Questions for the 220-1202 were updated on : Nov 23 ,2025
Why would a network engineering team provide a help desk technician with IP addresses for a wired
network segment?
C
Explanation:
When DHCP isn’t enabled, static IPs must be assigned manually, so the engineering team provides
the IP details.
From Travis Everett – All-in-One Exam Guide:
“If DHCP is unavailable, technicians need the static IP configuration to connect devices to the
network.” .
An organization sees unauthorized apps installed and licensing prompts. What should the security
team do?
B
Explanation:
Removing users from the local admin group prevents them from installing unauthorized software.
From Quentin Docter – Complete Study Guide:
“Local admin privileges allow users to install unauthorized apps. Removing them from this group
restricts installations and helps prevent malware.” .
An administrator is investigating a zero-day vulnerability. If left unpatched, it could severely impact
business. The patch requires downtime. What should the administrator do?
B
Explanation:
A zero-day vulnerability demands an emergency change to quickly secure the system, even if
downtime is needed.
From Mike Meyers' Lab Manual:
“Emergency changes bypass standard scheduling to quickly address critical vulnerabilities that pose
immediate risks.” .
Multiple users clicked a phishing link from a compromised email account. The security team isolates
and removes the threat. Then, the management team provides security awareness training to the
company. What step is this?
A
Explanation:
This is part of the user education step after a security incident to prevent future occurrences.
From Quentin Docter – Complete Study Guide:
“User education and awareness is a crucial part of preventing phishing attacks. After an incident, it is
vital to train users on recognizing suspicious messages.” .
An administrator must rename the administrator account on a Windows desktop. Which tool is best
for this?
A
Explanation:
The Local Users and Groups Manager (lusrmgr.msc) is the utility for managing user accounts,
including renaming the default Administrator.
From Quentin Docter – Complete Study Guide:
“The lusrmgr.msc snap-in allows renaming and managing local user accounts, including the default
administrator.” .
A help desk technician recently installed an SSH client on a workstation in order to access remote
servers. What does this enable?
B
Explanation:
SSH (Secure Shell) allows encrypted console sessions to access and administer remote servers.
From Quentin Docter – Complete Study Guide:
“Secure Shell (SSH) provides an encrypted console session to manage Linux, UNIX, or network
devices securely over TCP port 22.” .
A user reports that the time on their computer does not match the time on their VoIP phone. What
should a technician do?
D
Explanation:
This scenario involves a mismatch in device time settings, which can affect synchronization and
authentication across the network. Using a Network Time Protocol (NTP) server ensures all
networked devices maintain accurate and synchronized clocks.
From Travis Everett – All-in-One Exam Guide:
“NTP servers keep all devices on a network in sync. This prevents time drift, which can cause
authentication issues with domain logins, certificates, and applications.” .
A technician is securing a newly deployed workstation. Only authorized users should access it. Which
actions should the technician take? (Select two)
C,F
Explanation:
Screensaver lockshelp protect unattended workstations.
BIOS passwordsprevent unauthorized changes at startup or during boot.
FromQUENTIN DOCTER - COMPTIA A+ COMPLETE study GUIDE:
“Applying a BIOS password adds a pre-boot security layer. Screensaver locks help protect logged-in
sessions during idle times.”
What is found in an MSDS (Material Safety Data Sheet) for a battery backup?
B
Explanation:
An MSDS providessafety and emergency procedures, such as what to do if a battery leaks or catches
fire. It is not a technical or setup guide.
FromTravis Everett – CompTIA A+ All-in-One Exam Guide:
“An MSDS contains safety information, including handling, storage, and emergency procedures
related to potentially hazardous components like UPS batteries.”
A technician follows proper malware removal procedures but cannot remove all malware. They
decide to reload the OS. What should they select?
D
Explanation:
Aclean installensures all malware is eliminated by completely wiping and reinstalling the OS. System
restore or repair may leave traces.
FromQUENTIN DOCTER - COMPTIA A+ COMPLETE study GUIDE:
“If malware cannot be completely removed, perform a clean installation of the operating system.
This ensures no remnants remain on the machine.”
A town clerk wants to work from home and access documents on a town hall server. What should a
technician set up?
C
Explanation:
AVPN (Virtual Private Network)creates a secure tunnel between the clerk’s home device and the
town server, ensuring private and authenticated access.
FromQuentin Docter – CompTIA A+ Complete Study Guide:
“VPNs are essential for remote access to internal resources, providing secure connections over public
networks.”
A technician needs to download and install a new web browser on a desktop. Which attribute should
be used to verify the installer's authenticity?
B
Explanation:
Hash values(like SHA256) are published by vendors to verify file integrity. A match confirms the file
hasn’t been tampered with.
FromTravis Everett – CompTIA A+ All-in-One Exam Guide:
“Use hash values to ensure downloaded software matches the vendor’s published version and hasn't
been modified.”
A technician uses AI to draft a document about new software benefits. Upon reading, the technician
sees factually incorrect info. What term best describes this?
B
Explanation:
In AI terminology,hallucinationrefers to generated output that appears plausible but is factually
incorrect.
FromQuentin Docter – CompTIA A+ Complete Study Guide:
“AI hallucination describes output that is fluent and coherent but includes information that is entirely
fabricated or inaccurate.”
A desktop technician is mapping a remote Windows share \\WinNAS\shared as local drive Z:. Which
command should the technician run?
A,B,C,D
Explanation:
The correct syntax for mapping a network drive in Windows is:
net use Z: \\WinNAS\shared
This command connects the specified network share and maps it as drive Z:.
FromTravis Everett – CompTIA A+ All-in-One Exam Guide:
“Use net use followed by the desired drive letter and the UNC path to map network shares.”
A user is unable to use the latest version of an app on a legacy tablet. What is the most likely reason?
A
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
Older tablets may not support newer app versions due toincompatible or unsupported operating
systems. App developers often drop support for outdated OS versions.
FromTravis Everett – CompTIA A+ All-in-One Exam Guide:
“When an app won't install on an older device, check the OS version. Most apps require a minimum
OS level for compatibility and security.”