CompTIA A+ Practice Test (220-1102)
Use the form below to configure your CompTIA A+ Practice Test (220-1102). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA A+ 220-1102 (V14) Information
CompTIA A+ Certification Overview
Exam Versions
The current versions of the CompTIA A+ certification exams are:
- 220-1101 (Core 1)
- 220-1102 (Core 2)
These versions were launched in April 2022 and are expected to retire approximately three years from their release date.
The A+ Certification Test
To earn the CompTIA A+ certification, candidates must pass two separate exams: 220-1101 and 220-1102. Each exam has a separate fee and can be taken in any order. Both exams must be completed before the retirement date and must be from the same set of objectives. The certification is valid for three years from the date of passing the exams.
Exam Details:
- Format: Computer-based tests
- Number of Questions: 90 questions per exam
- Time Limit: 90 minutes per exam
- Result Availability: Immediately after completion, following a short mandatory survey
CompTIA A+ 220-1102
The CompTIA A+ 220-1102 (Core 2) exam is an essential part of the A+ certification, focusing on the software and operational aspects of IT support. Launched in April 2022, this exam tests candidates on a variety of critical topics including operating systems, security, software troubleshooting, and operational procedures. The 220-1102 exam comprises 90 questions, featuring a mix of multiple-choice and performance-based questions that simulate real-world IT scenarios. With a 90-minute time limit, candidates must efficiently demonstrate their knowledge and problem-solving skills. The exam is designed to ensure that IT professionals are well-versed in managing and troubleshooting software issues, implementing security measures, and following best practices in IT operations. Successful completion of the 220-1102, alongside the 220-1101, certifies individuals for three years, highlighting their competence and readiness to handle diverse technical challenges in the IT field.
Exam Policies and Procedures
Candidates must agree to CompTIA's exam policies before starting the test. These policies include:
- No Mobile Phones/Devices: Must be left outside the exam room
- Question Review: Candidates can revisit and change answers before submitting the exam
- Submission: Unanswered questions are marked, and a final review is available before submission
Testing Centers
Since July 9, 2012, CompTIA exams are available exclusively through Pearson VUE testing centers. Candidates can book exams online, by phone, or at the testing center. Options include:
- In-Person Testing: At Pearson VUE testing centers
- Online Testing: Through Pearson VUE's online platform
Performance-Based Questions (PBQs)
The A+ exams include Performance-Based Questions (PBQs), which require candidates to perform specific tasks or solve problems in a simulated environment. These questions test real-world skills in areas like command prompts, Windows OS, and networking environments.
Continuing Education (CE) Program
Certifications with the +CE (Continuing Education) suffix, including A+, Network+, and Security+, must be renewed every three years. Renewal options include:
- Retaking the Exam: Passing the latest version of the exam
- Higher-Level Certification: Passing a higher-level CompTIA exam
- CE Program Requirements: Completing CE activities
Lifetime Certifications
Certifications earned on or before December 31, 2010, are valid for life. However, lifetime certifications are no longer available for new candidates.
More reading:
Free CompTIA A+ 220-1102 (V14) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Operating SystemsSecuritySoftware TroubleshootingOperational Procedures
A user reports receiving frequent data-usage limit notifications on their smartphone, even though their usage habits have not changed. The user suspects a security breach. Which of the following actions should a technician perform FIRST to investigate the issue?
Disable the device's Wi-Fi radio.
Advise the user to upgrade to a higher data plan.
Immediately perform a factory reset of the device.
Check the data usage per application in the device's settings.
Answer Description
The best first step in troubleshooting unexpected high data usage is to investigate which specific application is responsible. By navigating to the mobile device's settings and viewing the data usage breakdown by application, a technician can identify if a known application is consuming more data than expected or if an unknown or suspicious application is the culprit. A factory reset is a drastic measure to be used only after other troubleshooting fails. Disabling Wi-Fi does not help diagnose the root cause of cellular data consumption. Changing the data plan only masks the problem without addressing the potential security risk or a misbehaving application.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some signs that indicate a potential security issue on my mobile device?
How can I check which apps are consuming the most data on my mobile device?
What steps can I take if I suspect a security issue is causing increased data usage?
What Linux command is used for copying files?
copy
cp
dup
mirror
Answer Description
In Linux and Unix systems the cp
command is used to make copies of a file. For example:
cp existing_file.txt new_file.txt
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some common options I can use with the cp command?
Can I use cp to copy files between different systems?
What are some common mistakes when using the cp command?
Which command-line tool is used to display the currently active TCP/IP connections on Microsoft Windows?
netstat
Answer Description
netstat displays active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP protocols), and IPv6 statistics (for the IPv6, ICMPv6, TCP over IPv6, and UDP over IPv6 protocols). Used without parameters, this command displays active TCP connections.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does TCP/IP stand for, and why is it important?
What are the different sections of information displayed by the netstat command?
How can I use netstat to troubleshoot network issues?
A technician needs to upgrade a Windows 10 Home edition to Windows 10 Pro to enable additional features for a business environment.
Which of the following methods is the most straightforward way to achieve this?
Switch from Windows 10 Home to Windows 10 Enterprise using a volume licensing agreement.
Create a bootable USB drive with Windows 10 Pro and reformat the device.
Perform an in-place upgrade using a legitimate license key for Windows 10 Pro.
Uninstall Windows 10 Home and install Windows 10 Pro from scratch without saving files.
Answer Description
The easiest method to upgrade from Windows 10 Home to Windows 10 Pro is to perform an in-place upgrade using a legitimate license key for Windows 10 pro, this allows for the transition without needing to perform a full reinstallation of the operating system.
The other options would require more complex processes or may not result in a direct upgrade to the desired version.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an in-place upgrade?
What features does Windows 10 Pro offer that Windows 10 Home does not?
Why is a legitimate license key important for upgrading to Windows 10 Pro?
You are an IT support specialist and a user reports that their device cannot connect to a company printer shared within the local network. The user is part of a workgroup. Which path would you use in File Explorer to correctly map the network printer?
http://ServerName/PrinterName
ftp://ServerName/PrinterName
C:\network\printername
\ServerName\PrinterName
Answer Description
The correct answer is the UNC (Universal Naming Convention) path which follows the format: \ServerName\ShareName. This path format is used to access shared resources like printers within a network. Incorrect options such as 'C:\network\printername' represent local paths or incorrect syntaxes for network resources.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does UNC stand for, and how is it used in networking?
Why are local paths like C:\network\printername not suitable for network resources?
What are some common issues that can prevent connecting to a network printer?
An organization must distribute a highly sensitive application that requires stringent validation of its integrity before installation. The application is large, and the distribution speed is a secondary concern. What is the BEST distribution method to ensure the integrity of the application while adhering to the security policy?
Encrypted physical media such as DVDs with integrity checks
A web-based file hosting service with password-protected downloads
A file download via an unencrypted File Transfer Protocol (FTP) connection
Downloadable content from a public cloud service with standard HTTPS encryption
An email attachment sent through an encrypted email service
Peer-to-peer file sharing within the local network
Answer Description
Distributing the application through encrypted physical media is the best method in this scenario to ensure the integrity and security of the application. While downloadable content is convenient, it is more vulnerable to interception and tampering during transmission. Encrypted physical media helps guarantee that the application has not been tampered with, as the recipient can verify the integrity of the encryption upon receipt. This method is secure and suitable for scenarios where the size of the application is large, and distribution speed is not the primary concern.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are integrity checks and how do they work?
What does it mean for physical media to be encrypted?
Why is peer-to-peer file sharing not suitable for sensitive applications?
Which of the following best describes "shoulder surfing"?
Using software to record keystrokes on a user's device.
Phishing for information by sending fake emails to users.
Observing someone's screen or keyboard to gather sensitive information without their knowledge.
Installing malware to remotely control another user's device.
Answer Description
Shoulder surfing is a social engineering method where an attacker physically observes someone’s screen or keyboard to steal sensitive information, like passwords or PINs, without their knowledge. This technique relies on being close to the target, often in public spaces, to view confidential details.
Incorrect Answers: Keylogging involves tracking keystrokes through software or hardware to capture information, unlike shoulder surfing, which requires direct observation. Installing malware to remotely control another person’s device is a form of cyberattack that doesn’t need the attacker to be physically near the victim. Phishing uses deceptive emails or messages to trick users into providing sensitive information and does not involve observing the user in person.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a shoulder surfer?
What other methods can I use to protect my screen in public?
Why is it important to maintain screen privacy?
A network administrator needs to verify the IP address of a specific website.
Which command should be used to find this information?
tracert
ipconfig
ping
nslookup
Answer Description
nslookup - This is correct. The nslookup command is used to query the Domain Name System (DNS) to obtain the IP address associated with a specific website or domain name. It provides a direct way to find the IP address of a website.
ping - The ping command sends ICMP echo requests to a domain or IP address to check connectivity. While it can sometimes resolve a domain name to an IP address, its primary purpose is to test the reachability of the destination, not to look up IP addresses specifically.
ipconfig - The ipconfig command displays the network configuration of the local machine, such as IP addresses, subnet masks, and default gateways. It does not provide information about external websites or their IP addresses.
tracert - The tracert (Trace Route) command traces the path packets take to reach a destination. While it can show the resolved IP address of the destination during the trace, its main function is to map the route to the target, not to look up the IP address directly.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does the nslookup command do?
What is the Domain Name System (DNS)?
How does the ping command work?
What Windows command-line utility, known for its robust file copy capabilities, allows you to mirror directories, copy NTFS permissions, retry failed copies, and resume partially copied files, making it particularly useful for complex copying tasks and large-scale data migrations?
robocopy
Answer Description
Robocopy (Robust File Copy), refers to a powerful command-line utility in Windows that excels in advanced file copying and synchronization tasks. It stands out for its ability to mirror directories, copy NTFS permissions, automatically retry failed copies, and resume partially copied files.
These features make "robocopy" particularly well-suited for complex copying scenarios, backups, and large-scale data migrations where precision and resilience are crucial.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are NTFS permissions and why are they important?
How does Robocopy differ from the standard copy command in Windows?
Can Robocopy be used for network file transfers, and if so, how?
A technician is writing a script intended to automatically gather inventory data from Windows workstations across the company network. The script will run monthly and compile information such as system specifications, installed software, and peripheral devices. Which of the following scripting capabilities is the MOST appropriate to use for this task?
Visual Basic Script (.vbs)
JavaScript (.js)
Windows PowerShell (.ps1)
Windows Command Script (.bat)
Answer Description
PowerShell scripting (.ps1) is the most comprehensive and suitable tool for gathering rich and detailed inventory data across a network of Windows-based workstations. It can easily access a wide range of system information through cmdlets, which are specialized commands, and can interact with Windows Management Instrumentation (WMI) to retrieve detailed inventory data.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are cmdlets in PowerShell?
What is Windows Management Instrumentation (WMI)?
What are the advantages of using PowerShell scripts over other types of scripts?
What command in Linux is used to list the files and directories in the current working directory?
ls
Answer Description
On Linux and Unix systems the ls
commands lists the contents of the current directory. This includes both files and subdirectories by default.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What options can I use with the 'ls' command to modify its output?
What is the difference between 'ls' and 'dir' commands in Linux?
Are there any shortcuts or aliases for the 'ls' command?
Which command-line tool would you use to view network configuration details, including IP addresses and subnet masks?
ping
tracert
ipconfig
netstat
Answer Description
The correct tool for this task is 'ipconfig' as it displays the current TCP/IP network configuration values, allowing users to see IP addresses, gateway information and other relevant network settings.
Other options such as 'tracert' track network paths and 'ping' test connectivity, but they do not show configuration details.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What information does the 'ipconfig' command provide?
How is 'ipconfig' different from other network commands like 'ping' and 'tracert'?
What are the common parameters used with the 'ipconfig' command?
A Windows workstation is experiencing issues with both network connectivity and functionality of specific applications. After performing basic network diagnostics and adjusting settings, you suspect that a process may not be operating correctly. What should you do next to potentially resolve the problem?
Reboot the entire system to see if the issue resolves itself.
Uninstall and reinstall the network drivers to resolve the issue.
Check the status of related processes and restart any that may be stopped or malfunctioning.
Update the operating system to the latest version promptly.
Answer Description
By checking the status of processes and restarting any that are malfunctioning, you can often restore normal functionality. This approach helps address transient issues without needing to reboot the entire system. The other options involve more disruptive measures, such as reinstalling drivers or rebooting, which may not directly address the root problem.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are processes in a Windows workstation and why are they important?
How can I check the status of processes on a Windows machine?
What are transient issues and how do they differ from persistent problems?
An employee in your organization has reported that their computer is behaving oddly, such as unexpected windows popping up, and they suspect it might be infected with malicious software. Given the symptoms and the critical nature of data handled by the employee, which of the following actions should be taken FIRST to best address the potential presence of a keylogger?
Disconnect the computer from the network and then proceed with further malware removal steps.
Update the antivirus software definitions and perform a full system scan.
Run the antivirus program to scan and remove any potential threats immediately.
Check the browser extensions and remove any that were not installed by the company's IT department.
Answer Description
When a keylogger is suspected, it is crucial to first disconnect the computer from the network to prevent the potential exfiltration of sensitive data through the network. By isolating the computer, you stop the keylogger from possibly sending data to a malicious actor. Running an antivirus program is also important, but it should be done after isolating the computer to prevent further data leaks. Updating the antivirus definitions is a part of running the antivirus scan but it is not the first action to take if the computer is currently compromised. Checking the browser extensions could help if the keylogger was a malicious extension, but this is less likely the first step compared to disconnecting from the network due to the immediacy of data breach risks posed by keyloggers.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a keylogger and how does it work?
Why is it important to disconnect the computer from the network?
What further steps should be taken after disconnecting the infected computer?
What is the primary function of Group Policy in a Windows environment?
To enforce password policies for individual user accounts
To control user access to internet downloads
To manage security settings and software installation for users and computers
To configure hardware settings for workstations only
Answer Description
To manage security settings and software installation for users and computers - This is correct. Group Policy is a feature in Windows that allows administrators to centrally manage and configure operating system settings, security configurations, software installations, and user environment settings for both users and computers in an Active Directory domain.
To control user access to internet downloads - While Group Policy can be used to manage internet-related settings, its scope is much broader and includes managing a variety of system and user configurations beyond internet downloads.
To configure hardware settings for workstations only - Group Policy is not limited to hardware settings or workstations. It can configure settings for both users and computers across an entire domain, including policies related to software, security, and more.
To enforce password policies for individual user accounts - While Group Policy can enforce password policies, it does so at a domain or organizational level, not for individual user accounts. Managing individual accounts is handled through other tools like Local Users and Groups or Active Directory Users and Computers.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does Group Policy differ from Local Group Policy?
What types of settings can be managed through Group Policy?
Can Group Policy settings be overridden, and how does that work?
Smashing!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.