Halloween Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

220-1202 PDF

$33

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

220-1202 PDF + Testing Engine

$52.8

$175.99

3 Months Free Update

  • Exam Name: CompTIA A+ Core 2 2025 Exam
  • Last Update: Oct 29, 2025
  • Questions and Answers: 157
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

220-1202 Engine

$39.6

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

220-1202 Practice Exam Questions with Answers CompTIA A+ Core 2 2025 Exam Certification

Question # 6

You have been contacted through the help desk chat application. A user is setting up a replacement SOHO router. Assist the user with setting up the router.

INSTRUCTIONS

Select the most appropriate statement for each response. Click the send button after each response to continue the chat.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

220-1202 question answer

Full Access
Question # 7

A technician verifies that a malware incident occurred on some computers in a small office. Which of the following should the technician do next?

A.

Quarantine the infected systems

B.

Educate the end users

C.

Disable System Restore

D.

Update the anti-malware and scan the computers

Full Access
Question # 8

A technician installs a Bluetooth headset for a user. During testing, the sound still comes from the speaker on the computer. The technician verifies the headset shows up in Device Manager. Which of the following would the technician most likely do to fix this issue?

A.

Update the drivers for the wireless headset

B.

Replace the battery on the headset and try again later

C.

Verify that the sound is not muted in the control panel

D.

Change the headset as the default device in sound settings

Full Access
Question # 9

A technician uses AI to draft a document about new software benefits. Upon reading, the technician sees factually incorrect info. What term best describes this?

A.

Data privacy

B.

Hallucinations

C.

Appropriate use

D.

Plagiarism

Full Access
Question # 10

Which of the following is used in addition to a password to implement MFA?

A.

Sending a code to the user's phone

B.

Verifying the user's date of birth

C.

Prompting the user to solve a simple math problem

D.

Requiring the user to enter a PIN

Full Access
Question # 11

A technician needs to map a shared drive from a command-line interface. Which of the following commands should the technician use?

A.

pathping

B.

nslookup

C.

net use

D.

tracert

Full Access
Question # 12

Which of the following is the best reason for a network engineering team to provide a help desk technician with IP addressing information to use on workstations being deployed in a secure network segment?

A.

Only specific DNS servers are allowed outbound access.

B.

The network allow list is set to a specific address.

C.

DHCP services are not enabled for this subnet.

D.

NAC servers only allow for security updates to be installed.

Full Access
Question # 13

A technician is setting up a Windows server to allow remote desktop connections for multiple users. Which of the following should the technician configure on the workstation?

A.

Firewall

B.

Computer Management

C.

User Accounts

D.

Ease of Access

Full Access
Question # 14

Which of the following file types would a desktop support technician most likely use to automate tasks for a Windows user log-in?

A.

.bat

B.

.sh

C.

.py

D.

.js

Full Access
Question # 15

A user has rooted their corporate phone to load unapproved software. Which of the following tools should the company use to prevent access to the corporate network?

A.

Mobile device management

B.

Encryption

C.

Geofencing

D.

Lock screen

Full Access
Question # 16

A technician needs to change hibernation settings on a Windows computer via a batch file. Domain policies are unavailable. Which is the best method?

A.

Use Power Options in Control Panel

B.

Update the computer’s firmware

C.

Run gpupdate from command prompt

D.

Use the powercfg command in PowerShell

Full Access
Question # 17

An organization sees unauthorized apps installed and licensing prompts. What should the security team do?

A.

Deploy an internal PKI to filter encrypted web traffic.

B.

Remove users from the local admin group.

C.

Implement stronger controls to block suspicious websites.

D.

Enable stricter UAC settings on Windows.

Full Access
Question # 18

What is the next step a technician should take after completing malware cleanup?

A.

Perform a secondary antivirus scan

B.

Educate the end user

C.

Reimage the computer

D.

Review system logs

Full Access
Question # 19

After a user installs a mobile application from an advertisement, the phone's battery dies a few hours later and becomes hot to touch, even when not in use. Which of the following should a technician do first?

A.

Check for unauthorized device administrators

B.

Contact the software developer

C.

Run a mobile malware scan on the phone

D.

Ensure appropriate MDM policies are applied

Full Access
Question # 20

An application's performance is degrading over time. The application is slowing, but it never gives an error and does not crash. Which of the following tools should a technician use to start troubleshooting?

A.

Reliability history

B.

Computer management

C.

Resource monitor

D.

Disk

Full Access
Question # 21

A technician thinks that an application a user downloaded from the internet may not be the legitimate one, even though the name is the same. The technician needs to confirm whether the application is legitimate. Which of the following should the technician do?

A.

Compare the hash value from the vendor.

B.

Run Task Manager and compare the process ID.

C.

Run the application in safe mode.

D.

Verify the file name is correct.

Full Access
Question # 22

Various alerts on a user's Windows 11 laptop are continually interrupting videoconference calls. Which of the following should a support technician recommend to best solve the issue?

A.

Use multiple sound output devices for the various source applications

B.

Disable all notifications in different applications in the order they appear

C.

Configure the Sounds option in Control Panel to be set to No Sounds

D.

Set Windows Notifications settings to Do Not Disturb

Full Access
Question # 23

A secretary receives an email from the company's chief executive officer with a request to pay a vendor immediately. After the payment is made, the CEO informs the secretary that they never sent that email. Which of the following social engineering tactics best describes this type of attack?

A.

Evil twin

B.

Impersonation

C.

Whaling

D.

Spear phishing

Full Access
Question # 24

What is found in an MSDS (Material Safety Data Sheet) for a battery backup?

A.

Installation instructions

B.

Emergency procedures

C.

Configuration steps

D.

Voltage

Full Access
Question # 25

A technician uses AI to draft a proposal about the benefits of new software. When reading the draft, the technician notices that the draft contains factually incorrect information. Which of the following best describes this scenario?

A.

Data privacy

B.

Hallucinations

C.

Appropriate use

D.

Plagiarism

Full Access
Question # 26

Which of the following types of social engineering attacks sends an unsolicited text message to a user's mobile device?

A.

Impersonation

B.

Vishing

C.

Spear phishing

D.

Smishing

Full Access
Question # 27

A desktop technician is mapping a remote Windows share \\WinNAS\shared as local drive Z:. Which command should the technician run?

A.

nslookup -opt 3: \WinNAS\shared

B.

net use 3: \WinNAS\shared

C.

chkdsk /R 2: \WinNAS\shared

D.

sfc /offwindir 3: \WinNAS\shared

Full Access
Question # 28

An employee is using a photo editing program. Certain features are disabled and require a log-in, which the employee does not have. Which of the following is a way to resolve this issue?

A.

License assignment

B.

VPN connection

C.

Application repair

D.

Program reinstallation

Full Access
Question # 29

A company wants to use a single operating system for its workstations and servers and avoid licensing fees. Which of the following operating systems would the company most likely select?

A.

Linux

B.

Windows

C.

macOS

D.

Chrome OS

Full Access
Question # 30

A client reports that their browser's home page changed. Every time they run an internet search, the results are returned from unfamiliar websites. Which of the following actions should a technician take first to resolve the issue? (Select two)

A.

Clear the browsing history

B.

Run operating system updates

C.

Check the system date and time

D.

Uninstall malicious extensions

E.

Reset browser startup page

F.

Restart the user's machine

Full Access
Question # 31

A technician needs to configure laptops so that only administrators can enable virtualization technology if needed. Which of the following should the technician configure?

A.

BIOS password

B.

Guest account

C.

Screen lock

D.

AutoRun setting

Full Access
Question # 32

Which of the following describes an attack in which an attacker sets up a rogue AP that tricks users into connecting to the rogue AP instead of the legitimate network?

A.

Stalkerware

B.

Evil twin

C.

Tailgating

D.

Shoulder surfing

Full Access
Question # 33

An end user's laptop is having network drive connectivity issues in the office. The end user submits a help desk ticket, and a support technician is able to establish a remote connection and fix the issue. The following day, however, the network drive is disconnected again. Which of the following should the technician do next?

A.

Connect remotely to the user's computer to see whether the network drive is still connected.

B.

Send documentation about how to fix the issue in case it reoccurs.

C.

Escalate the ticket to the next level.

D.

Keep the ticket open until next day, then close the ticket.

Full Access
Question # 34

A user frequently misplaces their Windows laptop and is concerned about it being stolen. The user would like additional security controls on their laptop. Which of the following is a built-in technology that a technician can use to enable full drive encryption?

A.

Active Directory

B.

New Technology File System

C.

Encrypting File System

D.

BitLocker

Full Access
Question # 35

A user is unable to upload files to the corporate servers from their mobile phone when outside the office, but uploading files works without issue in the office. The user saw an error notification but dismissed it. Which of the following should a technician do to determine the root cause?

A.

Check the data usage limit

B.

Enable airplane mode

C.

Verify the last device reboot

D.

Enable Bluetooth connectivity

Full Access
Question # 36

A user is attempting to open on a mobile phone a HD video that is hosted on a popular media streaming website. The user is receiving connection timeout errors. The mobile reception icon area is showing two bars next to 3G. Which of the following is the most likely cause of the issue?

A.

The user does not have Wi-Fi enabled.

B.

The website's subscription has run out.

C.

The bandwidth is not fast enough.

D.

The mobile device storage is full.

Full Access
Question # 37

Which of the following provides information to employees, such as permitted activities when using the organization's resources?

A.

AUP

B.

MNDA

C.

DRM

D.

EULA

Full Access
Question # 38

A user receives a new personal computer but is unable to run an application. An error displays saying that .NET Framework 3.5 is required and not found. Which of the following actions is the best way to resolve this issue?

A.

Resolve the dependency through the 'Turn Windows features on or off' menu.

B.

Download the dependency via a third-party repository.

C.

Ignore the dependency and install the latest version 4 instead.

D.

Forward the trouble ticket to the SOC team because the issue poses a great security risk.

Full Access
Question # 39

A technician is 3-D printing high-strength, carbon fiber-based filament parts for a customer order. Which of the following is the most important for the technician to use?

A.

Steel-toed boots

B.

Air filter mask

C.

ESD mat

D.

Antistatic bags

Full Access
Question # 40

A customer wants to be able to work from home but does not want to be responsible for bringing company equipment back and forth. Which of the following would allow the user to remotely access and use a Windows PC at the main office? (Choose two.)

A.

SPICE

B.

SSH

C.

RDP

D.

VPN

E.

RMM

F.

WinRM

Full Access
Question # 41

Which of the following is used to store passwords in macOS?

A.

FileVault

B.

Keychain

C.

Accessibility

D.

Mission Control

Full Access
Question # 42

A user logs in daily and cannot print a report. Help desk fixes it each day, but the issue recurs. What should be done so the issue doesn’t recur? (Select two)

A.

Set the print spooler to have no dependencies

B.

Set the print spooler recovery to take no action

C.

Start the printer extensions and notifications service

D.

Start the print spooler service

E.

Set the print spooler to Automatic

F.

Set the print spooler log-on to the user's account

Full Access
Question # 43

Which of the following prevents forced entry into a building?

A.

PIV card

B.

Motion-activated lighting

C.

Video surveillance

D.

Bollard

Full Access
Question # 44

A secretary receives an email from the CEO requesting immediate vendor payment. Later, the CEO says they never sent it. Which social engineering tactic is this?

A.

Evil twin

B.

Impersonation

C.

Whaling

D.

Spear phishing

Full Access
Question # 45

The battery on a user’s smartphone discharges quickly when the user travels. The smartphone was replaced two weeks ago. Which of the following should a technician do first?

A.

Replace the battery with a higher capacity option

B.

Provide an external battery to extend the usage time

C.

Ensure that the charging port is working as expected

D.

Look for applications that are reporting the highest utilization

Full Access
Question # 46

A Windows 11 Home device is receiving constant pop-ups about an urgent need to update antivirus software in order to remove a detected threat. The user has been clicking the "X" button but the window keeps reappearing. The pop-up includes an "OK" button to install the update. What should the user do next?

A.

Click the "OK" button to install the update

B.

Reinstall the Windows Operating System

C.

Run System File Checker

D.

Verify the current status and settings of protection measures

Full Access
Question # 47

The screen of a previously working computer repeatedly displays an OS Not Found error message when the computer is started. Only a USB drive, a keyboard, and a mouse are plugged into the computer. Which of the following should a technician do first?

A.

Run data recovery tools on the disk

B.

Partition the disk using the GPT format

C.

Check boot options

D.

Switch from UEFI to BIOS

Full Access