CompTIA A+ Practice Test (220-1102)
Use the form below to configure your CompTIA A+ Practice Test (220-1102). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA A+ 220-1102 Information
CompTIA A+ Certification Overview
Exam Versions
The current versions of the CompTIA A+ certification exams are:
- 220-1101 (Core 1)
- 220-1102 (Core 2)
These versions were launched in April 2022 and are expected to retire approximately three years from their release date.
The A+ Certification Test
To earn the CompTIA A+ certification, candidates must pass two separate exams: 220-1101 and 220-1102. Each exam has a separate fee and can be taken in any order. Both exams must be completed before the retirement date and must be from the same set of objectives. The certification is valid for three years from the date of passing the exams.
Exam Details:
- Format: Computer-based tests
- Number of Questions: 90 questions per exam
- Time Limit: 90 minutes per exam
- Result Availability: Immediately after completion, following a short mandatory survey
CompTIA A+ 220-1102
The CompTIA A+ 220-1102 (Core 2) exam is an essential part of the A+ certification, focusing on the software and operational aspects of IT support. Launched in April 2022, this exam tests candidates on a variety of critical topics including operating systems, security, software troubleshooting, and operational procedures. The 220-1102 exam comprises 90 questions, featuring a mix of multiple-choice and performance-based questions that simulate real-world IT scenarios. With a 90-minute time limit, candidates must efficiently demonstrate their knowledge and problem-solving skills. The exam is designed to ensure that IT professionals are well-versed in managing and troubleshooting software issues, implementing security measures, and following best practices in IT operations. Successful completion of the 220-1102, alongside the 220-1101, certifies individuals for three years, highlighting their competence and readiness to handle diverse technical challenges in the IT field.
Exam Policies and Procedures
Candidates must agree to CompTIA's exam policies before starting the test. These policies include:
- No Mobile Phones/Devices: Must be left outside the exam room
- Question Review: Candidates can revisit and change answers before submitting the exam
- Submission: Unanswered questions are marked, and a final review is available before submission
Testing Centers
Since July 9, 2012, CompTIA exams are available exclusively through Pearson VUE testing centers. Candidates can book exams online, by phone, or at the testing center. Options include:
- In-Person Testing: At Pearson VUE testing centers
- Online Testing: Through Pearson VUE's online platform
Performance-Based Questions (PBQs)
The A+ exams include Performance-Based Questions (PBQs), which require candidates to perform specific tasks or solve problems in a simulated environment. These questions test real-world skills in areas like command prompts, Windows OS, and networking environments.
Continuing Education (CE) Program
Certifications with the +CE (Continuing Education) suffix, including A+, Network+, and Security+, must be renewed every three years. Renewal options include:
- Retaking the Exam: Passing the latest version of the exam
- Higher-Level Certification: Passing a higher-level CompTIA exam
- CE Program Requirements: Completing CE activities
Lifetime Certifications
Certifications earned on or before December 31, 2010, are valid for life. However, lifetime certifications are no longer available for new candidates.
More reading:
Scroll down to see your responses and detailed results
Free CompTIA A+ 220-1102 Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Operating SystemsSecuritySoftware TroubleshootingOperational Procedures
Free Preview
This test is a free preview, no account required.
Subscribe to unlock all content, keep track of your scores, and access AI features!
A technician is performing a malware removal process on a PC running Windows 10. As part of the best practice procedures for malware removal, they need to disable System Restore. Which of the following describes the correct sequence to achieve this?
In the search bar, type 'Restore' and select 'Create a restore point,' then under System Protection, use the slider to set the disk space usage for System Restore to zero.
Right-click on the taskbar, open Task Manager, go to the Startup tab, and disable System Restore from the list of startup items.
Open Settings, go to Update & Security, select Backup, and turn off the toggle for Back up using File History to disable System Restore.
Open Control Panel, navigate to System and Security, select System, click on the System protection link, and adjust the settings under the Protection Settings dialog.
Answer Description
The correct way to disable System Restore involves accessing the System Properties dialog, which is accessed via the Control Panel. From there, navigating to the 'System Protection' tab and choosing the appropriate drive configurations ensures that System Restore can be turned off for specific drives, where changes are confirmed by applying the modifications. This process is essential for ensuring that malware does not remain in the system by eliminating the possibility of reverting to a system state that might still be infected.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is System Restore and why is it important in malware removal?
What are restore points, and how can they affect my computer?
How can I access the System Properties dialog to disable System Restore?
When a program installed in Windows stops responding or encounters an error, logs describing the error can be examined with the use of:
System menu in Control Panel
System Information utility
Resource Monitor
Event Viewer
Answer Description
Event Viewer shows all the logs and activities on your system. It can be accessed by searching "Event Viewer", or start > control panel > administrative tools > event viewer.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What types of logs can be found in Event Viewer?
How do you access Event Viewer in Windows?
What should I do if I find an error in Event Viewer?
You work for a grocery store in the IT department. To ensure stores can operate during internet or network outages there are several servers running in each location. What device could be used to ensure the server are not physically accessible to store employees?
Entry control list
Server lock
Smart card
Lock screen
Answer Description
A server lock can be used to lock away sensitive servers and network devices. Typically this comes in the form of a server rack with a locking door. This is a common security measure to prevent unauthorized physical access to servers if they are in a shared datacenter or location where unauthorized users could have access.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a server lock?
Why is physical security important for servers?
What are some other security measures for protecting servers?
A user within the organization is consistently receiving data-usage limit notifications on their mobile device towards the end of each billing cycle. The IT policy enforces restrictions on streaming media and large downloads over cellular data. The employee confirms adherence to these policies and there have been no new applications installed. What is the MOST likely reason for these notifications and what should the technician investigate FIRST?
Conduct a thorough malware scan, suspecting a malware infection is the cause of increased data usage.
Investigate detailed cellular data usage in the device settings to identify which applications or services are using the most data.
Perform an immediate update of all applications on the device, assuming that outdated apps are causing the excess data usage.
Enforce a stricter data plan for the user's device to prevent them from exceeding the organizational data-usage limit.
Answer Description
If the employee is adhering to usage policies and has not installed new applications, then the most likely reason for the data overages could be background data usage by applications or system services. Investigating the detailed cellular data usage in the device settings is the logical first step as it can reveal which applications or system services are using unexpected amounts of data despite the user's activities. An application update might not directly correlate to data usage limits, and malware is less likely without new application installations or other symptoms. Changing the user's data plan does not address the root cause and should be considered after other troubleshooting steps.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'background data usage' mean?
How can I check which apps are using the most data on my device?
What are some common apps that tend to use excessive data?
You have been instructed to configure a database server running Windows Server 2022 to alert technicians when the server's processor or memory is running above 75% capacity. Which of the following technologies will help you achieve this?
System Configuration
Task Scheduler
Performance Monitor
Task Manager
Answer Description
Performance monitor is a Windows tool that can be used to monitor and log a system's health and status in real time. Task Manager can display similar information but does not log and should only be used as a quick reference.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Performance Monitor?
How do I set up alerts in Performance Monitor?
What are the differences between Performance Monitor and Task Manager?
A script that fails to release memory after execution can lead to system instability over time.
False
True
Answer Description
Scripts that do not properly manage system resources, such as memory, can cause leaks that over time degrade system performance and lead to crashes. If a script allocates memory and fails to release it after execution, it becomes a memory leak. Repeated runs of such scripts can exhaust available memory, causing instability and potential system or browser crashes. Ensuring that scripts manage resources correctly is crucial to maintaining a stable system.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are memory leaks and how do they occur?
How can developers prevent memory leaks in scripts?
What are the signs of system instability due to memory leaks?
Alex, a technician, would like to map a network drive when he starts up his computer in the morning. Which of the following commands would he use to accomplish this task?
NET
NSLOOKUP
NETSTAT
NBTSTAT
Answer Description
The NET command in Windows provides many options, including the NET USE command tool. The NET USE command will show and configure mapped network drives from a shared resource like a NAS or a storage server.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does the NET command do in Windows?
What is the NET USE command specifically used for?
Can you explain what NAS means?
An unauthorized user observing system security procedure such as typing in a password or pin code is known as:
A Worm
Spyware
Phishing
Shoulder Surfing
Answer Description
Shoulder surfing is a common tactic to gain information by standing near a person as they talk on the phone, fill out a form, or type in their password.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some techniques to prevent shoulder surfing?
How does shoulder surfing differ from phishing?
What should you do if you suspect you are being shoulder-surfed?
A technician needs to provide assistance to a remote client who is not very technologically savvy. The client requires a software installation and some configuration changes. Which remote access technology would BEST suit this scenario, ensuring ease of use for the client and allowing the technician to perform the necessary tasks?
Microsoft Remote Assistance (MSRA)
Virtual Private Network (VPN)
Secure Shell (SSH)
Virtual Network Computer (VNC)
Answer Description
Using Microsoft Remote Assistance (MSRA), the technician can request to control the client's computer with the client's permission and demonstrate the proper installation and configuration process. The client will only need to accept the invitation, making it straightforward for users without extensive technical knowledge. Other options, like VPNs and SSH, require more client involvement and knowledge, and are therefore not the best fit for this scenario.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Microsoft Remote Assistance and how does it work?
Why are VPNs and SSH less suitable for non-technical clients?
What are the security implications when using Microsoft Remote Assistance?
A user's Windows 10 computer is experiencing difficulty connecting to network printers. Other network resources are accessible, but the printers keep appearing offline. Other users are able to use the printers without issue. Which of the following is the BEST step to take first?
Restart the 'Print Spooler' service
Reinstall the printer drivers
Restart the 'Network List' service
Check the network cables connected to the printers
Answer Description
Restarting the 'Print Spooler' service is often the best initial step to resolve issues related to network printers appearing offline. This service manages print jobs and restarting it can clear any stuck jobs or refresh the connection to network printers. Checking cables from the printers or reinstalling printer drivers might also help but are usually secondary steps after ensuring the services are running correctly.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the 'Print Spooler' service and why is it important?
What other steps can be taken if restarting the Print Spooler doesn't resolve the issue?
What are some common reasons a printer can appear offline?
In a small office/home office (SOHO) environment, the network administrator is configuring the office wireless router to secure the network against external threats. Which of the following actions would BEST increase the security of the network?
Disabling SSID broadcast
Disabling UPnP on the router
Changing the router's service set identifier (SSID)
Setting up port forwarding/mapping to unspecified services
Answer Description
Disabling Universal Plug and Play (UPnP) on a wireless router can significantly enhance the security of a network. UPnP can be exploited by malware to open ports without a user's knowledge, potentially allowing external threats to penetrate the network. Therefore, disabling it reduces the risks of such vulnerabilities. Changing the SSID does not inherently secure the network—this action just changes the network name. While disabling SSID broadcast may somewhat obscure the network from casual discovery, it is not a robust security measure as SSID can be discovered by more determined attackers using simple tools. Port forwarding/mapping is typically used to allow external devices to access services within the private network and is not a method to enhance network security.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is UPnP and how does it pose a security risk?
What are some best practices for securing a wireless network?
What is the importance of SSID in wireless networking?
When onboarding at a new company you are given a laptop and asked to sign an agreement determining what the laptop can and cannot be used for. Which acronym best describes the policy you were asked to sign?
NUC
SLA
SOW
SOP
AUP
Answer Description
An Acceptable Use Policy (AUP) is a document often given by employers to their employees and contractors prior to being given access to company networks and equipment. It dictates what users can and cannot do, for example it will likely state users are expected to follow the law, that certain types of websites are not permitted, etc.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does AUP stand for and what are its main components?
What are the consequences of violating an AUP?
Can you give examples of common topics covered in an AUP?
What type of OS installation type updates an OS and can keep existing files, applications and settings?
Clean install
Repair installation
None of these options
In-place upgrade
Answer Description
An in-place upgrade is an installation type that updates an existing operating system while keeping things like files, applications and settings from the existing operating system.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an in-place upgrade and how does it work?
What are the benefits of an in-place upgrade compared to a clean install?
What situations would necessitate considering alternatives to an in-place upgrade?
What Active Directory feature can be used to apply default user account permissions?
Least Privilege
None of these options
Group Policy
Login scripts
Answer Description
In Microsoft Active Directory a Group Policy is a policy applied to many AD objects. Objects can be user accounts, servers, desktop devices, etc. Group Policies are used to manage things like user account permissions. For example, a policy may be created for each team with default account permissions needed for those users.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Group Policy in Active Directory?
How do Group Policies affect user account permissions?
What are some common applications of Group Policy?
You are a network administrator for a large company. Several network users have complained that they are receiving odd emails from another user, who claims they have not sent any emails today. Which of the following will most likely stop the issue?
Check the networks firewall for unauthorized entries
Install a more expensive spam filter
Reinstall the user's email client
Change the user's account password
Answer Description
Changing the account password will most likely solve the issue, but better preventatives should be put in place as soon as possible. Spam filters typically ignore local emails, which is why this is not the correct answer.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why would changing the user's account password help resolve the issue?
What are some better preventative measures to implement beyond changing the password?
Why do spam filters typically ignore local emails?
Smashing!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.