1. Home
  2. CompTIA
  3. 220-1102 Exam Info
  4. 220-1102 Exam Questions

Master CompTIA A+ Core 2 Exam 220-1102: Your Gateway to IT Success

Ready to conquer the CompTIA A+ Core 2 Exam 220-1102 and unlock a world of IT opportunities? Our comprehensive study materials are your secret weapon for exam success. Designed by industry experts, our practice questions cover every aspect of the exam, from operating systems to security protocols. Don't let test anxiety hold you back – our adaptive learning system boosts confidence and retention. With flexible formats (PDF, web-based, and desktop software), you can study anytime, anywhere. Join thousands of satisfied IT professionals who've accelerated their careers with our proven resources. Whether you're eyeing roles in cybersecurity, network administration, or tech support, mastering this exam is your first step. Time is ticking – seize this chance to invest in your future and stand out in the competitive IT landscape. Your dream career awaits – are you ready to claim it?

Page: 1 /
Total 750 questions
Get Free Questions & Answers PDF
Question 1

A technician is troubleshooting a PC that will not run Windows Defender. Windows Defender has been disabled, and no other antivirus is installed on the PC. Which of the following would have caused this issue?


Correct : B

Rootkits are particularly dangerous because they modify the operating system to hide their presence and can disable antivirus software like Windows Defender. Ransomware (A) encrypts files, but usually does not disable antivirus software. Spyware (C) and Keyloggers (D) typically do not directly disable antivirus programs either.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 2

Which of the following is used to detect and record access to restricted areas?


Correct : C

Badge readers are devices that scan employee or visitor credentials, logging entries and exits from restricted areas. Video surveillance (B) provides a visual record but does not directly control access. Bollards (A) and fences (D) provide physical security but cannot detect or record access events.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 3

A technician is configuring a workstation's security settings, and the following options are available:

Account lockout policy

Group policy

Two-factor authentication

Password complexity requirements

Firewalls

User accounts

Access control lists

Antivirus software

Which of the following settings should the technician configure to deploy strong password enforcement across the enterprise?


Correct : B

Detailed

The technician should configure 'Group Policy' (Option B) to enforce password complexity across the enterprise. Group Policy in a Windows environment allows administrators to manage various settings, including password policies, at a domain level. This can include enforcing complexity requirements (such as minimum length, use of uppercase, lowercase, and special characters), expiration times, and other security measures.

Account lockout policy (Option A) controls how many failed login attempts trigger a lockout but does not handle password complexity.

Two-factor authentication (Option C) is an additional security measure requiring a second form of authentication, but it does not enforce password policies.

Access control lists (Option D) define which users or systems have access to resources, not how passwords are managed.

CompTIA A+ Core 2 Reference:

2.6 - Configure workstation security best practices, including password complexity and group policies.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 4

A technician is creating a Windows splash screen that details login expectations. Which of the following should the technician most likely use?


Correct : D

Detailed

The appropriate choice is 'Acceptable Use Policy' (Option D). This policy defines the rules for how users should use the system, including login expectations and proper behavior when using company resources. It's typically displayed as a splash screen to remind users of their responsibilities.

End-user license agreement (Option A) pertains to the terms of software usage.

Non-disclosure agreement (Option B) deals with confidentiality but is unrelated to login behavior.

Regulatory compliance (Option C) relates to adherence to laws and regulations, but it is not typically displayed on a splash screen for login expectations.

CompTIA A+ Core 2 Reference:

4.6 - Explain the importance of prohibited content/activity and acceptable use policies.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 5

A user reported that Windows has crashed several times during the day. A technician needs to check error messages to determine whether the issue pertains to the hardware or an application. Which of the following tools should the technician use?


Correct : A

Detailed

Event Viewer (Option A) is the appropriate tool to check for system and application logs, including error messages and crash reports. It helps the technician determine the cause of the crashes by reviewing logged events.

Resource Monitor (Option B) tracks real-time usage of system resources but doesn't log errors.

Performance Monitor (Option C) monitors system performance but isn't primarily used for crash diagnostics.

Device Manager (Option D) manages hardware devices but doesn't provide crash logs.

CompTIA A+ Core 2 Reference:

3.1 - Troubleshoot common Windows OS problems using tools like Event Viewer


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Page:    1 / 150   
Total 750 questions