Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

CompTIA 220-1202 CompTIA A+ Core 2 2025 Exam Exam Practice Test

Page: 1 / 16
Total 157 questions

CompTIA A+ Core 2 2025 Exam Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$43.75  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$38.5  $109.99
Question 1

A user has rooted their corporate phone to load unapproved software. Which of the following tools should the company use to prevent access to the corporate network?

Options:

A.

Mobile device management

B.

Encryption

C.

Geofencing

D.

Lock screen

Question 2

A user's computer is running slowly. Web pages take several seconds to open, and applications are slow to respond. A technician opens the Windows Task Manager and sees the following:

Disk: 2%

Network: 12%

GPU: 15%

CPU: 70%

Memory: 97%

Which of the following would a technician most likely do to resolve the issue?

Options:

A.

Clear browser cached data

B.

Upgrade the network connection

C.

Close unnecessary programs

D.

Delete temporary files

Question 3

A technician uses AI to draft a proposal about the benefits of new software. When reading the draft, the technician notices that the draft contains factually incorrect information. Which of the following best describes this scenario?

Options:

A.

Data privacy

B.

Hallucinations

C.

Appropriate use

D.

Plagiarism

Question 4

Which of the following is the best reason for a network engineering team to provide a help desk technician with IP addressing information to use on workstations being deployed in a secure network segment?

Options:

A.

Only specific DNS servers are allowed outbound access.

B.

The network allow list is set to a specific address.

C.

DHCP services are not enabled for this subnet.

D.

NAC servers only allow for security updates to be installed.

Question 5

A network technician notices that most of the company's network switches are now end-of-life and need to be upgraded. Which of the following should the technician do first?

Options:

A.

Implement the change

B.

Approve the change

C.

Propose the change

D.

Schedule the change

Question 6

Which of the following is an example of an application publisher including undisclosed additional software in an installation package?

Options:

A.

Virus

B.

Ransomware

C.

Potentially unwanted program

D.

Trojan

Question 7

A technician needs to provide remote support for a legacy Linux-based operating system from their Windows laptop. The solution needs to allow the technician to see what the user is doing and provide the ability to interact with the user's session. Which of the following remote access technologies would support the use case?

Options:

A.

VPN

B.

VNC

C.

SSH

D.

RDP

Question 8

An administrator is investigating a technical outage. The management team wants information that includes the summary of the outage and actions taken. Which of the following documentation should the administrator provide to the management team?

Options:

A.

Knowledge base article

B.

Non-disclosure agreement

C.

Incident report

D.

Standard operating procedure

Question 9

Which of the following filesystems supports read and write operations for Windows, macOS, and Linux?

Options:

A.

exFAT

B.

ReFS

C.

NTFS

D.

APFS

E.

ext4

Question 10

A user receives a new personal computer but is unable to run an application. An error displays saying that .NET Framework 3.5 is required and not found. Which of the following actions is the best way to resolve this issue?

Options:

A.

Resolve the dependency through the 'Turn Windows features on or off' menu.

B.

Download the dependency via a third-party repository.

C.

Ignore the dependency and install the latest version 4 instead.

D.

Forward the trouble ticket to the SOC team because the issue poses a great security risk.

Question 11

Every time a user loads a specific spreadsheet, their computer is temporarily unresponsive. The user also notices that the title bar indicates the application is not responding. Which of the following would a technician most likely inspect?

Options:

A.

Anti-malware logs

B.

Workstation repair options

C.

Bandwidth status as reported in the Task Manager

D.

File size and related memory utilization

Question 12

Why would a network engineering team provide a help desk technician with IP addresses for a wired network segment?

Options:

A.

Only specific DNS servers are allowed outbound.

B.

The network allow list is set to a specific address.

C.

DHCP is not enabled for this subnet.

D.

NAC servers only allow security updates to be installed.

Question 13

Which of the following are system folders on macOS? (Select two)

Options:

A.

Applications

B.

Spotlight

C.

Time Machine

D.

Library

E.

FileVault

F.

iCloud

Question 14

A Windows 11 Home device is receiving constant pop-ups about an urgent need to update antivirus software to remove a detected threat. The user has been clicking the "X" button in the window frame but it always reappears. The pop-up includes an "OK" button to install the update and remove the threat. Which of the following should the user do next?

Options:

A.

Click the "OK" button to install the update

B.

Reinstall the Windows Operating System

C.

Run System File Checker

D.

Verify the current status and settings of protection measures

Question 15

What is found in an MSDS (Material Safety Data Sheet) for a battery backup?

Options:

A.

Installation instructions

B.

Emergency procedures

C.

Configuration steps

D.

Voltage

Question 16

A user reports some single sign-on errors to a help desk technician. Currently, the user is able to sign in to the company's application portal but cannot access a specific SaaS-based tool. Which of the following would the technician most likely suggest as a next step?

Options:

A.

Reenroll the user's mobile device to be used as an MFA token

B.

Use a private browsing window to avoid local session conflicts

C.

Bypass single sign-on by directly authenticating to the application

D.

Reset the device being used to factory defaults

Question 17

Recently, the number of users sharing smartphone passcodes has increased. The management team wants a technician to deploy a more secure screen lock method. Which of the following technologies should the technician use?

Options:

A.

Pattern lock

B.

Facial recognition

C.

Device encryption

D.

Multifactor authentication

Question 18

Which of the following types of social engineering attacks sends an unsolicited text message to a user's mobile device?

Options:

A.

Impersonation

B.

Vishing

C.

Spear phishing

D.

Smishing

Question 19

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users’ audio issues are resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 20

Which of the following concepts should a technician consider when discussing confidential work projects with individuals outside the company?

Options:

A.

EULA

B.

EOL

C.

SLA

D.

NDA

Question 21

As a corporate technician, you are asked to evaluate several suspect email messages on a client's computer. Corporate policy requires the following:

>All phishing attempts must be reported.

>Future spam emails to users must be prevented.

INSTRUCTIONS

Review each email and perform the following within the email:

>Classify the emails

>Identify suspicious items, if applicable, in each email

>Select the appropriate resolution

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 22

An administrator received an email stating that the OS they are currently supporting will no longer be issued security updates and patches. Which of the following is most likely the reason the administrator received this message?

Options:

A.

Support from the computer’s manufacturer is expiring

B.

The OS will be considered end of life

C.

The built-in security software is being removed from the next OS version

D.

A new version of the OS will be released soon

Question 23

The battery on a user’s smartphone discharges quickly when the user travels. The smartphone was replaced two weeks ago. Which of the following should a technician do first?

Options:

A.

Replace the battery with a higher capacity option

B.

Provide an external battery to extend the usage time

C.

Ensure that the charging port is working as expected

D.

Look for applications that are reporting the highest utilization

Question 24

A user has been adding data to the same spreadsheet for several years. After adding a significant amount of data, they are now unable to open the file. Which of the following should a technician do to resolve the issue?

Options:

A.

Revert the spreadsheet to the last restore point.

B.

Increase the amount of RAM.

C.

Defragment the storage drive.

D.

Upgrade the network connection speed.

Question 25

A user logs in to a computer each morning and tries to print a daily report, but it will not print. The help desk resolves the issue each day temporarily. To fix this permanently, which of the following should the technician do? (Select two)

Options:

A.

Set the print spooler to have no dependencies

B.

Set the print spooler recovery to take no action

C.

Start the printer extensions and notifications service

D.

Start the print spooler service

E.

Set the print spooler to Automatic

F.

Set the print spooler log-on to the user's account

Question 26

Various alerts on a user's Windows 11 laptop are continually interrupting the user during videoconference calls. Which of the following should a support technician recommend to best solve the issue?

Options:

A.

Use multiple sound output devices for the various source applications

B.

Disable all notifications in different applications in the order they appear

C.

Configure the Sounds option in Control Panel to be set to No Sounds

D.

Set Windows Notifications settings to Do Not Disturb

Question 27

After installing new webcam software, a PC experiences BSOD during videoconference calls. What should the technician do next?

Options:

A.

Update the anti-malware signature and scan the system

B.

File a warranty claim with the manufacturer

C.

Start in Safe Mode and roll back the device driver

D.

Reconnect the webcam to the computer

Question 28

A user frequently misplaces their Windows laptop and is concerned about it being stolen. The user would like additional security controls on their laptop. Which of the following is a built-in technology that a technician can use to enable full drive encryption?

Options:

A.

Active Directory

B.

New Technology File System

C.

Encrypting File System

D.

BitLocker

Question 29

A user reports that their corporate mobile phone is lost. Which of the following protects the data locally on the phone from unauthorized access?

Options:

A.

Password manager

B.

Degaussing

C.

Remote wipe

D.

Antivirus

Question 30

A technician needs to change hibernation settings on a Windows computer via a batch file. Domain policies are unavailable. Which is the best method?

Options:

A.

Use Power Options in Control Panel

B.

Update the computer’s firmware

C.

Run gpupdate from command prompt

D.

Use the powercfg command in PowerShell

Question 31

A technician is 3-D printing high-strength, carbon fiber-based filament parts for a customer order. Which of the following is the most important for the technician to use?

Options:

A.

Steel-toed boots

B.

Air filter mask

C.

ESD mat

D.

Antistatic bags

Question 32

When a corporate laptop is connected to the company network, it can reach external websites. However, it cannot reach any internal websites, displaying the error message “Cannot reach this page.” Which of the following should a technician configure?

Options:

A.

Subnet mask

B.

DNS settings

C.

Default gateway

D.

DHCP

Question 33

What is the next step a technician should take after completing malware cleanup?

Options:

A.

Perform a secondary antivirus scan

B.

Educate the end user

C.

Reimage the computer

D.

Review system logs

Question 34

A customer’s laptop will not turn on. The customer is distraught and panicking because the laptop contains family pictures that can never be replaced. Which of the following communication techniques is most important for the technician to demonstrate in this situation?

Options:

A.

The technician should provide the customer with the appropriate SLA

B.

The technician should inform the customer about replacement options for an increased cost

C.

The technician should project confidence and maintain a positive attitude

D.

The technician should be dressed in appropriate business casual attire

Question 35

A technician is setting up a surveillance system for a customer. The customer wants access to the system's web interface on the LAN via the system’s IP address. Which of the following should the technician use to prevent external log-in attempts from the internet?

Options:

A.

Port mapping

B.

Subnetting

C.

Static IP

D.

Content filtering

Question 36

After completing malware removal steps, what is the next step the technician should take?

Options:

A.

Perform a secondary antivirus scan

B.

Educate the end user

C.

Reimage the computer

D.

Review system logs

Question 37

A help desk technician is setting up speech recognition on a Windows system. Which of the following settings should the technician use?

Options:

A.

Time and Language

B.

Personalization

C.

System

D.

Ease of Access

Question 38

A client reports that their browser's home page changed. Every time they run an internet search, the results are returned from unfamiliar websites. Which of the following actions should a technician take first to resolve the issue? (Select two)

Options:

A.

Clear the browsing history

B.

Run operating system updates

C.

Check the system date and time

D.

Uninstall malicious extensions

E.

Reset browser startup page

F.

Restart the user's machine

Question 39

A secretary receives an email from the CEO requesting immediate vendor payment. Later, the CEO says they never sent it. Which social engineering tactic is this?

Options:

A.

Evil twin

B.

Impersonation

C.

Whaling

D.

Spear phishing

Question 40

A user's new smartphone is not staying charged throughout the day. The smartphone charges fully every night. Which of the following should a technician review first to troubleshoot the issue?

Options:

A.

Storage usage

B.

End of software support

C.

Charger wattage

D.

Background applications

Question 41

A user wants to use a USB to move a 4.57GB .pst file from one Windows computer to another. Which of the following filesystems should the USB be formatted with?

Options:

A.

ext4

B.

NTFS

C.

FAT32

D.

APFS

Question 42

Performance on a user’s smartphone is degrading. Applications take a long time to start, and switching between apps is slow. Which of the following diagnostic steps should a mobile technician take first?

Options:

A.

Restore the phone to factory settings

B.

Restart the phone

C.

Check the phone’s battery state

D.

Uninstall unneeded applications

Question 43

Which of the following is used to apply corporate restrictions on an Apple device?

Options:

A.

App Store

B.

VPN configuration

C.

Apple ID

D.

Management profile

Question 44

Which of the following describes a vulnerability that has been exploited before a patch or remediation is available?

Options:

A.

Spoofing

B.

Brute-force

C.

DoS

D.

Zero-day

Question 45

A user logs in daily and cannot print a report. Help desk fixes it each day, but the issue recurs. What should be done so the issue doesn’t recur? (Select two)

Options:

A.

Set the print spooler to have no dependencies

B.

Set the print spooler recovery to take no action

C.

Start the printer extensions and notifications service

D.

Start the print spooler service

E.

Set the print spooler to Automatic

F.

Set the print spooler log-on to the user's account

Question 46

Which of the following authentication methods is the best way to prevent users from frequently entering their credentials?

Options:

A.

Access control list

B.

Single sign-on

C.

Multifactor authentication

D.

One-time password

Question 47

A desktop technician is mapping a remote Windows share \\WinNAS\shared as local drive Z:. Which command should the technician run?

Options:

A.

nslookup -opt 3: \WinNAS\shared

B.

net use 3: \WinNAS\shared

C.

chkdsk /R 2: \WinNAS\shared

D.

sfc /offwindir 3: \WinNAS\shared

Page: 1 / 16
Total 157 questions