CompTIA A+ Practice Test (220-1102)
Use the form below to configure your CompTIA A+ Practice Test (220-1102). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA A+ 220-1102 Information
CompTIA A+ Certification Overview
Exam Versions
The current versions of the CompTIA A+ certification exams are:
- 220-1101 (Core 1)
- 220-1102 (Core 2)
These versions were launched in April 2022 and are expected to retire approximately three years from their release date.
The A+ Certification Test
To earn the CompTIA A+ certification, candidates must pass two separate exams: 220-1101 and 220-1102. Each exam has a separate fee and can be taken in any order. Both exams must be completed before the retirement date and must be from the same set of objectives. The certification is valid for three years from the date of passing the exams.
Exam Details:
- Format: Computer-based tests
- Number of Questions: 90 questions per exam
- Time Limit: 90 minutes per exam
- Result Availability: Immediately after completion, following a short mandatory survey
CompTIA A+ 220-1102
The CompTIA A+ 220-1102 (Core 2) exam is an essential part of the A+ certification, focusing on the software and operational aspects of IT support. Launched in April 2022, this exam tests candidates on a variety of critical topics including operating systems, security, software troubleshooting, and operational procedures. The 220-1102 exam comprises 90 questions, featuring a mix of multiple-choice and performance-based questions that simulate real-world IT scenarios. With a 90-minute time limit, candidates must efficiently demonstrate their knowledge and problem-solving skills. The exam is designed to ensure that IT professionals are well-versed in managing and troubleshooting software issues, implementing security measures, and following best practices in IT operations. Successful completion of the 220-1102, alongside the 220-1101, certifies individuals for three years, highlighting their competence and readiness to handle diverse technical challenges in the IT field.
Exam Policies and Procedures
Candidates must agree to CompTIA's exam policies before starting the test. These policies include:
- No Mobile Phones/Devices: Must be left outside the exam room
- Question Review: Candidates can revisit and change answers before submitting the exam
- Submission: Unanswered questions are marked, and a final review is available before submission
Testing Centers
Since July 9, 2012, CompTIA exams are available exclusively through Pearson VUE testing centers. Candidates can book exams online, by phone, or at the testing center. Options include:
- In-Person Testing: At Pearson VUE testing centers
- Online Testing: Through Pearson VUE's online platform
Performance-Based Questions (PBQs)
The A+ exams include Performance-Based Questions (PBQs), which require candidates to perform specific tasks or solve problems in a simulated environment. These questions test real-world skills in areas like command prompts, Windows OS, and networking environments.
Continuing Education (CE) Program
Certifications with the +CE (Continuing Education) suffix, including A+, Network+, and Security+, must be renewed every three years. Renewal options include:
- Retaking the Exam: Passing the latest version of the exam
- Higher-Level Certification: Passing a higher-level CompTIA exam
- CE Program Requirements: Completing CE activities
Lifetime Certifications
Certifications earned on or before December 31, 2010, are valid for life. However, lifetime certifications are no longer available for new candidates.
More reading:
Scroll down to see your responses and detailed results
Free CompTIA A+ 220-1102 Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Operating SystemsSecuritySoftware TroubleshootingOperational Procedures
A system exhibiting sluggish performance must always be diagnosed with failing hardware components as the primary cause.
True
False
Answer Description
Sluggish performance can be caused by multiple factors, not limited to failing hardware. It could be due to software issues, lack of resources, or even malware. Hence, assuming hardware failure is the primary cause without ruling out other possibilities would be incorrect. A thorough diagnostics routine should include checking for software conflicts, resource utilization, and malware infections before concluding that hardware is at fault.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are common software issues that can cause sluggish performance?
How can malware affect system performance, and what are the signs?
What diagnostic tools can help identify performance issues in a system?
Employees at the company you work for are given Android phones to be used for company business. All the applications they need are pre-installed and no further applications are authorized. Which file extension needs to be blocked to restrict installing more applications?
APK
TXT
EXE
IPA
Answer Description
An Android Package (APK) is an application file format used for the installation of applications on Android based operating systems.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an APK file?
Why is it important to block APK files in a corporate environment?
What are some alternatives to APK for app installation on Android?
Which Administrative Tool in Windows provides detailed view and logs about system, security, and application events?
Disk Management
Task Scheduler
Performance Monitor
Event Viewer
Answer Description
Event Viewer (eventvwr.msc) is the Administrative Tool that allows you to view detailed logs and information about system, security, and application events on a Windows computer. This helps in diagnosing and troubleshooting issues by providing insights into system operations.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What types of events can I find in the Event Viewer?
How do I access Event Viewer in Windows?
Why is Event Viewer important for troubleshooting?
What Active Directory feature can be used to apply default user account permissions?
Login scripts
Group Policy
None of these options
Least Privilege
Answer Description
In Microsoft Active Directory a Group Policy is a policy applied to many AD objects. Objects can be user accounts, servers, desktop devices, etc. Group Policies are used to manage things like user account permissions. For example, a policy may be created for each team with default account permissions needed for those users.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Group Policy in Active Directory?
How do Group Policies affect user account permissions?
What are some common applications of Group Policy?
What is the primary purpose of using ESD straps when handling sensitive electronic components?
To enhance grip while handling hardware
To maintain temperature control during repairs
To prevent static electricity from damaging components
To provide insulation from electrical shocks
Answer Description
ESD straps are designed to safely dissipate static electricity from a user's body to the ground, preventing damage to sensitive electronic components.
Other options may mention protective equipment, but they do not specifically address the function of ESD straps in electrostatic discharge prevention.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How do ESD straps work to prevent damage?
What kinds of components are most vulnerable to ESD damage?
What are other methods of preventing ESD aside from using wrist straps?
You are working on a client's computer and find that the user's desktop has changed, along with their home directory files and folders. The user is also experiencing significantly slow performance. What is the most likely cause of the problem?
Malware infection
Corrupted user profile
Faulty hard drive
System instability
Answer Description
The most likely cause of this issue is malware infection. Malware can modify the system to appear legitimate while simultaneously altering files and stealing user data. It can also cause sluggish performance by consuming system resources. While a faulty hard drive can cause slow performance and potential file corruption, it would be unusual for the hard drive to specifically affect the user's home directory. While a corrupted user profile can lead to slow performance and unexpected behavior, it is less likely to cause a major change to the desktop layout or file organization. System instability can cause slow performance, but is less likely to cause file and desktop alterations.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What types of malware could cause a user's desktop and files to change?
How can I identify if malware is causing slow performance?
What are some preventative measures against malware infections?
A user is experiencing issues with network access on their PC. The PC shows it is connected to the network but cannot access any internal or external network resources. What is the most likely cause of this issue?
Outdated network drivers
IP address conflict
Incorrect network settings
Disabled network adapter
Answer Description
The most likely cause is incorrect network settings. These settings can include IP address, subnet mask, or default gateway settings that do not align with the network's configuration, leading to connectivity issues. An IP conflict arises when two devices on the same network are assigned the same IP address, which leads to network access issues for one or both devices. Outdated network drivers may only sometimes cause complete network access issues; they more commonly lead to poor network performance. A disabled network adapter would result in no network connection status rather than connectivity with no resource access.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are examples of incorrect network settings?
How can I verify and correct my network settings?
What steps should I take if I suspect an IP address conflict?
What is the primary purpose of gathering user information in a support ticket system?
To provide users with a detailed manual without addressing their specific problem
To help technicians understand the context of the user's issue
To automatically resolve all issues without user input
To collect demographic data for marketing purposes
Answer Description
Collecting user information helps technicians identify the issue in the context of the individual's environment. It allows better tracking of support requests, facilitates communication about the problem, and assists in tailoring solutions based on the user's specific situation.
Other options, while related, do not capture this fundamental purpose as effectively.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What types of user information are typically collected in a support ticket system?
How does gathering user information improve communication between the user and technician?
Why is it important not to confuse the purpose of gathering user information with marketing data collection?
What is the primary purpose of installing bollards in a commercial building's entryway?
To serve as designated parking spaces for employees.
To display important signage for building regulations.
To improve the aesthetic appearance of the entryway.
To prevent unauthorized vehicle access in pedestrian areas.
Answer Description
The primary purpose of bollards is to provide a physical barrier that prevents unauthorized vehicles from accessing pedestrian areas, enhancing safety and security.
While other elements like planters may enhance aesthetics or security, they do not offer the same level of physical protection as bollards.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What types of bollards are used for security?
How do bollards enhance pedestrian safety?
What are the regulations regarding the installation of bollards in commercial spaces?
Your client's workstation is experiencing frequent and unexplained reboots. After verifying there is no overheating and ensuring all hardware components are properly seated, which of the following Windows tools should you use first to further troubleshoot the system instability?
Perform a System Restore to revert the computer to an earlier state.
Set up counters in Performance Monitor to track system performance.
Run the Disk Defragmenter to optimize file placement on hard drives.
Use the Reliability Monitor to review system stability history.
Answer Description
The Reliability Monitor is a Windows utility that provides a timeline of system events and reliability history, including hardware and software failures, warnings, and informational events. It is especially useful in diagnosing intermittent problems such as unexplained reboots, and might provide insight into the cause of the instability. A Disk Defragmenter is not typically related to system reboots, System Restore would revert the system to a previous point which could remove recent updates or changes that are causing issues, but it's not a diagnostic tool. The Performance Monitor is a more advanced tool for system performance analysis and wouldn't necessarily provide clear insights on sudden reboots.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly does the Reliability Monitor show?
How do I access the Reliability Monitor in Windows?
What other Windows tools can help diagnose system stability issues?
Logical partitions can be created within an extended partition on a disk.
False
True
Answer Description
This statement is true because an extended partition is a type of partition on a disk that allows for the creation of multiple logical partitions within it. A disk can have up to four primary partitions, but if more partitions are needed, one of these primary partitions can be designated as an extended partition, which acts as a container for logical partitions. Logical partitions are created within the extended partition and are used to overcome the limitation of having only four primary partitions on a disk. This structure is useful for organizing data and managing multiple operating systems or types of files on a single disk, providing greater flexibility and expanding the number of usable partitions.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between a primary partition and an extended partition?
Why would I need to create logical partitions?
Can you explain how to create logical partitions in an extended partition?
Which of the following is a mobile operating system?
Android
Windows 10 IoT
OSX
iMac
Answer Description
Android is an operating system primarily meant for mobile devices like touchscreens.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some key features of the Android operating system?
How does Android differ from other mobile operating systems?
What types of devices typically run Android?
An access control system that utilizes key fobs should be capable of tracking the time and location of entries made by users.
True
False
Answer Description
This statement is True.
Modern access control systems that utilize key fobs often include tracking and logging features. These systems can:
Record entry times: Track when a key fob is used to gain access to a specific location.
Log location details: Maintain records of which doors or access points were accessed using the key fob.
Enhance security and auditing: Provide a detailed log of user activity, which can be used for auditing purposes, detecting unauthorized access attempts, or responding to security incidents.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How do key fob access control systems track entries?
What types of information can be logged by an access control system?
Why is auditing important in access control systems?
Which of the following represents the BEST practice for disposing of toner cartridges to minimize environmental impact?
Keep a record of the disposal
Reuse toner cartridges without reconditioning
Send toner cartridges to a recycling facility
Discard toner cartridges in the trash
Answer Description
Proper disposal of toner cartridges involves sending them to a recycling facility designed for electronic waste. Simply discarding them in the trash can lead to environmental pollution due to the chemicals in the toner. Reusing cartridges without proper reconditioning may also fail to meet environmental safety standards. Keeping a record of disposal is good practice but doesn't directly address the need for proper recycling.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is recycling toner cartridges important for the environment?
What happens to toner cartridges at recycling facilities?
Are there alternatives to recycling for toner cartridges?
Which backup type only needs a maximum of two backups to restore all data?
Synthetic
Differential
Full
Incremental
Answer Description
A differential backup backs up only the changes since the last full backup.When it’s time for a recovery it will only ever take at most the last full backup and the latest differential backup.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a differential backup and how does it work?
How does a differential backup compare to incremental backups?
Why is it important to understand different backup types?
Cool beans!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.