CompTIA 220-1102 Exam Questions
CompTIA A+ Certification: Core 2 (Page 10 )

Updated On: 28-Feb-2026

Which of the following is used in addition to a password to implement MFA?

  1. Sending a code to the user's phone
  2. Verifying the user's date of birth
  3. Prompting the user to solve a simple math problem
  4. Requiring the user to enter a PIN

Answer(s): A

Explanation:

Multi-factor authentication (MFA) combines at least two of the following factors: something you know (password), something you have (a phone-generated or SMS-delivered one-time code), and something you are (biometric). Sending a code to the user's phone provides a "something you have" factor in addition to the password.



A technician is preparing to replace the batteries in rack-mounted UPS system. After ensuring the power is turned off and the batteries are fully discharged, the technician needs to remove the battery modules from the bottom of the rack.
Which of the following steps should the technician take?

  1. Ensure the fire suppression system is ready to be activated.
  2. Use appropriate lifting techniques and guidelines.
  3. Place the removed batteries in an antistatic bag.
  4. Wear a face mask to filter out any harmful fumes.

Answer(s): B

Explanation:

UPS battery modules are heavy and awkward; employing proper lifting techniques (e.g., lifting with the legs, keeping the back straight, and using team lifts or mechanical aids as necessary) prevents musculoskeletal injuries and ensures safe removal.



A technician is setting up a surveillance system for a customer. The customer wants access to the system's web interface on the LAN via the system's IP address.
Which of the following should the technician use to prevent external log-in attempts from the internet?

  1. Port mapping
  2. Subnetting
  3. Static IP
  4. Content filtering

Answer(s): A

Explanation:

By using port mapping (NAT) rules on the router, you can choose to forward the surveillance system's HTTP/ HTTPS ports only on the LAN interface and leave them closed on the WAN side. This ensures users on the local subnet can access the camera interface via its IP address, while external login attempts from the internet are blocked.



A technician needs to configure laptops so that only administrators can enable virtualization technology if needed.
Which of the following should the technician configure?

  1. BIOS password
  2. Guest account
  3. Screen lock
  4. AutoRun setting

Answer(s): A

Explanation:

Setting a BIOS (or UEFI) supervisor password restricts access to firmware settings, including enabling or disabling virtualization technology. Only those with the password - presumably administrators - can enter the BIOS setup and make that change.



Which of the following file types would a desktop support technician most likely use to automate tasks for a Windows user log-in?

  1. .bat
  2. .sh
  3. .py
  4. .js

Answer(s): A

Explanation:

Batch files (.bat) are classic Windows script files that execute a series of command-line instructions. They can be linked to user logon events via Group Policy or the Startup folder to automate tasks (like mapping drives or launching applications) when a user signs in.






Post your Comments and Discuss CompTIA 220-1102 exam dumps with other Community members:

Join the 220-1102 Discussion