Summer Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

CompTIA 220-1202 CompTIA A+ Core 2 2025 Exam Exam Practice Test

Page: 1 / 16
Total 157 questions

CompTIA A+ Core 2 2025 Exam Questions and Answers

Question 1

A technician needs to disable guest log-ins on domain-joined desktop machines. Which of the following should be used?

Options:

A.

Group Policy

B.

Firewall

C.

Microsoft Management Console

D.

MSConfig

Question 2

An administrator received an email stating that the OS they are currently supporting will no longer be issued security updates and patches. Which of the following is most likely the reason the administrator received this message?

Options:

A.

Support from the computer's manufacturer is expiring

B.

The OS will be considered end of life

C.

The built-in security software is being removed from the next OS version

D.

A new version of the OS will be released soon

Question 3

A secretary receives an email from the company's chief executive officer with a request to pay a vendor immediately. After the payment is made, the CEO informs the secretary that they never sent that email. Which of the following social engineering tactics best describes this type of attack?

Options:

A.

Evil twin

B.

Impersonation

C.

Whaling

D.

Spear phishing

Question 4

An administrator received an email stating that the OS they are currently supporting will no longer be issued security updates and patches. Which of the following is most likely the reason the administrator received this message?

Options:

A.

Support from the computer’s manufacturer is expiring

B.

The OS will be considered end of life

C.

The built-in security software is being removed from the next OS version

D.

A new version of the OS will be released soon

Question 5

An administrator is investigating a technical outage. The management team wants information that includes the summary of the outage and actions taken. Which of the following documentation should the administrator provide?

Options:

A.

Knowledge base article

B.

Non-disclosure agreement

C.

Incident report

D.

Standard operating procedure

Question 6

A user is attempting to open on a mobile phone a HD video that is hosted on a popular media streaming website. The user is receiving connection timeout errors. The mobile reception icon area is showing two bars next to 3G. Which of the following is the most likely cause of the issue?

Options:

A.

The user does not have Wi-Fi enabled.

B.

The website's subscription has run out.

C.

The bandwidth is not fast enough.

D.

The mobile device storage is full.

Question 7

A company would like to deploy baseline images to new computers as they are started up on the network. Which of the following boot processes should the company use for this task?

Options:

A.

ISO

B.

Secure

C.

USB

D.

PXE

Question 8

After a user installs a mobile application from an advertisement, the phone's battery dies a few hours later and becomes hot to touch, even when not in use. Which of the following should a technician do first?

Options:

A.

Check for unauthorized device administrators

B.

Contact the software developer

C.

Run a mobile malware scan on the phone

D.

Ensure appropriate MDM policies are applied

Question 9

A network technician notices that most of the company's network switches are now end-of-life and need to be upgraded. What should the technician do first?

Options:

A.

Implement the change

B.

Approve the change

C.

Document the change

D.

Schedule the change

Question 10

An administrator must rename the administrator account on a Windows desktop. Which tool is best for this?

Options:

A.

lusrmgr.msc

B.

devmgmt.msc

C.

gpedit.msc

D.

eventvwr.msc

Question 11

Which of the following prevents forced entry into a building?

Options:

A.

PIV card

B.

Motion-activated lighting

C.

Video surveillance

D.

Bollard

Question 12

A user switches from Linux to Windows and tries to migrate data using an external USB drive. Windows prompts that the device must be formatted. It works fine on Linux. What should the user do?

Options:

A.

Configure Windows firewall to allow data from Linux systems

B.

Replace the cable with Windows-supported hardware

C.

Apply a firmware update from the PC manufacturer

D.

Update the file allocation system to exFAT

Question 13

A technician is securing a newly deployed workstation. Only authorized users should access it. Which actions should the technician take? (Select two)

Options:

A.

Defragment the hard drive

B.

Enable SSH

C.

Enable screensaver locks

D.

Disable iCloud integration

E.

Enable the firewall

F.

Apply the BIOS password

Question 14

A technician uses AI to draft a document about new software benefits. Upon reading, the technician sees factually incorrect info. What term best describes this?

Options:

A.

Data privacy

B.

Hallucinations

C.

Appropriate use

D.

Plagiarism

Question 15

After a user installs a mobile application from an advertisement, the phone's battery dies a few hours later, and it is hot to the touch, even when not in use. Which of the following should a technician do first?

Options:

A.

Check for unauthorized device administrators

B.

Contact the software developer

C.

Run a mobile malware scan on the phone

D.

Ensure appropriate MDM policies are applied

Question 16

A technician is troubleshooting a print spooler that fails to start on a Windows 11 desktop computer. The technician determines the root cause is that required dependencies are failing to run. Which of the following tools is the technician using?

Options:

A.

Process

B.

Services

C.

Startup

D.

Performance

Question 17

A technician is deploying mobile devices and needs to prevent access to sensitive data if the devices are lost. Which of the following is the best way to prevent unauthorized access if the user is unaware that the phone is lost?

Options:

A.

Encryption

B.

Remote wipe

C.

Geofencing

D.

Facial recognition

Question 18

A user takes an iOS-based smartphone that is performing slowly to a repair shop. A shop technician finds the following information:

Battery charge: 25%

Battery health: 90%

Hotspot: On

Mobile reception: |||

Roaming: Off

Used space: 63.76GB/64GB

Which of the following is the cause of the issue?

Options:

A.

The device is running out of free space

B.

The battery health is low

C.

The phone is not sufficiently charged

D.

The hotspot is degrading the performance

E.

Too many applications are open

Question 19

A technician is setting up a Windows server to allow remote desktop connections for multiple users. Which of the following should the technician configure on the workstation?

Options:

A.

Firewall

B.

Computer Management

C.

User Accounts

D.

Ease of Access

Question 20

Which of the following is a protocol that provides AAA for network services?

Options:

A.

RADIUS

B.

Kerberos

C.

TKIP

D.

WPA3

Question 21

A help desk technician is setting up speech recognition on a Windows system. Which of the following settings should the technician use?

Options:

A.

Time and Language

B.

Personalization

C.

System

D.

Ease of Access

Question 22

A technician needs to provide remote support for a legacy Linux-based operating system from their Windows laptop. The solution needs to allow the technician to see what the user is doing and provide the ability to interact with the user's session. Which of the following remote access technologies would support the use case?

Options:

A.

VPN

B.

VNC

C.

SSH

D.

RDP

Question 23

An end user's laptop is having network drive connectivity issues in the office. The end user submits a help desk ticket, and a support technician is able to establish a remote connection and fix the issue. The following day, however, the network drive is disconnected again. Which of the following should the technician do next?

Options:

A.

Connect remotely to the user's computer to see whether the network drive is still connected.

B.

Send documentation about how to fix the issue in case it reoccurs.

C.

Escalate the ticket to the next level.

D.

Keep the ticket open until next day, then close the ticket.

Question 24

Which of the following is used to apply corporate restrictions on an Apple device?

Options:

A.

App Store

B.

VPN configuration

C.

Apple ID

D.

Management profile

Question 25

The battery on a user’s smartphone discharges quickly during travel. The phone was replaced two weeks ago. What should the technician do first?

Options:

A.

Replace the battery with a higher capacity option

B.

Provide an external battery

C.

Ensure the charging port is working

D.

Look for applications that are reporting the highest utilization

Question 26

A small office reported a phishing attack that resulted in a malware infection. A technician is investigating the incident and has verified the following:

● All endpoints are updated and have the newest EDR signatures.

● Logs confirm that the malware was quarantined by EDR on one system.

● The potentially infected machine was reimaged.

Which of the following actions should the technician take next?

Options:

A.

Install network security tools to prevent downloading infected files from the internet

B.

Discuss the cause of the issue and educate the end user about security hygiene

C.

Flash the firmware of the router to ensure the integrity of network traffic

D.

Suggest alternate preventative controls that would include more advanced security software

Question 27

A Microsoft OS laptop user requests an alternative log-in authentication method because they have forgotten their password multiple times. Which of the following should a technician enable to satisfy this request?

Options:

A.

Single sign-on

B.

Windows Hello

C.

BitLocker

D.

User Account Control

Question 28

Which of the following provides information to employees, such as permitted activities when using the organization's resources?

Options:

A.

AUP

B.

MNDA

C.

DRM

D.

EULA

Question 29

A technician needs to install an operating system on a large number of workstations. Which of the following is the fastest method?

Options:

A.

Physical media

B.

Mountable ISO

C.

Manual installation

D.

Image deployment

Question 30

A user logs in to a computer each morning and tries to print a daily report, but it will not print. The help desk resolves the issue each day temporarily. To fix this permanently, which of the following should the technician do? (Select two)

Options:

A.

Set the print spooler to have no dependencies

B.

Set the print spooler recovery to take no action

C.

Start the printer extensions and notifications service

D.

Start the print spooler service

E.

Set the print spooler to Automatic

F.

Set the print spooler log-on to the user's account

Question 31

A technician installs a Bluetooth headset for a user. During testing, the sound still comes from the speaker on the computer. The technician verifies the headset shows up in Device Manager. Which of the following would the technician most likely do to fix this issue?

Options:

A.

Update the drivers for the wireless headset

B.

Replace the battery on the headset and try again later

C.

Verify that the sound is not muted in the control panel

D.

Change the headset as the default device in sound settings

Question 32

A user is unable to use the latest version of an app on a legacy tablet. What is the most likely reason?

Options:

A.

The OS is end-of-life

B.

Space is inadequate

C.

MDM is blocking updates

D.

The tablet is infected with malware

Question 33

A user is unable to upload files to the corporate servers from their mobile phone when outside the office, but uploading files works without issue in the office. The user saw an error notification but dismissed it. Which of the following should a technician do to determine the root cause?

Options:

A.

Check the data usage limit

B.

Enable airplane mode

C.

Verify the last device reboot

D.

Enable Bluetooth connectivity

Question 34

A company wants to use a single operating system for its workstations and servers and avoid licensing fees. Which of the following operating systems would the company most likely select?

Options:

A.

Linux

B.

Windows

C.

macOS

D.

Chrome OS

Question 35

A user has been adding data to the same spreadsheet for several years. After adding a significant amount of data, they are now unable to open the file. Which of the following should a technician do to resolve the issue?

Options:

A.

Revert the spreadsheet to the last restore point.

B.

Increase the amount of RAM.

C.

Defragment the storage drive.

D.

Upgrade the network connection speed.

Question 36

A technician is reviewing an organization's current incident management policy. The organization uses a third-party vendor to protect the organization's assets with multiple tools. Which of the following service types is the organization using?

Options:

A.

PaaS

B.

EDR

C.

MDR

D.

XDR

Question 37

MFA for a custom web application on a user's smartphone is no longer working. The last time the user remembered it working was before taking a vacation to another country. Which of the following should the technician do first?

Options:

A.

Verify the date and time settings

B.

Apply mobile OS patches

C.

Uninstall and reinstall the application

D.

Escalate to the website developer

Question 38

A security administrator teaches all of an organization's staff members to use BitLocker To Go. Which of the following best describes the reason for this training?

Options:

A.

To ensure that all removable media is password protected in case of loss or theft

B.

To enable Secure Boot and a BIOS-level password to prevent configuration changes

C.

To enforce VPN connectivity to be encrypted by hardware modules

D.

To configure all laptops to use the TPM as an encryption factor for hard drives

Question 39

A user’s computer is running slowly. Task Manager shows:

Disk: 2%

Network: 12%

GPU: 15%

CPU: 70%

Memory: 97%

Which of the following would a technician most likely do to resolve the issue?

Options:

A.

Clear browser cached data

B.

Upgrade the network connection

C.

Close unnecessary programs

D.

Delete temporary files

Question 40

A customer’s laptop will not turn on. The customer is distraught and panicking because the laptop contains family pictures that can never be replaced. Which of the following communication techniques is most important for the technician to demonstrate in this situation?

Options:

A.

The technician should provide the customer with the appropriate SLA

B.

The technician should inform the customer about replacement options for an increased cost

C.

The technician should project confidence and maintain a positive attitude

D.

The technician should be dressed in appropriate business casual attire

Question 41

An end user wants to have a sales printer added to their computer. The printer is on the domain. Which of the following is the best method for the technician to add the printer?

Options:

A.

Go to the print server and select the printer name

B.

Connect the laptop to the printer via USB

C.

Connect to the printer via Bluetooth

D.

Go to Local Users and Groups to add the printer

Question 42

A town clerk wants to work from home and access documents on a town hall server. What should a technician set up?

Options:

A.

VNC

B.

RDP

C.

VPN

D.

SSH

Question 43

A client reports that their browser's home page changed. Every time they run an internet search, the results are returned from unfamiliar websites. Which of the following actions should a technician take first to resolve the issue? (Select two)

Options:

A.

Clear the browsing history

B.

Run operating system updates

C.

Check the system date and time

D.

Uninstall malicious extensions

E.

Reset browser startup page

F.

Restart the user's machine

Question 44

Multiple users clicked a phishing link from a compromised email account. The security team isolates and removes the threat. Then, the management team provides security awareness training to the company. What step is this?

Options:

A.

Provide user education.

B.

Compile lessons learned.

C.

Update the antivirus software.

D.

Perform additional scans.

Question 45

Which of the following authentication methods is the best way to prevent users from frequently entering their credentials?

Options:

A.

Access control list

B.

Single sign-on

C.

Multifactor authentication

D.

One-time password

Question 46

When a corporate laptop is connected to the company network, it can reach external websites. However, it cannot reach any internal websites, displaying the error message “Cannot reach this page.” Which of the following should a technician configure?

Options:

A.

Subnet mask

B.

DNS settings

C.

Default gateway

D.

DHCP

Question 47

An administrator is investigating a technical outage. The management team wants information that includes the summary of the outage and actions taken. Which of the following documentation should the administrator provide to the management team?

Options:

A.

Knowledge base article

B.

Non-disclosure agreement

C.

Incident report

D.

Standard operating procedure

Page: 1 / 16
Total 157 questions