CompTIA 220-1202 Practice Test

Prepare smarter and boost your chances of success with our CompTIA 220-1202 Practice test. This test helps you assess your knowledge, pinpoint strengths, and target areas for improvement. Surveys and user data from multiple platforms show that individuals who use 220-1202 practice exam are 40–50% more likely to pass on their first attempt.

Start practicing today and take the fast track to becoming CompTIA 220-1202 certified.

11560 already prepared
Updated On : 13-Aug-2025
156 Questions
4.8/5.0

Page 5 out of 16 Pages

After installing new webcam software, a PC experiences BSOD during videoconference calls. What should the technician do next?

A. Update the anti-malware signature and scan the system

B. File a warranty claim with the manufacturer

C. Start in Safe Mode and roll back the device driver

D. Reconnect the webcam to the computer

C.   Start in Safe Mode and roll back the device driver

Explanation:

A Blue Screen of Death (BSOD) typically signals a severe issue, often caused by faulty drivers or hardware conflicts. In this scenario, the PC crashes only during videoconference calls, which heavily use the webcam and its driver.

Since the BSOD started right after installing new webcam software, it strongly suggests the new driver or software is unstable or incompatible.

Best next step:

Boot into Safe Mode.
Safe Mode loads Windows with minimal drivers, helping avoid the crash while troubleshooting.

Roll back the driver.
Windows allows you to revert to the previous driver version, restoring the system to the last known working state.

This approach directly addresses the suspected cause and is far safer and faster than more drastic measures.

Why the others are incorrect:

A. Update anti-malware signature and scan the system
Malware could cause crashes, but the problem is clearly linked to installing new webcam software.

B. File a warranty claim with the manufacturer
There’s no evidence of hardware failure yet—it’s likely a driver problem.

D. Reconnect the webcam to the computer
Simply unplugging and replugging the device won’t fix a faulty driver causing a BSOD.

Reference:
CompTIA A+ Core 2 (220-1102) Objective 1.5: “Given a scenario, use troubleshooting tools.”
Microsoft Docs – Roll back a device driver in Windows

Which of the following are system folders on macOS? (Select two)

A. Applications

B. Spotlight

C. Time Machine

D. Library

E. FileVault

F. iCloud

A.   Applications
D.   Library

Explanation:

A. Applications
This is a system folder in macOS that stores all installed apps. You’ll find it in the root of the Macintosh HD or in each user’s home directory. It’s a core part of how macOS organizes software.

D. Library
The Library folder contains system resources, preferences, fonts, support files, and frameworks used by macOS and applications. There are actually multiple Library folders:
1. One at the system root (for global settings)
2. One in each user’s home directory (user-specific settings)
3. One in the System folder for macOS system files

Both folders are essential for macOS to operate properly and are considered system folders.

Why the others are incorrect:

B. Spotlight → A search feature, not a folder.

C. Time Machine → A backup utility and destination, not a folder in the OS structure.

E. FileVault → A disk encryption feature, not a folder.

F. iCloud → A cloud service, not a local system folder.

Reference:

CompTIA A+ Core 2 (220-1102) Objective 1.9: “Given a scenario, configure and use macOS and Linux client/desktop operating systems.”
Apple Support Docs – macOS file system structure

A Windows 11 Home device is receiving constant pop-ups about an urgent need to update antivirus software in order to remove a detected threat. The user has been clicking the "X" button but the window keeps reappearing. The pop-up includes an "OK" button to install the update. What should the user do next?

A. Click the "OK" button to install the update

B. Reinstall the Windows Operating System

C. Run System File Checker

D. Verify the current status and settings of protection measures

D.   Verify the current status and settings of protection measures

Explanation:

Pop-ups urging users to urgently update antivirus software are a common tactic used in scareware or phishing attacks. Clicking “OK” could install malware or redirect the user to malicious websites.

The fact that the pop-up keeps reappearing—even when the user clicks the “X”—strongly suggests it’s not a legitimate Windows or antivirus alert. Instead, it might be caused by a malicious process, browser hijacker, or adware running on the system.

The safest next step:

Check the current security software.
1. Open Windows Security (or any installed antivirus) and verify whether there are real alerts about infections or outdated definitions.
2. Update antivirus signatures directly through the software interface—not by clicking suspicious pop-ups.

Run a full malware scan to detect and remove potential threats causing these pop-ups.

This approach avoids falling victim to the scam and ensures the system’s security posture is intact.

Why the others are incorrect:

A. Click the "OK" button to install the update → Dangerous! This could install malware.

B. Reinstall the Windows Operating System → Extreme measure; not the first troubleshooting step.

C. Run System File Checker → Useful for repairing Windows files, but it doesn’t address malicious pop-ups or verify antivirus status directly.

A technician is 3-D printing high-strength, carbon fiber-based filament parts for a customer order. Which of the following is the most important for the technician to use?

A. Steel-toed boots

B. Air filter mask

C. ESD mat

D. Antistatic bags

B.   Air filter mask

Explanation:

When 3-D printing with high-strength carbon fiber-based filaments, the printing process involves heating thermoplastics mixed with fine carbon fibers. This heating releases ultrafine particles and potentially harmful fumes into the air.

Inhalation hazards include:
1. Tiny carbon fiber dust particles that can irritate the lungs
2. Volatile organic compounds (VOCs) released by melting plastic materials
3. Microscopic particles that may remain suspended in the air

An air filter mask (respirator) is critical because it protects the technician from inhaling these airborne contaminants, ensuring health and safety during the printing process.

Why the others are incorrect:

A. Steel-toed boots → Useful for physical protection, but not critical for airborne hazards associated with 3-D printing.

C. ESD mat → Relevant for electronics work, but not for protecting a technician from printing fumes or particles.

D. Antistatic bags → Used for storing electronic components, unrelated to 3-D printing health hazards.

Reference:
CompTIA A+ Core 2 (220-1102) Objective 3.5: “Given a scenario, apply environmental impacts and safety procedures.”
OSHA and NIOSH guidelines on 3-D printing emissions

A user wants to dispose of a failed hard drive in a way that ensures the data is unrecoverable. Which of the following is the best at-home method?

A. Standard formatting

B. Low-level formatting

C. Shredding

D. Degaussing

E. Drilling

C.   Shredding

Explanation:

When a user needs to dispose of a failed hard drive and ensure that no data can ever be recovered, the safest approach is to physically destroy the drive.

Shredding is the best at-home method because it:
1. Cuts the drive into small fragments, making it impossible to reconstruct the platters or memory chips.
2. Eliminates the risk that specialized data recovery labs could extract residual data from intact pieces.
3. Works for both traditional hard drives and solid-state drives (SSDs).

Although industrial shredders designed for electronics are ideal, some commercial services or specialized equipment available for home use can handle small-scale shredding.

An end user wants to have a sales printer added to their computer. The printer is on the domain. Which of the following is the best method for the technician to add the printer?

A. Go to the print server and select the printer name

B. Connect the laptop to the printer via USB

C. Connect to the printer via Bluetooth

D. Go to Local Users and Groups to add the printer

A.   Go to the print server and select the printer name

Explanation:

✅ Correct Answer: A. Go to the print server and select the printer name
In a domain environment, printers are managed through a centralized print server, which allows users to easily locate and install network printers by browsing the list of shared devices on the server. This ensures that the proper drivers and configurations are automatically applied, maintaining consistency and reducing manual errors across the organization. It’s the most efficient and reliable method for adding a domain-connected printer because it integrates seamlessly with network permissions and policies.

❌ Why the other options are incorrect:

B. Connect the laptop to the printer via USB is only suitable for local, directly attached printers. It doesn’t apply to networked printers shared over a domain, and it would require manually installing drivers and managing individual connections, which is inefficient for a corporate environment.

C. Connect to the printer via Bluetooth is rarely used in enterprise environments because most business-class printers don’t rely on Bluetooth for shared network printing. It’s typically meant for quick, personal printing rather than domain-level printer access.

D. Go to Local Users and Groups to add the printer is incorrect because that tool is used for managing user and group accounts on a Windows system, not for adding or configuring printers. It has nothing to do with printer installation or network device management.

A company recently transitioned to a cloud-based productivity suite and wants to secure the environment from external threat actors. Which of the following is the most effective method?

A. Multifactor authentication

B. Encryption

C. Backups

D. Strong passwords

A.   Multifactor authentication

Explanation:

✅ Correct Answer: A. Multifactor authentication
When a company moves to a cloud-based productivity suite, its users and data become accessible over the internet, increasing the risk of external attacks such as credential theft and account compromise. Multifactor authentication (MFA) is the most effective way to secure this environment because it requires users to present at least two forms of verification—something they know (like a password) and something they have (like a smartphone app or hardware token). Even if an attacker steals a password, MFA prevents unauthorized access by requiring the second factor. This significantly reduces the risk of breaches and is considered one of the strongest defenses for cloud services.

❌ Why the other options are incorrect:

B. Encryption is crucial for protecting data privacy and ensuring that information remains secure during storage and transmission. However, encryption alone doesn’t stop attackers from logging into accounts if they have valid credentials.

C. Backups are essential for recovering data in case of accidental deletion, ransomware, or system failures, but they don’t prevent external threat actors from accessing cloud accounts in real time.

D. Strong passwords improve security, but many users still reuse or share them, and they can be stolen through phishing or malware. Strong passwords are helpful but insufficient on their own compared to the protection provided by MFA.

Various alerts on a user's Windows 11 laptop are continually interrupting videoconference calls. Which of the following should a support technician recommend to best solve the issue?

A. Use multiple sound output devices for the various source applications

B. Disable all notifications in different applications in the order they appear

C. Configure the Sounds option in Control Panel to be set to No Sounds

D. Set Windows Notifications settings to Do Not Disturb

D.   Set Windows Notifications settings to Do Not Disturb

Explanation:

Windows 11 includes a Do Not Disturb feature in its Notifications settings, allowing users to suppress notifications during certain activities, such as videoconferencing, presentations, or focused work sessions. This prevents pop-up alerts, sounds, and banners from interrupting calls, ensuring a smoother and more professional experience.

Rather than disabling notifications one by one in different apps (which is time-consuming and inconsistent), enabling Do Not Disturb centrally in Windows is the most efficient and reliable solution. Users can also schedule quiet times or let Windows automatically enable Do Not Disturb during screen sharing or presentations.

❌ Why the other options are incorrect:

A. Use multiple sound output devices for the various source applications → Splitting audio devices doesn’t prevent visual pop-ups or system notifications from interrupting video calls.

B. Disable all notifications in different applications in the order they appear → Very time-consuming and prone to missing some alerts. It’s not practical or efficient compared to a centralized setting.

C. Configure the Sounds option in Control Panel to be set to No Sounds → This only silences audio notifications. It doesn’t stop pop-up banners or visual interruptions during videoconferences.

A technician is preparing to replace the batteries in a rack-mounted UPS system. After ensuring the power is turned off and the batteries are fully discharged, the technician needs to remove the battery modules from the bottom of the rack. Which of the following steps should the technician take?

A. Ensure the fire suppression system is ready to be activated.

B. Use appropriate lifting techniques and guidelines.

C. Place the removed batteries in an antistatic bag.

D. Wear a face mask to filter out any harmful fumes.

B.   Use appropriate lifting techniques and guidelines.

Explanation:

When replacing batteries in a rack-mounted UPS system, safety is critical because UPS batteries are typically large, heavy, and awkward to handle. Using proper lifting techniques—such as lifting with the legs instead of the back, keeping the load close to the body, and asking for assistance when necessary—helps prevent muscle strains, back injuries, or accidents in the server room. Even though the technician has already ensured the power is off and the batteries are discharged, physically moving the battery modules remains a significant safety concern due to their weight.

❌ Why the other options are incorrect:

A. Ensure the fire suppression system is ready to be activated is a general facility safety measure but not specifically relevant to lifting or removing battery modules during maintenance.

C. Place the removed batteries in an antistatic bag is unnecessary because UPS batteries are not static-sensitive electronic components. They require safe handling and proper disposal procedures but not antistatic protection.

D. Wear a face mask to filter out any harmful fumes would only be necessary if the batteries were damaged and leaking. Under normal conditions, sealed UPS batteries do not emit fumes that require respiratory protection during removal.

A user frequently misplaces their Windows laptop and is concerned about it being stolen. The user would like additional security controls on their laptop. Which of the following is a built-in technology that a technician can use to enable full drive encryption?

A. Active Directory

B. New Technology File System

C. Encrypting File System

D. BitLocker

D.   BitLocker

Explanation:

✅ Correct Answer: D. BitLocker
For a user who frequently misplaces their Windows laptop and worries about theft, BitLocker is the built-in Windows technology designed specifically for full drive encryption. BitLocker encrypts the entire contents of the hard drive, ensuring that even if someone steals the laptop, they cannot access any data without proper authentication, such as a password, PIN, or recovery key. This protects sensitive information from unauthorized access and is an excellent security control for mobile users.

❌ Why the other options are incorrect:

A. Active Directory is a directory service for managing users, devices, and policies in a network environment but does not directly provide drive encryption.

B. New Technology File System (NTFS) is a file system format used for organizing and storing files on a drive, but it does not, by itself, provide full disk encryption.

C. Encrypting File System (EFS) allows users to encrypt individual files or folders on NTFS volumes, but it’s not designed for full disk encryption and doesn’t secure all data on the drive, especially system files or the operating system itself.

Page 5 out of 16 Pages
220-1202 Practice Test Previous