Month End Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > CompTIA > A+ > 220-1202

220-1202 CompTIA A+ Core 2 2025 Exam Question and Answers

Question # 4

A user reports that the time on their computer does not match the time on their VoIP phone. What should a technician do?

A.

Confirm the user is logging in to the domain.

B.

Manually set the time on the phone to match the computer.

C.

Download and install the latest BIOS update.

D.

Configure access to an available NTP server.

Full Access
Question # 5

Which of the following concepts should a technician consider when discussing confidential work projects with individuals outside the company?

A.

EULA

B.

EOL

C.

SLA

D.

NDA

Full Access
Question # 6

Which of the following is used to apply corporate restrictions on an Apple device?

A.

App Store

B.

VPN configuration

C.

Apple ID

D.

Management profile

Full Access
Question # 7

A user's application only works with a legacy version of the OS. The OS is reaching its end-of-life date. For security reasons, the company is migrating to the current version of the OS. Which of the following is the most efficient way to complete the migration while maintaining accessibility to the application?

A.

Terminal server

B.

Bare-metal server

C.

Multiboot

D.

Virtualization

Full Access
Question # 8

A user’s computer is running slowly. Task Manager shows:

Disk: 2%

Network: 12%

GPU: 15%

CPU: 70%

Memory: 97%

Which of the following would a technician most likely do to resolve the issue?

A.

Clear browser cached data

B.

Upgrade the network connection

C.

Close unnecessary programs

D.

Delete temporary files

Full Access
Question # 9

An engineer notices that many websites prompt users to input login and payment details. The engineer wants to require the browser to encrypt communications. Which of the following best helps to protect sensitive data?

A.

Disabling all cookies

B.

Disabling JavaScript

C.

Enabling a pop-up blocker

D.

Enabling HTTPS-Only Mode

Full Access
Question # 10

An international traveler is concerned about others accessing the contents of their smartphone if it is lost or stolen. The traveler has enabled biometrics. Which of the following additional security measures further reduces the risk of unauthorized data access?

A.

Remote backups

B.

Location tracking

C.

PIN code screen lock

D.

Device encryption

Full Access
Question # 11

A technician thinks that an application a user downloaded from the internet may not be the legitimate one, even though the name is the same. The technician needs to confirm whether the application is legitimate. Which of the following should the technician do?

A.

Compare the hash value from the vendor.

B.

Run Task Manager and compare the process ID.

C.

Run the application in safe mode.

D.

Verify the file name is correct.

Full Access
Question # 12

Which of the following methods would make data unrecoverable but allow the drive to be repurposed?

A.

Deleting the partitions

B.

Implementing EFS

C.

Performing a low-level format

D.

Degaussing the device

Full Access
Question # 13

A user wants to dispose of a failed hard drive in a way that ensures the data is unrecoverable. Which of the following is the best at-home method?

A.

Standard formatting

B.

Low-level formatting

C.

Shredding

D.

Degaussing

E.

Drilling

Full Access
Question # 14

A help desk team was alerted that a company-owned cell phone has an unrecognized password-cracking application. Which of the following should the help desk team do to prevent further unauthorized installations from occurring?

A.

Configure Group Policy.

B.

Implement PAM.

C.

Install anti-malware software.

D.

Deploy MDM.

Full Access
Question # 15

A technician is assigned to offboard a user. Which of the following are common tasks on an offboarding checklist? (Choose two.)

A.

Quarantine the hard drive in the user's laptop.

B.

Deactivate the user's key fobs for door access.

C.

Purge all PII associated with the user.

D.

Suspend the user's email account.

E.

Turn off the network ports underneath the user's desk.

F.

Add the MAC address of the user's computer to a blocklist.

Full Access
Question # 16

Which of the following describes an attack in which an attacker sets up a rogue AP that tricks users into connecting to the rogue AP instead of the legitimate network?

A.

Stalkerware

B.

Evil twin

C.

Tailgating

D.

Shoulder surfing

Full Access
Question # 17

A user wants to dispose of a failed hard drive in a way that ensures the data is unrecoverable. Which of the following is the best at-home method?

A.

Standard formatting

B.

Low-level formatting

C.

Shredding

D.

Degaussing

E.

Drilling

Full Access
Question # 18

What is the next step a technician should take after completing malware cleanup?

A.

Perform a secondary antivirus scan

B.

Educate the end user

C.

Reimage the computer

D.

Review system logs

Full Access
Question # 19

A technician needs to install an operating system on a large number of workstations. Which of the following is the fastest method?

A.

Physical media

B.

Mountable ISO

C.

Manual installation

D.

Image deployment

Full Access
Question # 20

A user has rooted their corporate phone to load unapproved software. Which of the following tools should the company use to prevent access to the corporate network?

A.

Mobile device management

B.

Encryption

C.

Geofencing

D.

Lock screen

Full Access
Question # 21

A technician notices that the weekly backup is taking too long to complete. The daily backups are incremental. Which of the following would most likely resolve the issue?

A.

Changing the backup window

B.

Performing incremental weekly backups

C.

Increasing the backup storage

D.

Running synthetic full weekly backups

Full Access
Question # 22

What is found in an MSDS (Material Safety Data Sheet) for a battery backup?

A.

Installation instructions

B.

Emergency procedures

C.

Configuration steps

D.

Voltage

Full Access
Question # 23

A company wants to enforce the following browser requirements:

    Administrators can add URLs to the Trusted URL list

    Passwords will not be stored through the browser

    When the browser is closed, all history will be saved

    Browser security will be set to high

    Specific URLs or ratings will be restricted from access

Which of the following is the best for the technician to configure?

A.

Group Policy

B.

Web gateway

C.

Browser policy

D.

Web proxy

Full Access
Question # 24

A user needs to test several software replacement possibilities. Part of the process involves installing the different software options on a corporate-imaged sandboxed PC. Which of the following is the best option to allow the user to install the required software?

A.

Make the user a member of Domain Admins

B.

Add the user to the local Administrators group

C.

Let the user use credentials from another user who has rights

D.

Give the user the local, high-privileged account password

Full Access
Question # 25

Due to recent security issues, the finance department requires a shorter screensaver timeout. Which of the following should a technician use to accomplish this task?

A.

gpedit.msc

B.

certmgr.msc

C.

devmgmt.msc

D.

perfmon.msc

Full Access
Question # 26

Welcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

INSTRUCTIONS

Click on individual tickets to see the ticket details, and view applicable attachments to

determine the problem.

Select the appropriate issue from the 'Issue' drop-down menu. Then, select the most

efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper

command or verification to remediate or confirm your fix of the issue from the

'Verify/Resolve' drop-down menu.

Full Access
Question # 27

You are configuring a home network for a customer. The customer has requested the ability to access a Windows PC remotely, and needs all chat and optional functions to work in their game console.

INSTRUCTIONS

Use the drop-down menus to complete the network configuration for the customer. Each option may only be used once, and not all options will be used.

Then, click the + sign to place each device in its appropriate location.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Wireless AP LAN

Firewall Screened Subnet

Full Access
Question # 28

You have been contacted through the help desk chat application. A user is setting up a replacement SOHO router. Assist the user with setting up the router.

INSTRUCTIONS

Select the most appropriate statement for each response. Click the send button after each response to continue the chat.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 29

As a corporate technician, you are asked to evaluate several suspect email messages on a client's computer. Corporate policy requires the following:

>All phishing attempts must be reported.

>Future spam emails to users must be prevented.

INSTRUCTIONS

Review each email and perform the following within the email:

>Classify the emails

>Identify suspicious items, if applicable, in each email

>Select the appropriate resolution

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 30

A user reports that after a recent software deployment to upgrade the Testing application, they can no longer use it. However, other employees can successfully

use the Testing program.

INSTRUCTIONS

Review the information in each tab to verify the results of the deployment and resolve

any issues discovered by selecting the:

· First command to resolve the issue

· Second command to resolve the issue

Full Access
Question # 31

Welcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

INSTRUCTIONS

Click on individual tickets to see the ticket details, and view applicable attachments to

determine the problem.

Select the appropriate issue from the 'Issue' drop-down menu. Then, select the most

efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper

command or verification to remediate or confirm your fix of the issue from the

'Verify/Resolve' drop-down menu.

Full Access
Question # 32

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users’ audio issues are resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access