Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

220-1102 CompTIA A+ Certification Core 2 Exam Free Practice Exam Questions (2025 Updated)

Prepare effectively for your CompTIA 220-1102 CompTIA A+ Certification Core 2 Exam certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 7 / 9
Total 816 questions

Employees at comptia.org are reporting getting an usual amount of emails from a coworker. A technician discovers the emails were sent from the following address:

john@cOmptia.org

Which of the following social engineering attacks is this an example of?

A.

Whaling

B.

Insider threat

C.

Phishing

D.

Vishing

E.

Evil twin

A technician is setting up a wireless network in a small, crowded office and wants to minimize Wi-Fi access. Which of the following security settings should the technician enable?

A.

Port forwarding

B.

Unused ports

C.

SSID broadcast

D.

Allow list

Users are reporting that an unsecured network is broadcasting with the same name as the normal wireless network. They are able to access the internet but cannot connect to the file share servers. Which of the following best describes this issue?

A.

Unreachable DNS server

B.

Virtual local area network misconfiguration

C.

Incorrect IP address

D.

Rogue wireless access point

Which of the following is the weakest wireless security protocol?

A.

WEP

B.

WPA2

C.

TKIP

D.

AES

A Windows user wants a filesystem that protects confidential data from attackers who have physical access to the system. Which of the following should the user choose?

A.

ext

B.

APFS

C.

FAT

D.

EFS

A user reports that a system is performing unusually and is sending requests to an unfamiliar IP address every five minutes. Which of the following should the technician check first to troubleshoot the issue?

A.

Application logs

B.

Running processes

C.

Antivirus scans

D.

Recent system updates

Which of the following can be used for multifactor authentication when logging in to a computer system? (Select two).

A.

Mobile application

B.

Video surveillance

C.

Access control list

D.

Door locks

E.

Login script

F.

Short Message Service

A technician is working at a client office site, and the technician’s family member repeatedly calls and texts about a non-emergency situation. Which of the following should the technician do?

A.

Step aside and answer.

B.

Put the phone on silent.

C.

Text a reply.

D.

Ignore the phone and continue working.

Which of the following should be used to configure automatic backups on macOS?

A.

Mission Control

B.

Time Machine

C.

Disaster Recovery

D.

System Restore

After a user upgraded the Windows operating system to the latest feature release, the user notices that one of the legacy applications that was running correctly before the upgrade does not open some windows and is only partially functional. Which of the following actions should the user take to troubleshoot the issue?

A.

Run the application as Administrator.

B.

Raise the User Account Control level.

C.

Turn off Windows Defender Firewall.

D.

Disable compatibility mode for the application.

A customer's machine is heavily infected with various strains of malware. Which of the following is the most efficient and verifiable way to ensure all of the malware is removed from the system?

A.

Utilizing a system restore point

B.

Performing a clean OS installation

C.

Replacing damaged files with verified backups

D.

Utilizing multiple AV vendors to eradicate the infections

After a recent mobile OS upgrade to a smartphone, a user attempts to access their corporate email, but the application does not open. A technician restarts the smartphone, but the issue persists. Which of the following is the most likely way to resolve the issue?

A.

Updating the failed software

B.

Registering the smartphone with an MDM solution

C.

Installing a third-party client

D.

Clearing the cache partition

A security administrator teaches all of an organization's staff members to use BitLocker To Go. Which of the following best describes the reason for this training?

A.

To ensure that all removable media is password protected in case of loss or theft

B.

To enable Secure Boot and a BIOS-level password to prevent configuration changes

C.

To enforce VPN connectivity to be encrypted by hardware modules

D.

To configure all laptops to use the TPM as an encryption factor for hard drives

A business lost all data and equipment after a disaster. Due to the disaster, the business no longer maintains system backups. Which of the following should the business implement to prevent future losses?

A.

Test environment

B.

Local backups

C.

Cold site

D.

Cloud storage

An employee lost a smartphone and reported the loss to the help desk. The employee is concerned about the possibility of a breach of private data. Which of the following is the best way for a technician to protect the data on the phone?

A.

Remote lockBRemote wipe

B.

Remote access

C.

Remote encrypt

Which of the following security threats requires a phone call to launch the attack?

A.

Vishing

B.

XSS

C.

Spoofing

D.

DDoS

An administrator's change was approved by the change management review board. Which of the following should the administrator do next?

A.

Perform risk analysis.

B.

Assign a change coordinator.

C.

Implement the change.

D.

Verify testing results.

A user downloaded a 64-bit version of a new software program, but the installation failed due to an error. Which of the following most likely caused the error?

A.

The OS version is incompatible.

B.

The user needs to enable ActiveX.

C.

The .NET Framework needs to be updated.

D.

The user needs administrator privileges.

A company downloads a large number of files over the internet daily. The company needs a way to ensure the files have not been modified or corrupted during the download process. Which of the following should the company do to verify the files?

A.

Clear browsing data

B.

Install SSL certificates

C.

Check the hash value

D.

Use trusted sources

An international traveler is concerned about others accessing the contents of their smartphone if it is lost or stolen. The traveler has enabled biometrics. Which of the following additional security measures would further reduce the risk of unauthorized data access?

A.

Remote backups

B.

Location tracking

C.

PIN code screen lock

D.

Device encryption

When a user is in the office, web pages are loading slowly on the user’s phone. Which of the following best explains this issue?

A.

Exceeded the data usage limit

B.

Sluggish response time

C.

Degraded network service

D.

Low storage space

A user's Android phone has been randomly restarting. A technician investigates and finds several applications have been installed that are not available within the standard marketplace. Which of the following is most likely the cause of the issue?

A.

The OS update failed.

B.

The user downloaded malware.

C.

The device is In developer mode.

D.

The over-the-air carrier update failed.

A technician needs to configure laptops so that only administrators can enable virtualization technology if needed. Which of the following should the technician configure?

A.

BIOS password

B.

Guest account

C.

Screen lock

D.

AutoRun setting

Which of the following file types should be used to install software on a macOS computer? (Select two).

A.

.yum

B.

.pkg

C.

.msi

D.

.ps1

E.

.exe

F.

.dmg

A technician is configuring a workstation's security settings, and the following options are available:

    Account lockout policy

    Group policy

    Two-factor authentication

    Password complexity requirements

    Firewalls

    User accounts

    Access control lists

    Antivirus software

Which of the following settings should the technician configure to deploy strong password enforcement across the enterprise?

A.

Account lockout policy

B.

Group policy

C.

Two-factor authentication

D.

Access control lists

A user identified that a program installed in a workstation does not have optional features enabled. Which of the following must the technician do to install the optional features?

A.

Goto Programs andFeatures, uninstall the program, and reinstallit.

B.

Goto AdministrativeTools and edit System Configuration.

C.

Goto AdministrativeTools and run Disk Cleanup.

D.

Goto Programs andFeatures, select the program, and click onChange.

h company uses shared drives as part of a workforce collaboration process. To ensure the correct access permissions, inheritance at the top-level folder is assigned to each department. A manager's team is working on confidential material and wants to ensure only the immediate team can view a specific folder and its subsequent files and subfolders. Which of the following actions should the technician most likely take?

A.

Turn off inheritance on the requested folder only and set the requested permissions to each file manually.

B.

Turn off inheritance at the top-level folder and remove all inherited permissions.

C.

Turn off Inheritance at the top-level folder and set permissions to each file and subfolder manually.

D.

Turn off inheritance on the requested folder only, set the requested permissions, and then turn on inheritance under the child folders.

A technician finds that a new company security policy has broken an application in use at a branch office. Which of the following should the technician do to ensure that the application is fixed and prevent the issue from reoccurring?

A.

Request a policy exception be put in place while the application requirements are addressed

B.

Reinstall the affected software using local administrative rights for each computer

C.

Remove the new security settings and change the administrative accounts on the branch office computers to prevent the settings from being reapplied

D.

Research and procure a replacement application that is not adversely affected by the new policy

Several computers have been infected with malware, causing the company network to slow down and sensitive company information to be lost. The IT department installs new antivirus software to remove the malware and needs to decide the best method to prevent future malware infections. Which of the following methods would be the most effective?

A.

Encrypting data at rest

B.

Implementing firewalls

C.

Utilizing Intrusion detection systems

D.

Backing up data regularly

A company has just refreshed several desktop PCs. The hard drives contain PII. Which of the following is the BEST method to dispose of the drives?

A.

Drilling

B.

Degaussing

C.

Low-level formatting

D.

Erasing/wiping

Page: 7 / 9
Total 816 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved