CompTIA A+ Core 2 (220-1202) Certification Sample Questions

A+ Core 2 Dumps, 220-1202 Dumps, 220-1202 PDF, A+ Core 2 VCE, CompTIA 220-1202 VCE, CompTIA A Plus (Core 2) PDFThe purpose of this Sample Question Set is to provide you with information about the CompTIA A+ (Core 2) exam. These sample questions will make you very familiar with both the type and the difficulty level of the questions on the 220-1202 certification test. To get familiar with real exam environment, we suggest you try our Sample CompTIA A+ Core 2 Certification Practice Exam. This sample practice exam gives you the feeling of reality and is a clue to the questions asked in the actual CompTIA A+ certification exam.

These sample questions are simple and basic questions that represent likeness to the real CompTIA 220-1202 exam questions. To assess your readiness and performance with real time scenario based questions, we suggest you prepare with our Premium CompTIA A+ Core 2 Certification Practice Exam. When you solve real time scenario based questions practically, you come across many difficulties that give you an opportunity to improve.

CompTIA 220-1202 Sample Questions:

01. An IT support specialist is preparing to migrate a critical application. This migration will impact the operations during the maintenance window. Which of the following would help the specialist determine the potential impact to the business as part of the change management process?
a) End user acceptance
b) Peer review
c) Manager approval
d) Risk assessment
 
02. A technician is reviewing malicious activity on a machine. The timestamp information shows this activity takes place overnight. Which of the following should the technician do to prevent further occurrences?
a) Disable guest accounts.
b) Restrict log-in times.
c) Apply an account expiration date.
d) Enable screensaver locks.
 
03. Which of the following is a type of malware designed to record a user's credentials and other entries?
a) Keylogger
b) Trojan
c) Ransomware
d) Rootkit
 
04. A user cannot access company resources on their new workstation that they could access on their prior workstation. Which of the following actions should a technician take to fix the issue?
a) Provide the user with the administrator account.
b) Disable the firewall on the workstation.
c) Join the workstation to the company's domain.
d) Enable facial recognition on the workstation.
 
05. An employee is receiving emails and calls from people in their contact list about phishing emails from the employee. The employee recently installed a third-party email client with access to the device's contacts. Which of the following should the employee do to resolve the issue immediately?
a) Check employee's outgoing mailbox.
b) Uninstall the unapproved application.
c) Delete the contact list from the device.
d) Add the messages to Junk Mail.
 
06. A team member provides a link to an online slide deck presentation so other team members can add to the presentation. The link does not work for any of the other team members. Which of the following should the team check first?
a) Version history
b) Web browser compatibility
c) Viewing and sharing permissions
d) License management
 
07. Which of the following best describes what happens when an OS reaches the EOL date?
a) Security updates are not released.
b) Users cannot purchase the OS.
c) Users are unable to log on.
d) New drivers must be installed.
 
08. A user is purposely deleting files and folders containing company information. Which of the following describes this attack?
a) Whaling
b) Insider threat
c) On-path attack
d) Spoofing
 
09. An IT help desk project that was to be completed in three days after work hours for another department is now two days overdue. The department leader is upset and wants to know when the project will be completed. Which of the following is the best approach in this scenario?
a) Apologize for the delay and offer a viable solution.
b) Ask for an extension to the deadline.
c) Escalate to the management team without talking to the department leader.
d) Request the department leader provide the request in writing.
 
10. A technician is replacing a laptop's motherboard that is covered by a warranty. The technician must return the faulty motherboard to the manufacturer as part of the warranty agreement.
Which of the following should the technician do after removing the old motherboard and installing the new one?
a) Connect an ESD wrist strap to a grounded connection point.
b) Remove the battery and AC adapter from the laptop.
c) Use compressed air to clean out any loose debris or dirt from inside the laptop.
d) Place the old component in an antistatic bag for shipping.

Answers:

Question: 01
Answer: d
Question: 02
Answer: b
Question: 03
Answer: a
Question: 04
Answer: c
Question: 05
Answer: b
Question: 06
Answer: c
Question: 07
Answer: a
Question: 08
Answer: b
Question: 09
Answer: a
Question: 10
Answer: d

Note: For any error in CompTIA A+ (220-1202) certification exam sample questions, please update us by writing an email on feedback@edusum.com.

Rating: 3.7 / 5 (3 votes)