CompTIA A+ Practice Test (220-1102)
Use the form below to configure your CompTIA A+ Practice Test (220-1102). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-90 questions and set a time limit.

CompTIA A+ 220-1102 Information
CompTIA A+ Certification Overview
Exam Versions
The current versions of the CompTIA A+ certification exams are:
- 220-1101 (Core 1)
- 220-1102 (Core 2)
These versions were launched in April 2022 and are expected to retire approximately three years from their release date.
The A+ Certification Test
To earn the CompTIA A+ certification, candidates must pass two separate exams: 220-1101 and 220-1102. Each exam has a separate fee and can be taken in any order. Both exams must be completed before the retirement date and must be from the same set of objectives. The certification is valid for three years from the date of passing the exams.
Exam Details:
- Format: Computer-based tests
- Number of Questions: 90 questions per exam
- Time Limit: 90 minutes per exam
- Result Availability: Immediately after completion, following a short mandatory survey
CompTIA A+ 220-1102
The CompTIA A+ 220-1102 (Core 2) exam is an essential part of the A+ certification, focusing on the software and operational aspects of IT support. Launched in April 2022, this exam tests candidates on a variety of critical topics including operating systems, security, software troubleshooting, and operational procedures. The 220-1102 exam comprises 90 questions, featuring a mix of multiple-choice and performance-based questions that simulate real-world IT scenarios. With a 90-minute time limit, candidates must efficiently demonstrate their knowledge and problem-solving skills. The exam is designed to ensure that IT professionals are well-versed in managing and troubleshooting software issues, implementing security measures, and following best practices in IT operations. Successful completion of the 220-1102, alongside the 220-1101, certifies individuals for three years, highlighting their competence and readiness to handle diverse technical challenges in the IT field.
Exam Policies and Procedures
Candidates must agree to CompTIA's exam policies before starting the test. These policies include:
- No Mobile Phones/Devices: Must be left outside the exam room
- Question Review: Candidates can revisit and change answers before submitting the exam
- Submission: Unanswered questions are marked, and a final review is available before submission
Testing Centers
Since July 9, 2012, CompTIA exams are available exclusively through Pearson VUE testing centers. Candidates can book exams online, by phone, or at the testing center. Options include:
- In-Person Testing: At Pearson VUE testing centers
- Online Testing: Through Pearson VUE's online platform
Performance-Based Questions (PBQs)
The A+ exams include Performance-Based Questions (PBQs), which require candidates to perform specific tasks or solve problems in a simulated environment. These questions test real-world skills in areas like command prompts, Windows OS, and networking environments.
Continuing Education (CE) Program
Certifications with the +CE (Continuing Education) suffix, including A+, Network+, and Security+, must be renewed every three years. Renewal options include:
- Retaking the Exam: Passing the latest version of the exam
- Higher-Level Certification: Passing a higher-level CompTIA exam
- CE Program Requirements: Completing CE activities
Lifetime Certifications
Certifications earned on or before December 31, 2010, are valid for life. However, lifetime certifications are no longer available for new candidates.
More reading:
Scroll down to see your responses and detailed results
Free CompTIA A+ 220-1102 Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Operating SystemsSecuritySoftware TroubleshootingOperational Procedures
Which of the following commands may be used on a computer, running Windows 11, to stop a single process from the command line?
taskkill
shutdown
del
stop
Answer Description
The taskkill
command in Windows is used to manually stop a process from running. Example: TASKKILL /IM notepad.exe
, will stop the notepad.exe process.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some common parameters used with the taskkill command?
How can I find the process ID of a running application?
What other commands can be used to manage processes in Windows?
Backup systems that use automated methods will essentially reduce the need for manual intervention.
False
True
Answer Description
This statement is accurate. Automated backup systems are designed to perform backups at scheduled times without requiring a person to initiate the process. This helps ensure that backups are done consistently and reduces the risk of human error.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are automated backup systems?
What is the risk of human error in manual backup processes?
What are the benefits of using automated backups over manual ones?
An employee's workstation begins to display desktop alerts indicating that their system is infected with multiple viruses. However, the antivirus software installed on the machine does not report any issues. Additionally, the system has begun to experience OS update failures. Which of the following actions should be taken FIRST to address this issue?
Immediately restore the system to a previous state before the alerts started.
Disable the antivirus software to prevent it from interfering with system updates.
Perform a complete scan with an updated anti-malware software.
Boot into safe mode and perform a system file check (sfc /scannow) to identify any missing or corrupted files.
Answer Description
The correct action to take is to perform a complete scan with an updated anti-malware software. The described symptoms are indicative of potential rogue security software, also known as 'scareware,' which can masquerade as legitimate security alerts to convince users to purchase a fake antivirus program. Performing a thorough scan will help identify and remove any malicious software that the current antivirus might have missed. Updating the anti-malware software is essential to recognize the newest threats. Restoring the system could potentially remove the malware but might not be effective if the malware is designed to evade such measures. Similarly, utilizing a safe mode and preinstallation environment for scanning should be done if the full scan in the normal mode is not possible or effective, but as a first response, updating and scanning the system is recommended. Lastly, the suggestion to disable antivirus software is incorrect because it could exacerbate the security concerns by leaving the system vulnerable.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is scareware?
Why is it important to update anti-malware software?
What steps should be taken if a full scan does not resolve the issue?
A user complains that their smartphone battery drains significantly faster than usual, despite normal usage patterns. They have not installed any new applications recently and the device is relatively new. What is the FIRST action you should take to troubleshoot this issue?
Check for any pending OS updates and ensure the system is up to date.
Identify if any applications are using high amounts of resources.
Directly disable Bluetooth and Wi-Fi to save battery life.
Replace the battery with a new one.
Answer Description
Checking for OS updates is important because updates often contain bug fixes and improvements for battery management. An outdated OS can have unresolved issues that cause excessive battery drain. Checking for high resource usage apps is also a valid step, but since the user has not installed any new applications and the usage pattern remains normal, it is less likely to be the immediate cause. Changing the battery should be considered only after ruling out software issues, especially since the device is relatively new. Lastly, disabling Bluetooth and Wi-Fi does not address the root cause of the problem, especially if the usage pattern involving these features hasn't changed.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why are OS updates important for battery life?
How do I check for OS updates on my smartphone?
What other factors can contribute to battery drain apart from software issues?
A technician is asked to remotely restart a client's computer after office hours for maintenance purposes. The client's computer is on the same local network as the technician. Which command-line tool should the technician use to initiate the remote shutdown?
powershell
gpupdate
shutdown
poweroff
netstat
net use
Answer Description
The shutdown
command-line tool can be used to shut down or restart a local or remote machine. The various switches provided with the command can be used to specify options like remote shutdown, the delay in shutdown, and the message to be displayed to the users. netstat
is used to display networking statistics and does not have the capability to shut down a machine. gpupdate
is used to manually update group policy settings on a particular machine. net use
is utilized to connect, remove, and configure connections to shared resources, like mapped drives and network printers. poweroff
is a similar command for Linux, not Windows. powershell
is the name of a cross-platform command-line shell and scripting language created by Microsoft.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the commonly used switches with the shutdown command?
Can you explain how to perform a remote shutdown with the shutdown command?
What are other command-line tools that can be used for remote management?
You are passed a trouble ticket about an issue involving a Windows 10 system that should allow remote connections. The previous tech said the RDP service is not set to start automatically. How do you fix this?
Run
dxdiag
to enable remote connections through Direct ConnectOpen port 3389 in Windows Firewall
Add the RDP gateway to the proper adapter under Network Connections in the Control Panel
Run
services.msc
and change the Startup Type for each Remote Desktop service to "Auto"
Answer Description
SERVICES.MSC
is where you change the startup configurations for services in Windows. DXDIAG
is a tool for troubleshooting DirectX sound/video issues. Port 3389 is the port for RDP, but the port being blocked was not the issue. Adding the RDP gateway to an adapter is a made up answer.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the Remote Desktop services in Windows 10?
How can I check if the RDP service is running on my Windows 10 system?
What is the significance of port 3389 in relation to Remote Desktop connections?
What command line tool can you use in Windows to check and repair the file system integrity of a disk?
Note: Only the command line tool should be given, do not include any flags or options
chkdsk
Answer Description
chkdsk checks the file system and file system metadata of a volume for logical and physical errors.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some common scenarios where I might use chkdsk?
How does chkdsk detect file system errors?
Can chkdsk fix errors automatically, or do I need to do it manually?
A VNC connection can be secured using encryption protocols to prevent unauthorized interception of data between the remote and host machines.
True
False
Answer Description
A correct understanding of remote access security is important for IT professionals. VNC can use encryption protocols to secure the connection, though it does not by default. The use of encryption prevents data from being easily intercepted by unauthorized third parties during transmission, which is especially important over unsecured or public networks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are encryption protocols used in VNC connections?
Why is it important to secure VNC connections?
What is the difference between default and secured VNC connections?
A user reports that their Windows 10 computer has become extremely slow and is occasionally crashing. The IT technician suspects a corrupted Windows system file is the cause. Which of the following tools should the technician use FIRST to repair the Windows system files?
Disk Cleanup
System File Checker (SFC)
System Restore
Windows Recovery Environment (WinRE)
Answer Description
System File Checker (SFC) is a utility in Windows that allows users to scan for and restore corruptions in Windows system files. It is an ideal first step in troubleshooting a suspected issue with system file integrity, as it can identify and fix problems without impacting user data. If SFC does not resolve the issue, other tools like Windows Recovery Environment or System Restore might be considered for more comprehensive repair actions. Disk Cleanup, while useful for freeing up space and potentially improving performance, is unlikely to fix system file corruption.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is System File Checker (SFC) and how does it work?
What impact does a corrupted system file have on a Windows 10 computer?
What should a user do if System File Checker (SFC) does not fix the problems?
This type of malware infects the MBR of a hard drive, solid-state drive or removable storage media and loads/runs each time the computer boots. This is what type of malware?
Keylogger
Trojan
Rootkit
Boot sector virus
Answer Description
A boot sector virus is a type of malware that infects the master boot record and/or boot sector of various types of media and loads/runs on the OS everytime it is booted.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Master Boot Record (MBR)?
How does a boot sector virus spread?
What are some symptoms of a boot sector virus infection?
An access control system that utilizes key fobs should be capable of tracking the time and location of entries made by users.
False
True
Answer Description
This statement is True.
Modern access control systems that utilize key fobs often include tracking and logging features. These systems can:
Record entry times: Track when a key fob is used to gain access to a specific location.
Log location details: Maintain records of which doors or access points were accessed using the key fob.
Enhance security and auditing: Provide a detailed log of user activity, which can be used for auditing purposes, detecting unauthorized access attempts, or responding to security incidents.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How do key fob access control systems track entries?
What types of information can be logged by an access control system?
Why is auditing important in access control systems?
Which script type is best suited for automating administrative tasks on a Windows machine?
.ps1
.js
.sh
.bat
Answer Description
A .ps1 script file, also known as a PowerShell script, is specifically designed for Windows and provides powerful administrative capabilities. While .bat scripts (batch files) can also automate tasks, PowerShell scripts offer more advanced functionality and integration with other Windows systems. .sh scripts are used in Unix-like operating systems, and .js files are typically used for client-side web development.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What advantages do PowerShell scripts have over batch files?
What is the role of Cmdlets in PowerShell?
In what situations should I avoid using .bat scripts for automation?
What does the /R switch of the CHKDSK utility do on Disk Operating System (DOS), OS/2, or windows systems?
Uses more system resource to perform a scan as fast as possible
Displays cleanup messages
Locates bad sectors and recovers readable information
Displays the full path and name of every file on the disk
Answer Description
The /r switch will locate bad sectors and recover the information it can from the drive.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are bad sectors on a hard drive?
How does the CHKDSK utility work?
What does the recovery of information from bad sectors entail?
What is the effect of setting a Windows 10 computer to 'Standby' mode?
Restarts the computer to install updates
Saves the current session to the hard drive and powers off the system
Shuts down all applications but keeps the user logged in
Preserves the current session in RAM and allows for quick resumption of activities
Answer Description
Setting a Windows 10 computer to 'Standby' mode (also known as Sleep mode) allows the computer to enter a low-power state while preserving the current session in RAM. This enables the user to resume work quickly, as the system can wake up faster compared to other power saving modes such as Hibernate, which completely powers off the system after saving the session to the hard drive. The incorrect options presented here, such as 'Shutting down applications' or 'Restarting the computer', involve closing programs or rebooting, which are not characteristics of Standby mode.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What happens to unsaved work when a computer is in 'Standby' mode?
How does 'Standby' mode compare to 'Hibernate' mode?
What are some scenarios when I might want to use 'Standby' mode?
An employee reports that their Windows user profile is taking an unusually long time to load when they log in. What should you do first to troubleshoot this issue?
Reinstall the operating system on the user's computer.
Check the startup applications and services for the user profile.
Clear the user's cache files to speed up loading time.
Check for malware infections on the system.
Answer Description
The best first step is to check the startup applications and services associated with the user profile. Excessive or unnecessary applications launching at startup can significantly slow down profile loading times.
Other options, such as checking system resources or reinstalling the operating system, should not be the first approach due to their complexity and time requirements. By managing startup items, you can often resolve the issue simply and effectively.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are startup applications and services?
How can I check which applications are slowing down my startup?
What are the potential consequences of not managing startup applications?
Woo!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.