Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

220-1102 CompTIA A+ Certification Core 2 Exam Free Practice Exam Questions (2025 Updated)

Prepare effectively for your CompTIA 220-1102 CompTIA A+ Certification Core 2 Exam certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 7
Total 845 questions

A user is unable to see transaction details on a website, and nothing happens when the user clicks the details button. Which of the following should the user do to fix this issue?

A.

Clear the browser cache.

B.

Disable the pop-up blocker.

C.

Configure private browsing.

D.

Verify valid certificates.

The following error is displayed on a user's computer screen:

No operating system found

Which of the following is the first troubleshooting step a technician should complete?

A.

Disconnect external storage

B.

Flash the BIOS

C.

Replace the SATA cable

D.

Turn on the device in safe mode

A vendor provided installation software on a DVD-ROM. The software is not available to download on the vendor’s website. The technician needs to install the software on several laptops that do not have an optical disc drive. The laptops are connected to the corporate network but are physically located at remote sites. Which of the following is the best installation method for the technician to use?

A.

Use a computer that has an optical disc drive to create an ISO file from the DVD-ROM, store the ISO file on the file server, connect remotely to each laptop, and install the software on each laptop using the ISO stored on the file server.

B.

Locate an external USB DVD-ROM optical disc drive, insert the DVD-ROM from the vendor into the drive, and install the software from the USB DVD-ROM optical disc drive.

C.

Use a computer that has an optical disc drive to create an ISO file from the DVD-ROM, copy the ISO file to a USB flash drive, and install the software from the USB flash drive.

D.

Locate an ISO file of the software from a website unrelated to the vendor, store the ISO file on the file server, connect remotely to each laptop, and install the software on each laptop using the ISO stored on the file server.

A company needs to securely and remotely access network devices. Which of the following will allow the company to access these devices?

A.

Telnet

B.

TKIP

C.

RDP

D.

SSH

Which of the following best describes XFS?

A.

A filesystem used by the Linux OS

B.

A filesystem used by iOS

C.

A filesystem used by the Windows OS

D.

A filesystem used by macOS

Employees want their Windows 10 laptops to wirelessly connect when they take them home. Which of the following should the employees configure so the laptops can automatically connect wirelessly?

A.

Network and Internet settings

B.

Windows Firewall settings

C.

Devices and Printers

D.

Personalization settings

Which of the following commands should a technician use to change user permissions?

A.

sudo

B.

chxod

C.

xv

D.

pwd

Due to special job responsibilities, an end user needs the ability to edit the properties of Windows system files. The user has already been granted local administrator privileges. Which of the following Control Panel utilities should be used to provide easy access to the files?

A.

File Explorer Options

B.

Ease of Access

C.

Indexing Options

D.

Administrative Tools

An application is not performing well and will occasionally shut down with no error provided. Which of the following Task Manager tabs should be used to troubleshoot the application while it is active?

A.

Users

B.

Services

C.

Performance

D.

Startup

Which of the following technologies is proprietary and can be configured to use MFA?

A.

MS-CHAPv2

B.

RADIUS

C.

Kerberos

D.

WPA2

A technician needs to disable guest log-ins on domain-joined desktop machines. Which of the following should the technician use?

A.

Group Policy

B.

Firewall

C.

Microsoft Management Control

D.

MSConfig

A technician is configuring remote access to a Linux server in a cloud environment for administration through a terminal window. Which of the following should the technician use to configure remote access?

A.

RDP

B.

VPN

C.

SSH

D.

RMM

A technician is upgrading the backup system for documents at a high-volume law firm. The current backup system can retain no more than three versions of full backups before failing. The law firm is not concerned about restore times but asks the technician to retain more versions when possible. Which of the following backup methods should the technician MOST likely implement?

A.

Full

B.

Mirror

C.

Incremental

D.

Differential

A user has been unable to receive emails or browse the internet from a smartphone while traveling. However, text messages and phone calls are working without issue. Which of the following should a support technician check FIRST?

A.

User account status

B.

Mobile OS version

C.

Data plan coverage

D.

Network traffic outages

A user lost a company tablet that was used for customer intake at a doctor's office. Which of the following actions would BEST protect against unauthorized access of the data?

A.

Changing the office's Wi-Fi SSID and password

B.

Performing a remote wipe on the device

C.

Changing the user's password

D.

Enabling remote drive encryption

Which of the following only has a web browser interface?

A.

Linux

B.

Microsoft Windows

C.

iOS

D.

Chromium

A user receives an error message from an online banking site that states the following:

Your connection is not private. Authority invalid.

Which of the following actions should the user take NEXT?

A.

Proceed to the site.

B.

Use a different browser.

C.

Report the error to the bank.

D.

Reinstall the browser.

A Windows user recently replaced a computer The user can access the public internet on the computer; however, an internal site at https7/companyintranet.com:8888 is no longer loading. Which of the following should a technician adjust to resolve the issue?

A.

Default gateway settings

B.

DHCP settings

C.

IP address settings

D.

Firewall settings

E.

Antivirus settings

A neighbor successfully connected to a user's Wi-Fi network. Which of the following should the user do after changing the network configuration to prevent the neighbor from being able to connect again?

A.

Disable the SSID broadcast.

B.

Disable encryption settings.

C.

Disable DHCP reservations.

D.

Disable logging.

A customer calls a service support center and begins yelling at a technician about a feature for a product that is not working to the customer's satisfaction. This feature is not supported by the service support center and requires a field technician to troubleshoot. The customer continues to demand service. Which of the following is the BEST course of action for the support center representative to take?

A.

Inform the customer that the issue is not within the scope of this department.

B.

Apologize to the customer and escalate the issue to a manager.

C.

Ask the customer to explain the issue and then try to fix it independently.

D.

Respond that the issue is something the customer should be able to fix.

After a recent mobile OS upgrade to a smartphone, a user attempts to access their corporate email, but the application does not open. A technician restarts the smartphone, but the issue persists. Which of the following is the most likely way to resolve the issue?

A.

Updating the failed software

B.

Registering the smartphone with an MDM solution

C.

Installing a third-party client

D.

Clearing the cache partition

A user is unable to log in to a workstation. The user reports an error message about the date being incorrect. A technician reviews the date and verifies it is correct, but the system clock is an hour behind. The technician also determines this workstation is the only one affected. Which of the following is the most likely issue?

A.

Time drift

B.

NTP failure

C.

Windows Update

D.

CMOS battery

Which of the following is protected by government policy for end-user information?

A.

DRM

B.

EULA

C.

PCI

D.

PII

A technician needs to configure a backup solution that will have the least additional expenses and impact on users. Which of the following steps should the technician complete? (Select two.)

A.

Configure the backup to run when the user logs in

B.

Configure the backup to run after peak hours

C.

Use third-party licensed backup software

D.

Use the built-in OS backup utility

E.

Configure the backup job to run every hour

F.

Use an external storage device for the backup

Which of the following techniques is used by a threat actor to obtain information through physical means?

A.

Denial of service

B.

Brute force

C.

Dumpster diving

D.

Evil twin

A company acquired a local office, and a technician is attempting to join the machines at the office to the local domain. The technician notes that the domain join option appears to be missing. Which of the following editions of Windows is MOST likely installed on the machines?

A.

Windows Professional

B.

Windows Education

C.

Windows Enterprise

D.

Windows Home

Which of the following would MOST likely be deployed to enhance physical security for a building? (Select TWO).

A.

Multifactor authentication

B.

Badge reader

C.

Personal identification number

D.

Firewall

E.

Motion sensor

F.

Soft token

A technician receives a call from a user who is unable to open Outlook. The user states that Outlook worked fine yesterday, but the computer may have restarted sometime overnight. Which of the following is the MOST likely reason Outlook has stopped functioning?

A.

Spam filter installation

B.

Invalid registry settings

C.

Malware infection

D.

Operating system update

Which of the following defines the extent of a change?

A.

Scope

B.

Purpose

C.

Analysis

D.

Impact

A technician needs to transfer a file to a user's workstation. Which of the following would BEST accomplish this task utilizing the workstation's built-in protocols?

A.

VPN

B.

SMB

C.

RMM

D.

MSRA

The audio on a user's mobile device is inconsistent when the user uses wireless headphones and moves around. Which of the following should a technician perform to troubleshoot the issue?

A.

Verify the Wi-Fi connection status.

B.

Enable the NFC setting on the device.

C.

Bring the device within Bluetooth range.

D.

Turn on device tethering.

A technician needs to add an individual as a local administrator on a Windows home PC. Which of the following utilities would the technician MOST likely use?

A.

Settings > Personalization

B.

Control Panel > Credential Manager

C.

Settings > Accounts > Family and Other Users

D.

Control Panel > Network and Sharing Center

A technician is securing a new Windows 10 workstation and wants to enable a Screensaver lock. Which of the following options in the Windows settings should the technician use?

A.

Ease of Access

B.

Privacy

C.

Personalization

D.

Update and Security

A user needs assistance changing the desktop wallpaper on a Windows 10 computer. Which of the following methods will enable the user to change the wallpaper using a Windows 10 Settings tool?

A.

Open Settings, select Accounts, select Your info, click Browse, and then locate and open the image the user wants to use as the wallpaper.

B.

Open Settings, select Personalization, click Browse, and then locate and open the image the user wants to use as the wallpaper.

C.

Open Settings, select System, select Display, click Browse, and then locate and open the image the user wants to use as the wallpaper.

D.

Open Settings, select Apps, select Apps & features, click Browse, and then locate and open the image the user wants to use as the wallpaper.

A user receives a call from someone who claims to be from the user's bank and requests information to ensure the user's account is safe. Which of the following social-engineering attacks is the user experiencing?

A.

Phishing

B.

Smishing

C.

Whaling

D.

Vishing

A technician is troubleshooting boot times for a user. The technician attempts to use MSConfig to see which programs are starting with the OS but receives a message that it can no longer be used to view startup items. Which of the following programs can the technician use to view startup items?

A.

msinfo32

B.

perfmon

C.

regedit

D.

taskmgr

Which of the following is MOST likely used to run .vbs files on Windows devices?

A.

winmgmt.exe

B.

powershell.exe

C.

cscript.exe

D.

explorer.exe

A data center is required to destroy SSDs that contain sensitive information. Which of the following is the BEST method to use for the physical destruction of SSDs?

A.

Wiping

B.

Low-level formatting

C.

Shredding

D.

Erasing

Which of the following should be used to secure a device from known exploits?

A.

Encryption

B.

Remote wipe

C.

Operating system updates

D.

Cross-site scripting

A user receives the following error while attempting to boot a computer.

BOOTMGR is missing

press Ctrl+Alt+Del to restart

Which of the following should a desktop engineer attempt FIRST to address this issue?

A.

Repair Windows.

B.

Partition the hard disk.

C.

Reimage the workstation.

D.

Roll back the updates.

Page: 1 / 7
Total 845 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved