Spring Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

220-1202 CompTIA A+ Core 2 2025 Exam Questions and Answers

Questions 4

Which of the following is an example of an application publisher including undisclosed additional software in an installation package?

Options:

A.

Virus

B.

Ransomware

C.

Potentially unwanted program

D.

Trojan

Buy Now
Questions 5

Which of the following concepts should a technician consider when discussing confidential work projects with individuals outside the company?

Options:

A.

EULA

B.

EOL

C.

SLA

D.

NDA

Buy Now
Questions 6

A user receives a new personal computer but is unable to run an application. An error displays saying that .NET Framework 3.5 is required and not found. Which of the following actions is the best way to resolve this issue?

Options:

A.

Resolve the dependency through the 'Turn Windows features on or off' menu.

B.

Download the dependency via a third-party repository.

C.

Ignore the dependency and install the latest version 4 instead.

D.

Forward the trouble ticket to the SOC team because the issue poses a great security risk.

Buy Now
Questions 7

A customer calls the help desk to report issues with internet connectivity. The customer is frustrated after speaking with multiple representatives who were unable to resolve the issue. A technician reviews the customer’s file and sees several unresolved tickets. Which of the following actions should the technician take to communicate properly and professionally?

Options:

A.

Ask the customer to clarify the issue right away

B.

Escalate the issue without further conversation

C.

Listen to the customer’s concerns and acknowledge their frustrations

D.

Explain that previous technicians followed standard procedure

Buy Now
Questions 8

A company's IT department discovers that unauthorized software has been installed on several workstations. The IT manager requests a review and an update of the workstation security posture, focusing on preventing future unauthorized software installations. Which of the following should the company do?

Options:

A.

Remove account administrative rights

B.

Turn on the workstation firewall

C.

Enable Windows Defender SmartScreen

D.

Install EDR on all devices

Buy Now
Questions 9

A technician needs to change hibernation settings on a Windows computer via a batch file. Domain policies are unavailable. Which is the best method?

Options:

A.

Use Power Options in Control Panel

B.

Update the computer’s firmware

C.

Run gpupdate from command prompt

D.

Use the powercfg command in PowerShell

Buy Now
Questions 10

A user is trying to install new software. The application downloads successfully, but when the user attempts to install it, the user receives a prompt for credentials. Which of the following would the technician most likely do to resolve this issue?

Options:

A.

Restart the user's computer

B.

Use a different web browser to download the application

C.

Change the User Account Control (UAC) settings

D.

Contact the software vendor for support

Buy Now
Questions 11

Which of the following filesystem types does the Linux OS use?

Options:

A.

exFAT

B.

APFS

C.

ext4

D.

NTFS

Buy Now
Questions 12

A company recently transitioned to a cloud-based productivity suite and wants to secure the environment from external threat actors. Which of the following is the most effective method?

Options:

A.

Multifactor authentication

B.

Encryption

C.

Backups

D.

Strong passwords

Buy Now
Questions 13

What is the next step a technician should take after completing malware cleanup?

Options:

A.

Perform a secondary antivirus scan

B.

Educate the end user

C.

Reimage the computer

D.

Review system logs

Buy Now
Questions 14

A technician is troubleshooting an issue in which a service runs momentarily and stops at certain points in the process. The technician needs to determine the root cause of this issue. Which of the following tools should the technician use?

Options:

A.

Event Viewer

B.

Task Manager

C.

Internet Options

D.

Process Explorer

Buy Now
Questions 15

When a corporate laptop is connected to the company network, it can reach external websites. However, it cannot reach any internal websites, displaying the error message “Cannot reach this page.” Which of the following should a technician configure?

Options:

A.

Subnet mask

B.

DNS settings

C.

Default gateway

D.

DHCP

Buy Now
Questions 16

A client reports that their browser's home page changed. Every time they run an internet search, the results are returned from unfamiliar websites. Which of the following actions should a technician take first to resolve the issue? (Select two)

Options:

A.

Clear the browsing history

B.

Run operating system updates

C.

Check the system date and time

D.

Uninstall malicious extensions

E.

Reset browser startup page

F.

Restart the user's machine

Buy Now
Questions 17

An administrator must rename the administrator account on a Windows desktop. Which tool is best for this?

Options:

A.

lusrmgr.msc

B.

devmgmt.msc

C.

gpedit.msc

D.

eventvwr.msc

Buy Now
Questions 18

A company wants to prevent unauthorized physical access to its mobile devices. Which of the following should the company do? (Select two).

Options:

A.

Disable built-in hotspots

B.

Configure VPN software

C.

Install an antivirus application

D.

Use PIN authentication

E.

Turn on location services

F.

Enable screen timeout

Buy Now
Questions 19

A project team needs special access on a shared repository to add new content, edit existing content, and prevent content deletion. Which of the following should an administrator do to configure this setup with the least amount of effort?

Options:

A.

Map the network folder on each user's workstation for controlled access

B.

Create and assign a security group with adequate permissions

C.

Grant administrative permissions to the team

D.

Apply the required permissions to each individual user

Buy Now
Questions 20

A user needs to download some files from a vendor website. Downloading the specific file type is blocked when using the Microsoft Edge web browser. A technician determines that the files the user wants to download are safe. Which of the following should the technician configure to allow these files to be downloaded?

Options:

A.

Defender

B.

SmartScreen

C.

User Account Control

D.

Firewall

Buy Now
Questions 21

A user wants to dispose of a failed hard drive in a way that ensures the data is unrecoverable. Which of the following is the best at-home method?

Options:

A.

Standard formatting

B.

Low-level formatting

C.

Shredding

D.

Degaussing

E.

Drilling

Buy Now
Questions 22

A user is unable to use the latest version of an application on a legacy personal tablet. Which of the following is most likely the reason?

Options:

A.

The OS is end-of-life.

B.

Storage space is inadequate.

C.

MDM is blocking updates.

D.

The tablet is infected with malware.

Buy Now
Questions 23

Which of the following file types is best for performing automated tasks on startup on a Windows computer?

Options:

A.

SH

B.

MSI

C.

BAT

D.

EXE

Buy Now
Questions 24

Welcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

INSTRUCTIONS

Click on individual tickets to see the ticket details, and view applicable attachments to

determine the problem.

Select the appropriate issue from the 'Issue' drop-down menu. Then, select the most

efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper

command or verification to remediate or confirm your fix of the issue from the

'Verify/Resolve' drop-down menu.

Options:

Buy Now
Questions 25

A user reports that after a recent software deployment to upgrade the Testing application, they can no longer use it. However, other employees can successfully

use the Testing program.

INSTRUCTIONS

Review the information in each tab to verify the results of the deployment and resolve

any issues discovered by selecting the:

· First command to resolve the issue

· Second command to resolve the issue

Options:

Buy Now
Questions 26

You are configuring a home network for a customer. The customer has requested the ability to access a Windows PC remotely, and needs all chat and optional functions to work in their game console.

INSTRUCTIONS

Use the drop-down menus to complete the network configuration for the customer. Each option may only be used once, and not all options will be used.

Then, click the + sign to place each device in its appropriate location.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Wireless AP LAN

Firewall Screened Subnet

Options:

Buy Now
Questions 27

As a corporate technician, you are asked to evaluate several suspect email messages on a client's computer. Corporate policy requires the following:

>All phishing attempts must be reported.

>Future spam emails to users must be prevented.

INSTRUCTIONS

Review each email and perform the following within the email:

>Classify the emails

>Identify suspicious items, if applicable, in each email

>Select the appropriate resolution

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Questions 28

Welcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

INSTRUCTIONS

Click on individual tickets to see the ticket details, and view applicable attachments to

determine the problem.

Select the appropriate issue from the 'Issue' drop-down menu. Then, select the most

efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper

command or verification to remediate or confirm your fix of the issue from the

'Verify/Resolve' drop-down menu.

Options:

Buy Now
Questions 29

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users’ audio issues are resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Questions 30

You have been contacted through the help desk chat application. A user is setting up a replacement SOHO router. Assist the user with setting up the router.

INSTRUCTIONS

Select the most appropriate statement for each response. Click the send button after each response to continue the chat.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Questions 31

An end user's laptop is having network drive connectivity issues in the office. The end user submits a help desk ticket, and a support technician is able to establish a remote connection and fix the issue. The following day, however, the network drive is disconnected again. Which of the following should the technician do next?

Options:

A.

Connect remotely to the user's computer to see whether the network drive is still connected.

B.

Send documentation about how to fix the issue in case it reoccurs.

C.

Escalate the ticket to the next level.

D.

Keep the ticket open until next day, then close the ticket.

Buy Now
Questions 32

Which of the following types of social engineering attacks sends an unsolicited text message to a user's mobile device?

Options:

A.

Impersonation

B.

Vishing

C.

Spear phishing

D.

Smishing

Buy Now
Questions 33

Which of the following describes a vulnerability that has been exploited before a patch or remediation is available?

Options:

A.

Spoofing

B.

Brute-force

C.

DoS

D.

Zero-day

Buy Now
Questions 34

A user logs in daily and cannot print a report. Help desk fixes it each day, but the issue recurs. What should be done so the issue doesn’t recur? (Select two)

Options:

A.

Set the print spooler to have no dependencies

B.

Set the print spooler recovery to take no action

C.

Start the printer extensions and notifications service

D.

Start the print spooler service

E.

Set the print spooler to Automatic

F.

Set the print spooler log-on to the user's account

Buy Now
Questions 35

A technician needs to disable guest log-ins on domain-joined desktop machines. Which of the following should be used?

Options:

A.

Group Policy

B.

Firewall

C.

Microsoft Management Console

D.

MSConfig

Buy Now

A+ |

Exam Code: 220-1202
Exam Name: CompTIA A+ Core 2 2025 Exam
Last Update: Mar 4, 2026
Questions: 269
220-1202 pdf

220-1202 PDF

$25.5  $84.99
220-1202 Engine

220-1202 Testing Engine

$30  $99.99
220-1202 PDF + Engine

220-1202 PDF + Testing Engine

$40.5  $134.99