CompTIA 220-1202 Exam Questions
CompTIA A+ Certification: Core 2 (Page 7 )

Updated On: 12-Apr-2026

Which of the following is used in addition to a password to implement MFA?

  1. Sending a code to the user's phone
  2. Verifying the user's date of birth
  3. Prompting the user to solve a simple math problem
  4. Requiring the user to enter a PIN

Answer(s): A

Explanation:

Multi-factor authentication (MFA) combines at least two of the following factors: something you know (password), something you have (a phone-generated or SMS-delivered one-time code), and something you are (biometric). Sending a code to the user's phone provides a "something you have" factor in addition to the password.



A technician is preparing to replace the batteries in rack-mounted UPS system. After ensuring the power is turned off and the batteries are fully discharged, the technician needs to remove the battery modules from the bottom of the rack.
Which of the following steps should the technician take?

  1. Ensure the fire suppression system is ready to be activated.
  2. Use appropriate lifting techniques and guidelines.
  3. Place the removed batteries in an antistatic bag.
  4. Wear a face mask to filter out any harmful fumes.

Answer(s): B

Explanation:

UPS battery modules are heavy and awkward; employing proper lifting techniques (e.g., lifting with the legs, keeping the back straight, and using team lifts or mechanical aids as necessary) prevents musculoskeletal injuries and ensures safe removal.



A technician is setting up a surveillance system for a customer. The customer wants access to the system's web interface on the LAN via the system's IP address.
Which of the following should the technician use to prevent external log-in attempts from the internet?

  1. Port mapping
  2. Subnetting
  3. Static IP
  4. Content filtering

Answer(s): A

Explanation:

By using port mapping (NAT) rules on the router, you can choose to forward the surveillance system's HTTP/ HTTPS ports only on the LAN interface and leave them closed on the WAN side. This ensures users on the local subnet can access the camera interface via its IP address, while external login attempts from the internet are blocked.



A technician needs to configure laptops so that only administrators can enable virtualization technology if needed.
Which of the following should the technician configure?

  1. BIOS password
  2. Guest account
  3. Screen lock
  4. AutoRun setting

Answer(s): A

Explanation:

Setting a BIOS (or UEFI) supervisor password restricts access to firmware settings, including enabling or disabling virtualization technology. Only those with the password - presumably administrators - can enter the BIOS setup and make that change.



Which of the following file types would a desktop support technician most likely use to automate tasks for a Windows user log-in?

  1. .bat
  2. .sh
  3. .py
  4. .js

Answer(s): A

Explanation:

Batch files (.bat) are classic Windows script files that execute a series of command-line instructions. They can be linked to user logon events via Group Policy or the Startup folder to automate tasks (like mapping drives or launching applications) when a user signs in.



A technician uses AI to draft a proposal about the benefits of new software.
When reading the draft, the technician notices that the draft contains factually incorrect information.
Which of the following best describes this scenario?

  1. Data privacy
  2. Hallucinations
  3. Appropriate use
  4. Plagiarism

Answer(s): B

Explanation:

When an AI model generates plausible-sounding but factually inaccurate or fabricated information, it's referred to as a "hallucination." Identifying and correcting these errors is essential to ensure the accuracy and reliability of AI-assisted content.



Which of the following describes an attack in which an attacker sets up a rogue AP that tricks users into connecting to the rogue AP instead of the legitimate network?

  1. Stalkerware
  2. Evil twin
  3. Tailgating
  4. Shoulder surfing

Answer(s): B

Explanation:

An evil twin attack involves an adversary configuring a rogue wireless access point with the same SSID and similar settings as a legitimate network. Unsuspecting users connect to this rogue AP, allowing the attacker to intercept traffic, capture credentials, and launch further attacks.



A user is experiencing issues with outdated images while browsing websites.
Which of the following settings should a technician use to correct this issue?

  1. Administrative Tools
  2. Windows Defender Firewall
  3. Internet Options
  4. Ease of Access

Answer(s): C

Explanation:

In Internet Options (under the Browsing History Settings), you can configure how often the browser checks for newer versions of stored pages and content. Adjusting the "Check for newer versions of stored pages" setting forces the browser to retrieve up-to-date images rather than using cached copies.



Viewing page 7 of 41
Viewing questions 49 - 56 out of 350 questions



Post your Comments and Discuss CompTIA 220-1202 exam dumps with other Community members:

220-1202 Exam Discussions & Posts

AI Tutor AI Tutor 👋 I’m here to help!