Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

220-1102 CompTIA A+ Certification Core 2 Exam Free Practice Exam Questions (2025 Updated)

Prepare effectively for your CompTIA 220-1102 CompTIA A+ Certification Core 2 Exam certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 9
Total 840 questions

A network administrator is deploying a client certificate to be used for Wi-Fi access for all devices in an organization. The certificate will be used in conjunction with the user's existing username and password. Which of the following BEST describes the security benefits realized after this deployment?

A.

Multifactor authentication will be forced for Wi-Fi.

B.

All Wi-Fi traffic will be encrypted in transit.

C.

Eavesdropping attempts will be prevented.

D.

Rogue access points will not connect.

A company is deploying mobile phones on a one-to-one basis, but the IT manager is concerned that users will root/jailbreak their phones. Which of the following technologies can be implemented to prevent this issue?

A.

Signed system images

B.

Antivirus

C.

SSO

D.

MDM

A call center handles inquiries into billing issues for multiple medical facilities. A security analyst notices that call center agents often walk away from their workstations, leaving patient data visible for anyone to see. Which of the following should a network administrator do to BEST prevent data theft within the call center?

A.

Encrypt the workstation hard drives.

B.

Lock the workstations after five minutes of inactivity.

C.

Install privacy screens.

D.

Log off the users when their workstations are not in use.

A technician has just used an anti-malware removal tool to resolve a user's malware issue on a corporate laptop. Which of the following BEST describes what the technician should do before returning the laptop to the user?

A.

Educate the user on malware removal.

B.

Educate the user on how to reinstall the laptop OS.

C.

Educate the user on how to access recovery mode.

D.

Educate the user on common threats and how to avoid them.

A user is having issues with document-processing software on a Windows workstation. Other users that log in to the same device do not have the same issue.

Which of the following should a technician do to remediate the issue?

A.

Roll back the updates.

B.

Increase the page file.

C.

Update the drivers.

D.

Rebuild the profile.

An organization's Chief Financial Officer (CFO) is concerned about losing access to very sensitive, legacy unmaintained PII on a workstation if a

ransomware outbreak occurs. The CFO has a regulatory requirement to retain this data for many years. Which of the following backup methods

would BEST meet the requirements?

A.

A daily, incremental backup that is saved to the corporate file server

B.

An additional, secondary hard drive in a mirrored RAID configuration

C.

A full backup of the data that is stored of site in cold storage

D.

Weekly, differential backups that are stored in a cloud-hosting provider

A user is attempting to make a purchase at a store using a phone. The user places the phone on the payment pad, but the device does not recognize the phone. The user attempts to restart the phone but still has the same results. Which of the following should the user do to resolve the issue?

A.

Turn off airplane mode while at the register.

B.

Verify that NFC is enabled.

C.

Connect to the store's Wi-Fi network.

D.

Enable Bluetooth on the phone.

Each time a user tries to go to the selected web search provider, a different website opens. Which of the following should the technician check FIRST?

A.

System time

B.

IP address

C.

DNS servers

D.

Windows updates

A user has a license for an application that is in use on a personal home laptop. The user approaches a systems administrator about using the same license on

multiple computers on the corporate network. Which of the following BEST describes what the systems administrator should tell the user?

A.

Use the application only on the home laptop because it contains the initial license.

B.

Use the application at home and contact the vendor regarding a corporate license.

C.

Use the application on any computer since the user has a license.

D.

Use the application only on corporate computers.

A technician is tasked with configuring a computer for a visually impaired user. Which of the following utilities should the technician use?

A.

Device Manager

B.

System

C.

Ease of Access Center

D.

Programs and Features

Which of the following change management documents includes how to uninstall a patch?

A.

Purpose of change

B.

Rollback plan

C.

Scope of change

D.

Risk analysis

Following a recent power outage, several computers have been receiving errors when booting. The technician suspects file corruption has occurred. Which of the following steps should the technician try FIRST to correct the issue?

A.

Rebuild the Windows profiles.

B.

Restore the computers from backup.

C.

Reimage the computers.

D.

Run the System File Checker.

Which of the following file extensions are commonly used to install applications on a macOS machine? (Select THREE).

A.

.mac

B.

.Pkg

C.

.deb

D.

.dmg

E.

.msi

F.

.appx

G.

.app

An administrator has received approval for a change request for an upcoming server deployment. Which of the following steps should be completed NEXT?

A.

Perform a risk analysis.

B.

Implement the deployment.

C.

Verify end user acceptance

D.

Document the lessons learned.

A company has just refreshed several desktop PCs. The hard drives contain PII. Which of the following is the BEST method to dispose of the drives?

A.

Drilling

B.

Degaussing

C.

Low-level formatting

D.

Erasing/wiping

A technician just completed a Windows 10 installation on a PC that has a total of 16GB of RAM. The technician notices the Windows OS has only 4GB of RAM available for use. Which of the following explains why the OS can only access 46B of RAM?

A.

The UEFI settings need to be changed.

B.

The RAM has compatibility issues with Windows 10.

C.

Some of the RAM is defective.

D.

The newly installed OS is x86.

A team of support agents will be using their workstations to store credit card data. Which of the following should the IT department enable on the workstations in order to remain compliant with common regulatory controls? (Select TWO).

A.

Encryption

B.

Antivirus

C.

AutoRun

D.

Guest accounts

E.

Default passwords

F.

Backups

A macOS user reports seeing a spinning round cursor on a program that appears to be frozen. Which of the following methods does the technician use to force the program to close in macOS?

A.

The technician presses the Ctrl+Alt+Del keys to open the Force Quit menu, selects the frozenapplication in the list, and clicks Force Quit.

B.

The technician clicks on the frozen application and presses and holds the Esc key on the keyboard for 10 seconds Which causes the application to force quit.

C.

The technician opens Finder, navigates to the Applications folder, locates the application that is frozen in the list, right-clicks on the application, and selects the Force Quit option.

D.

The technician opens the Apple icon menu, selects Force Quit, selects the frozen application in thelist, and clicks Force Quit.

A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore. Which of the following would BEST accomplish this task?

A.

Differential backup

B.

Off-site backup

C.

Incremental backup

D.

Full backup

A user connected a laptop to a wireless network and was tricked into providing login credentials for a website. Which of the following threats was used to carry out the attack?

A.

Zero day

B.

Vishing

C.

DDoS

D.

Evil twin

A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions?

A.

Avoid distractions

B.

Deal appropriately with customer's confidential material .

C.

Adhere to user privacy policy

D.

Set and meet timelines

A user received the following error upon visiting a banking website:

The security presented by website was issued a different website' s address .

A technician should instruct the user to:

A.

clear the browser cache and contact the bank.

B.

close out of the site and contact the bank.

C.

continue to the site and contact the bank.

D.

update the browser and contact the bank.

A technician is working to resolve a Wi-Fi network issue at a doctor's office that is located next to an apartment complex. The technician discovers that employees and patients are not the only people on the network. Which of the following should the technician do to BEST minimize this issue?

A.

Disable unused ports.

B.

Remove the guest network

C.

Add a password to the guest network

D.

Change the network channel.

Which of the following data is MOST likely to be regulated?

A.

Name in a Phone book

B.

Name on a medical diagnosis

C.

Name on a job application

D.

Name on a employer's website

Which of the following is a consequence of end-of-lite operating systems?

A.

Operating systems void the hardware warranty.

B.

Operating systems cease to function.

C.

Operating systems no longer receive updates.

D.

Operating systems are unable to migrate data to the new operating system.

A desktop support technician is tasked with migrating several PCs from Windows 7 Pro to Windows 10 Pro, The technician must ensure files and user preferences are retained, must perform the operation locally, and should migrate one station at a time. Which of the following methods would be MOST efficient?

A.

Golden image

B.

Remote network install

C.

In-place upgrade

D.

Clean install

Which of the following is the MOST basic version of Windows that includes BitLocker?

A.

Home

B.

pro

C.

Enterprise

D.

Pro for Workstations

A technician received a call stating that all files in a user's documents folder appear to be Changed, and each of the files now has a look file

extension Which pf the following actions is the FIRST step the technician should take?

A.

Runa live disk clone.

B.

Run a full antivirus scan.

C.

Use a batch file to rename the files-

D.

Disconnect the machine from the network

A user's system is infected with malware. A technician updates the anti-malware software and runs a scan that removes the malware. After the user reboots the system, it once again becomes infected with malware. Which of the following will MOST likely help to permanently remove the malware?

A.

Enabling System Restore

B.

Educating the user

C.

Booting into safe mode

D.

Scheduling a scan

While browsing a website, a staff member received a message that the website could not be trusted. Shortly afterward, several other colleagues reported the same issue across numerous other websites. Remote users who were not connected to corporate resources did not have any issues. Which of the following is MOST likely the cause of this issue?

A.

A bad antivirus signature update was installed.

B.

A router was misconfigured and was blocking traffic.

C.

An upstream internet service provider was flapping.

D.

The time or date was not in sync with the website.

Page: 1 / 9
Total 840 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved