This article carries Free CompTIA A+ Core 2 practice test Questions and their elaborate answers for the CompTIA A+ (220-1102) Core 2 Exam.
About the Certification
CompTIA A+ is considered one of the major certifications for starting a career in IT. It is the Industry Standard that jet launches IT careers in the digital world. The CompTIA A+ (220-1102) Core 2 Certification enables you to perform spontaneous critical IT support tasks and end-point management.
What does the exam cover?
The exam covers the configuration of the device operating systems, that is, Mac, Linux, Android, iOS, Chrome OS, and Windows, along with the administration of cloud and client based softwares. It comprises a total of 90 questions which includes Multiple choice, multiple response, performance based, and drag and drop questions.
What is in there for you?
The professionals holding this certification are Quality problem solvers. They provide support for the on-demand technologies involving Cloud, Security, Data Management, and more. It enables you to demonstrate core security skills.
Let’s start !
Domain: Security
Q1 : You want to implement a firewall in your network. The firewall should process each request coming from an outside network and should make a rule-based decision whether to allow or deny the request. Which type of firewall should be used in this scenario?
A. Stateful inspection
B. Proxy
C. Packet Filter
D. None of the above
Correct Answer: B
Explanation:
Proxy firewall processes requests from outside the network and makes rule-based decisions to deny or allow a request.
Option A is incorrect because stateful inspection is a packet record kept in a state table that tracks every communication channel.
Option C is incorrect because packet filters block request(s) on application type.
Reference Link: https://www.fortinet.com/resources/cyberglossary/proxy-firewall
Domain: Operating System
Q2 : Netboot technology that enables devices to boot from the network is developed by which organization?
Cisco inspection
Microsoft
Apple
Google
Correct Answer: C
Explanation:
Netboot is developed by Apple.
Reference Link: https://images.apple.com/server/docs/NetBoot_TB_v10.4.pdf
Domain : Operating System
Q3 : Which partition standard does devices with UEFI specification use?
A. GPT
B. MBR
C. Logical
D. None of the above
Correct Answer: A
Explanation:
Devices with UEFI specification use GPT partition.
Option B is incorrect because the MBR partition is not used by UEFI specification devices.
Option C is incorrect because logical is not a partition type.
Reference Link: https://www.easeus.com/partition-master/partition-gpt-disk.html
Domain : Operating System
Q4 : Which of the following commands is used to connect and disconnect from a network resource in the windows operating system?
A. net share
B. net use
C. netstat
D. net config
Correct Answer: B
Explanation:
net use command is used to connect/disconnect from a network resource in windows os.
Option A is incorrect because net share displays all the information about shared resources in the network.
Option C is incorrect because netstat displays an active TCP connection.
Option D is incorrect because the net config is used to manage network resources.
Reference Link : https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/gg651155(v=ws.11)
Domain : Operating System
Q5 : You found out that there is a windows machine having a startup issue. Which utility will you use to troubleshoot this issue?
A. Task manager
B. Registry edits
C. Check disk
D. MSConfig
Correct Answer: D
Explanation:
MS config is used to troubleshoot startup issues in the Windows operating system.
Option A is incorrect because the task manager is used to display all running tasks/applications.
Option B is incorrect because registry edit is used to edit the registry settings.
Option C is incorrect because the check disk(chkdsk) is used to repair/recover disks.
Reference Link: https://www.dell.com/support/kbdoc/en-in/000136771/what-does-the-msconfig-utility-do-in-windows-8-8-1-and-10-on-your-dell-pc
Domain: Software Troubleshooting
Q6 : Which of the following commands is used in Windows OS to get an overview of the security policies applied to a single user or computer?
A. gpupdate
B. gpedit.msc
C. gpresult
D. hostname
Correct Answer: C
Explanation:
gpresult command is used to get information about security policies applied to a single user or system in windows os.
Option A is incorrect because the gpupdate command is used to enforce the group policies that are applied by an organization.
Option B is incorrect because the gpedit.msc command is used to open the policy editor in the windows operating system.
Option D is incorrect because the hostname command is used to know the name of the pc.
Reference Link: https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/gpresult
Domain: Software Troubleshooting
Q7 : Which of the following bootrec commands is used to rebuild the master boot record for the system partition?
A. bootrec /fixboot.
B. bootrec /fixmbr.
C. bootrec /scanos.
D. bootrec /rebuildbcd.
Correct Answer: B
Explanation:
bootrec /fixmbr command is used to rebuild the master boot record for the system partition.
Option A is incorrect because the bootrec /fixboot command is used to rebuild the boot sector for the active system partition.
Option C is incorrect because the bootrec /scanos command checks for Windows installation currently not in the BCD store and shows the results..
Option D is incorrect because the bootrec /rebuildbcd command checks for windows installation currently not in the BCD store and provides an option to add them into the BCD store.
Reference Link: https://docs.microsoft.com/en-us/windows/client-management/advanced-troubleshooting-boot-problems
Domain: Operating System
Q8 : Which of the following options is not true about the LILO boot manager provided in Linux?
LILO supports the UEFI BIOS system.
LILO is the old default boot loader in Linux.
LILO is a simple and old boot loader for Linux.
None of the above.
Correct Answer: A
Explanation:
LILO is a simple and old boot manager for Linux that does not support the UEFI BIOS system.
Reference Link : https://en.wikipedia.org/wiki/LILO_(boot_loader)
Domain: Operating System
Q9 : A kernel panic is associated with which of the following operating systems (Select all that apply)?
Linux
MacOS
Windows
None of the above
Correct Answers: A and B
Explanation:
Corrupted device drivers may cause issues while the system boots up. In windows, it is commonly referred to as blue screen of death(BSOD) while in Linux and MacOS it is referred to as a kernel panic.
Reference Link: https://en.wikipedia.org/wiki/Kernel_panic
Domain: Software Troubleshooting
Q10 : System restore uses the default image to restore the system to a specific date and state.
A. True.
B. False.
Correct Answer: B
Explanation:
System restores use restore points that are snapshots of the system at a given point of time to return the system to its previous state.
Reference Link: https://en.wikipedia.org/wiki/Kernel_panic
Domain: Operating System
Q11 : Which of the following commands is used to create a file in macOS?
A. touch.
B. rm.
C. cp.
D. mv.
Correct Answer: A
Explanation:
touch command is used in macOS to create a new file.
Option B is incorrect because rm is used to delete a file.
Option C is incorrect because cp is used to copy a file.
Option D is incorrect because mv is used to move a file.
Reference Link: https://en.wikipedia.org/wiki/Touch_(command)
Domain: Software Troubleshooting
Q12 : You want to verify if the previous system shutdown on a windows machine was successful or not. Which of the following commands should you use?
A. chkdsk
B. diskpart
C. chkntfs
D. None of the above
Correct Answer: C
Explanation:
chkntfs is the command that can be used to check if the previous system shutdown was successful.
Option B is incorrect because diskpart is used to manage system drives.
Option A is incorrect because chkdsk is used to check and fix any drive issue.
Reference Link: https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/chkntfs
Domain: Software Troubleshooting
Q13 : A user is reporting that he is able to connect to resources in the organization with the IP address but not with their name.What could be the possible issue here?
A. The DNS server may be down or the dns is not configured properly.
B. User credentials are not valid for making requests by name.
C. User is not authorized to access the resource by their name
D. We can not access network resources by their name, they are only accessible by IP address.
Correct Answer: A
Explanation:
DNS(Domain name system) resolves named resources into IP addresses that are connected in the network, so if a user is able to connect with the IP address but not with the resource name, then either dns server is down and/or it is not properly configured in users machine.
Option B is incorrect because user credentials are not used in making a request by resource name.
Option C is incorrect because if the user is not authorized, then connectivity with the id address is also not possible.
Option D is incorrect because we can access resources by name and the DNS resolver works for the same .
Reference Link: https://www.cloudflare.com/learning/dns/what-is-dns/
Domain: Software Troubleshooting
Q14 : PowerShell scripts have which of the following extensions?
A. .sh
B. .ps1
C. .py
D. .bat
Correct Answer: B
Explanation:
PowerShell scripts have .ps1 as their extension.
Option A is incorrect because .sh is an extension of the shell script.
Option C is incorrect because .py is the extension of python.
Option D is incorrect because .bat is the extension of the batch file.
Domain: Software Troubleshooting
Q15 : Mike uses a laptop for his office work and wants to connect to a network wirelessly but does not have that functionality on his machine? How would you resolve this issue?
A. The operating system needs to be updated.
B. Connect an ethernet cable.
C. Attach a USB wireless card.
D. None of the above.
Correct Answer: C
Explanation:
If a system does not have inbuilt Wi-Fi, then an external wireless card can be used to connect to the network wirelessly.
Option A is incorrect because the operating system update will not enable connecting wireless networks.
Option B is incorrect because the ethernet cable is not for wireless connection.
Reference Link: https://en.wikipedia.org/wiki/Wireless_USB
Domain: Software Troubleshooting
Q16 : Lynda complains her mobile device is too hot to touch. What action would you take to investigate this issue?
A. Clean the ventilation duct with compressed air.
B. Replace the battery.
C. Adjust the screen brightness.
D. Make sure the mobile gets proper air circulation.
Correct Answers: A and D
Explanation:
Devices get hot when there is no proper airflow or poor ventilation. So, options A and D are correct here.
Option B is incorrect because replacing the battery will not help resolve the hot issue.
Option C is incorrect because the device getting hot does not have any association with screen brightness.
Domain: Software Troubleshooting
Q17 : Steve complains that his print jobs are not showing in the print queue. Which of the following could be a potential issue here?
A. General network problem.
B. Insufficient user permission.
C. Insufficient space on the drive containing the spool folder.
D. All the above.
E. None of the above
Correct Answer: D
Explanation:
Print jobs not showing in the print queue may be due to any of the reasons mentioned in options A, B, C so option D is correct here.
Domain: Software Troubleshooting
Q18 : Jack is using a laser printer for his document. He reported that the printer is producing repeating horizontal lines or white space. What could be the possible issue here?
A. Dirty or faulty transfer corona.
B. Poor quality paper.
C. Dirty fuser roller.
D. Fuser temperature is too low.
Correct Answer: C
Explanation:
Repeating horizontal lines or white space generally occurs when the fuser roller is dirty.
Option A is incorrect because dirty or faulty transfer corona produces a low-quality image.
Option B is incorrect because poor quality paper produces low-quality images.
Option D is incorrect because low fuser temperature produces smeared output.
Domain: Software Troubleshooting
Q19 : You have recently installed a new second hard drive on a workstation, but the drive is not visible in explorer. What steps would you take to fix the issue? (Select all that apply)
A. Format the drive.
B. Partition the drive.
C. Initialize the drive.
D. All the above.
E. None of the above
Correct Answer: D
Explanation:
Secondary drives need to be formatted, partitioned and initialized to work correctly, so option D is correct here.
Domain: Software Troubleshooting
Q20 : One of the workstations on Windows 10 OS recently got its video driver updated but after the driver updated the blue screen of death (BSOD) started appearing while the system booted. Which of the following options is best suited for rolling back the driver update?
A. Format the system.
B. Boot in safe mode to rollback driver update.
C. Access the Windows RE command prompt.
D. None of the above.
Correct Answer: B
Explanation:
Booting into safe mode and then using a device manager is the best option for rolling back a device drive.
Option A is incorrect because formatting the system will erase all its data.
Option C is incorrect because the Windows RE command prompt is not the most appropriate option for rolling back the driver.
Domain: Operational Procedures
Q21 : Which of the following options enables you to recover a password in case of a forgotten password in Windows 10?
A. Write down the password manually in a notebook.
B. Creating a password recovery disk.
C. Sharing your password with your colleague.
D. None of the above.
Correct Answer: B
Explanation:
The password recovery disc enables users to recover passwords in case a user forgot his/her password.
Option A is incorrect because writing down the password manually in the notebook may help you in recovering the password, but it is not full proof as the notebook can also be misplaced.
Option C is incorrect because sharing your credentials is against the security policy of an organization
Domain: Operational Procedures
Q22 : A _______ plan should be there to tackle the failure of change?
A. Rollout.
B. Risk analysis.
C. Backout.
D. End user acceptance.
Correct Answer: C
Explanation:
For tackling the unforeseen issue or failure of a plan, a backout should be in place to revert the environment to its previous working state.
Option A is incorrect because there is no rollout plan in the operational procedure.
Option B is incorrect because risk analysis is done before implementing a change into the environment.
Option D is incorrect because end-user acceptance is about educating the user of the change that has been completed.
Domain: Operational Procedures
Q23 : Which of the following backup levels will consider backing up all files in the system including the operating system?
A. File Level.
B. Image Level.
C. Cloud Level.
D. None of the above.
Correct Answer: B
Explanation:
In image level backup all the files and directories along with the operating system on a system are backed up and then can be restored on a blank drive.
Option A is incorrect because File level backup only takes backup of the files.
Option C is incorrect because cloud storage can be used in both file and image level backup.
Domain: Operational Procedures
Q24 : Mike, an employee in zen corporation, is trying to update his workstation password but he is constantly getting messages stating that “password must be minimum 12 characters long and must contain alphanumeric characters”. Which policy enables an organization to set up restrictions about the minimum complexity of passwords in the organization ?
A. Security policy.
B. Acceptable use policy.
C. Password policy.
D. Change document.
Correct Answer: C
Explanation:
The password policy of an organization defines how long and complex the password should be and when it will expire along with the use of MFA.
Option A is incorrect because security policy defines how security is implemented in an organization.
Option B is incorrect because an acceptable user policy defines how the asset provided by the organization should be fairly used.
Option D is incorrect because the change document is specific to changes proposed to an infrastructure.
Domain: Security
Q25 : ______ enables users to encrypt files so that except the account owner no other user can see the files.
A. NTFS.
B. FAT.
C. EFS
D. FAT32.
Correct Answer: C
Explanation:
EFS(Encrypting file system) enables users to encrypt files, making them unviewable for other users.
Reference Link: https://www.techtarget.com/searchsecurity/definition/Encrypting-File-System
Summary
Did you get all the questions right? You are on the right trajectory. These free questions on CompTIA A+ 220-1102 (Core 2) certification must have given you the assessment on the exam and some of the concepts that need to be covered for passing the exam. Additionally, by taking CompTIA A+ core 2 practice tests, you can clear the actual exam within the first attempt.
- Top 10 Highest Paying Cloud Certifications in 2023 - March 1, 2023
- 12 AWS Certifications – Which One Should I Choose? - February 22, 2023
- 11 Kubernetes Security Best Practices you should follow in 2023 - May 30, 2022
- How to run Kubernetes on AWS – A detailed Guide! - May 30, 2022
- Free questions on CompTIA Network+ (N10-008) Certification Exam - April 13, 2022
- 25 Free Questions on Microsoft Azure AI Fundamentals (AI-900) - March 25, 2022
- How to Integrate Jenkins with GitHub? - March 22, 2022
- How to Create CI/CD Pipeline Inside Jenkins ? - March 22, 2022