CompTIA A+ Practice Test (220-1102)
Use the form below to configure your CompTIA A+ Practice Test (220-1102). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA A+ 220-1102 (V14) Information
CompTIA A+ Certification Overview
Exam Versions
The current versions of the CompTIA A+ certification exams are:
- 220-1101 (Core 1)
- 220-1102 (Core 2)
These versions were launched in April 2022 and are expected to retire approximately three years from their release date.
The A+ Certification Test
To earn the CompTIA A+ certification, candidates must pass two separate exams: 220-1101 and 220-1102. Each exam has a separate fee and can be taken in any order. Both exams must be completed before the retirement date and must be from the same set of objectives. The certification is valid for three years from the date of passing the exams.
Exam Details:
- Format: Computer-based tests
- Number of Questions: 90 questions per exam
- Time Limit: 90 minutes per exam
- Result Availability: Immediately after completion, following a short mandatory survey
CompTIA A+ 220-1102
The CompTIA A+ 220-1102 (Core 2) exam is an essential part of the A+ certification, focusing on the software and operational aspects of IT support. Launched in April 2022, this exam tests candidates on a variety of critical topics including operating systems, security, software troubleshooting, and operational procedures. The 220-1102 exam comprises 90 questions, featuring a mix of multiple-choice and performance-based questions that simulate real-world IT scenarios. With a 90-minute time limit, candidates must efficiently demonstrate their knowledge and problem-solving skills. The exam is designed to ensure that IT professionals are well-versed in managing and troubleshooting software issues, implementing security measures, and following best practices in IT operations. Successful completion of the 220-1102, alongside the 220-1101, certifies individuals for three years, highlighting their competence and readiness to handle diverse technical challenges in the IT field.
Exam Policies and Procedures
Candidates must agree to CompTIA's exam policies before starting the test. These policies include:
- No Mobile Phones/Devices: Must be left outside the exam room
- Question Review: Candidates can revisit and change answers before submitting the exam
- Submission: Unanswered questions are marked, and a final review is available before submission
Testing Centers
Since July 9, 2012, CompTIA exams are available exclusively through Pearson VUE testing centers. Candidates can book exams online, by phone, or at the testing center. Options include:
- In-Person Testing: At Pearson VUE testing centers
- Online Testing: Through Pearson VUE's online platform
Performance-Based Questions (PBQs)
The A+ exams include Performance-Based Questions (PBQs), which require candidates to perform specific tasks or solve problems in a simulated environment. These questions test real-world skills in areas like command prompts, Windows OS, and networking environments.
Continuing Education (CE) Program
Certifications with the +CE (Continuing Education) suffix, including A+, Network+, and Security+, must be renewed every three years. Renewal options include:
- Retaking the Exam: Passing the latest version of the exam
- Higher-Level Certification: Passing a higher-level CompTIA exam
- CE Program Requirements: Completing CE activities
Lifetime Certifications
Certifications earned on or before December 31, 2010, are valid for life. However, lifetime certifications are no longer available for new candidates.
More reading:
Free CompTIA A+ 220-1102 (V14) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Operating SystemsSecuritySoftware TroubleshootingOperational Procedures
In Microsoft Windows 10, which account type has the ability to fully control the system and access all files and settings without restrictions?
Guest
Root
Power User
Standard User
Administrator
Answer Description
The Administrator account has full control over the system, allowing for complete access to all files, settings, and system management tools. Standard user accounts are limited and cannot make changes affecting other users or the security of the system. Guest accounts are even more restricted and are typically used for temporary access with limited privileges.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the key differences between an Administrator account and a Standard User account in Windows 10?
What is the purpose of a Guest account in Windows 10?
What are some common tasks that require Administrator permissions in Windows 10?
Which edition of Windows 10 provides support for domain binding and includes advanced security features like BitLocker and Device Guard?
Home
Pro for Workstations
Pro
Enterprise
Answer Description
The correct answer is the Enterprise edition, which provides the most comprehensive set of features for business environments, including domain access and BitLocker for data protection and Device Guard.
The Pro edition also allows binding to a domain and includes BitLocker, making it a suitable option for smaller businesses or professional use but it does not support Device Guard. The Home edition lacks these capabilities, while the Pro for Workstations is designed for high-performance tasks but does not offer any additional enterprise features beyond what Pro provides.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is domain binding in Windows 10?
What is BitLocker and how does it work?
How does Windows 10 Pro differ from Enterprise edition?
A systems administrator needs to apply a specific set of Group Policy settings to all the computers in the sales department. The administrator also needs to delegate permissions to a junior administrator to manage only the user accounts within that same department. Which of the following Active Directory components should the administrator create to meet these requirements?
A home folder
An organizational unit
A security group
A domain
Answer Description
An organizational unit (OU) is the correct choice because OUs are containers within a domain that can hold users, groups, and computers. They are the smallest scope to which Group Policy Objects (GPOs) can be linked and are used to delegate administrative authority. A security group is used to assign permissions to resources, not to link GPOs. A home folder is a user-specific storage location. A domain represents a much broader security boundary and is not the appropriate level for delegating departmental control.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Organizational Unit (OU) in Active Directory?
What is Active Directory?
What are Group Policies and how do they relate to OUs?
A technician is troubleshooting a Windows PC that displays frequent notifications stating the firewall has been disabled. The user confirms they did not make any changes to the security settings. Which of the following is the MOST likely cause for these alerts?
Malware infection
A conflicting third-party security application
A recent OS update failed
User profile corruption
Answer Description
A primary tactic of many malware variants is to disable system security features, including the firewall and anti-malware software, to prevent detection and removal. While a conflicting third-party security application could legitimately disable the Windows firewall, or a failed OS update could cause system instability, unsolicited and repeated notifications of this nature are a classic and high-priority symptom of a malware infection. A corrupted user profile is less likely to cause this specific behavior.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some common signs of malware infection?
How does malware disable a firewall?
What steps should I take if I suspect malware on my system?
A technician is troubleshooting a customer's smartphone that has no Internet connectivity. The technician has already confirmed the customer's cellular data plan is active and has sufficient data. What troubleshooting step should the technician take next?
Verify the cellular network is turned on and active
Restart the phone
Turn on Airplane mode, then turn it off
Check for service outages in the area
Answer Description
The most logical next step is to verify that the cellular network setting is enabled on the device. Even with an active data plan, the phone cannot connect to the internet if the mobile data option is turned off. Toggling Airplane mode and restarting the phone are also valid troubleshooting steps, but checking the primary setting first is a more direct and faster approach. Checking for a service outage is also a valid step, but it's more efficient to rule out device-specific settings before investigating external, area-wide problems.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does it mean for the cellular network to be turned on and active?
How can a user check if there are service outages in their area?
What is Airplane mode and how does it affect connectivity?
Which of the following options is used to hide the existence of a wireless network from casual users?
Changing the SSID
Disabling SSID broadcast
Using a strong password
Enabling WPA3 encryption
Answer Description
Disabling the Service Set Identifier (SSID) broadcast is a security measure that makes the network less visible to devices trying to discover available wireless networks. It does not provide strong security but can add a layer of obscurity.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is SSID and why is it important?
What does disabling SSID broadcast do?
What are the limitations of hiding SSID as a security measure?
A technician is preparing to upgrade several office computers from Windows 10 to Windows 11. Before proceeding with the in-place upgrade, which of the following actions should the technician take FIRST to ensure the success and integrity of the upgrade process?
Delete temporary files to free up sufficient space on the system drive for the upgrade.
Configure the Microsoft Store to default to Windows 11 apps.
Ensure the user has purchased a Windows 11 license.
Back up user files and system preferences to an external hard drive or cloud service.
Answer Description
Before performing an in-place system upgrade, it is essential to back up all important files and user preferences. This is a precautionary step to prevent data loss in case of complications during the upgrade process. An upgrade could fail or cause unexpected issues, leading to the possibility of data corruption or loss. Having a backup allows users to restore their information if the upgrade does not go as planned.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is backing up user files important before an upgrade?
What are some options for backing up files?
What might happen if I skip the backup step?
What tool can be used to check if anyone else is logged into a Windows-based computer?
Local Users and Group
Task Manager
Type "who" into the CLI/command prompt
MSINFO32
Answer Description
The Users tab in Task Manager will show you the logged in users. The "who" command is for Linux, not Windows. MSINFO32 provides system information, Local Users and Groups shows user accounts on the system - not ones in use.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What specific information can I find on the Users tab of Task Manager?
What are the other tabs in Task Manager, and what do they show?
What are some common reasons for checking who is logged into a Windows computer?
Which of the following is the best practice for disposing of used printer toner cartridges?
Dispose of them in the regular trash bin
Give them to a friend or colleague who might need them
Store them in a warehouse indefinitely
Recycle them through a manufacturer’s program or certified recycling facility
Answer Description
The best practice for disposing of used printer toner cartridges is to participate in a recycling program offered by the manufacturer or a certified recycling facility. This ensures that the materials are handled and processed properly, reducing environmental impact. Simply discarding them or giving them away might not guarantee proper handling.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why should toner cartridges be recycled instead of thrown away?
What are the environmental benefits of recycling toner cartridges?
How can I find a certified recycling facility for toner cartridges?
A user reports that their Windows 10 laptop is failing to install the latest security updates. A technician confirms the laptop has a stable internet connection and more than 100 GB of free disk space. Despite multiple reboots, the update process consistently fails. Which of the following is the MOST likely cause of this issue?
The user does not have administrative privileges.
The Windows Update service is not running.
The laptop's disk space is full.
The laptop is not connected to the internet.
Answer Description
The correct answer is that the Windows Update service is not running. The Windows Update service is a background process responsible for downloading and installing updates. If this service is stopped or disabled, updates will fail to install, even if the system has internet access and sufficient disk space. Restarting the laptop will not resolve the issue if the service is set to 'Disabled'. Lack of internet connectivity and insufficient disk space were ruled out in the scenario. While administrative privileges can be a factor in some software installations, standard users are typically able to initiate and install Windows updates, making a service failure the more probable cause in this situation.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the Windows Update service?
How can I check if the Windows Update service is running?
What can cause the Windows Update service to stop working?
Which of the following statements is true regarding the difference between 32-bit and 64-bit version of the Windows OS?
32-bit is the more modern of the two architectures
All processors can utilize 32-bit and 64-bit Windows interchangeably
There are no fundamental differences between 32-bit and 64-bit Windows
64-bit Windows can utilize more than 4 GB of RAM
Answer Description
64-bit Windows is capable of utilizing in excess of 4 GB of RAM. While most modern processors can utilize 32-bit or 64-bit Windows, that has not always been the case.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does it mean that 64-bit Windows can utilize more than 4 GB of RAM?
How does a processor's architecture affect its ability to run 32-bit or 64-bit Windows?
What are the practical benefits of using a 64-bit version of Windows over a 32-bit version?
What is the primary purpose of a request form within a change management process?
To formally record and detail a proposed change for analysis and approval
To record the personal details of customers for marketing purposes
To document the resolution of a problem after a change has been made
To serve as a legal contract for third-party service providers
Answer Description
A request form is used to formally record a desired change, providing structured information for analysis and approval purposes. It ensures that changes are not made spontaneously and without oversight, which could lead to system disruptions or other issues. Instead, the process requires proper planning and documentation which is facilitated by a request form.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What information is typically included in a change request form?
How does the change management process ensure that changes are approved?
What are the consequences of not using a change request form?
You are working as a help desk technician at Crucial Technologies. A user contacted the help desk complaining about a lack of space in their Outlook storage and wanted to know how they set up a Personal storage file (.pst) to store emails like they have seen co-workers use. What remote access technology would you use to access the user's computer and show them how to complete the task?
RDP
SSH
VPN
MSRA
Answer Description
Microsoft Remote Assistance allows for the sharing and controlling of a Windows computer through a remote connection. During the connection, the user of the connected computer can actively see what is happening on the screen which is best suited for end-user support scenarios. RDP is a similar option, but would not allow both the local user and remote user to view the screen at the same time. Using RDP you could solve the user's issue remotely, but not able to show them how you did it so they can do it on their own which is a requirement of the question.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Microsoft Remote Assistance (MSRA) and how does it work?
How does MSRA differ from RDP for remote support?
What are the benefits of using MSRA for help desk support?
A user reports that their mobile device is failing to install the latest OS update.
What is the most effective first step you should take to address the issue?
Check available storage on the device
Reset network settings
Verify the device's network connection
Restart the device
Answer Description
The option to check available storage on the device is the most effective step because insufficient storage is a common reason for failed updates. If the device does not have enough space to accommodate the update files, the installation will fail.
Other choices might address the issue, but are not as directly related to the immediate need to resolve the update failure. For example, restarting the device can help, but if there is insufficient storage, the update will still fail. Similarly, verifying network connectivity is relevant, but storage issues are often the more common cause.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is available storage important for installing OS updates?
What are some ways to free up storage space on a mobile device?
What happens if a device does not have enough storage for an OS update?
An IT administrator at a company discovers that several company-owned smartphones have Developer mode enabled. The administrator needs to assess the situation. What is the initial step the administrator should take to address the issue?
Run a security audit on all company-owned smartphones.
Optimize the battery settings on the devices to prevent unauthorized access.
Document which devices have Developer mode enabled and gather information on any unusual apps or modifications.
Check and perform all system updates for the affected smartphones.
Answer Description
The correct answer is to document which devices have Developer mode enabled and gather information on any unusual apps or modifications. This step is crucial as it helps in creating a record of the situation and determines if further actions, such as disabling Developer mode or performing security checks, are necessary. Checking for system updates, although important, doesn't immediately address the risks posed by having Developer mode enabled. Running a security audit is a broader action which might follow documentation but is not the first step. Optimizing battery settings is unrelated to the security risk posed by Developer mode.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Developer mode on smartphones?
What types of unusual apps should the administrator be concerned about?
Why is documenting devices with Developer mode important?
Smashing!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.