Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

CompTIA 220-1202 CompTIA A+ Core 2 2025 Exam Exam Practice Test

Demo: 39 questions
Total 213 questions

CompTIA A+ Core 2 2025 Exam Questions and Answers

Question 1

A senior administrator asks a help desk technician to run a set of commands on a remote network switch. After running the commands, the technician needs to collect the output and provide it to the administrator. Which of the following should the technician use to fulfill the administrator's request?

Options:

A.

RDP

B.

WinRM

C.

SSH

D.

VNC

Question 2

Which of the following prevents forced entry into a building?

Options:

A.

PIV card

B.

Motion-activated lighting

C.

Video surveillance

D.

Bollard

Question 3

Which of the following is used to store passwords in macOS?

Options:

A.

FileVault

B.

Keychain

C.

Accessibility

D.

Mission Control

Question 4

Which of the following is a protocol that provides AAA for network services?

Options:

A.

RADIUS

B.

Kerberos

C.

TKIP

D.

WPA3

Question 5

A user needs to test several software replacement possibilities. Part of the process involves installing the different software options on a corporate-imaged sandboxed PC. Which of the following is the best option to allow the user to install the required software?

Options:

A.

Make the user a member of Domain Admins

B.

Add the user to the local Administrators group

C.

Let the user use credentials from another user who has rights

D.

Give the user the local, high-privileged account password

Question 6

An administrator received an email stating that the OS they are currently supporting will no longer receive security updates and patches. Which of the following is the most likely reason?

Options:

A.

Support from the computer’s manufacturer is expiring

B.

The OS will be considered end of life

C.

The built-in security software is being removed from the next OS version

D.

A new version of the OS will be released soon

Question 7

Which of the following is used to apply corporate restrictions on an Apple device?

Options:

A.

App Store

B.

VPN configuration

C.

Apple ID

D.

Management profile

Question 8

Which of the following is the best reason for a network engineering team to provide a help desk technician with IP addressing information to use on workstations being deployed in a secure network segment?

Options:

A.

Only specific DNS servers are allowed outbound access.

B.

The network allow list is set to a specific address.

C.

DHCP services are not enabled for this subnet.

D.

NAC servers only allow for security updates to be installed.

Question 9

Various alerts on a user's Windows 11 laptop are continually interrupting the user during videoconference calls. Which of the following should a support technician recommend to best solve the issue?

Options:

A.

Use multiple sound output devices for the various source applications

B.

Disable all notifications in different applications in the order they appear

C.

Configure the Sounds option in Control Panel to be set to No Sounds

D.

Set Windows Notifications settings to Do Not Disturb

Question 10

A technician thinks that an application a user downloaded from the internet may not be the legitimate one, even though the name is the same. The technician needs to confirm whether the application is legitimate. Which of the following should the technician do?

Options:

A.

Compare the hash value from the vendor.

B.

Run Task Manager and compare the process ID.

C.

Run the application in safe mode.

D.

Verify the file name is correct.

Question 11

A user recently installed an application that accesses a database from a local server. When launching the application, it does not populate any information. Which of the following command-line tools is the best to troubleshoot the issue?

Options:

A.

ipconfig

B.

nslookup

C.

netstat

D.

curl

Question 12

A desktop technician is mapping a remote Windows share \\WinNAS\shared as local drive Z:. Which command should the technician run?

Options:

A.

nslookup -opt 3: \WinNAS\shared

B.

net use 3: \WinNAS\shared

C.

chkdsk /R 2: \WinNAS\shared

D.

sfc /offwindir 3: \WinNAS\shared

Question 13

Company employees do not have assigned workspaces and regularly work at different computers and physical locations. Which of the following should the company implement to maintain data security and minimize the amount of user data that needs to be transferred?

Options:

A.

Centralized certificate storage

B.

Cloud email

C.

Portable drives

D.

Roaming profiles

Question 14

A technician needs to disable guest log-ins on domain-joined desktop machines. Which of the following should be used?

Options:

A.

Group Policy

B.

Firewall

C.

Microsoft Management Console

D.

MSConfig

Question 15

A technician is helping a remote user. The technician asks the user to open a specific folder on the root directory of the computer. The user cannot find a folder with that name. The technician explains that a few settings are needed to allow the folder to appear. Which of the following should the user do to be able to see the folder? (Select two).

Options:

A.

Adjust the display properties

B.

Open File Explorer

C.

Open the root drive properties

D.

Configure the system settings

E.

Set the view extensions to "on"

F.

Check the box to view hidden files

Question 16

An administrator is investigating a technical outage. The management team wants information that includes the summary of the outage and actions taken. Which of the following documentation should the administrator provide to the management team?

Options:

A.

Knowledge base article

B.

Non-disclosure agreement

C.

Incident report

D.

Standard operating procedure

Question 17

Which of the following Microsoft Windows versions would most likely be installed on a server?

Options:

A.

Windows 10 Enterprise

B.

Windows 11 Pro

C.

Windows Server 2022

D.

Windows 22H2

Question 18

A help desk technician needs to remove RAM from retired workstations and upgrade other workstations that have applications that use more memory with this RAM. Which of the following actions would the technician most likely take?

Options:

A.

Demagnetize memory for security.

B.

Use antistatic bags for storage and transport.

C.

Plug in the power supply to ground each workstation.

D.

Install memory in identical pairs.

Question 19

Performance on a user’s smartphone is degrading. Applications take a long time to start, and switching between windows also takes a long time. Which of the following diagnostic steps should a mobile technician take first?

Options:

A.

Restore the phone to factory settings

B.

Restart the phone

C.

Check the phone’s battery state

D.

Uninstall unneeded applications

Question 20

What is the next step a technician should take after completing malware cleanup?

Options:

A.

Perform a secondary antivirus scan

B.

Educate the end user

C.

Reimage the computer

D.

Review system logs

Question 21

MFA for a custom web application on a user's smartphone is no longer working. The last time the user remembered it working was before taking a vacation to another country. Which of the following should the technician do first?

Options:

A.

Verify the date and time settings

B.

Apply mobile OS patches

C.

Uninstall and reinstall the application

D.

Escalate to the website developer

Question 22

A user is trying to install a preferred word processor on their work laptop, but the installation fails each time. Which of the following is most likely the cause of this failure?

Options:

A.

Full browser cache

B.

Slow internet speeds

C.

Incorrectly configured ACL

D.

Unformatted hard drive

Question 23

After completing malware removal steps, what is the next step the technician should take?

Options:

A.

Perform a secondary antivirus scan

B.

Educate the end user

C.

Reimage the computer

D.

Review system logs

Question 24

A help desk technician recently installed an SSH client on a workstation in order to access remote servers. What does this enable?

Options:

A.

To utilize an SSO connection

B.

To securely establish a console session

C.

To encrypt and decrypt protected messages

D.

To facilitate device log reviews

Question 25

A user hears an unexpected noise coming from their desktop computer. To troubleshoot the issue, a technician needs to open the case. Which of the following actions should the technician take next?

Options:

A.

Open the system cover

B.

Ground the system

C.

Disconnect the power

D.

Remove any peripheral devices

Question 26

Which of the following methods would make data unrecoverable but allow the drive to be repurposed?

Options:

A.

Deleting the partitions

B.

Implementing EFS

C.

Performing a low-level format

D.

Degaussing the device

Question 27

A computer technician is implementing a solution to support a new internet browsing policy for a customer's business. The policy prohibits users from accessing unauthorized websites based on categorization. Which of the following should the technician configure on the SOHO router?

Options:

A.

Secure management access

B.

Group Policy Editor

C.

Content filtering

D.

Firewall

Question 28

A technician needs to disable guest log-ins on domain-joined desktop machines. Which of the following should the technician use?

Options:

A.

Group Policy

B.

Firewall

C.

Microsoft Management Control

D.

MSConfig

Question 29

A technician notices that the weekly backup is taking too long to complete. The daily backups are incremental. Which of the following would most likely resolve the issue?

Options:

A.

Changing the backup window

B.

Performing incremental weekly backups

C.

Increasing the backup storage

D.

Running synthetic full weekly backups

Question 30

An end user is unable to access the intranet. A technician needs to confirm whether the Windows web server is online and functioning. Which of the following default remote access technologies would the technician most likely use to remotely connect to the server?

Options:

A.

SPICE

B.

VNC

C.

RDP

D.

SSH

Question 31

A customer is unable to open some files on their system. Each time the customer attempts to open a file, the customer receives a message that the file is encrypted. Which of the following best describes this issue?

Options:

A.

Keylogger

B.

Ransomware

C.

Phishing

D.

Cryptominer

Question 32

Which of the following provides information to employees, such as permitted activities when using the organization's resources?

Options:

A.

AUP

B.

MNDA

C.

DRM

D.

EULA

Question 33

As a corporate technician, you are asked to evaluate several suspect email messages on a client's computer. Corporate policy requires the following:

>All phishing attempts must be reported.

>Future spam emails to users must be prevented.

INSTRUCTIONS

Review each email and perform the following within the email:

>Classify the emails

>Identify suspicious items, if applicable, in each email

>Select the appropriate resolution

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 34

Welcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

INSTRUCTIONS

Click on individual tickets to see the ticket details, and view applicable attachments to

determine the problem.

Select the appropriate issue from the 'Issue' drop-down menu. Then, select the most

efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper

command or verification to remediate or confirm your fix of the issue from the

'Verify/Resolve' drop-down menu.

Options:

Question 35

Welcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

INSTRUCTIONS

Click on individual tickets to see the ticket details, and view applicable attachments to

determine the problem.

Select the appropriate issue from the 'Issue' drop-down menu. Then, select the most

efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper

command or verification to remediate or confirm your fix of the issue from the

'Verify/Resolve' drop-down menu.

Options:

Question 36

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users’ audio issues are resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 37

A user reports that after a recent software deployment to upgrade the Testing application, they can no longer use it. However, other employees can successfully

use the Testing program.

INSTRUCTIONS

Review the information in each tab to verify the results of the deployment and resolve

any issues discovered by selecting the:

· First command to resolve the issue

· Second command to resolve the issue

Options:

Question 38

You have been contacted through the help desk chat application. A user is setting up a replacement SOHO router. Assist the user with setting up the router.

INSTRUCTIONS

Select the most appropriate statement for each response. Click the send button after each response to continue the chat.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 39

You are configuring a home network for a customer. The customer has requested the ability to access a Windows PC remotely, and needs all chat and optional functions to work in their game console.

INSTRUCTIONS

Use the drop-down menus to complete the network configuration for the customer. Each option may only be used once, and not all options will be used.

Then, click the + sign to place each device in its appropriate location.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Wireless AP LAN

Firewall Screened Subnet

Options:

Demo: 39 questions
Total 213 questions