Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtreat

220-1202 CompTIA A+ Core 2 2025 Exam Questions and Answers

Questions 4

Which of the following malware types typically has very high computing resource usage?

Options:

A.

Rootkit

B.

Cryptominer

C.

Boot sector virus

D.

Trojan

Buy Now
Questions 5

Which of the following is used in addition to a password to implement MFA?

Options:

A.

Sending a code to the user's phone

B.

Verifying the user's date of birth

C.

Prompting the user to solve a simple math problem

D.

Requiring the user to enter a PIN

Buy Now
Questions 6

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users’ audio issues are resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Questions 7

A technician is installing a cloud-based productivity suite and gets an error saying the installation is unavailable. What should be tried first?

Options:

A.

Reinstall the productivity suite

B.

Download an open-source alternative

C.

Check the license device limit

D.

Update the device OS

Buy Now
Questions 8

A small office reported a phishing attack that resulted in a malware infection. A technician is investigating the incident and has verified the following:

● All endpoints are updated and have the newest EDR signatures.

● Logs confirm that the malware was quarantined by EDR on one system.

● The potentially infected machine was reimaged.

Which of the following actions should the technician take next?

Options:

A.

Install network security tools to prevent downloading infected files from the internet

B.

Discuss the cause of the issue and educate the end user about security hygiene

C.

Flash the firmware of the router to ensure the integrity of network traffic

D.

Suggest alternate preventative controls that would include more advanced security software

Buy Now
Questions 9

A technician installs a Bluetooth headset for a user. During testing, the sound still comes from the speaker on the computer. The technician verifies the headset shows up in Device Manager. Which of the following would the technician most likely do to fix this issue?

Options:

A.

Update the drivers for the wireless headset

B.

Replace the battery on the headset and try again later

C.

Verify that the sound is not muted in the control panel

D.

Change the headset as the default device in sound settings

Buy Now
Questions 10

Which of the following filesystems supports read and write operations for Windows, macOS, and Linux?

Options:

A.

exFAT

B.

ReFS

C.

NTFS

D.

APFS

E.

ext4

Buy Now
Questions 11

A technician is securing a newly deployed workstation. Only authorized users should access it. Which actions should the technician take? (Select two)

Options:

A.

Defragment the hard drive

B.

Enable SSH

C.

Enable screensaver locks

D.

Disable iCloud integration

E.

Enable the firewall

F.

Apply the BIOS password

Buy Now
Questions 12

A user is working from home and is unable to access work files on a company laptop. Which of the following should a technician configure to fix the network access issue?

Options:

A.

Wide-area network

B.

Wireless network

C.

Proxy network settings

D.

Virtual private network

Buy Now
Questions 13

An international traveler is concerned about others accessing the contents of their smartphone if it is lost or stolen. The traveler has enabled biometrics. Which of the following additional security measures further reduces the risk of unauthorized data access?

Options:

A.

Remote backups

B.

Location tracking

C.

PIN code screen lock

D.

Device encryption

Buy Now
Questions 14

A customer’s computer does not have an active connection to the network. A technician goes through a few troubleshooting steps but is unable to resolve the issue. The technician has exhausted their knowledge. The customer expresses frustration at the time taken to resolve this issue. Which of the following should the technician do?

Options:

A.

Escalate the issue to a senior team member and provide next steps to the customer.

B.

Dismiss the customer and reschedule another troubleshooting session at a later date.

C.

Interrupt the customer and express that troubleshooting support tickets can take time.

D.

Maintain a positive attitude and continue to ask questions regarding the scope of the issue.

Buy Now
Questions 15

Which of the following methods would make data unrecoverable but allow the drive to be repurposed?

Options:

A.

Deleting the partitions

B.

Implementing EFS

C.

Performing a low-level format

D.

Degaussing the device

Buy Now
Questions 16

An employee is using a photo editing program. Certain features are disabled and require a log-in, which the employee does not have. Which of the following is a way to resolve this issue?

Options:

A.

License assignment

B.

VPN connection

C.

Application repair

D.

Program reinstallation

Buy Now
Questions 17

A user decides to switch to Windows from Linux and is trying to migrate data using an external USB hard disk. However, when the user connects the cable to the Windows machine, an error message appears stating the device must be formatted before it can be used. The hard disk works as expected when connected to the Linux machine. Which of the following should the user do to resolve this issue?

Options:

A.

Configure Windows firewall to allow data from Linux systems

B.

Replace the cable with Windows-supported hardware

C.

Apply a firmware update from the PC manufacturer

D.

Update the file allocation system to exFAT

Buy Now
Questions 18

An administrator must rename the administrator account on a Windows desktop. Which tool is best for this?

Options:

A.

lusrmgr.msc

B.

devmgmt.msc

C.

gpedit.msc

D.

eventvwr.msc

Buy Now
Questions 19

Which of the following filesystem types does the Linux OS use?

Options:

A.

exFAT

B.

APFS

C.

ext4

D.

NTFS

Buy Now
Questions 20

A technician needs to disable guest log-ins on domain-joined desktop machines. Which of the following should the technician use?

Options:

A.

Group Policy

B.

Firewall

C.

Microsoft Management Control

D.

MSConfig

Buy Now
Questions 21

A user's application only works with a legacy version of the OS. The OS is reaching its end-of-life date. For security reasons, the company is migrating to the current version of the OS. Which of the following is the most efficient way to complete the migration while maintaining accessibility to the application?

Options:

A.

Terminal server

B.

Bare-metal server

C.

Multiboot

D.

Virtualization

Buy Now
Questions 22

A technician is reviewing an organization's current incident management policy. The organization uses a third-party vendor to protect the organization's assets with multiple tools. Which of the following service types is the organization using?

Options:

A.

PaaS

B.

EDR

C.

MDR

D.

XDR

Buy Now
Questions 23

A technician is attempting to join a workstation to a domain but is receiving an error message stating the domain cannot be found. However, the technician is able to ping the server and access the internet. Given the following information:

IP Address – 192.168.1.210

Subnet Mask – 255.255.255.0

Gateway – 192.168.1.1

DNS1 – 8.8.8.8

DNS2 – 1.1.1.1

Server – 192.168.1.10

Which of the following should the technician do to fix the issue?

Options:

A.

Change the DNS settings.

B.

Assign a static IP address.

C.

Configure a subnet mask.

D.

Update the default gateway.

Buy Now
Questions 24

A company recently transitioned to a cloud-based productivity suite and wants to secure the environment from external threat actors. Which of the following is the most effective method?

Options:

A.

Multifactor authentication

B.

Encryption

C.

Backups

D.

Strong passwords

Buy Now
Questions 25

A user reports that their corporate mobile phone is lost. Which of the following protects the data locally on the phone from unauthorized access?

Options:

A.

Password manager

B.

Degaussing

C.

Remote wipe

D.

Antivirus

Buy Now
Questions 26

A user recently installed an application that accesses a database from a local server. When launching the application, it does not populate any information. Which of the following command-line tools is the best to troubleshoot the issue?

Options:

A.

ipconfig

B.

nslookup

C.

netstat

D.

curl

Buy Now
Questions 27

A technician uses AI to draft a document about new software benefits. Upon reading, the technician sees factually incorrect info. What term best describes this?

Options:

A.

Data privacy

B.

Hallucinations

C.

Appropriate use

D.

Plagiarism

Buy Now
Questions 28

After using a third-party disk optimization software package, a technician restarts a laptop and receives the message “No operating system found.” The technician verifies that the BIOS properly recognizes the SSD. Which of the following should the technician do next?

Options:

A.

Update BitLocker settings in the BIOS

B.

Replace the CMOS battery

C.

Boot from installation media and repair the MBR

D.

Isolate the system from the corporate network

Buy Now
Questions 29

A help desk technician needs to remove RAM from retired workstations and upgrade other workstations that have applications that use more memory with this RAM. Which of the following actions would the technician most likely take?

Options:

A.

Demagnetize memory for security.

B.

Use antistatic bags for storage and transport.

C.

Plug in the power supply to ground each workstation.

D.

Install memory in identical pairs.

Buy Now
Questions 30

A user's computer is running slowly. Web pages take several seconds to open, and applications are slow to respond. A technician opens the Windows Task Manager and sees the following:

Disk: 2%

Network: 12%

GPU: 15%

CPU: 70%

Memory: 97%

Which of the following would a technician most likely do to resolve the issue?

Options:

A.

Clear browser cached data

B.

Upgrade the network connection

C.

Close unnecessary programs

D.

Delete temporary files

Buy Now
Questions 31

Why would a network engineering team provide a help desk technician with IP addresses for a wired network segment?

Options:

A.

Only specific DNS servers are allowed outbound.

B.

The network allow list is set to a specific address.

C.

DHCP is not enabled for this subnet.

D.

NAC servers only allow security updates to be installed.

Buy Now
Questions 32

A technician is preparing to replace the batteries in a rack-mounted UPS system. After ensuring the power is turned off and the batteries are fully discharged, the technician needs to remove the battery modules from the bottom of the rack. Which of the following steps should the technician take?

Options:

A.

Ensure the fire suppression system is ready to be activated.

B.

Use appropriate lifting techniques and guidelines.

C.

Place the removed batteries in an antistatic bag.

D.

Wear a face mask to filter out any harmful fumes.

Buy Now
Questions 33

A technician needs to configure laptops so that only administrators can enable virtualization technology if needed. Which of the following should the technician configure?

Options:

A.

BIOS password

B.

Guest account

C.

Screen lock

D.

AutoRun setting

Buy Now
Questions 34

After using a third-party disk optimization software package, a technician restarts a laptop and receives the message "No operating system found." The technician verifies that the BIOS properly recognizes the SSD. Which of the following should the technician do next?

Options:

A.

Update BitLocker settings in the BIOS

B.

Replace the CMOS battery

C.

Boot from installation media and repair the MBR

D.

Isolate the system from the corporate network

Buy Now
Questions 35

Which of the following are system folders on macOS? (Select two)

Options:

A.

Applications

B.

Spotlight

C.

Time Machine

D.

Library

E.

FileVault

F.

iCloud

Buy Now
Questions 36

An organization is experiencing an increased number of issues. A technician notices applications that are not installed by default. Users are reporting an increased number of system prompts for software licensing. Which of the following would the security team most likely do to remediate the root cause?

Options:

A.

Deploy an internal PKI to filter encrypted web traffic.

B.

Remove users from the local admin group.

C.

Implement stronger controls to block suspicious websites.

D.

Enable stricter UAC settings on Windows.

Buy Now
Questions 37

A Windows 11 Home device is receiving constant pop-ups about an urgent need to update antivirus software to remove a detected threat. The user has been clicking the "X" button in the window frame but it always reappears. The pop-up includes an "OK" button to install the update and remove the threat. Which of the following should the user do next?

Options:

A.

Click the "OK" button to install the update

B.

Reinstall the Windows Operating System

C.

Run System File Checker

D.

Verify the current status and settings of protection measures

Buy Now
Questions 38

A technician needs to map a shared drive from a command-line interface. Which of the following commands should the technician use?

Options:

A.

pathping

B.

nslookup

C.

net use

D.

tracert

Buy Now
Questions 39

A user takes an iOS-based smartphone that is performing slowly to a repair shop. A shop technician finds the following information:

Battery charge: 25%

Battery health: 90%

Hotspot: On

Mobile reception: |||

Roaming: Off

Used space: 63.76GB/64GB

Which of the following is the cause of the issue?

Options:

A.

The device is running out of free space

B.

The battery health is low

C.

The phone is not sufficiently charged

D.

The hotspot is degrading the performance

E.

Too many applications are open

Buy Now
Questions 40

An administrator is investigating a zero-day vulnerability. If left unpatched, it could severely impact business. The patch requires downtime. What should the administrator do?

Options:

A.

Create a standard change request.

B.

Implement an emergency change.

C.

Immediately freeze all changes.

D.

Continue operations until the next change interval.

Buy Now
Questions 41

Every time a user loads a specific spreadsheet, their computer is temporarily unresponsive. The user also notices that the title bar indicates the application is not responding. Which of the following would a technician most likely inspect?

Options:

A.

Anti-malware logs

B.

Workstation repair options

C.

Bandwidth status as reported in the Task Manager

D.

File size and related memory utilization

Buy Now
Questions 42

A user frequently misplaces their Windows laptop and is concerned about it being stolen. The user would like additional security controls on their laptop. Which of the following is a built-in technology that a technician can use to enable full drive encryption?

Options:

A.

Active Directory

B.

New Technology File System

C.

Encrypting File System

D.

BitLocker

Buy Now
Questions 43

A user wants to dispose of a failed hard drive in a way that ensures the data is unrecoverable. Which of the following is the best at-home method?

Options:

A.

Standard formatting

B.

Low-level formatting

C.

Shredding

D.

Degaussing

E.

Drilling

Buy Now
Questions 44

A help desk technician is setting up speech recognition on a Windows system. Which of the following settings should the technician use?

Options:

A.

Time and Language

B.

Personalization

C.

System

D.

Ease of Access

Buy Now
Questions 45

A network technician notices that most of the company's network switches are now end-of-life and need to be upgraded. Which of the following should the technician do first?

Options:

A.

Implement the change

B.

Approve the change

C.

Propose the change

D.

Schedule the change

Buy Now
Questions 46

A technician follows proper malware removal procedures but cannot remove all malware. They decide to reload the OS. What should they select?

Options:

A.

Version upgrade

B.

System restore

C.

OS repair

D.

Clean install

Buy Now
Questions 47

An administrator received an email stating that the OS they are currently supporting will no longer receive security updates and patches. Which of the following is the most likely reason?

Options:

A.

Support from the computer’s manufacturer is expiring

B.

The OS will be considered end of life

C.

The built-in security software is being removed from the next OS version

D.

A new version of the OS will be released soon

Buy Now

A+ |

Exam Code: 220-1202
Exam Name: CompTIA A+ Core 2 2025 Exam
Last Update: Jun 2, 2025
Questions: 157
220-1202 pdf

220-1202 PDF

$29.75  $84.99
220-1202 Engine

220-1202 Testing Engine

$35  $99.99
220-1202 PDF + Engine

220-1202 PDF + Testing Engine

$47.25  $134.99