CompTIA A+ Practice Test (220-1102)
Use the form below to configure your CompTIA A+ Practice Test (220-1102). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-90 questions and set a time limit.

CompTIA A+ 220-1102 Information
CompTIA A+ Certification Overview
Exam Versions
The current versions of the CompTIA A+ certification exams are:
- 220-1101 (Core 1)
- 220-1102 (Core 2)
These versions were launched in April 2022 and are expected to retire approximately three years from their release date.
The A+ Certification Test
To earn the CompTIA A+ certification, candidates must pass two separate exams: 220-1101 and 220-1102. Each exam has a separate fee and can be taken in any order. Both exams must be completed before the retirement date and must be from the same set of objectives. The certification is valid for three years from the date of passing the exams.
Exam Details:
- Format: Computer-based tests
- Number of Questions: 90 questions per exam
- Time Limit: 90 minutes per exam
- Result Availability: Immediately after completion, following a short mandatory survey
CompTIA A+ 220-1102
The CompTIA A+ 220-1102 (Core 2) exam is an essential part of the A+ certification, focusing on the software and operational aspects of IT support. Launched in April 2022, this exam tests candidates on a variety of critical topics including operating systems, security, software troubleshooting, and operational procedures. The 220-1102 exam comprises 90 questions, featuring a mix of multiple-choice and performance-based questions that simulate real-world IT scenarios. With a 90-minute time limit, candidates must efficiently demonstrate their knowledge and problem-solving skills. The exam is designed to ensure that IT professionals are well-versed in managing and troubleshooting software issues, implementing security measures, and following best practices in IT operations. Successful completion of the 220-1102, alongside the 220-1101, certifies individuals for three years, highlighting their competence and readiness to handle diverse technical challenges in the IT field.
Exam Policies and Procedures
Candidates must agree to CompTIA's exam policies before starting the test. These policies include:
- No Mobile Phones/Devices: Must be left outside the exam room
- Question Review: Candidates can revisit and change answers before submitting the exam
- Submission: Unanswered questions are marked, and a final review is available before submission
Testing Centers
Since July 9, 2012, CompTIA exams are available exclusively through Pearson VUE testing centers. Candidates can book exams online, by phone, or at the testing center. Options include:
- In-Person Testing: At Pearson VUE testing centers
- Online Testing: Through Pearson VUE's online platform
Performance-Based Questions (PBQs)
The A+ exams include Performance-Based Questions (PBQs), which require candidates to perform specific tasks or solve problems in a simulated environment. These questions test real-world skills in areas like command prompts, Windows OS, and networking environments.
Continuing Education (CE) Program
Certifications with the +CE (Continuing Education) suffix, including A+, Network+, and Security+, must be renewed every three years. Renewal options include:
- Retaking the Exam: Passing the latest version of the exam
- Higher-Level Certification: Passing a higher-level CompTIA exam
- CE Program Requirements: Completing CE activities
Lifetime Certifications
Certifications earned on or before December 31, 2010, are valid for life. However, lifetime certifications are no longer available for new candidates.
More reading:
Scroll down to see your responses and detailed results
Free CompTIA A+ 220-1102 Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Operating SystemsSecuritySoftware TroubleshootingOperational Procedures
What is the primary cause of time drift in a computer system?
Too many applications running simultaneously
Inaccurate hardware clock adjustments
Frequent updates to the operating system
Defective power supply units
Answer Description
Inaccurate hardware clock adjustments - This is correct. Time drift occurs when the system's hardware clock (often a real-time clock or RTC) becomes inaccurate due to factors such as crystal oscillator imperfections, temperature variations, or aging components. This results in the system time gradually drifting away from the accurate time.
Frequent updates to the operating system - Operating system updates typically do not affect the system clock and are not a cause of time drift.
Defective power supply units - A defective power supply can cause other hardware issues, but it is not a primary cause of time drift. The RTC is usually powered by a small battery independent of the main power supply.
Too many applications running simultaneously - Running multiple applications can impact system performance, but it does not cause time drift, which is related to hardware clock accuracy.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a hardware clock and how does it work?
How do temperature variations affect the hardware clock?
What are some ways to correct time drift in a computer system?
As a technician, you are tasked with creating a script to automate the backup process of company data. To maintain system security, what is the BEST next step to follow immediately before deploying the script across the company network?
Review and test the script in a dedicated test environment before deployment.
Regularly update the script to the latest version before each use.
Run the script through the most recently updated anti-malware and security software.
Always execute scripts using an administrative account to ensure they run correctly.
Answer Description
Reviewing and testing script in a dedicated test environment is correct because it prevents the unintentional introduction of malware, bugs, accidental deletions, etc. onto live or production systems. Scripts should be thoroughly tested in an environment isolated from production to ensure they do not contain malicious code or unintended errors that could compromise system security or reliability. The other options are good ideas, but any time changes are introduced the code or application would need to be re-tested again. The final step before deploying to a production or live environment should be the testing/quality assurance stage in a dedicated non-production environment.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to test scripts in a dedicated test environment?
What are some common issues that can arise if a script is not properly tested?
What does a quality assurance process typically involve when testing scripts?
What is the primary purpose of utilizing a Virtual Private Network (VPN) when establishing remote access to a corporate network?
To allow the user direct access to the Internet without using a web browser
To increase the speed of the Internet connection
To create a secure, encrypted connection over the Internet
To change the user's IP address to that of the corporate network
Answer Description
A VPN allows the creation of a secure connection to another network over the Internet. It encapsulates and encrypts Internet traffic and data to provide privacy and data integrity, essential when connecting to a corporate network remotely. This ensures that sensitive information is not easily intercepted or compromised by unauthorized parties.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does it mean for a VPN to 'encrypt' data?
What protocols are commonly used by VPNs?
Why is it important to maintain 'data integrity' when using a VPN?
An office of 25 computers is interested in employing a file server, network shares, and print server functionality. Which of the following network setups would be BEST suited for this situation?
Workgroup
Domain
Token ring
Ad-hoc
Answer Description
Only a domain will give you a centralized, controlled network and allow for file servers, print servers, and network shares. These are possible in a workgroup, but will not provide the network control that a business would require.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a domain in networking?
How does a workgroup differ from a domain?
What are the benefits of having a file server in a domain?
You are setting up a home office network and want to prevent unauthorized devices from connecting to your wireless network. What is one of the first steps you should take in the router settings?
Enable IP filtering
Change the default password
Turn off Universal Plug and Play (UPnP)
Disable SSID broadcast
Answer Description
Changing the default password is crucial because default passwords are well-known and easily exploited by unauthorized users. IP filtering prevents unauthorized devices by allowing only specified IP addresses. Disabling SSID broadcast does not prevent connection if the network name is known. Universal Plug and Play (UPnP) settings are more relevant to device communication within the network than to preventing unauthorized access.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to change the default password on a router?
What are some tips for creating a strong router password?
What are common consequences of not securing a wireless network?
Which of the following Windows System Power States saves the contents of memory to a file on the PC's hard drive?
Stand By
Wake on Lan
Sleep
Hibernation
Answer Description
Sleep, Hibernation, and Stand By are the only true System Power States. Of the three, only hibernation provides no power to memory, and saves memory contents to the hard drive to be loaded back into memory when the computer wakes up.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between Sleep and Hibernation?
How does Hibernation work in Windows?
What are the advantages of using Hibernation?
In the context of logical security, what does MDM stand for?
Master Data Management
Meta Data Management
Mobile Device Management
Malware Detection Microprocessor
Answer Description
Mobile Device Management (MDM) software is used to manage groups of mobile devices like smartphones and tablets. Because these devices run different operating systems than their PC counterparts, are often used by employees at home or on public wireless networks and can download applications from app stores, special management software is needed to ensure their security.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the main functions of Mobile Device Management (MDM) software?
How does MDM differ from traditional IT management tools?
What types of security policies can be enforced using MDM?
An access control system that utilizes key fobs should be capable of tracking the time and location of entries made by users.
True
False
Answer Description
This statement is True.
Modern access control systems that utilize key fobs often include tracking and logging features. These systems can:
Record entry times: Track when a key fob is used to gain access to a specific location.
Log location details: Maintain records of which doors or access points were accessed using the key fob.
Enhance security and auditing: Provide a detailed log of user activity, which can be used for auditing purposes, detecting unauthorized access attempts, or responding to security incidents.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How do key fob access control systems track entries?
What types of information can be logged by an access control system?
Why is auditing important in access control systems?
A company wants to deploy a new accounting software across its network. Which of the following is the BEST method to ensure that the installation process does not disrupt ongoing operations and can be repeated across multiple machines?
Purchase physical media and distribute it to each department for local installation.
Manually install the software on each machine during non-business hours.
Use Active Directory Group Policy for automated software deployment.
Permit each user to download and install the software from the vendor's website.
Answer Description
Utilizing Active Directory Group Policy allows the IT department to automate the installation of the software across multiple machines seamlessly. This method ensures that all installations are uniform and reduces the chances of user error. Manual installations and individual user installations are prone to errors and inconsistencies. Purchasing physical media unnecessarily complicates the process and can lead to inconsistencies.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Active Directory Group Policy and how does it work?
What are the advantages of automated software deployment over manual installation?
What are the risks associated with manual software installation?
An employee reports that several important documents have been renamed and some applications are failing to open, which is affecting productivity. What is the most appropriate initial step to address these symptoms?
Perform a System Restore to a previous point
Contact IT support without taking any immediate action
Check for recent system updates and uninstall them
Scan the system with updated antivirus software
Answer Description
Scanning the system with updated antivirus software is the correct initial step in this scenario. It allows for the detection and mitigation of any malware which might be responsible for renaming files or disrupting application functionality. Updating the antivirus ensures the latest threats can be recognized. Alternatively, contacting IT support or checking recent system updates might not directly address the possible presence of malware, which is suggested by the symptoms described. System Restore could revert important updates or changes and should only be used when other steps to address potential malware have been exhausted.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is scanning with updated antivirus software important in this situation?
What types of malware could cause files to be renamed or applications to fail?
What should I do after scanning with antivirus software?
A user reports that their computer is experiencing slow performance and frequent crashes. You suspect malware infection.
Which tool should you utilize first to address this issue?
OS reinstallation
Recovery mode
Antivirus software
Software firewall
Answer Description
Using antivirus software is appropriate here as it can actively scan for known malware signatures and remove any detected threats.
In contrast, recovery mode often fixes system issues but may not specifically address malware. A software firewall can help prevent malware infections but does not remove them once they are present, and an OS reinstall is more drastic and time-consuming without first attempting removal via antivirus.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is malware and how does it affect my computer?
How does antivirus software work to detect and remove malware?
What signs might indicate a malware infection on my computer?
A rollback plan is a component that should be documented to ensure that changes can be reverted if necessary.
False
True
Answer Description
This statement is True.
Documenting a rollback plan is critical as it provides a predefined procedure to restore systems to their previous state in case of an unsuccessful change. This ensures business continuity and reduces potential downtime.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a rollback plan?
Why is documenting a rollback plan important?
What are the potential consequences of not having a rollback plan?
Which of the following best describes "shoulder surfing"?
Using software to record keystrokes on a user's device.
Phishing for information by sending fake emails to users.
Observing someone's screen or keyboard to gather sensitive information without their knowledge.
Installing malware to remotely control another user's device.
Answer Description
Shoulder surfing is a social engineering method where an attacker physically observes someone’s screen or keyboard to steal sensitive information, like passwords or PINs, without their knowledge. This technique relies on being close to the target, often in public spaces, to view confidential details.
Incorrect Answers: Keylogging involves tracking keystrokes through software or hardware to capture information, unlike shoulder surfing, which requires direct observation. Installing malware to remotely control another person’s device is a form of cyberattack that doesn’t need the attacker to be physically near the victim. Phishing uses deceptive emails or messages to trick users into providing sensitive information and does not involve observing the user in person.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a shoulder surfer?
What other methods can I use to protect my screen in public?
Why is it important to maintain screen privacy?
Which document specifies the rules and guidelines that employees must follow to ensure the appropriate use of organizational resources and compliance with legal standards?
Acceptable Use Policy
Network topology diagram
Knowledge base article
Incident report
Answer Description
An Acceptable Use Policy (AUP) defines the rules and guidelines for the proper use of an organization's resources, ensuring that employees comply with legal and regulatory standards. Other documents like network topology diagrams or incident reports do not specifically address user behavior and compliance.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Acceptable Use Policy (AUP)?
Why is an Acceptable Use Policy important for organizations?
What types of violations are typically addressed in an Acceptable Use Policy?
Your company wants you to setup a data rotation scheme to minimize how much media is needed. You choose to utilize a scheme where three backup cycles are used. Which rotation scheme are you using?
3-2-1
GFS
Tower of Hanoi
FIFO
Answer Description
A grandfather-father-son (GFS) backup rotation scheme uses three or more backup cycles such as daily, weekly and monthly.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the Grandfather-Father-Son (GFS) backup scheme?
Why is it important to have a backup rotation scheme?
What are the differences between GFS and other backup rotation schemes?
That's It!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.