00:15:00

CompTIA A+ Practice Test (220-1102)

Use the form below to configure your CompTIA A+ Practice Test (220-1102). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-90 questions and set a time limit.

Logo for CompTIA A+ 220-1102
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA A+ 220-1102 Information

CompTIA A+ Certification Overview

Exam Versions

The current versions of the CompTIA A+ certification exams are:

  • 220-1101 (Core 1)
  • 220-1102 (Core 2)

These versions were launched in April 2022 and are expected to retire approximately three years from their release date.

The A+ Certification Test

To earn the CompTIA A+ certification, candidates must pass two separate exams: 220-1101 and 220-1102. Each exam has a separate fee and can be taken in any order. Both exams must be completed before the retirement date and must be from the same set of objectives. The certification is valid for three years from the date of passing the exams.

Exam Details:

  • Format: Computer-based tests
  • Number of Questions: 90 questions per exam
  • Time Limit: 90 minutes per exam
  • Result Availability: Immediately after completion, following a short mandatory survey

CompTIA A+ 220-1102

The CompTIA A+ 220-1102 (Core 2) exam is an essential part of the A+ certification, focusing on the software and operational aspects of IT support. Launched in April 2022, this exam tests candidates on a variety of critical topics including operating systems, security, software troubleshooting, and operational procedures. The 220-1102 exam comprises 90 questions, featuring a mix of multiple-choice and performance-based questions that simulate real-world IT scenarios. With a 90-minute time limit, candidates must efficiently demonstrate their knowledge and problem-solving skills. The exam is designed to ensure that IT professionals are well-versed in managing and troubleshooting software issues, implementing security measures, and following best practices in IT operations. Successful completion of the 220-1102, alongside the 220-1101, certifies individuals for three years, highlighting their competence and readiness to handle diverse technical challenges in the IT field.

Exam Policies and Procedures

Candidates must agree to CompTIA's exam policies before starting the test. These policies include:

  • No Mobile Phones/Devices: Must be left outside the exam room
  • Question Review: Candidates can revisit and change answers before submitting the exam
  • Submission: Unanswered questions are marked, and a final review is available before submission

Testing Centers

Since July 9, 2012, CompTIA exams are available exclusively through Pearson VUE testing centers. Candidates can book exams online, by phone, or at the testing center. Options include:

  • In-Person Testing: At Pearson VUE testing centers
  • Online Testing: Through Pearson VUE's online platform

Performance-Based Questions (PBQs)

The A+ exams include Performance-Based Questions (PBQs), which require candidates to perform specific tasks or solve problems in a simulated environment. These questions test real-world skills in areas like command prompts, Windows OS, and networking environments.

Continuing Education (CE) Program

Certifications with the +CE (Continuing Education) suffix, including A+, Network+, and Security+, must be renewed every three years. Renewal options include:

  • Retaking the Exam: Passing the latest version of the exam
  • Higher-Level Certification: Passing a higher-level CompTIA exam
  • CE Program Requirements: Completing CE activities

Lifetime Certifications

Certifications earned on or before December 31, 2010, are valid for life. However, lifetime certifications are no longer available for new candidates.

More reading:

Free CompTIA A+ 220-1102 Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: 15 minutes (60 seconds per question)
  • Included Objectives:
    Operating Systems
    Security
    Software Troubleshooting
    Operational Procedures
Question 1 of 15

An IT department wants to automate the process of remapping network drives for multiple workstations. Which scripting language BEST aligns with this task by being easy to implement on Windows systems?

  • PowerShell (.ps1)

  • Batch file (.bat)

  • VBScript (.vbs)

  • JavaScript (.js)

Question 2 of 15

Which of the following is NOT a method for stopping a process on a Windows operating system?

  • taskkill /F /IM process.exe

  • Using Task Manager

  • ALT+F4

  • pkill -9 process.exe

Question 3 of 15

What is a 'mantrap' in the context of physical security systems, and how is it typically used to enhance security in a controlled environment?

  • A software tool designed to detect and prevent unauthorized access to a network.

  • A device that intercepts and logs network traffic for security analysis.

  • A secure enclosure with two or more doors, where the first door must close before the second opens, used to control access to sensitive areas.

  • A type of biometric scanner used for verifying the identity of individuals through facial recognition technology.

Question 4 of 15

Which option best describes the recommended purpose of a login script in a user environment?

  • To secure user accounts by enforcing password complexity requirements.

  • To monitor user activity and log usage for auditing purposes.

  • To define user permissions for file access and manipulation on a network.

  • To automatically configure user settings upon login to enhance consistency.

Question 5 of 15

A user's smartphone is experiencing an issue where it can connect to Wi-Fi networks but has no Internet access. What is MOST likely the cause of this problem?

  • Issues with the DHCP configuration or service

  • The device's MAC Address has been blocked.

  • The device is connected to the wrong SSID

  • The WPA2 key entered for the Wi-Fi network is incorrect

Question 6 of 15

A technician is preparing to upgrade several office computers from Windows 10 to Windows 11. Before proceeding with the in-place upgrade, which of the following actions should the technician take FIRST to ensure the success and integrity of the upgrade process?

  • Back up user files and system preferences to an external hard drive or cloud service.

  • Ensure the users has purchased a Windows 11 License.

  • Configure the Microsoft Store to default to Windows 11 apps

  • Delete temporary files to free up sufficient space on the system drive for the upgrade.

Question 7 of 15

You work for a financial services agency that has customers in the office regularly to meet with their financial representatives. During these meetings the rep wants to be able to present information regarding the customer's account by turning a monitor towards the customer's seat. Which option would allow a Windows PC to show the same display on 2 monitors so both the customer and the representative can see the information?

  • You must use a hardware display repeater

  • Mirrored Display

  • Duplicate Displays

  • You must use a KVM switch

  • Extended Display

Question 8 of 15

A hacker wants to infiltrate a target’s computer to plant malware that allows them undetected privileged access to control the computer. What type of malware would the hacker want to use?

  • Ransomware

  • A virus

  • A rootkit

  • Spyware

  • Trojan

Question 9 of 15

When a company decides to outsource the destruction of their old storage devices containing sensitive data, which of the following considerations is the MOST important to ensure data confidentiality and regulatory compliance?

  • The vendor should be located in close proximity to the company to reduce logistics costs.

  • The company should choose a vendor that offers the lowest price to maintain budget efficiency.

  • The vendor should be able to repurpose the devices for environmental sustainability.

  • The vendor should provide a certificate of destruction/recycling that confirms the data destruction meets regulatory standards.

Question 10 of 15

When addressing a suspected malware infection in a corporate environment, what is the FIRST action to be taken to best ensure containment and prevent further spread of the infection?

  • Update the antivirus definitions and perform a system scan

  • Disconnect the system from network connections

  • Reformat the system drive

  • Create a restore point

Question 11 of 15

A computer that fails to load the operating system may indicate a hardware issue, such as a malfunctioning hard drive or incorrect BIOS settings.

  • True

  • False

Question 12 of 15

A proposed change to network infrastructure will have no impact on existing applications running on that network.

  • False

  • True

Question 13 of 15

You notice unusual desktop alerts appearing on a user's computer, stating that their antivirus protection is compromised.

What is the BEST course of action to address this issue?

  • Ignore the alerts as they may be false notifications.

  • Review the antivirus software settings and perform an update or reinstallation.

  • Restart the computer to clear potential alerts from memory.

  • Run a full system scan to assess the current status of the system.

Question 14 of 15

A user complains that their computer has become increasingly slow over time, especially when running multiple applications. After checking the system, you find that there's adequate disk space and no malware infections. Which of the following actions would be the BEST to take next to address this performance issue?

  • Downgrade the OS to an older version.

  • Uninstall any applications that are not frequently used.

  • Defragment the system hard drive.

  • Add more RAM to the system.

Question 15 of 15

An unauthorized user observing system security procedure such as typing in a password or pin code is known as:

  • Spyware

  • Phishing

  • Shoulder Surfing

  • A Worm