Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > CompTIA > A+ > 220-1202

220-1202 CompTIA A+ Core 2 2025 Exam Question and Answers

Question # 4

After a recent mobile OS upgrade to a smartphone, a user attempts to access their corporate email, but the application does not open. A technician restarts the smartphone, but the issue persists. Which of the following is the most likely way to resolve the issue?

A.

Updating the failed software

B.

Registering the smartphone with an MDM solution

C.

Installing a third-party client

D.

Clearing the cache partition

Full Access
Question # 5

A user reports some single sign-on errors to a help desk technician. Currently, the user is able to sign in to the company's application portal but cannot access a specific SaaS-based tool. Which of the following would the technician most likely suggest as a next step?

A.

Reenroll the user's mobile device to be used as an MFA token

B.

Use a private browsing window to avoid local session conflicts

C.

Bypass single sign-on by directly authenticating to the application

D.

Reset the device being used to factory defaults

Full Access
Question # 6

After installing new webcam software, a PC experiences BSOD during videoconference calls. What should the technician do next?

A.

Update the anti-malware signature and scan the system

B.

File a warranty claim with the manufacturer

C.

Start in Safe Mode and roll back the device driver

D.

Reconnect the webcam to the computer

Full Access
Question # 7

A technician is attempting to join a workstation to a domain but is receiving an error message stating the domain cannot be found. However, the technician is able to ping the server and access the internet. Given the following information:

IP Address – 192.168.1.210

Subnet Mask – 255.255.255.0

Gateway – 192.168.1.1

DNS1 – 8.8.8.8

DNS2 – 1.1.1.1

Server – 192.168.1.10

Which of the following should the technician do to fix the issue?

A.

Change the DNS settings.

B.

Assign a static IP address.

C.

Configure a subnet mask.

D.

Update the default gateway.

Full Access
Question # 8

A user is attempting to open on a mobile phone a HD video that is hosted on a popular media streaming website. The user is receiving connection timeout errors. The mobile reception icon area is showing two bars next to 3G. Which of the following is the most likely cause of the issue?

A.

The user does not have Wi-Fi enabled.

B.

The website's subscription has run out.

C.

The bandwidth is not fast enough.

D.

The mobile device storage is full.

Full Access
Question # 9

A user is working from home and is unable to access work files on a company laptop. Which of the following should a technician configure to fix the network access issue?

A.

Wide-area network

B.

Wireless network

C.

Proxy network settings

D.

Virtual private network

Full Access
Question # 10

Which of the following types of social engineering attacks sends an unsolicited text message to a user's mobile device?

A.

Impersonation

B.

Vishing

C.

Spear phishing

D.

Smishing

Full Access
Question # 11

An application's performance is degrading over time. The application is slowing, but it never gives an error and does not crash. Which of the following tools should a technician use to start troubleshooting?

A.

Reliability history

B.

Computer management

C.

Resource monitor

D.

Disk

Full Access
Question # 12

The screen of a previously working computer repeatedly displays an OS Not Found error message when the computer is started. Only a USB drive, a keyboard, and a mouse are plugged into the computer. Which of the following should a technician do first?

A.

Run data recovery tools on the disk

B.

Partition the disk using the GPT format

C.

Check boot options

D.

Switch from UEFI to BIOS

Full Access
Question # 13

A user has been adding data to the same spreadsheet for several years. After adding a significant amount of data, they are now unable to open the file. Which of the following should a technician do to resolve the issue?

A.

Revert the spreadsheet to the last restore point.

B.

Increase the amount of RAM.

C.

Defragment the storage drive.

D.

Upgrade the network connection speed.

Full Access
Question # 14

A security administrator teaches all of an organization's staff members to use BitLocker To Go. Which of the following best describes the reason for this training?

A.

To ensure that all removable media is password protected in case of loss or theft

B.

To enable Secure Boot and a BIOS-level password to prevent configuration changes

C.

To enforce VPN connectivity to be encrypted by hardware modules

D.

To configure all laptops to use the TPM as an encryption factor for hard drives

Full Access
Question # 15

A client reports that their browser's home page changed. Every time they run an internet search, the results are returned from unfamiliar websites. Which of the following actions should a technician take first to resolve the issue? (Select two)

A.

Clear the browsing history

B.

Run operating system updates

C.

Check the system date and time

D.

Uninstall malicious extensions

E.

Reset browser startup page

F.

Restart the user's machine

Full Access
Question # 16

A user takes an iOS-based smartphone that is performing slowly to a repair shop. A shop technician finds the following information:

Battery charge: 25%

Battery health: 90%

Hotspot: On

Mobile reception: |||

Roaming: Off

Used space: 63.76GB/64GB

Which of the following is the cause of the issue?

A.

The device is running out of free space

B.

The battery health is low

C.

The phone is not sufficiently charged

D.

The hotspot is degrading the performance

E.

Too many applications are open

Full Access
Question # 17

A desktop technician is mapping a remote Windows share \\WinNAS\shared as local drive Z:. Which command should the technician run?

A.

nslookup -opt 3: \WinNAS\shared

B.

net use 3: \WinNAS\shared

C.

chkdsk /R 2: \WinNAS\shared

D.

sfc /offwindir 3: \WinNAS\shared

Full Access
Question # 18

A technician is 3-D printing high-strength, carbon fiber-based filament parts for a customer order. Which of the following is the most important for the technician to use?

A.

Steel-toed boots

B.

Air filter mask

C.

ESD mat

D.

Antistatic bags

Full Access
Question # 19

A Windows 11 Home device is receiving constant pop-ups about an urgent need to update antivirus software to remove a detected threat. The user has been clicking the "X" button in the window frame but it always reappears. The pop-up includes an "OK" button to install the update and remove the threat. Which of the following should the user do next?

A.

Click the "OK" button to install the update

B.

Reinstall the Windows Operating System

C.

Run System File Checker

D.

Verify the current status and settings of protection measures

Full Access
Question # 20

An administrator received an email stating that the OS they are currently supporting will no longer receive security updates and patches. Which of the following is the most likely reason?

A.

Support from the computer’s manufacturer is expiring

B.

The OS will be considered end of life

C.

The built-in security software is being removed from the next OS version

D.

A new version of the OS will be released soon

Full Access
Question # 21

A technician is assigned to offboard a user. Which of the following are common tasks on an offboarding checklist? (Choose two.)

A.

Quarantine the hard drive in the user's laptop.

B.

Deactivate the user's key fobs for door access.

C.

Purge all PII associated with the user.

D.

Suspend the user's email account.

E.

Turn off the network ports underneath the user's desk.

F.

Add the MAC address of the user's computer to a blocklist.

Full Access
Question # 22

A user reports that the time on their computer does not match the time on their VoIP phone. What should a technician do?

A.

Confirm the user is logging in to the domain.

B.

Manually set the time on the phone to match the computer.

C.

Download and install the latest BIOS update.

D.

Configure access to an available NTP server.

Full Access
Question # 23

Which of the following is used to apply corporate restrictions on an Apple device?

A.

App Store

B.

VPN configuration

C.

Apple ID

D.

Management profile

Full Access
Question # 24

A user reports that their corporate mobile phone is lost. Which of the following protects the data locally on the phone from unauthorized access?

A.

Password manager

B.

Degaussing

C.

Remote wipe

D.

Antivirus

Full Access
Question # 25

The battery on a user’s smartphone discharges quickly during travel. The phone was replaced two weeks ago. What should the technician do first?

A.

Replace the battery with a higher capacity option

B.

Provide an external battery

C.

Ensure the charging port is working

D.

Look for applications that are reporting the highest utilization

Full Access
Question # 26

A customer wants to be able to work from home but does not want to be responsible for bringing company equipment back and forth. Which of the following would allow the user to remotely access and use a Windows PC at the main office? (Choose two.)

A.

SPICE

B.

SSH

C.

RDP

D.

VPN

E.

RMM

F.

WinRM

Full Access
Question # 27

Multiple users clicked a phishing link from a compromised email account. The security team isolates and removes the threat. Then, the management team provides security awareness training to the company. What step is this?

A.

Provide user education.

B.

Compile lessons learned.

C.

Update the antivirus software.

D.

Perform additional scans.

Full Access
Question # 28

Technicians are failing to document user contact information, device asset tags, and a clear description of each issue in the ticketing system. Which of the following should a help desk management team implement for technicians to use on every call?

A.

Service-level agreements

B.

Call categories

C.

Standard operating procedures

D.

Knowledge base articles

Full Access
Question # 29

A technician completes the installation of an OS that appears to be successful. However, when the technician removes the USB drive that was used for the installation and restarts the system, the error “No boot device found” appears. Which of the following should the technician do next to resolve the issue?

A.

Reinstall the OS from a new ISO

B.

Enable UEFI devices in the BIOS

C.

Restart in recovery mode and troubleshoot

D.

Install storage drivers for the motherboard

E.

Reseat the SATA cable

Full Access
Question # 30

A user recently installed an application that accesses a database from a local server. When launching the application, it does not populate any information. Which of the following command-line tools is the best to troubleshoot the issue?

A.

ipconfig

B.

nslookup

C.

netstat

D.

curl

Full Access
Question # 31

Every time a user loads a specific spreadsheet, their computer is temporarily unresponsive. The user also notices that the title bar indicates the application is not responding. Which of the following would a technician most likely inspect?

A.

Anti-malware logs

B.

Workstation repair options

C.

Bandwidth status as reported in the Task Manager

D.

File size and related memory utilization

Full Access
Question # 32

When a corporate laptop is connected to the company network, it can reach external websites. However, it cannot reach any internal websites, displaying the error message “Cannot reach this page.” Which of the following should a technician configure?

A.

Subnet mask

B.

DNS settings

C.

Default gateway

D.

DHCP

Full Access
Question # 33

A technician is installing a cloud-based productivity suite and gets an error saying the installation is unavailable. What should be tried first?

A.

Reinstall the productivity suite

B.

Download an open-source alternative

C.

Check the license device limit

D.

Update the device OS

Full Access
Question # 34

Technicians are failing to document user contact information, device asset tags, and a clear description of each issue in the ticketing system. What should the help desk management implement?

A.

Service-level agreements

B.

Call categories

C.

Standard operating procedures

D.

Knowledge base articles

Full Access
Question # 35

A user wants to dispose of a failed hard drive in a way that ensures the data is unrecoverable. Which of the following is the best at-home method?

A.

Standard formatting

B.

Low-level formatting

C.

Shredding

D.

Degaussing

E.

Drilling

Full Access
Question # 36

A technician needs to map a shared drive from a command-line interface. Which of the following commands should the technician use?

A.

pathping

B.

nslookup

C.

net use

D.

tracert

Full Access
Question # 37

Which of the following is the best reason for a network engineering team to provide a help desk technician with IP addressing information to use on workstations being deployed in a secure network segment?

A.

Only specific DNS servers are allowed outbound access.

B.

The network allow list is set to a specific address.

C.

DHCP services are not enabled for this subnet.

D.

NAC servers only allow for security updates to be installed.

Full Access
Question # 38

A technician is deploying mobile devices and needs to prevent access to sensitive data if the devices are lost. Which of the following is the best way to prevent unauthorized access if the user is unaware that the phone is lost?

A.

Encryption

B.

Remote wipe

C.

Geofencing

D.

Facial recognition

Full Access
Question # 39

A technician needs to download and install a new web browser on a desktop. Which attribute should be used to verify the installer's authenticity?

A.

Date

B.

Hash

C.

Size

D.

Name

Full Access
Question # 40

A Microsoft OS laptop user frequently forgets their password. Which alternative login method should a technician enable?

A.

Single sign-on

B.

Windows Hello

C.

BitLocker

D.

User Account Control

Full Access
Question # 41

An end user's laptop is having network drive connectivity issues in the office. The end user submits a help desk ticket, and a support technician is able to establish a remote connection and fix the issue. The following day, however, the network drive is disconnected again. Which of the following should the technician do next?

A.

Connect remotely to the user's computer to see whether the network drive is still connected.

B.

Send documentation about how to fix the issue in case it reoccurs.

C.

Escalate the ticket to the next level.

D.

Keep the ticket open until next day, then close the ticket.

Full Access
Question # 42

Which of the following is the quickest way to move from Windows 10 to Windows 11 without losing data?

A.

Using gpupdate

B.

Image deployment

C.

Clean install

D.

In-place upgrade

Full Access
Question # 43

A technician uses AI to draft a proposal about the benefits of new software. When reading the draft, the technician notices that the draft contains factually incorrect information. Which of the following best describes this scenario?

A.

Data privacy

B.

Hallucinations

C.

Appropriate use

D.

Plagiarism

Full Access
Question # 44

A technician needs to configure laptops so that only administrators can enable virtualization technology if needed. Which of the following should the technician configure?

A.

BIOS password

B.

Guest account

C.

Screen lock

D.

AutoRun setting

Full Access
Question # 45

A technician is using a credential manager to safeguard a large number of credentials. Which of the following is important for using this application?

A.

Restricted log-in times

B.

Secure master password

C.

TPM module

D.

Windows lock screen

Full Access
Question # 46

After a user installs a mobile application from an advertisement, the phone's battery dies a few hours later and becomes hot to touch, even when not in use. Which of the following should a technician do first?

A.

Check for unauthorized device administrators

B.

Contact the software developer

C.

Run a mobile malware scan on the phone

D.

Ensure appropriate MDM policies are applied

Full Access
Question # 47

Which of the following methods involves requesting a user’s approval via a push notification to verify the user’s identity?

A.

Call

B.

Authenticator

C.

Hardware token

D.

SMS

Full Access