comptia 220-1202 Exam Questions

Questions for the 220-1202 were updated on : Nov 23 ,2025

Page 1 out of 11. Viewing questions 1-15 out of 157

Question 1

Why would a network engineering team provide a help desk technician with IP addresses for a wired
network segment?

  • A. Only specific DNS servers are allowed outbound.
  • B. The network allow list is set to a specific address.
  • C. DHCP is not enabled for this subnet.
  • D. NAC servers only allow security updates to be installed.
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
When DHCP isn’t enabled, static IPs must be assigned manually, so the engineering team provides
the IP details.
From Travis Everett – All-in-One Exam Guide:
“If DHCP is unavailable, technicians need the static IP configuration to connect devices to the
network.” .

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

An organization sees unauthorized apps installed and licensing prompts. What should the security
team do?

  • A. Deploy an internal PKI to filter encrypted web traffic.
  • B. Remove users from the local admin group.
  • C. Implement stronger controls to block suspicious websites.
  • D. Enable stricter UAC settings on Windows.
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
Removing users from the local admin group prevents them from installing unauthorized software.
From Quentin Docter – Complete Study Guide:
“Local admin privileges allow users to install unauthorized apps. Removing them from this group
restricts installations and helps prevent malware.” .

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

An administrator is investigating a zero-day vulnerability. If left unpatched, it could severely impact
business. The patch requires downtime. What should the administrator do?

  • A. Create a standard change request.
  • B. Implement an emergency change.
  • C. Immediately freeze all changes.
  • D. Continue operations until the next change interval.
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
A zero-day vulnerability demands an emergency change to quickly secure the system, even if
downtime is needed.
From Mike Meyers' Lab Manual:
“Emergency changes bypass standard scheduling to quickly address critical vulnerabilities that pose
immediate risks.” .

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

Multiple users clicked a phishing link from a compromised email account. The security team isolates
and removes the threat. Then, the management team provides security awareness training to the
company. What step is this?

  • A. Provide user education.
  • B. Compile lessons learned.
  • C. Update the antivirus software.
  • D. Perform additional scans.
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
This is part of the user education step after a security incident to prevent future occurrences.
From Quentin Docter – Complete Study Guide:
“User education and awareness is a crucial part of preventing phishing attacks. After an incident, it is
vital to train users on recognizing suspicious messages.” .

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

An administrator must rename the administrator account on a Windows desktop. Which tool is best
for this?

  • A. lusrmgr.msc
  • B. devmgmt.msc
  • C. gpedit.msc
  • D. eventvwr.msc
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The Local Users and Groups Manager (lusrmgr.msc) is the utility for managing user accounts,
including renaming the default Administrator.
From Quentin Docter – Complete Study Guide:
“The lusrmgr.msc snap-in allows renaming and managing local user accounts, including the default
administrator.” .

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

A help desk technician recently installed an SSH client on a workstation in order to access remote
servers. What does this enable?

  • A. To utilize an SSO connection
  • B. To securely establish a console session
  • C. To encrypt and decrypt protected messages
  • D. To facilitate device log reviews
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
SSH (Secure Shell) allows encrypted console sessions to access and administer remote servers.
From Quentin Docter – Complete Study Guide:
“Secure Shell (SSH) provides an encrypted console session to manage Linux, UNIX, or network
devices securely over TCP port 22.” .

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

A user reports that the time on their computer does not match the time on their VoIP phone. What
should a technician do?

  • A. Confirm the user is logging in to the domain.
  • B. Manually set the time on the phone to match the computer.
  • C. Download and install the latest BIOS update.
  • D. Configure access to an available NTP server.
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
This scenario involves a mismatch in device time settings, which can affect synchronization and
authentication across the network. Using a Network Time Protocol (NTP) server ensures all
networked devices maintain accurate and synchronized clocks.
From Travis Everett – All-in-One Exam Guide:
“NTP servers keep all devices on a network in sync. This prevents time drift, which can cause
authentication issues with domain logins, certificates, and applications.” .

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

A technician is securing a newly deployed workstation. Only authorized users should access it. Which
actions should the technician take? (Select two)

  • A. Defragment the hard drive
  • B. Enable SSH
  • C. Enable screensaver locks
  • D. Disable iCloud integration
  • E. Enable the firewall
  • F. Apply the BIOS password
Answer:

C,F

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
F
50%

Explanation:
Screensaver lockshelp protect unattended workstations.
BIOS passwordsprevent unauthorized changes at startup or during boot.
FromQUENTIN DOCTER - COMPTIA A+ COMPLETE study GUIDE:
“Applying a BIOS password adds a pre-boot security layer. Screensaver locks help protect logged-in
sessions during idle times.”

Discussions
vote your answer:
A
B
C
D
E
F
0 / 1000

Question 9

What is found in an MSDS (Material Safety Data Sheet) for a battery backup?

  • A. Installation instructions
  • B. Emergency procedures
  • C. Configuration steps
  • D. Voltage
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
An MSDS providessafety and emergency procedures, such as what to do if a battery leaks or catches
fire. It is not a technical or setup guide.
FromTravis Everett – CompTIA A+ All-in-One Exam Guide:
“An MSDS contains safety information, including handling, storage, and emergency procedures
related to potentially hazardous components like UPS batteries.”

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

A technician follows proper malware removal procedures but cannot remove all malware. They
decide to reload the OS. What should they select?

  • A. Version upgrade
  • B. System restore
  • C. OS repair
  • D. Clean install
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
Aclean installensures all malware is eliminated by completely wiping and reinstalling the OS. System
restore or repair may leave traces.
FromQUENTIN DOCTER - COMPTIA A+ COMPLETE study GUIDE:
“If malware cannot be completely removed, perform a clean installation of the operating system.
This ensures no remnants remain on the machine.”

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

A town clerk wants to work from home and access documents on a town hall server. What should a
technician set up?

  • A. VNC
  • B. RDP
  • C. VPN
  • D. SSH
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
AVPN (Virtual Private Network)creates a secure tunnel between the clerk’s home device and the
town server, ensuring private and authenticated access.
FromQuentin Docter – CompTIA A+ Complete Study Guide:
“VPNs are essential for remote access to internal resources, providing secure connections over public
networks.”

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

A technician needs to download and install a new web browser on a desktop. Which attribute should
be used to verify the installer's authenticity?

  • A. Date
  • B. Hash
  • C. Size
  • D. Name
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
Hash values(like SHA256) are published by vendors to verify file integrity. A match confirms the file
hasn’t been tampered with.
FromTravis Everett – CompTIA A+ All-in-One Exam Guide:
“Use hash values to ensure downloaded software matches the vendor’s published version and hasn't
been modified.”

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

A technician uses AI to draft a document about new software benefits. Upon reading, the technician
sees factually incorrect info. What term best describes this?

  • A. Data privacy
  • B. Hallucinations
  • C. Appropriate use
  • D. Plagiarism
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
In AI terminology,hallucinationrefers to generated output that appears plausible but is factually
incorrect.
FromQuentin Docter – CompTIA A+ Complete Study Guide:
“AI hallucination describes output that is fluent and coherent but includes information that is entirely
fabricated or inaccurate.”

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

A desktop technician is mapping a remote Windows share \\WinNAS\shared as local drive Z:. Which
command should the technician run?

  • A. nslookup -opt 3: \WinNAS\shared
  • B. net use 3: \WinNAS\shared
  • C. chkdsk /R 2: \WinNAS\shared
  • D. sfc /offwindir 3: \WinNAS\shared
Answer:

A,B,C,D

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The correct syntax for mapping a network drive in Windows is:
net use Z: \\WinNAS\shared
This command connects the specified network share and maps it as drive Z:.
FromTravis Everett – CompTIA A+ All-in-One Exam Guide:
“Use net use followed by the desired drive letter and the UNC path to map network shares.”

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

A user is unable to use the latest version of an app on a legacy tablet. What is the most likely reason?

  • A. The OS is end-of-life
  • B. Space is inadequate
  • C. MDM is blocking updates
  • D. The tablet is infected with malware
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
Older tablets may not support newer app versions due toincompatible or unsupported operating
systems. App developers often drop support for outdated OS versions.
FromTravis Everett – CompTIA A+ All-in-One Exam Guide:
“When an app won't install on an older device, check the OS version. Most apps require a minimum
OS level for compatibility and security.”

Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2