CompTIA 220-1202 Exam Questions
CompTIA A+ Certification: Core 2 (Page 5 )

Updated On: 12-Apr-2026

Technicians are failing to document user contact information, device asset tags, and a clear description of each issue in the ticketing system.
Which of the following should a help desk management team implement for technicians to use on every call?

  1. Service-level agreements
  2. Call categories
  3. Standard operating procedures
  4. Knowledge base articles

Answer(s): C

Explanation:

Standard operating procedures (SOPs) define consistent, step-by-step guidelines that technicians must follow - such as capturing user contact details, asset tags, and detailed issue descriptions on every ticket.
Implementing SOPs ensures thorough and uniform documentation across all calls.



An application's performance is degrading over time. The application is slowing, but it never gives an error and does not crash.
Which of the following tools should a technician use to start troubleshooting?

  1. Reliability history
  2. Computer management
  3. Resource monitor
  4. Disk defragment

Answer(s): C

Explanation:

Resource Monitor provides real-time insights into CPU, memory, disk, and network usage by process. By observing which resources steadily increase or become bottlenecks over time, a technician can pinpoint leaks (e.g., memory), I/O contention, or other performance issues driving the slowdown.



Which of the following filesystem types does the Linux OS use?

  1. exFAT
  2. APFS
  3. ext4
  4. NTFS

Answer(s): C

Explanation:

ext4 (Fourth Extended Filesystem) is the default filesystem for most Linux distributions. It offers improved performance, reliability, and support for large volumes and files compared to its predecessors (ext2/ext3).



Which of the following methods would make data unrecoverable but allow the drive to be repurposed?

  1. Deleting the partitions
  2. Implementing EFS
  3. Performing a low-level format
  4. Degaussing the device

Answer(s): C

Explanation:

A low-level format (more accurately, a secure erase that overwrites all sectors with zeroes or random data) effectively wipes all data on the drive, making previous content unrecoverable while leaving the drive's structure intact for reuse. Unlike degaussing - which destroys the drive's magnetic media and renders it unusable - overwriting allows the drive to be repurposed safely.



After a recent mobile OS upgrade to a smartphone, a user attempts to access their corporate email, but the application does not open. A technician restarts the smartphone, but the issue persists.
Which of the following is the most likely way to resolve the issue?

  1. Updating the failed software
  2. Registering the smartphone with an MDM solution
  3. Installing a third-party client
  4. Clearing the cache partition

Answer(s): A

Explanation:

After a major OS upgrade, existing applications often require updates to maintain compatibility with new APIs and system libraries. Updating the corporate email app to its latest version ensures it's built against the updated OS and can launch properly.



Users are reporting that an unsecured network is broadcasting with the same name as the normal wireless network. They are able to access the internet but cannot connect to the file share servers.
Which of the following best describes this issue?

  1. Unreachable DNS server
  2. Virtual local area network misconfiguration
  3. Incorrect IP address
  4. Rogue wireless access point

Answer(s): D

Explanation:

A rogue access point mimics the legitimate SSID, allowing clients to connect (often with internet access via its own uplink) but isolating them from internal resources like file shares. This behavior matches the symptoms - users join what appears to be the corporate WLAN but can't reach internal servers.



A computer technician is implementing a solution to support a new internet browsing policy for a customer's business. The policy prohibits users from accessing unauthorized websites based on categorization.
Which of the following should the technician configure on the SOHO router?

  1. Secure management access
  2. Group Policy Editor
  3. Content filtering
  4. Firewall

Answer(s): C

Explanation:

Content filtering on a SOHO router lets you block or allow websites based on their categories (e.g., social media, gambling, news). By defining which categories are unauthorized, the router enforces the browsing policy at the network edge, preventing users from reaching disallowed sites.



Recently, the number of users sharing smartphone passcodes has increased. The management team wants a technician to deploy a more secure screen lock method.
Which of the following technologies should the technician use?

  1. Pattern lock
  2. Facial recognition
  3. Device encryption
  4. Multifactor authentication

Answer(s): B

Explanation:

Facial recognition leverages biometric characteristics unique to each user, offering stronger security than shared passcodes or easily observed pattern locks. It ensures that only the enrolled individual can unlock the device, reducing the risk of unauthorized access from shared codes.



Viewing page 5 of 41
Viewing questions 33 - 40 out of 350 questions



Post your Comments and Discuss CompTIA 220-1202 exam dumps with other Community members:

220-1202 Exam Discussions & Posts

AI Tutor AI Tutor 👋 I’m here to help!