Comptia
220-1202 core 2
Question 1
SIMULATION -
You are configuring a home network for a customer. The customer has requested the ability to access a Windows PC remotely, and needs all
chat and optional functions to work in their game console.
INSTRUCTIONS -
Use the drop-down menus to complete the network configuration for the customer. Each option may only be used once, and not all options
will be used.
Then, click the + sign to place each device in its appropriate location.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Wireless AP LAN –
Firewall Screened Subnet –
Correct answers:
Questions 2
An administrator received an email stating that the OS they are currently supporting will no longer be issued security update s and patches.
Which of the following is most likely the reason the administrator received this message?
A.
Support from the computer’s manufacturer is expiring.
B.
The OS will be considered end of life.
C.
The built-in security software is being removed from the next OS version.
D.
A new version of the OS will be released soon.
Question 3
Which of the following is the best way to distribute custom images to 800 devices that include four device vendor classes with two types of
user groups?
A.
Use xcopy to clone the hard drives from one to another.
B.
Use robocopy to move the files to each device.
C.
Use a local image deployment tool for each device.
D.
Use a network-based remote installation tool.
Question 4
Which of the following types of social engineering attacks sends an unsolicited text message to a user's mobile device?
A.
Impersonation
B.
Vishing
C.
Spear phishing
D.
Smishing
Question 5
A user reports some single sign-on errors to a help desk technician. Currently, the user is able to sign in to the company's application portal
but cannot access a specific SaaS-based tool. Which of the following would the technician most likely suggest as a next step?
A.
Reenroll the user's mobile device to be used as an MFA token.
B.
Use a private browsing window to avoid local session conflicts.
C.
Bypass single sign-on by directly authenticating to the application.
D.
Reset the device being used to factory defaults.
Question 6
A technician verifies that a malware incident occurred on some computers in a small office. Which of the following should the technician do
next?
A.
Quarantine the infected systems.
B.
Educate the end users.
C.
Disable System Restore.
D.
Update the anti-malware and scan the computers.
Question 7
Which of the following is a Linux command that is used for administrative purposes?
A.
runas
B.
cmcl
C.
net user
D.
su
Question 8
A user recently installed an application that accesses a database from a local server. When launching the application, it does not populate
any information. Which of the following command-line tools is the best to troubleshoot the issue?
A.
ipconfig
B.
nslookup
C.
netstat
D.
curl
Question 9
A small office reported a phishing attack that resulted in a malware infection. A technician is investigating the incident and has verified the
following:
All endpoints are updated and have the newest EDR signatures.
Logs confirm that the malware was quarantined by EDR on one system.
The potentially infected machine was reimaged.
Which of the following actions should the technician take next?
A.
Install network security tools to prevent downloading infected files from the internet.
B.
Discuss the cause of the issue and educate the end user about security hygiene.
C.
Flash the firmware of the router to ensure the integrity of network traffic.
D.
Suggest alternate preventative controls that would include more advanced security software.
Question 10
Which of the following describes a vulnerability that has been exploited before a patch or remediation is available?
A.
Spoofing
B.
Brute-force
C.
DoS
D.
Zero-day
Question 11
SIMULATION -
You have been contacted through the help desk chat application. A user is setting up a replacement SOHO router. Assist the user with setting
up the router.
INSTRUCTIONS -
Select the most appropriate statement for each response. Click the send button after each response to continue the chat.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Correct answer:
Question 12
A technician needs to provide remote support for a legacy Linux-based operating system from their Windows laptop. The solution needs to
allow the technician to see what the user is doing and provide the ability to interact with the user's session. Which of the following remote
access technologies would support the use case?
A.
VPN
B.
VNC
C.
SSH
D.
RDP
Question 13
A help desk technician is setting up speech recognition on a Windows system. Which of the following settings should the technician use?
A.
Time and Language
B.
Personalization
C.
System
D.
Ease of Access
Question 14
A user receives a new personal computer but is unable to run an application. An error displays saying that .NET Framework 3.5 i s required
and not found. Which of the following actions is the best way to resolve this issue?
A.
Resolve the dependency through the "Turn Windows features on or off" menu.
B.
Download the dependency via a third-party repository.
C.
Ignore the dependency and install the latest version 4 instead.
D.
Forward the trouble ticket to the SOC team because the issue poses a great security risk.
Question 15
An employee is using a photo editing program. Certain features are disabled and require a log-in, which the employee does not have. Which
of the following is a way to resolve this issue?
A.
License assignment
B.
VPN connection
C.
Application repair
D.
Program reinstallation
Question 16
A technician is deploying mobile devices and needs to prevent access to sensitive data if the devices are lost. Which of the following is the
best way to prevent unauthorized access if the user is unaware that the phone is lost?
A.
Encryption
B.
Remote wipe
C.
Geofencing
D.
Facial recognition
Question 17
Which of the following is the quickest way to move from Windows 10 to Windows 11 without losing data?
A.
Using gpupdate
B.
Image deployment
C.
Clean install
D.
In-place upgrade
Question 18
Technicians are failing to document user contact information, device asset tags, and a clear description of each issue in the ticketing system.
Which of the following should a help desk management team implement for technicians to use on every call?
A.
Service-level agreements
B.
Call categories
C.
Standard operating procedures
D.
Knowledge base articles
Question 19
An application's performance is degrading over time. The application is slowing, but it never gives an error and does not crash. Which of the
following tools should a technician use to start troubleshooting?
A.
Reliability history
B.
Computer management
C.
Resource monitor
D.
Disk defragment
Question 20
Which of the following filesystem types does the Linux OS use?
A.
exFAT
B.
APFS
C.
ext4
D.
NTFS
Question 21
Which of the following methods would make data unrecoverable but allow the drive to be repurposed?
A.
Deleting the partitions
B.
Implementing EFS
C.
Performing a low-level format
D.
Degaussing the device
Question 22
After a recent mobile OS upgrade to a smartphone, a user attempts to access their corporate email, but the application does not open. A
technician restarts the smartphone, but the issue persists. Which of the following is the most likely way to resolve the issu e?
A.
Updating the failed software
B.
Registering the smartphone with an MDM solution
C.
Installing a third-party client
D.
Clearing the cache partition
Question 23
A technician is attempting to join a workstation to a domain but is receiving an error message stating the domain cannot be found. However,
the technician is able to ping the server and access the internet. Given the following information:
Which of the following should the technician do to fix the issue?
A.
Change the DNS settings.
B.
Assign a static IP address.
C.
Configure a subnet mask.
D.
Update the default gateway.
Question 24
Users are reporting that an unsecured network is broadcasting with the same name as the normal wireless network. They are abl e to access
the internet but cannot connect to the file share servers. Which of the following best describes this issue?
A.
Unreachable DNS server
B.
Virtual local area network misconfiguration
C.
Incorrect IP address
D.
Rogue wireless access point
Question 25
A computer technician is implementing a solution to support a new internet browsing policy for a customer's business. The pol icy prohibits
users from accessing unauthorized websites based on categorization. Which of the following should the technician configure on the SOHO
router?
A.
Secure management access
B.
Group Policy Editor
C.
Content filtering
D.
Firewal exam
Question 26
Recently, the number of users sharing smartphone passcodes has increased. The management team wants a technician to deploy a more
secure screen lock method. Which of the following technologies should the technician use?
A.
Pattern lock
B.
Facial recognition
C.
Device encryption
D.
Multifactor authentication
Question 27
An end user's laptop is having network drive connectivity issues in the office. The end user submits a help desk ticket, and a support
technician is able to establish a remote connection and fix the issue. The following day, however, the network drive is disco nnected again.
Which of the following should the technician do next?
A.
Connect remotely to the user’s computer to see whether the network drive is still connected.
B.
Send documentation about how to fix the issue in case it reoccurs.
C.
Escalate the ticket to the next level.
D.
Keep the ticket open until next day, then close the ticket.
Question 28
Which of the following provides information to employees, such as permitted activities when using the organization's resource s?
A.
AUP
B.
MNDA
C.
DRM
D.
EULA
Question 29
A technician needs to install an operating system on a large number of workstations. Which of the following is the fastest method?
A.
Physical media
B.
Mountable ISO
C.
Manual installation
D.
Image deployment
Question 30
A user is working from home and is unable to access work files on a company laptop. Which of the following should a technician configure to
fix the network access issue?
A.
Wide-area network
B.
Wireless network
C.
Proxy network settings
D.
Virtual private network
Question 31
A technician is troubleshooting an issue in which a service runs momentarily and stops at certain points in the process. The technician needs
to determine the root cause of this issue. Which of the following tools should the technician use?
A.
Event Viewer
B.
Task Manager
C.
Internet Options
D.
Process Explorer
Question 32
Which of the following is an example of an application publisher including undisclosed additional software in an installation package?
A.
Virus
B.
Ransomware
C.
Potentially unwanted program
D.
Trojan
Question 33
A technician needs to map a shared drive from a command-line interface. Which of the following commands should the technician use?
A.
pathping
B.
nslookup
C.
net use
D.
tracert
Question 34
A network technician notices that most of the company's network switches are now end-of-life and need to be upgraded. Which of the
following should the technician do first?
A.
Implement the change.
B.
Approve the change.
C.
Propose the change.
D.
Schedule the change.
Question 35
A help desk team was alerted that a company-owned cell phone has an unrecognized password-cracking application. Which of the following
should the help desk team do to prevent further unauthorized installations from occurring?
A.
Configure Group Policy.
B.
Implement PAM.
C.
Install anti-malware software.
D.
Deploy MDM.
Question 36
Which of the following is used in addition to a password to implement MFA?
A.
Sending a code to the user's phone
B.
Verifying the user's date of birth
C.
Prompting the user to solve a simple math problem
D.
Requiring the user to enter a PIN
Question 37
A technician is preparing to replace the batteries in rack-mounted UPS system. After ensuring the power is turned off and the batteries are
fully discharged, the technician needs to remove the battery modules from the bottom of the rack. Which of the following steps should the
technician take?
A.
Ensure the fire suppression system is ready to be activated.
B.
Use appropriate lifting techniques and guidelines.
C.
Place the removed batteries in an antistatic bag.
D.
Wear a face mask to filter out any harmful fumes.
Question 38
A technician is setting up a surveillance system for a customer. The customer wants access to the system's web interface on the LAN via the
system’s IP address. Which of the following should the technician use to prevent external log-in attempts from the internet?
A.
Port mapping
B.
Subnetting
C.
Static IP
D.
Content filtering
Question 39
A technician needs to configure laptops so that only administrators can enable virtualization technology if needed. Which of the following
should the technician configure?
A.
BIOS password
B.
Guest account
C.
Screen lock
D.
AutoRun setting
Question 40
Which of the following file types would a desktop support technician most likely use to automate tasks for a Windows user log-in?
A.
.bat
B.
.sh
C.
.py
D.
.js
Question 41
A technician uses AI to draft a proposal about the benefits of new software. When reading the draft, the technician notices that the draft
contains factually incorrect information. Which of the following best describes this scenario?
A.
Data privacy
B.
Hallucinations
C.
Appropriate use
D.
Plagiarism
Question 42
Which of the following describes an attack in which an attacker sets up a rogue AP that tricks users into connecting to the rogue AP instead
of the legitimate network?
A.
Stalkerware
B.
Evil twin
C.
Tailgating
D.
Shoulder surfing
Question 43
A user is experiencing issues with outdated images while browsing websites. Which of the following settings should a technici an use to
correct this issue?
A.
Administrative Tools
B.
Windows Defender Firewall
C.
Internet Options
D.
Ease of Access
Question 44
Every time a user loads a specific spreadsheet, their computer is temporarily unresponsive. The user also notices that the title bar indicates
the applications are not responding. Which of the following would a technician most likely inspect?
A.
Anti-malware logs
B.
Workstation repair options
C.
Bandwidth status as reported in the Task Manager
D.
File size and related memory utilization
Question 45
MFA for a custom web application on a user's smartphone is no longer working. The last time the user remembered it working was before
taking a vacation to another country. Which of the following should the technician do first?
A.
Verify the date and time settings.
B.
Apply mobile OS patches.
C.
Uninstall and reinstall the application.
D.
Escalate to the website developer.
Question 46
A user frequently misplaces their Windows laptop and is concerned about it being stolen. The user would like additional secur ity controls on
their laptop. Which of the following is a built-in technology that a technician can use to enable full drive encryption?
A.
Active Directory
B.
New Technology File System
C.
Encrypting File System
D.
BitLocker
Question 47
Which of the following is used to apply corporate restrictions on an Apple device?
A.
App Store
B.
VPN configuration
C.
Apple ID
D.
Management profile
Question 48
A user's new smartphone is not staying charged throughout the day. The smartphone charges fully every night. Which of the follo wing
should a technician review first to troubleshoot the issue?
A.
Storage usage
B.
End of software support
C.
Charger wattage
D.
Background applications
Question 49
A customer is unable to open some files on their system. Each time the customer attempts to open a file, the customer receive s a message
that the file is encrypted. Which of the following best describes this issue?
A.
Keylogger
B.
Ransomware
C.
Phishing
D.
Cryptominer
Question 50
An organization is experiencing an increased number of issues. A technician notices applications that are not installed by de fault. Users are
reporting an increased number of system prompts for software licensing. Which of the following would the security team most likely do to
remediate the root cause?
A.
Deploy an internal PKI to filter encrypted web traffic.
B.
Remove users from the local admin group.
C.
Implement stronger controls to block suspicious websites.
D.
Enable stricter UAC settings on Windows.
Question 51
A support specialist needs to decide whether to install a 32-bit or 64-bit OS architecture on a new computer. Which of the following
specifications will help the specialist determine which OS architecture to use?
A.
16GB RAM
B.
Intel i7 CPU
C.
500GB HDD
D.
1Gbps Ethernet
Question 52
Which of the following prevents forced entry into a building?
A.
PIV card
B.
Motion-activated lighting
C.
Video surveillance
D.
Bollard
Question 53
A technician is assigned to offboard a user. Which of the following are common tasks on an offboarding checklist? (Choose two.)
A.
Quarantine the hard drive in the user's laptop.
B.
Deactivate the user's key fobs for door access.
C.
Purge all PII associated with the user.
D.
Suspend the user's email account.
E.
Turn off the network ports underneath the user’s desk.
F.
Add the MAC address of the user's computer to a blocklist.
Question 54
A company would like to deploy baseline images to new computers as they are started up on the network. Which of the following boot
processes should the company use for this task?
A.
ISO
B.
Secure
C.
USB
D.
PXE
Question 55
A user has been adding data to the same spreadsheet for several years. After adding a significant amount of data, they are now unable to
open the file. Which of the following should a technician do to resolve the issue?
A.
Revert the spreadsheet to the last restore point.
B.
Increase the amount of RAM.
C.
Defragment the storage drive.
D.
Upgrade the network connection speed.
Question 56
Which of the following is found in an MSDS sheet for a battery backup?
A.
Installation instructions
B.
Emergency procedures
C.
Configuration steps
D.
Voltage specifications
Question 57
A technician installs VPN client software that has a software bug from the vendor.
After the vendor releases an update to the software, the technician attempts to
reinstall the software but keeps getting an error message that the network adapter
for the VPN already exists. Which of the following should the technician do next to
mitigate this issue?
A.
Run the latest OS security updates.
B.
Map the network adapter to the new software.
C.
Update the network adapter’s firmware.
D.
Delete hidden network adapters.
Question 58
Which of the following is the best reason for a network engineering team to provide
a help desk technician with IP addressing information to use on workstations being
deployed in a secure network segment?
A.
Only specific DNS servers are allowed outbound access.
B.
The network allow list is set to a specific address.
C.
DHCP services are not enabled for this subnet.
D.
NAC servers only allow for security updates to be installed.
Question 59
A technician is using a credential manager to safeguard a large number of
credentials. Which of the following is important for using this application?
A.
Restricted log-in times
B.
Secure master password
C.
TPM module
D.
Windows lock screen
Question 60
Which of the following methods involves requesting a user’s approval via a push
notification to verify the user’s identity?
A.
Call
B.
Authenticator
C.
Hardware token
D.
SMS
Question 61
A customer wants to be able to work from home but does not want to be
responsible for bringing company equipment back and forth. Which of the
following would allow the user to remotely access and use a Windows PC at the
main office? (Choose two.)
A.
SPICE
B.
SSH
C.
RDP
D.
VPN
E.
RMM
F.
WinRM
Question 62
A company wants to use a single operating system for its workstation and servers
and avoid licensing fees. Which of the following operating systems would the
company most likely select?
A.
Linux
B.
Windows
C.
macOS
D.
Chrome OS
Question 63
A user is attempting to open on a mobile phone a HD video that is hosted on a
popular media streaming website. The user is receiving connection timeout errors.
The mobile reception icon area is showing two bars next to 3G. Which of the
following is the most likely cause of the issue?
A.
The user does not have Wi-Fi enabled.
B.
The website’s subscription has run out.
C.
The bandwidth is not fast enough.
D.
The mobile device storage is full.
Question 64
A technician notices that the weekly backup is taking too long to complete. The
daily backups are incremental. Which of the following would most likely resolve
the issue?
A.
Changing the backup window
B.
Performing incremental weekly backups
C.
Increasing the backup storage
D.
Running synthetic full weekly backups
Question 65
A help desk technician needs to remove RAM from retired workstations and
upgrade other workstations that have applications that use more memory with this
RAM. Which of the following actions would the technician most likely take?
A.
Demagnetize memory for security.
B.
Use antistatic bags for storage and transport.
C.
Plug in the power supply to ground each workstation.
D.
Install memory in identical pairs.
Question 66
A customer’s computer does not have an active connection to the network. A
technician goes through a few troubleshooting steps but is unable to resolve the
issue. The technician has exhausted their knowledge. The customer expresses
frustration at the time taken to resolve this issue. Which of the following should the
technician do?
A.
Escalate the issue to a senior team member and provide next steps to the
customer.
B.
Dismiss the customer and reschedule another troubleshooting session at a later
date.
C.
Interrupt the customer and express that troubleshooting support tickets can take
time.
D.
Maintain a positive attitude and continue to ask questions regarding the scope of
the issue.
Question 67
The screen of a previously working computer repeatedly displays an OS Not Found
error message when the computer is started. Only a USB drive, a keyboard, and a
mouse are plugged into the computer. Which of the following should a technician
do first?
A.
Run data recovery tools on the disk.
B.
Partition the disk using the GPT format.
C.
Check boot options.
D.
Switch from UEFI to BIOS.
Question 68
A company executive is currently attending a major music festival with a large
number of attendees and is having trouble accessing a work email account. The
email application is not downloading emails and also appears to become stuck
during connection attempts. Which of the following is most likely causing the
disruption?
A.
The phone has no storage space available.
B.
Company firewalls are configured to block remote access to email resources.
C.
Too many devices in the same area are trying to connect to the mobile network.
D.
The festival organizer prohibits internet usage during the event and has blocked the
internet signal.
Question 69
A company recently transitioned to a cloud-based productivity suite and wants to
secure the environment from external threat actors. Which of the following is the
most effective method?
A.
Multifactor authentication
B.
Encryption
C.
Backups
D.
Strong passwords
Question 70
SIMULATION –
As a corporate technician, you are asked to evaluate several suspect email
messages on a client’s computer. Corporate policy requires the following:
All phishing attempts must be reported.
Future spam emails to users must be prevented.
INSTRUCTIONS –
Review each email and perform the following within the email:
Classify the emails –
Identify suspicious items, if applicable, in each email
Select the appropriate resolution
If at any time you would like to bring back the initial state of the simulation, please
click the Reset All button.
correct answers:
Question 71
A user reports getting a BSOD error on their computer at least twice a day. Which of
the following should the technician use to determine the cause?
A.
Event Viewer
B.
Performance Monitor
C.
System Information
D.
Device Manager
Question 72
A technician is setting up a Windows server to allow remote desktop connections
for multiple users. Which of the following should the technician configure on the
workstation?
A.
Firewall
B.
Computer Management
C.
User Accounts
D.
Ease of Access
Question 73
A technician thinks that an application a user downloaded from the internet may
not be the legitimate one, even though the name is the same. The technician needs
to confirm whether the application is legitimate. Which of the following should the
technician do?
A.
Compare the hash value from the vendor.
B.
Run Task Manager and compare the process ID.
C.
Run the application in safe mode.
D.
Verify the file name is correct.
Question 74
SIMULATION –
Multiple users are reporting audio issues as well as performance issues after
downloading unauthorized software. You have been dispatched to identify and
resolve any issues on the network using best practice procedures.
INSTRUCTIONS –
Quarantine and configure the appropriate device(s) so that the users’ audio issues
are resolved using best practice procedures.
Multiple devices may be selected for quarantine.
Click on a host or server to configure services.
If at any time you would like to bring back the initial state of the simulation, please
click the Reset All button.
correct answers:
Question 75
A security administrator teaches all of an organization’s staff members to
useBitLocker To Go. Which of the following best describes the reason for this
training?
A.
To ensure that all removable media is password protected in case of loss or theft
B.
To enable Secure Boot and a BIOS-level password to prevent configuration changes
C.
To enforce VPN connectivity to be encrypted by hardware modules
D.
To configure all laptops to use the TPM as an encryption factor for hard drives
Question 76
Which of the following is used to detect and record access to restricted areas?
A.
Bollards
B.
Video surveillance
C.
Badge readers
D.
Fence
Correct answers:
2 B
3 B
4 B
5 C
6 A
7 D
8 C
9 C
10 D
11
12 A
13 A
14 A
15 A
16 A
17 A
18 B
19 B
20 C
21 D
22 C
23 D
24 A
25 C
26 D
27 A
28 C
29 A
30 B
31 C
32 C
33 A
34 D
35 C
36 C
37 D
38 B
39 A
40 D
41 C
42 C
43 C
44 A
45 A
46 C
47 A
48 A
49 C
50 A
51 A
52 B
53 D
54 C
55 A
56 B
57 C
58 B
59 D
60 C
61 A
62 D
63 C
64 A
65 A
66 D
67 C
68 B
69 D
70
71 B
72 B
73 C
74
75 A
76 C