220-1102 CompTIA A+ Certification Core 2 Exam Free Practice Exam Questions (2025 Updated)
Prepare effectively for your CompTIA 220-1102 CompTIA A+ Certification Core 2 Exam certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.
Employees at comptia.org are reporting getting an usual amount of emails from a coworker. A technician discovers the emails were sent from the following address:
john@cOmptia.org
Which of the following social engineering attacks is this an example of?
A technician is setting up a wireless network in a small, crowded office and wants to minimize Wi-Fi access. Which of the following security settings should the technician enable?
Users are reporting that an unsecured network is broadcasting with the same name as the normal wireless network. They are able to access the internet but cannot connect to the file share servers. Which of the following best describes this issue?
Which of the following is the weakest wireless security protocol?
A Windows user wants a filesystem that protects confidential data from attackers who have physical access to the system. Which of the following should the user choose?
A user reports that a system is performing unusually and is sending requests to an unfamiliar IP address every five minutes. Which of the following should the technician check first to troubleshoot the issue?
Which of the following can be used for multifactor authentication when logging in to a computer system? (Select two).
A technician is working at a client office site, and the technician’s family member repeatedly calls and texts about a non-emergency situation. Which of the following should the technician do?
Which of the following should be used to configure automatic backups on macOS?
After a user upgraded the Windows operating system to the latest feature release, the user notices that one of the legacy applications that was running correctly before the upgrade does not open some windows and is only partially functional. Which of the following actions should the user take to troubleshoot the issue?
A customer's machine is heavily infected with various strains of malware. Which of the following is the most efficient and verifiable way to ensure all of the malware is removed from the system?
After a recent mobile OS upgrade to a smartphone, a user attempts to access their corporate email, but the application does not open. A technician restarts the smartphone, but the issue persists. Which of the following is the most likely way to resolve the issue?
A security administrator teaches all of an organization's staff members to use BitLocker To Go. Which of the following best describes the reason for this training?
A business lost all data and equipment after a disaster. Due to the disaster, the business no longer maintains system backups. Which of the following should the business implement to prevent future losses?
An employee lost a smartphone and reported the loss to the help desk. The employee is concerned about the possibility of a breach of private data. Which of the following is the best way for a technician to protect the data on the phone?
Which of the following security threats requires a phone call to launch the attack?
An administrator's change was approved by the change management review board. Which of the following should the administrator do next?
A user downloaded a 64-bit version of a new software program, but the installation failed due to an error. Which of the following most likely caused the error?
A company downloads a large number of files over the internet daily. The company needs a way to ensure the files have not been modified or corrupted during the download process. Which of the following should the company do to verify the files?
An international traveler is concerned about others accessing the contents of their smartphone if it is lost or stolen. The traveler has enabled biometrics. Which of the following additional security measures would further reduce the risk of unauthorized data access?
When a user is in the office, web pages are loading slowly on the user’s phone. Which of the following best explains this issue?
A user's Android phone has been randomly restarting. A technician investigates and finds several applications have been installed that are not available within the standard marketplace. Which of the following is most likely the cause of the issue?
A technician needs to configure laptops so that only administrators can enable virtualization technology if needed. Which of the following should the technician configure?
Which of the following file types should be used to install software on a macOS computer? (Select two).
A technician is configuring a workstation's security settings, and the following options are available:
Account lockout policy
Group policy
Two-factor authentication
Password complexity requirements
Firewalls
User accounts
Access control lists
Antivirus software
Which of the following settings should the technician configure to deploy strong password enforcement across the enterprise?
A user identified that a program installed in a workstation does not have optional features enabled. Which of the following must the technician do to install the optional features?
h company uses shared drives as part of a workforce collaboration process. To ensure the correct access permissions, inheritance at the top-level folder is assigned to each department. A manager's team is working on confidential material and wants to ensure only the immediate team can view a specific folder and its subsequent files and subfolders. Which of the following actions should the technician most likely take?
A technician finds that a new company security policy has broken an application in use at a branch office. Which of the following should the technician do to ensure that the application is fixed and prevent the issue from reoccurring?
Several computers have been infected with malware, causing the company network to slow down and sensitive company information to be lost. The IT department installs new antivirus software to remove the malware and needs to decide the best method to prevent future malware infections. Which of the following methods would be the most effective?
A company has just refreshed several desktop PCs. The hard drives contain PII. Which of the following is the BEST method to dispose of the drives?