CompTIA A+ Practice Test (220-1102)
Use the form below to configure your CompTIA A+ Practice Test (220-1102). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA A+ 220-1102 (V14) Information
CompTIA A+ Certification Overview
Exam Versions
The current versions of the CompTIA A+ certification exams are:
- 220-1101 (Core 1)
- 220-1102 (Core 2)
These versions were launched in April 2022 and are expected to retire approximately three years from their release date.
The A+ Certification Test
To earn the CompTIA A+ certification, candidates must pass two separate exams: 220-1101 and 220-1102. Each exam has a separate fee and can be taken in any order. Both exams must be completed before the retirement date and must be from the same set of objectives. The certification is valid for three years from the date of passing the exams.
Exam Details:
- Format: Computer-based tests
- Number of Questions: 90 questions per exam
- Time Limit: 90 minutes per exam
- Result Availability: Immediately after completion, following a short mandatory survey
CompTIA A+ 220-1102
The CompTIA A+ 220-1102 (Core 2) exam is an essential part of the A+ certification, focusing on the software and operational aspects of IT support. Launched in April 2022, this exam tests candidates on a variety of critical topics including operating systems, security, software troubleshooting, and operational procedures. The 220-1102 exam comprises 90 questions, featuring a mix of multiple-choice and performance-based questions that simulate real-world IT scenarios. With a 90-minute time limit, candidates must efficiently demonstrate their knowledge and problem-solving skills. The exam is designed to ensure that IT professionals are well-versed in managing and troubleshooting software issues, implementing security measures, and following best practices in IT operations. Successful completion of the 220-1102, alongside the 220-1101, certifies individuals for three years, highlighting their competence and readiness to handle diverse technical challenges in the IT field.
Exam Policies and Procedures
Candidates must agree to CompTIA's exam policies before starting the test. These policies include:
- No Mobile Phones/Devices: Must be left outside the exam room
- Question Review: Candidates can revisit and change answers before submitting the exam
- Submission: Unanswered questions are marked, and a final review is available before submission
Testing Centers
Since July 9, 2012, CompTIA exams are available exclusively through Pearson VUE testing centers. Candidates can book exams online, by phone, or at the testing center. Options include:
- In-Person Testing: At Pearson VUE testing centers
- Online Testing: Through Pearson VUE's online platform
Performance-Based Questions (PBQs)
The A+ exams include Performance-Based Questions (PBQs), which require candidates to perform specific tasks or solve problems in a simulated environment. These questions test real-world skills in areas like command prompts, Windows OS, and networking environments.
Continuing Education (CE) Program
Certifications with the +CE (Continuing Education) suffix, including A+, Network+, and Security+, must be renewed every three years. Renewal options include:
- Retaking the Exam: Passing the latest version of the exam
- Higher-Level Certification: Passing a higher-level CompTIA exam
- CE Program Requirements: Completing CE activities
Lifetime Certifications
Certifications earned on or before December 31, 2010, are valid for life. However, lifetime certifications are no longer available for new candidates.
More reading:
Free CompTIA A+ 220-1102 (V14) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Operating SystemsSecuritySoftware TroubleshootingOperational Procedures
After receiving a call from a user stating that their application is 'not working', which of the following is the MOST effective open-ended question to initially ask in order to gain a better understanding of the problem?
Does the application freeze or crash at startup?
Do you receive an error message when you try to launch the application?
Have you tried reinstalling the application?
What specific issues are you experiencing with the application?
Answer Description
Asking "What specific issues are you experiencing with the application?" is an open-ended question that invites the user to describe symptoms in their own words, providing richer detail for troubleshooting. The other options are closed-ended (yes/no) or lead the user toward a particular issue, which can limit the information gathered.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to ask open-ended questions in technical support?
What are some examples of effective open-ended questions for troubleshooting?
How can I improve my troubleshooting skills when handling user calls?
A user reports that random advertisement pop-up notifications keep appearing in the Windows desktop Action Center even when no browser windows are open.
Which of the following is the BEST action a technician should take first to resolve this issue?
Update Windows to the latest version.
Reboot the system to refresh services and memory.
Run a full antivirus/anti-malware scan on the computer.
Disable all Action Center notifications.
Answer Description
Unwanted desktop alerts are a classic sign of adware or other malware installed on the system. Performing a full antivirus or anti-malware scan is the most effective first step because it identifies and removes malicious programs that generate the notifications. Simply disabling applications or turning off notifications may hide the symptom but leaves the malware in place. Rebooting or installing Windows updates is good practice but rarely removes adware that is already resident on the computer.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some signs of suspicious applications on my computer?
How can I identify which applications are running in the background on Windows?
What steps should I take if I suspect I have malware on my system?
Your CEO often travels and works from public areas. Due to the sensitive nature of the CEO's work you want a solution to prevent other people in the public areas from reading confidential data on the CEO's mobile device screen. What solution can help in this scenario?
ACL
Data Loss Prevention Policy
Privacy Screen
VPN
Answer Description
A privacy screen is a thin piece of plastic that goes over a device's screen. The privacy screen is transparent for users sitting directly in front of the devices screen, but for anyone looking at the screen from an angle the screen is blocked, blurred or heavily darkened. This protects against confidential data on a screen from being easily visible to others in the area.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a privacy screen and how does it work?
Are there other methods to protect sensitive data on mobile devices?
In what situations should a privacy screen be used?
Your company is decommissioning several old hard drives that contained sensitive customer data. Which method should you use to ensure that the data cannot be recovered and meets the highest security standards?
Standard formatting
Erasing/wiping
Degaussing
Low-level formatting
Answer Description
Degaussing is the process of erasing data from magnetic storage devices by using a powerful magnetic field. This process makes the data on the storage medium unrecoverable, meeting high security standards. Standard formatting and erasing do not completely eliminate data, and low-level formatting (while effective) is more complex and less practical compared to degaussing.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is degaussing and how does it work?
What are the differences between degaussing and data wiping?
What types of devices are affected by degaussing?
A user's computer has been infected with malware. After updating the anti-malware software, which of the following scanning and removal techniques should be used to remediate the infected system?
Boot into a preinstallation environment and remove the malware
Reformat the drive and reinstall the operating system
Scan and remove the malware in safe mode
Scan and remove the malware in normal mode
Answer Description
Scanning and removing malware in safe mode is the best approach because it starts Windows in a minimal state, loading only essential drivers and services. This prevents most malware from running, making it easier for the anti-malware software to detect and remove the threat. Scanning in normal mode may allow the malware to continue running and interfering with the removal process. While a preinstallation environment can be useful for severe infections, it's not typically necessary for most malware removal scenarios. Reformatting the drive should be considered a last resort, as it will erase all data on the drive.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is safe mode more effective for scanning and removing malware?
What should I know about booting into a preinstallation environment for malware removal?
Why should I avoid reformatting my drive unless absolutely necessary?
Disabling the broadcast of the service set identifier (SSID) on a wireless router ensures the network is undetectable to any wireless-enabled device scanning for available networks.
False
True
Answer Description
Disabling the SSID broadcast may make the network less obvious to the casual user, but it does not make it completely undetectable. Wireless network analysis tools can still find networks with a disabled SSID broadcast and detect the network. Therefore, while slightly more hidden, it does not provide impenetrable security against detecting the network.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an SSID and why is it important?
How can a wireless network still be detected if the SSID broadcast is disabled?
What are some effective security measures for wireless networks?
You are a system administrator at a company with many Windows OS based servers. Your monitoring system has triggered an alert due to a single users many failed login attempts from a single user on various servers ranging from file servers, to web servers and various others. What should you do next?
Reset the user account's password
Disable the user account
Disable the account's login permissions
Delete the user
Disable the affected servers
Answer Description
The first action should disable the user account so that the issue can be further investigated safely. You should not change or delete anything else, like deleting the account or disabling the servers yet as the login attempts are not succeeding. Only disabling the user account's ability to login would not prevent any existing authenticated sessions from accessing resources and is a less safe option given the possibility of a security breach in progress.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to disable the user account instead of deleting it?
What are some steps to take after disabling the user account?
What could be some potential causes for multiple failed login attempts?
An IT technician needs to move a heavy server from a storage rack to a cart. Which of the following actions represents the proper lifting technique to prevent personal injury?
Bend at the knees and lift with the legs, keeping the back straight.
Bend at the waist and use the back muscles for a powerful lift.
Hold the server away from the body to maintain balance.
Twist the torso while lifting to place the server on the cart.
Answer Description
The correct lifting technique involves bending at the hips and knees to squat down, keeping the back straight, and using the powerful leg muscles to lift the load. Bending at the waist uses weaker back muscles, which significantly increases the risk of injury. Twisting the body while lifting or carrying a heavy object also puts dangerous strain on the spine. Objects should be held close to the body to maintain control and minimize strain on the back.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some proper lifting techniques I should know?
Why is it important to keep your back straight when lifting?
What are the consequences of improper lifting techniques?
Which command-line tool is used to verify IP level connectivity with another host on Microsoft Windows?
ping
Answer Description
ping verifies IP-level connectivity to another TCP/IP computer by sending Internet Control Message Protocol (ICMP) echo Request messages. The receipt of the corresponding echo Reply messages is displayed, along with round-trip times. ping is the primary TCP/IP command used to troubleshoot connectivity, reachability, and name resolution. Used without parameters, this command displays Help content.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is ICMP?
What does round-trip time mean?
Can you explain other parameters used with ping?
A technician at your company has just replaced several toner cartridges from various printers. What is the most appropriate method for disposing of the used toner cartridges?
Throw them in the regular office trash
Burn them in the company's incinerator
Recycle them through the manufacturer's recycling program
Store them indefinitely in the supply closet
Answer Description
The correct answer is to recycle the toner cartridges through the manufacturer's recycling program. Many printer manufacturers offer free recycling programs for their toner cartridges. This is the most environmentally responsible option, as it allows for the proper handling of potentially harmful materials and the reuse of recyclable components.
Throwing toner cartridges in the regular trash is incorrect and potentially harmful to the environment, as toner contains materials that can be toxic if not disposed of properly. Burning the cartridges is extremely dangerous and illegal in most jurisdictions due to the release of toxic fumes. Storing them indefinitely is not a solution and wastes valuable office space while potentially creating a safety hazard.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to recycle toner cartridges instead of throwing them in the trash?
What are some common components of toner cartridges that can be recycled?
How can I find out if my printer's manufacturer has a recycling program?
Which option is the BEST practice to ensure a workstation is secure when the user steps away momentarily?
Enforce a complex password policy for all user accounts.
Deactivate the guest account on all workstations.
Configure the screensaver to activate and lock the screen after inactivity.
Require users to manually lock their screens every time they step away.
Answer Description
Configuring the workstation to activate the screensaver and lock the screen automatically after a short duration of inactivity ensures that the workstation is secured if a user steps away. Manual locking and password policies are important but rely on the user's proactive actions or apply broadly.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to configure a screensaver to automatically lock the screen?
What are the risks associated with requiring users to manually lock their screens?
How does enforcing a complex password policy contribute to workstation security?
Which operating system installation type will wipe all existing data and partitions from the disk?
Clean installation
Multiboot enablement
In-place upgrade
Repair installation
Answer Description
A clean installation will completely delete existing data and partitions on the chosen disk. It can be used to re-install the previous OS with a clean state, upgrade an OS or switch operating system types (e.g. from Windows to Linux). If data needs to be kept it should be backed up to a different drive or cloud provider first.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a clean installation and when should it be used?
What are the risks of doing a clean installation?
What should I do before performing a clean installation?
This is a documented part of a change request that specifically states what will be done if the change fails.
Risk analysis
Rollback plan
Standbox testing
End-user acceptance
Answer Description
A rollback plan is a documented plan that states what steps will be taken in the event an approved change fails. This plan usually includes a way to revert back to the state before the change.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a rollback plan?
Why is a rollback plan important in change management?
What other components might be included in a comprehensive change request?
Which of the following options would satisfy the "something you have" requirement when implementing multifactor authentication for user logins to a cloud service?
Completing an on-screen CAPTCHA image recognition challenge
Receiving an automated voice call that reads a one-time verification code
Correctly answering a personal knowledge-based security question
Entering a strong eight-character password that includes letters and numbers
Answer Description
An automated voice call that delivers a one-time verification code to a preregistered telephone number demonstrates possession of that phone line, so it meets the "something you have" factor in MFA. A strong password and a security question are both "something you know" factors, while a CAPTCHA only proves that the user is likely human and is not an authentication factor at all.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the different types of factors used in multifactor authentication?
How does using a voice call enhance security in multifactor authentication?
What is the importance of using multifactor authentication?
Which script file type would you use to automate tasks on a Linux system?
.ps1
.sh
.bat
.vbs
Answer Description
.sh scripts are used to automate tasks specifically on Unix-like operating systems, including Linux. These scripts contain commands that are executed by the shell interpreter. Other script types such as .bat, .ps1, and .vbs are more commonly associated with Windows operating systems.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a shell interpreter and how does it work?
What are some common use cases for .sh scripts on Linux?
What are the differences between .sh scripts and .bat scripts?
Woo!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.