Month end Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

CompTIA 220-1202 CompTIA A+ Core 2 2025 Exam Exam Practice Test

Page: 1 / 21
Total 213 questions

CompTIA A+ Core 2 2025 Exam Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

Which of the following file types allows macOS users to uninstall software completely by placing the file in the trash?

Options:

A.

.app

B.

.msi

C.

.exe

D.

.rpm

E.

.pkg

Question 2

Which of the following is found in an MSDS sheet for a battery backup?

Options:

A.

Installation instructions

B.

Emergency procedures

C.

Configuration steps

D.

Voltage specifications

Question 3

A technician verifies that a malware incident occurred on some computers in a small office. Which of the following should the technician do next?

Options:

A.

Quarantine the infected systems

B.

Educate the end users

C.

Disable System Restore

D.

Update the anti-malware and scan the computers

Question 4

A user is trying to install a preferred word processor on their work laptop, but the installation fails each time. Which of the following is most likely the cause of this failure?

Options:

A.

Full browser cache

B.

Slow internet speeds

C.

Incorrectly configured ACL

D.

Unformatted hard drive

Question 5

A technician needs to disable guest log-ins on domain-joined desktop machines. Which of the following should the technician use?

Options:

A.

Group Policy

B.

Firewall

C.

Microsoft Management Control

D.

MSConfig

Question 6

A user notices that their smartphone's data usage has increased significantly even when the device is not in use. The phone feels warm, and its battery drains quickly. Which of the following should the user do to address this issue?

Options:

A.

Check for malicious applications

B.

Disable the Wi-Fi and mobile networks

C.

Reset the device to its factory defaults

D.

Enable airplane mode temporarily

Question 7

A user wants to dispose of a failed hard drive in a way that ensures the data is unrecoverable. Which of the following is the best at-home method?

Options:

A.

Standard formatting

B.

Low-level formatting

C.

Shredding

D.

Degaussing

E.

Drilling

Question 8

Thousands of compromised machines are attempting to make fake purchases from an online store. Which of the following is taking place?

Options:

A.

Brute-force attack

B.

Spoofing

C.

DDoS

D.

SQL injection

Question 9

A technician needs to map a shared drive from a command-line interface. Which of the following commands should the technician use?

Options:

A.

pathping

B.

nslookup

C.

net use

D.

tracert

Question 10

A help desk technician needs to remove RAM from retired workstations and upgrade other workstations that have applications that use more memory with this RAM. Which of the following actions would the technician most likely take?

Options:

A.

Demagnetize memory for security.

B.

Use antistatic bags for storage and transport.

C.

Plug in the power supply to ground each workstation.

D.

Install memory in identical pairs.

Question 11

A user is trying to install new software. The application downloads successfully, but when the user attempts to install it, the user receives a prompt for credentials. Which of the following would the technician most likely do to resolve this issue?

Options:

A.

Restart the user's computer

B.

Use a different web browser to download the application

C.

Change the User Account Control (UAC) settings

D.

Contact the software vendor for support

Question 12

A technician inspects the following workstation configuration:

The workstation is unable to open any external websites. The browser displays an error message that says that the site cannot be reached.

Options:

A.

The wrong DNS suffix is assigned.

B.

The workstation IP address is incorrect.

C.

The default gateway is not set.

D.

The subnet mask is incorrect

Question 13

Which of the following is an example of an application publisher including undisclosed additional software in an installation package?

Options:

A.

Virus

B.

Ransomware

C.

Potentially unwanted program

D.

Trojan

Question 14

An organization sees unauthorized apps installed and licensing prompts. What should the security team do?

Options:

A.

Deploy an internal PKI to filter encrypted web traffic.

B.

Remove users from the local admin group.

C.

Implement stronger controls to block suspicious websites.

D.

Enable stricter UAC settings on Windows.

Question 15

A user wants to dispose of a failed hard drive in a way that ensures the data is unrecoverable. Which of the following is the best at-home method?

Options:

A.

Standard formatting

B.

Low-level formatting

C.

Shredding

D.

Degaussing

E.

Drilling

Question 16

Various alerts on a user's Windows 11 laptop are continually interrupting videoconference calls. Which of the following should a support technician recommend to best solve the issue?

Options:

A.

Use multiple sound output devices for the various source applications

B.

Disable all notifications in different applications in the order they appear

C.

Configure the Sounds option in Control Panel to be set to No Sounds

D.

Set Windows Notifications settings to Do Not Disturb

Question 17

An engineer notices that many websites prompt users to input login and payment details. The engineer wants to require the browser to encrypt communications. Which of the following best helps to protect sensitive data?

Options:

A.

Disabling all cookies

B.

Disabling JavaScript

C.

Enabling a pop-up blocker

D.

Enabling HTTPS-Only Mode

Question 18

Which of the following Linux commands is used to read another command's documentation?

Options:

A.

chmod

B.

cat

C.

man

D.

sudo

Question 19

A technician reviews an organization's incident management policy. The organization uses a third-party vendor with multiple tools to protect its assets. What service type is this?

Options:

A.

PaaS

B.

EDR

C.

MDR

D.

XDR

Question 20

A technician is preparing to replace the batteries in a rack-mounted UPS system. After ensuring the power is turned off and the batteries are fully discharged, the technician needs to remove the battery modules from the bottom of the rack. Which of the following steps should the technician take?

Options:

A.

Ensure the fire suppression system is ready to be activated.

B.

Use appropriate lifting techniques and guidelines.

C.

Place the removed batteries in an antistatic bag.

D.

Wear a face mask to filter out any harmful fumes.

Question 21

An administrator is investigating a technical outage. The management team wants information that includes the summary of the outage and actions taken. Which of the following documentation should the administrator provide?

Options:

A.

Knowledge base article

B.

Non-disclosure agreement

C.

Incident report

D.

Standard operating procedure

Question 22

Technicians are failing to document user contact information, device asset tags, and a clear description of each issue in the ticketing system. What should the help desk management implement?

Options:

A.

Service-level agreements

B.

Call categories

C.

Standard operating procedures

D.

Knowledge base articles

Question 23

Due to recent security issues, the finance department requires a shorter screensaver timeout. Which of the following should a technician use to accomplish this task?

Options:

A.

gpedit.msc

B.

certmgr.msc

C.

devmgmt.msc

D.

perfmon.msc

Question 24

A user is attempting to open on a mobile phone a HD video that is hosted on a popular media streaming website. The user is receiving connection timeout errors. The mobile reception icon area is showing two bars next to 3G. Which of the following is the most likely cause of the issue?

Options:

A.

The user does not have Wi-Fi enabled.

B.

The website's subscription has run out.

C.

The bandwidth is not fast enough.

D.

The mobile device storage is full.

Question 25

A user's computer is running slowly. Web pages take several seconds to open, and applications are slow to respond. A technician opens the Windows Task Manager and sees the following:

Disk: 2%

Network: 12%

GPU: 15%

CPU: 70%

Memory: 97%

Which of the following would a technician most likely do to resolve the issue?

Options:

A.

Clear browser cached data

B.

Upgrade the network connection

C.

Close unnecessary programs

D.

Delete temporary files

Question 26

A technician thinks that an application a user downloaded from the internet may not be the legitimate one, even though the name is the same. The technician needs to confirm whether the application is legitimate. Which of the following should the technician do?

Options:

A.

Compare the hash value from the vendor.

B.

Run Task Manager and compare the process ID.

C.

Run the application in safe mode.

D.

Verify the file name is correct.

Question 27

Which of the following prevents forced entry into a building?

Options:

A.

PIV card

B.

Motion-activated lighting

C.

Video surveillance

D.

Bollard

Question 28

A high percentage of users at an office store documents on their local computers. The office needs to migrate to the next version of Windows. Which of the following methods should a technician use?

Options:

A.

Remote network install

B.

Zero-touch deployment

C.

In-place upgrades

D.

Clean install

Question 29

Which of the following filesystems supports read and write operations for Windows, macOS, and Linux?

Options:

A.

exFAT

B.

ReFS

C.

NTFS

D.

APFS

E.

ext4

Question 30

A help desk technician is setting up speech recognition on a Windows system. Which of the following settings should the technician use?

Options:

A.

Time and Language

B.

Personalization

C.

System

D.

Ease of Access

Question 31

A user cannot upload files to corporate servers from their mobile device when outside the office, but uploads work fine in-office. What should a technician do to determine the root cause?

Options:

A.

Check the data usage limit

B.

Enable airplane mode

C.

Verify the last device reboot

D.

Enable Bluetooth connectivity

Question 32

Which of the following file types would a desktop support technician most likely use to automate tasks for a Windows user log-in?

Options:

A.

.bat

B.

.sh

C.

.py

D.

.js

Question 33

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users’ audio issues are resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 34

As a corporate technician, you are asked to evaluate several suspect email messages on a client's computer. Corporate policy requires the following:

>All phishing attempts must be reported.

>Future spam emails to users must be prevented.

INSTRUCTIONS

Review each email and perform the following within the email:

>Classify the emails

>Identify suspicious items, if applicable, in each email

>Select the appropriate resolution

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 35

Welcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

INSTRUCTIONS

Click on individual tickets to see the ticket details, and view applicable attachments to

determine the problem.

Select the appropriate issue from the 'Issue' drop-down menu. Then, select the most

efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper

command or verification to remediate or confirm your fix of the issue from the

'Verify/Resolve' drop-down menu.

Options:

Question 36

You are configuring a home network for a customer. The customer has requested the ability to access a Windows PC remotely, and needs all chat and optional functions to work in their game console.

INSTRUCTIONS

Use the drop-down menus to complete the network configuration for the customer. Each option may only be used once, and not all options will be used.

Then, click the + sign to place each device in its appropriate location.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Wireless AP LAN

Firewall Screened Subnet

Options:

Question 37

A user reports that after a recent software deployment to upgrade the Testing application, they can no longer use it. However, other employees can successfully

use the Testing program.

INSTRUCTIONS

Review the information in each tab to verify the results of the deployment and resolve

any issues discovered by selecting the:

· First command to resolve the issue

· Second command to resolve the issue

Options:

Question 38

Welcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

INSTRUCTIONS

Click on individual tickets to see the ticket details, and view applicable attachments to

determine the problem.

Select the appropriate issue from the 'Issue' drop-down menu. Then, select the most

efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper

command or verification to remediate or confirm your fix of the issue from the

'Verify/Resolve' drop-down menu.

Options:

Question 39

You have been contacted through the help desk chat application. A user is setting up a replacement SOHO router. Assist the user with setting up the router.

INSTRUCTIONS

Select the most appropriate statement for each response. Click the send button after each response to continue the chat.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Page: 1 / 21
Total 213 questions