CompTIA A+ Practice Test (220-1102)
Use the form below to configure your CompTIA A+ Practice Test (220-1102). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA A+ 220-1102 (V14) Information
CompTIA A+ Certification Overview
The A+ Certification Test
To earn the CompTIA A+ certification, candidates must pass two separate exams: 220-1101 and 220-1102. Each exam has a separate fee and can be taken in any order. Both exams must be completed before the retirement date and must be from the same set of objectives. The certification is valid for three years from the date of passing the exams.
Exam Details:
- Format: Computer-based tests
- Number of Questions: 90 questions per exam
- Time Limit: 90 minutes per exam
- Result Availability: Immediately after completion, following a short mandatory survey
CompTIA A+ 220-1102
The CompTIA A+ 220-1102 (Core 2) exam is an essential part of the A+ certification, focusing on the software and operational aspects of IT support. Launched in April 2022, this exam tests candidates on a variety of critical topics including operating systems, security, software troubleshooting, and operational procedures. The 220-1102 exam comprises 90 questions, featuring a mix of multiple-choice and performance-based questions that simulate real-world IT scenarios. With a 90-minute time limit, candidates must efficiently demonstrate their knowledge and problem-solving skills. The exam is designed to ensure that IT professionals are well-versed in managing and troubleshooting software issues, implementing security measures, and following best practices in IT operations. Successful completion of the 220-1102, alongside the 220-1101, certifies individuals for three years, highlighting their competence and readiness to handle diverse technical challenges in the IT field.
Exam Policies and Procedures
Candidates must agree to CompTIA's exam policies before starting the test. These policies include:
- No Mobile Phones/Devices: Must be left outside the exam room
- Question Review: Candidates can revisit and change answers before submitting the exam
- Submission: Unanswered questions are marked, and a final review is available before submission
Testing Centers
Since July 9, 2012, CompTIA exams are available exclusively through Pearson VUE testing centers. Candidates can book exams online, by phone, or at the testing center. Options include:
- In-Person Testing: At Pearson VUE testing centers
- Online Testing: Through Pearson VUE's online platform
Performance-Based Questions (PBQs)
The A+ exams include Performance-Based Questions (PBQs), which require candidates to perform specific tasks or solve problems in a simulated environment. These questions test real-world skills in areas like command prompts, Windows OS, and networking environments.
Continuing Education (CE) Program
Certifications with the +CE (Continuing Education) suffix, including A+, Network+, and Security+, must be renewed every three years. Renewal options include:
- Retaking the Exam: Passing the latest version of the exam
- Higher-Level Certification: Passing a higher-level CompTIA exam
- CE Program Requirements: Completing CE activities
Lifetime Certifications
Certifications earned on or before December 31, 2010, are valid for life. However, lifetime certifications are no longer available for new candidates.
More reading:

Free CompTIA A+ 220-1102 (V14) Practice Test
- 20 Questions
- Unlimited
- Operating SystemsSecuritySoftware TroubleshootingOperational Procedures
Which practice is fundamental to ensuring controlled and predictable changes within an IT environment?
Providing users with advance notice of changes without evaluating risks or impacts.
Phasing in changes gradually without consulting the change board.
Implementing changes without requiring documentation or formal approval processes.
Utilizing a change request form that includes the purpose and scope of the proposed change along with required approvals from relevant stakeholders.
Answer Description
Utilizing a change request form that includes the purpose and scope of the proposed change along with required approvals from relevant stakeholders - This is correct. A formal change request process is fundamental to change management, ensuring changes are evaluated, approved and implemented in a controlled and predictable manner. It minimizes risks by documenting the change's purpose, scope, and impact and ensures accountability by involving relevant stakeholders.
Implementing changes without requiring documentation or formal approval processes - Making changes without proper documentation or approvals increases the risk of unexpected issues, miscommunication, and potential disruptions to the IT environment.
Phasing in changes gradually without consulting the change board - While gradual implementation can reduce risks, bypassing the change board undermines the formal review and approval process, which is essential for controlled changes.
Providing users with advance notice of changes without evaluating risks or impacts - Informing users is important, but not evaluating risks or impacts before implementing changes can lead to unforeseen complications and disruptions.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a change request form?
Who are relevant stakeholders in a change management process?
What is the purpose of a Change Advisory Board (CAB)?
You have been tasked to create the backup strategy for Crucial Technologies. Looking at the options you have decided that you want to use a solution that is going to give the company a less time consuming way to have full backups. What strategy would you use?
Differential
Full
Incremental
Synthetic
Answer Description
The answer is synthetic. Synthetic backups are a way of creating full backups by combining a full backup with the incremental backups that have been created since the creation of the full one. This strategy is a less time consuming way to create full backups because it's not required to fully back up the data each time.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a synthetic backup?
How is a synthetic backup different from an incremental backup?
What are the advantages of synthetic backups over differential backups?
As a technician, you are tasked with creating a script to automate the backup process of company data. To maintain system security, what is the BEST next step to follow immediately before deploying the script across the company network?
Regularly update the script to the latest version before each use.
Always execute scripts using an administrative account to ensure they run correctly.
Review and test the script in a dedicated test environment before deployment.
Run the script through the most recently updated anti-malware and security software.
Answer Description
Reviewing and testing script in a dedicated test environment is correct because it prevents the unintentional introduction of malware, bugs, accidental deletions, etc. onto live or production systems. Scripts should be thoroughly tested in an environment isolated from production to ensure they do not contain malicious code or unintended errors that could compromise system security or reliability. The other options are good ideas, but any time changes are introduced the code or application would need to be re-tested again. The final step before deploying to a production or live environment should be the testing/quality assurance stage in a dedicated non-production environment.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is a dedicated test environment important before deploying scripts?
What tools can be used to test scripts in a dedicated test environment?
What risks can occur if scripts are not tested in a dedicated environment?
When creating data backups the starting point for most backup strategies is usually what type of backup?
Incremental
Partial
Differential
Full
Answer Description
Full backups are the base for the other backup strategies. A full backup is performed then from there changes are backed up based on which strategy is being used.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a full backup in detail?
How does a differential backup work?
What are the advantages and disadvantages of incremental backups?
A user is experiencing intermittent system errors and instability after a recent software update. Before performing more invasive troubleshooting steps, which action is advisable to potentially resolve these issues?
Perform a system restore to a point before the update was installed.
Reformat the drive and reinstall the operating system.
End tasks in Task Manager that are not responding.
Use disk cleanup to remove temporary files that may be causing the problem.
Answer Description
Performing a system restore uses restore points to return the system to a previous state where it was functioning correctly. This is an effective troubleshooting step when new software installations or updates cause instability. A disk cleanup does not address software issues created by new updates or installations, while ending tasks would not resolve problems arising from a software update. Reformatting the drive is a very invasive procedure that should be the last resort, as it completely erases the system's data.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a system restore point?
Why is reformatting the drive not an ideal first step for troubleshooting?
How does disk cleanup differ from a system restore?
Which of the following statements about running 32-bit and 64-bit applications on Microsoft Windows operating systems is TRUE?
A 32-bit edition of Windows can execute 64-bit applications as long as the CPU supports 64-bit instructions.
A 64-bit edition of Windows can execute both 32-bit and 64-bit user-mode applications without modification.
Windows 64-bit editions cannot run 32-bit applications unless they are launched inside a virtual machine.
Any 64-bit application can load 32-bit drivers if they are digitally signed.
Answer Description
All 64-bit editions of Windows include the WOW64 compatibility layer, which lets them execute 32-bit (x86) user-mode applications transparently. The reverse is not true-32-bit Windows lacks the ability to load or execute 64-bit code-and 32-bit drivers cannot be loaded by a 64-bit OS. Therefore, only option 1 accurately describes the relationship; the other options incorrectly claim that 32-bit Windows can run 64-bit apps, that 64-bit Windows can load 32-bit drivers, or that virtualization is required for 32-bit apps on 64-bit Windows.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the WOW64 compatibility layer?
Why can't 32-bit Windows run 64-bit applications?
Can a 64-bit OS use 32-bit drivers?
Which description best fits the functionality of AirDrop?
A cross-platform technology for file sharing via Bluetooth.
A feature for transferring files directly between Apple devices using Bluetooth and Wi-Fi.
A tool to facilitate file transfers using Wi-Fi Direct between mobile devices.
An application for cloud-based file storage that can be accessed on different types of devices.
Answer Description
AirDrop is a service designed to enable users of Apple devices to share files wirelessly with nearby devices. This feature works by utilizing both Bluetooth to locate devices and Wi-Fi to transfer data, providing a convenient method for data exchange without the need for physical connections or other file-sharing applications. This distinct combination of Bluetooth and Wi-Fi specifically supports file sharing between Apple devices, making it unique from the other technologies listed, which do not simultaneously use both technologies or are not exclusive to Apple devices.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does Bluetooth and Wi-Fi work together in AirDrop?
Can AirDrop transfer files to non-Apple devices?
What makes AirDrop different from other file-sharing methods?
What is the primary role of the RTC in a computer system?
The RTC controls graphics rendering on the computer display.
The RTC regulates the speed of the computer's central processing unit (CPU).
The RTC ensures accurate timekeeping even when the computer is powered off.
The RTC manages network connectivity for real-time data transfer.
Answer Description
The Real-Time Clock (RTC) ensures the computer is able to keep time even when powered off, typically using a small battery like the CMOS battery.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the RTC battery, and why is it important?
How does the RTC differ from the system clock in an operating system?
How can you check if the RTC or CMOS battery is failing?
A user reports that their smartphone is unable to connect to any WiFi networks.
Which step should be taken first to address this issue?
Ensure WiFi is enabled on the device
Reset the network settings on the device
Update the mobile operating system
Confirm the network password is correct
Answer Description
Ensuring that the WiFi is enabled on the device is the most basic action to take when troubleshooting connectivity problems. It ensures that the device is capable of detecting available networks.
The other options involve more complicated settings that may not address a simple oversight of having the WiFi disabled.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How can I ensure WiFi is enabled on a smartphone?
What could cause WiFi to become disabled unexpectedly?
What other settings should I check if WiFi is enabled but still not connecting?
A user reports that they cannot access any websites on their computer. However, they confirm they can still access a shared network drive and print to the office's network printer. Which of the following is the MOST likely cause of this issue?
The computer's firewall is blocking all network traffic.
The connection to the internet is down.
The computer's network cable is faulty.
The user's account has incorrect permissions for the shared drive.
Answer Description
The correct answer is that the connection to the internet is down. The user can still access local resources, such as a shared network drive and a local printer, which indicates the Local Area Network (LAN) is functioning correctly. The inability to access websites points to a problem with the Wide Area Network (WAN) connection, which is provided by the Internet Service Provider (ISP). A faulty network cable would prevent both local and internet access. Incorrect user permissions would typically restrict access to specific resources, not the entire internet. The scenario states the user can print, so the printer is not offline.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between LAN and WAN?
What does an ISP do in terms of network connectivity?
How can you troubleshoot internet connectivity issues?
A user reports that their Windows system experiences frequent crashes and displays blue screens intermittently.
After confirming the hardware is functioning properly, which should be the next step to resolve the issue?
Replace the hard drive
Run a system file check
Reinstall the operating system
Uninstall the most recent application
Answer Description
Running a system file check is essential in this scenario because it can identify and repair corrupted system files that may be causing instability.
Other options such as uninstalling applications may help but may not address system file issues directly, which are often a root cause of instability.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a system file check and how does it work?
What causes system files to become corrupted?
What should you do if a system file check doesn't fix the issue?
During troubleshooting, a client angrily insists that their brand-new printer is faulty and demands an immediate replacement. You have verified that the printer is functional and that the real problem is an outdated printer driver. How should you respond to avoid being judgmental?
Empathize with the client's frustration, explain that the printer is functional but requires a driver update, and offer to perform the update.
Bluntly inform the client that the printer is not broken and they were mistaken about the issue.
Immediately comply with their demand for a replacement without explaining the actual issue.
Provide a detailed technical explanation of why the printer driver causes such issues and suggest they should keep up with updates.
Answer Description
The best response is to acknowledge the client's frustration, calmly explain that the printer itself is working but needs a driver update, and offer to perform that update. This shows empathy, avoids placing blame, and focuses on resolving the issue. Bluntly telling the client they are wrong can sound defensive; launching into a detailed technical lecture may feel condescending; replacing hardware without explanation wastes resources and fails to educate the user.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a printer driver, and why is it important?
How do you update a printer driver?
Why is it important to show empathy when troubleshooting with clients?
Which feature does BitLocker provide in Microsoft Windows?
Disk encryption
Application installation
Internet protection
Firewall settings
Answer Description
BitLocker provides disk encryption, which helps to protect data by encrypting the entire drive. This ensures that unauthorized users cannot access the data without the proper authorization. It is not related to internet protection, firewall settings, or application installations directly.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does BitLocker encryption work?
What is a Trusted Platform Module (TPM) and how does it relate to BitLocker?
What happens if a user forgets their BitLocker recovery key?
What is the primary advantage of performing an in-place upgrade to Windows 10 from an earlier version?
It offers better performance than a clean installation.
It requires a complete reinstallation of all applications and drivers.
It maintains user files and settings during the upgrade process.
It requires less time to complete than a recovery option.
Answer Description
An in-place upgrade allows users to retain their existing applications, settings, and files without needing to reinstall everything from scratch. This method is particularly beneficial for users who wish to update their operating system while maintaining continuity in their work environment.
Other options, such as a clean install, would erase existing data, necessitating backups and reinstallations, which is not required in an in-place upgrade scenario.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between an in-place upgrade and a clean install?
What should you check before performing an in-place upgrade?
Why might someone choose a clean install instead of an in-place upgrade?
A piece of recently installed software at Crucial Technologies was compromised. After doing research, it is discovered that the software was exploited before the vendor is aware of the vulnerability. What is this kind of attack called?
Insider threat
Zero-day attack
Dictionary attack
Brute-force attack
On-path attack
Answer Description
The answer is a zero-day attack. A zero-day attack is one that exploits a vulnerability before it is known and any mitigation attacks have been issued from the vendor. Insider threat is not a type of attack while the other choices aren’t attacking a vulnerability in the system.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a zero-day attack?
How do zero-day attacks differ from other types of attacks like brute-force or dictionary attacks?
How can organizations protect themselves from zero-day attacks?
An IT administrator at a company discovers that several company-owned smartphones have Developer mode enabled. The administrator needs to assess the situation. What is the initial step the administrator should take to address the issue?
Document which devices have Developer mode enabled and gather information on any unusual apps or modifications.
Run a security audit on all company-owned smartphones.
Check and perform all system updates for the affected smartphones.
Optimize the battery settings on the devices to prevent unauthorized access.
Answer Description
The correct answer is to document which devices have Developer mode enabled and gather information on any unusual apps or modifications. This step is crucial as it helps in creating a record of the situation and determines if further actions, such as disabling Developer mode or performing security checks, are necessary. Checking for system updates, although important, doesn't immediately address the risks posed by having Developer mode enabled. Running a security audit is a broader action which might follow documentation but is not the first step. Optimizing battery settings is unrelated to the security risk posed by Developer mode.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Developer mode on a smartphone?
Why is documenting devices with Developer mode enabled the initial step?
How does Developer mode increase security risks on company smartphones?
What is the purpose of having a rollback plan in change management?
To document the changes made for auditing purposes
To schedule future updates and changes in a system
To revert systems to their previous state if a change causes issues
To ensure all users are informed about the changes on the network
Answer Description
A rollback plan is essential as it provides a strategy for reverting to the previous state if a change causes issues. This ensures that systems can return to a functional state without prolonged downtime.
The other options do not capture this critical aspect of risk management during changes.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is a rollback plan critical in change management?
What are some examples of changes that might require a rollback plan?
How does a rollback plan differ from standard troubleshooting procedures?
You are assisting a user in trying to find a file in their C:\Users folder. You see that some of the folders appear differently than the others, appearing to be faded in, rather than full color. What do these icons refer to?
Cached folders.
Deleted items still utilizing resources.
Hidden Folders.
Folders currently backing up.
Answer Description
Folders that are grey and "ghosted" are hidden folders. These typically hold back-end information or files that the user does not need to access.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a hidden folder in Windows?
Why are some files and folders marked as hidden?
How can you view hidden folders in Windows?
An employee at a small business reports that their work computer has recently started displaying an unusually high number of advertisements while browsing websites, including secure business sites that typically do not display ads. What is the most likely cause of this issue?
Adware or a potentially unwanted application (PUA) has been installed
All browser extensions should be checked and potentially removed
Antivirus software on the system needs to be updated
The computer is using an outdated web browser
Answer Description
The presence of uncharacteristically high numbers of ads, especially on secure sites that are not known for aggressive advertising, strongly suggests the installation of adware or a potentially unwanted application (PUA). This often happens when software, often free versions, is installed from unverified sources or when misleading installation prompts trick a user into accepting additional bundled software. This software can manipulate browser behavior to display ads. Updating the antivirus software might help catch newer threats, but it addresses the symptoms rather than the source of the problem. Checking for browser extensions could reveal harmless extensions but might miss system-level adware.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How is adware different from a virus?
What are some common signs of adware infection?
How can users prevent adware from being installed?
A user has reported unusual behavior on their workstation, including files disappearing and unauthorized applications being installed.
What is the most likely cause of this situation?
A Trojan
Spyware
Ransomware
A worm
Answer Description
The symptoms described indicate that a Trojan may be the malware responsible for the issue. Trojans often masquerade as legitimate software to gain access to systems, allowing unauthorized behavior such as file manipulation and application installation.
Other options, such as ransomware, focus on encrypting data for ransom, and a worm replicates itself without needing user interaction, which does not align with the context provided.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Trojan and how does it work?
How is a Trojan different from other types of malware like worms or ransomware?
What are common signs of a Trojan infection on a workstation?
Woo!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.