Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

220-1202 CompTIA A+ Core 2 (2026 Exam Update) Questions and Answers

Questions 4

As a corporate technician, you are asked to evaluate several suspect email messages on a client ' s computer. Corporate policy requires the following:

> All phishing attempts must be reported.

> Future spam emails to users must be prevented.

INSTRUCTIONS

Review each email and perform the following within the email:

> Classify the emails

> Identify suspicious items, if applicable, in each email

> Select the appropriate resolution

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Questions 5

You are configuring a home network for a customer. The customer has requested the ability to access a Windows PC remotely, and needs all chat and optional functions to work in their game console.

INSTRUCTIONS

Use the drop-down menus to complete the network configuration for the customer. Each option may only be used once, and not all options will be used.

Then, click the + sign to place each device in its appropriate location.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Wireless AP LAN

Firewall Screened Subnet

Options:

Buy Now
Questions 6

Welcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

INSTRUCTIONS

Click on individual tickets to see the ticket details, and view applicable attachments to

determine the problem.

Select the appropriate issue from the ' Issue ' drop-down menu. Then, select the most

efficient resolution from the ' Resolution ' drop-down menu. Finally, select the proper

command or verification to remediate or confirm your fix of the issue from the

' Verify/Resolve ' drop-down menu.

Options:

Buy Now
Questions 7

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users’ audio issues are resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Questions 8

Welcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

INSTRUCTIONS

Click on individual tickets to see the ticket details, and view applicable attachments to

determine the problem.

Select the appropriate issue from the ' Issue ' drop-down menu. Then, select the most

efficient resolution from the ' Resolution ' drop-down menu. Finally, select the proper

command or verification to remediate or confirm your fix of the issue from the

' Verify/Resolve ' drop-down menu.

Options:

Buy Now
Questions 9

Which of the following file systems allows macOS to write data?

Options:

A.

NTFS

B.

ReFS

C.

exFAT

D.

XFS

Buy Now
Questions 10

Which of the following is a Linux command that is used for administrative purposes?

Options:

A.

runas

B.

cmcl

C.

net user

D.

su

Buy Now
Questions 11

A security administrator teaches all of an organization ' s staff members to use BitLocker To Go. Which of the following best describes the reason for this training?

Options:

A.

To ensure that all removable media is password protected in case of loss or theft

B.

To enable Secure Boot and a BIOS-level password to prevent configuration changes

C.

To enforce VPN connectivity to be encrypted by hardware modules

D.

To configure all laptops to use the TPM as an encryption factor for hard drives

Buy Now
Questions 12

A user reports a critical application issue. The user tells the technician that a former IT employee previously resolved this same issue. Which of the following steps should the technician take first?

Options:

A.

Consult the technician who previously solved the issue.

B.

Escalate the issue to the software manufacturer to develop a patch.

C.

Review the ticketing system for details related to the prior occurrence.

D.

Open a case to document the issue and progress until the issue is resolved.

Buy Now
Questions 13

A government client asks a technician to expunge several drives that contain confidential information. The technician must follow regulatory compliance. Which of the following is the best option?

Options:

A.

In-house disk incineration

B.

Certified third-party destruction

C.

Low-level formatting

D.

Targeted file deletion

Buy Now
Questions 14

Which of the following file types allows macOS users to uninstall software completely by placing the file in the trash?

Options:

A.

.app

B.

.msi

C.

.exe

D.

.rpm

E.

.pkg

Buy Now
Questions 15

A user is trying to install 3-D rendering software on a new Windows computer, but the installation fails. An error states that the system does not meet the minimum hardware configuration. Which of the following features should the user check first?

Options:

A.

USB speed

B.

GPU requirements

C.

NIC bandwidth

D.

PSU wattage

Buy Now
Questions 16

Which of the following is typically associated with a Linux filesystem?

Options:

A.

FAT32

B.

XFS

C.

NTFS

D.

APFS

Buy Now
Questions 17

A technician is assigned to offboard a user. Which of the following are common tasks on an offboarding checklist? (Choose two.)

Options:

A.

Quarantine the hard drive in the user ' s laptop.

B.

Deactivate the user ' s key fobs for door access.

C.

Purge all PII associated with the user.

D.

Suspend the user ' s email account.

E.

Turn off the network ports underneath the user ' s desk.

F.

Add the MAC address of the user ' s computer to a blocklist.

Buy Now
Questions 18

Which of the following types of malware would most likely be detected when observing unusually high CPU usage?

Options:

A.

Keylogger

B.

Trojan

C.

Cryptominer

D.

Rootkit

Buy Now
Questions 19

A technician is replacing a rack-mounted UPS. Which of the following should the technician consider?

Options:

A.

Determining the availability of compressed air

B.

Getting assistance to lift the hardware

C.

Checking local low-voltage regulations

D.

Testing the fire suppression system

Buy Now
Questions 20

A technician is reviewing an organization ' s current incident management policy. The organization uses a third-party vendor to protect the organization ' s assets with multiple tools. Which of the following service types is the organization using?

Options:

A.

PaaS

B.

EDR

C.

MDR

D.

XDR

Buy Now
Questions 21

Which of the following methods would make data unrecoverable but allow the drive to be repurposed?

Options:

A.

Deleting the partitions

B.

Implementing EFS

C.

Performing a low-level format

D.

Degaussing the device

Buy Now
Questions 22

A technician is using a credential manager to safeguard a large number of credentials. Which of the following is important for using this application?

Options:

A.

Restricted log-in times

B.

Secure master password

C.

TPM module

D.

Windows lock screen

Buy Now
Questions 23

Various alerts on a user ' s Windows 11 laptop are continually interrupting videoconference calls. Which of the following should a support technician recommend to best solve the issue?

Options:

A.

Use multiple sound output devices for the various source applications

B.

Disable all notifications in different applications in the order they appear

C.

Configure the Sounds option in Control Panel to be set to No Sounds

D.

Set Windows Notifications settings to Do Not Disturb

Buy Now
Questions 24

A user reports that their computer is running extremely slowly. They are also often redirected to unknown websites when attempting to access internal applications. The computer ' s antivirus software is outdated, and the user cannot access certain security-related settings. A network administrator confirms that all other workstations are operating normally, and network diagnostics show no issues. Which of the following should the administrator do next to troubleshoot these issues?

Options:

A.

Check the firewall settings for unauthorized changes or blocked applications.

B.

Clear the browser’s cookies and cache and test access to internal applications again.

C.

Disconnect the device from the network and investigate further.

D.

Set the security settings to the highest level and restart the computer.

Buy Now
Questions 25

A user reports getting a BSOD (Blue Screen of Death) error on their computer at least twice a day. Which of the following should the technician use to determine the cause?

Options:

A.

Event Viewer

B.

Performance Monitor

C.

System Information

D.

Device Manager

Buy Now
Questions 26

The Chief Information Officer (CIO) is overseeing a project to integrate existing business processes to an enterprise resource planning system. The CIO identifies the scope of the change and provides it to the IT department. Which of the following is the first change management procedure to perform before measuring the impact to the systems?

Options:

A.

Backup plan

B.

Risk analysis

C.

Document findings

D.

Sandbox testing

Buy Now
Questions 27

A user cannot upload files to corporate servers from their mobile device when outside the office, but uploads work fine in-office. What should a technician do to determine the root cause?

Options:

A.

Check the data usage limit

B.

Enable airplane mode

C.

Verify the last device reboot

D.

Enable Bluetooth connectivity

Buy Now
Questions 28

Which of the following concepts should a technician consider when discussing confidential work projects with individuals outside the company?

Options:

A.

EULA

B.

EOL

C.

SLA

D.

NDA

Buy Now
Questions 29

A technician is attempting to join a workstation to a domain but is receiving an error message stating the domain cannot be found. However, the technician is able to ping the server and access the internet. Given the following information:

IP Address – 192.168.1.210

Subnet Mask – 255.255.255.0

Gateway – 192.168.1.1

DNS1 – 8.8.8.8

DNS2 – 1.1.1.1

Server – 192.168.1.10

Which of the following should the technician do to fix the issue?

Options:

A.

Change the DNS settings.

B.

Assign a static IP address.

C.

Configure a subnet mask.

D.

Update the default gateway.

Buy Now
Questions 30

A client reports that their browser ' s home page changed. Every time they run an internet search, the results are returned from unfamiliar websites. Which of the following actions should a technician take first to resolve the issue? (Select two)

Options:

A.

Clear the browsing history

B.

Run operating system updates

C.

Check the system date and time

D.

Uninstall malicious extensions

E.

Reset browser startup page

F.

Restart the user ' s machine

Buy Now
Questions 31

A new software installation requires administrative privileges for deployment. Which of the following is the best way to provide the necessary permissions to install the software?

Options:

A.

Granting just-in-time access

B.

Assigning the power user role

C.

Performing the installation manually

D.

Adding the user to the local administrator group

Buy Now
Questions 32

A technician needs to disable guest log-ins on domain-joined desktop machines. Which of the following should the technician use?

Options:

A.

Group Policy

B.

Firewall

C.

Microsoft Management Control

D.

MSConfig

Buy Now
Questions 33

A user’s computer is running slowly. Task Manager shows:

Disk: 2%

Network: 12%

GPU: 15%

CPU: 70%

Memory: 97%

Which of the following would a technician most likely do to resolve the issue?

Options:

A.

Clear browser cached data

B.

Upgrade the network connection

C.

Close unnecessary programs

D.

Delete temporary files

Buy Now
Questions 34

An end user is unable to access the intranet. A technician needs to confirm whether the Windows web server is online and functioning. Which of the following default remote access technologies would the technician most likely use to remotely connect to the server?

Options:

A.

SPICE

B.

VNC

C.

RDP

D.

SSH

Buy Now
Questions 35

The battery on a user’s smartphone discharges quickly during travel. The phone was replaced two weeks ago. What should the technician do first?

Options:

A.

Replace the battery with a higher capacity option

B.

Provide an external battery

C.

Ensure the charging port is working

D.

Look for applications that are reporting the highest utilization

Buy Now
Questions 36

A customer calls the help desk to report issues with internet connectivity. The customer is frustrated after speaking with multiple representatives who were unable to resolve the issue. A technician reviews the customer’s file and sees several unresolved tickets. Which of the following actions should the technician take to communicate properly and professionally?

Options:

A.

Ask the customer to clarify the issue right away

B.

Escalate the issue without further conversation

C.

Listen to the customer’s concerns and acknowledge their frustrations

D.

Explain that previous technicians followed standard procedure

Buy Now
Questions 37

Which of the following must be followed during incident response to ensure the collected evidence is properly handled and accounted for?

Options:

A.

Order of volatility for data

B.

Law enforcement notification procedures

C.

Data integrity best practices

D.

Chain of custody process

Buy Now
Questions 38

Which of the following allows users to prevent malware installation and the disclosure of sensitive information?

Options:

A.

Secure Boot

B.

Threat education

C.

Email security gateway

D.

Firewall

Buy Now
Questions 39

An end user ' s computer is unable to start. A technician examines the machine and does not hear any unusual noises but determines that no OS is found. Which of the following is most likely corrupt?

Options:

A.

Basic input/output system

B.

New Technology File System

C.

Trusted Platform Module

D.

Master boot record

Buy Now
Questions 40

Thousands of compromised machines are attempting to make fake purchases from an online store. Which of the following is taking place?

Options:

A.

Brute-force attack

B.

Spoofing

C.

DDoS

D.

SQL injection

Buy Now
Questions 41

When a corporate laptop is connected to the company network, it can reach external websites. However, it cannot reach any internal websites, displaying the error message “Cannot reach this page.” Which of the following should a technician configure?

Options:

A.

Subnet mask

B.

DNS settings

C.

Default gateway

D.

DHCP

Buy Now
Questions 42

An administrator requires information about a server to identify the product owner and whether it has any business-critical services. Which of the following can the administrator refer to in order to find this information?

Options:

A.

CMDB

B.

SLA

C.

SOP

D.

EULA

Buy Now
Questions 43

An IT technician is attempting to install a video-rendering application for a client when the installation program halts. The technician sees an error message about the system not meeting the VRAM requirement. The system has a popular, integrated video solution and twice the required DRAM. Which of the following should the technician access to meet the VRAM requirement?

Options:

A.

Device Manager

B.

Virtual RAM

C.

BIOS options

D.

System Configuration

Buy Now
Questions 44

A technician needs to disable guest log-ins on domain-joined desktop machines. Which of the following should be used?

Options:

A.

Group Policy

B.

Firewall

C.

Microsoft Management Console

D.

MSConfig

Buy Now
Questions 45

A user installed a free application from an unofficial application store. Now, their smartphone displays random pop-ups and shows increased data usage. Additionally, the user cannot perform certain actions such as opening banking applications or updating their OS. Which of the following should the user do first to address the security issues on their smartphone?

Options:

A.

Perform a factory reset.

B.

Clear the device cache.

C.

Contact the manufacturer’s support line.

D.

Change all passwords on the device.

Buy Now
Questions 46

A user ' s application only works with a legacy version of the OS. The OS is reaching its end-of-life date. For security reasons, the company is migrating to the current version of the OS. Which of the following is the most efficient way to complete the migration while maintaining accessibility to the application?

Options:

A.

Terminal server

B.

Bare-metal server

C.

Multiboot

D.

Virtualization

Buy Now
Questions 47

A user receives a new personal computer but is unable to run an application. An error displays saying that .NET Framework 3.5 is required and not found. Which of the following actions is the best way to resolve this issue?

Options:

A.

Resolve the dependency through the ' Turn Windows features on or off ' menu.

B.

Download the dependency via a third-party repository.

C.

Ignore the dependency and install the latest version 4 instead.

D.

Forward the trouble ticket to the SOC team because the issue poses a great security risk.

Buy Now
Questions 48

A technician is installing a cloud-based productivity suite and gets an error saying the installation is unavailable. What should be tried first?

Options:

A.

Reinstall the productivity suite

B.

Download an open-source alternative

C.

Check the license device limit

D.

Update the device OS

Buy Now
Questions 49

A company’s Windows 10 devices have been infected with ransomware, and all files are now encrypted. The executives have decided against paying the ransom. Which of the following actions will achieve full operation without any trace of the ransomware?

Options:

A.

Restore from the recovery partition.

B.

Upgrade all company machines to Windows 11.

C.

Perform a clean installation.

D.

Repair the installation using Windows Recovery Environment.

Buy Now
Questions 50

A user reports some single sign-on errors to a help desk technician. Currently, the user is able to sign in to the company ' s application portal but cannot access a specific SaaS-based tool. Which of the following would the technician most likely suggest as a next step?

Options:

A.

Reenroll the user ' s mobile device to be used as an MFA token

B.

Use a private browsing window to avoid local session conflicts

C.

Bypass single sign-on by directly authenticating to the application

D.

Reset the device being used to factory defaults

Buy Now
Questions 51

An application ' s performance is degrading over time. The application is slowing, but it never gives an error and does not crash. Which of the following tools should a technician use to start troubleshooting?

Options:

A.

Reliability history

B.

Computer management

C.

Resource monitor

D.

Disk

Buy Now
Questions 52

A technician verifies that a malware incident occurred on some computers in a small office. Which of the following should the technician do next?

Options:

A.

Quarantine the infected systems

B.

Educate the end users

C.

Disable System Restore

D.

Update the anti-malware and scan the computers

Buy Now
Exam Code: 220-1202
Exam Name: CompTIA A+ Core 2 (2026 Exam Update)
Last Update: May 17, 2026
Questions: 301
220-1202 pdf

220-1202 PDF

$25.5  $84.99
220-1202 Engine

220-1202 Testing Engine

$30  $99.99
220-1202 PDF + Engine

220-1202 PDF + Testing Engine

$40.5  $134.99