Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

220-1202 CompTIA A+ Core 2 2025 Exam Questions and Answers

Questions 4

As a corporate technician, you are asked to evaluate several suspect email messages on a client's computer. Corporate policy requires the following:

>All phishing attempts must be reported.

>Future spam emails to users must be prevented.

INSTRUCTIONS

Review each email and perform the following within the email:

>Classify the emails

>Identify suspicious items, if applicable, in each email

>Select the appropriate resolution

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Questions 5

Welcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

INSTRUCTIONS

Click on individual tickets to see the ticket details, and view applicable attachments to

determine the problem.

Select the appropriate issue from the 'Issue' drop-down menu. Then, select the most

efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper

command or verification to remediate or confirm your fix of the issue from the

'Verify/Resolve' drop-down menu.

Options:

Buy Now
Questions 6

After completing malware removal steps, what is the next step the technician should take?

Options:

A.

Perform a secondary antivirus scan

B.

Educate the end user

C.

Reimage the computer

D.

Review system logs

Buy Now
Questions 7

You have been contacted through the help desk chat application. A user is setting up a replacement SOHO router. Assist the user with setting up the router.

INSTRUCTIONS

Select the most appropriate statement for each response. Click the send button after each response to continue the chat.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Questions 8

A technician is setting up a Windows server to allow remote desktop connections for multiple users. Which of the following should the technician configure on the workstation?

Options:

A.

Firewall

B.

Computer Management

C.

User Accounts

D.

Ease of Access

Buy Now
Questions 9

Which of the following commands is used to manage files in a Linux OS?

Options:

A.

robocopy

B.

curl

C.

xcopy

D.

cp

Buy Now
Questions 10

A user reports that their corporate mobile phone is lost. Which of the following protects the data locally on the phone from unauthorized access?

Options:

A.

Password manager

B.

Degaussing

C.

Remote wipe

D.

Antivirus

Buy Now
Questions 11

Which of the following file types allows macOS users to uninstall software completely by placing the file in the trash?

Options:

A.

.app

B.

.msi

C.

.exe

D.

.rpm

E.

.pkg

Buy Now
Questions 12

A popular game frequently freezes and crashes on a mobile phone. The user updates the OS, but the issue persists. The device is one year old and has plenty of free storage space. Which of the following is the most appropriate first step to troubleshoot this issue?

Options:

A.

Reinstalling the application

B.

Factory resetting the device

C.

Disabling background applications

D.

Changing the device’s date and time settings

Buy Now
Questions 13

What is the next step a technician should take after completing malware cleanup?

Options:

A.

Perform a secondary antivirus scan

B.

Educate the end user

C.

Reimage the computer

D.

Review system logs

Buy Now
Questions 14

MFA for a custom web application on a user's smartphone is no longer working. The last time the user remembered it working was before taking a vacation to another country. Which of the following should the technician do first?

Options:

A.

Verify the date and time settings

B.

Apply mobile OS patches

C.

Uninstall and reinstall the application

D.

Escalate to the website developer

Buy Now
Questions 15

A user is unable to use the latest version of an app on a legacy tablet. What is the most likely reason?

Options:

A.

The OS is end-of-life

B.

Space is inadequate

C.

MDM is blocking updates

D.

The tablet is infected with malware

Buy Now
Questions 16

A user renames a .txt file to an .xml file. Windows Explorer shows the filename as Document.xml, but the file properties still show the type as Text Document (.txt). Which of the following controls enables the user to correctly change the file type?

Options:

A.

Indexing options

B.

Format command

C.

Personalization

D.

Hide extensions

Buy Now
Questions 17

A technician needs to prevent accidental access to Wi-Fi networks available in a shared office space. The BYOD and company-owned devices already have Wi-Fi settings configured via MDM solutions. Which of the following settings should the technician change?

Options:

A.

IP filtering configuration

B.

SSID configuration

C.

Content filtering configuration

D.

Port forwarding/mapping

Buy Now
Questions 18

An engineer notices that many websites prompt users to input login and payment details. The engineer wants to require the browser to encrypt communications. Which of the following best helps to protect sensitive data?

Options:

A.

Disabling all cookies

B.

Disabling JavaScript

C.

Enabling a pop-up blocker

D.

Enabling HTTPS-Only Mode

Buy Now
Questions 19

A company wants to use a single operating system for its workstations and servers and avoid licensing fees. Which of the following operating systems would the company most likely select?

Options:

A.

Linux

B.

Windows

C.

macOS

D.

Chrome OS

Buy Now
Questions 20

An employee is trying to connect their company laptop to an airport’s Wi-Fi during a business trip. Once the network is connected, a pop-up window appears with the airport logo, which the employee quickly closes. The internet connection is not working properly. Which of the following should a help desk technician suggest?

Options:

A.

Look for a wall socket with RJ45 and try to connect the laptop to it

B.

Contact the airport IT department

C.

Tell the employee that company policy prohibits connection to public Wi-Fi

D.

Reconnect to the network and read the pop-up carefully

Buy Now
Questions 21

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users’ audio issues are resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Questions 22

The screen of a previously working computer repeatedly displays an OS Not Found error message when the computer is started. Only a USB drive, a keyboard, and a mouse are plugged into the computer. Which of the following should a technician do first?

Options:

A.

Run data recovery tools on the disk

B.

Partition the disk using the GPT format

C.

Check boot options

D.

Switch from UEFI to BIOS

Buy Now
Questions 23

Which of the following is an example of an application publisher including undisclosed additional software in an installation package?

Options:

A.

Virus

B.

Ransomware

C.

Potentially unwanted program

D.

Trojan

Buy Now
Questions 24

A secretary receives an email from the company's chief executive officer with a request to pay a vendor immediately. After the payment is made, the CEO informs the secretary that they never sent that email. Which of the following social engineering tactics best describes this type of attack?

Options:

A.

Evil twin

B.

Impersonation

C.

Whaling

D.

Spear phishing

Buy Now
Questions 25

A company executive is currently attending a major music festival with a large number of attendees and is having trouble accessing a work email account. The email application is not downloading emails and also appears to become stuck during connection attempts. Which of the following is most likely causing the disruption?

Options:

A.

The phone has no storage space available.

B.

Company firewalls are configured to block remote access to email resources.

C.

Too many devices in the same area are trying to connect to the mobile network.

D.

The festival organizer prohibits internet usage during the event and has blocked the internet signal

Buy Now
Questions 26

Various alerts on a user's Windows 11 laptop are continually interrupting the user during videoconference calls. Which of the following should a support technician recommend to best solve the issue?

Options:

A.

Use multiple sound output devices for the various source applications

B.

Disable all notifications in different applications in the order they appear

C.

Configure the Sounds option in Control Panel to be set to No Sounds

D.

Set Windows Notifications settings to Do Not Disturb

Buy Now
Questions 27

A technician thinks that an application a user downloaded from the internet may not be the legitimate one, even though the name is the same. The technician needs to confirm whether the application is legitimate. Which of the following should the technician do?

Options:

A.

Compare the hash value from the vendor.

B.

Run Task Manager and compare the process ID.

C.

Run the application in safe mode.

D.

Verify the file name is correct.

Buy Now
Questions 28

A Microsoft OS laptop user requests an alternative log-in authentication method because they have forgotten their password multiple times. Which of the following should a technician enable to satisfy this request?

Options:

A.

Single sign-on

B.

Windows Hello

C.

BitLocker

D.

User Account Control

Buy Now
Questions 29

After a technician upgrades the RAM on a user's workstation, the system shows a “No boot device found” message. Which of the following is most likely the cause?

Options:

A.

The installation disk is not available

B.

The SATA HDD power cable is disconnected

C.

The drive needs to be reformatted

D.

The boot order needs to be changed

Buy Now
Questions 30

Which of the following is used to apply corporate restrictions on an Apple device?

Options:

A.

App Store

B.

VPN configuration

C.

Apple ID

D.

Management profile

Buy Now
Questions 31

Which of the following Linux commands is used to read another command's documentation?

Options:

A.

chmod

B.

cat

C.

man

D.

sudo

Buy Now
Questions 32

A user is unable to upload files to the corporate servers from their mobile phone when outside the office, but uploading files works without issue in the office. The user saw an error notification but dismissed it. Which of the following should a technician do to determine the root cause?

Options:

A.

Check the data usage limit

B.

Enable airplane mode

C.

Verify the last device reboot

D.

Enable Bluetooth connectivity

Buy Now
Questions 33

An administrator is investigating a technical outage. The management team wants information that includes the summary of the outage and actions taken. Which of the following documentation should the administrator provide to the management team?

Options:

A.

Knowledge base article

B.

Non-disclosure agreement

C.

Incident report

D.

Standard operating procedure

Buy Now
Questions 34

A help desk technician is setting up speech recognition on a Windows system. Which of the following settings should the technician use?

Options:

A.

Time and Language

B.

Personalization

C.

System

D.

Ease of Access

Buy Now
Questions 35

A user reports getting a BSOD (Blue Screen of Death) error on their computer at least twice a day. Which of the following should the technician use to determine the cause?

Options:

A.

Event Viewer

B.

Performance Monitor

C.

System Information

D.

Device Manager

Buy Now
Questions 36

Which of the following must be followed during incident response to ensure the collected evidence is properly handled and accounted for?

Options:

A.

Order of volatility for data

B.

Law enforcement notification procedures

C.

Data integrity best practices

D.

Chain of custody process

Buy Now
Questions 37

A technician is attempting to join a workstation to a domain but is receiving an error message stating the domain cannot be found. However, the technician is able to ping the server and access the internet. Given the following information:

IP Address – 192.168.1.210

Subnet Mask – 255.255.255.0

Gateway – 192.168.1.1

DNS1 – 8.8.8.8

DNS2 – 1.1.1.1

Server – 192.168.1.10

Which of the following should the technician do to fix the issue?

Options:

A.

Change the DNS settings.

B.

Assign a static IP address.

C.

Configure a subnet mask.

D.

Update the default gateway.

Buy Now
Questions 38

A user wants to dispose of a failed hard drive in a way that ensures the data is unrecoverable. Which of the following is the best at-home method?

Options:

A.

Standard formatting

B.

Low-level formatting

C.

Shredding

D.

Degaussing

E.

Drilling

Buy Now
Questions 39

A technician needs to provide remote support for a legacy Linux-based operating system from their Windows laptop. The solution needs to allow the technician to see what the user is doing and provide the ability to interact with the user's session. Which of the following remote access technologies would support the use case?

Options:

A.

VPN

B.

VNC

C.

SSH

D.

RDP

Buy Now
Exam Code: 220-1202
Exam Name: CompTIA A+ Core 2 2025 Exam
Last Update: Feb 20, 2026
Questions: 213
220-1202 pdf

220-1202 PDF

$25.5  $84.99
220-1202 Engine

220-1202 Testing Engine

$30  $99.99
220-1202 PDF + Engine

220-1202 PDF + Testing Engine

$40.5  $134.99