CompTIA A+ Core 2 Practice Test

CompTIA A+ Core 2 Practice Test 2

CompTIA A+ Practice Test

1 / 80

A company wants to ensure that users are only able to install approved applications. What feature should they use?

2 / 80

A technician suspects that a system has a malware infection. What is the first step they should take?

3 / 80

Which tool allows a technician to configure system startup settings and troubleshoot boot-related issues?

4 / 80

A user reports that their system is running out of storage space. What tool can help free up space?

5 / 80

A technician needs to check if a driver is causing a hardware issue. What tool should they use?

6 / 80

A user reports that their laptop screen goes black randomly, but the system remains powered on. What should the technician check first?

7 / 80

A technician wants to ensure that all computers in an organization receive security patches regularly. What tool should they use?

8 / 80

Which feature in Windows helps users restore a previous version of a file that was accidentally deleted or modified?

9 / 80

A user reports slow performance and frequent application crashes. Task Manager shows 95% memory usage. What is the most likely cause?

10 / 80

A technician needs to check for system errors and crashes. Which tool should they use?

11 / 80

A user is unable to open certain websites but can access others. What is the most likely cause?

12 / 80

Which Windows utility allows a technician to manage startup applications?

13 / 80

A user reports that after installing a software update, their application crashes frequently. What should the technician do first?

14 / 80

A technician needs to prevent unauthorized access to a lost or stolen laptop. What should they enable?

15 / 80

A user complains that their laptop frequently overheats and shuts down. What is the most likely cause?

16 / 80

A company requires all employees to use multifactor authentication (MFA) when logging into company systems. What is an example of MFA?

17 / 80

A technician needs to migrate user data from an old Windows 10 PC to a new one. What tool should they use?

18 / 80

A user reports that they forgot their Windows login password. Which method would allow them to reset it?

19 / 80

A technician is configuring Windows Firewall for a company network. What is the primary function of the firewall?

20 / 80

A user reports that their laptop is displaying a "No Boot Device Found" error after a recent Windows update. What is the most likely cause?

21 / 80

A technician is troubleshooting a Linux system where a service fails to start due to a missing dependency. The systemctl status command shows "dependency failed." Given a scenario involving Linux service management, what is the best next step?

22 / 80

An administrator needs to configure a Windows Server 2022 system to allow Remote Desktop access only for a specific security group. Given a scenario involving securing Windows systems, what is the best method?

23 / 80

A Windows 11 system displays a "low disk space" warning despite having sufficient free space on the C: drive. Given a scenario involving Windows troubleshooting, what is the most likely cause and resolution?

24 / 80

A technician is troubleshooting a Linux system where a user cannot execute a script despite having read and write permissions. Given a scenario involving Linux permissions, what is the most likely cause and resolution?

25 / 80

A macOS system user cannot access an application due to Gatekeeper restrictions after downloading it from an unverified developer. Given a scenario involving macOS security, what is the most secure way to allow the application to run?

26 / 80

A user reports that a Windows 10 system cannot connect to a Wi-Fi network after a recent update. The network adapter shows "No Internet, Secured." Given a scenario involving troubleshooting connectivity, what is the most likely cause and resolution?

27 / 80

A Linux administrator needs to schedule a recurring task to back up /var/log to a remote server every midnight. Given a scenario involving Linux administration, which tool and method are most appropriate?

28 / 80

A Windows Server 2022 system experiences slow performance due to high disk I/O. Task Manager shows svchost.exe consuming significant resources. Given a scenario involving Windows troubleshooting, what is the best next step?

29 / 80

A technician needs to configure a dual-boot system with Windows 11 and Ubuntu 24.04 on a UEFI-based machine. Given a scenario involving OS installation and setup, what is the critical step to ensure both OSes boot correctly?

30 / 80

A macOS Monterey system fails to install a critical security update, citing insufficient disk space. Given a scenario involving macOS troubleshooting, what is the best approach to resolve this while preserving user data?

31 / 80

A user reports that a Windows 11 system cannot access a shared folder on a Linux server using SMB. The error indicates "access denied." Given a scenario involving troubleshooting network shares, what is the most likely cause and resolution?

32 / 80

A technician is tasked with enabling BitLocker on a Windows 10 Pro system without a TPM chip. Given a scenario involving securing operating systems, what is the most secure method to enable BitLocker?

33 / 80

A Linux server running CentOS 9 Stream experiences high CPU usage due to a runaway process. Given a scenario involving Linux troubleshooting, which command provides the most detailed real-time information to identify and terminate the process?

34 / 80

An administrator needs to automate a backup process on a macOS Ventura system using Time Machine to an NFS share. Given a scenario involving macOS configurations, what is the correct approach to ensure compatibility?

35 / 80

A Windows 11 system fails to boot after a driver update, displaying a BSOD with a "CRITICAL_PROCESS_DIED" error. Given a scenario involving troubleshooting operating systems, what is the best initial step to resolve this?

36 / 80

A technician is configuring a Linux workstation with Ubuntu 24.04 to restrict SSH access to a specific user group. Given a scenario involving securing Linux-based operating systems, what is the most secure and efficient method to achieve this?

37 / 80

A user reports that a Windows 10 system fails to apply Group Policy Objects (GPOs) after a recent domain join. The gpresult /r command shows no policies applied. Given a scenario involving configuring and securing operating systems, what is the most likely cause and resolution?

38 / 80

A company is deploying Windows 11 Enterprise via zero-touch deployment in a hybrid environment with legacy hardware. The process fails on some machines due to boot method incompatibilities. Given a scenario involving diverse OS installations, what is the most probable cause and resolution?

39 / 80

During a system audit, an IT administrator notices that a Linux server using XFS for its primary filesystem experiences performance degradation under heavy write loads compared to ext4. Given various filesystem types and their purposes, what advanced feature of XFS might be contributing to this, and how could it be mitigated?

40 / 80

A technician is troubleshooting a workstation that fails to mount an external drive formatted with APFS after connecting to a Windows 11 Pro system. The drive was previously used on a macOS device. Considering filesystem compatibility concerns between operating systems, what is the most likely reason for this issue?

41 / 80

A Linux machine shows:
“Permission denied (publickey).”
What is the likely cause?

42 / 80

A user’s mobile device has extremely slow Wi-Fi only on corporate networks. Other devices work fine. What is the likely cause?

43 / 80

A laptop repeatedly prompts:
“Your credentials could not be verified.”
Domain password is correct. What is most likely wrong?

44 / 80

A user deleted files and emptied the Recycle Bin. What recovery method offers the highest chance of success?

45 / 80

A Windows PC fails to join a domain and shows:
“The specified domain either does not exist or could not be contacted.”
What should the technician check first?

46 / 80

A technician needs to ensure a Linux service starts automatically on boot. What command should they use?

47 / 80

A Windows user complains that apps keep reinstalling themselves after uninstalling them. What is most likely enabled?

48 / 80

A technician suspects a rogue DHCP server on a network. Which tool confirms this?

49 / 80

A Linux user wants to schedule a script that runs every 10 minutes. What should they use?

50 / 80

A user’s laptop boots extremely slowly after an update. Task Manager shows 99% disk usage from “Service Host: SysMain.” What should the technician do?

51 / 80

A Windows PC issues error “BOOTMGR is missing.” What is the best repair approach?

52 / 80

A technician deploys a Windows image, but new users complain default apps and settings are missing. Which file must be configured?

53 / 80

A user cannot access shared folders on a Windows domain PC, but they can ping the server. What should the technician check?

54 / 80

A Linux workstation fails to boot and displays:
“Kernel panic: unable to mount root filesystem.”
What should the technician check?

55 / 80

A user’s macOS system constantly prompts for the keychain password after login. What is the most likely cause?

56 / 80

A company has standardized on BitLocker with TPM+PIN. One laptop cannot boot after a motherboard replacement. What is the likely cause?

57 / 80

A user installed a program that replaced several file associations. Now PDFs open in the wrong app. What is the fastest fix?

58 / 80

A technician suspects a Windows driver is causing random BSODs after a peripheral installation. What should the technician use?

59 / 80

A user cannot log in because their domain password expired while traveling offline for two weeks. What should the technician do?

60 / 80

A Windows 11 laptop is unable to complete updates. The user receives error 0x80070570 indicating corrupted update files. What should the technician do first?

61 / 80

A user’s Windows PC refuses to install applications and displays:
“The system administrator has set policies to prevent this installation.”
What should the technician modify?

62 / 80

A Linux server won’t accept SSH logins for root even though the password is correct. What should be checked?

63 / 80

A Windows system shows:
“This copy of Windows is not genuine.”
What is the likely cause?

64 / 80

A user is repeatedly locked out of their domain account every morning. What is the likely cause?

65 / 80

A Windows system’s encrypted files are unreadable after profile corruption. What is the required item to restore access?

66 / 80

A Linux admin needs to check which services are listening on network ports. Which command?

67 / 80

A Windows computer randomly wakes from sleep. Which command diagnoses wake triggers?

68 / 80

A user cannot reach HTTPS websites but HTTP works normally. What is the root cause?

69 / 80

A user reports continuous redirects in their browser and new toolbars appearing. Antivirus shows no issues. What is most likely installed?

70 / 80

A business requires users to authenticate to Microsoft 365 using fingerprints or FIDO keys. What feature must be implemented?

71 / 80

A system has a corrupted registry preventing it from booting. What is the best tool?

72 / 80

A technician must verify if a Windows machine is receiving repeated failed logins from unknown IPs. Which log should they inspect?

73 / 80

A user's Windows system won’t activate after a motherboard replacement. Why?

74 / 80

A Linux user wants to view real-time CPU, RAM, and process usage from the command line. Which tool should they use?

75 / 80

A mobile device enrolled in MDM cannot access gmail.com, but all corporate apps work. Why?

76 / 80

A technician wants to prevent users from installing software without blocking Windows Updates. What should they use?

77 / 80

A user experiences freezing on startup. Event Viewer shows “disk controller failure.” What should the technician check?

78 / 80

A Windows 11 system can’t run older software required for business. What is the best solution?

79 / 80

A user cannot print to a network printer and gets “Access Denied.” What should be checked?

80 / 80

A technician needs to disable a startup application for ALL users on a Windows machine. Which tool should they use?

Your score is

The average score is 69%

0%

Boost your CompTIA A+ 220-1202 Core 2 exam prep with our free CompTIA A+ Core 2 practice test, designed for 2025. Explore critical topics like operating systems, security, software troubleshooting, and operational procedures to ensure exam readiness. Perfect for IT professionals pursuing certification, this test is updated to match the latest 2025 exam objectives, equipping you with the skills needed for technical support and IT roles. Access instant online score reports to track your progress and identify areas for improvement. Kickstart your practice today and take a confident step toward achieving your CompTIA A+ certification!

CompTIA A+ Core 1 Practice Test FREE

https://www.youtube.com/watch?v=__1ekPpcRlY&list=PLd8Sl178d4fSexOo5VaoiTi_8_yar9oan&index=2 Ace your CompTIA A+ Core 1 with our FREE practice test! Master networking, security, and troubleshooting skills to excel in your certification exam.. Let’s dive into another CompTIA A+ Core 1 practice test Free. Watch on ▶️YouTube: CompTIA A+ Core 1 Free Practice Test Question 1: Network CablingA company needs to install network cabling…

Read More…

What Are Performance-Based Questions in CompTIA A+ Core 1?

When I began prepping for the CompTIA A+ Core 1 (220-1201) exam, I kept hearing about “performance-based questions” and wondered, “What are those?” As someone who passed with no IT background, I learned that mastering these questions was crucial for success. In this post, I’ll explain what performance-based questions (PBQs) are in the CompTIA A+…

Read More…