Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

CompTIA 220-1202 CompTIA A+ Core 2 2025 Exam Exam Practice Test

Demo: 47 questions
Total 157 questions

CompTIA A+ Core 2 2025 Exam Questions and Answers

Question 1

After using a third-party disk optimization software package, a technician restarts a laptop and receives the message "No operating system found." The technician verifies that the BIOS properly recognizes the SSD. Which of the following should the technician do next?

Options:

A.

Update BitLocker settings in the BIOS

B.

Replace the CMOS battery

C.

Boot from installation media and repair the MBR

D.

Isolate the system from the corporate network

Question 2

Which of the following describes a vulnerability that has been exploited before a patch or remediation is available?

Options:

A.

Spoofing

B.

Brute-force

C.

DoS

D.

Zero-day

Question 3

Which of the following is found in an MSDS sheet for a battery backup?

Options:

A.

Installation instructions

B.

Emergency procedures

C.

Configuration steps

D.

Voltage specifications

Question 4

Which of the following describes an attack in which an attacker sets up a rogue AP that tricks users into connecting to the rogue AP instead of the legitimate network?

Options:

A.

Stalkerware

B.

Evil twin

C.

Tailgating

D.

Shoulder surfing

Question 5

A user takes an iOS-based smartphone that is performing slowly to a repair shop. A shop technician finds the following information:

Battery charge: 25%

Battery health: 90%

Hotspot: On

Mobile reception: |||

Roaming: Off

Used space: 63.76GB/64GB

Which of the following is the cause of the issue?

Options:

A.

The device is running out of free space

B.

The battery health is low

C.

The phone is not sufficiently charged

D.

The hotspot is degrading the performance

E.

Too many applications are open

Question 6

A customer’s computer does not have an active connection to the network. A technician goes through a few troubleshooting steps but is unable to resolve the issue. The technician has exhausted their knowledge. The customer expresses frustration at the time taken to resolve this issue. Which of the following should the technician do?

Options:

A.

Escalate the issue to a senior team member and provide next steps to the customer.

B.

Dismiss the customer and reschedule another troubleshooting session at a later date.

C.

Interrupt the customer and express that troubleshooting support tickets can take time.

D.

Maintain a positive attitude and continue to ask questions regarding the scope of the issue.

Question 7

After a user installs a mobile application from an advertisement, the phone's battery dies a few hours later, and it is hot to the touch, even when not in use. Which of the following should a technician do first?

Options:

A.

Check for unauthorized device administrators

B.

Contact the software developer

C.

Run a mobile malware scan on the phone

D.

Ensure appropriate MDM policies are applied

Question 8

Multiple users clicked a phishing link from a compromised email account. The security team isolates and removes the threat. Then, the management team provides security awareness training to the company. What step is this?

Options:

A.

Provide user education.

B.

Compile lessons learned.

C.

Update the antivirus software.

D.

Perform additional scans.

Question 9

A user is attempting to open on a mobile phone a HD video that is hosted on a popular media streaming website. The user is receiving connection timeout errors. The mobile reception icon area is showing two bars next to 3G. Which of the following is the most likely cause of the issue?

Options:

A.

The user does not have Wi-Fi enabled.

B.

The website's subscription has run out.

C.

The bandwidth is not fast enough.

D.

The mobile device storage is full.

Question 10

A technician follows proper malware removal procedures but cannot remove all malware. They decide to reload the OS. What should they select?

Options:

A.

Version upgrade

B.

System restore

C.

OS repair

D.

Clean install

Question 11

Which of the following methods would make data unrecoverable but allow the drive to be repurposed?

Options:

A.

Deleting the partitions

B.

Implementing EFS

C.

Performing a low-level format

D.

Degaussing the device

Question 12

Which of the following methods involves requesting a user’s approval via a push notification to verify the user’s identity?

Options:

A.

Call

B.

Authenticator

C.

Hardware token

D.

SMS

Question 13

A user is unable to use the latest version of an app on a legacy tablet. What is the most likely reason?

Options:

A.

The OS is end-of-life

B.

Space is inadequate

C.

MDM is blocking updates

D.

The tablet is infected with malware

Question 14

A technician is reviewing an organization's current incident management policy. The organization uses a third-party vendor to protect the organization's assets with multiple tools. Which of the following service types is the organization using?

Options:

A.

PaaS

B.

EDR

C.

MDR

D.

XDR

Question 15

A network technician notices that most of the company's network switches are now end-of-life and need to be upgraded. Which of the following should the technician do first?

Options:

A.

Implement the change

B.

Approve the change

C.

Propose the change

D.

Schedule the change

Question 16

A network technician notices that most of the company's network switches are now end-of-life and need to be upgraded. What should the technician do first?

Options:

A.

Implement the change

B.

Approve the change

C.

Document the change

D.

Schedule the change

Question 17

A technician thinks that an application a user downloaded from the internet may not be the legitimate one, even though the name is the same. The technician needs to confirm whether the application is legitimate. Which of the following should the technician do?

Options:

A.

Compare the hash value from the vendor.

B.

Run Task Manager and compare the process ID.

C.

Run the application in safe mode.

D.

Verify the file name is correct.

Question 18

A user recently installed an application that accesses a database from a local server. When launching the application, it does not populate any information. Which of the following command-line tools is the best to troubleshoot the issue?

Options:

A.

ipconfig

B.

nslookup

C.

netstat

D.

curl

Question 19

An end user wants to have a sales printer added to their computer. The printer is on the domain. Which of the following is the best method for the technician to add the printer?

Options:

A.

Go to the print server and select the printer name

B.

Connect the laptop to the printer via USB

C.

Connect to the printer via Bluetooth

D.

Go to Local Users and Groups to add the printer

Question 20

A company wants to use a single operating system for its workstations and servers and avoid licensing fees. Which of the following operating systems would the company most likely select?

Options:

A.

Linux

B.

Windows

C.

macOS

D.

Chrome OS

Question 21

A user has been adding data to the same spreadsheet for several years. After adding a significant amount of data, they are now unable to open the file. Which of the following should a technician do to resolve the issue?

Options:

A.

Revert the spreadsheet to the last restore point.

B.

Increase the amount of RAM.

C.

Defragment the storage drive.

D.

Upgrade the network connection speed.

Question 22

A Windows 11 Home device is receiving constant pop-ups about an urgent need to update antivirus software to remove a detected threat. The user has been clicking the "X" button in the window frame but it always reappears. The pop-up includes an "OK" button to install the update and remove the threat. Which of the following should the user do next?

Options:

A.

Click the "OK" button to install the update

B.

Reinstall the Windows Operating System

C.

Run System File Checker

D.

Verify the current status and settings of protection measures

Question 23

A help desk team was alerted that a company-owned cell phone has an unrecognized password-cracking application. Which of the following should the help desk team do to prevent further unauthorized installations from occurring?

Options:

A.

Configure Group Policy.

B.

Implement PAM.

C.

Install anti-malware software.

D.

Deploy MDM.

Question 24

You have been contacted through the help desk chat application. A user is setting up a replacement SOHO router. Assist the user with setting up the router.

INSTRUCTIONS

Select the most appropriate statement for each response. Click the send button after each response to continue the chat.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 25

After a recent mobile OS upgrade to a smartphone, a user attempts to access their corporate email, but the application does not open. A technician restarts the smartphone, but the issue persists. Which of the following is the most likely way to resolve the issue?

Options:

A.

Updating the failed software

B.

Registering the smartphone with an MDM solution

C.

Installing a third-party client

D.

Clearing the cache partition

Question 26

What is found in an MSDS (Material Safety Data Sheet) for a battery backup?

Options:

A.

Installation instructions

B.

Emergency procedures

C.

Configuration steps

D.

Voltage

Question 27

Which of the following filesystem types does the Linux OS use?

Options:

A.

exFAT

B.

APFS

C.

ext4

D.

NTFS

Question 28

A technician notices that the weekly backup is taking too long to complete. The daily backups are incremental. Which of the following would most likely resolve the issue?

Options:

A.

Changing the backup window

B.

Performing incremental weekly backups

C.

Increasing the backup storage

D.

Running synthetic full weekly backups

Question 29

An administrator received an email stating that the OS they are currently supporting will no longer receive security updates and patches. Which of the following is the most likely reason?

Options:

A.

Support from the computer’s manufacturer is expiring

B.

The OS will be considered end of life

C.

The built-in security software is being removed from the next OS version

D.

A new version of the OS will be released soon

Question 30

A technician needs to map a shared drive from a command-line interface. Which of the following commands should the technician use?

Options:

A.

pathping

B.

nslookup

C.

net use

D.

tracert

Question 31

Users are reporting that an unsecured network is broadcasting with the same name as the normal wireless network. They are able to access the internet but cannot connect to the file share servers. Which of the following best describes this issue?

Options:

A.

Unreachable DNS server

B.

Virtual local area network misconfiguration

C.

Incorrect IP address

D.

Rogue wireless access point

Question 32

A user takes an iOS-based smartphone to a repair shop due to performance issues. The technician observes:

Battery charge: 25%

Battery health: 90%

Hotspot: On

Used space: 63.76GB / 64GB

Which of the following is the most likely cause of the performance issue?

Options:

A.

The device is running out of free space

B.

The battery health is low

C.

The phone is not sufficiently charged

D.

The hotspot is degrading the performance

E.

Too many applications are open

Question 33

Which of the following malware types typically has very high computing resource usage?

Options:

A.

Rootkit

B.

Cryptominer

C.

Boot sector virus

D.

Trojan

Question 34

A user’s computer is running slowly. Task Manager shows:

Disk: 2%

Network: 12%

GPU: 15%

CPU: 70%

Memory: 97%

Which of the following would a technician most likely do to resolve the issue?

Options:

A.

Clear browser cached data

B.

Upgrade the network connection

C.

Close unnecessary programs

D.

Delete temporary files

Question 35

An administrator is investigating a technical outage. The management team wants information that includes the summary of the outage and actions taken. Which of the following documentation should the administrator provide?

Options:

A.

Knowledge base article

B.

Non-disclosure agreement

C.

Incident report

D.

Standard operating procedure

Question 36

An international traveler is concerned about others accessing the contents of their smartphone if it is lost or stolen. The traveler has enabled biometrics. Which of the following additional security measures further reduces the risk of unauthorized data access?

Options:

A.

Remote backups

B.

Location tracking

C.

PIN code screen lock

D.

Device encryption

Question 37

A technician uses AI to draft a document about new software benefits. Upon reading, the technician sees factually incorrect info. What term best describes this?

Options:

A.

Data privacy

B.

Hallucinations

C.

Appropriate use

D.

Plagiarism

Question 38

A small office reported a phishing attack that resulted in a malware infection. A technician is investigating the incident and has verified the following:

● All endpoints are updated and have the newest EDR signatures.

● Logs confirm that the malware was quarantined by EDR on one system.

● The potentially infected machine was reimaged.

Which of the following actions should the technician take next?

Options:

A.

Install network security tools to prevent downloading infected files from the internet

B.

Discuss the cause of the issue and educate the end user about security hygiene

C.

Flash the firmware of the router to ensure the integrity of network traffic

D.

Suggest alternate preventative controls that would include more advanced security software

Question 39

A support specialist needs to decide whether to install a 32-bit or 64-bit OS architecture on a new computer. Which of the following specifications will help the specialist determine which OS architecture to use?

Options:

A.

16GB RAM

B.

Intel i7 CPU

C.

500GB HDD

D.

1Gbps Ethernet

Question 40

An employee is trying to connect their company laptop to airport Wi-Fi. A pop-up with the airport logo appeared and was closed quickly. The internet does not work. What should a help desk technician suggest?

Options:

A.

Look for a wall socket with RJ45 and try to connect

B.

Contact the airport IT department

C.

Tell the employee that company policy prohibits connection to public Wi-Fi

D.

Reconnect to the network and read the pop-up carefully

Question 41

A user is unable to upload files to the corporate servers from their mobile phone when outside the office, but uploading files works without issue in the office. The user saw an error notification but dismissed it. Which of the following should a technician do to determine the root cause?

Options:

A.

Check the data usage limit

B.

Enable airplane mode

C.

Verify the last device reboot

D.

Enable Bluetooth connectivity

Question 42

Technicians are failing to document user contact information, device asset tags, and a clear description of each issue in the ticketing system. Which of the following should a help desk management team implement for technicians to use on every call?

Options:

A.

Service-level agreements

B.

Call categories

C.

Standard operating procedures

D.

Knowledge base articles

Question 43

Which of the following is a protocol that provides AAA for network services?

Options:

A.

RADIUS

B.

Kerberos

C.

TKIP

D.

WPA3

Question 44

Every time a user loads a specific spreadsheet, their computer is temporarily unresponsive. The user also notices that the title bar indicates the application is not responding. Which of the following would a technician most likely inspect?

Options:

A.

Anti-malware logs

B.

Workstation repair options

C.

Bandwidth status as reported in the Task Manager

D.

File size and related memory utilization

Question 45

What is the next step a technician should take after completing malware cleanup?

Options:

A.

Perform a secondary antivirus scan

B.

Educate the end user

C.

Reimage the computer

D.

Review system logs

Question 46

A user decides to switch to Windows from Linux and is trying to migrate data using an external USB hard disk. However, when the user connects the cable to the Windows machine, an error message appears stating the device must be formatted before it can be used. The hard disk works as expected when connected to the Linux machine. Which of the following should the user do to resolve this issue?

Options:

A.

Configure Windows firewall to allow data from Linux systems

B.

Replace the cable with Windows-supported hardware

C.

Apply a firmware update from the PC manufacturer

D.

Update the file allocation system to exFAT

Question 47

A user wants to dispose of a failed hard drive in a way that ensures the data is unrecoverable. Which of the following is the best at-home method?

Options:

A.

Standard formatting

B.

Low-level formatting

C.

Shredding

D.

Degaussing

E.

Drilling

Demo: 47 questions
Total 157 questions