CompTIA A+ Practice Test (220-1102)
Use the form below to configure your CompTIA A+ Practice Test (220-1102). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA A+ 220-1102 (V14) Information
CompTIA A+ Certification Overview
Exam Versions
The current versions of the CompTIA A+ certification exams are:
- 220-1101 (Core 1)
- 220-1102 (Core 2)
These versions were launched in April 2022 and are expected to retire approximately three years from their release date.
The A+ Certification Test
To earn the CompTIA A+ certification, candidates must pass two separate exams: 220-1101 and 220-1102. Each exam has a separate fee and can be taken in any order. Both exams must be completed before the retirement date and must be from the same set of objectives. The certification is valid for three years from the date of passing the exams.
Exam Details:
- Format: Computer-based tests
- Number of Questions: 90 questions per exam
- Time Limit: 90 minutes per exam
- Result Availability: Immediately after completion, following a short mandatory survey
CompTIA A+ 220-1102
The CompTIA A+ 220-1102 (Core 2) exam is an essential part of the A+ certification, focusing on the software and operational aspects of IT support. Launched in April 2022, this exam tests candidates on a variety of critical topics including operating systems, security, software troubleshooting, and operational procedures. The 220-1102 exam comprises 90 questions, featuring a mix of multiple-choice and performance-based questions that simulate real-world IT scenarios. With a 90-minute time limit, candidates must efficiently demonstrate their knowledge and problem-solving skills. The exam is designed to ensure that IT professionals are well-versed in managing and troubleshooting software issues, implementing security measures, and following best practices in IT operations. Successful completion of the 220-1102, alongside the 220-1101, certifies individuals for three years, highlighting their competence and readiness to handle diverse technical challenges in the IT field.
Exam Policies and Procedures
Candidates must agree to CompTIA's exam policies before starting the test. These policies include:
- No Mobile Phones/Devices: Must be left outside the exam room
- Question Review: Candidates can revisit and change answers before submitting the exam
- Submission: Unanswered questions are marked, and a final review is available before submission
Testing Centers
Since July 9, 2012, CompTIA exams are available exclusively through Pearson VUE testing centers. Candidates can book exams online, by phone, or at the testing center. Options include:
- In-Person Testing: At Pearson VUE testing centers
- Online Testing: Through Pearson VUE's online platform
Performance-Based Questions (PBQs)
The A+ exams include Performance-Based Questions (PBQs), which require candidates to perform specific tasks or solve problems in a simulated environment. These questions test real-world skills in areas like command prompts, Windows OS, and networking environments.
Continuing Education (CE) Program
Certifications with the +CE (Continuing Education) suffix, including A+, Network+, and Security+, must be renewed every three years. Renewal options include:
- Retaking the Exam: Passing the latest version of the exam
- Higher-Level Certification: Passing a higher-level CompTIA exam
- CE Program Requirements: Completing CE activities
Lifetime Certifications
Certifications earned on or before December 31, 2010, are valid for life. However, lifetime certifications are no longer available for new candidates.
More reading:
Free CompTIA A+ 220-1102 (V14) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Operating SystemsSecuritySoftware TroubleshootingOperational Procedures
This is the part of the change management process where the change is tested by the actual users to verify that it works for the user.
Risk analysis
Change request
Change board approval
End-user acceptance
Answer Description
End-user acceptance is the phase in the change management process where the end-user tests the system after the change is completed and ensures that it doesn’t hinder everyday operations.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is end-user acceptance in change management?
Why is user testing important after a change is implemented?
What are the other steps involved in the change management process?
What type of security device must be physically carried by a user to provide an additional layer of security during the authentication process?
Hard token
One-time-password (OTP)
Mobile application
Stored static code
Answer Description
A hard token is a hardware security device that is used to prove a user's identity by generating a unique security code used during login procedures, confirming the user possesses the device. Soft tokens or mobile applications can generate codes but are software-based and distinguished from physical tokens. Static passwords or codes stored on a hard device or any irremovable media has NO dynamic generating capability hence not making them hard tokens, but rather just ineffective storage mechanisms for sensitive data (except where protected by additional security measures).
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a hard token and how does it work?
What are the differences between hard tokens and soft tokens?
Why are hard tokens preferred in certain security situations?
A new IT manager wants to ensure that all employees are aware of the company's rules regarding computer and network usage. Which document should they create and distribute?
Standard operating procedures
Incident report
Network topology diagram
Acceptable Use Policy
Answer Description
An Acceptable Use Policy (AUP) is the correct document to create and distribute in this scenario. An AUP outlines the rules and guidelines for using company computer systems and networks. It typically includes information on appropriate internet usage, email etiquette, data protection, and consequences for policy violations. This document helps protect the company's assets, maintain security, and ensure that all employees understand their responsibilities when using company resources.
While a network topology diagram is important for IT staff, it doesn't address user behavior. Standard operating procedures are more focused on specific tasks rather than overall usage policies. Incident reports are created after an event occurs, not as a preventive measure.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What should be included in an Acceptable Use Policy?
How can an Acceptable Use Policy protect a company?
What is the difference between an Acceptable Use Policy and Standard Operating Procedures?
A customer reports that their workstation has become extremely slow and they suspect it might be infected with malware. You have scheduled a maintenance session and are going to use a set of tools to diagnose and address the issue. Besides running an antivirus scan, which one of the following options is a recommended method in ensuring further protection against malware?
Disable the antivirus software temporarily to eliminate potential conflicts.
Restore the workstation from a known good backup before performing any scans.
Completely reinstall the operating system to guarantee the removal of any infections.
Ensure the antivirus definitions are up to date before proceeding with a full system scan.
Answer Description
Ensuring the antivirus definitions are up to date is critical because new malware variants are constantly being created, and up-to-date definitions are required to identify and remove them. Running a scan without updated definitions might not catch the latest threats. Restoring to a known good backup does not prevent future infections and might reintroduce the same malware if the backup is compromised. Disabling the antivirus might be performed during troubleshooting but is not a preventive measure. Completely reinstalling the operating system would eliminate current malware but does not prevent future infections and is an extreme measure that should only be taken if all other options fail.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to keep antivirus definitions up to date?
What steps should I take if my antivirus software detects malware?
What is the difference between a system restore and a full system backup?
This Microsoft Windows command line utility is a troubleshooting executable that combines the functions of 2 other network commands.
winver
pathping
netstat
net use
Answer Description
The windows command line utility, pathping combines the functions of the commands tracert and ping.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the functions of the 'tracert' command?
How does the 'ping' command work?
What is the 'pathping' utility used for?
A technician is tasked with performing a critical software update on a company's primary file server during a scheduled maintenance window. According to change management best practices, which of the following documents is most essential for minimizing downtime if the update fails and causes system instability?
Incident report
Network topology diagram
Acceptable use policy (AUP)
Rollback plan
Answer Description
A rollback plan is a critical document in change management that outlines the exact steps needed to revert a system to its last known stable state. This plan is essential for quickly recovering from a failed change, thereby minimizing operational disruption and downtime. A network topology diagram illustrates the network's layout, an Acceptable Use Policy (AUP) sets rules for users, and an incident report is created to document an issue after it has occurred; none of these are used to revert a failed update.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a rollback plan?
Why is documenting a rollback plan important?
What are the potential consequences of not having a rollback plan?
A technician needs to execute a Python file that is intended to automate the process of inventory data collection on company computers. Before running the script, what action should the technician take to ensure safety and prevent potential harm to the system?
Preview and vet the script's code to ensure that it does not contain malicious elements or operations that could harm the system.
Connect the system to a power surge protector to guard against electrical spikes during script execution.
Immediately report to management before running any script to have legal documentation.
Check the devices for the latest .NET and C++ Runtime Binaries
Answer Description
Before running any script, especially one downloaded or received from external sources, it is important to review the script's code to verify its safety and it doesn't contain any harmful elements. This precaution avoids unintentional actions like altering system settings, affecting system performance, or introducing malware. Executing foreign scripts without inspection can pose significant risks to system integrity and data security.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some common malicious elements to look for in a script?
How can I vet a Python script's code effectively?
What is the significance of reviewing scripts before execution in a corporate environment?
A small business wants to implement a backup strategy that involves storing backups both on-site and off-site. Which backup rotation scheme is most appropriate for this scenario?
Grandfather-Father-Son (GFS)
3-2-1 backup rule
Incremental backup
Full backup only
Answer Description
The 3-2-1 backup rule is the most appropriate backup rotation scheme for this scenario. This rule states that you should keep at least three copies of your data, store two backup copies on different storage media, and keep one copy off-site for disaster recovery. This strategy provides robust protection against various data loss scenarios, including hardware failures, accidental deletions, and natural disasters. It combines the benefits of on-site backups for quick recovery with off-site storage for protection against site-wide disasters. The Grandfather-Father-Son (GFS) scheme, while useful for long-term retention, doesn't specifically address the on-site and off-site requirements mentioned in the question. Full, incremental, and differential backups are types of backups rather than rotation schemes, and don't address the storage location requirements.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly do you mean by the 3-2-1 backup rule?
Why is it crucial to have both on-site and off-site backups?
What types of storage media are suitable for the 3-2-1 backup rule?
A technician is preparing a hard drive using the Master Boot Record (MBR) partitioning scheme. The client requires five separate volumes on this single drive. The technician has already created three primary partitions. What must the technician create next to accommodate the remaining required volumes?
An extended partition
A logical partition
Another primary partition
A GUID Partition Table (GPT)
Answer Description
On a disk using the Master Boot Record (MBR) scheme, a maximum of four primary partitions are allowed. To create more than four volumes, one of the four available partition slots must be used to create an extended partition. This extended partition then acts as a container within which multiple logical partitions (volumes) can be created. Since the technician has already used three primary partition slots and needs two more volumes, the next step must be to create an extended partition in the last available slot. After that, the two required logical partitions can be created inside the extended partition. Creating another primary partition would use the last slot, allowing for only one more volume in total. A logical partition cannot be created directly; it must reside within an extended partition. Converting to GPT is a different partitioning scheme entirely and not what the scenario requires.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between a primary partition and an extended partition?
Why would I need to create logical partitions?
Can you explain how to create logical partitions in an extended partition?
A network technician needs to diagnose connectivity issues between their computer and a remote server. They want to analyze the network path and determine where packet loss may be occurring.
Which command-line tool would provide the most detailed information regarding this?
pathping
ping
netstat
tracert
Answer Description
The correct command-line tool for this scenario is pathping, this is because it combines features of both ping and tracert. It not only shows the path to the server but also measures latency and packet loss at each hop along the route. This information is crucial for diagnosing where the connectivity issues may lie.
While traceroute can identify the route packets take, it does not provide the packet loss data that pathping does. Similarly, ping checks connectivity but does not analyze the path or detailed metrics.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does the command pathping do specifically?
How does pathping differ from tracert?
Can pathping replace other network tools like ping or tracert?
An employee has reported that their company-issued smartphone is experiencing unexpected application behaviors and sluggish response times. Upon inspection, you notice several unauthorized apps installed. What is the most likely explanation for these symptoms?
The device is connected to a slow network.
There is an OS compatibility issue with installed apps.
The battery needs replacement.
The device has been rooted or jailbroken.
Answer Description
Root access or jailbreaking a device allows the installation of unauthorized applications, often leading to increased security risks and performance issues. This practice can result in unauthorized changes to the system settings, increased exposure to malicious software, and can also interfere with the device's normal operations, explaining the unexpected application behaviors and sluggish performance. The other options, while possible, are less directly related to the presence of unauthorized apps and the specific symptoms described.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does it mean for a device to be rooted or jailbroken?
What are the security risks associated with installing unauthorized apps?
How can one determine if a device has been rooted or jailbroken?
A technician is tasked with updating the asset management database after several pieces of hardware were upgraded on numerous workstations. Which of the following would be the MOST important information for the technician to update in the database to ensure successful future asset tracking and management?
Technicians involved in the hardware upgrades
Asset tags and IDs
Location of ESD equipment used during upgrades
Serial numbers of old hardware components
Answer Description
Updating the 'Asset tags and IDs' information is crucial because each asset tag or ID is unique to the individual piece of hardware. By keeping these records up-to-date, the database reflects the most current status of all assets, allowing for effective tracking and management. Updating serial numbers, though important, doesn't directly reflect asset tracking for management and procurement processes. The technicians involved in upgrades and the location of ESD equipment are not as critical in asset management databases as the assets' unique identifiers.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are asset tags and IDs?
Why is it important to maintain an up-to-date asset management database?
How does asset tracking improve procurement processes?
A technician is asked to remotely restart a client's computer after office hours for maintenance purposes. The client's computer is on the same local network as the technician. Which command-line tool should the technician use to initiate the remote shutdown?
gpupdate
poweroff
netstat
powershell
shutdown
net use
Answer Description
The shutdown
command-line tool can be used to shut down or restart a local or remote machine. The various switches provided with the command can be used to specify options like remote shutdown, the delay in shutdown, and the message to be displayed to the users. netstat
is used to display networking statistics and does not have the capability to shut down a machine. gpupdate
is used to manually update group policy settings on a particular machine. net use
is utilized to connect, remove, and configure connections to shared resources, like mapped drives and network printers. poweroff
is a similar command for Linux, not Windows. powershell
is the name of a cross-platform command-line shell and scripting language created by Microsoft.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the commonly used switches with the shutdown command?
Can you explain how to perform a remote shutdown with the shutdown command?
What are other command-line tools that can be used for remote management?
A user reports frequent pop-ups while browsing websites, along with unexpected redirects to unfamiliar pages.
What would be the most effective initial action to recommend for troubleshooting this issue?
Investigate installed browser extensions for any that appear suspicious or unnecessary.
Update the browser to the latest version to ensure security patches are applied.
Disable JavaScript in the browser settings to reduce pop-ups.
Clear the browser's cache and cookies to eliminate stored data.
Answer Description
Investigate installed browser extensions for any that appear suspicious or unnecessary - This is correct. Malicious or unnecessary browser extensions are a common cause of frequent pop-ups and redirects. Identifying and removing suspicious extensions can directly address the root cause of the issue.
Clear the browser's cache and cookies to eliminate stored data - Clearing the cache and cookies can resolve some browsing issues, but it is unlikely to stop pop-ups and redirects caused by malicious extensions or malware.
Disable JavaScript in the browser settings to reduce pop-ups - Disabling JavaScript can reduce some pop-ups, but it may also break the functionality of many legitimate websites. This is not a practical or targeted solution for troubleshooting this issue.
Update the browser to the latest version to ensure security patches are applied - Updating the browser is good practice for overall security but is unlikely to resolve the specific issue of pop-ups and redirects caused by malicious extensions or adware.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are browser extensions and how can they affect my browsing experience?
How can I check if a browser extension is suspicious?
What steps should I take if I suspect my browser has malware affecting pop-ups?
An IT technician has written a custom script to perform nightly backups on company workstations. After deployment, users report frequent browser crashes and slow system performance in the mornings. Upon investigation, the technician discovers that the script is executing multiple instances of the backup process, consuming an excessive amount of system resources. Which of the following is the most appropriate action for the technician to resolve the issue?
Modify the script to include a condition that checks for running instances before initiating a new backup process to avoid running multiple simultaneous instances.
Implement a group policy to restrict the amount of RAM and CPU usage browsers are allowed, preventing them from crashing due to insufficient resources.
Advise users to close all browsers before leaving work to ensure the script can run without causing browser crashes.
Reinstall all browsers on the affected workstations, assuming that the browsers are causing the crashes.
Answer Description
To resolve the browser crashes and system performance issues, the technician should modify the script to prevent multiple instances of the backup process from running simultaneously. This action ensures that the script consumes only the necessary amount of system resources, avoiding the overutilization that leads to system crashes and performance degradation. Running the script at a time when workstations are least used and ensuring only one instance runs at a time prevents overconsumption of resources. Limiting browser functions, reinstalling the browsers, or instructing users to close their browsers do not address the underlying problem of multiple backup processes running concurrently.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a script in the context of IT and backups?
Why is it important to check for running instances in a script?
What can happen if a backup script consumes too many system resources?
Wow!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.