CompTIA 220-1202 Exam Questions
CompTIA A+ Certification: Core 2 (Page 4 )

Updated On: 12-Apr-2026

A small office reported a phishing attack that resulted in a malware infection. A technician is investigating the incident and has verified the following:

All endpoints are updated and have the newest EDR signatures. Logs confirm that the malware was quarantined by EDR on one system.
The potentially infected machine was reimaged.

Which of the following actions should the technician take next?

  1. Install network security tools to prevent downloading infected files from the internet.
  2. Discuss the cause of the issue and educate the end user about security hygiene.
  3. Flash the firmware of the router to ensure the integrity of network traffic.
  4. Suggest alternate preventative controls that would include more advanced security software.

Answer(s): B

Explanation:

With technical controls updated, EDR signatures current, and the infected system reimaged, the next step is to address the human factor. Educating the user on how to recognize phishing attempts and follow safe practices helps prevent recurrence and strengthens the organization's overall security posture.



Which of the following describes a vulnerability that has been exploited before a patch or remediation is available?

  1. Spoofing
  2. Brute-force
  3. DoS
  4. Zero-day

Answer(s): D

Explanation:

A zero-day vulnerability refers to a security flaw that is actively exploited by attackers before the software vendor has released a patch or remediation - meaning defenders have "zero days" to prepare once the exploit becomes known.



SIMULATION

You have been contacted through the help desk chat application. A user is setting up a replacement SOHO router. Assist the user with setting up the router.

INSTRUCTIONS

Select the most appropriate statement for each response. Click the send button after each response to continue the chat.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

  1. See Explanation for the Answer.

Answer(s): A

Explanation:

First Chat Response: When the user mentions setting up a new router, the best initial response to maintain a helpful and professional tone is:
Select reply: "I am happy to assist you today."

Second Chat Response: When the user states that they need to set up basic security settings:
Select reply: "Is this the first router in your office?"

Third Chat Response: After learning it's a replacement router and the user is logged into the router's web page:
Select reply: "The first thing you need to do is change the default password."

Fourth Chat Response: For the response about password settings:
Select reply: "Create a new password with an uppercase, a lowercase, and a special character."

Fifth Chat Response: When the router prompts to reboot:
Select reply: "Yes, reboot please."



A help desk technician is setting up speech recognition on a Windows system.
Which of the following settings should the technician use?

  1. Time and Language
  2. Personalization
  3. System
  4. Ease of Access

Answer(s): D

Explanation:

Windows places speech recognition and other accessibility features under the Ease of Access settings. From there, you can configure Speech options - including enabling Windows Speech Recognition and adjusting its settings - so that users relying on voice input can operate the system effectively.



A user receives a new personal computer but is unable to run an application. An error displays saying that .NET Framework 3.5 is required and not found.
Which of the following actions is the best way to resolve this issue?

  1. Resolve the dependency through the "Turn Windows features on or off" menu.
  2. Download the dependency via a third-party repository.
  3. Ignore the dependency and install the latest version 4 instead.
  4. Forward the trouble ticket to the SOC team because the issue poses a great security risk.

Answer(s): A

Explanation:

Windows includes .NET Framework 3.5 as an optional feature. Enabling it via Control Panel Programs and Features Turn Windows features on or off ensures the OS installs the correct version directly from Microsoft without relying on untrusted sources or skipping needed dependencies.



An employee is using a photo editing program. Certain features are disabled and require a log-in, which the employee does not have.
Which of the following is a way to resolve this issue?

  1. License assignment
  2. VPN connection
  3. Application repair
  4. Program reinstallation

Answer(s): A

Explanation:

When features in an application are disabled pending a login, it typically indicates those capabilities are controlled by the software's licensing system. Assigning (or activating) the proper license entitles the user to those premium features, restoring full functionality without unnecessary repair or reinstall steps.



A technician is deploying mobile devices and needs to prevent access to sensitive data if the devices are lost.
Which of the following is the best way to prevent unauthorized access if the user is unaware that the phone is lost?

  1. Encryption
  2. Remote wipe
  3. Geofencing
  4. Facial recognition

Answer(s): A

Explanation:

Full-disk (or device) encryption ensures that, even if a lost mobile device is physically accessed by an unauthorized party, its stored data remains inaccessible without the correct decryption credentials. This protection is automatic and continuous, safeguarding data at rest regardless of whether the user realizes the device is missing or not. Remote wipe can remove data if triggered, but it requires the device to be online and the user (or admin) to initiate the wipe--whereas encryption is always in effect.



Which of the following is the quickest way to move from Windows 10 to Windows 11 without losing data?

  1. Using gpupdate
  2. Image deployment
  3. Clean install
  4. In-place upgrade

Answer(s): D

Explanation:

An in-place upgrade directly installs Windows 11 over the existing Windows 10 installation, preserving user files, applications, and settings. It's much faster than capturing and redeploying an image, and it avoids the data loss risk of a clean install.



Viewing page 4 of 41
Viewing questions 25 - 32 out of 350 questions



Post your Comments and Discuss CompTIA 220-1202 exam dumps with other Community members:

220-1202 Exam Discussions & Posts

AI Tutor AI Tutor 👋 I’m here to help!