CompTIA A+ Practice Test (220-1102)
Use the form below to configure your CompTIA A+ Practice Test (220-1102). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA A+ 220-1102 (V14) Information
CompTIA A+ Certification Overview
Exam Versions
The current versions of the CompTIA A+ certification exams are:
- 220-1101 (Core 1)
- 220-1102 (Core 2)
These versions were launched in April 2022 and are expected to retire approximately three years from their release date.
The A+ Certification Test
To earn the CompTIA A+ certification, candidates must pass two separate exams: 220-1101 and 220-1102. Each exam has a separate fee and can be taken in any order. Both exams must be completed before the retirement date and must be from the same set of objectives. The certification is valid for three years from the date of passing the exams.
Exam Details:
- Format: Computer-based tests
- Number of Questions: 90 questions per exam
- Time Limit: 90 minutes per exam
- Result Availability: Immediately after completion, following a short mandatory survey
CompTIA A+ 220-1102
The CompTIA A+ 220-1102 (Core 2) exam is an essential part of the A+ certification, focusing on the software and operational aspects of IT support. Launched in April 2022, this exam tests candidates on a variety of critical topics including operating systems, security, software troubleshooting, and operational procedures. The 220-1102 exam comprises 90 questions, featuring a mix of multiple-choice and performance-based questions that simulate real-world IT scenarios. With a 90-minute time limit, candidates must efficiently demonstrate their knowledge and problem-solving skills. The exam is designed to ensure that IT professionals are well-versed in managing and troubleshooting software issues, implementing security measures, and following best practices in IT operations. Successful completion of the 220-1102, alongside the 220-1101, certifies individuals for three years, highlighting their competence and readiness to handle diverse technical challenges in the IT field.
Exam Policies and Procedures
Candidates must agree to CompTIA's exam policies before starting the test. These policies include:
- No Mobile Phones/Devices: Must be left outside the exam room
- Question Review: Candidates can revisit and change answers before submitting the exam
- Submission: Unanswered questions are marked, and a final review is available before submission
Testing Centers
Since July 9, 2012, CompTIA exams are available exclusively through Pearson VUE testing centers. Candidates can book exams online, by phone, or at the testing center. Options include:
- In-Person Testing: At Pearson VUE testing centers
- Online Testing: Through Pearson VUE's online platform
Performance-Based Questions (PBQs)
The A+ exams include Performance-Based Questions (PBQs), which require candidates to perform specific tasks or solve problems in a simulated environment. These questions test real-world skills in areas like command prompts, Windows OS, and networking environments.
Continuing Education (CE) Program
Certifications with the +CE (Continuing Education) suffix, including A+, Network+, and Security+, must be renewed every three years. Renewal options include:
- Retaking the Exam: Passing the latest version of the exam
- Higher-Level Certification: Passing a higher-level CompTIA exam
- CE Program Requirements: Completing CE activities
Lifetime Certifications
Certifications earned on or before December 31, 2010, are valid for life. However, lifetime certifications are no longer available for new candidates.
More reading:
Free CompTIA A+ 220-1102 (V14) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Operating SystemsSecuritySoftware TroubleshootingOperational Procedures
A user's computer has been infected with malware. After updating the anti-malware software, which of the following scanning and removal techniques should be used to remediate the infected system?
Scan and remove the malware in normal mode
Boot into a preinstallation environment and remove the malware
Scan and remove the malware in safe mode
Reformat the drive and reinstall the operating system
Answer Description
Scanning and removing malware in safe mode is the best approach because it starts Windows in a minimal state, loading only essential drivers and services. This prevents most malware from running, making it easier for the anti-malware software to detect and remove the threat. Scanning in normal mode may allow the malware to continue running and interfering with the removal process. While a preinstallation environment can be useful for severe infections, it's not typically necessary for most malware removal scenarios. Reformatting the drive should be considered a last resort, as it will erase all data on the drive.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is safe mode more effective for scanning and removing malware?
What should I know about booting into a preinstallation environment for malware removal?
Why should I avoid reformatting my drive unless absolutely necessary?
You installed an updated driver that made your Windows OS unstable and are regularly experiencing the BSOD. What would you use to go back to a state before the installation?
Re-image
Run
C:\System32\updates.exe /rollback:last
from the BSOD screenSystem file check
System restore
Answer Description
System restore is a part of the Windows OS that allows you to restore your PC to a previous state. The available states are called restore points. A restore point is usually made after a significant change is made to the system.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are restore points?
How do I create a restore point in Windows?
What should I do if system restore fails?
What is the command-line tool for switching directories on Microsoft Windows?
cd
Answer Description
cd
is the command line tool on Windows for Changing Directories. For example cd C:\System32
would switch Command Prompt to the System32 directory on the C: Drive.
Note: The chdir command was replaced by CD. chdir
is also not in the CompTIA objectives.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'cd' stand for?
Can you use 'cd' to navigate to a directory on a different drive?
Are there any other useful command-line tools for file navigation in Windows?
Your client's workstation is experiencing frequent and unexplained reboots. After verifying there is no overheating and ensuring all hardware components are properly seated, which of the following Windows tools should you use first to further troubleshoot the system instability?
Set up counters in Performance Monitor to track system performance.
Use the Reliability Monitor to review system stability history.
Perform a System Restore to revert the computer to an earlier state.
Run the Disk Defragmenter to optimize file placement on hard drives.
Answer Description
The Reliability Monitor is a Windows utility that provides a timeline of system events and reliability history, including hardware and software failures, warnings, and informational events. It is especially useful in diagnosing intermittent problems such as unexplained reboots, and might provide insight into the cause of the instability. A Disk Defragmenter is not typically related to system reboots, System Restore would revert the system to a previous point which could remove recent updates or changes that are causing issues, but it's not a diagnostic tool. The Performance Monitor is a more advanced tool for system performance analysis and wouldn't necessarily provide clear insights on sudden reboots.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly does the Reliability Monitor show?
How do I access the Reliability Monitor in Windows?
What other Windows tools can help diagnose system stability issues?
You are writing a script to back up the entire folder C:\Data to D:\Archive. The backup must include every file and all empty subfolders. Which switch combination should you add to the xcopy command to meet this requirement?
/s /e
/t /e
/d /y
/s
Answer Description
The correct switch combination is /s /e. The /s switch copies directories and subdirectories but skips any that are empty. Adding /e extends the operation so that even empty directories are included, ensuring a complete replica of the source folder tree.
Why the other options are wrong:
- /s by itself omits empty directories, so the folder structure would be incomplete.
- /t /e copies only the directory structure (no files), which does not meet the requirement to copy every file.
- /d /y limits the copy to newer files (relative to the destination) and merely suppresses overwrite prompts; it does not guarantee empty directories will be copied.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What options does the xcopy command have for copying files?
How does xcopy differ from the basic copy command?
In what scenarios would using xcopy be more beneficial than other copy methods?
A technician is tasked with updating the asset management database after several pieces of hardware were upgraded on numerous workstations. Which of the following would be the MOST important information for the technician to update in the database to ensure successful future asset tracking and management?
Serial numbers of old hardware components
Technicians involved in the hardware upgrades
Location of ESD equipment used during upgrades
Asset tags and IDs
Answer Description
Updating the 'Asset tags and IDs' information is crucial because each asset tag or ID is unique to the individual piece of hardware. By keeping these records up-to-date, the database reflects the most current status of all assets, allowing for effective tracking and management. Updating serial numbers, though important, doesn't directly reflect asset tracking for management and procurement processes. The technicians involved in upgrades and the location of ESD equipment are not as critical in asset management databases as the assets' unique identifiers.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are asset tags and IDs?
Why is it important to maintain an up-to-date asset management database?
How does asset tracking improve procurement processes?
What Windows command is used for disk partitioning and volume management tasks in the command-line interface?
diskpart
Answer Description
diskpart is a Windows command-line utility designed for disk partitioning and volume management. It provides a suite of commands allowing users to create, delete, format, and resize partitions on storage devices, offering a flexible and powerful tool for managing disk configurations through the command-line interface.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What types of tasks can I perform using diskpart?
What is the difference between basic and dynamic disks in Windows?
What precautions should I take when using diskpart?
Which utility would you use to manage the installation and removal of programs on a Windows 10 computer?
Device Manager
Programs and Features
User Accounts
Network and Sharing Center
Answer Description
The correct choice is Programs and Features, which allows users to uninstall or modify installed applications.
User Accounts is focused on managing account settings and permissions.
Device Manager is used for hardware device management.
Network and Sharing Center is for configuring network connections and settings, making them unsuitable for program management.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What specifically can you do in Programs and Features?
How is Device Manager different from Programs and Features?
Can you access Programs and Features through other methods?
A technician is auditing a small office's wireless network and discovers it is using Wired Equivalent Privacy (WEP) for encryption. Which of the following is the PRIMARY reason the technician should immediately recommend upgrading the security protocol?
WEP reduces the maximum data transfer rate of the wireless network.
WEP is incompatible with most modern devices and operating systems.
WEP has significant, well-known vulnerabilities and is considered insecure.
WEP requires an enterprise authentication server to function correctly.
Answer Description
Wired Equivalent Privacy (WEP) is a deprecated wireless security standard with numerous documented vulnerabilities that make it easy to compromise. It was officially retired by the Wi-Fi Alliance in 2004 and has been superseded by more secure protocols like WPA2 and WPA3. While some modern devices may lack support for WEP, the primary reason to avoid it is its lack of security. Performance impact and authentication methods are secondary concerns compared to the fundamental security flaws.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does WEP stand for and why is it considered weak?
What are WPA and WPA2, and how do they improve on WEP?
What are 'successful attacks' on WEP networks?
What is a common purpose of a door lock in a security system?
Provides an automated opening mechanism for convenience
Acts as a visual deterrent but does not secure a door
Secures physical entry points to prevent unauthorized access
Allows remote access to areas without permission requirements
Answer Description
To restrict access and provide security - This is correct. The primary purpose of a physical barrier, such as a fence, wall, or gate, is to prevent unauthorized access to a property and enhance security by deterring intruders or controlling entry points.
To provide aesthetic landscaping - While some barriers may have aesthetic value, this is not their primary purpose. Their main function is security and access control.
To create an area for recreational activities - Recreational areas may include barriers for safety or organization, but the primary function of a security barrier is to restrict access, not to create recreational spaces.
To inform visitors of rules and regulations - Informing visitors of rules and regulations is typically achieved through signage, not physical barriers.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some common types of door locks in security systems?
How do door locks prevent unauthorized access?
What role do door locks play in the overall security of a property?
While troubleshooting a Windows 10 desktop that users report has become noticeably sluggish over the last week, a junior technician immediately concludes that the hard drive is failing and recommends replacement. Which of the following statements BEST explains why this conclusion may be premature?
Windows automatically disables underperforming hardware; therefore the hard drive must already have been disabled.
Any sluggish performance indicates that the motherboard is at end of life and must be replaced immediately.
Sluggish performance can result from software conflicts, resource exhaustion, or malware, so additional diagnostics are required before replacing hardware.
Solid-state drives never cause slow performance, so the issue cannot be storage related at all.
Answer Description
Sluggish performance can be caused by many non-hardware factors, including excessive background processes, insufficient RAM, outdated software, or malware infections. Because these software and resource issues are common, a technician should check Task Manager, perform malware scans, and review update status before blaming hardware. Replacing parts without these checks can waste time and money.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are common software issues that can cause sluggish performance?
How can malware affect system performance, and what are the signs?
What diagnostic tools can help identify performance issues in a system?
A user reports that their computer has been running slowly and they have noticed unfamiliar pop-ups appearing on their screen. Which of the following is the most likely cause of these issues?
A misconfigured firewall
Malware infection
An outdated operating system
A hardware failure
Answer Description
Malware infections often manifest as performance issues and the appearance of unwanted pop-ups or advertisements. The pop-ups are often disguised as legitimate programs or warnings to trick users.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is malware and how does it affect my computer?
How can I identify if my computer has malware?
What steps can I take to remove malware from my computer?
A user with a Windows 10 laptop has asked the IT Department to upgrade her device to Windows 11 Pro. Which of the following tasks should a technician perform FIRST?
Verify the laptop meets the hardware requirements for Windows 11.
Run the Windows Update utility.
Purchase a valid Windows 11 Pro license key.
Back up the user's data to an external drive.
Answer Description
Before attempting any OS upgrade, the first step is to verify that the hardware meets the minimum system requirements for the new OS. Windows 11 has strict hardware requirements, such as specific CPU models and the need for TPM 2.0, that many older Windows 10 machines do not meet. While purchasing a license and backing up data are often necessary steps in an upgrade process, they should only be performed after confirming the hardware is compatible. Therefore, verifying the system requirements is the correct initial action.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the minimum system requirements for Windows 11 Pro?
What is TPM and why is it required for Windows 11?
How do I verify if my laptop meets the upgrade requirements for Windows 11?
A client approaches an IT technician for assistance with jailbreaking an iOS device. The client wants to install apps not available on the Apple App Store and customize the user interface beyond what is typically allowed. Which of the following is the MOST important consideration the technician should inform the client about before proceeding with jailbreaking the device?
Jailbreaking is officially supported by Apple and can be done directly through iTunes.
Jailbreaking is a reversible process and can always be undone without any consequences.
Jailbreaking an iOS device will significantly enhance the device's battery life and performance.
Jailbreaking can lead to security vulnerabilities and may void the device's warranty.
Answer Description
Jailbreaking an iOS device involves removing the restrictions imposed by Apple, allowing the user to install apps not available on the App Store and make other modifications to the operating system. This process can introduce security risks, as it bypasses many of the safeguards put in place by Apple. Additionally, jailbreaking an iOS device typically voids its warranty. It is crucial for the technician to inform the client about these potential risks and consequences before proceeding with jailbreaking.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the security vulnerabilities associated with jailbreaking?
How does jailbreaking affect the warranty of an iOS device?
What are the benefits of jailbreaking an iOS device?
What is typically a primary sign of a compromised file structure in an operating system?
Increased system boot time
Missing or renamed files
Security alerts from the operating system
Recent application updates
Answer Description
When files are missing or renamed, it can disrupt application functionality and system operations, indicating potential issues such as malware activity or accidental user actions. This situation suggests that the integrity of the system or personal files has been compromised.
The other answer options do not specifically relate to file structure integrity.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some common reasons for files to go missing or be renamed?
How can I check for missing or renamed files in my operating system?
What steps should I take if I suspect a compromised file structure?
Gnarly!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.