Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > CompTIA > A+ > 220-1202

220-1202 CompTIA A+ Core 2 (2026 Exam Update) Question and Answers

Question # 4

A desktop technician is mapping a remote Windows share \\WinNAS\shared as local drive Z:. Which command should the technician run?

A.

nslookup -opt 3: \WinNAS\shared

B.

net use 3: \WinNAS\shared

C.

chkdsk /R 2: \WinNAS\shared

D.

sfc /offwindir 3: \WinNAS\shared

Full Access
Question # 5

A user reports a critical application issue. The user tells the technician that a former IT employee previously resolved this same issue. Which of the following steps should the technician take first?

A.

Consult the technician who previously solved the issue.

B.

Escalate the issue to the software manufacturer to develop a patch.

C.

Review the ticketing system for details related to the prior occurrence.

D.

Open a case to document the issue and progress until the issue is resolved.

Full Access
Question # 6

Which of the following is required to have a central log-in for a Windows computer?

A.

Domain membership

B.

Workgroup

C.

Active Directory

D.

Local Group Policy Editor

Full Access
Question # 7

A technician needs to provide remote support for a legacy Linux-based operating system from their Windows laptop. The solution needs to allow the technician to see what the user is doing and provide the ability to interact with the user ' s session. Which of the following remote access technologies would support the use case?

A.

VPN

B.

VNC

C.

SSH

D.

RDP

Full Access
Question # 8

Which of the following Linux commands is used to read another command ' s documentation?

A.

chmod

B.

cat

C.

man

D.

sudo

Full Access
Question # 9

Which of the following provides information to employees, such as permitted activities when using the organization ' s resources?

A.

AUP

B.

MNDA

C.

DRM

D.

EULA

Full Access
Question # 10

An end user is unable to access the intranet. A technician needs to confirm whether the Windows web server is online and functioning. Which of the following default remote access technologies would the technician most likely use to remotely connect to the server?

A.

SPICE

B.

VNC

C.

RDP

D.

SSH

Full Access
Question # 11

A user needs to test several software replacement possibilities. Part of the process involves installing the different software options on a corporate-imaged sandboxed PC. Which of the following is the best option to allow the user to install the required software?

A.

Make the user a member of Domain Admins

B.

Add the user to the local Administrators group

C.

Let the user use credentials from another user who has rights

D.

Give the user the local, high-privileged account password

Full Access
Question # 12

A user installed a free application from an unofficial application store. Now, their smartphone displays random pop-ups and shows increased data usage. Additionally, the user cannot perform certain actions such as opening banking applications or updating their OS. Which of the following should the user do first to address the security issues on their smartphone?

A.

Perform a factory reset

B.

Clear the device cache

C.

Contact the manufacturer ' s support line

D.

Change all passwords on the device

Full Access
Question # 13

A technician is 3-D printing high-strength, carbon fiber-based filament parts for a customer order. Which of the following is the most important for the technician to use?

A.

Steel-toed boots

B.

Air filter mask

C.

ESD mat

D.

Antistatic bags

Full Access
Question # 14

An IT technician must install a new software application across Linux, macOS, and Windows systems within an organization. The installation files are stored on the intranet. Which of the following approaches should the technician take to ensure proper installation?

A.

Create a single batch script to automate the installation on all systems.

B.

Use OS-specific package managers and deployment tools for installation.

C.

Instruct users to use the manufacturer’s website to install the application.

D.

Install directly from the installation medium on each machine manually.

Full Access
Question # 15

Which of the following filesystems is a successor to NTFS?

A.

ReFS

B.

XFS

C.

APFS

D.

exFAT

Full Access
Question # 16

A customer wants to format an external hard drive to work on both Windows and macOS. Which of the following filesystems is the best to use?

A.

NTFS

B.

exFAT

C.

APFS

D.

XFS

Full Access
Question # 17

A user is installing a third-party application on the latest macOS. The user receives a security warning that states the application is unsigned and cannot be installed. Which of the following settings should the user adjust to allow the installation?

A.

Privacy

B.

Accessibility

C.

Finder

D.

iCloud (corrected from “iCIoud”)

Full Access
Question # 18

A technician is assigned to offboard a user. Which of the following are common tasks on an offboarding checklist? (Choose two.)

A.

Quarantine the hard drive in the user ' s laptop.

B.

Deactivate the user ' s key fobs for door access.

C.

Purge all PII associated with the user.

D.

Suspend the user ' s email account.

E.

Turn off the network ports underneath the user ' s desk.

F.

Add the MAC address of the user ' s computer to a blocklist.

Full Access
Question # 19

A business is hiring a remote employee and must provide the employee with graphical interface access to the in-house Linux servers. Which of the following should the business use for this process?

A.

SSH

B.

VNC

C.

WinRM

D.

Telnet

Full Access
Question # 20

A company computer is being repurposed within an organization. The existing configuration has a static IP address, but it is no longer required. Which of the following should a technician do to satisfy the network requirements?

A.

Make a DHCP reservation for the computer

B.

Create an exclusion in the existing IP scheme

C.

Switch the NIC settings from manual to automatic

D.

Change the currently assigned static IP

Full Access
Question # 21

A user switches from Linux to Windows and tries to migrate data using an external USB drive. Windows prompts that the device must be formatted. It works fine on Linux. What should the user do?

A.

Configure Windows firewall to allow data from Linux systems

B.

Replace the cable with Windows-supported hardware

C.

Apply a firmware update from the PC manufacturer

D.

Update the file allocation system to exFAT

Full Access
Question # 22

A senior administrator asks a help desk technician to run a set of commands on a remote network switch. After running the commands, the technician needs to collect the output and provide it to the administrator. Which of the following should the technician use to fulfill the administrator’s request?

A.

RDP

B.

WinRM

C.

SSH

D.

VNC

Full Access
Question # 23

A technician is working on a complex, large-scale software deployment. In which of the following places would the technician most likely reference deployment instructions?

A.

File server

B.

User ' s desktop

C.

Email

D.

Internal wiki

Full Access
Question # 24

Technicians are failing to document user contact information, device asset tags, and a clear description of each issue in the ticketing system. What should the help desk management implement?

A.

Service-level agreements

B.

Call categories

C.

Standard operating procedures

D.

Knowledge base articles

Full Access
Question # 25

A technician needs to disable guest log-ins on domain-joined desktop machines. Which of the following should be used?

A.

Group Policy

B.

Firewall

C.

Microsoft Management Console

D.

MSConfig

Full Access
Question # 26

A project team needs special access on a shared repository to add new content, edit existing content, and prevent content deletion. Which of the following should an administrator do to configure this setup with the least amount of effort?

A.

Map the network folder on each user’s workstation for controlled access.

B.

Create and assign a security group with adequate permissions.

C.

Grant administrative permissions to the team.

D.

Apply the required permissions to each individual user.

Full Access
Question # 27

Which of the following concepts should a technician consider when discussing confidential work projects with individuals outside the company?

A.

EULA

B.

EOL

C.

SLA

D.

NDA

Full Access
Question # 28

A company wants to perform an in-place upgrade of operating systems on all workstations. All types of removable storage are disabled for security reasons. Which of the following is the best way to upgrade while keeping security settings in place?

A.

Using an external hard drive to upgrade the OS

B.

Copying the ISO file to each workstation and executing

C.

Setting up image deployment for PXE

D.

Using a hardware token to access upgrade files

Full Access
Question # 29

Which of the following commands is used to manage files in a Linux OS?

A.

robocopy

B.

curl

C.

xcopy

D.

cp

Full Access
Question # 30

Which of the following methods would make data unrecoverable but allow the drive to be repurposed?

A.

Deleting the partitions

B.

Implementing EFS

C.

Performing a low-level format

D.

Degaussing the device

Full Access
Question # 31

A support technician must install software that allows a user to deliver a project status presentation to external stakeholders. Which of the following software types should the technician install?

A.

WinRM

B.

RMM

C.

Videoconferencing

D.

Secure file transfer

Full Access
Question # 32

A company wants to use a single operating system for its workstations and servers and avoid licensing fees. Which of the following operating systems would the company most likely select?

A.

Linux

B.

Windows

C.

macOS

D.

Chrome OS

Full Access
Question # 33

After installing new webcam software, a PC experiences BSOD during videoconference calls. What should the technician do next?

A.

Update the anti-malware signature and scan the system

B.

File a warranty claim with the manufacturer

C.

Start in Safe Mode and roll back the device driver

D.

Reconnect the webcam to the computer

Full Access
Question # 34

A developer is using an AI tool to generate a complex sorting algorithm for a web application. Which of the following is the best choice to legally generate code in their application?

A.

Use the generated code in their application silently

B.

Insert comments in their application for the generated code

C.

Credit the author of the generated code in their application

D.

Check the sources the AI tool is using for copyrighted content

Full Access
Question # 35

A user ' s computer is running slowly. Web pages take several seconds to open, and applications are slow to respond. A technician opens the Windows Task Manager and sees the following:

Disk: 2%

Network: 12%

GPU: 15%

CPU: 70%

Memory: 97%

Which of the following would a technician most likely do to resolve the issue?

A.

Clear browser cached data

B.

Upgrade the network connection

C.

Close unnecessary programs

D.

Delete temporary files

Full Access
Question # 36

A user ' s new laptop, which was advertised as gaming-ready, is performing slowly when the user is playing a modern game. However, when the user is playing a less resource-demanding game, the user does not see any lag. Which of the following should a technician do to resolve the issue?

A.

Overclock the RAM.

B.

Enable NIC teaming.

C.

Select dedicated graphics.

D.

Activate CPU hyperthreading.

Full Access
Question # 37

A customer brings a recently purchased laptop back to the store. The customer states that the laptop is defective and requests a new unit. The service representative identifies that the laptop was damaged by liquid. Which of the following should the service representative most likely do first?

A.

Accept the defective laptop and provide a replacement.

B.

Decline the request and report the case to the service manager.

C.

Review the applicable warranty and alternatives to manage special cases.

D.

Escalate the issue to the manufacturer or legal department for further action.

Full Access
Question # 38

A user is attempting to open on a mobile phone a HD video that is hosted on a popular media streaming website. The user is receiving connection timeout errors. The mobile reception icon area is showing two bars next to 3G. Which of the following is the most likely cause of the issue?

A.

The user does not have Wi-Fi enabled.

B.

The website ' s subscription has run out.

C.

The bandwidth is not fast enough.

D.

The mobile device storage is full.

Full Access
Question # 39

A company would like to deploy baseline images to new computers as they are started up on the network. Which of the following boot processes should the company use for this task?

A.

ISO

B.

Secure

C.

USB

D.

PXE

Full Access
Question # 40

A user notices that their smartphone ' s data usage has increased significantly even when the device is not in use. The phone feels warm, and its battery drains quickly. Which of the following should the user do to address this issue?

A.

Check for malicious applications

B.

Disable the Wi-Fi and mobile networks

C.

Reset the device to its factory defaults

D.

Enable airplane mode temporarily

Full Access
Question # 41

Users are reporting that an unsecured network is broadcasting with the same name as the normal wireless network. They are able to access the internet but cannot connect to the file share servers. Which of the following best describes this issue?

A.

Unreachable DNS server

B.

Virtual local area network misconfiguration

C.

Incorrect IP address

D.

Rogue wireless access point

Full Access
Question # 42

A technician follows proper malware removal procedures but cannot remove all malware. They decide to reload the OS. What should they select?

A.

Version upgrade

B.

System restore

C.

OS repair

D.

Clean install

Full Access
Question # 43

An administrator must rename the administrator account on a Windows desktop. Which tool is best for this?

A.

lusrmgr.msc

B.

devmgmt.msc

C.

gpedit.msc

D.

eventvwr.msc

Full Access
Question # 44

A user is unable to upload files to the corporate servers from their mobile phone when outside the office, but uploading files works without issue in the office. The user saw an error notification but dismissed it. Which of the following should a technician do to determine the root cause?

A.

Check the data usage limit

B.

Enable airplane mode

C.

Verify the last device reboot

D.

Enable Bluetooth connectivity

Full Access
Question # 45

A user wants to use a USB to move a 4.57GB .pst file from one Windows computer to another. Which of the following filesystems should the USB be formatted with?

A.

ext4

B.

NTFS

C.

FAT32

D.

APFS

Full Access
Question # 46

A help desk support technician needs to ensure that the documentation for a software deployment is up to date. The documentation must also include all necessary information for future troubleshooting. Which of the following should the technician include?

A.

Detailed guides for resolving common issues

B.

Email logs of support queries

C.

Contact information for software vendors

D.

Installation manuals for end users

Full Access
Question # 47

A user reports that after a recent software deployment to upgrade the Testing application, they can no longer use it. However, other employees can successfully

use the Testing program.

INSTRUCTIONS

Review the information in each tab to verify the results of the deployment and resolve

any issues discovered by selecting the:

· First command to resolve the issue

· Second command to resolve the issue

Full Access
Question # 48

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users’ audio issues are resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 49

You have been contacted through the help desk chat application. A user is setting up a replacement SOHO router. Assist the user with setting up the router.

INSTRUCTIONS

Select the most appropriate statement for each response. Click the send button after each response to continue the chat.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 50

As a corporate technician, you are asked to evaluate several suspect email messages on a client ' s computer. Corporate policy requires the following:

> All phishing attempts must be reported.

> Future spam emails to users must be prevented.

INSTRUCTIONS

Review each email and perform the following within the email:

> Classify the emails

> Identify suspicious items, if applicable, in each email

> Select the appropriate resolution

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 51

You are configuring a home network for a customer. The customer has requested the ability to access a Windows PC remotely, and needs all chat and optional functions to work in their game console.

INSTRUCTIONS

Use the drop-down menus to complete the network configuration for the customer. Each option may only be used once, and not all options will be used.

Then, click the + sign to place each device in its appropriate location.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Wireless AP LAN

Firewall Screened Subnet

Full Access
Question # 52

Welcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

INSTRUCTIONS

Click on individual tickets to see the ticket details, and view applicable attachments to

determine the problem.

Select the appropriate issue from the ' Issue ' drop-down menu. Then, select the most

efficient resolution from the ' Resolution ' drop-down menu. Finally, select the proper

command or verification to remediate or confirm your fix of the issue from the

' Verify/Resolve ' drop-down menu.

Full Access