CompTIA A+ Practice Test (220-1102)
Use the form below to configure your CompTIA A+ Practice Test (220-1102). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA A+ 220-1102 (V14) Information
CompTIA A+ Certification Overview
Exam Versions
The current versions of the CompTIA A+ certification exams are:
- 220-1101 (Core 1)
- 220-1102 (Core 2)
These versions were launched in April 2022 and are expected to retire approximately three years from their release date.
The A+ Certification Test
To earn the CompTIA A+ certification, candidates must pass two separate exams: 220-1101 and 220-1102. Each exam has a separate fee and can be taken in any order. Both exams must be completed before the retirement date and must be from the same set of objectives. The certification is valid for three years from the date of passing the exams.
Exam Details:
- Format: Computer-based tests
- Number of Questions: 90 questions per exam
- Time Limit: 90 minutes per exam
- Result Availability: Immediately after completion, following a short mandatory survey
CompTIA A+ 220-1102
The CompTIA A+ 220-1102 (Core 2) exam is an essential part of the A+ certification, focusing on the software and operational aspects of IT support. Launched in April 2022, this exam tests candidates on a variety of critical topics including operating systems, security, software troubleshooting, and operational procedures. The 220-1102 exam comprises 90 questions, featuring a mix of multiple-choice and performance-based questions that simulate real-world IT scenarios. With a 90-minute time limit, candidates must efficiently demonstrate their knowledge and problem-solving skills. The exam is designed to ensure that IT professionals are well-versed in managing and troubleshooting software issues, implementing security measures, and following best practices in IT operations. Successful completion of the 220-1102, alongside the 220-1101, certifies individuals for three years, highlighting their competence and readiness to handle diverse technical challenges in the IT field.
Exam Policies and Procedures
Candidates must agree to CompTIA's exam policies before starting the test. These policies include:
- No Mobile Phones/Devices: Must be left outside the exam room
- Question Review: Candidates can revisit and change answers before submitting the exam
- Submission: Unanswered questions are marked, and a final review is available before submission
Testing Centers
Since July 9, 2012, CompTIA exams are available exclusively through Pearson VUE testing centers. Candidates can book exams online, by phone, or at the testing center. Options include:
- In-Person Testing: At Pearson VUE testing centers
- Online Testing: Through Pearson VUE's online platform
Performance-Based Questions (PBQs)
The A+ exams include Performance-Based Questions (PBQs), which require candidates to perform specific tasks or solve problems in a simulated environment. These questions test real-world skills in areas like command prompts, Windows OS, and networking environments.
Continuing Education (CE) Program
Certifications with the +CE (Continuing Education) suffix, including A+, Network+, and Security+, must be renewed every three years. Renewal options include:
- Retaking the Exam: Passing the latest version of the exam
- Higher-Level Certification: Passing a higher-level CompTIA exam
- CE Program Requirements: Completing CE activities
Lifetime Certifications
Certifications earned on or before December 31, 2010, are valid for life. However, lifetime certifications are no longer available for new candidates.
More reading:
Free CompTIA A+ 220-1102 (V14) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Operating SystemsSecuritySoftware TroubleshootingOperational Procedures
What is the primary purpose of an asset tag in asset management?
To uniquely identify and track equipment
To enhance the physical security of a device
To encrypt the data stored on the device
To ensure the device is compatible with other devices in the network
Answer Description
An asset tag is used to uniquely identify and track equipment within an organization. This helps in maintaining an accurate inventory and facilitates efficient management of assets, including warranty and licensing details. Asset tags can be barcodes, RFID tags, or other forms of identification.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the different types of asset tags used in asset management?
How does an asset tag improve inventory management?
What role do asset tags play in maintaining device security?
A small office/home office (SOHO) network administrator needs to secure the wireless network to prevent unauthorized access to internal resources. What is the BEST action to take to achieve this?
Disable Universal Plug and Play (UPnP) on the router.
Enable WiFi Protected Access 3 (WPA3) encryption.
Limit the wireless access by filtering the MAC addresses.
Change the default service set identifier (SSID) and disable SSID broadcast.
Answer Description
Enabling WPA3 on the wireless network provides robust security through stronger encryption protocols and represents the most up-to-date security standard among listed options, thus effectively preventing unauthorized access while maintaining the integrity of the network's internal resources. Changing the SSID and disabling the SSID broadcast may obscure the network but do not provide encryption or truly secure the network. While disabling UPnP might reduce the surface for potential exploitation, it does not directly prevent unauthorized access to the network.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is WPA3 encryption and how does it enhance security?
What are the risks of leaving the default SSID and broadcasting it?
Why is MAC address filtering not sufficient for securing a wireless network?
An employee at a design firm uses an iPad for creating visual content while traveling. They've reported that they cannot install a particular application despite having sufficient storage space. The application is known to be compatible with the latest version of iPadOS. What should you check next to resolve this issue?
Verify that the device's screen size is compatible with the application.
Check the Screen Time settings for any restrictions on app installations.
Check if the Wi-Fi signal is strong enough to download applications.
Ensure that the device is set to the correct date and time.
Answer Description
Since the iPad has sufficient storage and the application is compatible with the latest version of iPadOS, the next logical step would be to check restrictions in place that may prevent application installations. Restrictions can be set in the iPad’s settings to limit what a user can do, such as installing apps. This is common in professional settings where an organization may want to ensure security and limit the use of unvetted applications.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are Screen Time settings and how do they affect app installations?
How can the restrictions on app installations be bypassed if I have no access to administrator rights?
What should I do if Screen Time settings are not the problem?
In Windows 10 Pro, which statement correctly differentiates BitLocker from the Encrypting File System (EFS)?
BitLocker encrypts entire volumes, while EFS encrypts individual files and folders.
BitLocker relies on the NTFS file system, while EFS works on FAT32 and exFAT volumes.
EFS requires a TPM chip, whereas BitLocker does not.
BitLocker is available only in Windows Home, whereas EFS is available only in Windows Pro and Enterprise.
Answer Description
BitLocker is designed for full-volume encryption, protecting the entire drive (and is often paired with a TPM for pre-boot integrity), whereas EFS provides file- and folder-level encryption on NTFS volumes. The other options mix up edition availability, file-system support, and hardware requirements.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is BitLocker and how does it work?
What is EFS and how is it different from BitLocker?
Are there similar encryption solutions for Linux and Mac?
Which Windows utility lets you revert system files, installed applications, the registry, and other system settings to a previously created restore point-without affecting personal user documents?
Computer Management
Windows Easy Transfer
Task Manager
System Restore
Answer Description
System Restore creates snapshots called restore points and can roll the operating system back to the selected point in time. This process restores system files, the registry, installed applications, drivers, and Windows updates but does not modify personal data such as documents or photos. Task Manager is used to view and end running processes, Windows Easy Transfer was a migration tool for copying data between PCs, and Computer Management is an MMC console that aggregates several administrative snap-ins.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is System Restore in Windows?
How does System Restore create restore points?
What should I do if System Restore fails to fix my issue?
What technology can be used to reduce the amount of phishing emails received by your companies end users?
Antivirus
Port Firewall
Spam Filter
Antimalware
Answer Description
A Spam Filter is a common feature of email clients and email servers. It will automatically detect and quarantine emails believed to be malicious or simply unhelpful (e.g. junk mail).
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does a spam filter identify phishing emails?
What are common features of a spam filter?
What is the difference between spam filters and antivirus software?
What is the primary purpose of video surveillance in a security context?
To monitor and record activities
To provide biometric authentication
To control access to restricted areas
To detect unauthorized network access
Answer Description
The primary purpose of video surveillance is to monitor and record activities within a specific area. These recordings can be used to deter criminal activities, provide evidence in case of incidents, and ensure the safety of the premises.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What types of activities can video surveillance monitor?
How do video surveillance systems deter criminal activity?
What role does video surveillance play in incident investigation?
A user reports that they are seeing numerous pop-ups and fake alerts about viruses on their device.
What should you inform them to do first in order to protect their system?
Turn off any antivirus software.
Do not interact with the pop-ups.
Reset the device to factory settings.
Answer Description
Instructing the user to not interact with suspicious pop-ups is essential for preventing potential security threats. These pop-ups can lead to malware downloads or phishing attempts. By advising them to avoid engagement, the user helps maintain the integrity of their system and mitigates risks associated with malicious software or misleading prompts.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important not to interact with pop-ups?
What are some common types of pop-ups users might encounter?
What steps should I take to further protect my system after avoiding the pop-ups?
Which feature allows an administrator to edit policies that control user settings and system behaviors at a granular level?
Registry Editor (regedit.exe)
Device Manager (devmgmt.msc)
Group Policy Editor (gpedit.msc)
Task Scheduler (taskschd.msc)
Answer Description
The Group Policy Editor (gpedit.msc) provides a way for administrators to configure settings that can affect user accounts, system configurations, security settings, and more.
The other options listed do not provide access to edit these specific policies; instead, they relate to different functionalities in Windows that do not focus on policy management.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Group Policy Editor (gpedit.msc)?
How do Group Policies affect users and systems?
What are the differences between Group Policy Editor and Registry Editor?
An employee within a company wishes to use a software package for creating diagrams and flowcharts, which he has personally purchased for home use. The company's IT policy requires software to be properly licensed for corporate use. What is the BEST course of action to remain compliant with licensing regulations?
Install the software on multiple office computers until the company decides to purchase bulk licenses.
Ask the employee only to use the software after hours to avoid interference with corporate policy.
Obtain a corporate use license for the software to be used within the company.
Use the employee's personal license at the office, since it is already paid for.
Answer Description
The correct answer involves understanding the difference between personal use licenses and corporate use licenses. Personal use licenses are typically meant for non-commercial, individual use and do not extend to business or enterprise environments. Therefore, even if an employee has a personal license for a software, it cannot be legally used for corporate purposes without obtaining the appropriate corporate license. The other options attempt to sidestep proper licensing protocols, which could lead to legal issues and non-compliance with software licensing agreements.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a corporate use license?
What are the differences between personal and corporate use licenses?
What could happen if the company does not comply with licensing regulations?
What Windows command is used for disk partitioning and volume management tasks in the command-line interface?
diskpart
Answer Description
diskpart is a Windows command-line utility designed for disk partitioning and volume management. It provides a suite of commands allowing users to create, delete, format, and resize partitions on storage devices, offering a flexible and powerful tool for managing disk configurations through the command-line interface.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What types of tasks can I perform using diskpart?
What is the difference between basic and dynamic disks in Windows?
What precautions should I take when using diskpart?
Which term refers to a logically separate portion of a single physical hard drive?
Virtual Volume
Stateful Drive
Partition
Virtual Drive
Answer Description
Partitioning is the act of logically separating a single physical disk. Allowing an Operating System to perceive a hard drive as multiple hard drives.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is partitioning in the context of hard drives?
What are the benefits of creating partitions on a hard drive?
How does partitioning affect data security and recovery?
A technician is trying to setup a non-domain user account on a workstation, but receives the following error message "Password does not meet the complexity requirements." Which of the following utilities should the technician use to identify the criteria?
Performance Monitor
Local Security Policy
MSCONFIG
Users and Groups
Answer Description
Because this is a non-domain (local) user account the Local Security Policy is the cause of the issue. Accessing the policy to determine account requirements will solve the problem.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are password complexity requirements?
How can I access the Local Security Policy on my workstation?
What is the difference between domain and non-domain user accounts?
A technician is troubleshooting a Windows PC that displays frequent notifications stating the firewall has been disabled. The user confirms they did not make any changes to the security settings. Which of the following is the MOST likely cause for these alerts?
A conflicting third-party security application
User profile corruption
Malware infection
A recent OS update failed
Answer Description
A primary tactic of many malware variants is to disable system security features, including the firewall and anti-malware software, to prevent detection and removal. While a conflicting third-party security application could legitimately disable the Windows firewall, or a failed OS update could cause system instability, unsolicited and repeated notifications of this nature are a classic and high-priority symptom of a malware infection. A corrupted user profile is less likely to cause this specific behavior.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some common signs of malware infection?
How does malware disable a firewall?
What steps should I take if I suspect malware on my system?
A network administrator is tasked with managing user accounts on a Windows machine.
They need to determine the details of a user named 'JohnDoe'. Which command should they use?
whoami JohnDoe
net user JohnDoe
net accounts JohnDoe
netstat JohnDoe
Answer Description
The correct command is 'net user JohnDoe', which retrieves information about the specified user account, including group membership and status.
The other commands listed do not provide user account details in this context. For example, 'whoami' displays the currently logged-in user, while 'netstat' is used for network statistics and connections.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the function of the 'net user' command?
What does 'whoami' do, and why is it not suitable for this task?
What are the differences between 'netstat' and 'net accounts' commands?
That's It!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.