CompTIA 220-1102 Exam Questions
CompTIA A+ Certification: Core 2 (Page 11 )

Updated On: 28-Feb-2026

A technician uses AI to draft a proposal about the benefits of new software.
When reading the draft, the technician notices that the draft contains factually incorrect information.
Which of the following best describes this scenario?

  1. Data privacy
  2. Hallucinations
  3. Appropriate use
  4. Plagiarism

Answer(s): B

Explanation:

When an AI model generates plausible-sounding but factually inaccurate or fabricated information, it's referred to as a "hallucination." Identifying and correcting these errors is essential to ensure the accuracy and reliability of AI-assisted content.



Which of the following describes an attack in which an attacker sets up a rogue AP that tricks users into connecting to the rogue AP instead of the legitimate network?

  1. Stalkerware
  2. Evil twin
  3. Tailgating
  4. Shoulder surfing

Answer(s): B

Explanation:

An evil twin attack involves an adversary configuring a rogue wireless access point with the same SSID and similar settings as a legitimate network. Unsuspecting users connect to this rogue AP, allowing the attacker to intercept traffic, capture credentials, and launch further attacks.



A user is experiencing issues with outdated images while browsing websites.
Which of the following settings should a technician use to correct this issue?

  1. Administrative Tools
  2. Windows Defender Firewall
  3. Internet Options
  4. Ease of Access

Answer(s): C

Explanation:

In Internet Options (under the Browsing History Settings), you can configure how often the browser checks for newer versions of stored pages and content. Adjusting the "Check for newer versions of stored pages" setting forces the browser to retrieve up-to-date images rather than using cached copies.



Every time a user loads a specific spreadsheet, their computer is temporarily unresponsive. The user also notices that the title bar indicates the applications are not responding.
Which of the following would a technician most likely inspect?

  1. Anti-malware logs
  2. Workstation repair options
  3. Bandwidth status as reported in the Task Manager
  4. File size and related memory utilization

Answer(s): D

Explanation:

A very large or complex spreadsheet can consume excessive RAM and CPU cycles, causing the application to hang or become unresponsive. By checking the file's size and monitoring how much memory Excel (or the spreadsheet program) uses when opening it, the technician can confirm whether resource exhaustion is the culprit and take steps - like simplifying the file or adding RAM - to resolve the issue.



A user frequently misplaces their Windows laptop and is concerned about it being stolen. The user would like additional security controls on their laptop.
Which of the following is a built-in technology that a technician can use to enable full drive encryption?

  1. Active Directory
  2. New Technology File System
  3. Encrypting File System
  4. BitLocker

Answer(s): D

Explanation:

BitLocker is a built-in Windows feature that provides full-volume encryption of the system drive, protecting all data if the laptop is lost or stolen. It integrates with the TPM (when available) for secure key storage and can be configured via Group Policy or the Control Panel without additional software.






Post your Comments and Discuss CompTIA 220-1102 exam dumps with other Community members:

Join the 220-1102 Discussion