Free CompTIA A+ 220-1002 Practice Test

This is a free A+ practice test 220-1002 also known as A+ Core 2. The A+ Core 2 exam contains four Main Domains covering mostly hardware and networking content. Click the link for the complete A+ 220-1002 exam objectives. Below free A+ practice test questions reflect these new A+ 220-1001 exam objectives.

Free A+ 1002 Practice Test Study Guide 

Our A+ ExamNotes is a free A+ Study guide for exams 220-1001 and 220-1002 that covers every A+ 1001 & 1002 exam objective as well as every single A+ sub-objective as defined by CompTIA.

A+ 1002 Practice Test: 25 BONUS QUESTIONS

We have just updated this free A+ practice test 220-1001 by adding another 25 questions past the below first 10 questions so make sure to scroll all the way down!

Understanding the CompTIA A+ Exam

This a 6 – 7 page PDF explaining the CompTIA A+ exam in some detail. Click on the link 5 Steps to A+ Certification Success. It will take you to a form, under “Preferred Certification Track” pick your exam.

Question 1

Which operating system will be installed on your new Chromebook by default?

          a) macOS

          b) Google OS

          c) Chrome OS

          d) Windows 10

Answer & Explanation: The Chromebook will come installed with Google’s Chrome OS by default. The Chrome OS is based on the Linux kernel. The open-source, development version of Chrome OS is called Chromium OS. The macOS can be installed later, as can Windows 10. At the time of this writing, Google OS is rumored to be in development but is not available. Answer: Chrome OS.

Main Domain 1.0 – Operational Procedures

Sub-Objective 1.1 – Compare and contrast common operating system types and their purposes.

Question 2

A user complains that they can’t launch Hyper-V from home. The user cannot even find the program settings. However, the user can access the Internet. In order to help this user, which question would you ask first?

          a) Can you access the company website?

          b) Can you ping the server?

          c) Which Edition of Windows is installed?

          d) What error message is being displayed?

Answer & Explanation: Since the user can access the Internet, there is no need to ask the user if he or she can access the company website access or ping the server. Since there is no error message, this would indicate that the user is using a Windows Edition that does not support Hyper-V. Windows 10 Pro, Enterprise, and Education Editions support Hyper-V. Windows 10 Home Edition does not. Answer: Which Edition of Windows is installed?

Main Domain 1.0 – Operational Procedures

Sub-Objective 1.2 – Compare and contrast features of Microsoft Windows versions.

Question 3

When upgrading a system from Windows 7 Home Premium Edition (SP1) to Windows 10, which Windows 10 Edition is recommended?

          a) Home

          b) Home Premium

          c) Professional

          d) Any edition that the hardware supports

Answer & Explanation: Windows 10 Home Edition is the recommended upgrade from Windows 7 Starter, Home Basic, and Home Premium editions. Windows 10 Professional Edition is the recommended upgrade for Windows 7 Professional and Windows 7 Ultimate Editions. Answer: Home.

Main Domain 1.0 – Operational Procedures

Sub-Objective 1.2 – Compare and contrast features of Microsoft Windows versions.

Question 4

By default, which type of script file will a script written with Windows 10 PowerShell ISE be saved as?

          a) .bat

          b) .ps1

          c) .sh

          d) .py

Answer & Explanation: PowerShell ISE most commonly saves scripts in *.ps1, *. psm1, and *.psd1 formats. Windows batch files created at the Command Prompt are saved in the .bat extension and are used to run commands. Linux bash scripts are saved in the .sh extension and are also used to run commands, similar to .bat files. Python scripts are saved in the .py extension. Answer: .ps1

Main Domain 4.0 – Operational Procedures

Sub-Objective 4.8 – Identify the basics of scripting.

Question 5

When configuring email you must enter: (Choose all that apply)

          a) Password

          b) SMTP

          c) DNS

          d) POP3

          e) Account Name

          f) ISP

Answer & Explanation: Email configuration requires setting the SMTP server name, the POP3 server name, and the account name. The password can be left to be entered each time you log in to get email. Remember that optionally, you can enter the password during configuration and check off to have it saved. Answers: SMTP, POP3, and Account Name.

Main Domain 2.0 – Security

Sub-Objective 2.5 – Compare and contrast social engineering, threats, and vulnerabilities.

Question 6

Which of the following can provide some protection for your network from outside invaders? (Choose all that apply)

          a) Firewalls

          b) Class 3 modems

          c) Class 2 modems

          d) Packet-Filtering Routers

          e) Hidden Files

          f) Proxy Servers

Answer & Explanation: A firewall can greatly improve network security and reduce risks to hosts on the subnet by filtering inherently insecure services. As a result, the subnet network environment is exposed to fewer risks, since only selected protocols will be able to pass through the firewall. A firewall also provides the ability to control access to site systems. For example, some hosts can be made reachable from outside networks, whereas others can be effectively sealed off from unwanted access.  Privacy is of great concern to certain sites, since what would normally be considered innocuous information might actually contain clues that would be useful to an attacker. Using a firewall, some sites wish to block services such as finger and Domain Name Service.  If all access to and from the Internet passes through a firewall, the firewall can log accesses and provide valuable statistics about network usage. A firewall, with appropriate alarms that sound when suspicious activity occurs, can also provide details on whether the firewall and network are being probed or attacked. Answers: Firewalls, Packet-Filtering Routers, and Proxy Servers.

Main Domain 2.0 – Security

Sub-Objective 2.7 – Given a scenario, implement security best practices to secure a workstation.

Question 7

You have lost your iPhone. Fortunately, you have enabled the Find My iPhone feature. You log on to your account, access the map, but do not see the device. Fearing a breach of your privacy, which would best protect the data?

          a) Send message

          b) Remote lock

          c) Remote wipe

          d) Remote access

Answer & Explanation: The best choice to protect your data in this example is remote wipe. If the device is recovered, it can be restored from backup. Answer: Remote wipe.

Main Domain 2.0 – Security

Sub-Objective 2.8 – Given a scenario, implement methods for securing mobile devices.

Question 8

You are using the Performance Monitor on a Windows 7 Professional workstation and make note of the following counters: Memory: Pages/sec  80; Processor: %utilization  90; Physical disk: % disk time  85. Which of the following solutions would overcome the bottleneck indicated by these results?

          a) Add a SCSI hard disk drive.

          b) Upgrade to a faster processor.

          c) Add a second CPU

          d) Add RAM

Answer & Explanation: These measurements from Performance Monitor are indicating overuse of virtual memory. Note the heavy paging per second, hard drive usage, and the CPU usage. Adding RAM is the right solution. Answer: Add RAM.

Main Domain 3.0 – Software Troubleshooting

Sub-Objective 3.1 – Given a scenario, troubleshoot Microsoft Windows OS problems.

Question 9

A Windows 7 Professional computer is having boot problems. You investigate and decide that the problem may be related to a process being initiated by Internet Explorer. Which one of the following Advanced Options would you choose to correct the problem?

          a) Safe Mode with Networking.

          b) Safe Mode with Command Prompt.

          c) Safe Mode.

          d) Enable Boot Logging.

Answer & Explanation: Remember, Safe Mode prevents startup files and most of the drivers from loading. This simplification of the system can give you the chance to troubleshoot and detect needed fixes. Safe Mode with networking will permit internet access. Answer: Safe Mode with Networking.

Main Domain 3.0 – Software Troubleshooting

Sub-Objective 3.1 – Given a scenario, troubleshoot Microsoft Windows OS problems.

Question 10

Which device should not be plugged into a UPS?

          a) A monitor

          b) A laser printer

          c) A scanner

          d) A modem

Answer & Explanation: UPS devices contain batteries with enough power to run your PC for a few minutes so you can shut it down safely. They are not equipped to handle the power requirements of a laser printer or other high voltage devices, which will exhaust their charge very quickly. Answer: A laser printer

Main Domain 4.0 – Explain environmental impacts and appropriate controls.

Sub-Objective 4.5 – Identify the basics of scripting.

This completes our free practice test for A+ exam 220-1002!

The first step in preparing for the A+ 220-1002 Core 2 exam is to familiarize yourself with the exam objectives. Click the link for the complete A+ 220-1002 exam objectives.

three images of common biometrics security
Biometrics falls under A+ 220-1002 Exam sub-objective 2.1 “Summarize the importance of physical security measures.”

 

HERE ARE THE 25 BONUS QUESTIONS

We have just updated this free A+ practice test 220-1001 by adding another 25 questions past the below first 10 questions so make sure to scroll all the way down!

 

Question 1

A way to find out if a device has been rooted is to download and run the Root Checker Basic app. What type of condition and device does Root Checker Basic report on?

          a) Jailbroken iOS device

          b) Rooted Android device

          c) Rooted iOS device

          d) Rooted Windows Phone device

          e) Jailbroken Android device

Answer: Rooted Android device

Explanation: Root Checker Basic is a free app. that produces a report showing whether an Android device has been rooted or not. In regards to terminology Android and Windows Phone devices are said to “rooted” while iOS devices are referred to as “jailbroken”.

A+ 220-1002 Main Domain 1.0 – Operating Systems
Sub-Objective: 1.1 – “Compare and contrast common operating system types and their purposes.”

Question 2

The ALT+TAB keystroke produces which result in Windows 10?

          a) Switches between open programs.

          b) Closes the open program.

          c) Opens the closed program.

          d) Opens the Start Menu.

Answer: Switches between open programs.

Explanation: This keystroke is useful for multitasking within the Windows environment.

A+ 220-1002 Main Domain 1.0 – Operating Systems
Sub-Objective: 1.2 – “Compare and contrast features of Microsoft Windows versions.”

Question 3

How can disk management be accessed in Windows 10?

          a) Main Panel

          b) Device Manager

          c) Administrative Tools

          d) My Computer

Answer: Administrative Tools

Explanation: Most partition, boot sector, and drive configuration faults can be corrected or recovered from by using the Disk Management tool from the Computer Management utility of Administrative Tools.

A+ 220-1002 Main Domain 1.0 – Operating Systems
Sub-Objective: 1.2 – “Compare and contrast features of Microsoft Windows versions.”

Question 4

You have one physical drive partitioned into two partitions C: and D:. You add a second drive and create a primary DOS partition. What will the drive letter of the new partition be?

          a) C:

          b) D:

          c) E:

          d) F:

Answer: D:

Explanation: The OS assigns drive letters to the primary partitions first. This would make the first partition on the second disk D: and the extended partition on the first disk E:.

A+ 220-1002 Main Domain 1.0 – Operating Systems
Sub-Objective: 1.3 – “Summarize general OS installation considerations and upgrade methods.”

Question 5

When formatting a large capacity drive what situation would cause it to format at a lower capacity when you set it up in an operating system?

          a) Operating system overhead.

          b) The new drive is not IDE compatible.

          c) The ram does not support the larger capacity hard drives.

          d) The disk is full.

Answer: Operating system overhead.

Explanation: The operating system uses a portion of the drive for file allocation, boot records and other overhead. The formatted capacity never matches the actual drive size.

A+ 220-1002 Main Domain 1.0 – Operating Systems
Sub-Objective: 1.3 – “Summarize general OS installation considerations and upgrade methods.”

Question 6

What should be the first step when configuring a hard drive into a system?

          a) Format

          b) Install OS

          c) Configure DMA

          d) Partition

Answer: Partition

Explanation: The Disk Management is used to create logical boundaries which encompass all of the available space on a disk. After partitions are created, they must be formatted. This creates the file system which will store data.

A+ 220-1002 Main Domain 1.0 – Operating Systems
Sub-Objective: 1.3 – “Summarize general OS installation considerations and upgrade methods.”

Question 7

The Windows PXE allows a properly configured and supported Windows PC to:

          a) Bypass startup screens and boot directly to repair mode

          b) Boot from the network

          c) Start in the RE without intervention

          d) Launch AIK

Answer: Boot from the network

Explanation: The PXE (Preboot eXecution Environment) boots the computer to a network server containing the PE (Preinstallation Environment) and performs an unintended installation.

A+ 220-1002 Main Domain 1.0 – Operating Systems
Sub-Objective: 1.3 – “Summarize general OS installation considerations and upgrade methods.”

Question 8

You have been asked to load an image of Windows on 10 computers that just came in. How would this BEST be accomplished?

          a) Use the retail media on the server.

          b) Boot to PXE and load image from distribution point.

          c) Load the image to an SSD card and use on each machine.

          d) Make 10 copies of the image to DVD and load image from there.

Answer: Boot to PXE and load image from distribution point.

Explanation: A properly configured PXE distribution point (assuming no password) will allow the system to boot and automatically load the image. The other options all require more physical operations increasing time and labor requirements on the installer. You want this process to be as streamlined as possible.

A+ 220-1002 Main Domain 1.0 – Operating Systems
Sub-Objective: 1.3 – “Summarize general OS installation considerations and upgrade methods.”

Question 9

Which type of security token is the least vulnerable to malware?

          a) Hardware token

          b) Software token

          c) Badge reader

          d) None of these

Answer: Hardware token

Explanation: Hardware security tokens are standalone devices that provide a higher level of security than software tokens. Hardware tokens are often used with smart devices.

A+ 220-1002 Main Domain 2.0 – Security
Sub-Objective: 2.1 – “Summarize the importance of physical security measures.”

Question 10

All of the following fall into one security classification: Lock Doors, Shredding documents, Biometrics, RSA tokens, Retinal.

          a) Digital security

          b) Strong passwords

          c) User Education

          d) Physical Security

Answer: Physical Security

Explanation: All the areas covered are considered Physical.

A+ 220-1002 Main Domain 2.0 – Security
Sub-Objective: 2.1 – “Summarize the importance of physical security measures.”

Question 11

Which technique allows the path of local folders, such as Pictures or Documents, to appear as a network location while also being cached locally?

          a) OUs

          b) Groups

          c) Home folders

          d) Folder redirection

Answer: Folder redirection

Explanation: Folder redirection allows the path of local folders to be redirected to a network share while also being stored locally, allowing for increased speed and reliability. OUs, Groups, and Home Folders are not factors in this process.

A+ 220-1002 Main Domain 2.0 – Security
Sub-Objective: 2.2 – “Explain logical security concepts.”

Question 12

You are responsible for managing remote users. Their connections must adhere to the AAA management model. Which service would you choose?

          a) RADIUS

          b) PPP

          c) Dialup-Call back

          d) TACACS+

Answer: RADIUS

Explanation: RADIUS (Remote Access Dial-in User Service) provides the required Authentication, Authorization, and Accounting services needed for the AAA management model. Another viable option would be TACACS+ (Terminal Access Controller Access Control Service Plus) which is secure but lacks Authentication and Authorization functions.

A+ 220-1002 Main Domain 2.0 – Security
Sub-Objective: 2.3 – “Compare and contrast wireless security protocols and authentication methods.”

 

Question 13

Why is Shared Key authentication considered a security risk?

          a) The access point transmits the challenge text in the clear and receives the same challenge text encrypted with the WEP key.

          b) The keys are shared through broadcast with all network nodes.

          c) A hacker can see the keys with a sniffer.

          d) The WEP keys used on all computers are the same.

Answer: The access point transmits the challenge text in the clear and receives the same challenge text encrypted with the WEP key.

Explanation: (None)

A+ 220-1002 Main Domain 2.0 – Security
Sub-Objective: 2.3 – “Compare and contrast wireless security protocols and authentication methods.”

Question 14

You have an area near the pool and bar at your home that you want to configure for wireless access with no security. The area is remote and secluded enough that you have no security concerns. You have a router in place. How should you configure it?

          a) No SSID

          b) No password

          c) Set encryption to Open

          d) Set MAC filter to allow all

Answer: Set encryption to Open

Explanation: First, let us state for the record that this is not recommended! Having said that, all you need to do is disable your encryption to open. This will allow access to any device in range. You may want to decrease the radio power to be a little safer. The SSID is a network name and you will need one. Broadcasting it is not going to alter the need for its existence and in this case you would want it broadcast. Disabling security (open) will eliminate the need for users to have a password but you will still need one to change configurations, don’t lose it. The MAC filter is a blocker not an open door, leave it unchanged.

A+ 220-1002 Main Domain 2.0 – Security
Sub-Objective: 2.3 – “Compare and contrast wireless security protocols and authentication methods.”

Question 15

Which of the following will: (1) help prevent malware from installing itself; and (2) protect the Windows configuration and other settings?

          a) The UAC box

          b) Shared permissions

          c) Workgroup security with user accounts and passwords

          d) Advanced encryption technologies

Answer: The UAC box

Explanation: (None)

A+ 220-1002 Main Domain 2.0 – Security
Sub-Objective: 2.4 – “Given a scenario, detect, remove, and prevent malware using appropriate tools and methods.”

Question 16

Which devices are loaded during safe mode?

          a) Mouse, CD-ROM, keyboard

          b) Mouse, SVGA, keyboard

          c) Mouse, VGA, keyboard

          d) Mouse, keyboard, speakers

Answer: Mouse, VGA, keyboard

Explanation: Remember, Safe Mode is a way to boot the PC in a troubleshooting environment which only supports basic functions.

A+ 220-1002 Main Domain 3.0 – Software Troubleshooting
Sub-Objective: 3.1 – “Given a scenario, troubleshoot Microsoft Windows OS problems.”

Question 17

In Windows 8, what should be done if a 32-bit Windows based program stops responding?

          a) Click on Start, Shutdown and select ~Shutdown the computer~.

          b) Press CTRL-ALT-DEL and select Shutdown.

          c) Press CTRL-ALT-DEL and select End Task.

          d) Press CTRL-ALT-DEL, select the program that is not responding and press EndTask.

Answer: Press CTRL-ALT-DEL, select the program that is not responding and press EndTask.

Explanation: Because of the nature of preemptive multitasking in the Windows O.S. you can selectively End a program that is not responding.

A+ 220-1002 Main Domain 3.0 – Software Troubleshooting
Sub-Objective: 3.1 – “Given a scenario, troubleshoot Microsoft Windows OS problems.”

Question 18

Which file is needed to start up Windows 8?

          a) NTLDR

          b) BOOT.INI

          c) BOOTMGR

          d) NTBOOTDD.SYS

Answer: BOOTMGR

Explanation: When booting a Windows 8 OS, the BOOTMGR in the MBR consults the BCD text file for operating system and boot partition information. This is similar to the relationship between NTLDR and BOOT.INI in legacy NT based systems.

A+ 220-1002 Main Domain 3.0 – Software Troubleshooting
Sub-Objective: 3.1 – “Given a scenario, troubleshoot Microsoft Windows OS problems.”

Question 19

You have a customer that has installed an updated device driver for their sound card and now it is not functioning properly.  How can you roll back the driver?

          a) Go to Device manager and click Roll Back Driver.

          b) Go to Device Manager, click on the Device and Roll Back Driver.

          c) Go to Device Manager. Right-click on the Device. Click Properties. Click on the Driver tab and Click Roll Back Driver.

          d) Restart the computer in Last known good configuration Mode.

Answer: Go to Device Manager. Right-click on the Device. Click Properties. Click on the Driver tab and Click Roll Back Driver.

Explanation: Go to Device Manager. Right-click on the Device. Click Properties. Click on the Driver tab and Click Roll Back Driver.

A+ 220-1002 Main Domain 3.0 – Software Troubleshooting
Sub-Objective: 3.1 – “Given a scenario, troubleshoot Microsoft Windows OS problems.”

Question 20

What is modified when changing the system startup boot sequence?

          a) CMD.EXE

          b) BOOTMGR

          c) BOOT.INI

          d) BIOS/CMOS

Answer: BIOS/CMOS

Explanation: The CMOS memory holds the BIOS settings. The boot sequence is a BIOS setting.

A+ 220-1002 Main Domain 3.0 – Software Troubleshooting
Sub-Objective: 3.1 – “Given a scenario, troubleshoot Microsoft Windows OS problems.”

Question 21

A customer calls and states that they are suddenly receiving emails from unknown parties that are automated replies of delivery failures or vacation messages. What do you suspect?

          a) Misconfigured email program

          b) Malware

          c) Spam

          d) Hijacked email

Answer: Hijacked email

Explanation: In this situation, the customer is an unknowing email spammer. Hijacked email accounts are used to blast emails to lists of email addresses. In the event that some of these spammed email addresses are no longer valid or that the recipient has an automated vacation response, the customer will receive automated delivery failures or vacation messages.

A+ 220-1002 Main Domain 3.0 – Software Troubleshooting
Sub-Objective: 3.2 – “Given a scenario, troubleshoot and resolve PC security issues.”

Question 22

You have a PC that will not run Windows Defender. Defender is disabled and the Action Center reports that another antivirus program is running. There are no other antivirus programs installed. What is the cause?

          a) Ransomware

          b) Rogue antivirus

          c) Invalid certificate

          d) All of these

Answer: Rogue antivirus

Explanation: This situation can be attributed to a rogue antivirus program that self-installed and disabled Windows Defender functionality. In this case, you will find that other functions like Windows Update will also fail. Ransomware blocks all system access until the ransom is paid. Your trusted root CA certificate will have no bearing on this situation.

A+ 220-1002 Main Domain 3.0 – Software Troubleshooting
Sub-Objective: 3.2 – “Given a scenario, troubleshoot and resolve PC security issues.”

Question 23

You are working on a PC that you suspect has malware on it. Which System Restore option would you choose?

          a) Restore from the latest restore point

          b) Restore from the oldest restore point

          c) Disable System Restore

          d) Any of these

Answer: Disable System Restore

Explanation: In this case, disable System Restore since malware is capable of infecting restore points. Even when using a restore point that was created before the infection, there is no guarantee that the restore point is clean and that the infection will be removed.

A+ 220-1002 Main Domain 3.0 – Software Troubleshooting
Sub-Objective: 3.3 – “Given a scenario, use best practice procedures for malware removal.”

Question 24

Which of the following would you choose to track inventory that are on pallets in your company’s warehouse?

          a) QR codes

          b) Barcodes

          c) RFID tags

          d) All of these

Answer: RFID tags

Explanation: RFID tags offer the most accurate tracking method of the choices provided. The other choices would require the codes to be scanned individually for each piece of inventory.

A+ 220-1002 Main Domain 4.0 – Operational Procedures
Sub-Objective: 4.1 – “Compare and contrast best practices associated with types of documentation.”

Question 25

Which choice is a policy that covers how long data should be retained and how it should be disposed of?

          a) Data retention policy

          b) Disposal and destruction policy

          c) Storage and retention policy

          d) PII policy

Answer: Disposal and destruction policy

Explanation: A good disposal and destruction policy will address the length of time data will be kept and subsequently the method to be used for its destruction.

A+ 220-1002 Main Domain 4.0 – Operational Procedures
Sub-Objective: 4.1 – “Compare and contrast best practices associated with types of documentation.”

We hope you enjoyed our free A+ practice test 220-1002! For more free content click here for our complete and free A+ study guide!

Trust Guard Security Scanned
Share This
Real Time Web Analytics