CompTIA A+ 220-1102

25 Free Questions on CompTIA A+ (220-1102) Core 2 Certification

This article carries Free CompTIA A+ Core 2 practice test Questions and their elaborate answers for the CompTIA A+ (220-1102) Core 2 Exam.

About the Certification

CompTIA A+ is considered one of the major certifications for starting a career in IT. It is the Industry Standard that jet launches IT careers in the digital world. The CompTIA A+ (220-1102) Core 2 Certification enables you to perform spontaneous critical IT support tasks and end-point management.

What does the exam cover?

The exam covers the configuration of the device operating systems, that is, Mac, Linux, Android, iOS, Chrome OS, and Windows, along with the administration of cloud and client based softwares. It comprises a total of 90 questions which includes Multiple choice, multiple response, performance based, and drag and drop questions.

What is in there for you?

The professionals holding this certification are Quality problem solvers. They provide support for the on-demand technologies involving Cloud, Security, Data Management, and more. It enables you to demonstrate core security skills.

Let’s start !

Domain: Security

Q1 : You want to implement a firewall in your network. The firewall should process each request coming from an outside network and should make a rule-based decision whether to allow or deny the request. Which type of firewall should be used in this scenario?

A. Stateful inspection
B. Proxy
C. Packet Filter
D. None of the above

Correct Answer: B

Explanation: 

Proxy firewall processes requests from outside the network and makes rule-based decisions to deny or allow a request. 

Option A is incorrect because stateful inspection is a packet record kept in a state table that tracks every communication channel.
Option C is incorrect because packet filters block request(s) on application type.

Reference Link: https://www.fortinet.com/resources/cyberglossary/proxy-firewall

 

Domain: Operating System

Q2 : Netboot technology that enables devices to boot from the network is developed by which organization?

Cisco inspection
Microsoft
Apple
Google

Correct Answer: C

Explanation: 

Netboot is developed by Apple. 

NetBoot
Source: netbook.xyz

Reference Link: https://images.apple.com/server/docs/NetBoot_TB_v10.4.pdf

 

Domain : Operating System

Q3 : Which partition standard does devices with UEFI specification use?

A. GPT
B. MBR
C. Logical
D. None of the above

Correct Answer: A

Explanation

Devices with UEFI specification use GPT partition. 

Option B is incorrect because the MBR partition is not used by UEFI specification devices.
Option C is incorrect because logical is not a partition type.

Reference Link: https://www.easeus.com/partition-master/partition-gpt-disk.html

 

Domain : Operating System

Q4 : Which of the following commands is used to connect and disconnect from a network resource in the windows operating system?

A. net share
B. net use
C. netstat
D. net config

Correct Answer: B

Explanation: 

net use command is used to connect/disconnect from a network resource in windows os. 

Option A is incorrect because net share displays all the information about shared resources in the network.
Option C is incorrect because netstat displays an active TCP connection.
Option D is incorrect because the net config is used to manage network resources.

Reference Link : https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/gg651155(v=ws.11)

 

Domain : Operating System

Q5 : You found out that there is a windows machine having a startup issue. Which utility will you use to troubleshoot this issue?

A. Task manager
B. Registry edits
C. Check disk
D. MSConfig

Correct Answer: D

Explanation: 

MS config is used to troubleshoot startup issues in the Windows operating system. 

Option A is incorrect because the task manager is used to display all running tasks/applications.
Option B is incorrect because registry edit is used to edit the registry settings.
Option C is incorrect because the check disk(chkdsk) is used to repair/recover disks.

Reference Link: https://www.dell.com/support/kbdoc/en-in/000136771/what-does-the-msconfig-utility-do-in-windows-8-8-1-and-10-on-your-dell-pc

 

Domain: Software Troubleshooting

Q6 : Which of the following commands is used in Windows OS to get an overview of the security policies applied to a single user or computer?

A. gpupdate
B. gpedit.msc
C. gpresult
D. hostname

Correct Answer: C

Explanation:

gpresult command is used to get information about security policies applied to a single user or system in windows os. 

Option A is incorrect because the gpupdate command is used to enforce the group policies that are applied by an organization.
Option B is incorrect because the gpedit.msc command is used to open the policy editor in the windows operating system.
Option D is incorrect because the hostname command is used to know the name of the pc.

Reference Link: https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/gpresult

 

Domain: Software Troubleshooting

Q7 : Which of the following bootrec commands is used to rebuild the master boot record for the system partition?

A. bootrec /fixboot.
B. bootrec /fixmbr.
C. bootrec /scanos.
D. bootrec /rebuildbcd.

Correct Answer: B

Explanation:

bootrec /fixmbr command is used to rebuild the master boot record for the system partition. 

Option A is incorrect because the bootrec /fixboot command is used to rebuild the boot sector for the active system partition.
Option C is incorrect because the bootrec /scanos command checks for Windows installation currently not in the BCD store and shows the results..
Option D is incorrect because the bootrec /rebuildbcd command checks for windows installation currently not in the BCD store and provides an option to add them into the BCD store.

Reference Link: https://docs.microsoft.com/en-us/windows/client-management/advanced-troubleshooting-boot-problems

 

Domain: Operating System

Q8 : Which of the following options is not true about the LILO boot manager provided in Linux? 

LILO supports the UEFI BIOS system.
LILO is the old default boot loader in Linux.
LILO is a simple and old boot loader for Linux.
None of the above.

Correct Answer: A

Explanation:

LILO is a simple and old boot manager for Linux that does not support the UEFI BIOS system. 

Reference Link : https://en.wikipedia.org/wiki/LILO_(boot_loader)

 

Domain: Operating System

Q9 : A kernel panic is associated with which of the following operating systems (Select all that apply)? 

Linux
MacOS
Windows
None of the above

Correct Answers: A and B

Explanation:

Corrupted device drivers may cause issues while the system boots up. In windows, it is commonly referred to as blue screen of death(BSOD) while in Linux and MacOS it is referred to as a kernel panic.

Reference Link: https://en.wikipedia.org/wiki/Kernel_panic

 

Domain: Software Troubleshooting

Q10 : System restore uses the default image to restore the system to a specific date and state. 

A. True.
B. False.

Correct Answer: B

Explanation:

System restores use restore points that are snapshots of the system at a given point of time to return the system to its previous state.

Reference Link: https://en.wikipedia.org/wiki/Kernel_panic

 

Domain: Operating System

Q11 : Which of the following commands is used to create a file in macOS? 

A. touch.
B. rm.
C. cp.
D. mv.

Correct Answer: A

Explanation:

touch command is used in macOS to create a new file.

Option B is incorrect because rm is used to delete a file.
Option C is incorrect because cp is used to copy a file.
Option D is incorrect because mv is used to move a file.

Reference Link: https://en.wikipedia.org/wiki/Touch_(command)

 

Domain: Software Troubleshooting

Q12 : You want to verify if the previous system shutdown on a windows machine was successful or not. Which of the following commands should you use? 

A. chkdsk
B. diskpart
C. chkntfs
D. None of the above

Correct Answer: C

Explanation:

chkntfs is the command that can be used to check if the previous system shutdown was successful.

Option B is incorrect because diskpart is used to manage system drives.
Option A is incorrect because chkdsk is used to check and fix any drive issue.

Reference Link: https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/chkntfs

 

Domain: Software Troubleshooting

Q13 : A user is reporting that he is able to connect to resources in the organization with the IP address but not with their name.What could be the possible issue here? 

A. The DNS server may be down or the dns is not configured properly.
B. User credentials are not valid for making requests by name.
C. User is not authorized to access the resource by their name
D. We can not access network resources by their name, they are only accessible by IP address.

Correct Answer: A

Explanation:

DNS(Domain name system) resolves named resources into IP addresses that are connected in the network, so if a user is able to connect with the IP address but not with the resource name, then either dns server is down and/or it is not properly configured in users machine.

Option B is incorrect because user credentials are not used in making a request by resource name.
Option C is incorrect because if the user is not authorized, then connectivity with the id address is also not possible.  
Option D is incorrect because we can access resources by name and the DNS resolver works for the same .

Reference Link: https://www.cloudflare.com/learning/dns/what-is-dns/

 

Domain: Software Troubleshooting

Q14 : PowerShell scripts have which of the following extensions? 

A. .sh
B. .ps1
C. .py
D. .bat

Correct Answer: B

Explanation:

PowerShell scripts have .ps1 as their extension.

Option A is incorrect because .sh is an extension of the shell script.
Option C is incorrect because .py is the extension of python.
Option D is incorrect because .bat is the extension of the batch file.

Reference Link: https://docs.microsoft.com/en-us/powershell/scripting/windows-powershell/ise/how-to-write-and-run-scripts-in-the-windows-powershell-ise?view=powershell-7.2

 

Domain: Software Troubleshooting

Q15 : Mike uses a laptop for his office work and wants to connect to a network wirelessly but does not have that functionality on his machine? How would you resolve this issue? 

A. The operating system needs to be updated.
B. Connect an ethernet cable.
C. Attach a USB wireless card.
D. None of the above.

Correct Answer: C

Explanation:

If a system does not have inbuilt Wi-Fi, then an external wireless card can be used to connect to the network wirelessly.

Option A is incorrect because the operating system update will not enable connecting wireless networks.
Option B is incorrect because the ethernet cable is not for wireless connection.

Reference Link: https://en.wikipedia.org/wiki/Wireless_USB

 

Domain: Software Troubleshooting

Q16 : Lynda complains her mobile device is too hot to touch. What action would you take to investigate this issue? 

A. Clean the ventilation duct with compressed air.
B. Replace the battery.
C. Adjust the screen brightness.
D. Make sure the mobile gets proper air circulation.

Correct Answers: A and D

Explanation:

Devices get hot when there is no proper airflow or poor ventilation. So, options A and D are correct here.

Option B is incorrect because replacing the battery will not help resolve the hot issue.
Option C is incorrect because the device getting hot does not have any association with screen brightness.

 

Domain: Software Troubleshooting

Q17 : Steve complains that his print jobs are not showing in the print queue. Which of the following could be a potential issue here? 

A. General network problem.
B. Insufficient user permission.
C. Insufficient space on the drive containing the spool folder.
D. All the above.
E. None of the above

Correct Answer: D

Explanation:

Print jobs not showing in the print queue may be due to any of the reasons mentioned in options A, B, C so option D is correct here.

Domain: Software Troubleshooting

Q18 : Jack is using a laser printer for his document. He reported that the printer is producing repeating horizontal lines or white space. What could be the possible issue here? 

A. Dirty or faulty transfer corona.
B. Poor quality paper.
C. Dirty fuser roller.
D. Fuser temperature is too low.

Correct Answer: C

Explanation:

Repeating horizontal lines or white space generally occurs when the fuser roller is dirty.

Option A is incorrect because dirty or faulty transfer corona produces a low-quality image.
Option B is incorrect because poor quality paper produces low-quality images.
Option D is incorrect because low fuser temperature produces smeared output.

 

Domain: Software Troubleshooting

Q19 : You have recently installed a new second hard drive on a workstation, but the drive is not visible in explorer. What steps would you take to fix the issue? (Select all that apply)

A. Format the drive.
B. Partition the drive.
C. Initialize the drive.
D. All the above.
E. None of the above

Correct Answer: D

Explanation:

Secondary drives need to be formatted, partitioned and initialized to work correctly, so option D is correct here.

 

Domain: Software Troubleshooting

Q20 : One of the workstations on Windows 10 OS recently got its video driver updated but after the driver updated the blue screen of death (BSOD) started appearing while the system booted. Which of the following options is best suited for rolling back the driver update? 

A. Format the system.
B. Boot in safe mode to rollback driver update.
C. Access the Windows RE command prompt.
D. None of the above.

Correct Answer: B

Explanation:

Booting into safe mode and then using a device manager is the best option for rolling back a device drive.

Option A is incorrect because formatting the system will erase all its data.
Option C is incorrect because the Windows RE command prompt is not the most appropriate option for rolling back the driver.

 

Domain: Operational Procedures 

Q21 : Which of the following options enables you to recover a password in case of a forgotten password in Windows 10? 

A. Write down the password manually in a notebook.
B. Creating a password recovery disk.
C. Sharing your password with your colleague.
D. None of the above.

Correct Answer: B

Explanation:

The password recovery disc enables users to recover passwords in case a user forgot his/her password.

Option A is incorrect because writing down the password manually in the notebook may help you in recovering the password, but it is not full proof as the notebook can also be misplaced.
Option C is incorrect because sharing your credentials is against the security policy of an organization

 

Domain: Operational Procedures 

Q22 : A _______ plan should be there to tackle the failure of change? 

A. Rollout.
B. Risk analysis. 
C. Backout.
D. End user acceptance.

Correct Answer: C

Explanation:

For tackling the unforeseen issue or failure of a plan, a backout should be in place to revert the environment to its previous working state.

Option A is incorrect because there is no rollout plan in the operational procedure.
Option B is incorrect because risk analysis is done before implementing a change into the environment.
Option D is incorrect because end-user acceptance is about educating the user of the change that has been completed.

 

Domain: Operational Procedures 

Q23 : Which of the following backup levels will consider backing up all files in the system including the operating system? 

A. File Level. 
B. Image Level. 
C. Cloud Level.
D. None of the above.

Correct Answer: B

Explanation:

In image level backup all the files and directories along with the operating system on a system are backed up and then can be restored on a blank drive.

Option A is incorrect because File level backup only takes backup of the files.
Option C is incorrect because cloud storage can be used in both file and image level backup.

 

Domain: Operational Procedures 

Q24 : Mike, an employee in zen corporation, is trying to update his workstation password but he is constantly getting messages stating that “password must be minimum 12 characters long and must contain alphanumeric characters”. Which policy enables an organization to set up restrictions about the minimum complexity of passwords in the organization ? 

A. Security policy.
B. Acceptable use policy.
C. Password policy.
D. Change document.

Correct Answer: C

Explanation:

The password policy of an organization defines how long and complex the password should be and when it will expire along with the use of MFA.

Option A is incorrect because security policy defines how security is implemented in an organization.
Option B is incorrect because an acceptable user policy defines how the asset provided by the organization should be fairly used.
Option D is incorrect because the change document is specific to changes proposed to an infrastructure.

Domain: Security

Q25 : ______ enables users to encrypt files so that except the account owner no other user can see the files. 

A. NTFS.
B. FAT.
C. EFS
D. FAT32.

Correct Answer: C

Explanation:

EFS(Encrypting file system) enables users to encrypt files, making them unviewable for other users.

Reference Link: https://www.techtarget.com/searchsecurity/definition/Encrypting-File-System

Summary

Did you get all the questions right? You are on the right trajectory. These free questions on CompTIA A+ 220-1102 (Core 2) certification must have given you the assessment on the exam and some of the concepts that need to be covered for passing the exam. Additionally, by taking CompTIA A+ core 2 practice tests, you can clear the actual exam within the first attempt.

About Dharmalingam N

Dharmalingam.N holds a master degree in Business Administration and writes on a wide range of topics ranging from technology to business analysis. He has a background in Relationship Management. Some of the topics he has written about and that have been published include; project management, business analysis and customer engagement.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top