220-1202 Exam Overview
Prepare for the Comptia 220-1202 certification exam
with our comprehensive study guide. This study material contains 166 practice questions
sourced from real exams and expert-verified for accuracy. Each question includes the correct answer
and a detailed explanation to help you understand the material thoroughly.
The 220-1202 exam — A+ Core 2 — is offered by Comptia.
Passing this exam earns you the CompTIA A+ credential,
an industry-recognized certification that validates your expertise.
Our study materials were last updated on 2026-02-18 to reflect the
most recent exam objectives and content.
About the CompTIA A+
The CompTIA A+ is awarded by Comptia
to professionals who demonstrate competence in the skills measured by the 220-1202 exam.
According to the
official Comptia certification page,
this certification validates your ability to work with the technologies covered in the exam objectives.
According to the
Global Knowledge IT Skills and Salary Report,
certified IT professionals earn 15-25% more than their non-certified peers.
Certifications from Comptia are among the most recognized credentials in the IT industry,
with strong demand across enterprise organizations worldwide.
Free Sample — 15 Practice Questions
Preview 15 of 166 questions from the 220-1202 exam.
Try before you buy — purchase the full study guide for all 166 questions with answers and explanations.
Question 67
A Windows 11 Home device is receiving constant pop-ups about an urgent need to update antivirus software in order to remove a detected threat. The user has been clicking the "X" button in the window frame, but it always reappears. The pop-up includes an "OK" button to install the update and remove the threat. Which of the following should the user do next?
A. Click the "OK" button to install the update.
B. Reinstall the Windows Operating System.
C. Run System File Checker.
D. Verify the current status and settings of protection measures.
Show Answer
Correct Answer: D
Explanation:
Persistent pop-ups urging immediate antivirus updates are commonly scareware or browser-based notifications rather than legitimate system alerts. Clicking "OK" risks installing malware. Before taking drastic actions like reinstalling Windows or running system file checks, the correct next step is to verify the actual antivirus and Windows Security status in Settings to confirm whether protection is enabled and up to date, and to identify any rogue notifications.
Question 153
A network technician notices that most of the company's network switches are now end-of-life and need to be upgraded. Which of the following should the technician do first?
A. Implement the change.
B. Approve the change.
C. Propose the change.
D. Schedule the change.
Show Answer
Correct Answer: C
Explanation:
Within standard change management processes, the first step is to propose or submit a change request. Only after a change is proposed can it be reviewed and approved, then scheduled, and finally implemented.
Question 137
A customer is unable to open some files on their system. Each time the customer attempts to open a file, the customer receives a message that the file is encrypted. Which of the following best describes this issue?
A. Keylogger
B. Ransomware
C. Phishing
D. Cryptominer
Show Answer
Correct Answer: B
Explanation:
Ransomware encrypts a victim’s files and prevents access until a ransom is paid, which matches the symptom of files being reported as encrypted when opened. The other options do not typically encrypt files.
Question 9
Which of the following is the best term to describe the concept in which AI makes incorrect assumptions because of limited training?
A. Bias
B. Hallucinations
C. Inconsistency
D. Plagiarism
Show Answer
Correct Answer: A
Explanation:
The concept described is AI making skewed or incorrect assumptions due to limitations or imbalances in its training data. This is best characterized as bias, where the training data does not adequately represent reality and leads to systematic errors. Hallucinations refer instead to confident fabrication of information, not specifically to skewed assumptions from limited training.
Question 75
A user decides to switch to Windows from Linux and is trying to migrate data using an external USB hard disk. However, when the user connects the cable to the Windows machine, an error message appears stating the device must be formatted before it can be used. The hard disk works as expected when connected to the Linux machine. Which of the following should the user do to resolve this issue?
A. Configure Windows firewall to allow data from Linux systems.
B. Replace the cable with Windows-supported hardware.
C. Apply a firmware update from the PC manufacturer.
D. Update the file allocation system to exFAT.
Show Answer
Correct Answer: D
Explanation:
The external hard disk is formatted with a file system supported by Linux but not natively readable by Windows, which causes Windows to prompt for formatting. Reformatting or converting the drive to a cross-platform file system such as exFAT allows both Linux and Windows to access the data without errors. The other options do not address file system compatibility.
Question 109
Which of the following file types would a desktop support technician most likely use to automate tasks for a Windows user log-in?
A. .bat
B. .sh
C. .py
D. .js
Show Answer
Correct Answer: A
Explanation:
On Windows systems, desktop support technicians commonly use batch files (.bat) to automate tasks during user log-in, such as mapping network drives or running scripts. Shell scripts (.sh) are for Unix/Linux, while .py and .js are not native or typical for Windows log-in automation.
Question 125
Which of the following types of social engineering attacks sends an unsolicited text message to a user's mobile device?
A. Impersonation
B. Vishing
C. Spear phishing
D. Smishing
Show Answer
Correct Answer: D
Explanation:
Smishing refers to phishing attacks conducted via SMS or text messages sent to a user's mobile device. The other options involve different channels: vishing uses voice calls, spear phishing is targeted (often via email), and impersonation is a broader tactic rather than a specific SMS-based attack.
Question 105
A customer’s computer does not have an active connection to the network. A technician goes through a few troubleshooting steps but is unable to resolve the issue. The technician has exhausted their knowledge. The customer expresses frustration at the time taken to resolve this issue. Which of the following should the technician do?
A. Escalate the issue to a senior team member and provide next steps to the customer.
B. Dismiss the customer and reschedule another troubleshooting session at a later date.
C. Interrupt the customer and express that troubleshooting support tickets can take time.
D. Maintain a positive attitude and continue to ask questions regarding the scope of the issue.
Show Answer
Correct Answer: A
Explanation:
The technician has exhausted their knowledge and cannot resolve the issue, so the appropriate professional action is to escalate the problem to a more experienced team member. Escalation ensures timely resolution, demonstrates good customer service, and allows the technician to clearly communicate next steps to manage the customer’s frustration. The other options either worsen customer relations or fail to move the issue toward resolution.
Question 53
Which of the following security technologies is designed to enable security visibility and respond to traffic outside of the host and at the network level?
A. RADIUS
B. UAC
C. XDR
D. Antivirus
Show Answer
Correct Answer: C
Explanation:
XDR (Extended Detection and Response) aggregates and correlates telemetry across multiple layers—including endpoint, network, and cloud—to provide security visibility and enable detection and response beyond a single host. RADIUS handles authentication, UAC controls access, and antivirus is primarily host-based.
Question 141
Which of the following methods would make data unrecoverable but allow the drive to be repurposed?
A. Deleting the partitions
B. Implementing EFS
C. Performing a low-level format
D. Degaussing the device
Show Answer
Correct Answer: C
Explanation:
Deleting partitions and implementing EFS do not reliably make data unrecoverable, as data can often be restored or decrypted with sufficient access. Degaussing destroys the magnetic properties of the drive, rendering it unusable and therefore not suitable for repurposing. Performing a low-level format overwrites the storage surface, making previous data unrecoverable while leaving the drive usable.
Question 15
Whenever a user clicks on a .jpg, Notepad opens and displays illegible characters. Otherwise, the workstation functions normally. Which of the following is the most likely cause of this issue?
A. The workstation has been infected with malware.
B. The default application for image files is misconfigured.
C. The operating system needs the most current update.
D. A new image editor needs to be installed on the user’s computer.
Show Answer
Correct Answer: B
Explanation:
Opening .jpg files in Notepad indicates that the file association for image files is set to Notepad instead of an image viewer. The system otherwise functioning normally rules out malware or OS issues, and no new editor is required—only correcting the default application.
Question 49
Which of the following is a protocol that provides AAA for network services?
A. RADIUS
B. Kerberos
C. TKIP
D. WPA3
Show Answer
Correct Answer: A
Explanation:
RADIUS is specifically designed to provide centralized Authentication, Authorization, and Accounting (AAA) for network access. Kerberos handles authentication only, while TKIP and WPA3 are wireless security mechanisms rather than AAA protocols.
Question 162
A security administrator teaches all of an organization's staff members to use BitLocker To Go. Which of the following best describes the reason for this training?
A. To ensure that all removable media is password protected in case of loss or theft
B. To enable Secure Boot and a BIOS-level password to prevent configuration changes
C. To enforce VPN connectivity to be encrypted by hardware modules
D. To configure all laptops to use the TPM as an encryption factor for hard drives
Show Answer
Correct Answer: A
Explanation:
BitLocker To Go is specifically designed to encrypt removable storage media such as USB flash drives and external hard drives. Training staff to use it ensures that data on removable media is protected with encryption (often password-based), reducing the risk of data exposure if the media is lost or stolen. The other options describe features unrelated to BitLocker To Go’s purpose.
Question 2
A network engineer is dealing with an emergency situation in which a wired network connection needs to be replaced. A facility manager tells the network engineer that the current connection goes underneath a carpet and must be rerouted. Which of the following is the best reason to reroute this connection?
A. Appropriate cable management removes a hazard.
B. Cleaning with a vacuum will create static electricity.
C. Labels for the cable routing are not appropriately displayed.
D. Walking over the cable can create intermittent issues.
Show Answer
Correct Answer: A
Explanation:
Running a network cable underneath a carpet creates a physical safety hazard because it can be tripped over, crushed, or damaged by foot traffic. Rerouting the cable using appropriate cable management eliminates this hazard and aligns with safety and building standards. The other options are secondary or unlikely compared to the immediate safety concern.
Question 116
Every time a user loads a specific spreadsheet, their computer is temporarily unresponsive. The user also notices that the title bar indicates the applications are not responding. Which of the following would a technician most likely inspect?
A. Anti-malware logs
B. Workstation repair options
C. Bandwidth status as reported in the Task Manager
D. File size and related memory utilization
Show Answer
Correct Answer: D
Explanation:
When opening a specific spreadsheet consistently causes the system to become unresponsive, the most likely cause is excessive resource consumption by that file. Large or complex spreadsheets can heavily use RAM and CPU, leading the application to show as 'Not Responding.' Inspecting the file size and related memory utilization directly addresses this root cause, whereas malware logs, repair options, or bandwidth are less relevant to a local spreadsheet load issue.