CompTIA A+ Practice Test (220-1102)
Use the form below to configure your CompTIA A+ Practice Test (220-1102). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA A+ 220-1102 Information
CompTIA A+ Certification Overview
Exam Versions
The current versions of the CompTIA A+ certification exams are:
- 220-1101 (Core 1)
- 220-1102 (Core 2)
These versions were launched in April 2022 and are expected to retire approximately three years from their release date.
The A+ Certification Test
To earn the CompTIA A+ certification, candidates must pass two separate exams: 220-1101 and 220-1102. Each exam has a separate fee and can be taken in any order. Both exams must be completed before the retirement date and must be from the same set of objectives. The certification is valid for three years from the date of passing the exams.
Exam Details:
- Format: Computer-based tests
- Number of Questions: 90 questions per exam
- Time Limit: 90 minutes per exam
- Result Availability: Immediately after completion, following a short mandatory survey
CompTIA A+ 220-1102
The CompTIA A+ 220-1102 (Core 2) exam is an essential part of the A+ certification, focusing on the software and operational aspects of IT support. Launched in April 2022, this exam tests candidates on a variety of critical topics including operating systems, security, software troubleshooting, and operational procedures. The 220-1102 exam comprises 90 questions, featuring a mix of multiple-choice and performance-based questions that simulate real-world IT scenarios. With a 90-minute time limit, candidates must efficiently demonstrate their knowledge and problem-solving skills. The exam is designed to ensure that IT professionals are well-versed in managing and troubleshooting software issues, implementing security measures, and following best practices in IT operations. Successful completion of the 220-1102, alongside the 220-1101, certifies individuals for three years, highlighting their competence and readiness to handle diverse technical challenges in the IT field.
Exam Policies and Procedures
Candidates must agree to CompTIA's exam policies before starting the test. These policies include:
- No Mobile Phones/Devices: Must be left outside the exam room
- Question Review: Candidates can revisit and change answers before submitting the exam
- Submission: Unanswered questions are marked, and a final review is available before submission
Testing Centers
Since July 9, 2012, CompTIA exams are available exclusively through Pearson VUE testing centers. Candidates can book exams online, by phone, or at the testing center. Options include:
- In-Person Testing: At Pearson VUE testing centers
- Online Testing: Through Pearson VUE's online platform
Performance-Based Questions (PBQs)
The A+ exams include Performance-Based Questions (PBQs), which require candidates to perform specific tasks or solve problems in a simulated environment. These questions test real-world skills in areas like command prompts, Windows OS, and networking environments.
Continuing Education (CE) Program
Certifications with the +CE (Continuing Education) suffix, including A+, Network+, and Security+, must be renewed every three years. Renewal options include:
- Retaking the Exam: Passing the latest version of the exam
- Higher-Level Certification: Passing a higher-level CompTIA exam
- CE Program Requirements: Completing CE activities
Lifetime Certifications
Certifications earned on or before December 31, 2010, are valid for life. However, lifetime certifications are no longer available for new candidates.
More reading:
Scroll down to see your responses and detailed results
Free CompTIA A+ 220-1102 Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Operating SystemsSecuritySoftware TroubleshootingOperational Procedures
This Windows utility scans for corrupted system files and fixes them as needed.
System restore
SFC
Windows repair
NFC
Answer Description
System file checker (SFC) differs from Windows repair in that it can be used to fix certain system files.It can perform a scan to find corrupted files and fix those that need to be repaired. Windows repair replaces all system files.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does SFC stand for and how does it work?
How does SFC differ from Windows Repair?
How can I run the System File Checker in Windows?
Which feature does BitLocker provide in Microsoft Windows?
Application installation
Disk encryption
Internet protection
Firewall settings
Answer Description
BitLocker provides disk encryption, which helps to protect data by encrypting the entire drive. This ensures that unauthorized users cannot access the data without the proper authorization. It is not related to internet protection, firewall settings, or application installations directly.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is disk encryption and how does BitLocker implement it?
What are the benefits of using BitLocker for disk encryption?
What is the difference between BitLocker and other types of encryption software?
A company performs a full backup of their servers every Sunday night. On Monday, a differential backup is performed. If the server crashes on Thursday morning, which backups will be required to restore the server to the most recent state?
All incremental backups performed since Monday
The full backup from Sunday and the differential backup from Wednesday
The full backup from Sunday and the differential backup from Monday
The full backup from Sunday and all incremental backups performed since then
Answer Description
To restore the server to its most recent state after a crash on Thursday morning, you need the full backup from Sunday and the differential backup from Monday. Differential backups capture all changes since the last full backup, so the Monday differential includes all changes made up to and including Monday.
The full backup from Sunday and the differential backup from Wednesday is incorrect, as the question states the available backups are from Sunday and Monday, not Wednesday.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between a full backup and a differential backup?
How does restoring data from a differential backup work?
Why is it important to know the backup schedule?
A new graphic design application has been released and your company is interested in deploying it to the designers' workstations. As the IT administrator, you must ensure each system meets the minimum requirements for installation. One requirement states the application needs a dedicated graphics card with at least 2GB of VRAM. The designers' workstations currently have integrated graphics. Which of the following is the most appropriate course of action?
Increase the system memory (RAM) to improve the performance of the integrated graphics.
Upgrade the workstations with dedicated graphics cards that have at least 2GB of VRAM.
Perform a clean OS installation to ensure that the integrated graphics will meet the application's requirements.
Install the application on the current workstations without changes, as integrated graphics will automatically allocate the required VRAM.
Answer Description
Upgrading the workstations with dedicated graphics cards that have at least 2GB of VRAM is necessary to meet the application's system requirement for graphic performance. Integrated graphics share memory with the CPU and typically do not provide the same level of performance as a dedicated graphics card, which has its own memory (VRAM).
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is VRAM and why is it important for graphic design applications?
What are the differences between integrated graphics and dedicated graphics cards?
What steps should I take to upgrade workstations for a new graphics application?
A customer reports that their workstation has become extremely slow and they suspect it might be infected with malware. You have scheduled a maintenance session and are going to use a set of tools to diagnose and address the issue. Besides running an antivirus scan, which one of the following options is a recommended method in ensuring further protection against malware?
Disable the antivirus software temporarily to eliminate potential conflicts.
Restore the workstation from a known good backup before performing any scans.
Completely reinstall the operating system to guarantee the removal of any infections.
Ensure the antivirus definitions are up to date before proceeding with a full system scan.
Answer Description
Ensuring the antivirus definitions are up to date is critical because new malware variants are constantly being created, and up-to-date definitions are required to identify and remove them. Running a scan without updated definitions might not catch the latest threats. Restoring to a known good backup does not prevent future infections and might reintroduce the same malware if the backup is compromised. Disabling the antivirus might be performed during troubleshooting but is not a preventive measure. Completely reinstalling the operating system would eliminate current malware but does not prevent future infections and is an extreme measure that should only be taken if all other options fail.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to keep antivirus definitions up to date?
What steps should I take if my antivirus software detects malware?
What is the difference between a system restore and a full system backup?
A computer that displays a blue screen with error messages is exhibiting a common symptom of system instability.
False
True
Answer Description
This statement is True.
This is because a blue screen of death (BSOD) is a well-known indicator of critical problems within the Windows operating system, often caused by hardware or driver issues. Sluggish performance may also occur but does not specifically correlate to the extreme error that a BSOD represents.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What causes a Blue Screen of Death (BSOD)?
What should I do if I encounter a BSOD?
What is the significance of the error codes displayed on a BSOD?
What is the primary purpose of using the command-line utility 'robocopy' on a Windows system?
To check the integrity and location of files on the system
Robocopy is a Linux/Unix command and not a Windows command
To copy files and directories from one location to another with advanced options
To defragment the hard drive
To utilize the Robotic Process Automation (RPA) features of Windows 11 Enterprise
To rename a batch of files within a directory
Answer Description
The correct answer is 'To copy files and directories from one location to another with advanced options'. Robocopy, short for 'Robust File Copy', is designed to handle file replication with several options like copying file permissions, attributes, and mirroring directory structures, which makes it more capable than simple copy commands.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some advanced options available in Robocopy?
How does Robocopy differ from the standard copy command in Windows?
Can Robocopy be used for backup purposes?
What is the primary role of the RTC in a computer system?
The RTC controls graphics rendering on the computer display.
The RTC ensures accurate timekeeping even when the computer is powered off.
The RTC regulates the speed of the computer's central processing unit (CPU).
The RTC manages network connectivity for real-time data transfer.
Answer Description
The Real-Time Clock (RTC) ensures the computer is able to keep time even when powered off, typically using a small battery like the CMOS battery.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Real-Time Clock (RTC)?
How does the RTC keep time when the computer is off?
What is a CMOS battery and why is it important for the RTC?
A user needs to determine their system’s current IP address settings, including the subnet mask and default gateway.
Which command should the user execute in the command prompt?
tracert
ping
netstat
ipconfig
Answer Description
The correct command for displaying IP configuration details, including the subnet mask and default gateway, is 'ipconfig'. This command provides essential network information for troubleshooting and configuration.
The other options, while related to networking, do not provide the specific details required for this task. For instance, 'ping' tests connectivity to another device but doesn't display IP settings, and 'netstat' shows active connections, which is unrelated to retrieving IP configuration.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does the command 'ipconfig' show?
What are subnet masks, and why are they important?
How can I use the information from 'ipconfig' for troubleshooting?
Which of the follow data regulations applies when operating in the European Union (EU)?
PCI
GDPR
CCPA
HIPAA
PII
Answer Description
General Data Protection Regulation (GDPR) is a governmental regulation that applies to companies that conduct business in the European Union.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is GDPR and why is it important?
What does PII stand for and how does it relate to GDPR?
How do GDPR and CCPA differ?
Which method allows for controlling user access to resources based on the minimum necessary permissions?
Password policy enforcement
Principle of least privilege
Access control list (ACL) management
Role-based access control (RBAC)
Answer Description
The principle of least privilege ensures that users have only the permissions they need to complete their tasks, reducing the risk of accidental or intentional misuse of resources.
Other options involve more general access controls, which do not focus on minimizing permissions.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the principle of least privilege?
How is the principle of least privilege implemented in organizations?
What are some risks of not following the principle of least privilege?
A user can utilize the net use command to connect to shared network resources by mapping them to a local drive letter.
False
True
Answer Description
This statement is True.
The net use command is used to connect to shared network resources, such as shared folders or printers, by mapping them to a local drive letter. This allows the user to access the resource as if it were a local drive.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the syntax for the net use command?
What are some common issues with using the net use command?
Can I use the net use command to disconnect from a mapped drive?
What are the potential risks associated with enabling developer mode on a mobile device?
It improves the device's battery efficiency
It restricts user access to application installation
It allows access to advanced settings that can compromise security
It enhances the encryption level of the device
Answer Description
Enabling developer mode on a mobile device can expose the device to security risks because it allows the user to access advanced development-related settings that can alter the device's functionality. These settings, if misconfigured, can make the device vulnerable to malicious attacks or unintentionally introduce security weaknesses.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some specific advanced settings accessible in developer mode?
How can enabling developer mode compromise a device's security?
Are there any best practices for using developer mode safely?
You have received an RFC to install a patch onto a Linux server during the next maintenance period. Which of the following CR documents would tell you the reason for the change?
Scope
Eligibility Criteria
Risks
Procedures
Pros and Cons
Purpose
Answer Description
The purpose document should describe why the change is needed and has been requested, for example to patch a known security vulnerability or to fix a bug or issue.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does RFC stand for and why is it important?
What is a change request (CR) document?
What are common reasons for installing patches on a server?
An employee reports that they suddenly cannot access the network on their company laptop while other colleagues have no such issues. You verify the laptop's physical connections and confirm that Wi-Fi is enabled. What should be your next step in troubleshooting this issue?
Check the device's IP configuration.
Ensure the device's Wi-Fi switch is on.
Verify if Bluetooth is enabled, as it can interfere with Wi-Fi.
Check for network security certificate expiration.
Answer Description
Checking the IP configuration is important because resolving an IP address conflict or ensuring correct settings is crucial for network access. Invalid or conflicting IP configurations can prevent a device from accessing the network. The other options are less immediate in tackling network access issues directly, as certificate problems usually affect specific services and the laptop already has Wi-Fi enabled.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is IP configuration?
What is an IP address conflict?
How do I check a device's IP configuration?
Nice!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.