CompTIA A+ Practice Test (220-1102)
Use the form below to configure your CompTIA A+ Practice Test (220-1102). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-90 questions and set a time limit.
CompTIA A+ 220-1102 Information
CompTIA A+ Certification Overview
Exam Versions
The current versions of the CompTIA A+ certification exams are:
- 220-1101 (Core 1)
- 220-1102 (Core 2)
These versions were launched in April 2022 and are expected to retire approximately three years from their release date.
The A+ Certification Test
To earn the CompTIA A+ certification, candidates must pass two separate exams: 220-1101 and 220-1102. Each exam has a separate fee and can be taken in any order. Both exams must be completed before the retirement date and must be from the same set of objectives. The certification is valid for three years from the date of passing the exams.
Exam Details:
- Format: Computer-based tests
- Number of Questions: 90 questions per exam
- Time Limit: 90 minutes per exam
- Result Availability: Immediately after completion, following a short mandatory survey
CompTIA A+ 220-1102
The CompTIA A+ 220-1102 (Core 2) exam is an essential part of the A+ certification, focusing on the software and operational aspects of IT support. Launched in April 2022, this exam tests candidates on a variety of critical topics including operating systems, security, software troubleshooting, and operational procedures. The 220-1102 exam comprises 90 questions, featuring a mix of multiple-choice and performance-based questions that simulate real-world IT scenarios. With a 90-minute time limit, candidates must efficiently demonstrate their knowledge and problem-solving skills. The exam is designed to ensure that IT professionals are well-versed in managing and troubleshooting software issues, implementing security measures, and following best practices in IT operations. Successful completion of the 220-1102, alongside the 220-1101, certifies individuals for three years, highlighting their competence and readiness to handle diverse technical challenges in the IT field.
Exam Policies and Procedures
Candidates must agree to CompTIA's exam policies before starting the test. These policies include:
- No Mobile Phones/Devices: Must be left outside the exam room
- Question Review: Candidates can revisit and change answers before submitting the exam
- Submission: Unanswered questions are marked, and a final review is available before submission
Testing Centers
Since July 9, 2012, CompTIA exams are available exclusively through Pearson VUE testing centers. Candidates can book exams online, by phone, or at the testing center. Options include:
- In-Person Testing: At Pearson VUE testing centers
- Online Testing: Through Pearson VUE's online platform
Performance-Based Questions (PBQs)
The A+ exams include Performance-Based Questions (PBQs), which require candidates to perform specific tasks or solve problems in a simulated environment. These questions test real-world skills in areas like command prompts, Windows OS, and networking environments.
Continuing Education (CE) Program
Certifications with the +CE (Continuing Education) suffix, including A+, Network+, and Security+, must be renewed every three years. Renewal options include:
- Retaking the Exam: Passing the latest version of the exam
- Higher-Level Certification: Passing a higher-level CompTIA exam
- CE Program Requirements: Completing CE activities
Lifetime Certifications
Certifications earned on or before December 31, 2010, are valid for life. However, lifetime certifications are no longer available for new candidates.
More reading:
Scroll down to see your responses and detailed results
Free CompTIA A+ 220-1102 Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: 15 minutes (60 seconds per question)
- Included Objectives:Operating SystemsSecuritySoftware TroubleshootingOperational Procedures
An IT department wants to automate the process of remapping network drives for multiple workstations. Which scripting language BEST aligns with this task by being easy to implement on Windows systems?
PowerShell (.ps1)
Batch file (.bat)
VBScript (.vbs)
JavaScript (.js)
Answer Description
For automating tasks such as remapping network drives on Windows systems, PowerShell (.ps1) is often the preferred choice. PowerShell offers robust scripting capabilities tailored specifically for managing Windows environments. While batch files (.bat) can also perform similar tasks, they lack the advanced functionality and integration features found in PowerShell. VBScript (.vbs) and JavaScript (.js) are less suitable for this specific task as they are not as straightforward in Windows-specific administrative automation.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the main advantages of using PowerShell for scripting in Windows environments?
In what scenarios would a batch file (.bat) be more appropriate than PowerShell?
How does PowerShell integration with .NET enhance its capabilities compared to other scripting languages?
Which of the following is NOT a method for stopping a process on a Windows operating system?
taskkill /F /IM process.exe
Using Task Manager
ALT+F4
pkill -9 process.exe
Answer Description
pkill
is not a Windows command, but can be found on some Linux OSs and Mac OS. taskkill
, using Task Manager and pressing ALT+F4 while using an application are all common ways to stop a process on Windows.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the 'pkill' command and where is it used?
How does the 'taskkill' command function in Windows?
Can you explain how Task Manager is used to stop a process?
What is a 'mantrap' in the context of physical security systems, and how is it typically used to enhance security in a controlled environment?
A software tool designed to detect and prevent unauthorized access to a network.
A device that intercepts and logs network traffic for security analysis.
A secure enclosure with two or more doors, where the first door must close before the second opens, used to control access to sensitive areas.
A type of biometric scanner used for verifying the identity of individuals through facial recognition technology.
Answer Description
In physical security systems, a mantrap is an area between two sets of interlocking doors. The first set of doors must close and lock before the second set opens, ensuring that only authorized individuals can pass through one at a time. This setup is crucial in high-security environments, like data centers or government facilities, as it prevents tailgating and ensures secure access control.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is tailgating in physical security?
How do mantraps enhance security in data centers?
What types of technologies are often used in mantraps?
Which option best describes the recommended purpose of a login script in a user environment?
To secure user accounts by enforcing password complexity requirements.
To monitor user activity and log usage for auditing purposes.
To define user permissions for file access and manipulation on a network.
To automatically configure user settings upon login to enhance consistency.
Answer Description
A login script is designed to automatically configure user settings and establish a consistent environment upon user login. This may include mapping network drives, establishing printer connections, or applying certain system settings needed for the user session.
The other options, while they may relate to user settings, do not capture the specific automated function of a login script as effectively.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What types of user settings can a login script configure upon login?
How do login scripts enhance consistency across user environments?
In what scenarios might a login script be particularly beneficial?
A user's smartphone is experiencing an issue where it can connect to Wi-Fi networks but has no Internet access. What is MOST likely the cause of this problem?
Issues with the DHCP configuration or service
The device's MAC Address has been blocked.
The device is connected to the wrong SSID
The WPA2 key entered for the Wi-Fi network is incorrect
Answer Description
The most common reason for a device to connect to Wi-Fi but not have Internet access is due to issues with DHCP. This could be because the device did not obtain an IP address correctly, or the DHCP server is not functioning properly. Checking the DHCP settings and ensuring the device is properly receiving an IP address is a critical step in diagnosing connectivity issues. SSID mismatch refers to the device trying to connect to the wrong network, which would prevent connection entirely. If the subnet mask is incorrect, the device might still get access to the local network but have issues reaching other networks, though it's a less likely scenario. Incorrect WPA2 key would prevent the device from connecting to the Wi-Fi network in the first place, not from accessing the Internet after connecting to the Wi-Fi.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is DHCP and how does it work?
What could cause issues with the DHCP server?
What steps can I take to troubleshoot DHCP issues?
A technician is preparing to upgrade several office computers from Windows 10 to Windows 11. Before proceeding with the in-place upgrade, which of the following actions should the technician take FIRST to ensure the success and integrity of the upgrade process?
Back up user files and system preferences to an external hard drive or cloud service.
Ensure the users has purchased a Windows 11 License.
Configure the Microsoft Store to default to Windows 11 apps
Delete temporary files to free up sufficient space on the system drive for the upgrade.
Answer Description
Before performing an in-place system upgrade, it is essential to back up all important files and user preferences. This is a precautionary step to prevent data loss in case of complications during the upgrade process. An upgrade could fail or cause unexpected issues, leading to the possibility of data corruption or loss. Having a backup allows users to restore their information if the upgrade does not go as planned.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is backing up user files important before an upgrade?
What are some options for backing up files?
What might happen if I skip the backup step?
You work for a financial services agency that has customers in the office regularly to meet with their financial representatives. During these meetings the rep wants to be able to present information regarding the customer's account by turning a monitor towards the customer's seat. Which option would allow a Windows PC to show the same display on 2 monitors so both the customer and the representative can see the information?
You must use a hardware display repeater
Mirrored Display
Duplicate Displays
You must use a KVM switch
Extended Display
Answer Description
Windows OS refers to 2+ displays showing the same display as Duplicate Displays
. The exact wordings can vary between Windows OS versions but generally you can find this by following these steps:
- Right click the desktop
- Select Display Settings
- Change the drop down for multiple monitors to "Duplicate these displays" or "Extend these displays"
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'Duplicate Displays' mean in Windows?
How do I access Display Settings to duplicate my monitors?
Are there any differences in how to set up Duplicate Displays in different Windows versions?
A hacker wants to infiltrate a target’s computer to plant malware that allows them undetected privileged access to control the computer. What type of malware would the hacker want to use?
Ransomware
A virus
A rootkit
Spyware
Trojan
Answer Description
The answer is a rootkit. A rootkit allows a hacker to gain privileged access to a target’s computer while being extremely difficult to detect. The other choices are other types of malware that do not allow for control of the infected computer.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly is a rootkit and how does it work?
What is the difference between rootkits and other types of malware?
How can I tell if my computer is infected with a rootkit?
When a company decides to outsource the destruction of their old storage devices containing sensitive data, which of the following considerations is the MOST important to ensure data confidentiality and regulatory compliance?
The vendor should be located in close proximity to the company to reduce logistics costs.
The company should choose a vendor that offers the lowest price to maintain budget efficiency.
The vendor should be able to repurpose the devices for environmental sustainability.
The vendor should provide a certificate of destruction/recycling that confirms the data destruction meets regulatory standards.
Answer Description
The correct answer ensures that the outsourced vendor is trustworthy and follows industry-standard processes for data destruction, which complies with relevant regulations and protects the company's sensitive information. While the other options could be considerations, they are secondary to verifying the vendor's compliance and trustworthiness. Certificates of destruction/recycling provided by the vendor serve as official documentation that the data was destroyed according to the regulatory standards, which is essential for audits and compliance checks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What regulations should the vendor's data destruction process comply with?
What is a certificate of destruction, and why is it important?
What are some secure methods for data destruction used by vendors?
When addressing a suspected malware infection in a corporate environment, what is the FIRST action to be taken to best ensure containment and prevent further spread of the infection?
Update the antivirus definitions and perform a system scan
Disconnect the system from network connections
Reformat the system drive
Create a restore point
Answer Description
Disconnecting the system from network connections is the critical initial step to prevent the malware from spreading to other systems or accessing network resources. This action effectively isolates the infected computer, helping to halt any potential communication with other systems or external control from attackers. Although updating antivirus definitions and performing a system scan are important subsequent steps, they do not immediately address the risk of the malware communicating with other systems. Reformatting the system drive or creating a restore point should only be considered once the system is secured and the extent of the infection assessed.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is disconnecting from the network the first action in dealing with malware?
What should be done after disconnecting from the network?
What are some common types of malware that could cause infections in a corporate environment?
A computer that fails to load the operating system may indicate a hardware issue, such as a malfunctioning hard drive or incorrect BIOS settings.
True
False
Answer Description
This statement is True.
This is because issues with hardware can directly impact the system's ability to boot. A malfunctioning hard drive may not allow the operating system to load, while incorrect BIOS settings can prevent the computer from recognizing the boot device.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are common signs of a malfunctioning hard drive?
What BIOS settings can prevent a computer from booting?
How can I check if my hard drive is failing?
A proposed change to network infrastructure will have no impact on existing applications running on that network.
False
True
Answer Description
This statement is False.
This is because changes to network infrastructure can often affect the performance, connectivity or functionality of applications that use that network. Networking changes can introduce latency, bottlenecks or even downtime for interconnected applications.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What types of changes to network infrastructure can affect applications?
What is latency and how does it affect application performance?
What is a network bottleneck and how does it occur?
You notice unusual desktop alerts appearing on a user's computer, stating that their antivirus protection is compromised.
What is the BEST course of action to address this issue?
Ignore the alerts as they may be false notifications.
Review the antivirus software settings and perform an update or reinstallation.
Restart the computer to clear potential alerts from memory.
Run a full system scan to assess the current status of the system.
Answer Description
The best response is to review the antivirus software settings and perform an update or reinstallation. This action directly targets the potential issue with the antivirus, ensuring proper functionality and user protection.
Other options, such as restarting the computer, ignoring the alerts, or merely running a full system scan, do not effectively address the underlying problem indicated by the alerts.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to review antivirus software settings?
What does updating or reinstalling antivirus software involve?
What can unusual desktop alerts suggest about a computer's security?
A user complains that their computer has become increasingly slow over time, especially when running multiple applications. After checking the system, you find that there's adequate disk space and no malware infections. Which of the following actions would be the BEST to take next to address this performance issue?
Downgrade the OS to an older version.
Uninstall any applications that are not frequently used.
Defragment the system hard drive.
Add more RAM to the system.
Answer Description
Adding more RAM to the system can significantly improve performance, especially in scenarios where multiple applications are being used, as it allows the system to handle more data at once without relying on the slower hard drive for virtual memory. Uninstalling unused applications might free some resources but is unlikely to have a significant impact on performance when multiple applications are running. Fragmented data could slow down hard drive access times, but defragmentation is typically not the primary solution for performance issues related to running multiple applications, and it wouldn't be beneficial for SSDs.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is adding more RAM better for performance when running multiple applications?
What are the signs that a computer needs more RAM?
How does RAM differ from storage, and why is it important for performance?
An unauthorized user observing system security procedure such as typing in a password or pin code is known as:
Spyware
Phishing
Shoulder Surfing
A Worm
Answer Description
Shoulder surfing is a common tactic to gain information by standing near a person as they talk on the phone, fill out a form, or type in their password.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some techniques to prevent shoulder surfing?
How does shoulder surfing differ from phishing?
What should you do if you suspect you are being shoulder-surfed?
Wow!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.