00:20:00

CompTIA A+ Practice Test (220-1102)

Use the form below to configure your CompTIA A+ Practice Test (220-1102). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA A+ 220-1102 (V14)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA A+ 220-1102 (V14) Information

CompTIA A+ Certification Overview

The A+ Certification Test

To earn the CompTIA A+ certification, candidates must pass two separate exams: 220-1101 and 220-1102. Each exam has a separate fee and can be taken in any order. Both exams must be completed before the retirement date and must be from the same set of objectives. The certification is valid for three years from the date of passing the exams.

Exam Details:

  • Format: Computer-based tests
  • Number of Questions: 90 questions per exam
  • Time Limit: 90 minutes per exam
  • Result Availability: Immediately after completion, following a short mandatory survey

CompTIA A+ 220-1102

The CompTIA A+ 220-1102 (Core 2) exam is an essential part of the A+ certification, focusing on the software and operational aspects of IT support. Launched in April 2022, this exam tests candidates on a variety of critical topics including operating systems, security, software troubleshooting, and operational procedures. The 220-1102 exam comprises 90 questions, featuring a mix of multiple-choice and performance-based questions that simulate real-world IT scenarios. With a 90-minute time limit, candidates must efficiently demonstrate their knowledge and problem-solving skills. The exam is designed to ensure that IT professionals are well-versed in managing and troubleshooting software issues, implementing security measures, and following best practices in IT operations. Successful completion of the 220-1102, alongside the 220-1101, certifies individuals for three years, highlighting their competence and readiness to handle diverse technical challenges in the IT field.

Exam Policies and Procedures

Candidates must agree to CompTIA's exam policies before starting the test. These policies include:

  • No Mobile Phones/Devices: Must be left outside the exam room
  • Question Review: Candidates can revisit and change answers before submitting the exam
  • Submission: Unanswered questions are marked, and a final review is available before submission

Testing Centers

Since July 9, 2012, CompTIA exams are available exclusively through Pearson VUE testing centers. Candidates can book exams online, by phone, or at the testing center. Options include:

  • In-Person Testing: At Pearson VUE testing centers
  • Online Testing: Through Pearson VUE's online platform

Performance-Based Questions (PBQs)

The A+ exams include Performance-Based Questions (PBQs), which require candidates to perform specific tasks or solve problems in a simulated environment. These questions test real-world skills in areas like command prompts, Windows OS, and networking environments.

Continuing Education (CE) Program

Certifications with the +CE (Continuing Education) suffix, including A+, Network+, and Security+, must be renewed every three years. Renewal options include:

  • Retaking the Exam: Passing the latest version of the exam
  • Higher-Level Certification: Passing a higher-level CompTIA exam
  • CE Program Requirements: Completing CE activities

Lifetime Certifications

Certifications earned on or before December 31, 2010, are valid for life. However, lifetime certifications are no longer available for new candidates.

More reading:

CompTIA A+ 220-1102 (V14) Logo
  • Free CompTIA A+ 220-1102 (V14) Practice Test

  • 20 Questions
  • Unlimited
  • Operating Systems
    Security
    Software Troubleshooting
    Operational Procedures
Question 1 of 20

Which practice is fundamental to ensuring controlled and predictable changes within an IT environment?

  • Providing users with advance notice of changes without evaluating risks or impacts.

  • Phasing in changes gradually without consulting the change board.

  • Implementing changes without requiring documentation or formal approval processes.

  • Utilizing a change request form that includes the purpose and scope of the proposed change along with required approvals from relevant stakeholders.

Question 2 of 20

You have been tasked to create the backup strategy for Crucial Technologies. Looking at the options you have decided that you want to use a solution that is going to give the company a less time consuming way to have full backups. What strategy would you use?

  • Differential

  • Full

  • Incremental

  • Synthetic

Question 3 of 20

As a technician, you are tasked with creating a script to automate the backup process of company data. To maintain system security, what is the BEST next step to follow immediately before deploying the script across the company network?

  • Regularly update the script to the latest version before each use.

  • Always execute scripts using an administrative account to ensure they run correctly.

  • Review and test the script in a dedicated test environment before deployment.

  • Run the script through the most recently updated anti-malware and security software.

Question 4 of 20

When creating data backups the starting point for most backup strategies is usually what type of backup?

  • Incremental

  • Partial

  • Differential

  • Full

Question 5 of 20

A user is experiencing intermittent system errors and instability after a recent software update. Before performing more invasive troubleshooting steps, which action is advisable to potentially resolve these issues?

  • Perform a system restore to a point before the update was installed.

  • Reformat the drive and reinstall the operating system.

  • End tasks in Task Manager that are not responding.

  • Use disk cleanup to remove temporary files that may be causing the problem.

Question 6 of 20

Which of the following statements about running 32-bit and 64-bit applications on Microsoft Windows operating systems is TRUE?

  • A 32-bit edition of Windows can execute 64-bit applications as long as the CPU supports 64-bit instructions.

  • A 64-bit edition of Windows can execute both 32-bit and 64-bit user-mode applications without modification.

  • Windows 64-bit editions cannot run 32-bit applications unless they are launched inside a virtual machine.

  • Any 64-bit application can load 32-bit drivers if they are digitally signed.

Question 7 of 20

Which description best fits the functionality of AirDrop?

  • A cross-platform technology for file sharing via Bluetooth.

  • A feature for transferring files directly between Apple devices using Bluetooth and Wi-Fi.

  • A tool to facilitate file transfers using Wi-Fi Direct between mobile devices.

  • An application for cloud-based file storage that can be accessed on different types of devices.

Question 8 of 20

What is the primary role of the RTC in a computer system?

  • The RTC controls graphics rendering on the computer display.

  • The RTC regulates the speed of the computer's central processing unit (CPU).

  • The RTC ensures accurate timekeeping even when the computer is powered off.

  • The RTC manages network connectivity for real-time data transfer.

Question 9 of 20

A user reports that their smartphone is unable to connect to any WiFi networks.

Which step should be taken first to address this issue?

  • Ensure WiFi is enabled on the device

  • Reset the network settings on the device

  • Update the mobile operating system

  • Confirm the network password is correct

Question 10 of 20

A user reports that they cannot access any websites on their computer. However, they confirm they can still access a shared network drive and print to the office's network printer. Which of the following is the MOST likely cause of this issue?

  • The computer's firewall is blocking all network traffic.

  • The connection to the internet is down.

  • The computer's network cable is faulty.

  • The user's account has incorrect permissions for the shared drive.

Question 11 of 20

A user reports that their Windows system experiences frequent crashes and displays blue screens intermittently.

After confirming the hardware is functioning properly, which should be the next step to resolve the issue?

  • Replace the hard drive

  • Run a system file check

  • Reinstall the operating system

  • Uninstall the most recent application

Question 12 of 20

During troubleshooting, a client angrily insists that their brand-new printer is faulty and demands an immediate replacement. You have verified that the printer is functional and that the real problem is an outdated printer driver. How should you respond to avoid being judgmental?

  • Empathize with the client's frustration, explain that the printer is functional but requires a driver update, and offer to perform the update.

  • Bluntly inform the client that the printer is not broken and they were mistaken about the issue.

  • Immediately comply with their demand for a replacement without explaining the actual issue.

  • Provide a detailed technical explanation of why the printer driver causes such issues and suggest they should keep up with updates.

Question 13 of 20

Which feature does BitLocker provide in Microsoft Windows?

  • Disk encryption

  • Application installation

  • Internet protection

  • Firewall settings

Question 14 of 20

What is the primary advantage of performing an in-place upgrade to Windows 10 from an earlier version?

  • It offers better performance than a clean installation.

  • It requires a complete reinstallation of all applications and drivers.

  • It maintains user files and settings during the upgrade process.

  • It requires less time to complete than a recovery option.

Question 15 of 20

A piece of recently installed software at Crucial Technologies was compromised. After doing research, it is discovered that the software was exploited before the vendor is aware of the vulnerability. What is this kind of attack called?

  • Insider threat

  • Zero-day attack

  • Dictionary attack

  • Brute-force attack

  • On-path attack

Question 16 of 20

An IT administrator at a company discovers that several company-owned smartphones have Developer mode enabled. The administrator needs to assess the situation. What is the initial step the administrator should take to address the issue?

  • Document which devices have Developer mode enabled and gather information on any unusual apps or modifications.

  • Run a security audit on all company-owned smartphones.

  • Check and perform all system updates for the affected smartphones.

  • Optimize the battery settings on the devices to prevent unauthorized access.

Question 17 of 20

What is the purpose of having a rollback plan in change management?

  • To document the changes made for auditing purposes

  • To schedule future updates and changes in a system

  • To revert systems to their previous state if a change causes issues

  • To ensure all users are informed about the changes on the network

Question 18 of 20

You are assisting a user in trying to find a file in their C:\Users folder. You see that some of the folders appear differently than the others, appearing to be faded in, rather than full color. What do these icons refer to?

  • Cached folders.

  • Deleted items still utilizing resources.

  • Hidden Folders.

  • Folders currently backing up.

Question 19 of 20

An employee at a small business reports that their work computer has recently started displaying an unusually high number of advertisements while browsing websites, including secure business sites that typically do not display ads. What is the most likely cause of this issue?

  • Adware or a potentially unwanted application (PUA) has been installed

  • All browser extensions should be checked and potentially removed

  • Antivirus software on the system needs to be updated

  • The computer is using an outdated web browser

Question 20 of 20

A user has reported unusual behavior on their workstation, including files disappearing and unauthorized applications being installed.

What is the most likely cause of this situation?

  • A Trojan

  • Spyware

  • Ransomware

  • A worm