CompTIA 220-1102 CompTIA A+ Certification Core 2 Exam Online Training
CompTIA 220-1102 Online Training
The questions for 220-1102 were last updated at Feb 23,2025.
- Exam Code: 220-1102
- Exam Name: CompTIA A+ Certification Core 2 Exam
- Certification Provider: CompTIA
- Latest update: Feb 23,2025
A network administrator is deploying a client certificate lo be used for Wi-Fi access for all devices m an organization. The certificate will be used in conjunction with the user’s existing username and password.
Which of the following BEST describes the security benefits realized after this deployment?
- A . Multifactor authentication will be forced for Wi-Fi
- B . All Wi-Fi traffic will be encrypted in transit
- C . Eavesdropping attempts will be prevented
- D . Rogue access points will not connect
A technician is troubleshooting a customer’s PC and receives a phone call. The technician does not take the call and sets the phone to silent.
Which of the following BEST describes the technician’s actions?
- A . Avoid distractions
- B . Deal appropriately with customer’s confidential material.
- C . Adhere to user privacy policy
- D . Set and meet timelines
A technician is installing a program from an ISO file.
Which of the following steps should the technician take?
- A . Mount the ISO and run the installation file.
- B . Copy the ISO and execute on the server.
- C . Copy the ISO file to a backup location and run the ISO file.
- D . Unzip the ISO and execute the setup.exe file.
A bank would like to enhance building security in order to prevent vehicles from driving into the building while also maintaining easy access for customers.
Which of the following BEST addresses this need?
- A . Guards
- B . Bollards
- C . Motion sensors
- D . Access control vestibule
A technician is upgrading the backup system for documents at a high-volume law firm. The current backup system can retain no more than three versions of full backups before failing. The law firm is not concerned about restore times but asks the technician to retain more versions when possible.
Which of the following backup methods should the technician MOST likely implement?
- A . Full
- B . Mirror
- C . Incremental
- D . Differential
A user receives a notification indicating the antivirus protection on a company laptop is out of date. A technician is able to ping the user’s laptop. The technician checks the antivirus parent servers and sees the latest signatures have been installed. The technician then checks the user’s laptop and finds the antivirus engine and definitions are current.
Which of the following has MOST likely occurred?
- A . Ransomware
- B . Failed OS updates
- C . Adware
- D . Missing system files
Each time a user tries to go to the selected web search provider, a different website opens.
Which of the following should the technician check FIRST?
- A . System time
- B . IP address
- C . DNS servers
- D . Windows updates
A technician is troubleshooting an issue involving programs on a Windows 10 machine that are loading on startup but causing excessive boot times.
Which of the following should the technician do to selectively prevent programs from loading?
- A . Right-click the Windows button, then select Run entering shell startup and clicking OK, and then move items one by one to the Recycle Bin
- B . Remark out entries listed HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>Windows>CurrentVersion>Run
- C . Manually disable all startup tasks currently listed as enabled and reboot checking for issue resolution at startup
- D . Open the Startup tab and methodically disable items currently listed as enabled and reboot, checking for issue resolution at each startup.
A user calls the help desk to report potential malware on a computer. The anomalous activity began after the user clicked a link to a free gift card in a recent email The technician asks the user to describe any unusual activity, such as slow performance, excessive pop-ups, and browser redirections.
Which of the following should the technician do NEXT?
- A . Advise the user to run a complete system scan using the OS anti-malware application
- B . Guide the user to reboot the machine into safe mode and verify whether the anomalous activities are still present
- C . Have the user check for recently installed applications and outline those installed since the link in the email was clicked
- D . Instruct the user to disconnect the Ethernet connection to the corporate network.
A mobile phone user has downloaded a new payment application that allows payments to be made with a mobile device. The user attempts to use the device at a payment terminal but is unable to do so successfully. The user contacts a help desk technician to report the issue.
Which of the following should the technician confirm NEXT as part of the troubleshooting process?
- A . If airplane mode is enabled
- B . If Bluetooth is disabled
- C . If NFC is enabled
- D . If WiFi is enabled
- E . If location services are disabled