Pre-Summer Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

220-1202 CompTIA A+ Core 2 2025 Exam Questions and Answers

Questions 4

Which of the following commands is used to manage files in a Linux OS?

Options:

A.

robocopy

B.

curl

C.

xcopy

D.

cp

Buy Now
Questions 5

After installing new webcam software, a PC experiences BSOD during videoconference calls. What should the technician do next?

Options:

A.

Update the anti-malware signature and scan the system

B.

File a warranty claim with the manufacturer

C.

Start in Safe Mode and roll back the device driver

D.

Reconnect the webcam to the computer

Buy Now
Questions 6

While working from home, the Chief Financial Officer (CFO) needs to open reports from accounting software. When the application opens, the CFO sees the error “unable to connect to database.” Which of the following should the CFO do first?

Options:

A.

Confirm the application is up to date

B.

Return to the office

C.

Restart the PC

D.

Verify the VPN status

Buy Now
Questions 7

You are configuring a home network for a customer. The customer has requested the ability to access a Windows PC remotely, and needs all chat and optional functions to work in their game console.

INSTRUCTIONS

Use the drop-down menus to complete the network configuration for the customer. Each option may only be used once, and not all options will be used.

Then, click the + sign to place each device in its appropriate location.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Wireless AP LAN

Firewall Screened Subnet

Options:

Buy Now
Questions 8

Options:

A.

A drawn pattern

B.

A fingerprint

C.

A password

D.

A PIV card (corrected from “APIV card”)

Buy Now
Questions 9

Options:

A.

macOS

B.

Linux

C.

ChromeOS

D.

Windows

Buy Now
Questions 10

An engineer notices that many websites prompt users to input login and payment details. The engineer wants to require the browser to encrypt communications. Which of the following best helps to protect sensitive data?

Options:

A.

Disabling all cookies

B.

Disabling JavaScript

C.

Enabling a pop-up blocker

D.

Enabling HTTPS-Only Mode

Buy Now
Questions 11

A smartphone user unsuccessfully attempts to open an email attachment that includes an unexpected overdue invoice. After that attempt, the user notices performance issues while using the mobile browser and other applications. The user restarts the smartphone, but the issue persists. Which of the following actions would most likely resolve the issue?

Options:

A.

Forcing the smartphone to shut down and restarting it

B.

Deleting the email containing the attachment

C.

Wiping the device and resetting it to factory defaults

D.

Uninstalling and reinstalling the mobile browser

Buy Now
Questions 12

A help desk technician recently installed an SSH client on a workstation in order to access remote servers. What does this enable?

Options:

A.

To utilize an SSO connection

B.

To securely establish a console session

C.

To encrypt and decrypt protected messages

D.

To facilitate device log reviews

Buy Now
Questions 13

Which of the following file types is best for performing automated tasks on startup on a Windows computer?

Options:

A.

SH

B.

MSI

C.

BAT

D.

EXE

Buy Now
Questions 14

Which of the following is the quickest way to move from Windows 10 to Windows 11 without losing data?

Options:

A.

Using gpupdate

B.

Image deployment

C.

Clean install

D.

In-place upgrade

Buy Now
Questions 15

When a corporate laptop is connected to the company network, it can reach external websites. However, it cannot reach any internal websites, displaying the error message “Cannot reach this page.” Which of the following should a technician configure?

Options:

A.

Subnet mask

B.

DNS settings

C.

Default gateway

D.

DHCP

Buy Now
Questions 16

A desktop technician is mapping a remote Windows share \\WinNAS\shared as local drive Z:. Which command should the technician run?

Options:

A.

nslookup -opt 3: \WinNAS\shared

B.

net use 3: \WinNAS\shared

C.

chkdsk /R 2: \WinNAS\shared

D.

sfc /offwindir 3: \WinNAS\shared

Buy Now
Questions 17

A technician is troubleshooting a print spooler that fails to start on a Windows 11 desktop computer. The technician determines the root cause is that required dependencies are failing to run. Which of the following tools is the technician using?

Options:

A.

Process

B.

Services

C.

Startup

D.

Performance

Buy Now
Questions 18

A technician completes the installation of an OS that appears to be successful. However, when the technician removes the USB drive that was used for the installation and restarts the system, the error “No boot device found” appears. Which of the following should the technician do next to resolve the issue?

Options:

A.

Reinstall the OS from a new ISO

B.

Enable UEFI devices in the BIOS

C.

Restart in recovery mode and troubleshoot

D.

Install storage drivers for the motherboard

E.

Reseat the SATA cable

Buy Now
Questions 19

A technician is attempting to join a workstation to a domain but is receiving an error message stating the domain cannot be found. However, the technician is able to ping the server and access the internet. Given the following information:

IP Address – 192.168.1.210

Subnet Mask – 255.255.255.0

Gateway – 192.168.1.1

DNS1 – 8.8.8.8

DNS2 – 1.1.1.1

Server – 192.168.1.10

Which of the following should the technician do to fix the issue?

Options:

A.

Change the DNS settings.

B.

Assign a static IP address.

C.

Configure a subnet mask.

D.

Update the default gateway.

Buy Now
Questions 20

Which of the following file types allows macOS users to uninstall software completely by placing the file in the trash?

Options:

A.

.app

B.

.msi

C.

.exe

D.

.rpm

E.

.pkg

Buy Now
Questions 21

A technician is working on multiple remote machines using a command line. Which of the following commands should the technician use to verify which SMB shares are currently mapped?

Options:

A.

systeminfo

B.

hostname

C.

net use

D.

nslookup

Buy Now
Questions 22

Which of the following file types would a desktop support technician most likely use to automate tasks for a Windows user log-in?

Options:

A.

.bat

B.

.sh

C.

.py

D.

.js

Buy Now
Questions 23

Multiple users clicked a phishing link from a compromised email account. The security team isolates and removes the threat. Then, the management team provides security awareness training to the company. What step is this?

Options:

A.

Provide user education.

B.

Compile lessons learned.

C.

Update the antivirus software.

D.

Perform additional scans.

Buy Now
Questions 24

A technician needs to map a shared drive from a command-line interface. Which of the following commands should the technician use?

Options:

A.

pathping

B.

nslookup

C.

net use

D.

tracert

Buy Now
Questions 25

A technician needs to change hibernation settings on a Windows computer via a batch file. Domain policies are unavailable. Which is the best method?

Options:

A.

Use Power Options in Control Panel

B.

Update the computer’s firmware

C.

Run gpupdate from command prompt

D.

Use the powercfg command in PowerShell

Buy Now
Questions 26

A Microsoft OS laptop user requests an alternative log-in authentication method because they have forgotten their password multiple times. Which of the following should a technician enable to satisfy this request?

Options:

A.

Single sign-on

B.

Windows Hello

C.

BitLocker

D.

User Account Control

Buy Now
Questions 27

A customer is unable to open some files on their system. Each time the customer attempts to open a file, the customer receives a message that the file is encrypted. Which of the following best describes this issue?

Options:

A.

Keylogger

B.

Ransomware

C.

Phishing

D.

Cryptominer

Buy Now
Questions 28

A user ' s application only works with a legacy version of the OS. The OS is reaching its end-of-life date. For security reasons, the company is migrating to the current version of the OS. Which of the following is the most efficient way to complete the migration while maintaining accessibility to the application?

Options:

A.

Terminal server

B.

Bare-metal server

C.

Multiboot

D.

Virtualization

Buy Now
Questions 29

Which of the following must be followed during incident response to ensure the collected evidence is properly handled and accounted for?

Options:

A.

Order of volatility for data

B.

Law enforcement notification procedures

C.

Data integrity best practices

D.

Chain of custody process

Buy Now
Questions 30

A company computer is being repurposed within an organization. The existing configuration has a static IP address, but it is no longer required. Which of the following should a technician do to satisfy the network requirements?

Options:

A.

Make a DHCP reservation for the computer

B.

Create an exclusion in the existing IP scheme

C.

Switch the NIC settings from manual to automatic

D.

Change the currently assigned static IP

Buy Now
Questions 31

Options:

A.

Basic input/output system

B.

New Technology File System

C.

Trusted Platform Module

D.

Master boot record

Buy Now
Questions 32

Which of the following is a Linux command that is used for administrative purposes?

Options:

A.

runas

B.

cmcl

C.

net user

D.

su

Buy Now
Questions 33

A user is attempting to open on a mobile phone a HD video that is hosted on a popular media streaming website. The user is receiving connection timeout errors. The mobile reception icon area is showing two bars next to 3G. Which of the following is the most likely cause of the issue?

Options:

A.

The user does not have Wi-Fi enabled.

B.

The website ' s subscription has run out.

C.

The bandwidth is not fast enough.

D.

The mobile device storage is full.

Buy Now
Questions 34

A company recently transitioned to a cloud-based productivity suite and wants to secure the environment from external threat actors. Which of the following is the most effective method?

Options:

A.

Multifactor authentication

B.

Encryption

C.

Backups

D.

Strong passwords

Buy Now
Questions 35

Options:

A.

Overclock the RAM.

B.

Enable NIC teaming.

C.

Select dedicated graphics.

D.

Activate CPU hyperthreading.

Buy Now
Questions 36

A company wants to prevent unauthorized physical access to its mobile devices. Which of the following should the company do? (Select two).

Options:

A.

Disable built-in hotspots.

B.

Configure VPN software.

C.

Install an antivirus application.

D.

Use PIN authentication.

E.

Turn on location services.

F.

Enable screen timeout.

Buy Now
Questions 37

Welcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

INSTRUCTIONS

Click on individual tickets to see the ticket details, and view applicable attachments to

determine the problem.

Select the appropriate issue from the ' Issue ' drop-down menu. Then, select the most

efficient resolution from the ' Resolution ' drop-down menu. Finally, select the proper

command or verification to remediate or confirm your fix of the issue from the

' Verify/Resolve ' drop-down menu.

Options:

Buy Now
Questions 38

Why would a network engineering team provide a help desk technician with IP addresses for a wired network segment?

Options:

A.

Only specific DNS servers are allowed outbound.

B.

The network allow list is set to a specific address.

C.

DHCP is not enabled for this subnet.

D.

NAC servers only allow security updates to be installed.

Buy Now
Questions 39

A technician is installing a cloud-based productivity suite and gets an error saying the installation is unavailable. What should be tried first?

Options:

A.

Reinstall the productivity suite

B.

Download an open-source alternative

C.

Check the license device limit

D.

Update the device OS

Buy Now
Questions 40

A technician is reviewing an organization ' s current incident management policy. The organization uses a third-party vendor to protect the organization ' s assets with multiple tools. Which of the following service types is the organization using?

Options:

A.

PaaS

B.

EDR

C.

MDR

D.

XDR

Buy Now
Questions 41

Which of the following is a protocol that provides AAA for network services?

Options:

A.

RADIUS

B.

Kerberos

C.

TKIP

D.

WPA3

Buy Now
Questions 42

A developer is using an AI tool to generate a complex sorting algorithm for a web application. Which of the following is the best choice to legally generate code in their application?

Options:

A.

Use the generated code in their application silently

B.

Insert comments in their application for the generated code

C.

Credit the author of the generated code in their application

D.

Check the sources the AI tool is using for copyrighted content

Buy Now
Questions 43

Which of the following concepts should a technician consider when discussing confidential work projects with individuals outside the company?

Options:

A.

EULA

B.

EOL

C.

SLA

D.

NDA

Buy Now
Questions 44

A user reports that after a recent software deployment to upgrade the Testing application, they can no longer use it. However, other employees can successfully

use the Testing program.

INSTRUCTIONS

Review the information in each tab to verify the results of the deployment and resolve

any issues discovered by selecting the:

· First command to resolve the issue

· Second command to resolve the issue

Options:

Buy Now
Questions 45

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users’ audio issues are resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Questions 46

As a corporate technician, you are asked to evaluate several suspect email messages on a client ' s computer. Corporate policy requires the following:

> All phishing attempts must be reported.

> Future spam emails to users must be prevented.

INSTRUCTIONS

Review each email and perform the following within the email:

> Classify the emails

> Identify suspicious items, if applicable, in each email

> Select the appropriate resolution

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Questions 47

You have been contacted through the help desk chat application. A user is setting up a replacement SOHO router. Assist the user with setting up the router.

INSTRUCTIONS

Select the most appropriate statement for each response. Click the send button after each response to continue the chat.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now

A+ |

Exam Code: 220-1202
Exam Name: CompTIA A+ Core 2 2025 Exam
Last Update: Apr 18, 2026
Questions: 265
220-1202 pdf

220-1202 PDF

$25.5  $84.99
220-1202 Engine

220-1202 Testing Engine

$30  $99.99
220-1202 PDF + Engine

220-1202 PDF + Testing Engine

$40.5  $134.99