CompTIA 220-1102 CompTIA A+ Certification Core 2 Exam Online Training
CompTIA 220-1102 Online Training
The questions for 220-1102 were last updated at Feb 23,2025.
- Exam Code: 220-1102
- Exam Name: CompTIA A+ Certification Core 2 Exam
- Certification Provider: CompTIA
- Latest update: Feb 23,2025
Which of the following only has a web browser interface?
- A . Linux
- B . Microsoft Windows
- C . iOS
- D . Chromium
An administrator has submitted a change request for an upcoming server deployment.
Which of the following must be completed before the change can be approved?
- A . Risk analysis
- B . Sandbox testing
- C . End user acceptance
- D . Lessons learned
A developer is creating a shell script to automate basic tasks in Linux.
Which of the following file types are supported by default?
- A . .py
- B . .js
- C . .vbs
- D . .sh
A change advisory board just approved a change request.
Which of the following is the MOST likely next step in the change process?
- A . End user acceptance
- B . Perform risk analysis
- C . Communicate to stakeholders
- D . Sandbox testing
Which of the following is the STRONGEST wireless configuration?
- A . WPS
- B . WPA3
- C . WEP
- D . WMN
A customer calls a service support center and begins yelling at a technician about a feature for a product that is not working to the customer’s satisfaction. This feature is not supported by the service support center and requires a field technician to troubleshoot. The customer continues to demand service.
Which of the following is the BEST course of action for the support center representative to take?
- A . Inform the customer that the issue is not within the scope of this department.
- B . Apologize to the customer and escalate the issue to a manager.
- C . Ask the customer to explain the issue and then try to fix it independently.
- D . Respond that the issue is something the customer should be able to fix.
A user calls the help desk to report that none of the files on a PC will open. The user also indicates a program on the desktop is requesting payment in exchange for file access A technician verifies the user’s PC is infected with ransorrrware.
Which of the following should the technician do FIRST?
- A . Scan and remove the malware
- B . Schedule automated malware scans
- C . Quarantine the system
- D . Disable System Restore
A new spam gateway was recently deployed at a small business However; users still occasionally receive spam. The management team is concerned that users will open the messages and potentially
infect the network systems.
Which of the following is the MOST effective method for dealing with this Issue?
- A . Adjusting the spam gateway
- B . Updating firmware for the spam appliance
- C . Adjusting AV settings
- D . Providing user training
A user calls the help desk to report that Windows installed updates on a laptop and rebooted overnight. When the laptop started up again, the touchpad was no longer working. The technician thinks the software that controls the touchpad might be the issue.
Which of the following tools should the technician use to make adjustments?
- A . eventvwr.msc
- B . perfmon.msc
- C . gpedic.msc
- D . devmgmt.msc
In which of the following scenarios would remote wipe capabilities MOST likely be used? (Select TWO).
- A . A new IT policy requires users to set up a lock screen PIN.
- B . A user is overseas and wants to use a compatible international SIM Card.
- C . A user left the phone at home and wants to prevent children from gaining access to the phone.
- D . A user traded in the company phone for a cell carrier upgrade by mistake.
- E . A user cannot locate the phone after attending a play at a theater.
- F . A user forgot the phone in a taxi, and the driver called the company to return the device.