Free 220-1002 Sample Questions — CompTIA A+ Certification Exam: Core 2

Free 220-1002 sample questions for the CompTIA A+ Certification Exam: Core 2 exam. No account required: study at your own pace.

Want an interactive quiz? Take the full 220-1002 practice test

Looking for more? Click here to get the full PDF with 462+ practice questions for $10 for offline study and deeper preparation.

Question 1

Which of the following security principles help to prevent employees from changing files they are intended only to view?

  • A. DLP
  • B. MDM
  • C. ACL
  • D. MFA
Show Answer
Correct Answer:
C. ACL
Question 2

Which of the following identifies changes in the environment, such as alternating current failure?

  • A. UPS monitor
  • B. MSDS
  • C. ESD mat
  • D. Surge suppressor
Show Answer
Correct Answer:
A. UPS monitor
Question 3

A technician is reinstalling Windows for a user and wants to keep the user's files and settings. Afterward, the user notices that personal files are no longer available and settings have been restored to default. Which of the following did the technician MOST likely execute to cause this issue?

  • A. System reset
  • B. System update
  • C. System Restore
  • D. System refresh
Show Answer
Correct Answer:
A. System reset
Question 4

A technician needs to update the network firewall, which will cause a temporary outage. The technician submits a change management request to perform the required maintenance. Which of the following provides details about what the technician will need to do if the update fails?

  • A. Back-out plan
  • B. Scope of the change
  • C. Risk analysis
  • D. End-user acceptance
Show Answer
Correct Answer:
A. Back-out plan
Question 5

Which of the following provide the BEST security for a server room? (Choose two.)

  • A. Badge reader
  • B. Bollard
  • C. Biometric lock
  • D. Cable lock
  • E. USB token
  • F. Privacy window shades
Show Answer
Correct Answer:
  • C. Biometric lock
  • E. USB token
Question 6

A customer has a Windows 7 x86 computer with 4GB of RAM and needs to upgrade the RAM to meet the minimum specifications for a new piece of software. Which of the following should a technician recommend to the customer FIRST?

  • A. Migrating to a Linux OS
  • B. Installing a new SSD
  • C. Using a 64-bit architecture
  • D. Installing 8GB DDR4 RAM
Show Answer
Correct Answer:
C. Using a 64-bit architecture
Question 7

A customer keeps receiving the following message: Website blocked due to PUP. The customer asks a technician to resolve the issue immediately. Which of the following should the technician do to help resolve the customer's issue?

  • A. Check the customer's computer for a rogue antivirus
  • B. Update the antivirus software and run a scan
  • C. Advise the customer to not revisit the website
  • D. Enable pop-ups for the website the customer is attempting to visit
Show Answer
Correct Answer:
B. Update the antivirus software and run a scan
Question 8

Which of the following WiFi protocols is the MOST secure?

  • A. WPA3
  • B. WPA-AES
  • C. WEP
  • D. WPA-TKIP
Show Answer
Correct Answer:
A. WPA3
Question 9

A technician is implementing multifactor authentication for logins to the network. The network already requires a username and password to authenticate users. Which of the following should the technician add to meet the multifactor requirement?

  • A. Passphrase
  • B. Knowledge-based authentication
  • C. PIN
  • D. Thumbprint
Show Answer
Correct Answer:
D. Thumbprint
Question 10

A technician is called to troubleshoot a user's Windows workstation that fails to boot. The user reports that, after updating the workstation's graphics driver to a beta version, the machine gives a `Stop` error on every boot. Which of the following should the technician complete to resolve the issue?

  • A. Boot the workstation in safe mode and disable the graphics driver system tray menu
  • B. Boot the workstation in safe mode with networking and install the latest stable graphics driver
  • C. Boot the workstation in safe mode and disable Windows driver signing requirements
  • D. Boot the workstation in safe mode with Command Prompt and enable Driver Verifier with standard settings
Show Answer
Correct Answer:
B. Boot the workstation in safe mode with networking and install the latest stable graphics driver
Question 11

Which of the following threats uses personalized information in an attempt at obtaining information?

  • A. Whaling
  • B. Impersonation
  • C. Spoofing
  • D. Spear phishing
Show Answer
Correct Answer:
D. Spear phishing
Question 12

A technician has been dispatched to resolve a malware problem on a user's workstation. The antivirus program discovered several hundred potential malware items on the workstation and removed them successfully. The technician decides to schedule daily scans on the system, enables System Restore, and creates a restore point. Which of the following should the technician do NEXT?

  • A. Run the scan again to ensure all malware has been removed
  • B. Quarantine the infected workstation from the network
  • C. Install all of the latest Windows Updates to patch the system
  • D. Educate the user on safe browsing practices
Show Answer
Correct Answer:
D. Educate the user on safe browsing practices
Question 13

While attempting to install a new program, an end user is notified the workstation meets the memory requirements, but it does not meet the requirements for free space. Due to time constraints, the user needs a quick way to install and access the program. Which of the following is the user's BEST option given the situation?

  • A. Install to a network drive
  • B. Install to a USB drive
  • C. Install to a DVD-RW
  • D. Install to a secondary internal HDD
Show Answer
Correct Answer:
A. Install to a network drive
Question 14

A technician is updating a Linux server that had been in storage. After booting into single-user mode, a command is issued that displays the technician's current location in the filesystem. Which of the following commands was issued?

  • A. pwd
  • B. passwd
  • C. apt-get
  • D. grep
Show Answer
Correct Answer:
A. pwd
Question 15

A Linux user types the following command: apt-get update The action is denied due to insufficient privileges. Which of the following should precede the above command to successful execution?

  • A. vi
  • B. sudo
  • C. chmod
  • D. grep
Show Answer
Correct Answer:
B. sudo
Question 16

Six months after a new version of an OS was released to the market, end users began to lose access to application updates. Which of the following was MOST likely the reason for this issue?

  • A. Update limitations
  • B. Limited access
  • C. End-of-life
  • D. Network connection
Show Answer
Correct Answer:
C. End-of-life
Question 17

A company wants to move the contents of its users' My Documents folders from their local hard drives to a file server so they are backed up every night. Which of the following security concepts does this describe?

  • A. Organizational units
  • B. Folder redirection
  • C. Group Policy
  • D. Login script
Show Answer
Correct Answer:
B. Folder redirection
Question 18

An office location regularly experiences brownouts. Which of the following would be the MOST appropriate solution to protect the office computers?

  • A. Uninterruptible power supply
  • B. Voltage regulator
  • C. Surge suppressor
  • D. Generator
Show Answer
Correct Answer:
A. Uninterruptible power supply
Question 19

A technician is working on a Windows 10 PC that is running slowly. Which of the following commands should the technician use to correct this issue? (Choose two.)

  • A. dir
  • B. chkdsk
  • C. dism
  • D. ipconfig
  • E. format
  • F. diskpart
Show Answer
Correct Answer:
  • C. dism
  • F. diskpart
Question 20

Which of the following techniques is used by malicious employees to obtain user passwords?

  • A. Main-in-the-middle
  • B. Phishing
  • C. Tailgating
  • D. Shoulder surfing
Show Answer
Correct Answer:
D. Shoulder surfing

Aced these? Get the Full Exam

Download the complete 220-1002 study bundle with 462+ questions in a single printable PDF.