Pre-Summer Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

220-1202 Sample Questions Answers

Questions 4

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users’ audio issues are resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Questions 5

Welcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

INSTRUCTIONS

Click on individual tickets to see the ticket details, and view applicable attachments to

determine the problem.

Select the appropriate issue from the ' Issue ' drop-down menu. Then, select the most

efficient resolution from the ' Resolution ' drop-down menu. Finally, select the proper

command or verification to remediate or confirm your fix of the issue from the

' Verify/Resolve ' drop-down menu.

Options:

Buy Now
Questions 6

You are configuring a home network for a customer. The customer has requested the ability to access a Windows PC remotely, and needs all chat and optional functions to work in their game console.

INSTRUCTIONS

Use the drop-down menus to complete the network configuration for the customer. Each option may only be used once, and not all options will be used.

Then, click the + sign to place each device in its appropriate location.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Wireless AP LAN

Firewall Screened Subnet

Options:

Buy Now
Questions 7

You have been contacted through the help desk chat application. A user is setting up a replacement SOHO router. Assist the user with setting up the router.

INSTRUCTIONS

Select the most appropriate statement for each response. Click the send button after each response to continue the chat.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Questions 8

A user reports that after a recent software deployment to upgrade the Testing application, they can no longer use it. However, other employees can successfully

use the Testing program.

INSTRUCTIONS

Review the information in each tab to verify the results of the deployment and resolve

any issues discovered by selecting the:

· First command to resolve the issue

· Second command to resolve the issue

Options:

Buy Now
Questions 9

Options:

A.

Secure Boot

B.

Threat education

C.

Email security gateway

D.

Firewall

Buy Now
Questions 10

Options:

A.

To replicate electrostatic charge

B.

To increase electrostatic charge

C.

To ground electrostatic charge

D.

To store electrostatic charge

Buy Now
Questions 11

An end user sees frequent onscreen messages from a retail site they visited a week ago. A technician investigates and determines that the pop-up blocker is turned on. Which of the following should the technician do next?

Options:

A.

Reset the browser to its default settings

B.

Turn off notifications in the browser

C.

Uninstall and reinstall the browser

D.

Clear the browser cache

Buy Now
Questions 12

A technician follows proper malware removal procedures but cannot remove all malware. They decide to reload the OS. What should they select?

Options:

A.

Version upgrade

B.

System restore

C.

OS repair

D.

Clean install

Buy Now
Questions 13

An end user wants to have a sales printer added to their computer. The printer is on the domain. Which of the following is the best method for the technician to add the printer?

Options:

A.

Go to the print server and select the printer name

B.

Connect the laptop to the printer via USB

C.

Connect to the printer via Bluetooth

D.

Go to Local Users and Groups to add the printer

Buy Now
Questions 14

A help desk technician is setting up speech recognition on a Windows system. Which of the following settings should the technician use?

Options:

A.

Time and Language

B.

Personalization

C.

System

D.

Ease of Access

Buy Now
Questions 15

A user has rooted their corporate phone to load unapproved software. Which of the following tools should the company use to prevent access to the corporate network?

Options:

A.

Mobile device management

B.

Encryption

C.

Geofencing

D.

Lock screen

Buy Now
Questions 16

Which of the following is a protocol that provides AAA for network services?

Options:

A.

RADIUS

B.

Kerberos

C.

TKIP

D.

WPA3

Buy Now
Questions 17

A company wants to prevent unauthorized physical access to its mobile devices. Which of the following should the company do? (Select two).

Options:

A.

Disable built-in hotspots.

B.

Configure VPN software.

C.

Install an antivirus application.

D.

Use PIN authentication.

E.

Turn on location services.

F.

Enable screen timeout.

Buy Now
Questions 18

Options:

A.

A drawn pattern

B.

A fingerprint

C.

A password

D.

A PIV card (corrected from “APIV card”)

Buy Now
Questions 19

A user reports getting a BSOD (Blue Screen of Death) error on their computer at least twice a day. Which of the following should the technician use to determine the cause?

Options:

A.

Event Viewer

B.

Performance Monitor

C.

System Information

D.

Device Manager

Buy Now
Questions 20

A user’s computer is running slowly. Task Manager shows:

Disk: 2%

Network: 12%

GPU: 15%

CPU: 70%

Memory: 97%

Which of the following would a technician most likely do to resolve the issue?

Options:

A.

Clear browser cached data

B.

Upgrade the network connection

C.

Close unnecessary programs

D.

Delete temporary files

Buy Now
Questions 21

Options:

A.

Configure WPA3 encryption on the Wi-Fi router.

B.

Disable lobby ports and restrict external users to the guest wireless network.

C.

Use a protocol analyzer to check for malicious traffic on the network.

D.

Install signage telling external users not to use Ethernet ports.

Buy Now
Questions 22

An engineer notices that many websites prompt users to input login and payment details. The engineer wants to require the browser to encrypt communications. Which of the following best helps to protect sensitive data?

Options:

A.

Disabling all cookies

B.

Disabling JavaScript

C.

Enabling a pop-up blocker

D.

Enabling HTTPS-Only Mode

Buy Now
Questions 23

A user is attempting to open on a mobile phone a HD video that is hosted on a popular media streaming website. The user is receiving connection timeout errors. The mobile reception icon area is showing two bars next to 3G. Which of the following is the most likely cause of the issue?

Options:

A.

The user does not have Wi-Fi enabled.

B.

The website ' s subscription has run out.

C.

The bandwidth is not fast enough.

D.

The mobile device storage is full.

Buy Now
Questions 24

A technician is installing a cloud-based productivity suite and gets an error saying the installation is unavailable. What should be tried first?

Options:

A.

Reinstall the productivity suite

B.

Download an open-source alternative

C.

Check the license device limit

D.

Update the device OS

Buy Now
Questions 25

An international traveler is concerned about others accessing the contents of their smartphone if it is lost or stolen. The traveler has enabled biometrics. Which of the following additional security measures further reduces the risk of unauthorized data access?

Options:

A.

Remote backups

B.

Location tracking

C.

PIN code screen lock

D.

Device encryption

Buy Now
Questions 26

A user reports that the time on their computer does not match the time on their VoIP phone. What should a technician do?

Options:

A.

Confirm the user is logging in to the domain.

B.

Manually set the time on the phone to match the computer.

C.

Download and install the latest BIOS update.

D.

Configure access to an available NTP server.

Buy Now
Questions 27

Options:

A.

In-house disk incineration

B.

Certified third-party destruction

C.

Low-level formatting

D.

Targeted file deletion

Buy Now
Questions 28

Multiple users clicked a phishing link from a compromised email account. The security team isolates and removes the threat. Then, the management team provides security awareness training to the company. What step is this?

Options:

A.

Provide user education.

B.

Compile lessons learned.

C.

Update the antivirus software.

D.

Perform additional scans.

Buy Now
Questions 29

What is found in an MSDS (Material Safety Data Sheet) for a battery backup?

Options:

A.

Installation instructions

B.

Emergency procedures

C.

Configuration steps

D.

Voltage

Buy Now
Questions 30

A customer calls the help desk to report issues with internet connectivity. The customer is frustrated after speaking with multiple representatives who were unable to resolve the issue. A technician reviews the customer’s file and sees several unresolved tickets. Which of the following actions should the technician take to communicate properly and professionally?

Options:

A.

Ask the customer to clarify the issue right away

B.

Escalate the issue without further conversation

C.

Listen to the customer’s concerns and acknowledge their frustrations

D.

Explain that previous technicians followed standard procedure

Buy Now
Questions 31

Options:

A.

The DNS settings are incorrect.

B.

The firewall configuration is wrong.

C.

IPv6 is enabled on the computer.

D.

The computer is not connected to the network.

Buy Now
Questions 32

A technician uses AI to draft a proposal about the benefits of new software. When reading the draft, the technician notices that the draft contains factually incorrect information. Which of the following best describes this scenario?

Options:

A.

Data privacy

B.

Hallucinations

C.

Appropriate use

D.

Plagiarism

Buy Now
Questions 33

A desktop technician is mapping a remote Windows share \\WinNAS\shared as local drive Z:. Which command should the technician run?

Options:

A.

nslookup -opt 3: \WinNAS\shared

B.

net use 3: \WinNAS\shared

C.

chkdsk /R 2: \WinNAS\shared

D.

sfc /offwindir 3: \WinNAS\shared

Buy Now
Questions 34

What is the next step a technician should take after completing malware cleanup?

Options:

A.

Perform a secondary antivirus scan

B.

Educate the end user

C.

Reimage the computer

D.

Review system logs

Buy Now
Questions 35

A company wants to prevent unauthorized physical access to its mobile devices. Which of the following should the company do? (Select two).

Options:

A.

Disable built-in hotspots

B.

Configure VPN software

C.

Install an antivirus application

D.

Use PIN authentication

E.

Turn on location services

F.

Enable screen timeout

Buy Now
Questions 36

A user needs to test several software replacement possibilities. Part of the process involves installing the different software options on a corporate-imaged sandboxed PC. Which of the following is the best option to allow the user to install the required software?

Options:

A.

Make the user a member of Domain Admins

B.

Add the user to the local Administrators group

C.

Let the user use credentials from another user who has rights

D.

Give the user the local, high-privileged account password

Buy Now
Questions 37

A technician wants to prevent electrical damage while disassembling a device. The technician turns off the device. Which of the following should the technician do next?

Options:

A.

Place the computer on an antistatic mat

B.

Work on a plastic surface

C.

Place components in antistatic bags

D.

Connect a wrist strap to a metal frame

Buy Now
Questions 38

Performance on a user’s smartphone is degrading. Applications take a long time to start, and switching between apps is slow. Which of the following diagnostic steps should a mobile technician take first?

Options:

A.

Restore the phone to factory settings

B.

Restart the phone

C.

Check the phone’s battery state

D.

Uninstall unneeded applications

Buy Now
Questions 39

An administrator must rename the administrator account on a Windows desktop. Which tool is best for this?

Options:

A.

lusrmgr.msc

B.

devmgmt.msc

C.

gpedit.msc

D.

eventvwr.msc

Buy Now
Questions 40

A user reports that their corporate mobile phone is lost. Which of the following protects the data locally on the phone from unauthorized access?

Options:

A.

Password manager

B.

Degaussing

C.

Remote wipe

D.

Antivirus

Buy Now
Questions 41

Options:

A.

ReFS

B.

XFS

C.

APFS

D.

exFAT

Buy Now
Questions 42

A technician is reviewing an organization ' s current incident management policy. The organization uses a third-party vendor to protect the organization ' s assets with multiple tools. Which of the following service types is the organization using?

Options:

A.

PaaS

B.

EDR

C.

MDR

D.

XDR

Buy Now
Questions 43

A technician completes the installation of an OS that appears to be successful. However, when the technician removes the USB drive that was used for the installation and restarts the system, the error “No boot device found” appears. Which of the following should the technician do next to resolve the issue?

Options:

A.

Reinstall the OS from a new ISO

B.

Enable UEFI devices in the BIOS

C.

Restart in recovery mode and troubleshoot

D.

Install storage drivers for the motherboard

E.

Reseat the SATA cable

Buy Now
Questions 44

Options:

A.

Appropriate cable management removes a hazard.

B.

Cleaning with a vacuum will create static electricity.

C.

Labels for the cable routing are not appropriately displayed.

D.

Walking over the cable can create intermittent issues.

Buy Now
Questions 45

Technicians are failing to document user contact information, device asset tags, and a clear description of each issue in the ticketing system. Which of the following should a help desk management team implement for technicians to use on every call?

Options:

A.

Service-level agreements

B.

Call categories

C.

Standard operating procedures

D.

Knowledge base articles

Buy Now
Questions 46

Options:

A.

macOS

B.

Linux

C.

ChromeOS

D.

Windows

Buy Now
Questions 47

A user recently installed an application that accesses a database from a local server. When launching the application, it does not populate any information. Which of the following command-line tools is the best to troubleshoot the issue?

Options:

A.

ipconfig

B.

nslookup

C.

netstat

D.

curl

Buy Now
Exam Code: 220-1202
Exam Name: CompTIA A+ Core 2 2025 Exam
Last Update: Apr 11, 2026
Questions: 265
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now 220-1202