, their smartphone displays random pop-ups and shows increased data usage. Additionally, the user cannot perform certain actions such as opening banking applications or updating their OS. Which of the following should the user do first to address the security issues on their smartphone?

Options:

A.

Perform a factory reset

B.

Clear the device cache

C.

Contact the manufacturer ' s support line

D.

Change all passwords on the device

Question 34

Performance on a user’s smartphone is degrading. Applications take a long time to start, and switching between apps is slow. Which of the following diagnostic steps should a mobile technician take first?

Options:

A.

Restore the phone to factory settings

B.

Restart the phone

C.

Check the phone’s battery state

D.

Uninstall unneeded applications

Question 35

A company ' s IT department discovers that unauthorized software has been installed on several workstations. The IT manager requests a review and an update of the workstation security posture, focusing on preventing future unauthorized software installations. Which of the following should the company do?

Options:

A.

Remove account administrative rights

B.

Turn on the workstation firewall

C.

Enable Windows Defender SmartScreen

D.

Install EDR on all devices

Question 36

A utility failure causes a workstation to immediately shut down. Which of the following would help prevent this from reoccurring?

Options:

A.

Surge suppressor

B.

Uninterruptible power supply

C.

Line voltage regulator

D.

Redundant PSU

Question 37

A user needs to test several software replacement possibilities. Part of the process involves installing the different software options on a corporate-imaged sandboxed PC. Which of the following is the best option to allow the user to install the required software?

Options:

A.

Make the user a member of Domain Admins

B.

Add the user to the local Administrators group

C.

Let the user use credentials from another user who has rights

D.

Give the user the local, high-privileged account password

Question 38

Options:

A.

Wait until the next monthly patch is issued and deploy it with those updates.

B.

Immediately deploy the patch to all company-owned computers.

C.

Delay the patch deployment to not interfere with the production environment.

D.

Deploy the patch to a small number of computers in order to test it in a lab.

Question 39

A user receives a new personal computer but is unable to run an application. An error displays saying that .NET Framework 3.5 is required and not found. Which of the following actions is the best way to resolve this issue?

Options:

A.

Resolve the dependency through the ' Turn Windows features on or off ' menu.

B.

Download the dependency via a third-party repository.

C.

Ignore the dependency and install the latest version 4 instead.

D.

Forward the trouble ticket to the SOC team because the issue poses a great security risk.

Question 40

A technician is troubleshooting a print spooler that fails to start on a Windows 11 desktop computer. The technician determines the root cause is that required dependencies are failing to run. Which of the following tools is the technician using?

Options:

A.

Process

B.

Services

C.

Startup

D.

Performance

Page: 1 / 10
Total 269 questions