00:15:00

CompTIA A+ Practice Test (220-1102)

Use the form below to configure your CompTIA A+ Practice Test (220-1102). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA A+ 220-1102
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA A+ 220-1102 Information

CompTIA A+ Certification Overview

Exam Versions

The current versions of the CompTIA A+ certification exams are:

  • 220-1101 (Core 1)
  • 220-1102 (Core 2)

These versions were launched in April 2022 and are expected to retire approximately three years from their release date.

The A+ Certification Test

To earn the CompTIA A+ certification, candidates must pass two separate exams: 220-1101 and 220-1102. Each exam has a separate fee and can be taken in any order. Both exams must be completed before the retirement date and must be from the same set of objectives. The certification is valid for three years from the date of passing the exams.

Exam Details:

  • Format: Computer-based tests
  • Number of Questions: 90 questions per exam
  • Time Limit: 90 minutes per exam
  • Result Availability: Immediately after completion, following a short mandatory survey

CompTIA A+ 220-1102

The CompTIA A+ 220-1102 (Core 2) exam is an essential part of the A+ certification, focusing on the software and operational aspects of IT support. Launched in April 2022, this exam tests candidates on a variety of critical topics including operating systems, security, software troubleshooting, and operational procedures. The 220-1102 exam comprises 90 questions, featuring a mix of multiple-choice and performance-based questions that simulate real-world IT scenarios. With a 90-minute time limit, candidates must efficiently demonstrate their knowledge and problem-solving skills. The exam is designed to ensure that IT professionals are well-versed in managing and troubleshooting software issues, implementing security measures, and following best practices in IT operations. Successful completion of the 220-1102, alongside the 220-1101, certifies individuals for three years, highlighting their competence and readiness to handle diverse technical challenges in the IT field.

Exam Policies and Procedures

Candidates must agree to CompTIA's exam policies before starting the test. These policies include:

  • No Mobile Phones/Devices: Must be left outside the exam room
  • Question Review: Candidates can revisit and change answers before submitting the exam
  • Submission: Unanswered questions are marked, and a final review is available before submission

Testing Centers

Since July 9, 2012, CompTIA exams are available exclusively through Pearson VUE testing centers. Candidates can book exams online, by phone, or at the testing center. Options include:

  • In-Person Testing: At Pearson VUE testing centers
  • Online Testing: Through Pearson VUE's online platform

Performance-Based Questions (PBQs)

The A+ exams include Performance-Based Questions (PBQs), which require candidates to perform specific tasks or solve problems in a simulated environment. These questions test real-world skills in areas like command prompts, Windows OS, and networking environments.

Continuing Education (CE) Program

Certifications with the +CE (Continuing Education) suffix, including A+, Network+, and Security+, must be renewed every three years. Renewal options include:

  • Retaking the Exam: Passing the latest version of the exam
  • Higher-Level Certification: Passing a higher-level CompTIA exam
  • CE Program Requirements: Completing CE activities

Lifetime Certifications

Certifications earned on or before December 31, 2010, are valid for life. However, lifetime certifications are no longer available for new candidates.

More reading:

Free CompTIA A+ 220-1102 Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    Operating Systems
    Security
    Software Troubleshooting
    Operational Procedures

Free Preview

This test is a free preview, no account required.
Subscribe to unlock all content, keep track of your scores, and access AI features!

Question 1 of 15

A technician is performing a malware removal process on a PC running Windows 10. As part of the best practice procedures for malware removal, they need to disable System Restore. Which of the following describes the correct sequence to achieve this?

  • In the search bar, type 'Restore' and select 'Create a restore point,' then under System Protection, use the slider to set the disk space usage for System Restore to zero.

  • Right-click on the taskbar, open Task Manager, go to the Startup tab, and disable System Restore from the list of startup items.

  • Open Settings, go to Update & Security, select Backup, and turn off the toggle for Back up using File History to disable System Restore.

  • Open Control Panel, navigate to System and Security, select System, click on the System protection link, and adjust the settings under the Protection Settings dialog.

Question 2 of 15

When a program installed in Windows stops responding or encounters an error, logs describing the error can be examined with the use of:

  • System menu in Control Panel

  • System Information utility

  • Resource Monitor

  • Event Viewer

Question 3 of 15

You work for a grocery store in the IT department. To ensure stores can operate during internet or network outages there are several servers running in each location. What device could be used to ensure the server are not physically accessible to store employees?

  • Entry control list

  • Server lock

  • Smart card

  • Lock screen

Question 4 of 15

A user within the organization is consistently receiving data-usage limit notifications on their mobile device towards the end of each billing cycle. The IT policy enforces restrictions on streaming media and large downloads over cellular data. The employee confirms adherence to these policies and there have been no new applications installed. What is the MOST likely reason for these notifications and what should the technician investigate FIRST?

  • Conduct a thorough malware scan, suspecting a malware infection is the cause of increased data usage.

  • Investigate detailed cellular data usage in the device settings to identify which applications or services are using the most data.

  • Perform an immediate update of all applications on the device, assuming that outdated apps are causing the excess data usage.

  • Enforce a stricter data plan for the user's device to prevent them from exceeding the organizational data-usage limit.

Question 5 of 15

You have been instructed to configure a database server running Windows Server 2022 to alert technicians when the server's processor or memory is running above 75% capacity. Which of the following technologies will help you achieve this?

  • System Configuration

  • Task Scheduler

  • Performance Monitor

  • Task Manager

Question 6 of 15

A script that fails to release memory after execution can lead to system instability over time.

  • False

  • True

Question 7 of 15

Alex, a technician, would like to map a network drive when he starts up his computer in the morning. Which of the following commands would he use to accomplish this task?

  • NET

  • NSLOOKUP

  • NETSTAT

  • NBTSTAT

Question 8 of 15

An unauthorized user observing system security procedure such as typing in a password or pin code is known as:

  • A Worm

  • Spyware

  • Phishing

  • Shoulder Surfing

Question 9 of 15

A technician needs to provide assistance to a remote client who is not very technologically savvy. The client requires a software installation and some configuration changes. Which remote access technology would BEST suit this scenario, ensuring ease of use for the client and allowing the technician to perform the necessary tasks?

  • Microsoft Remote Assistance (MSRA)

  • Virtual Private Network (VPN)

  • Secure Shell (SSH)

  • Virtual Network Computer (VNC)

Question 10 of 15

A user's Windows 10 computer is experiencing difficulty connecting to network printers. Other network resources are accessible, but the printers keep appearing offline. Other users are able to use the printers without issue. Which of the following is the BEST step to take first?

  • Restart the 'Print Spooler' service

  • Reinstall the printer drivers

  • Restart the 'Network List' service

  • Check the network cables connected to the printers

Question 11 of 15

In a small office/home office (SOHO) environment, the network administrator is configuring the office wireless router to secure the network against external threats. Which of the following actions would BEST increase the security of the network?

  • Disabling SSID broadcast

  • Disabling UPnP on the router

  • Changing the router's service set identifier (SSID)

  • Setting up port forwarding/mapping to unspecified services

Question 12 of 15

When onboarding at a new company you are given a laptop and asked to sign an agreement determining what the laptop can and cannot be used for. Which acronym best describes the policy you were asked to sign?

  • NUC

  • SLA

  • SOW

  • SOP

  • AUP

Question 13 of 15

What type of OS installation type updates an OS and can keep existing files, applications and settings?

  • Clean install

  • Repair installation

  • None of these options

  • In-place upgrade

Question 14 of 15

What Active Directory feature can be used to apply default user account permissions?

  • Least Privilege

  • None of these options

  • Group Policy

  • Login scripts

Question 15 of 15

You are a network administrator for a large company. Several network users have complained that they are receiving odd emails from another user, who claims they have not sent any emails today. Which of the following will most likely stop the issue?

  • Check the networks firewall for unauthorized entries

  • Install a more expensive spam filter

  • Reinstall the user's email client

  • Change the user's account password