Realistic FREE CompTIA A+ Core 2 Practice Test Questions and Answers With Explanations (2026)

comptia a+ core 2 practice test

To become a certified CompTIA A+, you must crack 2 exams: 220-1201 Core 1 and 220-1202 Core 2 exams.

You can access free CompTIA A+ core 2 practice test questions below to cover all objectives of the 220-1202 exam. Also, you can study with free core 1 practice test questions with TechCertGuide. If you want to access questions of both exams at one place, you can also do so with us.

Get 200+ CompTIA A+ Practice Questions in PDF


Table of Contents


Questions of Objective 1: Operating systems (28%)

Question

A technician is tasked with deploying Windows 10 on several older laptops that do not support TPM 2.0 but still need full disk encryption. Company policy requires encryption at rest, but hardware upgrades are not approved. The technician must proceed with installation and encryption using available system capabilities.

What should the technician configure during and after installation to meet this requirement?

A. Enable BitLocker using a password or USB startup key instead of TPM
B. Disable Secure Boot to allow BitLocker installation
C. Install Windows in Safe Mode and then enable encryption
D. Convert the system to GPT after enabling BitLocker

Correct Answer: A

Explanation:
BitLocker can operate without TPM by using alternative authentication methods such as a password or USB startup key. Although TPM provides hardware-based key storage and enhanced security, it is not mandatory for enabling disk encryption. In systems lacking TPM 2.0, administrators can configure Group Policy to allow BitLocker without compatible TPM hardware.

This approach satisfies encryption-at-rest requirements while working within hardware limitations. During deployment, the technician must configure local security policies to permit BitLocker operation without TPM, then enable encryption using a strong password or removable media for authentication. This ensures compliance with company policy without requiring hardware replacement.

Question

A company plans to implement a dual-boot configuration on employee workstations to allow both Windows 11 and Ubuntu Linux. The systems currently have Windows installed using UEFI and GPT. The technician must ensure that installing Linux does not overwrite the Windows bootloader and that users can choose the OS at startup.

What is the most appropriate approach during the Linux installation?

A. Install Linux in Legacy BIOS mode alongside Windows
B. Shrink the Windows partition and install Linux in UEFI mode using GRUB
C. Convert the disk to MBR before installing Linux
D. Install Linux on an external USB drive only

Correct Answer: B

Explanation:
When Windows is installed in UEFI mode with a GPT disk, Linux must also be installed in UEFI mode to maintain compatibility. The technician should shrink the existing Windows partition using Disk Management, then install Ubuntu into the unallocated space. During installation, the GRUB bootloader will integrate into the existing EFI system partition without overwriting Windows.

Installing Linux in Legacy mode or converting to MBR would create boot conflicts and potentially render the system unbootable. By keeping both operating systems in UEFI mode and using GPT, the technician ensures a stable dual-boot configuration where users can select their preferred OS from the boot menu at startup.

Question

An IT department is preparing Android tablets for field technicians. Devices must be reset, updated to the latest OS version, and enrolled into the company’s mobile device management system before distribution. Some devices were previously tied to personal Google accounts.

Before enrolling the tablets into management, what must the technician perform to avoid activation lock issues?

A. Perform a factory reset without removing existing Google accounts
B. Remove the Google account from settings before performing a factory reset
C. Enable developer mode and unlock the bootloader
D. Flash a custom ROM to bypass account restrictions

Correct Answer: B

Explanation:
Android devices include Factory Reset Protection (FRP), which ties the device to the last signed-in Google account. If a factory reset is performed without first removing the account, the device will require the original credentials during setup, potentially blocking deployment. Removing the Google account before resetting ensures FRP does not trigger.

In enterprise deployments, technicians must sign out of personal accounts through device settings before initiating a reset. This step prevents activation lock issues and ensures the device can be enrolled into mobile device management without authentication barriers. Proper account removal is a standard step in preparing Android devices for reassignment.

Question

A technician is performing an in-place upgrade from Windows 10 to Windows 11 on a workstation used for accounting software. The software vendor confirms compatibility with Windows 11, but the technician must ensure user data and installed applications remain intact after the upgrade.

Which installation method should the technician choose?

A. Boot from installation media and perform a custom installation
B. Perform an in-place upgrade from within the existing Windows environment
C. Format the drive and install Windows 11 cleanly
D. Install Windows 11 on a separate partition and migrate files manually

Correct Answer: B

Explanation:
An in-place upgrade launched from within the existing Windows 10 environment preserves installed applications, user profiles, and data. This method is specifically designed for version transitions where hardware meets requirements and application compatibility has been confirmed. It avoids the need for full reinstallation and manual data restoration.

Booting from installation media and choosing a custom installation would remove applications and potentially erase user settings. Since the organization wants minimal downtime and continuity for accounting operations, performing the upgrade directly from the running OS ensures a seamless transition while maintaining system integrity and user configurations.

Question

A Linux workstation fails to boot after a failed kernel update. The system displays a GRUB prompt instead of loading the operating system. The technician needs to restore the system without reinstalling Linux or losing user data.

What is the most appropriate recovery approach?

A. Reinstall Linux completely using default settings
B. Boot from live media and reinstall the GRUB bootloader
C. Delete all partitions and recreate them
D. Convert the disk from GPT to MBR

Correct Answer: B

Explanation:
Booting from live Linux media allows the technician to mount the existing Linux partitions and reinstall the GRUB bootloader. When GRUB becomes corrupted or misconfigured after a kernel update, reinstalling or repairing the bootloader often restores normal boot functionality without affecting user data.

A complete OS reinstallation would be unnecessary and time-consuming. By accessing the system through live media, the technician can chroot into the installed environment and run GRUB installation commands. This targeted recovery approach aligns with best practices for resolving Linux boot failures while preserving system configuration and user files.


Questions of Objective 2: Security (28%)

Question

A wireless network supports both WPA2 and WPA3 security protocols. Security policies require the use of the strongest available encryption, but some older devices cannot connect using WPA3. How should the network be configured to balance security and compatibility?

A. Use WPA3-Transition Mode to support both WPA2 and WPA3 connections
B. Disable encryption to allow all devices to connect
C. Require manual configuration of encryption settings on each device
D. Use WEP encryption for legacy device compatibility

Correct Answer: A

Explanation:

WPA3-Transition Mode allows WPA2 and WPA3 devices to connect while prioritizing stronger encryption where available. This configuration maintains security for modern devices without excluding older hardware. It provides a practical balance between compatibility and encryption standards. Using transition mode ensures network accessibility while encouraging migration to stronger security protocols over time.

Question

A company requires employees to use strong passwords and multi-factor authentication. However, some users write passwords on sticky notes, creating a security risk. Which security measure best addresses this behavior without removing password requirements?

A. Implement password managers to securely store credentials
B. Disable passwords and rely solely on biometrics
C. Allow simple passwords to improve usability
D. Require password changes every day

Correct Answer: A

Explanation:
Password managers securely store credentials, eliminating the need for users to write passwords on physical notes. They also encourage the use of strong, unique passwords without sacrificing usability. This solution enhances security while maintaining compliance with authentication policies. Proper credential management reduces the risk of unauthorized access caused by poor password practices.

Question

A small office reports that multiple computers suddenly display pop-ups claiming the system is infected and urging users to call a support number. Users notice that antivirus software is disabled and cannot be re-enabled. Network traffic also spikes to unknown external IP addresses. You must contain the threat and prevent further spread while preserving forensic evidence for later analysis. What should be the FIRST action?

A. Disconnect affected machines from the network and isolate them
B. Run a full antivirus scan and attempt malware removal
C. Reimage all systems immediately without investigation
D. Update antivirus definitions and restart the systems

Correct Answer: A

Explanation of CompTIA A+ Core 2 Practice Test Question:
Isolating affected machines from the network prevents malware from communicating with external servers and spreading to other devices. This is a core containment step in incident response and malware mitigation. Preserving forensic evidence is also important, so immediate reimaging or indiscriminate removal could destroy valuable data. After isolation, further analysis and remediation can occur in a controlled manner. Malware incidents require structured response to minimize damage and support post-incident investigation.


Questions of Objective 3: Software troubleshooting (23%)

Question

A user reports that their mobile device frequently loses Wi-Fi connectivity when moving between rooms in an office building. The connection drops even though the Wi-Fi network shows full signal strength in some areas and reconnects after a few minutes. The user also mentions that other devices in the same area do not experience similar issues. You verify that the device’s operating system and network settings are up to date. What is the most likely cause and troubleshooting step?

A. The device is using an outdated Wi-Fi standard and must be replaced
B. The access points may not support seamless roaming; verify AP configuration and firmware
C. The user’s mobile data is interfering with Wi-Fi and must be disabled
D. The network requires a static IP configuration to maintain connectivity

Correct Answer: B

Explanation:
Seamless roaming between access points depends on proper configuration and firmware of wireless infrastructure. If access points are misconfigured or running outdated firmware, devices may drop connections when transitioning between coverage areas even with strong signal strength. Since other devices function normally, the issue is likely related to how roaming is handled by the access points rather than the mobile device itself. Verifying AP settings and updating firmware can improve handoff behavior and connectivity stability. This aligns with mobile troubleshooting practices that focus on network infrastructure when symptoms occur only in specific locations.

Question

A remote employee reports that a productivity application on their smartphone crashes immediately after launching. The issue started after a recent app update. Reinstalling the app does not resolve the problem, and other applications function normally. The device has sufficient storage and the operating system is current. What is the most appropriate troubleshooting step?

A. Clear the application cache and data before launching the app again
B. Downgrade the application to the previous version using an APK file
C. Reset the device to factory settings to eliminate software corruption
D. Replace the mobile device because the application is incompatible

Correct Answer: A

Explanation:
Application crashes after updates are often caused by corrupted cache or stored data that conflicts with the new version. Clearing the cache and application data forces the app to rebuild its configuration and temporary files, resolving many post-update issues without requiring drastic measures. Factory resets or device replacement are unnecessary when the problem is isolated to one application. This troubleshooting approach aligns with mobile support practices by addressing software-level issues before considering more disruptive solutions.

Question

A user reports that their smartphone battery drains rapidly even when the device is idle. They recently installed several new applications and enabled background synchronization for cloud services. The device does not overheat and performance remains normal. What is the most effective troubleshooting action?

A. Disable background app refresh and review battery usage statistics
B. Replace the battery because rapid drain indicates hardware failure
C. Reduce screen brightness and enable airplane mode permanently
D. Uninstall the operating system and reinstall it to fix power management

Correct Answer: A

Explanation:
Background processes and synchronization can consume significant power even when the device appears idle. Reviewing battery usage statistics identifies which applications or services are using excessive resources. Disabling background refresh for nonessential apps reduces power consumption and improves battery life. Since the device does not overheat and performance is normal, hardware failure is unlikely. This approach follows mobile troubleshooting principles by targeting software and configuration settings before considering hardware solutions.

Question

A mobile user cannot send or receive text messages but can still make voice calls and use mobile data. The issue occurs in multiple locations and persists after restarting the device. Network settings appear correct. What is the most likely cause and solution?

A. The messaging service on the carrier account is disabled; contact the carrier
B. The device requires a firmware update to support messaging features
C. The SIM card must be replaced because it only affects data services
D. Airplane mode is enabled and must be turned off to restore messaging

Correct Answer: A

Explanation:
If voice and data services function but messaging does not, the issue is often related to carrier provisioning or account settings rather than the device itself. Messaging services may be disabled or misconfigured on the carrier side, requiring support from the service provider. Restarting or updating the device would not resolve an account-level problem. This aligns with mobile troubleshooting practices that distinguish between device issues and carrier-related service configurations.

Question

A user reports that a newly installed mobile application requests excessive permissions, including access to contacts and location data, even though the application’s function does not require such access. The user is concerned about privacy and potential data misuse. What is the best course of action?

A. Deny unnecessary permissions and evaluate whether the app functions properly
B. Grant all requested permissions because modern apps require broad access
C. Uninstall the application and report it as malicious without further testing
D. Reset the device to factory settings to remove potential security threats

Correct Answer: A

Explanation:
Mobile applications should only be granted permissions that are necessary for their intended functionality. Denying unnecessary permissions allows the user to maintain privacy while testing whether the application operates correctly with limited access. If the app functions without additional permissions, the user can continue using it safely. This troubleshooting approach emphasizes security and least-privilege principles, which are essential in mobile device management and software support.

Question

A user experiences intermittent mobile data connectivity even though the signal indicator shows strong reception. Web pages fail to load at times, but connectivity returns after switching airplane mode on and off. Other users in the same area report normal service. What is the most likely issue?

A. The device’s network stack is temporarily stuck and resetting the connection resolves it
B. The mobile carrier requires a different data plan for stable connectivity
C. The device antenna is damaged and must be replaced
D. Background applications are consuming all available bandwidth

Correct Answer: A

Explanation:
Intermittent connectivity that resolves after toggling airplane mode often indicates a temporary network stack issue on the device. Enabling and disabling airplane mode forces the device to reestablish network connections and clear minor communication errors. Since other users in the area experience normal service, the problem is unlikely to be carrier-related or hardware-based. This troubleshooting step addresses software-level connectivity issues before considering more complex solutions.


Questions of Objective 4: Operational procedures (21%)

Question

A technician deploys a configuration update to improve network performance. After deployment, performance worsens, and the technician rolls back the change. However, no documentation of the rollback or performance metrics was recorded. What best practice was violated?

A. Documentation of successful changes only
B. Recording rollback actions and performance impact
C. Restricting documentation to security-related updates
D. Avoiding documentation for temporary changes

Correct Answer: B

Explanation:
Operational procedures require documentation of all actions, including rollbacks and performance impacts. This information helps teams understand why changes were reversed and prevents similar issues in future deployments. Performance metrics and rollback details support troubleshooting and continuous improvement. Proper documentation is essential for maintaining accountability and operational efficiency.

Question

An organization requires technicians to document all software installations and configuration changes. A technician installs an application for a user but does not record the installation details. Later, the application causes compatibility issues with another system. How does this lack of documentation affect operational procedures?

A. It improves efficiency by reducing administrative tasks
B. It makes troubleshooting and impact analysis more difficult
C. Documentation is unnecessary for user-installed applications
D. Operational procedures only apply to network configurations

Correct Answer: B

Explanation:
Without documentation, troubleshooting becomes challenging because there is no record of what changes were made or why they were implemented. Operational procedures rely on accurate records to support system maintenance and problem resolution. Documentation enables teams to trace changes and assess compatibility risks. Best practices emphasize comprehensive records for all system modifications.

Question

A company uses a knowledge base to document common IT issues and resolutions. Technicians are encouraged to update the knowledge base after resolving incidents. One technician resolves multiple issues but does not update the knowledge base. What impact does this have on operational procedures?

A. Knowledge bases are optional and do not affect operations
B. Future technicians may repeat troubleshooting efforts unnecessarily
C. Documentation is only required for critical incidents
D. Operational procedures are independent of knowledge sharing

Correct Answer: B

Explanation:
Knowledge bases support operational efficiency by providing shared solutions and reducing redundant troubleshooting. When technicians fail to update documentation, future teams may waste time resolving issues that have already been addressed. Proper documentation fosters collaboration and continuous improvement. Best practices emphasize knowledge sharing to enhance operational procedures.

Question

A company introduces a new process for documenting system changes, requiring approval before modifications are applied. Some technicians bypass the process to expedite deployments. What risk does this pose to operational procedures?

A. Faster deployments improve system reliability
B. Unauthorized changes may introduce instability and compliance issues
C. Documentation is only necessary for major changes
D. Approval processes are optional in agile environments

Correct Answer: B

Explanation:
Bypassing documentation and approval processes increases the risk of unauthorized changes and system instability. Operational procedures exist to ensure changes are controlled and documented, reducing the likelihood of errors. Compliance requirements often mandate proper recordkeeping and approvals. Adhering to best practices supports system reliability and organizational accountability.

Question

A technician updates system documentation after resolving an incident but omits details about the root cause. Later, a similar issue occurs, and the team cannot determine whether it is related to the previous incident. Which documentation best practice was not followed?

A. Recording user feedback
B. Documenting root cause analysis
C. Limiting documentation to resolution steps
D. Storing records in multiple locations

Correct Answer: B

Explanation:

Why ‘B’ is the correct answer of this CompTIA A+ core 2 practice test question? Let’s find out. Root cause analysis is a critical component of operational documentation. It helps teams understand why issues occur and implement preventive measures. Omitting root cause details reduces the value of documentation and hinders future troubleshooting. Best practices emphasize comprehensive records that include analysis and lessons learned to improve system reliability and operational procedures.


What’s Next?

Get Your ComPTIA A+ Practice Test Questions in PDF Now

comptia a practice questions