Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

220-1202 CompTIA A+ Core 2 2025 Exam Questions and Answers

Questions 4

An administrator is investigating a technical outage. The management team wants information that includes the summary of the outage and actions taken. Which of the following documentation should the administrator provide to the management team?

Options:

A.

Knowledge base article

B.

Non-disclosure agreement

C.

Incident report

D.

Standard operating procedure

Buy Now
Questions 5

An administrator must rename the administrator account on a Windows desktop. Which tool is best for this?

Options:

A.

lusrmgr.msc

B.

devmgmt.msc

C.

gpedit.msc

D.

eventvwr.msc

Buy Now
Questions 6

Which of the following describes a vulnerability that has been exploited before a patch or remediation is available?

Options:

A.

Spoofing

B.

Brute-force

C.

DoS

D.

Zero-day

Buy Now
Questions 7

A technician is using a credential manager to safeguard a large number of credentials. Which of the following is important for using this application?

Options:

A.

Restricted log-in times

B.

Secure master password

C.

TPM module

D.

Windows lock screen

Buy Now
Questions 8

A company wants to prevent unauthorized physical access to its mobile devices. Which of the following should the company do? (Select two).

Options:

A.

Disable built-in hotspots.

B.

Configure VPN software.

C.

Install an antivirus application.

D.

Use PIN authentication.

E.

Turn on location services.

F.

Enable screen timeout.

Buy Now
Questions 9

A company wants to prevent unauthorized physical access to its mobile devices. Which of the following should the company do? (Select two).

Options:

A.

Disable built-in hotspots

B.

Configure VPN software

C.

Install an antivirus application

D.

Use PIN authentication

E.

Turn on location services

F.

Enable screen timeout

Buy Now
Questions 10

Which of the following is an example of an application publisher including undisclosed additional software in an installation package?

Options:

A.

Virus

B.

Ransomware

C.

Potentially unwanted program

D.

Trojan

Buy Now
Questions 11

Options:

A.

Folder permissions

B.

Outdated definitions

C.

Port security not enabled

D.

User account permissions

Buy Now
Questions 12

Which of the following methods involves requesting a user ' s approval via a push notification to verify the user ' s identity?

Options:

A.

Call

B.

Authenticator

C.

Hardware token

D.

SMS

Buy Now
Questions 13

A customer calls the help desk to report issues with internet connectivity. The customer is frustrated after speaking with multiple representatives who were unable to resolve the issue. A technician reviews the customer’s file and sees several unresolved tickets. Which of the following actions should the technician take to communicate properly and professionally?

Options:

A.

Ask the customer to clarify the issue right away

B.

Escalate the issue without further conversation

C.

Listen to the customer’s concerns and acknowledge their frustrations

D.

Explain that previous technicians followed standard procedure

Buy Now
Questions 14

Which of the following security technologies is designed to enable security visibility and respond to traffic outside of the host and at the network level?

Options:

A.

RADIUS

B.

UAC

C.

XDR

D.

Antivirus

Buy Now
Questions 15

Options:

A.

The DNS settings are incorrect.

B.

The firewall configuration is wrong.

C.

IPv6 is enabled on the computer.

D.

The computer is not connected to the network.

Buy Now
Questions 16

An organization is creating a new application. As part of the deployment, the roles and responsibilities for supporting the application need to be documented. Which of the following is designed to contain this information?

Options:

A.

SOP

B.

NDA

C.

DRM

D.

EULA

Buy Now
Questions 17

A computer technician is implementing a solution to support a new internet browsing policy for a customer ' s business. The policy prohibits users from accessing unauthorized websites based on categorization. Which of the following should the technician configure on the SOHO router?

Options:

A.

Secure management access

B.

Group Policy Editor

C.

Content filtering

D.

Firewall

Buy Now
Questions 18

Which of the following is used to apply corporate restrictions on an Apple device?

Options:

A.

App Store

B.

VPN configuration

C.

Apple ID

D.

Management profile

Buy Now
Questions 19

An end user is unable to access the intranet. A technician needs to confirm whether the Windows web server is online and functioning. Which of the following default remote access technologies would the technician most likely use to remotely connect to the server?

Options:

A.

SPICE

B.

VNC

C.

RDP

D.

SSH

Buy Now
Questions 20

A technician thinks that an application a user downloaded from the internet may not be the legitimate one, even though the name is the same. The technician needs to confirm whether the application is legitimate. Which of the following should the technician do?

Options:

A.

Compare the hash value from the vendor.

B.

Run Task Manager and compare the process ID.

C.

Run the application in safe mode.

D.

Verify the file name is correct.

Buy Now
Questions 21

A technician needs to disable guest log-ins on domain-joined desktop machines. Which of the following should the technician use?

Options:

A.

Group Policy

B.

Firewall

C.

Microsoft Management Control

D.

MSConfig

Buy Now
Questions 22

A technician needs to install Windows 11 on a 4TB SSD. The company requires that the drive be partitioned with at least five primary partitions . Which of the following should the technician use? (Select two).

Options:

A.

FAT16

B.

XFS

C.

GPT

D.

MBR

E.

NTFS

F.

APFS

Buy Now
Questions 23

An organization sees unauthorized apps installed and licensing prompts. What should the security team do?

Options:

A.

Deploy an internal PKI to filter encrypted web traffic.

B.

Remove users from the local admin group.

C.

Implement stronger controls to block suspicious websites.

D.

Enable stricter UAC settings on Windows.

Buy Now
Questions 24

Options:

A.

macOS

B.

Linux

C.

ChromeOS

D.

Windows

Buy Now
Questions 25

After using a third-party disk optimization software package, a technician restarts a laptop and receives the message “No operating system found.” The technician verifies that the BIOS properly recognizes the SSD. Which of the following should the technician do next?

Options:

A.

Update BitLocker settings in the BIOS

B.

Replace the CMOS battery

C.

Boot from installation media and repair the MBR

D.

Isolate the system from the corporate network

Buy Now
Questions 26

A user wants to use a USB to move a 4.57GB .pst file from one Windows computer to another. Which of the following filesystems should the USB be formatted with?

Options:

A.

ext4

B.

NTFS

C.

FAT32

D.

APFS

Buy Now
Questions 27

Options:

A.

Backup plan

B.

Request forms

C.

Sandbox testing

D.

Peer review

Buy Now
Questions 28

Which of the following is the quickest way to move from Windows 10 to Windows 11 without losing data?

Options:

A.

Using gpupdate

B.

Image deployment

C.

Clean install

D.

In-place upgrade

Buy Now
Questions 29

An end user wants to have a sales printer added to their computer. The printer is on the domain. Which of the following is the best method for the technician to add the printer?

Options:

A.

Go to the print server and select the printer name

B.

Connect the laptop to the printer via USB

C.

Connect to the printer via Bluetooth

D.

Go to Local Users and Groups to add the printer

Buy Now
Questions 30

An employee is trying to connect their company laptop to an airport’s Wi-Fi during a business trip. Once the network is connected, a pop-up window appears with the airport logo, which the employee quickly closes. The internet connection is not working properly. Which of the following should a help desk technician suggest?

Options:

A.

Look for a wall socket with RJ45 and try to connect the laptop to it

B.

Contact the airport IT department

C.

Tell the employee that company policy prohibits connection to public Wi-Fi

D.

Reconnect to the network and read the pop-up carefully

Buy Now
Questions 31

A user reports that their corporate mobile phone is lost. Which of the following protects the data locally on the phone from unauthorized access?

Options:

A.

Password manager

B.

Degaussing

C.

Remote wipe

D.

Antivirus

Buy Now
Questions 32

A technician is troubleshooting an issue in which a service runs momentarily and stops at certain points in the process. The technician needs to determine the root cause of this issue. Which of the following tools should the technician use?

Options:

A.

Event Viewer

B.

Task Manager

C.

Internet Options

D.

Process Explorer

Buy Now
Questions 33

A user ' s computer is running slowly. Web pages take several seconds to open, and applications are slow to respond. A technician opens the Windows Task Manager and sees the following:

Disk: 2%

Network: 12%

GPU: 15%

CPU: 70%

Memory: 97%

Which of the following would a technician most likely do to resolve the issue?

Options:

A.

Clear browser cached data

B.

Upgrade the network connection

C.

Close unnecessary programs

D.

Delete temporary files

Buy Now
Questions 34

You have been contacted through the help desk chat application. A user is setting up a replacement SOHO router. Assist the user with setting up the router.

INSTRUCTIONS

Select the most appropriate statement for each response. Click the send button after each response to continue the chat.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Questions 35

Welcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

INSTRUCTIONS

Click on individual tickets to see the ticket details, and view applicable attachments to

determine the problem.

Select the appropriate issue from the ' Issue ' drop-down menu. Then, select the most

efficient resolution from the ' Resolution ' drop-down menu. Finally, select the proper

command or verification to remediate or confirm your fix of the issue from the

' Verify/Resolve ' drop-down menu.

Options:

Buy Now
Questions 36

Welcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

INSTRUCTIONS

Click on individual tickets to see the ticket details, and view applicable attachments to

determine the problem.

Select the appropriate issue from the ' Issue ' drop-down menu. Then, select the most

efficient resolution from the ' Resolution ' drop-down menu. Finally, select the proper

command or verification to remediate or confirm your fix of the issue from the

' Verify/Resolve ' drop-down menu.

Options:

Buy Now
Questions 37

A user reports that after a recent software deployment to upgrade the Testing application, they can no longer use it. However, other employees can successfully

use the Testing program.

INSTRUCTIONS

Review the information in each tab to verify the results of the deployment and resolve

any issues discovered by selecting the:

· First command to resolve the issue

· Second command to resolve the issue

Options:

Buy Now
Questions 38

As a corporate technician, you are asked to evaluate several suspect email messages on a client ' s computer. Corporate policy requires the following:

> All phishing attempts must be reported.

> Future spam emails to users must be prevented.

INSTRUCTIONS

Review each email and perform the following within the email:

> Classify the emails

> Identify suspicious items, if applicable, in each email

> Select the appropriate resolution

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Questions 39

You are configuring a home network for a customer. The customer has requested the ability to access a Windows PC remotely, and needs all chat and optional functions to work in their game console.

INSTRUCTIONS

Use the drop-down menus to complete the network configuration for the customer. Each option may only be used once, and not all options will be used.

Then, click the + sign to place each device in its appropriate location.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Wireless AP LAN

Firewall Screened Subnet

Options:

Buy Now
Questions 40

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users’ audio issues are resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Exam Code: 220-1202
Exam Name: CompTIA A+ Core 2 2025 Exam
Last Update: Apr 8, 2026
Questions: 265
220-1202 pdf

220-1202 PDF

$25.5  $84.99
220-1202 Engine

220-1202 Testing Engine

$30  $99.99
220-1202 PDF + Engine

220-1202 PDF + Testing Engine

$40.5  $134.99