Weekend Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

220-1202 Sample Questions Answers

Questions 4

After completing malware removal steps, what is the next step the technician should take?

Options:

A.

Perform a secondary antivirus scan

B.

Educate the end user

C.

Reimage the computer

D.

Review system logs

Buy Now
Questions 5

A user is working from home and is unable to access work files on a company laptop. Which of the following should a technician configure to fix the network access issue?

Options:

A.

Wide-area network

B.

Wireless network

C.

Proxy network settings

D.

Virtual private network

Buy Now
Questions 6

A secretary receives an email from the CEO requesting immediate vendor payment. Later, the CEO says they never sent it. Which social engineering tactic is this?

Options:

A.

Evil twin

B.

Impersonation

C.

Whaling

D.

Spear phishing

Buy Now
Questions 7

A technician needs to provide remote support for a legacy Linux-based operating system from their Windows laptop. The solution needs to allow the technician to see what the user is doing and provide the ability to interact with the user's session. Which of the following remote access technologies would support the use case?

Options:

A.

VPN

B.

VNC

C.

SSH

D.

RDP

Buy Now
Questions 8

A customer’s laptop will not turn on. The customer is distraught and panicking because the laptop contains family pictures that can never be replaced. Which of the following communication techniques is most important for the technician to demonstrate in this situation?

Options:

A.

The technician should provide the customer with the appropriate SLA

B.

The technician should inform the customer about replacement options for an increased cost

C.

The technician should project confidence and maintain a positive attitude

D.

The technician should be dressed in appropriate business casual attire

Buy Now
Questions 9

A technician is securing a newly deployed workstation. Only authorized users should access it. Which actions should the technician take? (Select two)

Options:

A.

Defragment the hard drive

B.

Enable SSH

C.

Enable screensaver locks

D.

Disable iCloud integration

E.

Enable the firewall

F.

Apply the BIOS password

Buy Now
Questions 10

A technician is troubleshooting an issue in which a service runs momentarily and stops at certain points in the process. The technician needs to determine the root cause of this issue. Which of the following tools should the technician use?

Options:

A.

Event Viewer

B.

Task Manager

C.

Internet Options

D.

Process Explorer

Buy Now
Questions 11

Every time a user loads a specific spreadsheet, their computer is temporarily unresponsive. The user also notices that the title bar indicates the application is not responding. Which of the following would a technician most likely inspect?

Options:

A.

Anti-malware logs

B.

Workstation repair options

C.

Bandwidth status as reported in the Task Manager

D.

File size and related memory utilization

Buy Now
Questions 12

A user switches from Linux to Windows and tries to migrate data using an external USB drive. Windows prompts that the device must be formatted. It works fine on Linux. What should the user do?

Options:

A.

Configure Windows firewall to allow data from Linux systems

B.

Replace the cable with Windows-supported hardware

C.

Apply a firmware update from the PC manufacturer

D.

Update the file allocation system to exFAT

Buy Now
Questions 13

A technician is installing a cloud-based productivity suite and gets an error saying the installation is unavailable. What should be tried first?

Options:

A.

Reinstall the productivity suite

B.

Download an open-source alternative

C.

Check the license device limit

D.

Update the device OS

Buy Now
Questions 14

Why would a network engineering team provide a help desk technician with IP addresses for a wired network segment?

Options:

A.

Only specific DNS servers are allowed outbound.

B.

The network allow list is set to a specific address.

C.

DHCP is not enabled for this subnet.

D.

NAC servers only allow security updates to be installed.

Buy Now
Questions 15

A technician needs to configure laptops so that only administrators can enable virtualization technology if needed. Which of the following should the technician configure?

Options:

A.

BIOS password

B.

Guest account

C.

Screen lock

D.

AutoRun setting

Buy Now
Questions 16

A technician is attempting to join a workstation to a domain but is receiving an error message stating the domain cannot be found. However, the technician is able to ping the server and access the internet. Given the following information:

IP Address – 192.168.1.210

Subnet Mask – 255.255.255.0

Gateway – 192.168.1.1

DNS1 – 8.8.8.8

DNS2 – 1.1.1.1

Server – 192.168.1.10

Which of the following should the technician do to fix the issue?

Options:

A.

Change the DNS settings.

B.

Assign a static IP address.

C.

Configure a subnet mask.

D.

Update the default gateway.

Buy Now
Questions 17

A network technician notices that most of the company's network switches are now end-of-life and need to be upgraded. What should the technician do first?

Options:

A.

Implement the change

B.

Approve the change

C.

Document the change

D.

Schedule the change

Buy Now
Questions 18

Which of the following describes a vulnerability that has been exploited before a patch or remediation is available?

Options:

A.

Spoofing

B.

Brute-force

C.

DoS

D.

Zero-day

Buy Now
Questions 19

Which of the following is a Linux command that is used for administrative purposes?

Options:

A.

runas

B.

cmcl

C.

net user

D.

su

Buy Now
Questions 20

Users are reporting that an unsecured network is broadcasting with the same name as the normal wireless network. They are able to access the internet but cannot connect to the file share servers. Which of the following best describes this issue?

Options:

A.

Unreachable DNS server

B.

Virtual local area network misconfiguration

C.

Incorrect IP address

D.

Rogue wireless access point

Buy Now
Questions 21

A user frequently misplaces their Windows laptop and is concerned about it being stolen. The user would like additional security controls on their laptop. Which of the following is a built-in technology that a technician can use to enable full drive encryption?

Options:

A.

Active Directory

B.

New Technology File System

C.

Encrypting File System

D.

BitLocker

Buy Now
Questions 22

A company would like to deploy baseline images to new computers as they are started up on the network. Which of the following boot processes should the company use for this task?

Options:

A.

ISO

B.

Secure

C.

USB

D.

PXE

Buy Now
Questions 23

You have been contacted through the help desk chat application. A user is setting up a replacement SOHO router. Assist the user with setting up the router.

INSTRUCTIONS

Select the most appropriate statement for each response. Click the send button after each response to continue the chat.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Questions 24

Which of the following is used to apply corporate restrictions on an Apple device?

Options:

A.

App Store

B.

VPN configuration

C.

Apple ID

D.

Management profile

Buy Now
Questions 25

A technician installs VPN client software that has a software bug from the vendor. After the vendor releases an update to the software, the technician attempts to reinstall the software but keeps getting an error message that the network adapter for the VPN already exists. Which of the following should the technician do next to mitigate this issue?

Options:

A.

Run the latest OS security updates.

B.

Map the network adapter to the new software.

C.

Update the network adapter's firmware.

D.

Delete hidden network adapters.

Buy Now
Questions 26

A user wants to use a USB to move a 4.57GB .pst file from one Windows computer to another. Which of the following filesystems should the USB be formatted with?

Options:

A.

ext4

B.

NTFS

C.

FAT32

D.

APFS

Buy Now
Questions 27

Which of the following filesystem types does the Linux OS use?

Options:

A.

exFAT

B.

APFS

C.

ext4

D.

NTFS

Buy Now
Questions 28

A technician needs to download and install a new web browser on a desktop. Which attribute should be used to verify the installer's authenticity?

Options:

A.

Date

B.

Hash

C.

Size

D.

Name

Buy Now
Questions 29

An administrator must rename the administrator account on a Windows desktop. Which tool is best for this?

Options:

A.

lusrmgr.msc

B.

devmgmt.msc

C.

gpedit.msc

D.

eventvwr.msc

Buy Now
Questions 30

Which of the following concepts should a technician consider when discussing confidential work projects with individuals outside the company?

Options:

A.

EULA

B.

EOL

C.

SLA

D.

NDA

Buy Now
Questions 31

Which of the following is the quickest way to move from Windows 10 to Windows 11 without losing data?

Options:

A.

Using gpupdate

B.

Image deployment

C.

Clean install

D.

In-place upgrade

Buy Now
Questions 32

Which of the following methods would make data unrecoverable but allow the drive to be repurposed?

Options:

A.

Deleting the partitions

B.

Implementing EFS

C.

Performing a low-level format

D.

Degaussing the device

Buy Now
Questions 33

Multiple users clicked a phishing link from a compromised email account. The security team isolates and removes the threat. Then, the management team provides security awareness training to the company. What step is this?

Options:

A.

Provide user education.

B.

Compile lessons learned.

C.

Update the antivirus software.

D.

Perform additional scans.

Buy Now
Questions 34

A technician is preparing to replace the batteries in a rack-mounted UPS system. After ensuring the power is turned off and the batteries are fully discharged, the technician needs to remove the battery modules from the bottom of the rack. Which of the following steps should the technician take?

Options:

A.

Ensure the fire suppression system is ready to be activated.

B.

Use appropriate lifting techniques and guidelines.

C.

Place the removed batteries in an antistatic bag.

D.

Wear a face mask to filter out any harmful fumes.

Buy Now
Questions 35

A user's application only works with a legacy version of the OS. The OS is reaching its end-of-life date. For security reasons, the company is migrating to the current version of the OS. Which of the following is the most efficient way to complete the migration while maintaining accessibility to the application?

Options:

A.

Terminal server

B.

Bare-metal server

C.

Multiboot

D.

Virtualization

Buy Now
Questions 36

Performance on a user’s smartphone is degrading. Applications take a long time to start, and switching between windows also takes a long time. Which of the following diagnostic steps should a mobile technician take first?

Options:

A.

Restore the phone to factory settings

B.

Restart the phone

C.

Check the phone’s battery state

D.

Uninstall unneeded applications

Buy Now
Questions 37

Various alerts on a user's Windows 11 laptop are continually interrupting videoconference calls. Which of the following should a support technician recommend to best solve the issue?

Options:

A.

Use multiple sound output devices for the various source applications

B.

Disable all notifications in different applications in the order they appear

C.

Configure the Sounds option in Control Panel to be set to No Sounds

D.

Set Windows Notifications settings to Do Not Disturb

Buy Now
Questions 38

A user has rooted their corporate phone to load unapproved software. Which of the following tools should the company use to prevent access to the corporate network?

Options:

A.

Mobile device management

B.

Encryption

C.

Geofencing

D.

Lock screen

Buy Now
Questions 39

An administrator is investigating a zero-day vulnerability. If left unpatched, it could severely impact business. The patch requires downtime. What should the administrator do?

Options:

A.

Create a standard change request.

B.

Implement an emergency change.

C.

Immediately freeze all changes.

D.

Continue operations until the next change interval.

Buy Now
Questions 40

As a corporate technician, you are asked to evaluate several suspect email messages on a client's computer. Corporate policy requires the following:

>All phishing attempts must be reported.

>Future spam emails to users must be prevented.

INSTRUCTIONS

Review each email and perform the following within the email:

>Classify the emails

>Identify suspicious items, if applicable, in each email

>Select the appropriate resolution

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Questions 41

Which of the following filesystems supports read and write operations for Windows, macOS, and Linux?

Options:

A.

exFAT

B.

ReFS

C.

NTFS

D.

APFS

E.

ext4

Buy Now
Questions 42

An application's performance is degrading over time. The application is slowing, but it never gives an error and does not crash. Which of the following tools should a technician use to start troubleshooting?

Options:

A.

Reliability history

B.

Computer management

C.

Resource monitor

D.

Disk

Buy Now
Questions 43

A customer wants to be able to work from home but does not want to be responsible for bringing company equipment back and forth. Which of the following would allow the user to remotely access and use a Windows PC at the main office? (Choose two.)

Options:

A.

SPICE

B.

SSH

C.

RDP

D.

VPN

E.

RMM

F.

WinRM

Buy Now
Questions 44

A Chief Executive Officer wants to meet with remote employees in a way that will allow for communication and training. Which of the following software technologies is the best for this situation?

Options:

A.

Videoconferencing

B.

Screen sharing

C.

Remote Desktop

D.

Virtual desktop infrastructure

Buy Now
Questions 45

A secretary receives an email from the company's chief executive officer with a request to pay a vendor immediately. After the payment is made, the CEO informs the secretary that they never sent that email. Which of the following social engineering tactics best describes this type of attack?

Options:

A.

Evil twin

B.

Impersonation

C.

Whaling

D.

Spear phishing

Buy Now
Questions 46

A user reports getting a BSOD (Blue Screen of Death) error on their computer at least twice a day. Which of the following should the technician use to determine the cause?

Options:

A.

Event Viewer

B.

Performance Monitor

C.

System Information

D.

Device Manager

Buy Now
Questions 47

After a user installs a mobile application from an advertisement, the phone's battery dies a few hours later, and it is hot to the touch, even when not in use. Which of the following should a technician do first?

Options:

A.

Check for unauthorized device administrators

B.

Contact the software developer

C.

Run a mobile malware scan on the phone

D.

Ensure appropriate MDM policies are applied

Buy Now
Exam Code: 220-1202
Exam Name: CompTIA A+ Core 2 2025 Exam
Last Update: Aug 14, 2025
Questions: 157
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now 220-1202