Pre-Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

CompTIA 220-1202 CompTIA A+ Core 2 2025 Exam Exam Practice Test

Demo: 47 questions
Total 265 questions

CompTIA A+ Core 2 2025 Exam Questions and Answers

Question 1

A technician needs to disable guest log-ins on domain-joined desktop machines. Which of the following should be used?

Options:

A.

Group Policy

B.

Firewall

C.

Microsoft Management Console

D.

MSConfig

Question 2

Which of the following types of social engineering attacks sends an unsolicited text message to a user ' s mobile device?

Options:

A.

Impersonation

B.

Vishing

C.

Spear phishing

D.

Smishing

Question 3

A technician needs to map a shared drive from a command-line interface. Which of the following commands should the technician use?

Options:

A.

pathping

B.

nslookup

C.

net use

D.

tracert

Question 4

A technician completes the installation of an OS that appears to be successful. However, when the technician removes the USB drive that was used for the installation and restarts the system, the error “No boot device found” appears. Which of the following should the technician do next to resolve the issue?

Options:

A.

Reinstall the OS from a new ISO

B.

Enable UEFI devices in the BIOS

C.

Restart in recovery mode and troubleshoot

D.

Install storage drivers for the motherboard

E.

Reseat the SATA cable

Question 5

A user is experiencing issues with outdated images while browsing websites. Which of the following settings should a technician use to correct this issue?

Options:

A.

Administrative Tools

B.

Windows Defender Firewall

C.

Internet Options

D.

Ease of Access

Question 6

A company wants to perform an in-place upgrade of operating systems on all workstations. All types of removable storage are disabled for security reasons. Which of the following is the best way to upgrade while keeping security settings in place?

Options:

A.

Using an external hard drive to upgrade the OS

B.

Copying the ISO file to each workstation and executing

C.

Setting up image deployment for PXE

D.

Using a hardware token to access upgrade files

Question 7

An organization sees unauthorized apps installed and licensing prompts. What should the security team do?

Options:

A.

Deploy an internal PKI to filter encrypted web traffic.

B.

Remove users from the local admin group.

C.

Implement stronger controls to block suspicious websites.

D.

Enable stricter UAC settings on Windows.

Question 8

A Microsoft OS laptop user requests an alternative log-in authentication method because they have forgotten their password multiple times. Which of the following should a technician enable to satisfy this request?

Options:

A.

Single sign-on

B.

Windows Hello

C.

BitLocker

D.

User Account Control

Question 9

A technician needs to provide remote support for a legacy Linux-based operating system from their Windows laptop. The solution needs to allow the technician to see what the user is doing and provide the ability to interact with the user ' s session. Which of the following remote access technologies would support the use case?

Options:

A.

VPN

B.

VNC

C.

SSH

D.

RDP

Question 10

After using a third-party disk optimization software package, a technician restarts a laptop and receives the message “No operating system found.” The technician verifies that the BIOS properly recognizes the SSD. Which of the following should the technician do next?

Options:

A.

Update BitLocker settings in the BIOS

B.

Replace the CMOS battery

C.

Boot from installation media and repair the MBR

D.

Isolate the system from the corporate network

Question 11

A technician thinks that an application a user downloaded from the internet may not be the legitimate one, even though the name is the same. The technician needs to confirm whether the application is legitimate. Which of the following should the technician do?

Options:

A.

Compare the hash value from the vendor.

B.

Run Task Manager and compare the process ID.

C.

Run the application in safe mode.

D.

Verify the file name is correct.

Question 12

A company requires technicians to verify that files downloaded from the internet have not been modified. Which of the following should the technicians use for validation?

Options:

A.

Hashing

B.

SSL certificate

C.

Plug-in

D.

Extensions

Question 13

A user installed a free application from an unofficial application store. Now, their smartphone displays random pop-ups and shows increased data usage. Additionally, the user cannot perform certain actions such as opening banking applications or updating their OS. Which of the following should the user do first to address the security issues on their smartphone?

Options:

A.

Perform a factory reset.

B.

Clear the device cache.

C.

Contact the manufacturer’s support line.

D.

Change all passwords on the device.

Question 14

A Windows 11 Home device is receiving constant pop-ups about an urgent need to update antivirus software in order to remove a detected threat. The user has been clicking the " X " button but the window keeps reappearing. The pop-up includes an " OK " button to install the update. What should the user do next?

Options:

A.

Click the " OK " button to install the update

B.

Reinstall the Windows Operating System

C.

Run System File Checker

D.

Verify the current status and settings of protection measures

Question 15

A technician is using a credential manager to safeguard a large number of credentials. Which of the following is important for using this application?

Options:

A.

Restricted log-in times

B.

Secure master password

C.

TPM module

D.

Windows lock screen

Question 16

After installing a new video card in their workstation, a user reports that the workstation randomly crashes. The user updates the drivers according to the manufacturer’s recommendation, but the issue persists. Which of the following steps should a technician take next to troubleshoot the issue?

Options:

A.

Add additional fans for cooling.

B.

Check the anti-malware software for recent activity.

C.

Install third-party graphics drivers for better stability.

D.

Review system logs for error messages.

Question 17

A user reports that double-clicking an application ' s shortcut fails to launch the program. A technician believes the application process is running in the background in an unresponsive state. Which of the following tools should the technician use to resolve the issue?

Options:

A.

Resource Monitor

B.

Task Manager

C.

Event Viewer

D.

Registry Editor

Question 18

A customer’s laptop will not turn on. The customer is distraught and panicking because the laptop contains family pictures that can never be replaced. Which of the following communication techniques is most important for the technician to demonstrate in this situation?

Options:

A.

The technician should provide the customer with the appropriate SLA

B.

The technician should inform the customer about replacement options for an increased cost

C.

The technician should project confidence and maintain a positive attitude

D.

The technician should be dressed in appropriate business casual attire

Question 19

A small office reported a phishing attack that resulted in a malware infection. A technician is investigating the incident and has verified the following:

● All endpoints are updated and have the newest EDR signatures.

● Logs confirm that the malware was quarantined by EDR on one system.

● The potentially infected machine was reimaged.

Which of the following actions should the technician take next?

Options:

A.

Install network security tools to prevent downloading infected files from the internet

B.

Discuss the cause of the issue and educate the end user about security hygiene

C.

Flash the firmware of the router to ensure the integrity of network traffic

D.

Suggest alternate preventative controls that would include more advanced security software

Question 20

A user has rooted their corporate phone to load unapproved software. Which of the following tools should the company use to prevent access to the corporate network?

Options:

A.

Mobile device management

B.

Encryption

C.

Geofencing

D.

Lock screen

Question 21

Options:

A.

A drawn pattern

B.

A fingerprint

C.

A password

D.

A PIV card (corrected from “APIV card”)

Question 22

A company ' s IT department discovers that unauthorized software has been installed on several workstations. The IT manager requests a review and an update of the workstation security posture, focusing on preventing future unauthorized software installations. Which of the following should the company do?

Options:

A.

Remove account administrative rights

B.

Turn on the workstation firewall

C.

Enable Windows Defender SmartScreen

D.

Install EDR on all devices

Question 23

An international traveler is concerned about others accessing the contents of their smartphone if it is lost or stolen. The traveler has enabled biometrics. Which of the following additional security measures further reduces the risk of unauthorized data access?

Options:

A.

Remote backups

B.

Location tracking

C.

PIN code screen lock

D.

Device encryption

Question 24

A technician needs to download and install a new web browser on a desktop. Which attribute should be used to verify the installer ' s authenticity?

Options:

A.

Date

B.

Hash

C.

Size

D.

Name

Question 25

A technician is installing a cloud-based productivity suite and gets an error saying the installation is unavailable. What should be tried first?

Options:

A.

Reinstall the productivity suite

B.

Download an open-source alternative

C.

Check the license device limit

D.

Update the device OS

Question 26

Which of the following describes an attack in which an attacker sets up a rogue AP that tricks users into connecting to the rogue AP instead of the legitimate network?

Options:

A.

Stalkerware

B.

Evil twin

C.

Tailgating

D.

Shoulder surfing

Question 27

Options:

A.

Transfer the user to the next tier.

B.

Ask the user to submit a formal complaint about the issue.

C.

Continue working on the issue independently.

D.

Explain the issue and the need for collaboration.

Question 28

A technician needs to install an operating system on a large number of workstations. Which of the following is the fastest method?

Options:

A.

Physical media

B.

Mountable ISO

C.

Manual installation

D.

Image deployment

Question 29

What is the next step a technician should take after completing malware cleanup?

Options:

A.

Perform a secondary antivirus scan

B.

Educate the end user

C.

Reimage the computer

D.

Review system logs

Question 30

Which of the following is used to detect and record access to restricted areas?

Options:

A.

Bollards

B.

Video surveillance

C.

Badge readers

D.

Fence

Question 31

An administrator received an email stating that the OS they are currently supporting will no longer be issued security updates and patches. Which of the following is most likely the reason the administrator received this message?

Options:

A.

Support from the computer’s manufacturer is expiring

B.

The OS will be considered end of life

C.

The built-in security software is being removed from the next OS version

D.

A new version of the OS will be released soon

Question 32

Options:

A.

Folder permissions

B.

Outdated definitions

C.

Port security not enabled

D.

User account permissions

Question 33

A customer calls the help desk to report issues with internet connectivity. The customer is frustrated after speaking with multiple representatives who were unable to resolve the issue. A technician reviews the customer’s file and sees several unresolved tickets. Which of the following actions should the technician take to communicate properly and professionally?

Options:

A.

Ask the customer to clarify the issue right away

B.

Escalate the issue without further conversation

C.

Listen to the customer’s concerns and acknowledge their frustrations

D.

Explain that previous technicians followed standard procedure

Question 34

A technician needs to change hibernation settings on a Windows computer via a batch file. Domain policies are unavailable. Which is the best method?

Options:

A.

Use Power Options in Control Panel

B.

Update the computer’s firmware

C.

Run gpupdate from command prompt

D.

Use the powercfg command in PowerShell

Question 35

Options:

A.

USB speed

B.

GPU requirements

C.

NIC bandwidth

D.

PSU wattage

Question 36

Which of the following must be followed during incident response to ensure the collected evidence is properly handled and accounted for?

Options:

A.

Order of volatility for data

B.

Law enforcement notification procedures

C.

Data integrity best practices

D.

Chain of custody process

Question 37

After a user installs a mobile application from an advertisement, the phone ' s battery dies a few hours later and becomes hot to touch, even when not in use. Which of the following should a technician do first?

Options:

A.

Check for unauthorized device administrators

B.

Contact the software developer

C.

Run a mobile malware scan on the phone

D.

Ensure appropriate MDM policies are applied

Question 38

A user installed a free application from an unofficial application store. Now, their smartphone displays random pop-ups and shows increased data usage. Additionally, the user cannot perform certain actions such as opening banking applications or updating their OS. Which of the following should the user do first to address the security issues on their smartphone?

Options:

A.

Perform a factory reset

B.

Clear the device cache

C.

Contact the manufacturer ' s support line

D.

Change all passwords on the device

Question 39

Recently, the number of users sharing smartphone passcodes has increased. The management team wants a technician to deploy a more secure screen lock method. Which of the following technologies should the technician use?

Options:

A.

Pattern lock

B.

Facial recognition

C.

Device encryption

D.

Multifactor authentication

Question 40

The battery on a user’s smartphone discharges quickly during travel. The phone was replaced two weeks ago. What should the technician do first?

Options:

A.

Replace the battery with a higher capacity option

B.

Provide an external battery

C.

Ensure the charging port is working

D.

Look for applications that are reporting the highest utilization

Question 41

Welcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

INSTRUCTIONS

Click on individual tickets to see the ticket details, and view applicable attachments to

determine the problem.

Select the appropriate issue from the ' Issue ' drop-down menu. Then, select the most

efficient resolution from the ' Resolution ' drop-down menu. Finally, select the proper

command or verification to remediate or confirm your fix of the issue from the

' Verify/Resolve ' drop-down menu.

Options:

Question 42

You have been contacted through the help desk chat application. A user is setting up a replacement SOHO router. Assist the user with setting up the router.

INSTRUCTIONS

Select the most appropriate statement for each response. Click the send button after each response to continue the chat.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 43

A user reports that after a recent software deployment to upgrade the Testing application, they can no longer use it. However, other employees can successfully

use the Testing program.

INSTRUCTIONS

Review the information in each tab to verify the results of the deployment and resolve

any issues discovered by selecting the:

· First command to resolve the issue

· Second command to resolve the issue

Options:

Question 44

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users’ audio issues are resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 45

As a corporate technician, you are asked to evaluate several suspect email messages on a client ' s computer. Corporate policy requires the following:

> All phishing attempts must be reported.

> Future spam emails to users must be prevented.

INSTRUCTIONS

Review each email and perform the following within the email:

> Classify the emails

> Identify suspicious items, if applicable, in each email

> Select the appropriate resolution

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 46

You are configuring a home network for a customer. The customer has requested the ability to access a Windows PC remotely, and needs all chat and optional functions to work in their game console.

INSTRUCTIONS

Use the drop-down menus to complete the network configuration for the customer. Each option may only be used once, and not all options will be used.

Then, click the + sign to place each device in its appropriate location.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Wireless AP LAN

Firewall Screened Subnet

Options:

Question 47

Welcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

INSTRUCTIONS

Click on individual tickets to see the ticket details, and view applicable attachments to

determine the problem.

Select the appropriate issue from the ' Issue ' drop-down menu. Then, select the most

efficient resolution from the ' Resolution ' drop-down menu. Finally, select the proper

command or verification to remediate or confirm your fix of the issue from the

' Verify/Resolve ' drop-down menu.

Options:

Demo: 47 questions
Total 265 questions