Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

220-1102 CompTIA A+ Certification Core 2 Exam Free Practice Exam Questions (2025 Updated)

Prepare effectively for your CompTIA 220-1102 CompTIA A+ Certification Core 2 Exam certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 7
Total 845 questions

Which of the following macOS features provides the user with a high-level view of all open windows?

A.

Mission Control

B.

Finder

C.

Multiple Desktops

D.

Spotlight

A technician is finalizing a new workstation for a user. The user's PC will be connected to the internet but will not require the same private address each time. Which of the following protocols will the technician MOST likely utilize?

A.

DHCP

B.

SMTP

C.

DNS

D.

RDP

A technician is troubleshooting an issue with a computer that contains sensitive information. The technician determines the computer needs to be taken off site for repair. Which of the following should the technician do NEXT?

A.

Remove the HDD and then send the computer for repair.

B.

Check corporate polices for guidance.

C.

Delete the sensitive information before the computer leaves the building.

D.

Get authorization from the manager.

A technician is troubleshooting a mobile device that was dropped. The technician finds that the screen (ails to rotate, even though the settings are correctly applied. Which of the following pieces of hardware should the technician replace to resolve the issue?

A.

LCD

B.

Battery

C.

Accelerometer

D.

Digitizer

A new employee was hired recently. Which of the following documents will the new employee need to sign before being granted login access to the network?

A.

MSDS

B.

EULA

C.

UAC

D.

AUP

A user added a second monitor and wants to extend the display to it. In which of the following Windows settings will the user MOST likely be able to make this change?

A.

System

B.

Devices

C.

Personalization

D.

Accessibility

Which of the following default system tools can be used in macOS to allow the technician to view the screen simultaneously with the user?

A.

Remote Assistance

B.

Remote Desktop Protocol

C.

Screen Sharing

D.

Virtual Network Computing

An IT security team is implementing a new Group Policy that will return a computer to the login after three minutes. Which of the following BEST describes the change in policy?

A.

Login times

B.

Screen lock

C.

User permission

D.

Login lockout attempts

A company needs employees who work remotely to have secure access to the corporate intranet. Which of the following should the company implement?

A.

Password-protected Wi-Fi

B.

Port forwarding

C.

Virtual private network

D.

Perimeter network

A technician installed a new application on a workstation. For the program to function properly, it needs to be listed in the Path Environment Variable. Which of the following Control Panel utilities should the technician use?

A.

System

B.

Indexing Options

C.

Device Manager

D.

Programs and Features

A technician is troubleshooting application crashes on a Windows workstation. Each time the workstation user tries to open a website in a browser, the following message is displayed:

crypt32.d11 is missing not found

Which of the following should the technician attempt FIRST?

A.

Rebuild Windows profiles.

B.

Reimage the workstation

C.

Roll back updates

D.

Perform a system file check

A systems administrator is creating periodic backups of a folder on a Microsoft Windows machine. The source data is very dynamic, and files are either added or deleted regularly. Which of the following utilities can be used to ‘mirror the source data for the backup?

A.

copy

B.

xcopy

C.

robocopy

D.

Copy-Item

A BSOD appears on a user's workstation monitor. The user immediately presses the power button to shut down the PC, hoping to repair the issue. The user then restarts the PC, and the BSOD reappears, so the user contacts the help desk. Which of the following should the technician use to determine the cause?

A.

Stop code

B.

Event Mewer

C.

Services

D.

System Configuration

Which of the following is the proper way for a technician to dispose of used printer consumables?

A.

Proceed with the custom manufacturer's procedure.

B.

Proceed with the disposal of consumables in standard trash receptacles.

C.

Empty any residual ink or toner from consumables before disposing of them in a standard recycling bin.

D.

Proceed with the disposal of consumables in standard recycling bins.

A technician is replacing the processor in a desktop computer prior to opening the computer, the technician wants to ensure the internal components are protected. Which of the following safety procedures would BEST protect the components in the PC? (Select TWO).

A.

Utilizing an ESD strap

B.

Disconnecting the computer from the power source

C.

Placing the PSU in an antistatic bag

D.

Ensuring proper ventilation

E.

Removing dust from the ventilation fans

F.

Ensuring equipment is grounded

A technician needs to format a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use?

A.

FAT32

B.

ext4

C.

NTFS

D.

exFAT

A change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process?

A.

End user acceptance

B.

Perform risk analysis

C.

Communicate to stakeholders

D.

Sandbox testing

When a user calls in to report an issue, a technician submits a ticket on the user's behalf. Which of the following practices should the technician use to make sure the ticket is associated with the correct user?

A.

Have the user provide a callback phone number to be added to the ticket

B.

Assign the ticket to the department's power user

C.

Register the ticket with a unique user identifier

D.

Provide the user with a unique ticket number that can be referenced on subsequent calls.

A user enabled a mobile device's screen lock function with pattern unlock. The user is concerned someone could access the mobile device by repeatedly attempting random patterns to unlock the device. Which of the following features BEST addresses the user's concern?

A.

Remote wipe

B.

Anti-maIware

C.

Device encryption

D.

Failed login restrictions

A technician needs to transfer a large number of files over an unreliable connection. The technician should be able to resume the process if the connection is interrupted. Which of the following tools can be used?

A.

afc

B.

ehkdsk

C.

git clone

D.

zobocopy

A user reports that the hard drive activity light on a Windows 10 desktop computer has been steadily lit for more than an hour, and performance is severely degraded. Which of the following tabs in Task Manager would contain the information a technician would use to identify the cause of this issue?

A.

Services

B.

Processes

C.

Performance

D.

Startup

A change advisory board did not approve a requested change due to the lack of alternative actions if implementation failed. Which of the following should be updated before requesting approval again?

A.

Scope of change

B.

Risk level

C.

Rollback plan

D.

End user acceptance

An architecture firm is considering upgrading its computer-aided design (CAD) software to the newest version that forces storage of backups of all CAD files on the software's cloud server. Which of the following is MOST likely to be of concern to the IT manager?

A.

All updated software must be tested with alt system types and accessories

B.

Extra technician hours must be budgeted during installation of updates

C.

Network utilization will be significantly increased due to the size of CAD files

D.

Large update and installation files will overload the local hard drives.

A user wants to set up speech recognition on a PC. In which of the following Windows Settings tools can the user enable this option?

A.

Language

B.

System

C.

Personalization

D.

Ease of Access

An incident handler needs to preserve evidence for possible litigation. Which of the following will the incident handler MOST likely do to preserve the evidence?

A.

Encrypt the files

B.

Clone any impacted hard drives

C.

Contact the cyber insurance company

D.

Inform law enforcement

A technician is unable to join a Windows 10 laptop to a domain Which of the following is the MOST likely reason?

A.

The domain's processor compatibility is not met

B.

The laptop has Windows 10 Home installed

C.

The laptop does not have an onboard Ethernet adapter

D.

The Laptop does not have all current Windows updates installed

A technician is troubleshooting an issue involving programs on a Windows 10 machine that are loading on startup but causing excessive boot times. Which of the following should the technician do to selectively prevent programs from loading?

A.

Right-click the Windows button, then select Run entering shell startup and clicking OK, and then move items one by one to the Recycle Bin

B.

Remark out entries listed HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>Windows>CurrentVersion>Run

C.

Manually disable all startup tasks currently listed as enabled and reboot checking for issue resolution at startup

D.

Open the Startup tab and methodically disable items currently listed as enabled and reboot, checking for issue resolution at each startup.

The command cac cor.ptia. txt was issued on a Linux terminal. Which of the following results should be expected?

A.

The contents of the text comptia.txt will be replaced with a new blank document

B.

The contents of the text comptia. txt would be displayed.

C.

The contents of the text comptia.txt would be categorized in alphabetical order.

D.

The contents of the text comptia. txt would be copied to another comptia. txt file

After clicking on a link in an email a Chief Financial Officer (CFO) received the following error:

The CFO then reported the incident to a technician. The link is purportedly to the organization's bank. Which of the following should the technician perform FIRST?

A.

Update the browser's CRLs

B.

File a trouble ticket with the bank.

C.

Contact the ISP to report the CFCs concern

D.

Instruct the CFO to exit the browser

A user attempts to open some files, but a message appears stating that the files are encrypted. The user was able to access these files before without receiving this message and no changes have been made within the company. Which of the following has infected the computer?

A.

Cryptominer

B.

Phishing

C.

Ransomware

D.

Keylogger

A technician needs to formal a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use?

A.

FAT32

B.

ext4

C.

NTFS

D.

exFAT

A user is having phone issues after installing a new application that claims to optimize performance. The user downloaded the application directly from the vendor's website and is now experiencing high network utilization and is receiving repeated security warnings. Which of the following should the technician perform FIRST to mitigate the issue?

A.

Reset the phone to factory settings

B.

Uninstall the fraudulent application

C.

Increase the data plan limits

D.

Disable the mobile hotspot.

Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

Click on individual tickers to see the ticket details. View attachments to determine the problem.

Select the appropriate issue from the 'issue' drop-down menu. Then, select the MOST efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper command or verification to remediate or confirm your fix of the issue from the Verify Resolve drop-down menu.

A technician needs to document who had possession of evidence at every step of the process. Which of the following does this process describe?

A.

Rights management

B.

Audit trail

C.

Chain of custody

D.

Data integrity

A user has requested help setting up the fingerprint reader on a Windows 10 laptop. The laptop is equipped with a fingerprint reader and is joined to a domain Group Policy enables Windows Hello on all computers in the environment. Which of the following options describes how to set up Windows Hello Fingerprint for the user?

A.

Navigate to the Control Panel utility, select the Security and Maintenance submenu, select Change Security and Maintenance settings, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete

B.

Navigate to the Windows 10 Settings menu, select the Accounts submenu, select Sign in options, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete.

C.

Navigate to the Windows 10 Settings menu, select the Update & Security submenu select Windows Security, select Windows Hello Fingerprint and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete

D.

Navigate to the Control Panel utility, select the Administrative Tools submenu, select the user account in the list, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete.

A user reports that antivirus software indicates a computer is infected with viruses. The user thinks this happened white browsing the internet. The technician does not recognize the interface with which the antivirus message is presented. Which of the following is the NEXT step the technician should take?

A.

Shut down the infected computer and swap it with another computer

B.

Investigate what the interface is and what triggered it to pop up

C.

Proceed with initiating a full scan and removal of the viruses using the presented interface

D.

Call the phone number displayed in the interface of the antivirus removal tool

Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?

A.

Acceptable use

B.

Chain of custody

C.

Security policy

D.

Information management

A user reports a PC is running slowly. The technician suspects it has a badly fragmented hard drive. Which of the following tools should the technician use?

A.

resmon exe

B.

msconfig.extf

C.

dfrgui exe

D.

msmfo32.exe

A user reports that a workstation is operating sluggishly Several other users operate on the same workstation and have reported that the workstation is operating normally. The systems administrator has validated that the workstation functions normally. Which of the following steps should the systems administrator most likely attempt NEXT?

A.

Increase the paging file size

B.

Run the chkdsk command

C.

Rebuild the user's profile

D.

Add more system memory.

E.

Defragment the hard drive.

Which of the following could be used to implement secure physical access to a data center?

A.

Geofence

B.

Alarm system

C.

Badge reader

D.

Motion sensor

Page: 2 / 7
Total 845 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved