Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > CompTIA > A+ > 220-1202

220-1202 CompTIA A+ Core 2 2025 Exam Question and Answers

Question # 4

Which of the following file types would a desktop support technician most likely use to automate tasks for a Windows user log-in?

A.

.bat

B.

.sh

C.

.py

D.

.js

Full Access
Question # 5

An end user wants to have a sales printer added to their computer. The printer is on the domain. Which of the following is the best method for the technician to add the printer?

A.

Go to the print server and select the printer name

B.

Connect the laptop to the printer via USB

C.

Connect to the printer via Bluetooth

D.

Go to Local Users and Groups to add the printer

Full Access
Question # 6

An end user ' s laptop is having network drive connectivity issues in the office. The end user submits a help desk ticket, and a support technician is able to establish a remote connection and fix the issue. The following day, however, the network drive is disconnected again. Which of the following should the technician do next?

A.

Connect remotely to the user ' s computer to see whether the network drive is still connected.

B.

Send documentation about how to fix the issue in case it reoccurs.

C.

Escalate the ticket to the next level.

D.

Keep the ticket open until next day, then close the ticket.

Full Access
Question # 7
A.

Basic input/output system

B.

New Technology File System

C.

Trusted Platform Module

D.

Master boot record

Full Access
Question # 8

Technicians are failing to document user contact information, device asset tags, and a clear description of each issue in the ticketing system. What should the help desk management implement?

A.

Service-level agreements

B.

Call categories

C.

Standard operating procedures

D.

Knowledge base articles

Full Access
Question # 9

A company wants to perform an in-place upgrade of operating systems on all workstations. All types of removable storage are disabled for security reasons. Which of the following is the best way to upgrade while keeping security settings in place?

A.

Using an external hard drive to upgrade the OS

B.

Copying the ISO file to each workstation and executing

C.

Setting up image deployment for PXE

D.

Using a hardware token to access upgrade files

Full Access
Question # 10

An administrator must rename the administrator account on a Windows desktop. Which tool is best for this?

A.

lusrmgr.msc

B.

devmgmt.msc

C.

gpedit.msc

D.

eventvwr.msc

Full Access
Question # 11

A user created a document using online collaboration tools, and the document is not available on their laptop now. Which of the following should a desktop technician do to remediate the issue?

A.

Synchronize the remote folder with the user’s laptop.

B.

Download the file and send it to the user using instant messaging.

C.

Install word processing tools on the user’s laptop.

D.

Connect the user’s laptop to Wi-Fi.

Full Access
Question # 12

A senior administrator asks a help desk technician to run a set of commands on a remote network switch. After running the commands, the technician needs to collect the output and provide it to the administrator. Which of the following should the technician use to fulfill the administrator ' s request?

A.

RDP

B.

WinRM

C.

SSH

D.

VNC

Full Access
Question # 13

A project team needs special access on a shared repository to add new content, edit existing content, and prevent content deletion. Which of the following should an administrator do to configure this setup with the least amount of effort?

A.

Map the network folder on each user ' s workstation for controlled access

B.

Create and assign a security group with adequate permissions

C.

Grant administrative permissions to the team

D.

Apply the required permissions to each individual user

Full Access
Question # 14

Which of the following authentication methods is the best way to prevent users from frequently entering their credentials?

A.

Access control list

B.

Single sign-on

C.

Multifactor authentication

D.

One-time password

Full Access
Question # 15

Why would a network engineering team provide a help desk technician with IP addresses for a wired network segment?

A.

Only specific DNS servers are allowed outbound.

B.

The network allow list is set to a specific address.

C.

DHCP is not enabled for this subnet.

D.

NAC servers only allow security updates to be installed.

Full Access
Question # 16

A technician is selecting a remote access method so users can securely access Linux and Windows servers when working from home. Which of the following should the technician choose to best meet this requirement?

A.

File Transfer Protocol (FTP)

B.

Virtual private network (VPN)

C.

Remote Desktop Protocol (RDP)

D.

Remote monitoring and management (RMM)

Full Access
Question # 17

Users are reporting that an unsecured network is broadcasting with the same name as the normal wireless network. They are able to access the internet but cannot connect to the file share servers. Which of the following best describes this issue?

A.

Unreachable DNS server

B.

Virtual local area network misconfiguration

C.

Incorrect IP address

D.

Rogue wireless access point

Full Access
Question # 18

A technician follows proper malware removal procedures but cannot remove all malware. They decide to reload the OS. What should they select?

A.

Version upgrade

B.

System restore

C.

OS repair

D.

Clean install

Full Access
Question # 19

A company wants to prevent unauthorized physical access to its mobile devices. Which of the following should the company do? (Select two).

A.

Disable built-in hotspots

B.

Configure VPN software

C.

Install an antivirus application

D.

Use PIN authentication

E.

Turn on location services

F.

Enable screen timeout

Full Access
Question # 20

A customer’s computer does not have an active connection to the network. A technician goes through a few troubleshooting steps but is unable to resolve the issue. The technician has exhausted their knowledge. The customer expresses frustration at the time taken to resolve this issue. Which of the following should the technician do?

A.

Escalate the issue to a senior team member and provide next steps to the customer.

B.

Dismiss the customer and reschedule another troubleshooting session at a later date.

C.

Interrupt the customer and express that troubleshooting support tickets can take time.

D.

Maintain a positive attitude and continue to ask questions regarding the scope of the issue.

Full Access
Question # 21

Which of the following are system folders on macOS? (Select two)

A.

Applications

B.

Spotlight

C.

Time Machine

D.

Library

E.

FileVault

F.

iCloud

Full Access
Question # 22

After using a third-party disk optimization software package, a technician restarts a laptop and receives the message “No operating system found.” The technician verifies that the BIOS properly recognizes the SSD. Which of the following should the technician do next?

A.

Update BitLocker settings in the BIOS

B.

Replace the CMOS battery

C.

Boot from installation media and repair the MBR

D.

Isolate the system from the corporate network

Full Access
Question # 23

A technician is setting up a surveillance system for a customer. The customer wants access to the system ' s web interface on the LAN via the system’s IP address. Which of the following should the technician use to prevent external log-in attempts from the internet?

A.

Port mapping

B.

Subnetting

C.

Static IP

D.

Content filtering

Full Access
Question # 24

An administrator received an email stating that the OS they are currently supporting will no longer receive security updates and patches. Which of the following is the most likely reason?

A.

Support from the computer’s manufacturer is expiring

B.

The OS will be considered end of life

C.

The built-in security software is being removed from the next OS version

D.

A new version of the OS will be released soon

Full Access
Question # 25

A technician needs to install an operating system on a large number of workstations. Which of the following is the fastest method?

A.

Physical media

B.

Mountable ISO

C.

Manual installation

D.

Image deployment

Full Access
Question # 26

A help desk technician recently installed an SSH client on a workstation in order to access remote servers. What does this enable?

A.

To utilize an SSO connection

B.

To securely establish a console session

C.

To encrypt and decrypt protected messages

D.

To facilitate device log reviews

Full Access
Question # 27

Recently, the number of users sharing smartphone passcodes has increased. The management team wants a technician to deploy a more secure screen lock method. Which of the following technologies should the technician use?

A.

Pattern lock

B.

Facial recognition

C.

Device encryption

D.

Multifactor authentication

Full Access
Question # 28

A popular game frequently freezes and crashes on a mobile phone. The user updates the OS, but the issue persists. The device is one year old and has plenty of free storage space. Which of the following is the most appropriate first step to troubleshoot this issue?

A.

Reinstalling the application

B.

Factory resetting the device

C.

Disabling background applications

D.

Changing the device’s date and time settings

Full Access
Question # 29

After a user installs a mobile application from an advertisement, the phone ' s battery dies a few hours later, and it is hot to the touch, even when not in use. Which of the following should a technician do first?

A.

Check for unauthorized device administrators

B.

Contact the software developer

C.

Run a mobile malware scan on the phone

D.

Ensure appropriate MDM policies are applied

Full Access
Question # 30

Which of the following file types allows macOS users to uninstall software completely by placing the file in the trash?

A.

.app

B.

.msi

C.

.exe

D.

.rpm

E.

.pkg

Full Access
Question # 31

A user is renaming a .txt file to a .xml file. After renaming the file, Windows Explorer shows the filename as Document….xml. However, the document properties show the type of file as Text Document (.txt). Which of the following controls enables the user to correctly change the file type?

A.

Indexing options

B.

Format command

C.

Personalization

D.

Hide extensions

Full Access
Question # 32

You are configuring a home network for a customer. The customer has requested the ability to access a Windows PC remotely, and needs all chat and optional functions to work in their game console.

INSTRUCTIONS

Use the drop-down menus to complete the network configuration for the customer. Each option may only be used once, and not all options will be used.

Then, click the + sign to place each device in its appropriate location.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Wireless AP LAN

Firewall Screened Subnet

Full Access
Question # 33

Welcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

INSTRUCTIONS

Click on individual tickets to see the ticket details, and view applicable attachments to

determine the problem.

Select the appropriate issue from the ' Issue ' drop-down menu. Then, select the most

efficient resolution from the ' Resolution ' drop-down menu. Finally, select the proper

command or verification to remediate or confirm your fix of the issue from the

' Verify/Resolve ' drop-down menu.

Full Access
Question # 34

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users’ audio issues are resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 35

A user reports that after a recent software deployment to upgrade the Testing application, they can no longer use it. However, other employees can successfully

use the Testing program.

INSTRUCTIONS

Review the information in each tab to verify the results of the deployment and resolve

any issues discovered by selecting the:

· First command to resolve the issue

· Second command to resolve the issue

Full Access
Question # 36

Welcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

INSTRUCTIONS

Click on individual tickets to see the ticket details, and view applicable attachments to

determine the problem.

Select the appropriate issue from the ' Issue ' drop-down menu. Then, select the most

efficient resolution from the ' Resolution ' drop-down menu. Finally, select the proper

command or verification to remediate or confirm your fix of the issue from the

' Verify/Resolve ' drop-down menu.

Full Access
Question # 37

As a corporate technician, you are asked to evaluate several suspect email messages on a client ' s computer. Corporate policy requires the following:

> All phishing attempts must be reported.

> Future spam emails to users must be prevented.

INSTRUCTIONS

Review each email and perform the following within the email:

> Classify the emails

> Identify suspicious items, if applicable, in each email

> Select the appropriate resolution

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 38

You have been contacted through the help desk chat application. A user is setting up a replacement SOHO router. Assist the user with setting up the router.

INSTRUCTIONS

Select the most appropriate statement for each response. Click the send button after each response to continue the chat.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 39

After a user installs a mobile application from an advertisement, the phone ' s battery dies a few hours later and becomes hot to touch, even when not in use. Which of the following should a technician do first?

A.

Check for unauthorized device administrators

B.

Contact the software developer

C.

Run a mobile malware scan on the phone

D.

Ensure appropriate MDM policies are applied

Full Access
Question # 40
A.

Clear the smartphone ' s browser cache and uninstall unknown applications.

B.

Enable airplane mode and restart the smartphone.

C.

Perform a factory reset on the smartphone.

D.

Replace the SIM card and modify the network settings.

Full Access
Question # 41

An administrator is investigating a technical outage. The management team wants information that includes the summary of the outage and actions taken. Which of the following documentation should the administrator provide to the management team?

A.

Knowledge base article

B.

Non-disclosure agreement

C.

Incident report

D.

Standard operating procedure

Full Access
Question # 42

A utility failure causes a workstation to immediately shut down. Which of the following would help prevent this from reoccurring?

A.

Surge suppressor

B.

Uninterruptible power supply

C.

Line voltage regulator

D.

Redundant PSU

Full Access
Question # 43

A user receives a new personal computer but is unable to run an application. An error displays saying that .NET Framework 3.5 is required and not found. Which of the following actions is the best way to resolve this issue?

A.

Resolve the dependency through the ' Turn Windows features on or off ' menu.

B.

Download the dependency via a third-party repository.

C.

Ignore the dependency and install the latest version 4 instead.

D.

Forward the trouble ticket to the SOC team because the issue poses a great security risk.

Full Access
Question # 44
A.

In-house disk incineration

B.

Certified third-party destruction

C.

Low-level formatting

D.

Targeted file deletion

Full Access
Question # 45

A user is trying to install new software. The application downloads successfully, but when the user attempts to install it, the user receives a prompt for credentials. Which of the following would the technician most likely do to resolve this issue?

A.

Restart the user ' s computer

B.

Use a different web browser to download the application

C.

Change the User Account Control (UAC) settings

D.

Contact the software vendor for support

Full Access
Question # 46

Which of the following is an example of an application publisher including undisclosed additional software in an installation package?

A.

Virus

B.

Ransomware

C.

Potentially unwanted program

D.

Trojan

Full Access
Question # 47
A.

Folder permissions

B.

Outdated definitions

C.

Port security not enabled

D.

User account permissions

Full Access