Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free and Premium CompTIA 220-1202 Dumps Questions Answers

Page: 1 / 12
Total 157 questions

CompTIA A+ Core 2 2025 Exam Questions and Answers

Question 1

Which of the following authentication methods is the best way to prevent users from frequently entering their credentials?

Options:

A.

Access control list

B.

Single sign-on

C.

Multifactor authentication

D.

One-time password

Buy Now
Question 2

Every time a user loads a specific spreadsheet, their computer is temporarily unresponsive. The user also notices that the title bar indicates the application is not responding. Which of the following would a technician most likely inspect?

Options:

A.

Anti-malware logs

B.

Workstation repair options

C.

Bandwidth status as reported in the Task Manager

D.

File size and related memory utilization

Question 3

An employee is trying to connect their company laptop to an airport’s Wi-Fi during a business trip. Once the network is connected, a pop-up window appears with the airport logo, which the employee quickly closes. The internet connection is not working properly. Which of the following should a help desk technician suggest?

Options:

A.

Look for a wall socket with RJ45 and try to connect the laptop to it

B.

Contact the airport IT department

C.

Tell the employee that company policy prohibits connection to public Wi-Fi

D.

Reconnect to the network and read the pop-up carefully

Question 4

Performance on a user’s smartphone is degrading. Applications take a long time to start, and switching between apps is slow. Which of the following diagnostic steps should a mobile technician take first?

Options:

A.

Restore the phone to factory settings

B.

Restart the phone

C.

Check the phone’s battery state

D.

Uninstall unneeded applications

Question 5

A technician installs VPN client software that has a software bug from the vendor. After the vendor releases an update to the software, the technician attempts to reinstall the software but keeps getting an error message that the network adapter for the VPN already exists. Which of the following should the technician do next to mitigate this issue?

Options:

A.

Run the latest OS security updates.

B.

Map the network adapter to the new software.

C.

Update the network adapter's firmware.

D.

Delete hidden network adapters.

Question 6

A town clerk wants to work from home and access documents on a town hall server. What should a technician set up?

Options:

A.

VNC

B.

RDP

C.

VPN

D.

SSH

Question 7

Which of the following is used to store passwords in macOS?

Options:

A.

FileVault

B.

Keychain

C.

Accessibility

D.

Mission Control

Question 8

A customer wants to be able to work from home but does not want to be responsible for bringing company equipment back and forth. Which of the following would allow the user to remotely access and use a Windows PC at the main office? (Choose two.)

Options:

A.

SPICE

B.

SSH

C.

RDP

D.

VPN

E.

RMM

F.

WinRM

Question 9

An administrator received an email stating that the OS they are currently supporting will no longer be issued security updates and patches. Which of the following is most likely the reason the administrator received this message?

Options:

A.

Support from the computer's manufacturer is expiring

B.

The OS will be considered end of life

C.

The built-in security software is being removed from the next OS version

D.

A new version of the OS will be released soon

Question 10

A technician is 3-D printing high-strength, carbon fiber-based filament parts for a customer order. Which of the following is the most important for the technician to use?

Options:

A.

Steel-toed boots

B.

Air filter mask

C.

ESD mat

D.

Antistatic bags

Question 11

An administrator is investigating a technical outage. The management team wants information that includes the summary of the outage and actions taken. Which of the following documentation should the administrator provide?

Options:

A.

Knowledge base article

B.

Non-disclosure agreement

C.

Incident report

D.

Standard operating procedure

Question 12

Users are reporting that an unsecured network is broadcasting with the same name as the normal wireless network. They are able to access the internet but cannot connect to the file share servers. Which of the following best describes this issue?

Options:

A.

Unreachable DNS server

B.

Virtual local area network misconfiguration

C.

Incorrect IP address

D.

Rogue wireless access point

Question 13

Which of the following malware types typically has very high computing resource usage?

Options:

A.

Rootkit

B.

Cryptominer

C.

Boot sector virus

D.

Trojan

Question 14

A computer technician is implementing a solution to support a new internet browsing policy for a customer's business. The policy prohibits users from accessing unauthorized websites based on categorization. Which of the following should the technician configure on the SOHO router?

Options:

A.

Secure management access

B.

Group Policy Editor

C.

Content filtering

D.

Firewall

Question 15

Technicians are failing to document user contact information, device asset tags, and a clear description of each issue in the ticketing system. Which of the following should a help desk management team implement for technicians to use on every call?

Options:

A.

Service-level agreements

B.

Call categories

C.

Standard operating procedures

D.

Knowledge base articles

Question 16

Which of the following types of social engineering attacks sends an unsolicited text message to a user's mobile device?

Options:

A.

Impersonation

B.

Vishing

C.

Spear phishing

D.

Smishing

Question 17

Technicians are failing to document user contact information, device asset tags, and a clear description of each issue in the ticketing system. What should the help desk management implement?

Options:

A.

Service-level agreements

B.

Call categories

C.

Standard operating procedures

D.

Knowledge base articles

Question 18

You have been contacted through the help desk chat application. A user is setting up a replacement SOHO router. Assist the user with setting up the router.

INSTRUCTIONS

Select the most appropriate statement for each response. Click the send button after each response to continue the chat.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 19

A user frequently misplaces their Windows laptop and is concerned about it being stolen. The user would like additional security controls on their laptop. Which of the following is a built-in technology that a technician can use to enable full drive encryption?

Options:

A.

Active Directory

B.

New Technology File System

C.

Encrypting File System

D.

BitLocker

Question 20

As a corporate technician, you are asked to evaluate several suspect email messages on a client's computer. Corporate policy requires the following:

>All phishing attempts must be reported.

>Future spam emails to users must be prevented.

INSTRUCTIONS

Review each email and perform the following within the email:

>Classify the emails

>Identify suspicious items, if applicable, in each email

>Select the appropriate resolution

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 21

A technician completes the installation of an OS that appears to be successful. However, when the technician removes the USB drive that was used for the installation and restarts the system, the error “No boot device found” appears. Which of the following should the technician do next to resolve the issue?

Options:

A.

Reinstall the OS from a new ISO

B.

Enable UEFI devices in the BIOS

C.

Restart in recovery mode and troubleshoot

D.

Install storage drivers for the motherboard

E.

Reseat the SATA cable

Question 22

An administrator received an email stating that the OS they are currently supporting will no longer receive security updates and patches. Which of the following is the most likely reason?

Options:

A.

Support from the computer’s manufacturer is expiring

B.

The OS will be considered end of life

C.

The built-in security software is being removed from the next OS version

D.

A new version of the OS will be released soon

Question 23

A technician verifies that a malware incident occurred on some computers in a small office. Which of the following should the technician do next?

Options:

A.

Quarantine the infected systems

B.

Educate the end users

C.

Disable System Restore

D.

Update the anti-malware and scan the computers

Question 24

Which of the following methods involves requesting a user's approval via a push notification to verify the user's identity?

Options:

A.

Call

B.

Authenticator

C.

Hardware token

D.

SMS

Question 25

A user wants to use a USB to move a 4.57GB .pst file from one Windows computer to another. Which of the following filesystems should the USB be formatted with?

Options:

A.

ext4

B.

NTFS

C.

FAT32

D.

APFS

Question 26

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users’ audio issues are resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 27

An administrator received an email stating that the OS they are currently supporting will no longer be issued security updates and patches. Which of the following is most likely the reason the administrator received this message?

Options:

A.

Support from the computer’s manufacturer is expiring

B.

The OS will be considered end of life

C.

The built-in security software is being removed from the next OS version

D.

A new version of the OS will be released soon

Question 28

A Chief Executive Officer wants to meet with remote employees in a way that will allow for communication and training. Which of the following software technologies is the best for this situation?

Options:

A.

Videoconferencing

B.

Screen sharing

C.

Remote Desktop

D.

Virtual desktop infrastructure

Question 29

Which of the following is the best reason for a network engineering team to provide a help desk technician with IP addressing information to use on workstations being deployed in a secure network segment?

Options:

A.

Only specific DNS servers are allowed outbound access.

B.

The network allow list is set to a specific address.

C.

DHCP services are not enabled for this subnet.

D.

NAC servers only allow for security updates to be installed.

Question 30

Which of the following is found in an MSDS sheet for a battery backup?

Options:

A.

Installation instructions

B.

Emergency procedures

C.

Configuration steps

D.

Voltage specifications

Question 31

An administrator is investigating a zero-day vulnerability. If left unpatched, it could severely impact business. The patch requires downtime. What should the administrator do?

Options:

A.

Create a standard change request.

B.

Implement an emergency change.

C.

Immediately freeze all changes.

D.

Continue operations until the next change interval.

Question 32

What is the next step a technician should take after completing malware cleanup?

Options:

A.

Perform a secondary antivirus scan

B.

Educate the end user

C.

Reimage the computer

D.

Review system logs

Question 33

An employee is using a photo editing program. Certain features are disabled and require a log-in, which the employee does not have. Which of the following is a way to resolve this issue?

Options:

A.

License assignment

B.

VPN connection

C.

Application repair

D.

Program reinstallation

Question 34

A user's new smartphone is not staying charged throughout the day. The smartphone charges fully every night. Which of the following should a technician review first to troubleshoot the issue?

Options:

A.

Storage usage

B.

End of software support

C.

Charger wattage

D.

Background applications

Question 35

A user is unable to use the latest version of an app on a legacy tablet. What is the most likely reason?

Options:

A.

The OS is end-of-life

B.

Space is inadequate

C.

MDM is blocking updates

D.

The tablet is infected with malware

Question 36

A technician is attempting to join a workstation to a domain but is receiving an error message stating the domain cannot be found. However, the technician is able to ping the server and access the internet. Given the following information:

IP Address – 192.168.1.210

Subnet Mask – 255.255.255.0

Gateway – 192.168.1.1

DNS1 – 8.8.8.8

DNS2 – 1.1.1.1

Server – 192.168.1.10

Which of the following should the technician do to fix the issue?

Options:

A.

Change the DNS settings.

B.

Assign a static IP address.

C.

Configure a subnet mask.

D.

Update the default gateway.

Question 37

A technician is deploying mobile devices and needs to prevent access to sensitive data if the devices are lost. Which of the following is the best way to prevent unauthorized access if the user is unaware that the phone is lost?

Options:

A.

Encryption

B.

Remote wipe

C.

Geofencing

D.

Facial recognition

Question 38

A technician uses AI to draft a proposal about the benefits of new software. When reading the draft, the technician notices that the draft contains factually incorrect information. Which of the following best describes this scenario?

Options:

A.

Data privacy

B.

Hallucinations

C.

Appropriate use

D.

Plagiarism

Question 39

After a user installs a mobile application from an advertisement, the phone's battery dies a few hours later and becomes hot to touch, even when not in use. Which of the following should a technician do first?

Options:

A.

Check for unauthorized device administrators

B.

Contact the software developer

C.

Run a mobile malware scan on the phone

D.

Ensure appropriate MDM policies are applied

Question 40

A Windows 11 Home device is receiving constant pop-ups about an urgent need to update antivirus software to remove a detected threat. The user has been clicking the "X" button in the window frame but it always reappears. The pop-up includes an "OK" button to install the update and remove the threat. Which of the following should the user do next?

Options:

A.

Click the "OK" button to install the update

B.

Reinstall the Windows Operating System

C.

Run System File Checker

D.

Verify the current status and settings of protection measures

Question 41

A user has been adding data to the same spreadsheet for several years. After adding a significant amount of data, they are now unable to open the file. Which of the following should a technician do to resolve the issue?

Options:

A.

Revert the spreadsheet to the last restore point.

B.

Increase the amount of RAM.

C.

Defragment the storage drive.

D.

Upgrade the network connection speed.

Question 42

A user is attempting to open on a mobile phone a HD video that is hosted on a popular media streaming website. The user is receiving connection timeout errors. The mobile reception icon area is showing two bars next to 3G. Which of the following is the most likely cause of the issue?

Options:

A.

The user does not have Wi-Fi enabled.

B.

The website's subscription has run out.

C.

The bandwidth is not fast enough.

D.

The mobile device storage is full.

Question 43

A technician is troubleshooting a print spooler that fails to start on a Windows 11 desktop computer. The technician determines the root cause is that required dependencies are failing to run. Which of the following tools is the technician using?

Options:

A.

Process

B.

Services

C.

Startup

D.

Performance

Question 44

After a recent mobile OS upgrade to a smartphone, a user attempts to access their corporate email, but the application does not open. A technician restarts the smartphone, but the issue persists. Which of the following is the most likely way to resolve the issue?

Options:

A.

Updating the failed software

B.

Registering the smartphone with an MDM solution

C.

Installing a third-party client

D.

Clearing the cache partition

Question 45

A user's computer is running slowly. Web pages take several seconds to open, and applications are slow to respond. A technician opens the Windows Task Manager and sees the following:

Disk: 2%

Network: 12%

GPU: 15%

CPU: 70%

Memory: 97%

Which of the following would a technician most likely do to resolve the issue?

Options:

A.

Clear browser cached data

B.

Upgrade the network connection

C.

Close unnecessary programs

D.

Delete temporary files

Question 46

A security administrator teaches all of an organization's staff members to use BitLocker To Go. Which of the following best describes the reason for this training?

Options:

A.

To ensure that all removable media is password protected in case of loss or theft

B.

To enable Secure Boot and a BIOS-level password to prevent configuration changes

C.

To enforce VPN connectivity to be encrypted by hardware modules

D.

To configure all laptops to use the TPM as an encryption factor for hard drives

Question 47

A technician needs to change hibernation settings on a Windows computer via a batch file. Domain policies are unavailable. Which is the best method?

Options:

A.

Use Power Options in Control Panel

B.

Update the computer’s firmware

C.

Run gpupdate from command prompt

D.

Use the powercfg command in PowerShell

Page: 1 / 12
Total 157 questions