CompTIA 220-1202 Exam (page: 2)
CompTIA A+ Certification: Core 2
Updated on: 24-Mar-2026

Viewing Page 2 of 41

Which of the following is used to detect and record access to restricted areas?

  1. Bollards
  2. Video surveillance
  3. Badge readers
  4. Fence

Answer(s): C

Explanation:

Badge readers authenticate and log each entry attempt - recording who accessed (or tried to access) a secured area and when. This audit trail is essential for monitoring and reviewing access to restricted zones.



An administrator received an email stating that the OS they are currently supporting will no longer be issued security updates and patches.
Which of the following is most likely the reason the administrator received this message?

  1. Support from the computer's manufacturer is expiring.
  2. The OS will be considered end of life.
  3. The built-in security software is being removed from the next OS version.
  4. A new version of the OS will be released soon.

Answer(s): B

Explanation:

When an operating system reaches end of life (EOL), the vendor ceases issuing security updates and patches.
Administrators are notified so they can plan upgrades or migrations before support ends.



Which of the following is the best way to distribute custom images to 800 devices that include four device vendor classes with two types of user groups?

  1. Use xcopy to clone the hard drives from one to another.
  2. Use robocopy to move the files to each device.
  3. Use a local image deployment tool for each device.
  4. Use a network-based remote installation tool.

Answer(s): D

Explanation:

A network-based remote installation tool (such as Windows Deployment Services, MDT, or a similar solution) scales efficiently across hundreds of devices with varying hardware and user configurations. It allows you to segment deployments by vendor classes and user groups, automate imaging processes, and manage version control centrally - far more effectively than one-to-one cloning or file-copy methods.



Which of the following types of social engineering attacks sends an unsolicited text message to a user's mobile device?

  1. Impersonation
  2. Vishing
  3. Spear phishing
  4. Smishing

Answer(s): D

Explanation:

Smishing is the act of sending fraudulent messages via SMS or other texting platforms to trick users into revealing sensitive information or clicking malicious links. This distinguishes it from phishing over email (spear phishing), voice calls (vishing), or in-person deception (impersonation).



A user reports some single sign-on errors to a help desk technician. Currently, the user is able to sign in to the company's application portal but cannot access a specific SaaS-based tool.
Which of the following would the technician most likely suggest as a next step?

  1. Reenroll the user's mobile device to be used as an MFA token.
  2. Use a private browsing window to avoid local session conflicts.
  3. Bypass single sign-on by directly authenticating to the application.
  4. Reset the device being used to factory defaults.

Answer(s): B

Explanation:

Single sign-on issues that affect only a specific application often stem from stale or conflicting session data in the user's browser. Launching a private (incognito) window ensures a fresh session without cached cookies or tokens, which can resolve access to the SaaS tool without affecting other configurations.



A technician verifies that a malware incident occurred on some computers in a small office.
Which of the following should the technician do next?

  1. Quarantine the infected systems.
  2. Educate the end users.
  3. Disable System Restore.
  4. Update the anti-malware and scan the computers.

Answer(s): A

Explanation:

Once an incident is confirmed, the immediate priority is containment. Isolating (quarantining) the infected machines prevents the malware from spreading to other systems or exfiltrating data, enabling safe analysis and remediation.



Which of the following is a Linux command that is used for administrative purposes?

  1. runas
  2. cmcl
  3. net user
  4. su

Answer(s): D

Explanation:

The su (substitute user) command is a standard Linux utility that allows an administrator to assume another user's identity - most commonly switching to the root account for elevated privileges. It's an essential tool for administrative tasks on Unix and Linux systems.



A user recently installed an application that accesses a database from a local server.
When launching the application, it does not populate any information.
Which of the following command-line tools is the best to troubleshoot the issue?

  1. ipconfig
  2. nslookup
  3. netstat
  4. curl

Answer(s): C

Explanation:

netstat reveals active network connections and listening ports on the local machine. By using it, you can confirm that the application has successfully opened (or attempted) a connection to the database server's port, verify the remote server's address and port, and detect any failed or hanging TCP sessions that would prevent data retrieval.



Viewing Page 2 of 41



Share your comments for CompTIA 220-1202 exam with other users:

Doc 10/29/2023 9:36:00 PM

question: a user wants to start a recruiting posting job posting. what must occur before the posting process can begin? 3 ans: comment- option e is incorrect reason: as part of enablement steps, sap recommends that to be able to post jobs to a job board, a user need to have the correct permission and secondly, be associated with one posting profile at minimum
UNITED KINGDOM


It‘s not A 9/17/2023 5:31:00 PM

answer to question 72 is d [sys_user_role]
Anonymous


indira m 8/14/2023 12:15:00 PM

please provide the pdf
UNITED STATES


ribrahim 8/1/2023 6:05:00 AM

hey guys, just to let you all know that i cleared my 312-38 today within 1 hr with 100 questions and passed. thank you so much brain-dumps.net all the questions that ive studied in this dump came out exactly the same word for word "verbatim". you rock brain-dumps.net!!! section name total score gained score network perimeter protection 16 11 incident response 10 8 enterprise virtual, cloud, and wireless network protection 12 8 application and data protection 13 10 network défense management 10 9 endpoint protection 15 12 incident d
SINGAPORE


Andrew 8/23/2023 6:02:00 PM

very helpful
Anonymous


latha 9/7/2023 8:14:00 AM

useful questions
GERMANY


ibrahim 11/9/2023 7:57:00 AM

page :20 https://exam-dumps.com/snowflake/free-cof-c02-braindumps.html?p=20#collapse_453 q 74: true or false: pipes can be suspended and resumed. true. desc.: pausing or resuming pipes in addition to the pipe owner, a role that has the following minimum permissions can pause or resume the pipe https://docs.snowflake.com/en/user-guide/data-load-snowpipe-intro
FINLAND


Franklin Allagoa 7/5/2023 5:16:00 AM

i want hcia exam dumps
Anonymous


SSA 12/24/2023 1:18:00 PM

good training
Anonymous


BK 8/11/2023 12:23:00 PM

very useful
INDIA


Deepika Narayanan 7/13/2023 11:05:00 PM

yes need this exam dumps
Anonymous


Blessious Phiri 8/15/2023 3:31:00 PM

these questions are a great eye opener
Anonymous


Jagdesh 9/8/2023 8:17:00 AM

thank you for providing these questions and answers. they helped me pass my exam. you guys are great.
CANADA


TS 7/18/2023 3:32:00 PM

good knowledge
Anonymous


Asad Khan 11/1/2023 2:44:00 AM

answer 10 should be a because only a new project will be created & the organization is the same.
Anonymous


Raj 9/12/2023 3:49:00 PM

can you please upload the dump again
UNITED STATES


Christian Klein 6/23/2023 1:32:00 PM

is it legit questions from sap certifications ?
UNITED STATES


anonymous 1/12/2024 3:34:00 PM

question 16 should be b (changing the connector settings on the monitor) pc and monitor were powered on. the lights on the pc are on indicating power. the monitor is showing an error text indicating that it is receiving power too. this is a clear sign of having the wrong input selected on the monitor. thus, the "connector setting" needs to be switched from hdmi to display port on the monitor so it receives the signal from the pc, or the other way around (display port to hdmi).
UNITED STATES


NSPK 1/18/2024 10:26:00 AM

q 10. ans is d (in the target org: open deployment settings, click edit next to the source org. select allow inbound changes and save
Anonymous


mohamed abdo 9/1/2023 4:59:00 AM

very useful
Anonymous


Tom 3/18/2022 8:00:00 PM

i purchased this exam dumps from another website with way more questions but they were all invalid and outdate. this exam dumps was right to the point and all from recent exam. it was a hard pass.
UNITED KINGDOM


Edrick GOP 10/24/2023 6:00:00 AM

it was a good experience and i got 90% in the 200-901 exam.
Anonymous


anonymous 8/10/2023 2:28:00 AM

hi please upload this
Anonymous


Bakir 7/6/2023 7:24:00 AM

please upload it
UNITED KINGDOM


Aman 6/18/2023 1:27:00 PM

really need this dump. can you please help.
UNITED KINGDOM


Neela Para 1/8/2024 6:39:00 PM

really good and covers many areas explaining the answer.
NEW ZEALAND


Karan Patel 8/15/2023 12:51:00 AM

yes, can you please upload the exam?
UNITED STATES


NISHAD 11/7/2023 11:28:00 AM

how many questions are there in these dumps?
UNITED STATES


Pankaj 7/3/2023 3:57:00 AM

hi team, please upload this , i need it.
UNITED STATES


DN 9/4/2023 11:19:00 PM

question 14 - run terraform import: this is the recommended best practice for bringing manually created or destroyed resources under terraform management. you use terraform import to associate an existing resource with a terraform resource configuration. this ensures that terraform is aware of the resource, and you can subsequently manage it with terraform.
Anonymous


Zhiguang 8/19/2023 11:37:00 PM

please upload dump. thanks in advance.
Anonymous


deedee 12/23/2023 5:51:00 PM

great great
UNITED STATES


Asad Khan 11/1/2023 3:10:00 AM

answer 16 should be b your organizational policies require you to use virtual machines directly
Anonymous


Sale Danasabe 10/24/2023 5:21:00 PM

the question are kind of tricky of you didnt get the hnag on it.
Anonymous