Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

220-1202 CompTIA A+ Core 2 2025 Exam Questions and Answers

Questions 4

Which of the following is used to detect and record access to restricted areas?

Options:

A.

Bollards

B.

Video surveillance

C.

Badge readers

D.

Fence

Buy Now
Questions 5

A user cannot upload files to corporate servers from their mobile device when outside the office, but uploads work fine in-office. What should a technician do to determine the root cause?

Options:

A.

Check the data usage limit

B.

Enable airplane mode

C.

Verify the last device reboot

D.

Enable Bluetooth connectivity

Buy Now
Questions 6

Which of the following describes an attack in which an attacker sets up a rogue AP that tricks users into connecting to the rogue AP instead of the legitimate network?

Options:

A.

Stalkerware

B.

Evil twin

C.

Tailgating

D.

Shoulder surfing

Buy Now
Questions 7

Which of the following file types allows macOS users to uninstall software completely by placing the file in the trash?

Options:

A.

.app

B.

.msi

C.

.exe

D.

.rpm

E.

.pkg

Buy Now
Questions 8

Which of the following filesystems supports read and write operations for Windows, macOS, and Linux?

Options:

A.

exFAT

B.

ReFS

C.

NTFS

D.

APFS

E.

ext4

Buy Now
Questions 9

A town clerk wants to work from home and access documents on a town hall server. What should a technician set up?

Options:

A.

VNC

B.

RDP

C.

VPN

D.

SSH

Buy Now
Questions 10

What is the next step a technician should take after completing malware cleanup?

Options:

A.

Perform a secondary antivirus scan

B.

Educate the end user

C.

Reimage the computer

D.

Review system logs

Buy Now
Questions 11

Options:

A.

Implement an appropriate group policy.

B.

Configure automatic updates for Windows.

C.

Reset account passwords.

D.

Enable account lockout policies.

Buy Now
Questions 12

After completing malware removal steps, what is the next step the technician should take?

Options:

A.

Perform a secondary antivirus scan

B.

Educate the end user

C.

Reimage the computer

D.

Review system logs

Buy Now
Questions 13

Which of the following methods would make data unrecoverable but allow the drive to be repurposed?

Options:

A.

Deleting the partitions

B.

Implementing EFS

C.

Performing a low-level format

D.

Degaussing the device

Buy Now
Questions 14

A user is experiencing issues with outdated images while browsing websites. Which of the following settings should a technician use to correct this issue?

Options:

A.

Administrative Tools

B.

Windows Defender Firewall

C.

Internet Options

D.

Ease of Access

Buy Now
Questions 15

You have been contacted through the help desk chat application. A user is setting up a replacement SOHO router. Assist the user with setting up the router.

INSTRUCTIONS

Select the most appropriate statement for each response. Click the send button after each response to continue the chat.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

220-1202 Question 15

Options:

Buy Now
Questions 16

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users’ audio issues are resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

220-1202 Question 16

220-1202 Question 16

220-1202 Question 16

220-1202 Question 16

220-1202 Question 16

220-1202 Question 16

220-1202 Question 16

220-1202 Question 16

220-1202 Question 16

220-1202 Question 16

220-1202 Question 16

Options:

Buy Now
Questions 17

Welcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

INSTRUCTIONS

Click on individual tickets to see the ticket details, and view applicable attachments to

determine the problem.

Select the appropriate issue from the ' Issue ' drop-down menu. Then, select the most

efficient resolution from the ' Resolution ' drop-down menu. Finally, select the proper

command or verification to remediate or confirm your fix of the issue from the

' Verify/Resolve ' drop-down menu.

220-1202 Question 17

Options:

Buy Now
Questions 18

A user reports that after a recent software deployment to upgrade the Testing application, they can no longer use it. However, other employees can successfully

use the Testing program.

INSTRUCTIONS

Review the information in each tab to verify the results of the deployment and resolve

any issues discovered by selecting the:

· First command to resolve the issue

· Second command to resolve the issue

220-1202 Question 18

220-1202 Question 18

220-1202 Question 18

Options:

Buy Now
Questions 19

As a corporate technician, you are asked to evaluate several suspect email messages on a client ' s computer. Corporate policy requires the following:

> All phishing attempts must be reported.

> Future spam emails to users must be prevented.

INSTRUCTIONS

Review each email and perform the following within the email:

> Classify the emails

> Identify suspicious items, if applicable, in each email

> Select the appropriate resolution

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

220-1202 Question 19

220-1202 Question 19

220-1202 Question 19

220-1202 Question 19

220-1202 Question 19

220-1202 Question 19

Options:

Buy Now
Questions 20

You are configuring a home network for a customer. The customer has requested the ability to access a Windows PC remotely, and needs all chat and optional functions to work in their game console.

INSTRUCTIONS

Use the drop-down menus to complete the network configuration for the customer. Each option may only be used once, and not all options will be used.

Then, click the + sign to place each device in its appropriate location.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Wireless AP LAN

220-1202 Question 20

Firewall Screened Subnet

220-1202 Question 20

220-1202 Question 20

Options:

Buy Now
Questions 21

Welcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

INSTRUCTIONS

Click on individual tickets to see the ticket details, and view applicable attachments to

determine the problem.

Select the appropriate issue from the ' Issue ' drop-down menu. Then, select the most

efficient resolution from the ' Resolution ' drop-down menu. Finally, select the proper

command or verification to remediate or confirm your fix of the issue from the

' Verify/Resolve ' drop-down menu.

220-1202 Question 21

Options:

Buy Now
Questions 22

Options:

A.

WinRM

B.

RMM

C.

Videoconferencing

D.

Secure file transfer

Buy Now
Questions 23

A user takes an iOS-based smartphone that is performing slowly to a repair shop. A shop technician finds the following information:

Battery charge: 25%

Battery health: 90%

Hot-spot: On

Mobile reception: |||

Roaming: Off

Used space: 63.76GB/64GB

Which of the following is the cause of the issue?

Options:

A.

The device is running out of free space

B.

The battery health is low

C.

The phone is not sufficiently charged

D.

The hotspot is degrading the performance

E.

Too many applications are open

Buy Now
Questions 24

A technician notices that the weekly backup is taking too long to complete. The daily backups are incremental. Which of the following would most likely resolve the issue?

Options:

A.

Changing the backup window

B.

Performing incremental weekly backups

C.

Increasing the backup storage

D.

Running synthetic full weekly backups

Buy Now
Questions 25

Options:

A.

Perform both full and differential backups.

B.

Test the backup integrity every three weeks.

C.

Keep all backup media on site for fast recovery.

D.

Use at least two different types of media.

Buy Now
Questions 26

Options:

A.

chmod

B.

cat

C.

ls (corrected from “Is”)

D.

sudo

Buy Now
Questions 27

A technician follows proper malware removal procedures but cannot remove all malware. They decide to reload the OS. What should they select?

Options:

A.

Version upgrade

B.

System restore

C.

OS repair

D.

Clean install

Buy Now
Questions 28

A user logs in to a computer each morning and tries to print a daily report, but it will not print. The help desk resolves the issue each day temporarily. To fix this permanently, which of the following should the technician do? (Select two)

Options:

A.

Set the print spooler to have no dependencies

B.

Set the print spooler recovery to take no action

C.

Start the printer extensions and notifications service

D.

Start the print spooler service

E.

Set the print spooler to Automatic

F.

Set the print spooler log-on to the user ' s account

Buy Now
Questions 29

A company would like to deploy baseline images to new computers as they are started up on the network. Which of the following boot processes should the company use for this task?

Options:

A.

ISO

B.

Secure

C.

USB

D.

PXE

Buy Now
Questions 30

A user wants to connect a retro gaming console to the internet so that they can participate in online gaming. In order for the console to work, the Wi-Fi connection must adhere to a WPA-protected broadcast. Which of the following is the best option for the user to implement?

Options:

A.

Create a lower-security network exclusively for the console

B.

Set the router to WPA and then back to normal after using the console

C.

Use a wired Ethernet adapter to connect the console

D.

Connect an older wireless router to the existing network

Buy Now
Questions 31

Which of the following types of social engineering attacks sends an unsolicited text message to a user ' s mobile device?

Options:

A.

Impersonation

B.

Vishing

C.

Spear phishing

D.

Smishing

Buy Now
Questions 32

Options:

A.

Device Manager

B.

Virtual RAM

C.

BIOS options

D.

System Configuration

Buy Now
Questions 33

A client reports that their browser ' s home page changed. Every time they run an internet search, the results are returned from unfamiliar websites. Which of the following actions should a technician take first to resolve the issue? (Select two)

Options:

A.

Clear the browsing history

B.

Run operating system updates

C.

Check the system date and time

D.

Uninstall malicious extensions

E.

Reset browser startup page

F.

Restart the user ' s machine

Buy Now
Questions 34

A company computer is being repurposed within an organization. The existing configuration has a static IP address, but it is no longer required. Which of the following should a technician do to satisfy the network requirements?

Options:

A.

Make a DHCP reservation for the computer

B.

Create an exclusion in the existing IP scheme

C.

Switch the NIC settings from manual to automatic

D.

Change the currently assigned static IP

Buy Now
Questions 35

A user ' s application only works with a legacy version of the OS. The OS is reaching its end-of-life date. For security reasons, the company is migrating to the current version of the OS. Which of the following is the most efficient way to complete the migration while maintaining accessibility to the application?

Options:

A.

Terminal server

B.

Bare-metal server

C.

Multiboot

D.

Virtualization

Buy Now
Questions 36

A user receives a new personal computer but is unable to run an application. An error displays saying that .NET Framework 3.5 is required and not found. Which of the following actions is the best way to resolve this issue?

Options:

A.

Resolve the dependency through the ' Turn Windows features on or off ' menu.

B.

Download the dependency via a third-party repository.

C.

Ignore the dependency and install the latest version 4 instead.

D.

Forward the trouble ticket to the SOC team because the issue poses a great security risk.

Buy Now
Questions 37

A company wants to perform an in-place upgrade of operating systems on all workstations. All types of removable storage are disabled for security reasons. Which of the following is the best way to upgrade while keeping security settings in place?

Options:

A.

Using an external hard drive to upgrade the OS

B.

Copying the ISO file to each workstation and executing

C.

Setting up image deployment for PXE

D.

Using a hardware token to access upgrade files

Buy Now
Questions 38

Which of the following must be followed during incident response to ensure the collected evidence is properly handled and accounted for?

Options:

A.

Order of volatility for data

B.

Law enforcement notification procedures

C.

Data integrity best practices

D.

Chain of custody process

Buy Now
Questions 39

A technician is troubleshooting a print spooler that fails to start on a Windows 11 desktop computer. The technician determines the root cause is that required dependencies are failing to run. Which of the following tools is the technician using?

Options:

A.

Process

B.

Services

C.

Startup

D.

Performance

Buy Now
Questions 40

Which of the following is the quickest way to move from Windows 10 to Windows 11 without losing data?

Options:

A.

Using gpupdate

B.

Image deployment

C.

Clean install

D.

In-place upgrade

Buy Now
Exam Code: 220-1202
Exam Name: CompTIA A+ Core 2 2025 Exam
Last Update: Mar 11, 2026
Questions: 269

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now 220-1202 testing engine

PDF (Q&A)

$43.57  $124.49
buy now 220-1202 pdf