CompTIA 220-1102 Exam Questions
CompTIA A+ Certification: Core 2 (Page 14 )

Updated On: 28-Feb-2026

Which of the following is used to apply corporate restrictions on an Apple device?

  1. App Store
  2. VPN configuration
  3. Apple ID
  4. Management profile

Answer(s): D

Explanation:

An MDM (Mobile Device Management) management profile allows administrators to enforce corporate policies on Apple devices, such as restricting app installations, configuring network settings, and applying security restrictions. This profile is installed on the device and centrally managed to ensure compliance.



A user's new smartphone is not staying charged throughout the day. The smartphone charges fully every night.
Which of the following should a technician review first to troubleshoot the issue?

  1. Storage usage
  2. End of software support
  3. Charger wattage
  4. Background applications

Answer(s): D

Explanation:

Background apps can consume significant battery by running processes, syncing data, or using location services throughout the day. Reviewing and limiting or disabling unnecessary background applications will help identify and mitigate excessive battery drain.



A customer is unable to open some files on their system. Each time the customer attempts to open a file, the customer receives a message that the file is encrypted.
Which of the following best describes this issue?

  1. Keylogger
  2. Ransomware
  3. Phishing
  4. Cryptominer

Answer(s): B

Explanation:

Ransomware is malware that encrypts a user's files and then demands payment (a ransom) in exchange for the decryption key. The user's inability to open the files and the message indicating they're encrypted are classic signs of a ransomware attack.



An organization is experiencing an increased number of issues. A technician notices applications that are not installed by default. Users are reporting an increased number of system prompts for software licensing.
Which of the following would the security team most likely do to remediate the root cause?

  1. Deploy an internal PKI to filter encrypted web traffic.
  2. Remove users from the local admin group.
  3. Implement stronger controls to block suspicious websites.
  4. Enable stricter UAC settings on Windows.

Answer(s): B

Explanation:

When users have local administrative rights, they can install unauthorized applications - leading to licensing prompts, unsupported software, and potential security risks. By removing users from the local Administrators group, installations require elevated credentials, ensuring that only approved software is installed and reducing these recurring issues.



A support specialist needs to decide whether to install a 32-bit or 64-bit OS architecture on a new computer.
Which of the following specifications will help the specialist determine which OS architecture to use?

  1. 16GB RAM
  2. Intel i7 CPU
  3. 500GB HDD
  4. 1Gbps Ethernet

Answer(s): B

Explanation:

The CPU's architecture determines whether it can run a 64-bit OS. Most Intel i7 processors are 64-bit capable, whereas simply knowing the amount of RAM (e.g., 16 GB) doesn't guarantee the processor supports 64-bit operations. Once you confirm the CPU is 64-bit (as with an Intel i7), you can install a 64-bit OS to fully utilize available memory.






Post your Comments and Discuss CompTIA 220-1102 exam dumps with other Community members:

Join the 220-1102 Discussion