CompTIA 220-1202 Exam Questions
CompTIA A+ Certification: Core 2 (Page 3 )

Updated On: 12-Apr-2026

Which of the following is used to detect and record access to restricted areas?

  1. Bollards
  2. Video surveillance
  3. Badge readers
  4. Fence

Answer(s): C

Explanation:

Badge readers authenticate and log each entry attempt - recording who accessed (or tried to access) a secured area and when. This audit trail is essential for monitoring and reviewing access to restricted zones.



An administrator received an email stating that the OS they are currently supporting will no longer be issued security updates and patches.
Which of the following is most likely the reason the administrator received this message?

  1. Support from the computer's manufacturer is expiring.
  2. The OS will be considered end of life.
  3. The built-in security software is being removed from the next OS version.
  4. A new version of the OS will be released soon.

Answer(s): B

Explanation:

When an operating system reaches end of life (EOL), the vendor ceases issuing security updates and patches.
Administrators are notified so they can plan upgrades or migrations before support ends.



Which of the following is the best way to distribute custom images to 800 devices that include four device vendor classes with two types of user groups?

  1. Use xcopy to clone the hard drives from one to another.
  2. Use robocopy to move the files to each device.
  3. Use a local image deployment tool for each device.
  4. Use a network-based remote installation tool.

Answer(s): D

Explanation:

A network-based remote installation tool (such as Windows Deployment Services, MDT, or a similar solution) scales efficiently across hundreds of devices with varying hardware and user configurations. It allows you to segment deployments by vendor classes and user groups, automate imaging processes, and manage version control centrally - far more effectively than one-to-one cloning or file-copy methods.



Which of the following types of social engineering attacks sends an unsolicited text message to a user's mobile device?

  1. Impersonation
  2. Vishing
  3. Spear phishing
  4. Smishing

Answer(s): D

Explanation:

Smishing is the act of sending fraudulent messages via SMS or other texting platforms to trick users into revealing sensitive information or clicking malicious links. This distinguishes it from phishing over email (spear phishing), voice calls (vishing), or in-person deception (impersonation).



A user reports some single sign-on errors to a help desk technician. Currently, the user is able to sign in to the company's application portal but cannot access a specific SaaS-based tool.
Which of the following would the technician most likely suggest as a next step?

  1. Reenroll the user's mobile device to be used as an MFA token.
  2. Use a private browsing window to avoid local session conflicts.
  3. Bypass single sign-on by directly authenticating to the application.
  4. Reset the device being used to factory defaults.

Answer(s): B

Explanation:

Single sign-on issues that affect only a specific application often stem from stale or conflicting session data in the user's browser. Launching a private (incognito) window ensures a fresh session without cached cookies or tokens, which can resolve access to the SaaS tool without affecting other configurations.



A technician verifies that a malware incident occurred on some computers in a small office.
Which of the following should the technician do next?

  1. Quarantine the infected systems.
  2. Educate the end users.
  3. Disable System Restore.
  4. Update the anti-malware and scan the computers.

Answer(s): A

Explanation:

Once an incident is confirmed, the immediate priority is containment. Isolating (quarantining) the infected machines prevents the malware from spreading to other systems or exfiltrating data, enabling safe analysis and remediation.



Which of the following is a Linux command that is used for administrative purposes?

  1. runas
  2. cmcl
  3. net user
  4. su

Answer(s): D

Explanation:

The su (substitute user) command is a standard Linux utility that allows an administrator to assume another user's identity - most commonly switching to the root account for elevated privileges. It's an essential tool for administrative tasks on Unix and Linux systems.



A user recently installed an application that accesses a database from a local server.
When launching the application, it does not populate any information.
Which of the following command-line tools is the best to troubleshoot the issue?

  1. ipconfig
  2. nslookup
  3. netstat
  4. curl

Answer(s): C

Explanation:

netstat reveals active network connections and listening ports on the local machine. By using it, you can confirm that the application has successfully opened (or attempted) a connection to the database server's port, verify the remote server's address and port, and detect any failed or hanging TCP sessions that would prevent data retrieval.



Viewing page 3 of 41
Viewing questions 17 - 24 out of 350 questions



Post your Comments and Discuss CompTIA 220-1202 exam dumps with other Community members:

220-1202 Exam Discussions & Posts

AI Tutor AI Tutor 👋 I’m here to help!