CompTIA 220-1202 Exam (page: 6)
CompTIA A+ Certification: Core 2
Updated on: 24-Mar-2026

Viewing Page 6 of 41

Which of the following is used in addition to a password to implement MFA?

  1. Sending a code to the user's phone
  2. Verifying the user's date of birth
  3. Prompting the user to solve a simple math problem
  4. Requiring the user to enter a PIN

Answer(s): A

Explanation:

Multi-factor authentication (MFA) combines at least two of the following factors: something you know (password), something you have (a phone-generated or SMS-delivered one-time code), and something you are (biometric). Sending a code to the user's phone provides a "something you have" factor in addition to the password.



A technician is preparing to replace the batteries in rack-mounted UPS system. After ensuring the power is turned off and the batteries are fully discharged, the technician needs to remove the battery modules from the bottom of the rack.
Which of the following steps should the technician take?

  1. Ensure the fire suppression system is ready to be activated.
  2. Use appropriate lifting techniques and guidelines.
  3. Place the removed batteries in an antistatic bag.
  4. Wear a face mask to filter out any harmful fumes.

Answer(s): B

Explanation:

UPS battery modules are heavy and awkward; employing proper lifting techniques (e.g., lifting with the legs, keeping the back straight, and using team lifts or mechanical aids as necessary) prevents musculoskeletal injuries and ensures safe removal.



A technician is setting up a surveillance system for a customer. The customer wants access to the system's web interface on the LAN via the system's IP address.
Which of the following should the technician use to prevent external log-in attempts from the internet?

  1. Port mapping
  2. Subnetting
  3. Static IP
  4. Content filtering

Answer(s): A

Explanation:

By using port mapping (NAT) rules on the router, you can choose to forward the surveillance system's HTTP/ HTTPS ports only on the LAN interface and leave them closed on the WAN side. This ensures users on the local subnet can access the camera interface via its IP address, while external login attempts from the internet are blocked.



A technician needs to configure laptops so that only administrators can enable virtualization technology if needed.
Which of the following should the technician configure?

  1. BIOS password
  2. Guest account
  3. Screen lock
  4. AutoRun setting

Answer(s): A

Explanation:

Setting a BIOS (or UEFI) supervisor password restricts access to firmware settings, including enabling or disabling virtualization technology. Only those with the password - presumably administrators - can enter the BIOS setup and make that change.



Which of the following file types would a desktop support technician most likely use to automate tasks for a Windows user log-in?

  1. .bat
  2. .sh
  3. .py
  4. .js

Answer(s): A

Explanation:

Batch files (.bat) are classic Windows script files that execute a series of command-line instructions. They can be linked to user logon events via Group Policy or the Startup folder to automate tasks (like mapping drives or launching applications) when a user signs in.



A technician uses AI to draft a proposal about the benefits of new software.
When reading the draft, the technician notices that the draft contains factually incorrect information.
Which of the following best describes this scenario?

  1. Data privacy
  2. Hallucinations
  3. Appropriate use
  4. Plagiarism

Answer(s): B

Explanation:

When an AI model generates plausible-sounding but factually inaccurate or fabricated information, it's referred to as a "hallucination." Identifying and correcting these errors is essential to ensure the accuracy and reliability of AI-assisted content.



Which of the following describes an attack in which an attacker sets up a rogue AP that tricks users into connecting to the rogue AP instead of the legitimate network?

  1. Stalkerware
  2. Evil twin
  3. Tailgating
  4. Shoulder surfing

Answer(s): B

Explanation:

An evil twin attack involves an adversary configuring a rogue wireless access point with the same SSID and similar settings as a legitimate network. Unsuspecting users connect to this rogue AP, allowing the attacker to intercept traffic, capture credentials, and launch further attacks.



A user is experiencing issues with outdated images while browsing websites.
Which of the following settings should a technician use to correct this issue?

  1. Administrative Tools
  2. Windows Defender Firewall
  3. Internet Options
  4. Ease of Access

Answer(s): C

Explanation:

In Internet Options (under the Browsing History Settings), you can configure how often the browser checks for newer versions of stored pages and content. Adjusting the "Check for newer versions of stored pages" setting forces the browser to retrieve up-to-date images rather than using cached copies.



Viewing Page 6 of 41



Share your comments for CompTIA 220-1202 exam with other users:

Godmode 5/7/2023 10:52:00 AM

yes.
NETHERLANDS


Bhuddhiman 7/30/2023 1:18:00 AM

good mateial
Anonymous


KJ 11/17/2023 3:50:00 PM

good practice exam
Anonymous


sowm 10/29/2023 2:44:00 PM

impressivre qustion
Anonymous


CW 7/6/2023 7:06:00 PM

questions seem helpful
Anonymous


luke 9/26/2023 10:52:00 AM

good content
Anonymous


zazza 6/16/2023 9:08:00 AM

question 21 answer is alerts
ITALY


Abwoch Peter 7/4/2023 3:08:00 AM

am preparing for exam
Anonymous


mohamed 9/12/2023 5:26:00 AM

good one thanks
EGYPT


Mfc 10/23/2023 3:35:00 PM

only got thru 5 questions, need more to evaluate
Anonymous


Whizzle 7/24/2023 6:19:00 AM

q26 should be b
Anonymous


sarra 1/17/2024 3:44:00 AM

the aaa triad in information security is authentication, accounting and authorisation so the answer should be d 1, 3 and 5.
UNITED KINGDOM


DBS 5/14/2023 12:56:00 PM

need to attend this
UNITED STATES


Da_costa 8/1/2023 5:28:00 PM

these are free brain dumps i understand, how can one get free pdf
Anonymous


vikas 10/28/2023 6:57:00 AM

provide access
EUROPEAN UNION


Abdullah 9/29/2023 2:06:00 AM

good morning
Anonymous


Raj 6/26/2023 3:12:00 PM

please upload the ncp-mci 6.5 dumps, really need to practice this one. thanks guys
Anonymous


Miguel 10/5/2023 12:21:00 PM

question 16: https://help.salesforce.com/s/articleview?id=sf.care_console_overview.htm&type=5
SPAIN


Hiren Ladva 7/8/2023 10:34:00 PM

yes i m prepared exam
Anonymous


oliverjames 10/24/2023 5:37:00 AM

my experience was great with this site as i studied for the ms-900 from here and got 900/1000 on the test. my main focus was on the tutorials which were provided and practice questions. thanks!
GERMANY


Bhuddhiman 7/20/2023 11:52:00 AM

great course
UNITED STATES


Anuj 1/14/2024 4:07:00 PM

very good question
Anonymous


Saravana Kumar TS 12/8/2023 9:49:00 AM

question: 93 which statement is true regarding the result? sales contain 6 columns and values contain 7 columns so c is not right answer.
INDIA


Lue 3/30/2023 11:43:00 PM

highly recommend just passed my exam.
CANADA


DC 1/7/2024 10:17:00 AM

great practice! thanks
UNITED STATES


Anonymus 11/9/2023 5:41:00 AM

anyone who wrote this exam recently?
SOUTH AFRICA


Khalid Javid 11/17/2023 3:46:00 PM

kindly share the dump
Anonymous


Na 8/9/2023 8:39:00 AM

could you please upload cfe fraud prevention and deterrence questions? it will be very much helpful.
Anonymous


shime 10/23/2023 10:03:00 AM

this is really very very helpful for mcd level 1
ETHIOPIA


Vnu 6/3/2023 2:39:00 AM

very helpful!
Anonymous


Steve 8/17/2023 2:19:00 PM

question #18s answer should be a, not d. this should be corrected. it should be minvalidityperiod
CANADA


RITEISH 12/24/2023 4:33:00 AM

thanks for the exact solution
Anonymous


SB 10/15/2023 7:58:00 AM

need to refer the questions and have to give the exam
INDIA


Mike Derfalem 7/16/2023 7:59:00 PM

i need it right now if it was possible please
Anonymous