CompTIA A+ Practice Test (220-1102)
Use the form below to configure your CompTIA A+ Practice Test (220-1102). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA A+ 220-1102 (V14) Information
CompTIA A+ Certification Overview
Exam Versions
The current versions of the CompTIA A+ certification exams are:
- 220-1101 (Core 1)
- 220-1102 (Core 2)
These versions were launched in April 2022 and are expected to retire approximately three years from their release date.
The A+ Certification Test
To earn the CompTIA A+ certification, candidates must pass two separate exams: 220-1101 and 220-1102. Each exam has a separate fee and can be taken in any order. Both exams must be completed before the retirement date and must be from the same set of objectives. The certification is valid for three years from the date of passing the exams.
Exam Details:
- Format: Computer-based tests
- Number of Questions: 90 questions per exam
- Time Limit: 90 minutes per exam
- Result Availability: Immediately after completion, following a short mandatory survey
CompTIA A+ 220-1102
The CompTIA A+ 220-1102 (Core 2) exam is an essential part of the A+ certification, focusing on the software and operational aspects of IT support. Launched in April 2022, this exam tests candidates on a variety of critical topics including operating systems, security, software troubleshooting, and operational procedures. The 220-1102 exam comprises 90 questions, featuring a mix of multiple-choice and performance-based questions that simulate real-world IT scenarios. With a 90-minute time limit, candidates must efficiently demonstrate their knowledge and problem-solving skills. The exam is designed to ensure that IT professionals are well-versed in managing and troubleshooting software issues, implementing security measures, and following best practices in IT operations. Successful completion of the 220-1102, alongside the 220-1101, certifies individuals for three years, highlighting their competence and readiness to handle diverse technical challenges in the IT field.
Exam Policies and Procedures
Candidates must agree to CompTIA's exam policies before starting the test. These policies include:
- No Mobile Phones/Devices: Must be left outside the exam room
- Question Review: Candidates can revisit and change answers before submitting the exam
- Submission: Unanswered questions are marked, and a final review is available before submission
Testing Centers
Since July 9, 2012, CompTIA exams are available exclusively through Pearson VUE testing centers. Candidates can book exams online, by phone, or at the testing center. Options include:
- In-Person Testing: At Pearson VUE testing centers
- Online Testing: Through Pearson VUE's online platform
Performance-Based Questions (PBQs)
The A+ exams include Performance-Based Questions (PBQs), which require candidates to perform specific tasks or solve problems in a simulated environment. These questions test real-world skills in areas like command prompts, Windows OS, and networking environments.
Continuing Education (CE) Program
Certifications with the +CE (Continuing Education) suffix, including A+, Network+, and Security+, must be renewed every three years. Renewal options include:
- Retaking the Exam: Passing the latest version of the exam
- Higher-Level Certification: Passing a higher-level CompTIA exam
- CE Program Requirements: Completing CE activities
Lifetime Certifications
Certifications earned on or before December 31, 2010, are valid for life. However, lifetime certifications are no longer available for new candidates.
More reading:
Free CompTIA A+ 220-1102 (V14) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 20
- Time: Unlimited
- Included Topics:Operating SystemsSecuritySoftware TroubleshootingOperational Procedures
This Microsoft Windows command line utility is a troubleshooting executable that combines the functions of 2 other network commands.
net use
netstat
winver
pathping
Answer Description
The windows command line utility, pathping combines the functions of the commands tracert and ping.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of the pathping command?
How does pathping differ from tracert?
What is the difference between ping and pathping?
A network administrator is planning to upgrade the company's email server software. Which of the following should be included in the change management request to accurately reflect the potential impact of this upgrade?
Number of emails sent per day
List of external email domains frequently contacted
Names of employees who send the most emails
List of all departments that use email services
Answer Description
The correct answer is 'List of all departments that use email services.' When upgrading a critical system like an email server, it's essential to identify and document all affected departments or users. This information helps in assessing the scope of the change, planning for potential disruptions, and ensuring proper communication with all stakeholders.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to document all departments that use email services during an upgrade?
What steps should be included in a change management request for upgrading an email server?
How does change management reduce risks during critical system upgrades?
An organization needs to deploy a Windows 10 operating system that will support joining a domain, using Remote Desktop Protocol (RDP) for remote management, and encrypting data with BitLocker. Which edition of Windows 10 is best suited for this organization's needs?
Windows 10 Pro
Windows 10 Home
Windows 10 Pro for Workstations
Windows 10 Enterprise
Answer Description
Windows 10 Pro, Enterprise, and Pro for Workstations editions all support joining a domain, using RDP, and BitLocker data encryption. However, the question asks for the 'best' edition considering the organization's needs. Among these editions, Windows 10 Pro is typically the most suitable choice for businesses that require these features without the additional advanced features (such as DirectAccess, AppLocker, etc.) and cost associated with the Enterprise edition. Windows 10 Home does not support these features, making it unsuitable for the described needs. Pro for Workstations offers additional support for high-end hardware which may be unnecessary for typical business deployments, so it's not the best fit if the organization doesn't have specialized hardware requirements.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Remote Desktop Protocol (RDP) and how does it work?
What is BitLocker and why does it matter for data encryption?
What is the difference between Windows 10 Pro and Enterprise editions?
In a small office/home office (SOHO) environment, the network administrator is configuring the office wireless router to secure the network against external threats. Which of the following actions would BEST increase the security of the network?
Disabling SSID broadcast
Changing the router's service set identifier (SSID)
Disabling UPnP on the router
Setting up port forwarding/mapping to unspecified services
Answer Description
Disabling Universal Plug and Play (UPnP) on a wireless router can significantly enhance the security of a network. UPnP can be exploited by malware to open ports without a user's knowledge, potentially allowing external threats to penetrate the network. Therefore, disabling it reduces the risks of such vulnerabilities. Changing the SSID does not inherently secure the network—this action just changes the network name. While disabling SSID broadcast may somewhat obscure the network from casual discovery, it is not a robust security measure as SSID can be discovered by more determined attackers using simple tools. Port forwarding/mapping is typically used to allow external devices to access services within the private network and is not a method to enhance network security.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is UPnP considered a security risk?
How does disabling SSID broadcast differ from other security measures?
When is port forwarding necessary, and why isn't it recommended for securing a network?
What is the 4th step of the seven-step malware removal process?
Enable System Restore and create a restore point (if Windows OS)
Remediate the infected systems
Update the Operating System and primary applications
Quarantine the infected system
Answer Description
The 7 steps of the malware removal process are:
- Identify and research malware symptoms
- Quarantine the infected systems
- Disable System Restore (if Windows OS)
- Remediate the infected systems
- Schedule scans and run updates,
- Enable System Restore and create a restore point (if Windows OS)
- Educate the end-user.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'Remediate the infected systems' involve in the malware removal process?
Why is disabling System Restore (step 3) necessary before remediating malware?
What tools are commonly used during remediation to remove malware?
A technician is performing system cleanup on a Windows server. They need to remove an empty directory named 'Temp_Logs' using the command line to keep the file structure tidy. Which of the following commands is the most appropriate for this task?
del
rmdir
move
chkdsk
Answer Description
rmdir - This is correct. The rmdir command (short for remove directory) is used in the Windows command line to delete a directory. It is specifically designed for this purpose and will successfully remove an empty directory.
del - This is incorrect. The del command is used to delete one or more files, not entire directories. Attempting to use it on a directory will result in an error.
move - This is incorrect. The move command is used to relocate or rename files and directories, but it does not delete them.
chkdsk - This is incorrect. The chkdsk (Check Disk) command is a utility used to scan for and repair file system errors on a disk drive. It does not remove directories.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does rmdir handle directories that are not empty?
What is the difference between del and rmdir commands?
When would you use chkdsk instead of rmdir?
What command in Linux is used to list the files and directories in the current working directory?
ls
Answer Description
On Linux and Unix systems the ls
commands lists the contents of the current directory. This includes both files and subdirectories by default.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between the 'ls' command and 'ls -a' in Linux?
How can you use the 'ls' command to display additional details about files and directories?
What is the significance of color coding in the output of the 'ls' command?
You are an email administrator for a large company. Recently a series of emails were sent from a user's email account that the user claims not to have sent. How should you proceed?
Disable the user account, reset the password and run an anti-malware scan on the user's PC
Disable the email and provide a new account to the user
Ask the user to please stop sending the emails
Tighten firewall restrictions to block the SMTP port (25)
Answer Description
You should assume the user's login and PC are compromised. Its possible that the PC has malware that was used to send the emails, steal the user's password or that only the account credentials were compromised and the PC is not infected. Until you can determine how the credentials were compromised, you should assume anything that belongs to the user is unsafe.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to disable the user's account immediately in this situation?
What is the role of running an anti-malware scan on the user's PC in this scenario?
Why is resetting the user's password not enough to resolve the issue?
A user reports that their PC is exhibiting signs of malware.
Which action should be taken first to effectively address the situation?
Restart the computer to clear out potential issues
Update all software to ensure the latest protections are in place
Quarantine the infected system
Remove any suspected infected files without assessing their importance
Answer Description
Quarantining the infected systems is essential because it prevents the malware from spreading to other devices or compromising additional data. By isolating the infected system, you can safely analyze and remediate the infection.
Restarting the computer may not specifically address the malware problem and could allow it to spread further. Removing suspected infected files without proper assessment can lead to loss of important data, while updating software does not directly address the immediate risk posed by the existing malware.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is quarantining the system the first step when dealing with malware?
How can malware spread if the infected system is not quarantined?
What tools or methods can be used to quarantine the infected system?
A technician is trying to setup a non-domain user account on a workstation, but receives the following error message "Password does not meet the complexity requirements." Which of the following utilities should the technician use to identify the criteria?
Performance Monitor
MSCONFIG
Local Security Policy
Users and Groups
Answer Description
Because this is a non-domain (local) user account the Local Security Policy is the cause of the issue. Accessing the policy to determine account requirements will solve the problem.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the Local Security Policy?
What are password complexity requirements?
How is the Local Security Policy different from Group Policy?
A user's Windows 10 laptop fails to boot. After POST, an error appears stating that Windows cannot start because critical system files (for example, winload.efi) are missing or corrupt. The user needs the computer back in service but must keep existing files and installed applications intact.
Which of the following actions would BEST resolve the issue?
Boot from Windows installation media and run Startup Repair
Perform an in-place repair installation of Windows using installation media
Boot to Windows Recovery Environment and run offline sfc /scannow
Reimage the workstation from a clean corporate image
Answer Description
Running an in-place repair installation (also called a repair upgrade) from Windows installation media reinstalls the core Windows files, boot components, and registry hives while offering the option Keep personal files and apps. Selecting this option replaces the missing or corrupted system files yet leaves the user's data, applications, and settings untouched, restoring the computer to a bootable, functional state.
Startup Repair or SFC can sometimes fix boot problems, but either may fail if multiple protected files are gone. Re-imaging would certainly work but would wipe applications, causing additional downtime.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an in-place repair installation?
What does the file winload.efi do, and why is it important?
How does Startup Repair differ from an in-place repair installation?
What does the /R switch of the CHKDSK utility do on Disk Operating System (DOS), OS/2, or windows systems?
Displays cleanup messages
Locates bad sectors and recovers readable information
Displays the full path and name of every file on the disk
Uses more system resource to perform a scan as fast as possible
Answer Description
The /r switch will locate bad sectors and recover the information it can from the drive.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a bad sector on a hard drive?
How does CHKDSK recover data from bad sectors?
What is the difference between the /F and /R switches in CHKDSK?
A user reports that their mobile device is unable to establish a connection with a payment terminal despite being close enough.
What is the most effective troubleshooting step to resolve this issue?
Check if NFC is enabled in the device settings
Inspect the payment terminal for hardware issues
Ensure the device's screen is turned on
Restart the mobile device to refresh connections
Answer Description
Verifying that NFC is enabled on the device is crucial because if NFC is turned off, the device cannot communicate with nearby NFC-enabled devices.
Other options, like ensuring the screen is on or restarting the device, are also valid troubleshooting steps, but they do not address the fundamental issue of whether the feature is active. Ensuring the option is turned on is typically the first step in resolving connectivity issues in this scenario.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is NFC, and how does it work?
What other mobile features rely on NFC?
How can I enable NFC on my mobile device?
Your boss has requested that you image a large number of Windows PC's for a new office. The image is standard for all PC's. You know that _________ is the best choice for imaging many clients at once.
PXE
DVD
Floppy Disk
USB
Answer Description
Preboot Execution Environment, or PXE, allows you to image PC's from a central server containing a client image.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is PXE?
Why is PXE better than using USB or DVDs for imaging?
What is required to set up PXE imaging?
In an office environment, an IT technician discovers a workstation showing signs of a malware infection. What is the FIRST step the technician should take to prevent the spread of the infection to other network resources?
Notify the company's security team
Disconnect the workstation from the network
Run an antivirus scan
Begin documenting the incident
Answer Description
Isolating the affected workstation from the network by disconnecting it or isolating its network access is crucial as this stops the malware from spreading to other systems and allows the technician to safely analyze and mitigate the infection. While informing the security team or documenting the incident are important steps, they do not prevent the malware from potentially spreading to other networked systems. Running antivirus scans should occur after the system has been isolated to prevent interference or additional spreading during the scan process.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is disconnecting the workstation from the network the first step when malware is detected?
How does malware spread across a network?
What tools or techniques can be used to analyze a malware-infected system after it’s isolated?
A technician powers on a Windows 10 laptop and immediately receives the error message "Operating system not found." Which of the following is the MOST likely cause of this startup error?
The video driver is corrupt, preventing the Windows GUI from loading.
The CMOS battery is depleted, causing the system clock to reset.
The BIOS/UEFI boot order lists a device without an OS ahead of the internal drive.
The Windows print spooler service is set to Manual startup.
Answer Description
The message usually appears when the firmware cannot find a bootable operating system on the device at the top of its boot list. If the BIOS/UEFI boot order is set to start from a USB stick or network device that does not contain Windows, or if the internal drive is listed after those devices, the firmware will fail to load the OS and display the error. Correcting the boot sequence so that the internal SSD/HDD is first typically resolves the problem. The other options do not prevent the firmware from locating boot files during the POST phase.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is BIOS/UEFI and how do they impact boot order?
How can a technician change the boot order in BIOS/UEFI?
What happens during the POST phase of startup?
A junior IT technician is tasked with creating a cross-platform script to gather system information, perform automated backups, and initiate updates on both Windows and Linux machines in a mixed environment. Which scripting language would be the most versatile and efficient choice for this complex task?
.bat
.sh
.py
.js
Answer Description
The correct answer is Python (.py
). Python is a versatile, cross-platform scripting language that can effectively handle complex tasks on both Windows and Linux systems.
Python offers several advantages for this scenario:
- Cross-platform compatibility: Python scripts can run on both Windows and Linux with minimal modifications.
- Rich library ecosystem: Python has extensive libraries for system information gathering, file operations (for backups), and executing system commands (for updates).
- Ease of use: Python's syntax is relatively easy to learn and maintain, which is beneficial for a junior technician.
- Powerful capabilities: Python can handle complex operations required for system information gathering, backups, and updates.
While .bat
files are useful for Windows automation, they are not cross-platform. .sh
scripts are primarily for Unix-like systems and wouldn't work natively on Windows. .js
(JavaScript) could potentially be used with Node.js, but it's not as commonly used for system-level tasks and may require additional setup.
Python's versatility makes it the ideal choice for creating a single script that can perform complex, cross-platform tasks efficiently.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is Python considered cross-platform and how does it achieve this?
What Python libraries are most commonly used for system information gathering and backups?
What are some specific challenges when writing cross-platform Python scripts, and how can they be mitigated?
An unknown device has been found on a SOHO wireless router. Which of the following is BEST to perform to keep this device off the network?
Disable SSID broadcast
Enable MAC filtering
Change the channel
Disable DHCP
Answer Description
Configuring MAC Filtering will only allow approved MAC Addresses to connect to the router. This is the BEST option of those given, CompTIA questions are often worded like this. In reality the best option would be to change the WiFi password and verify the encryption settings first, but this was not an option.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is MAC filtering and how does it secure a network?
Why isn’t disabling SSID broadcast sufficient for network security?
Why is changing the Wi-Fi password and encryption settings the more secure option?
Which backup type is typically used when the advantage of faster backups is desired?
Differential
Synthetic
Incremental
Full
Answer Description
When incremental backups are used changes are saved in increments. After the full backup, subsequent backups only include the changes since the last incremental backup. This makes backups smaller and faster.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why are incremental backups faster than full backups?
What is the difference between incremental and differential backups?
What role does a full backup play in an incremental backup system?
Which of the following options can be used to restrict what devices can be physically connected to a network based on a MAC address?
Port security
Access Control Lists
Firewall
Switch filtering
Answer Description
Port Security also known as MAC Filtering is used to restrict which devices can physically connect to the network. This is done by whitelisting which MAC addresses (the physical address of a Networking Interface Card (NIC) are permitted on the network. It is most commonly done where a network port like an RJ-45 is publicly accessible like in an office waiting area.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a MAC address?
How does port security work on a switch?
What is the difference between Port Security and an Access Control List (ACL)?
Cool beans!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.