Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

220-1102 CompTIA A+ Certification Core 2 Exam Free Practice Exam Questions (2025 Updated)

Prepare effectively for your CompTIA 220-1102 CompTIA A+ Certification Core 2 Exam certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 4 / 7
Total 845 questions

An analyst needs GUI access to server software running on a macOS server. Which of the following options provides the BEST way for the analyst to access the macOS server from the Windows workstation?

A.

RDP through RD Gateway

B.

Apple Remote Desktop

C.

SSH access with SSH keys

D.

VNC with username and password

A technician received a call stating that all files in a user's documents folder appear to be Changed, and each of the files now has a look file

extension Which pf the following actions is the FIRST step the technician should take?

A.

Runa live disk clone.

B.

Run a full antivirus scan.

C.

Use a batch file to rename the files-

D.

Disconnect the machine from the network

A help desk team lead contacts a systems administrator because the technicians are unable to log in to a Linux server that is used to access tools. When the administrator tries to use remote desktop to log in to the server, the administrator sees the GUI is crashing. Which of the following methods can the administrator use to troubleshoot the server effectively?

A.

SFTP

B.

SSH

C.

VNC

D.

MSRA

A macOS user needs to create another virtual desktop space. Which of the following applications will allow the user to accomplish this task?

A.

Dock

B.

Spotlight

C.

Mission Control

D.

Launchpad

A technician is troubleshooting a computer with a suspected short in the power supply. Which of the following is the FIRST step the technician should take?

A.

Put on an ESD strap

B.

Disconnect the power before servicing the PC.

C.

Place the PC on a grounded workbench.

D.

Place components on an ESD mat.

A technician is troubleshooting a lack of outgoing audio on a third-party Windows 10 VoIP application, The PC uses a USB microphone connected to a powered hub. The technician verifies the microphone works on the PC using Voice Recorder. Which of the following should the technician do to solve the issue?

A.

Remove the microphone from the USB hub and plug it directly into a USB port on the PC.

B.

Enable the microphone under Windows Privacy settings to allow desktop applications to access it.

C.

Delete the microphone from Device Manager and scan for new hardware,

D.

Replace the USB microphone with one that uses a traditional 3.5mm plug.

A technician downloaded software from the Internet that required the technician to scroll through a text box and at the end of the text box, click a

button labeled Accept Which of the following agreements IS MOST likely in use?

A.

DRM

B.

NDA

C.

EULA

D.

MOU

A user is having issues with document-processing software on a Windows workstation. Other users that log in to the same device do not have the same issue.

Which of the following should a technician do to remediate the issue?

A.

Roll back the updates.

B.

Increase the page file.

C.

Update the drivers.

D.

Rebuild the profile.

Which of the following operating systems is most commonly used in embedded systems?

A.

Chrome OS

B.

macOS

C.

Windows

D.

Linux

When a user is in the office, the user's mobile phone loads applications and web browses very slowly on a cellular connection. Which of the following is the best way to fix this issue?

    Connect to the company's Wi-Fi network.

A.

Change the settings on the phone to connect to a different cellular tower.

B.

Install a cellular repeater at the office for this user.

C.

Update all applications on the phone.

A technician receives an invalid certificate error when visiting a website. Other workstations on the same local network are unable to replicate this issue. Which of the following is most likely causing the issue?

A.

Date and time

B.

User access control

C.

UEFI boot mode

D.

Log-on times

Which of the following is used to ensure users have the appropriate level of access to perform their job functions?

A.

Access control list

B.

Multifactor authentication

C.

Least privilege

D.

Mobile device management

A technician is unable to completely start up a system. The OS freezes when the desktop background appears, and the issue persists when the system is restarted. Which of the following should the technician do next to troubleshoot the issue?

A.

Disable applicable BIOS options.

B.

Load the system in safe mode.

C.

Start up using a flash drive OS and run System Repair.

D.

Enable Secure Boot and reinstall the system.

Maintaining the chain of custody is an important part of the incident response process. Which of the following reasons explains why this is important?

A.

To maintain an information security policy

B.

To properly identify the issue

C.

To control evidence and maintain integrity

D.

To gather as much information as possible

A user's company phone was stolen. Which of the following should a technician do next?

A.

Perform a low-level format.

B.

Remotely wipe the device.

C.

Degauss the device.

D.

Provide the GPS location of the device.

A customer installed a new web browser from an unsolicited USB drive that the customer received in the mail. The browser is not working as expected, and internet searches are redirected to another site. Which of the following should the user do next after uninstalling the browser?

A.

Delete the browser cookies and history.

B.

Reset all browser settings.

C.

Change the browser default search engine.

D.

Install a trusted browser.

A user is setting up backups on a workstation. The user wants to ensure that the restore process is as simple as possible. Which of the following backup types should the user select?

A.

Full

B.

Incremental

C.

Differential

D.

Synthetic

A management team at a small office wants to block access to inappropriate websites and create a log of these access attempts. Which of the following is a way to meet these requirements?

A.

Content filter

B.

Screened subnet

C.

Port forwarding

D.

Access control list

A systems administrator received a request to limit the amount of cellular data a user's Windows 10 tablet can utilize when traveling. Which of the following can the administrator do to best solve the user's issue?

A.

Turn on airplane mode.

B.

Set the connection to be metered.

C.

Configure the device to use a static IP address.

D.

Enable the Windows Defender Firewall.

A remote user's smartphone is performing very slowly. The user notices that the performance improves slightly after rebooting but then reverts back to performing slowly. The user also notices that the phone does not get any faster after connecting to the company's corporate guest network. A technician sees that the phone has a large number of applications installed on it. Which of the following is the most likely cause of the issue?

A.

The user is in a poor signal area.

B.

The user has too many processes running.

C.

The smartphone has malware on it.

D.

The smartphone has been jailbroken.

A technician is familiar with most personnel at a customer's location and has clearance to work unsupervised. Which of the following describes how the technician should handle personal communication while on site?

A.

Respond to calls and text messages while on site but not when working directly with personnel.

B.

Respond to calls and text messages only from family.

C.

Respond to calls and text messages only when an emergency situation requires a response.

D.

Respond to calls and text messages discreetly while on site.

A client wants a technician to set up a proxy server in a branch office to manage internet access. This involves configuring the workstations to use the new proxy server. Which of the following Internet Options tabs in Control Panel would be most appropriate for the technician to use to configure the settings?

A.

Privacy

B.

Advanced

C.

Content

D.

Connections

E.

Security

A technician needs to track evidence for a forensic investigation on a Windows computer. Which of the following describes this process?

A.

Valid license

B.

Data retention requirements

C.

Material safety data sheet

D.

Chain of custody

A user is unable to access a remote server from a corporate desktop computer using the appropriate terminal emulation program. The user contacts the help desk to report the issue. Which of the following clarifying questions would be most effective for the help desk technician to ask the user in order to understand the issue?

A.

What is the error message?

B.

Does the program work on another computer?

C.

Did the program ever work?

D.

Is anyone else having this issue?

A Windows computer is experiencing slow performance when the user tries to open programs and files. The user recently installed a new software program from an external website.

Various websites are being redirected to an unauthorized site, and Task Manager shows the CPU usage is consistently at 100%. Which of the following should the technician do first?

A.

Uninstall the new program.

B.

Check the HOSTS file.

C.

Restore from a previous backup.

D.

Clear the web browser cache.

Which of the following are mobile operating systems used on smartphones? (Select two).

A.

macOS

B.

Windows

C.

Chrome OS

D.

Linux

E.

iOS

F.

Android

Which of the following filesystems replaced FAT as the preferred filesystem for Microsoft Windows OS?

A.

APFS

B.

FAT32

C.

NTFS

D.

ext4

A technician requires graphical remote access to various Windows, Linux, and macOS desktops on the company LAN. The security administrator asks the technician to utilize a single software solution that does not require an external internet connection. Which of the following remote access tools is the technician most likely to install?

A.

VNC

B.

RMM

C.

RDP

D.

SSH

An office is experiencing constant connection attempts to the corporate Wi-Fi. Which of the following should be disabled to mitigate connection attempts?

    SSID

A.

DHCP

B.

Firewall

C.

SSD

A user's computer unexpectedly shut down immediately after the user plugged in a USB headset. Once the user turned the computer back on, everything was functioning properly, including the headset. Which of the following Microsoft tools would most likely be used to determine the root cause?

A.

Event Viewer

B.

System Configuration

C.

Device Manager

D.

Performance Monitor

Which of the following items require special e-waste recycling? (Select two).

    Solid-state drive

A.

A/C adapter

B.

Surge protector

C.

Laptop battery

D.

CRT monitor

E.

Power supply

An organization is updating the monitors on kiosk machines. While performing the upgrade, the organization would like to remove physical input devices. Which of the following utilities in the Control Panel can be used to turn on the on-screen keyboard to replace the physical input devices?

    Devices and Printers

A.

Ease of Access

B.

Programs and Features

C.

Device Manager

Which of the following does MFA provide?

A.

Security enhancement

B.

Encryption

C.

Digital signature

D.

Public key infrastructure

A technician needs to perform after-hours service starting at 10:00 p.m. The technician is currently 20 minutes late. The customer will also be late. Which of the following should the technician do considering proper communication techniques and professionalism?

    Do not notify the customer if arriving before the customer.

A.

Dismiss the customer and proceed with the after-hours work.

B.

Contact the customer if the technician is arriving late.

C.

Disclose the experience via social media.

Which of the following would typically require the most computing resources from the host computer?

    Chrome OS

A.

Windows

B.

Android

C.

macOS

D.

Linux

A technician has verified a computer is infected with malware. The technician isolates the system and updates the anti-malware software. Which of the following should the technician do next?

A.

Run one scan and schedule future scans.

B.

Back up the uninfected files and reimage the computer.

C.

Restore the clean backup copies of the infected files.

D.

Run repeated remediation scans until the malware is removed.

A hotel's Wi-Fi was used to steal information on a corporate laptop. A technician notes the following security log:

SRC: 192.168.1.1/secrets.zip Protocol SMB >> DST: 192.168.1.50/capture

The technician analyses the following Windows firewall information:

Which of the following protocols most likely allowed the data theft to occur?

A.

1

B.

53

C.

110

D.

445

A user's application is unresponsive. Which of the following Task Manager tabs will allow the user to address the situation?

A.

Startup

B.

Performance

C.

Application history

D.

Processes

A technician needs to reimage a desktop in an area without network access. Which of the following should the technician use? (Select two).

A.

USB

B.

PXE

C.

Optical media

D.

Partition

E.

Boot record

F.

SMB

A user reports that an air-gapped computer may have been infected with a virus after the user transferred files from a USB drive. The technician runs a computer scan with Windows Defender but does not find an infection. Which of the following actions should the technician take next? (Select two).

A.

Examine the event logs.

B.

Connect to the network.

C.

Document the findings.

D.

Update the definitions.

E.

Reimage the computer.

F.

Enable the firewall.

Page: 4 / 7
Total 845 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved