$0.00
CompTIA 220-1102 Dumps

CompTIA 220-1102 Exam Dumps

CompTIA A+ Certification Core 2 Exam

Total Questions : 636
Update Date : September 02, 2024
PDF + Test Engine
$65 $95
Test Engine
$55 $85
PDF Only
$45 $75



Last Week 220-1102 Exam Results

169

Customers Passed CompTIA 220-1102 Exam

99%

Average Score In Real 220-1102 Exam

99%

Questions came from our 220-1102 dumps.



Choosing the Right Path for Your 220-1102 Exam Preparation

Welcome to PassExamHub's comprehensive study guide for the CompTIA A+ Certification Core 2 Exam exam. Our 220-1102 dumps is designed to equip you with the knowledge and resources you need to confidently prepare for and succeed in the 220-1102 certification exam.

What Our CompTIA 220-1102 Study Material Offers

PassExamHub's 220-1102 dumps PDF is carefully crafted to provide you with a comprehensive and effective learning experience. Our study material includes:

In-depth Content: Our study guide covers all the key concepts, topics, and skills you need to master for the 220-1102 exam. Each topic is explained in a clear and concise manner, making it easy to understand even the most complex concepts.
Online Test Engine: Test your knowledge and build your confidence with a wide range of practice questions that simulate the actual exam format. Our test engine cover every exam objective and provide detailed explanations for both correct and incorrect answers.
Exam Strategies: Get valuable insights into exam-taking strategies, time management, and how to approach different types of questions.
Real-world Scenarios: Gain practical insights into applying your knowledge in real-world scenarios, ensuring you're well-prepared to tackle challenges in your professional career.

Why Choose PassExamHub?

Expertise: Our 220-1102 exam questions answers are developed by experienced CompTIA certified professionals who have a deep understanding of the exam objectives and industry best practices.
Comprehensive Coverage: We leave no stone unturned in covering every topic and skill that could appear on the 220-1102 exam, ensuring you're fully prepared.
Engaging Learning: Our content is presented in a user-friendly and engaging format, making your study sessions enjoyable and effective.
Proven Success: Countless students have used our study materials to achieve their 220-1102 certifications and advance their careers.
Start Your Journey Today!

Embark on your journey to CompTIA A+ Certification Core 2 Exam success with PassExamHub. Our study material is your trusted companion in preparing for the 220-1102 exam and unlocking exciting career opportunities.

CompTIA 220-1102 Sample Question Answers

Question # 1

An administrator has received approval for a change request for an upcoming server deployment. Which of the following steps should be completed NEXT? 

A. Perform a risk analysis. 
B. Implement the deployment. 
C. Verify end user acceptance
D. Document the lessons learned. 



Question # 2

A technician is setting up a new laptop. The company's security policy states that users cannot install virtual machines. Which of the following should the technician implement to prevent users from enabling virtual technology on their laptops? 

A. UEFI password 
B. Secure boot 
C. Account lockout 
D. Restricted user permissions



Question # 3

A user is attempting to browse the internet using Internet Explorer. When trying to load a familiar web page, the user is unexpectedly redirected to an unfamiliar website. Which of the following would MOST likely solve the issue? 

A. Updating the operating system 
B. Changing proxy settings
C. Reinstalling the browser
D. Enabling port forwarding 



Question # 4

Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell. Which of the following is the NEXT step the technician should take to find the cause of the leaked data? 

A. Restore the device to factory settings. 
B. Uninstall the unapproved application. 
C. Disable the ability to install applications from unknown sources.
D. Ensure the device is connected to the corporate WiFi network. 



Question # 5

A user receives a notification indicating the data plan on the user's corporate phone has reached its limit. The user has also noted the performance of the phone is abnormally slow. A technician discovers a third-party GPS application was installed on the phone. Which of the following is the MOST likely cause?

A. The GPS application is installing software updates. 
B. The GPS application contains malware. 
C. The GPS application is updating its geospatial map data. 
D. The GPS application is conflicting with the built-in GPS.



Question # 6

A user's system is infected with malware. A technician updates the anti-malware software and runs a scan that removes the malware. After the user reboots the system, it once again becomes infected with malware. Which of the following will MOST likely help to permanently remove the malware?

A. Enabling System Restore 
B. Educating the user 
C. Booting into safe mode 
D. Scheduling a scan 



Question # 7

A small business owner wants to install newly purchased software on all networked PCs. The network is not configured as a domain, and the owner wants to use the easiest method possible. Which of the following is the MOST deficient way lor the owner to install the application? 

A. Use a network share to share the installation files. 
B. Save software to an external hard drive to install. 
C. Create an imaging USB for each PC.
D. Install the software from the vendor's website 



Question # 8

An IT services company that supports a large government contract replaced the Ethernet cards on several hundred desktop machines to comply With regulatory requirements. Which of the following disposal methods for the non-compliant cards is the MOST environmentally friendly? 

A. incineration 
B. Resale 
C. Physical destruction 
D. Dumpster for recycling plastics 



Question # 9

A technician is tasked with configuring a computer for a visually impaired user. Which of the following utilities should the technician use? 

A. Device Manager
B. System 
C. Ease of Access Center
D. Programs and Features 



Question # 10

Which of the following is a consequence of end-of-lite operating systems?

A. Operating systems void the hardware warranty. 
B. Operating systems cease to function. 
C. Operating systems no longer receive updates. 
D. Operating systems are unable to migrate data to the new operating system. 



Question # 11

Which of the following is the STRONGEST wireless configuration? 

A. WPS
B. WPA3 
C. WEP 
D. WMN 



Question # 12

A new spam gateway was recently deployed at a small business However; users still occasionally receive spam. The management team is concerned that users will open the messages and potentially infect the network systems. Which of the following is the MOST effective method for dealing with this Issue?

A. Adjusting the spam gateway
B. Updating firmware for the spam appliance 
C. Adjusting AV settings
D. Providing user training 



Question # 13

A systems administrator is tasked with configuring desktop systems to use a new proxy server that the organization has added to provide content filtering. Which of the following Windows utilities IS the BEST choice for accessing the necessary configuration to complete this goal? 

A. Security and Maintenance 
B. Network and Sharing Center
C. Windows Defender Firewall 
D. Internet Options



Question # 14

A technician has verified that a user's computer has a virus, and the antivirus software is out Of date. Which of the following steps should the technician take NEXT?

A. Quarantine the computer.
B. use a previous restore point,
C. Educate the end user about viruses 
D. Download the latest virus definitions 



Question # 15

A user has a license for an application that is in use on a personal home laptop. The user approaches a systems administrator about using the same license on multiple computers on the corporate network. Which of the following BEST describes what the systems administrator should tell the user? 

A. Use the application only on the home laptop because it contains the initial license. 
B. Use the application at home and contact the vendor regarding a corporate license. 
C. Use the application on any computer since the user has a license. 
D. Use the application only on corporate computers.



Question # 16

Following a recent power outage, several computers have been receiving errors when booting. The technician suspects file corruption has occurred. Which of the following steps should the technician try FIRST to correct the issue? 

A. Rebuild the Windows profiles. 
B. Restore the computers from backup. 
C. Reimage the computers.
D. Run the System File Checker.



Question # 17

A technician has an external SSD. The technician needs to read and write to an external SSD on both Macs and Windows PCs. Which of the following filesystems is supported by both OS types? 

A. NTFS 
B. APFS
C. ext4 
D. exFAT 



Question # 18

A help desk technician runs the following script: Inventory.py. The technician receives the following error message: How do you want to Open this file? Which of the following is the MOST likely reason this script is unable to run? 

A. Scripts are not permitted to run. 
B. The script was not built for Windows.
C. The script requires administrator privileges, 
D. The runtime environment is not installed.



Question # 19

After a company installed a new SOHO router customers were unable to access the company-hosted public website. Which of the following will MOST likely allow customers to access the website? 

A. Port forwarding 
B. Firmware updates
C. IP filtering 
D. Content filtering



Question # 20

A technician is attempting to mitigate micro power outages, which occur frequently within the area of operation. The outages are usually short, with the longest occurrence lasting five minutes. Which of the following should the technician use to mitigate this issue?

A. Surge suppressor 
B. Battery backup 
C. CMOS battery 
D. Generator backup



Question # 21

A user is unable to access a website, which is widely used across the organization, and receives the following error message: The security certificate presented by this website has expired or is not yet valid. The technician confirms the website works when accessing it from another computer but not from the user's computer. Which of the following should the technician perform NEXT to troubleshoot the issue? 

A. Reboot the computer. 
B. Reinstall the OS.
C. Configure a static 12
D. Check the computer's date and time. 



Question # 22

Each time a user tries to go to the selected web search provider, a different website opens. Which of the following should the technician check FIRST? 

A. System time 
B. IP address 
C. DNS servers
D. Windows updates



Question # 23

A laptop user is visually impaired and requires a different cursor color. Which of the following OS utilities is used to change the color of the cursor? 

A. Keyboard
B. Touch pad
C. Ease of Access Center 
D. Display settings 



Question # 24

An administrator has submitted a change request for an upcoming server deployment. Which of the following must be completed before the change can be approved? 

A. Risk analysis
B. Sandbox testing
C. End user acceptance
D. Lessons learned 



Question # 25

Which of the following data is MOST likely to be regulated? 

A. Name in a Phone book 
B. Name on a medical diagnosis 
C. Name on a job application
D. Name on a employer's website



Question # 26

A user connected a laptop to a wireless network and was tricked into providing login credentials for a website. Which of the following threats was used to carry out the attack?

A. Zero day 
B. Vishing 
C. DDoS 
D. Evil twin



Question # 27

A user reports a PC is running slowly. The technician suspects high disk I/O. Which of the following should the technician perform NEXT? 

A. resmon_exe 
B. dfrgui_exe
C. msinf032exe
D. msconfig_exe 



Question # 28

Which of the following file extensions are commonly used to install applications on a macOS machine? (Select THREE). 

A. .mac
B. .Pkg 
C. .deb
D. .dmg
E. .msi
F. .appx
G. .app
H. .apk



Question # 29

A user reports a workstation has been performing strangely after a suspicious email was opened on it earlier in the week. Which of the following should the technician perform FIRST? 

A. Escalate the ticket to Tier 2. 
B. Run a virus scan. 
C. Utilize a Windows restore point. 
D. Reimage the computer. 



Question # 30

A macOS user reports seeing a spinning round cursor on a program that appears to be frozen. Which of the following methods does the technician use to force the program to close in macOS? 

A. The technician presses the Ctrl+Alt+Del keys to open the Force Quit menu, selects the frozen application in the list, and clicks Force Quit. 
B. The technician clicks on the frozen application and presses and holds the Esc key on the keyboard for 10 seconds Which causes the application to force quit. 
C. The technician opens Finder, navigates to the Applications folder, locates the application that is frozen in the list, right-clicks on the application, and selects the Force Quit option. 
D. The technician opens the Apple icon menu, selects Force Quit, selects the frozen application in the list, and clicks Force Quit.



Question # 31

A technician receives a call from a user who is on vacation. The user provides the necessary credentials and asks the technician to log in to the users account and read a critical email that the user has been expecting. The technician refuses because this is a violation of the:

A. acceptable use policy. 
B. regulatory compliance requirements. 
C. non-disclosure agreement 
D. incident response procedures 



Question # 32

A technician downloaded software from the Internet that required the technician to scroll through a text box and at the end of the text box, click a button labeled Accept Which of the following agreements IS MOST likely in use? 

A. DRM 
B. NDA 
C. EULA 
D. MOU 



Question # 33

Which of the following is the MOST basic version of Windows that includes BitLocker?

A. Home 
B. pro 
C. Enterprise
D. Pro for Workstations



Question # 34

In which of the following scenarios would remote wipe capabilities MOST likely be used? (Select TWO). 

A. A new IT policy requires users to set up a lock screen PIN. 
B. A user is overseas and wants to use a compatible international SIM Card. 
C. A user left the phone at home and wants to prevent children from gaining access to the phone.
D. A user traded in the company phone for a cell carrier upgrade by mistake. 
E. A user cannot locate the phone after attending a play at a theater. 
F. A user forgot the phone in a taxi, and the driver called the company to return the device.



Question # 35

A user is setting up a computer for the first time and would like to create a secondary login with permissions that are different than the primary login. The secondary login will need to be protected from certain content such as games and websites. Which of the following Windows settings should the user utilize to create the secondary login? 

A. Privacy 
B. Accounts 
C. Personalization
D. Shared resources 



Question # 36

A desktop support technician is tasked with migrating several PCs from Windows 7 Pro to Windows 10 Pro, The technician must ensure files and user preferences are retained, must perform the operation locally, and should migrate one station at a time. Which of the following methods would be MOST efficient?

A. Golden image 
B. Remote network install 
C. In-place upgrade
D. Clean install 



Question # 37

A technician is reimaging a desktop PC. The technician connects the PC to the network and powers it on. The technician attempts to boot the computer via the NIC to image the computer, but this method does not work. Which of the following is the MOST likely reason the computer is unable to boot into the imaging system via the network? 

A. The computer's CMOS battery failed. 
B. The computer's NIC is faulty. 
C. The PXE boot option has not been enabled
D. The Ethernet cable the technician is using to connect the desktop to the network is faulty.



Question # 38

The web browsing speed on a customer's mobile phone slows down every few weeks and then returns to normal after three or four days. Restarting the device does not usually restore performance. Which of the following should a technician check FIRST to troubleshoot this issue?

A. Data usage limits 
B. Wi-Fi connection speed 
C. Status of airplane mode
D. System uptime



Question # 39

A Windows user reported that a pop-up indicated a security issue. During inspection, an antivirus system identified malware from a recent download, but it was unable to remove the malware. Which of the following actions would be BEST to remove the malware while also preserving the user's files? 

A. Run the virus scanner in an administrative mode.
B. Reinstall the operating system. 
C. Reboot the system in safe mode and rescan. 
D. Manually delete the infected files. 



Question # 40

A technician needs to format a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use?

A. FAT32 
B. ext4 
C. NTFS 
D. exFAT



Question # 41

A technician connects an additional monitor to a PC using a USB port. The original HDMI monitor is mounted to the left of the new monitor. When moving the mouse to the right from the original monitor to the new monitor, the mouse stops at the end of the screen on the original monitor. Which of the following will allow the mouse to correctly move to the new monitor? 

A. Rearranging the monitor's position in display settings 
B. Swapping the cables for the monitors
C. Using the Ctrl+AIt+> to correct the display orientation 
D. Updating the display drivers for the video card 



Question # 42

An analyst needs GUI access to server software running on a macOS server. Which of the following options provides the BEST way for the analyst to access the macOS server from the Windows workstation? 

A. RDP through RD Gateway 
B. Apple Remote Desktop
C. SSH access with SSH keys 
D. VNC with username and password 



Question # 43

A suite of security applications was installed a few days ago on a user's home computer. The user reports that the computer has been running slowly since the installation. The user notices the hard drive activity light is constantly solid. Which of the following should be checked FIRST? 

A. Services in Control Panel to check for overutilization 
B. Performance Monitor to check for resource utilization 
C. System File Checker to check for modified Windows files 
D. Event Viewer to identify errors 



Question # 44

A systems administrator needs to reset a users password because the user forgot it. The systems administrator creates the new password and wants to further protect the user's account Which of the following should the systems administrator do? 

A. Require the user to change the password at the next log-in. 
B. Disallow tie user from changing the password.
C. Disable the account 
D. Choose a password that never expires. 



Question # 45

A technician is setting up a new laptop for an employee who travels, Which of the following is the BEST security practice for this scenario?

A. PIN-based login
B. Quarterly password changes 
C. Hard drive encryption
D. A physical laptop lock



Question # 46

Which of the following change management documents includes how to uninstall a patch? 

A. Purpose of change 
B. Rollback plan 
C. Scope of change
D. Risk analysis 



Question # 47

A technician received a call stating that all files in a user's documents folder appear to be Changed, and each of the files now has a look file extension Which pf the following actions is the FIRST step the technician should take? 

A. Runa live disk clone. 
B. Run a full antivirus scan. 
C. Use a batch file to rename the files
D. Disconnect the machine from the network 



Question # 48

A manager reports that staff members often forget the passwords to their mobile devices and applications. Which of the following should the systems administrator do to reduce the number of help desk tickets submitted? 

A. Enable multifactor authentication.
B. Increase the failed log-in threshold. 
C. Remove complex password requirements. 
D. Implement a single sign-on with biometrics. 



Question # 49

A user is attempting to make a purchase at a store using a phone. The user places the phone on the payment pad, but the device does not recognize the phone. The user attempts to restart the phone but still has the same results. Which of the following should the user do to resolve the issue?

A. Turn off airplane mode while at the register.
B. Verify that NFC is enabled.
C. Connect to the store's Wi-Fi network. 
D. Enable Bluetooth on the phone. 



Question # 50

The findings from a security audit indicate the risk of data loss from lost or stolen laptops is high. The company wants to reduce this risk with minimal impact to users who want to use their laptops when not on the network. Which of the following would BEST reduce this risk for Windows laptop users? 

A. Requiring strong passwords
B. Disabling cached credentials 
C. Requiring MFA to sign on 
D. Enabling BitLocker on all hard drives



Question # 51

A technician is troubleshooting a lack of outgoing audio on a third-party Windows 10 VoIP application, The PC uses a USB microphone connected to a powered hub. The technician verifies the microphone works on the PC using Voice Recorder. Which of the following should the technician do to solve the issue? 

A. Remove the microphone from the USB hub and plug it directly into a USB port on the PC.
B. Enable the microphone under Windows Privacy settings to allow desktop applications to access it. 
C. Delete the microphone from Device Manager and scan for new hardware, 
D. Replace the USB microphone with one that uses a traditional 3.5mm plug. 



Question # 52

Which of the following is MOST likely contained in an EULA? 

A. Chain of custody 
B. Backup of software code 
C. Personally identifiable information 
D. Restrictions of use 



Question # 53

A field technician applied a Group Policy setting to all the workstations in the network. This setting forced the workstations to use a specific SNTP server. Users are unable to log in now. Which of the following is the MOST likely cause of this issue?

A. The SNTP server is offline. 
B. A user changed the time zone on a local machine. 
C. The Group Policy setting has disrupted domain authentication on the system, 
D. The workstations and the authentication server have a system clock difference. 



Question # 54

A user installed a new application that automatically starts each time the user logs in to a Windows 10 system. The user does not want this to happen and has asked for this setting to be changed. Which of the following tools would the technician MOST likely use to safely make this change?

A. Registry Editor
B. Task Manager
C. Event Viewer 
D. Local Users and Groups 



Question # 55

A company has just refreshed several desktop PCs. The hard drives contain PII. Which of the following is the BEST method to dispose of the drives? 

A. Drilling 
B. Degaussing 
C. Low-level formatting 
D. Erasing/wiping 



Question # 56

A user received the following error upon visiting a banking website: The security presented by website was issued a different website' s address . A technician should instruct the user to: 

A. clear the browser cache and contact the bank. 
B. close out of the site and contact the bank.
C. continue to the site and contact the bank. 
D. update the browser and contact the bank.



Question # 57

A user in a corporate office reports the inability to connect to any network drives. No other users have reported this issue. Which of the following is the MOST likely reason the user is having this issue? 

A. The user is not connected to the VPN. 
B. The file server is offline. 
C. A low battery is preventing the connection. 
D. The log-in script failed. 



Question # 58

A junior administrator is responsible for deploying software to a large group of computers in an organization. The administrator finds a script on a popular coding website to automate this distribution but does not understand the scripting language. Which of the following BEST describes the risks in running this script? 

A. The instructions from the software company are not being followed. 
B. Security controls will treat automated deployments as malware. 
C. The deployment script is performing unknown actions. 
D. Copying scripts off the internet is considered plagiarism. 



Question # 59

A Microsoft Windows PC needs to be set up for a user at a targe corporation. The user will need access to the corporate domain to access email and shared drives. Which of the following versions of Windows would a technician MOST likely deploy for the user? 

A. Windows Enterprise Edition
B. Windows Professional Edition 
C. Windows Server Standard Edition
D. Windows Home Edition 



Question # 60

A technician has been asked to set up a new wireless router with the best possible security. Which of the following should the technician implement? 

A. WPS
B. TKIP
C. WPA3
D. WEP 



Question # 61

A new service desk is having a difficult time managing the volume of requests. Which of the following is the BEST solution for the department? 

A. Implementing a support portal 
B. Creating a ticketing system 
C. Commissioning an automated callback system 
D. Submitting tickets through email 



Question # 62

An organization's Chief Financial Officer (CFO) is concerned about losing access to very sensitive, legacy unmaintained PII on a workstation if a ransomware outbreak occurs. The CFO has a regulatory requirement to retain this data for many years. Which of the following backup methods would BEST meet the requirements? 

A. A daily, incremental backup that is saved to the corporate file server 
B. An additional, secondary hard drive in a mirrored RAID configuration
C. A full backup of the data that is stored of site in cold storage
D. Weekly, differential backups that are stored in a cloud-hosting provider 



Question # 63

While browsing a website, a staff member received a message that the website could not be trusted. Shortly afterward, several other colleagues reported the same issue across numerous other websites. Remote users who were not connected to corporate resources did not have any issues. Which of the following is MOST likely the cause of this issue? 

A. A bad antivirus signature update was installed. 
B. A router was misconfigured and was blocking traffic. 
C. An upstream internet service provider was flapping. 
D. The time or date was not in sync with the website. 



Question # 64

An Android user contacts the help desk because a company smartphone failed to complete a tethered OS update A technician determines there are no error messages on the device Which of the following should the technician do NEXT? 

A. Verify all third-party applications are disabled 
B. Determine if the device has adequate storage available. 
C. Check if the battery is sufficiently charged 
D. Confirm a strong internet connection is available using Wi-Fi or cellular data