Pre-Summer Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

220-1202 CompTIA A+ Core 2 (2026 Exam Update) Questions and Answers

Questions 4

A senior administrator asks a help desk technician to run a set of commands on a remote network switch. After running the commands, the technician needs to collect the output and provide it to the administrator. Which of the following should the technician use to fulfill the administrator ' s request?

Options:

A.

RDP

B.

WinRM

C.

SSH

D.

VNC

Buy Now
Questions 5

A small office reported a phishing attack that resulted in a malware infection. A technician is investigating the incident and has verified the following:

● All endpoints are updated and have the newest EDR signatures.

● Logs confirm that the malware was quarantined by EDR on one system.

● The potentially infected machine was reimaged.

Which of the following actions should the technician take next?

Options:

A.

Install network security tools to prevent downloading infected files from the internet

B.

Discuss the cause of the issue and educate the end user about security hygiene

C.

Flash the firmware of the router to ensure the integrity of network traffic

D.

Suggest alternate preventative controls that would include more advanced security software

Buy Now
Questions 6

A technician is working on multiple remote machines using a command line. Which of the following commands should the technician use to verify which SMB shares are currently mapped?

Options:

A.

systeminfo

B.

hostname

C.

net use

D.

nslookup

Buy Now
Questions 7

Which of the following commands can a technician use to view the contents of a single file on a Linux terminal?

Options:

A.

chmod

B.

cat

C.

ls (corrected from “Is”)

D.

sudo

Buy Now
Questions 8

A network engineer is dealing with an emergency situation in which a wired network connection needs to be replaced. A facility manager tells the network engineer that the current connection goes underneath a carpet and must be rerouted. Which of the following is the best reason to reroute this connection?

Options:

A.

Appropriate cable management removes a hazard.

B.

Cleaning with a vacuum will create static electricity.

C.

Labels for the cable routing are not appropriately displayed.

D.

Walking over the cable can create intermittent issues.

Buy Now
Questions 9

A user reports that after a recent software deployment to upgrade the Testing application, they can no longer use it. However, other employees can successfully

use the Testing program.

INSTRUCTIONS

Review the information in each tab to verify the results of the deployment and resolve

any issues discovered by selecting the:

· First command to resolve the issue

· Second command to resolve the issue

220-1202 Question 9

220-1202 Question 9

220-1202 Question 9

Options:

Buy Now
Questions 10

Welcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

INSTRUCTIONS

Click on individual tickets to see the ticket details, and view applicable attachments to

determine the problem.

Select the appropriate issue from the ' Issue ' drop-down menu. Then, select the most

efficient resolution from the ' Resolution ' drop-down menu. Finally, select the proper

command or verification to remediate or confirm your fix of the issue from the

' Verify/Resolve ' drop-down menu.

220-1202 Question 10

Options:

Buy Now
Questions 11

You are configuring a home network for a customer. The customer has requested the ability to access a Windows PC remotely, and needs all chat and optional functions to work in their game console.

INSTRUCTIONS

Use the drop-down menus to complete the network configuration for the customer. Each option may only be used once, and not all options will be used.

Then, click the + sign to place each device in its appropriate location.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Wireless AP LAN

220-1202 Question 11

Firewall Screened Subnet

220-1202 Question 11

220-1202 Question 11

Options:

Buy Now
Questions 12

A technician is selecting a remote access method so users can securely access Linux and Windows servers when working from home. Which of the following should the technician choose to best meet this requirement?

Options:

A.

File Transfer Protocol (FTP)

B.

Virtual private network (VPN)

C.

Remote Desktop Protocol (RDP)

D.

Remote monitoring and management (RMM)

Buy Now
Questions 13

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users’ audio issues are resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

220-1202 Question 13

220-1202 Question 13

220-1202 Question 13

220-1202 Question 13

220-1202 Question 13

220-1202 Question 13

220-1202 Question 13

220-1202 Question 13

220-1202 Question 13

220-1202 Question 13

220-1202 Question 13

Options:

Buy Now
Questions 14

Which of the following helps to maintain integrity during a forensic investigation?

Options:

A.

Acceptable use policy

B.

Business compliance requirements

C.

Chain of custody

D.

After-action report

Buy Now
Questions 15

You have been contacted through the help desk chat application. A user is setting up a replacement SOHO router. Assist the user with setting up the router.

INSTRUCTIONS

Select the most appropriate statement for each response. Click the send button after each response to continue the chat.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

220-1202 Question 15

Options:

Buy Now
Questions 16

Welcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

INSTRUCTIONS

Click on individual tickets to see the ticket details, and view applicable attachments to

determine the problem.

Select the appropriate issue from the ' Issue ' drop-down menu. Then, select the most

efficient resolution from the ' Resolution ' drop-down menu. Finally, select the proper

command or verification to remediate or confirm your fix of the issue from the

' Verify/Resolve ' drop-down menu.

220-1202 Question 16

Options:

Buy Now
Questions 17

A technician is attempting to join a workstation to a domain but is receiving an error message stating the domain cannot be found. However, the technician is able to ping the server and access the internet. Given the following information:

IP Address – 192.168.1.210

Subnet Mask – 255.255.255.0

Gateway – 192.168.1.1

DNS1 – 8.8.8.8

DNS2 – 1.1.1.1

Server – 192.168.1.10

Which of the following should the technician do to fix the issue?

Options:

A.

Change the DNS settings.

B.

Assign a static IP address.

C.

Configure a subnet mask.

D.

Update the default gateway.

Buy Now
Questions 18

Which of the following operating systems is used to join a domain?

Options:

A.

Windows 10 Home

B.

Windows 11 Home

C.

Windows 11 Pro

D.

Windows 11 SE

Buy Now
Questions 19

An engineer notices that many websites prompt users to input login and payment details. The engineer wants to require the browser to encrypt communications. Which of the following best helps to protect sensitive data?

Options:

A.

Disabling all cookies

B.

Disabling JavaScript

C.

Enabling a pop-up blocker

D.

Enabling HTTPS-Only Mode

Buy Now
Questions 20

A Windows 11 Home device is receiving constant pop-ups about an urgent need to update antivirus software in order to remove a detected threat. The user has been clicking the " X " button but the window keeps reappearing. The pop-up includes an " OK " button to install the update. What should the user do next?

Options:

A.

Click the " OK " button to install the update

B.

Reinstall the Windows Operating System

C.

Run System File Checker

D.

Verify the current status and settings of protection measures

Buy Now
Questions 21

Recently, the number of users sharing smartphone passcodes has increased. The management team wants a technician to deploy a more secure screen lock method. Which of the following technologies should the technician use?

Options:

A.

Pattern lock

B.

Facial recognition

C.

Device encryption

D.

Multifactor authentication

Buy Now
Questions 22

A customer brings a recently purchased laptop back to the store. The customer states that the laptop is defective and requests a new unit. The service representative identifies that the laptop was damaged by liquid. Which of the following should the service representative most likely do first?

Options:

A.

Accept the defective laptop and provide a replacement.

B.

Decline the request and report the case to the service manager.

C.

Review the applicable warranty and alternatives to manage special cases.

D.

Escalate the issue to the manufacturer or legal department for further action.

Buy Now
Questions 23

A security administrator teaches all of an organization ' s staff members to use BitLocker To Go. Which of the following best describes the reason for this training?

Options:

A.

To ensure that all removable media is password protected in case of loss or theft

B.

To enable Secure Boot and a BIOS-level password to prevent configuration changes

C.

To enforce VPN connectivity to be encrypted by hardware modules

D.

To configure all laptops to use the TPM as an encryption factor for hard drives

Buy Now
Questions 24

An employee receives a message urging them to scan an image with their company-owned smartphone that will access the account management portal in order to reset their password. Which of the following describes this type of social engineering attack?

Options:

A.

Whaling

B.

Vishing

C.

Quishing

D.

Smishing

Buy Now
Questions 25

A technician follows proper malware removal procedures but cannot remove all malware. They decide to reload the OS. What should they select?

Options:

A.

Version upgrade

B.

System restore

C.

OS repair

D.

Clean install

Buy Now
Questions 26

Which of the following is required to have a central log-in for a Windows computer?

Options:

A.

Domain membership

B.

Workgroup

C.

Active Directory

D.

Local Group Policy Editor

Buy Now
Questions 27

A technician inspects the following workstation configuration:

220-1202 Question 27

The workstation is unable to open any external websites. The browser displays an error message that says that the site cannot be reached.

Options:

A.

The wrong DNS suffix is assigned.

B.

The workstation IP address is incorrect.

C.

The default gateway is not set.

D.

The subnet mask is incorrect

Buy Now
Questions 28

A small company is experiencing unauthorized access attempts to its Windows workstations. The company suspects that some default security settings may be too permissive. Which of the following actions should an IT technician take?

Options:

A.

Implement an appropriate group policy.

B.

Configure automatic updates for Windows.

C.

Reset account passwords.

D.

Enable account lockout policies.

Buy Now
Questions 29

A user reports a critical application issue. The user tells the technician that a former IT employee previously resolved this same issue. Which of the following steps should the technician take first?

Options:

A.

Consult the technician who previously solved the issue.

B.

Escalate the issue to the software manufacturer to develop a patch.

C.

Review the ticketing system for details related to the prior occurrence.

D.

Open a case to document the issue and progress until the issue is resolved.

Buy Now
Questions 30

Which of the following is used to detect and record access to restricted areas?

Options:

A.

Bollards

B.

Video surveillance

C.

Badge readers

D.

Fence

Buy Now
Questions 31

Which of the following should a technician consider when adding ten new high-end graphic design and animation desktops at a client site?

Options:

A.

The local area’s temperature

B.

The proper ventilation for hazardous fumes

C.

The interior office space’s humidity levels

D.

The electrical circuit’s power consumption

Buy Now
Questions 32

A company recently transitioned to a cloud-based productivity suite and wants to secure the environment from external threat actors. Which of the following is the most effective method?

Options:

A.

Multifactor authentication

B.

Encryption

C.

Backups

D.

Strong passwords

Buy Now
Questions 33

Which of the following methods would make data unrecoverable but allow the drive to be repurposed?

Options:

A.

Deleting the partitions

B.

Implementing EFS

C.

Performing a low-level format

D.

Degaussing the device

Buy Now
Questions 34

A company wants to prevent unauthorized physical access to its mobile devices. Which of the following should the company do? (Select two).

Options:

A.

Disable built-in hotspots

B.

Configure VPN software

C.

Install an antivirus application

D.

Use PIN authentication

E.

Turn on location services

F.

Enable screen timeout

Buy Now
Questions 35

A user renames a .txt file to an .xml file. Windows Explorer shows the filename as Document.xml, but the file properties still show the type as Text Document (.txt). Which of the following controls enables the user to correctly change the file type?

Options:

A.

Indexing options

B.

Format command

C.

Personalization

D.

Hide extensions

Buy Now
Questions 36

Which of the following security measures addresses the issue of information exfiltration?

Options:

A.

DLP

B.

MDM

C.

SAML

D.

IAM

Buy Now
Questions 37

A user recently installed an application that accesses a database from a local server. When launching the application, it does not populate any information. Which of the following command-line tools is the best to troubleshoot the issue?

Options:

A.

ipconfig

B.

nslookup

C.

netstat

D.

curl

Buy Now
Questions 38

A company is implementing the 3-2-1 backup rule. Which of the following should the company do?

Options:

A.

Perform both full and differential backups.

B.

Test the backup integrity every three weeks.

C.

Keep all backup media on site for fast recovery.

D.

Use at least two different types of media.

Buy Now
Questions 39

A user needs to test several software replacement possibilities. Part of the process involves installing the different software options on a corporate-imaged sandboxed PC. Which of the following is the best option to allow the user to install the required software?

Options:

A.

Make the user a member of Domain Admins

B.

Add the user to the local Administrators group

C.

Let the user use credentials from another user who has rights

D.

Give the user the local, high-privileged account password

Buy Now
Questions 40

A user installed a free application from an unofficial application store. Now, their smartphone displays random pop-ups and shows increased data usage. Additionally, the user cannot perform certain actions such as opening banking applications or updating their OS. Which of the following should the user do first to address the security issues on their smartphone?

Options:

A.

Perform a factory reset.

B.

Clear the device cache.

C.

Contact the manufacturer’s support line.

D.

Change all passwords on the device.

Buy Now
Questions 41

Technicians are failing to document user contact information, device asset tags, and a clear description of each issue in the ticketing system. Which of the following should a help desk management team implement for technicians to use on every call?

Options:

A.

Service-level agreements

B.

Call categories

C.

Standard operating procedures

D.

Knowledge base articles

Buy Now
Questions 42

Various alerts on a user ' s Windows 11 laptop are continually interrupting videoconference calls. Which of the following should a support technician recommend to best solve the issue?

Options:

A.

Use multiple sound output devices for the various source applications

B.

Disable all notifications in different applications in the order they appear

C.

Configure the Sounds option in Control Panel to be set to No Sounds

D.

Set Windows Notifications settings to Do Not Disturb

Buy Now
Questions 43

An administrator is creating user accounts for a new vendor contract. The contract states that the users can work only during certain times. Which of the following should the administrator implement to comply with this requirement?

Options:

A.

Timeout policies by GPO user objects

B.

Alerts on authentication attempts outside of SLA requirements

C.

Expirations on the contractors ' accounts

D.

Account login restrictions set to the specified hours

Buy Now
Questions 44

A systems administrator logs in to a developer ' s machine to update the system and notices a performance issue. To troubleshoot the issue, the administrator attempts to open Task Manager multiple times, but it does not open. Which of the following is most likely the cause of this issue?

Options:

A.

A software development application is running.

B.

Windows Update Service is set to manual.

C.

The operating system has a malware infection.

D.

A pagefile was moved to D:\ drive.

Buy Now
Questions 45

A SOHO customer purchases a Windows 11 computer. When the technician attempts to join the computer to the domain, the option is grayed out. Which of the following explains the reason the option is unavailable?

Options:

A.

The computer OS needs to be updated to the latest version.

B.

Network settings need to be changed on the Pro edition of Windows.

C.

The computer needs to be restarted to apply new group policies.

D.

The computer operating system is Home edition.

Buy Now
Questions 46

A smartphone user unsuccessfully attempts to open an email attachment that includes an unexpected overdue invoice. After that attempt, the user notices performance issues while using the mobile browser and other applications. The user restarts the smartphone, but the issue persists. Which of the following actions would most likely resolve the issue?

Options:

A.

Forcing the smartphone to shut down and restarting it

B.

Deleting the email containing the attachment

C.

Wiping the device and resetting it to factory defaults

D.

Uninstalling and reinstalling the mobile browser

Buy Now
Questions 47

A company would like to deploy baseline images to new computers as they are started up on the network. Which of the following boot processes should the company use for this task?

Options:

A.

ISO

B.

Secure

C.

USB

D.

PXE

Buy Now
Questions 48

Which of the following file systems allows macOS to write data?

Options:

A.

NTFS

B.

ReFS

C.

exFAT

D.

XFS

Buy Now
Questions 49

A technician verifies that a malware incident occurred on some computers in a small office. Which of the following should the technician do next?

Options:

A.

Quarantine the infected systems

B.

Educate the end users

C.

Disable System Restore

D.

Update the anti-malware and scan the computers

Buy Now
Questions 50

Which of the following should be used to verify the integrity of a downloaded patch?

Options:

A.

Private browsing

B.

Secure DNS

C.

Hashing

D.

Trusted plug-ins

Buy Now
Questions 51

A user is unable to use the latest version of an application on a legacy personal tablet. Which of the following is most likely the reason?

Options:

A.

The OS is end-of-life.

B.

Storage space is inadequate.

C.

MDM is blocking updates.

D.

The tablet is infected with malware.

Buy Now
Questions 52

Which of the following filesystem types does the Linux OS use?

Options:

A.

exFAT

B.

APFS

C.

ext4

D.

NTFS

Buy Now
Exam Code: 220-1202
Exam Name: CompTIA A+ Core 2 (2026 Exam Update)
Last Update: May 22, 2026
Questions: 301

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now 220-1202 testing engine

PDF (Q&A)

$31.5  $104.99
buy now 220-1202 pdf
dumpsmate guaranteed to pass

24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 22 May 2026