CompTIA 220-1102 CompTIA A+ Core 2 Exam Practice Test

Page: 1 / 14
Total 685 questions
Question 1

A user is attempting to access a shared drive from a company-issued laptop while working from home. The user is unable to access any files and notices a red X next to each shared drive. Which of the following needs to be configured in order to restore the user's access to the shared drives?



Answer : B

When a user is unable to access shared drives from a company-issued laptop while working from home, the likely requirement is:

VPN (Virtual Private Network): A VPN allows secure access to the company's network from a remote location. Without a VPN connection, the user cannot access network resources such as shared drives.

IPv6: Involves IP addressing and is not directly related to accessing shared drives.

IPS (Intrusion Prevention System): Provides network security but does not facilitate access to shared drives.

DNS: Manages domain name resolution and is not typically the issue when specific shared drives are inaccessible.


CompTIA A+ 220-1102 Exam Objectives, Section 2.7: Explain common methods for securing mobile and embedded devices.

VPN configuration and remote access documentation.

Question 2

After a user upgraded the Windows operating system to the latest feature release, the user notices that one of the legacy applications that was running correctly before the upgrade does not open some windows and is only partially functional. Which of the following actions should the user take to troubleshoot the issue?



Answer : A

When a legacy application is not fully functional after upgrading the Windows operating system, the first step to troubleshoot the issue is to:

Run the application as Administrator: Legacy applications often require administrative privileges to run correctly. Running the application with these privileges can resolve issues related to permissions and access to certain system resources.

Raise the User Account Control level: This increases security prompts but does not resolve compatibility issues.

Turn off Windows Defender Firewall: This can expose the system to security risks and is unlikely to resolve application functionality issues.

Disable compatibility mode for the application: Compatibility mode should generally be enabled for legacy applications to ensure they run properly on newer OS versions.


CompTIA A+ 220-1102 Exam Objectives, Section 1.3: Given a scenario use features and tools of the Microsoft Windows 10 operating system (OS).

Windows application compatibility troubleshooting documentation.

Question 3

An organization's critical database files were attacked with ransomware. The company refuses to pay the ransom for a decryption key. All traces of the infection have been removed from the underlying servers. Which of the following should the company do next?



Answer : D

When an organization refuses to pay the ransom for a decryption key after a ransomware attack, and all traces of the infection have been removed, the next critical step is:

Restore critical data from backup: This is the most effective way to recover from a ransomware attack without paying the ransom. Assuming the organization has good backup practices, the backups should be free from infection and can be restored to get the systems operational again.

Scan all of the infected files with up-to-date, anti-malware cleaning software: This step is important during the infection removal process but does not address restoring the encrypted files.

Fully patch the server operating systems hosting the fileshares: While this is necessary to prevent future attacks, it does not recover the encrypted files.

Change the files to be read-only: This will not help recover the encrypted data.


CompTIA A+ 220-1102 Exam Objectives, Section 2.8: Given a scenario use common data destruction and disposal methods.

Best practices for ransomware recovery.

Question 4

A user reports that a device with a statically defined IP is unable to connect to the internet. The technician runs the ipconfig /all command and sees the following output:

IPv4 Address............ 192.168.0.74

Subnet Mask.............255.255.255.255

Default Gateway......... 192.168.0.1

Which of the following is most likely the reason for the issue?



Answer : D

The ipconfig /all output shows the following:

IPv4 Address............ 192.168.0.74 Subnet Mask............. 255.255.255.255 Default Gateway......... 192.168.0.1

The issue with the subnet mask being set to 255.255.255.255 is that it specifies a single host subnet, meaning the device cannot communicate with other devices on the network or access the internet. The correct subnet mask for a typical home network should be:

Subnet mask of 255.255.255.0: This allows for communication within the same local network (192.168.0.0/24).

Default gateway 192.168.0.1: Correct, this is the typical address for the router.

IPv4 Address 192.168.0.74: Correct, within the correct subnet range.

Changing the subnet mask to 255.255.255.0 will resolve the connectivity issue.


CompTIA A+ 220-1102 Exam Objectives, Section 2.5: Given a scenario, install and configure basic wired/wireless small office/home office (SOHO) networks.

IP addressing and subnetting documentation.

Question 5

A user accidentally installed the incorrect word processing application on an iMac. Which of the following would allow the user to uninstall the incorrect application?



Answer : B

To uninstall an incorrect application on an iMac, the standard and recommended method is:

Identify the application in Finder and drag it to the trash can: This action removes the application from the system. After dragging the application to the trash, the user should empty the trash to complete the uninstallation.

Move the application to the desktop and press delete: This action does not uninstall the application.

Use Spotlight to search for the application, and then run the application: Running the application does not uninstall it.

Use Time Machine to go back to the date before the installation: This method can be used to restore the system to a previous state but is not necessary for uninstalling an application.


CompTIA A+ 220-1102 Exam Objectives, Section 1.10: Identify common features and tools of the macOS/desktop OS.

Apple support documentation for uninstalling applications.

Question 6

Users report that a network printer intermittently goes offline during the day. Which of the following commands should the technician use to confirm whether the printer has connectivity issues?



Answer : A

To confirm whether a network printer has connectivity issues, the technician should use:

ping: This command checks the connectivity to the printer by sending packets and measuring the response time. It helps determine if the printer is reachable on the network.

netstat: Provides statistics and current network connections but does not directly confirm connectivity to a specific device.

net: Used for network resources management but not specifically for checking connectivity.

nslookup: Used for querying DNS to obtain domain name or IP address mapping, not for checking connectivity.


CompTIA A+ 220-1102 Exam Objectives, Section 2.8: Given a scenario, use networking tools.

Network troubleshooting commands documentation.

Question 7

A customer needs to purchase a desktop capable of rendering video. Which of the following should the customer prioritize?



Answer : C

For rendering video, the most critical component a customer should prioritize in a desktop is:

GPU (Graphics Processing Unit): The GPU is specifically designed to handle complex graphics and video rendering tasks. A powerful GPU will significantly improve performance in video rendering applications.

NIC (Network Interface Card): Important for network connectivity but irrelevant for video rendering.

USB: Useful for peripherals but does not impact video rendering capabilities.

HDMI: An important output interface for connecting monitors but not crucial for the rendering process itself.


CompTIA A+ 220-1102 Exam Objectives, Section 1.8: Explain common OS types and their purposes, including hardware components for specific tasks.

GPU importance in video rendering documentation.

Page:    1 / 14   
Total 685 questions