CompTIA 220-1202 Exam Questions
CompTIA A+ Certification: Core 2 (Page 22 )

Updated On: 12-Apr-2026

Every time a user loads a specific spreadsheet, their computer is temporarily unresponsive. The user also notices that the title bar indicates the applications are not responding.
Which of the following would a technician most likely inspect?

  1. Anti-malware logs
  2. Workstation repair options
  3. Bandwidth status as reported in the Task Manager
  4. File size and related memory utilization

Answer(s): D

Explanation:

A very large or complex spreadsheet can consume excessive RAM and CPU cycles, causing the application to hang or become unresponsive. By checking the file's size and monitoring how much memory Excel (or the spreadsheet program) uses when opening it, the technician can confirm whether resource exhaustion is the culprit and take steps - like simplifying the file or adding RAM - to resolve the issue.



A user frequently misplaces their Windows laptop and is concerned about it being stolen. The user would like additional security controls on their laptop.
Which of the following is a built-in technology that a technician can use to enable full drive encryption?

  1. Active Directory
  2. New Technology File System
  3. Encrypting File System
  4. BitLocker

Answer(s): D

Explanation:

BitLocker is a built-in Windows feature that provides full-volume encryption of the system drive, protecting all data if the laptop is lost or stolen. It integrates with the TPM (when available) for secure key storage and can be configured via Group Policy or the Control Panel without additional software.



Which of the following is used to apply corporate restrictions on an Apple device?

  1. App Store
  2. VPN configuration
  3. Apple ID
  4. Management profile

Answer(s): D

Explanation:

An MDM (Mobile Device Management) management profile allows administrators to enforce corporate policies on Apple devices, such as restricting app installations, configuring network settings, and applying security restrictions. This profile is installed on the device and centrally managed to ensure compliance.



A user's new smartphone is not staying charged throughout the day. The smartphone charges fully every night.
Which of the following should a technician review first to troubleshoot the issue?

  1. Storage usage
  2. End of software support
  3. Charger wattage
  4. Background applications

Answer(s): D

Explanation:

Background apps can consume significant battery by running processes, syncing data, or using location services throughout the day. Reviewing and limiting or disabling unnecessary background applications will help identify and mitigate excessive battery drain.



A customer is unable to open some files on their system. Each time the customer attempts to open a file, the customer receives a message that the file is encrypted.
Which of the following best describes this issue?

  1. Keylogger
  2. Ransomware
  3. Phishing
  4. Cryptominer

Answer(s): B

Explanation:

Ransomware is malware that encrypts a user's files and then demands payment (a ransom) in exchange for the decryption key. The user's inability to open the files and the message indicating they're encrypted are classic signs of a ransomware attack.



An organization is experiencing an increased number of issues. A technician notices applications that are not installed by default. Users are reporting an increased number of system prompts for software licensing.
Which of the following would the security team most likely do to remediate the root cause?

  1. Deploy an internal PKI to filter encrypted web traffic.
  2. Remove users from the local admin group.
  3. Implement stronger controls to block suspicious websites.
  4. Enable stricter UAC settings on Windows.

Answer(s): B

Explanation:

When users have local administrative rights, they can install unauthorized applications - leading to licensing prompts, unsupported software, and potential security risks. By removing users from the local Administrators group, installations require elevated credentials, ensuring that only approved software is installed and reducing these recurring issues.



A support specialist needs to decide whether to install a 32-bit or 64-bit OS architecture on a new computer.
Which of the following specifications will help the specialist determine which OS architecture to use?

  1. 16GB RAM
  2. Intel i7 CPU
  3. 500GB HDD
  4. 1Gbps Ethernet

Answer(s): B

Explanation:

The CPU's architecture determines whether it can run a 64-bit OS. Most Intel i7 processors are 64-bit capable, whereas simply knowing the amount of RAM (e.g., 16 GB) doesn't guarantee the processor supports 64-bit operations. Once you confirm the CPU is 64-bit (as with an Intel i7), you can install a 64-bit OS to fully utilize available memory.



Which of the following prevents forced entry into a building?

  1. PIV card
  2. Motion-activated lighting
  3. Video surveillance
  4. Bollard

Answer(s): D

Explanation:

Bollards are sturdy, fixed posts installed around buildings or sensitive areas to physically block vehicles and prevent ramming attacks or forced vehicular entry. Unlike surveillance or lighting, bollards provide a direct physical barrier.



Viewing page 22 of 41
Viewing questions 169 - 176 out of 350 questions



Post your Comments and Discuss CompTIA 220-1202 exam dumps with other Community members:

220-1202 Exam Discussions & Posts

AI Tutor AI Tutor 👋 I’m here to help!