CompTIA - Big Savings Alert – Don’t Miss This Deal - Ends In 1d 00h 00m 00s Coupon code: 26Y30OFF
  1. Home
  2. CompTIA
  3. 220-1202 Exam
  4. Free 220-1202 Questions

Free Practice Questions for CompTIA 220-1202 Exam

Pass4Future also provide interactive practice exam software for preparing CompTIA A+ Certification Exam: Core 2 (220-1202) Exam effectively. You are welcome to explore sample free CompTIA 220-1202 Exam questions below and also try CompTIA 220-1202 Exam practice test software.

Page:    1 / 14   
Total 301 questions

Question 1

A user recently installed an application that accesses a database from a local server. When launching the application, it does not populate any information. Which of the following command-line tools is the best to troubleshoot the issue?



Answer : C

netstat reveals active network connections and listening ports on the local machine. By using it, you can confirm that the application has successfully opened (or attempted) a connection to the database server's port, verify the remote server's address and port, and detect any failed or hanging TCP sessions that would prevent data retrieval.


Question 2

A technician needs to map a shared drive from a command-line interface. Which of the following commands should the technician use?



Answer : C

The Windows net use command is used to connect, remove, and configure connections to shared network resources. To map a shared drive from the CLI, you'd run a command like:

net use Z: \\ServerName\ShareName

This assigns the shared folder to drive letter Z:.


Question 3

Which of the following is the best way to distribute custom images to 800 devices that include four device vendor classes with two types of user groups?



Answer : D

A network-based remote installation tool (such as Windows Deployment Services, MDT, or a similar solution) scales efficiently across hundreds of devices with varying hardware and user configurations. It allows you to segment deployments by vendor classes and user groups, automate imaging processes, and manage version control centrally - far more effectively than one-to-one cloning or file-copy methods.


Question 4

Which of the following types of social engineering attacks sends an unsolicited text message to a user's mobile device?



Answer : D

Smishing is the act of sending fraudulent messages via SMS or other texting platforms to trick users into revealing sensitive information or clicking malicious links. This distinguishes it from phishing over email (spear phishing), voice calls (vishing), or in-person deception (impersonation).


Question 5

Which of the following is used in addition to a password to implement MFA?



Answer : A

Multi-factor authentication (MFA) combines at least two of the following factors: something you know (password), something you have (a phone-generated or SMS-delivered one-time code), and something you are (biometric). Sending a code to the user's phone provides a ''something you have'' factor in addition to the password.


Page:    1 / 14   
Total 301 questions