CompTIA A+ (Certification Exam 220-1102) | 50 Questions with Explanations | Core 2
Vložit
- čas přidán 25. 07. 2024
- CompTIA A+ (Core 2) Exam Practice Questions with Full explanation of every question and every answer. 220-1102 Exam Questions for the A+ 1100 series course.
Note: These are NOT the actual questions from the official exam. These are questions are custom made but they do however cover the same objectives and measure you on the same skills.
Using the actual questions from the exam to practice is against the vendor's terms and rules and should not be used.
==================================================
Study Material:
The Full A+ Video course can be found on my channel for completely free.
Both the full old 1000 and the full new 1100 series are on the channel. I recommend doing the 1100 series though since that is currently the latest version of A+ which was released in May 2022.
===================================================
Below you'll find time stamps for all 50 questions for your convenience in case you'd like to skip to certain questions to review them again or for whatever reason you might have:
01:24 Question 1
04:35 Question 2
07:24 Question 3
10:30 Question 4
14:00 Question 5
15:14 Question 6
17:32 Question 7
20:06 Question 8
24:36 Question 9
27:16 Question 10
29:17 Question 11
30:55 Question 12
34:58 Question 13
38:50 Question 14
41:19 Question 15
45:43 Question 16
48:12 Question 17
50:43 Question 18
53:40 Question 19
01:00:30 Question 20
01:03:21 Question 21
01:06:46 Question 22
01:09:52 Question 23
01:13:33 Question 24
01:14:38 Question 25
01:17:00 Question 26
01:21:51 Question 27
01:25:18 Question 28
01:28:42 Question 29
01:32:16 Question 30
01:33:30 Question 31
01:36:06 Question 32
01:38:51 Question 33
01:42:18 Question 34
01:45:43 Question 35
01:48:18 Question 36
01:49:50 Question 37
01:50:44 Question 38
01:52:49 Question 39
01:55:06 Question 40
01:57:06 Question 41
02:00:03 Question 42
02:03:44 Question 43
02:08:34 Question 44
02:12:08 Question 45
02:17:18 Question 46
02:21:08 Question 47
02:23:43 Question 48
02:28:54 Question 49
02:31:59 Question 50
===================================================
If you want to Support the Channel so I can create more Free Training content like this, you can do so below or you can click on the "Thanks" button below the video and make a donation there:
Patreon:
/ burningicetech
Paypal:
wynandwarrenw@gmail.com
Buy me a Coffee or Milkshake:
ko-fi.com/burningicetech
========================================
Special Thank You to my Patreon & Paypal Supporters for sponsoring this video and making it possible:
Patreon Supporters:
Nikola Nikolic
Ty Washington
Nathan Calvert
Christian Graziano
Billy Ireland
Edward Williams
Angie Cowan
Gabriela Lizeth Corona Papalotzi
Paul Johnson
Tanner File
Keabetsoe Ratlala
Nathan Perkins
Elvis
Duncan Fernley
Jonathan
Shaolin_Saja
Vili Eskola
Holly Brooks
PayPal Supporters:
Juan Garcia
Robert Hallsey
Joseph Millner
Davy Bessems
John Iveson
Steve Kuroda
John Du
Nathan Perkins
Ricky Howarth
B Payne
David Moore
Common Loot
========================================
The Full A+ course along with many other courses are available for free on the channel so feel free have a look at what I have to offer on my channel and please give the Video a LIKE, it really helps my channel and maybe also Subscribe to be informed of when stuff goes live.
========================================
If you would like assistance, your more than welcome to post your question in the comments section down below OR...
You can join my Discord Server called "Free IT Training" which is a community for people studying IT and who also who want to help others who are studying IT
Here is a link to the server I created with this goal in mind
/ discord
Just came on here to say before I watched your videos I didn't make over a 660 on the Comptia A+ 1102. I started watching your videos and made a 725 today. I truly appreciate you and your videos and will be coming back for all my courses.
Congrats on passing your exam.
how was the core 2? and did you get any printer questions.
Any tips? Just pass my comptia A+ 1101 today and taking 1102 tomorrow
@@Euphoric-tracks no I didn’t get any printer questions.
@@calatrix7770 ok thanks. I was worried about printers appearing.
Dang you suck lol jk
This was very useful to listen to.
Pay attention not only to the answers but listen to his explanations on the other answer choices and why they could or could not be an answer.
Just passed my core 2.
Wanted to give you a huge thank you, I passed both my Core 1 and 2 and I credit you 95% of what I learned, I learned the best from your videos and practice questions, I absolutely wouldn't have done it without you keep doing what you do!
I have passed the core 2 examen Thank you for your supportive videos
I found this core2 examen more complicated than core 1.
People must be prepared well for the kind of questions Comptia elaborates for this exam.
They ask questions like in real environments, my suggestion is learn the concept
and meanings of terminology, that can help.
No matter how many quizzes you have taken for practice, it’s always going to be different at the test.
word
I passed core 2 today, I now have the A+ certification! Thank you so very much for all your videos!
That's great news. Congrats on your pass! :)
Awesome, I take the core 2 tomorrow morning. Congrats on passing.
For Question 2 I would say A -- if you have a limited data plan then you certainly want to kill your network connection to keep your data from getting drained -- and then you can uninstall at your leisure afterwards. It's easier to turn wifi back on than to uninstall/reinstall software.
And it's not on the list, but I would also check Task Manager (CTRL + SHIFT + ESC) to see if that program installed other programs that are running in the background and causing the high network utilization.
Agree!!! Isolate the problem first because you have no idea what else it is capable of until you inspect.
also agree. I was looking for him to say "isolation"
Same. I've dealt with enough malware in the past to learn that sometimes attempting to delete the files can trigger even more adverse reactions from the malware. I'd make sure to completely disconnect from the network before attempting anything.
This is absolutely the right answer, A. Even CompTIA objectives state this. First step after verifying malware is to quarantine the system.
Passed my 1101 now on to 1102 🎉🔥
Same here! Congrats!
Thank you, B.I.T. for all your teaching. PASSED I am A+ certified! Actually, dual now with Google and Comptia. Thanks, bro!
Thank you so much!! I listened to both parts 1 and 2 today before my exam and it solidified a lot of things for me! I am now A+ certified and I don’t think i could’ve done it without these videos!
Congrats on your pass!! :)
I cant tell if these questions are easy or if I'm actually starting to grasp the material either way thank you !
I just passed the 1102 exam and your videos (this one in particular) were all very helpful! Thank you so much for making them!
You are the best online teacher i've encountered in my whole life. you explain every answers in detail. better than any computer professor during my college days.
Hi Warreeeeenn, remember me, I passed my core 1 now want to pass my core 2 exams before new year! wish me luck
Superb content! Thank you for all your insight, guidance & dedication to teaching IT!
I just passed my Core 1 the other day and I learned a lot from listening to you everywhere I go. Thank you very much! I am now preparing for Core 2 and will take your voice everywhere . I like how you are very lively and actually has a personality, it makes the video more interesting and the information easy to remember. I love when you say "what is it boys and girls??? It's APIPA..." I will never forget APIPA ever again, even in afterlife 😄
Just wanted to drop by and show appreciation for all your videos. I took the core 1 exam and passed a month ago and I just got home today from my core 2 exam with a pass as well. I used a exam prep program offered through a reputable college prior to finding your channel and even though I passed...I found that their level and style training was nowhere near the level of detail and explanations you provided. I actually feel like that's money I could have saved, lol. Either way, it's done and now I can move on and begin my learning for Net, Security and Cloud.
YOU ROCK! Love these, they are very informative!
Thank you so much for this video I passed my exam and I received my certification, i’ve got my certification in hand 🎉
I watched this on 2x speed the morning of the exam and made an 85
Most welcome! Congrats on the pass, that's so awesome! :) Very happy for you
Super content, as always.. thank you so much!
Wow! Great Course Thanks a lot!
I really appreciated the 50 Questions and how you explained each answer option thoroughly. My understanding of many, many concepts has been greatly increased.
I finally passed my A+ 1101 & 1102 at around 750 each. Your test question videos and all the explanations really helped me grasp many of the concepts and the thought processes behind them!
Very grateful, your channel is a gem.
great stuff i am felling more confident about my exam.
question 13 can also be social engineering
About to do my test tomorrow thanks for this upload !!
Your explanations are clear and concise thank you💯✔️
Great video. I'm studying for this exam right now.
Just passed the core1 exam last oct19 and currently reviewing for core2. The questions on the actual exam are most situational and asks for specific answer. Great content btw. Thanks!
Are you still studying your core 2? And if you are what are you using to study
Thank you so much for all the information you gave us in this video!
Passed Core 2 today, thanks for the videos!
Congrats, well done!
Great stuff
Thank you SO MUCH!
I just passed core 2 thanks to you! You made the learning process enjoyable and engaging, THANK YOU for what you do!
Congrats on that pass! :) Well done
Why would the first thing you do in Question 2 not be unplug the network cables/disable WiFi? Wouldn't you want to stop the potential data breach as quick as possible?
My guess is why that’s not right is because it says unplug network cable. In the question it just said device. It could be a laptop, phone, tablet, or desktop. So from there the next best choice would be uninstall it. I could be wrong but I think that’s why.
@@Candice144the second part of the answer is turning off wifi on the device.
I agree- it is the same as the ransomware question. Both are about malware compromising data. Data being transmitted out is probably more damaging than locked data, especially if you have off-site backups.
I agree. You isolate the device from the network first
So you never got a real answer for this? I would have personally gone with disable network first as well XD.
Question 43- wouldn’t a botnet that creates zombies be a type of virus that spreads like a worm? A worm doesn’t necessarily have to display images, it is about how it spreads without user input. And a virus doesn’t have to only do damage.
Ty for the review
Apologies if im wrong but I think question 13 (d) explanation is closer to tailgating rather than social engineering.
This is very helpeful please do this more often for future courses like network and security. Thanks. I liked all your videos. maybe i forgot some videos.
nice work!
Thanks for everything man. I really appreciate all the work you have put in to help us all out. Once I have landed a good job after the certifications I will come back and donate to show my appreciation ❤😊 for now just know that there are lots of us who appreciate you helping us change our lives!
As long as it's helping people out I'm happy :)
Thank you ❤
Comedy with learning >perfect 😂
Passed both tests. Thanks dude
I just passed core 2 this morning, and it is absolutely all thanks to your incredible videos! Thank you so much for your hard work and I promise I'll be back for core 1 soon :)
Which vids from him did you watch?
Made a 650 on my core 2 test the first time just passed with 705. Thanks dude!
did u only use this channel or what others did u use to study?
@@Foodyies a lot of these questions are going to help you on the test. make sure you the port numbers and what they do. I took practice exams too.
@@ramdbzdude0_0 ok thank you
Good analogies for Question 26!
Im sorry but if the Question 13 is on the test that is a really crappy thing. The real term is Vishing (Voice phishing, or vishing, is the use of telephony to conduct phishing attacks). Spoofing is where an email address is faked to look legit in order to gather information or credentials typically. Maybe im splitting hairs but I think that would need to be reworded for those pursuing Sec+ in the future.
hey bud,
Sadly there will be questions in the real exam which are annoying like this one. They generally give you 4 possible answers with most of their questions and sometimes you'll see none of them are truly 100% correct.
You will then have to choose the MOST correct answer or the BEST answer. You will see in the exam that with a lot of their questions they will mentioned the words "best" or "most" in the question. You'll also see that it's often highly in caps and even in bold sometimes.
That means there is more than one correct answer or that none are 100% truly correct but that you have to choose the closest thing to being correct. It's a very frustrating thing in these exams but A+ exams are famous for this
@@BurningIceTech how is it not social engineering since the question involves talking to another human???
weldone
⚠Question 13: If Visihing was a possible choice, that would be a better answer. Vishing is when cybercriminals use Voice over IP (VoIP) to make phone calls or leave voice messages pretending to be from a reputable company in order to trick victims. Again, because the cybercriminal is making a CALL, Vishing is better answer.
Correct
Passes the 1102 today =) thank you.
Awesome! :D
I wish I saw this video before my test... I failed last week.. studing again and most of the questions are here!!!!
I’m about to take my test next week anything you would recommend on sharpening up on?
@@ralphcelidor7155did you pass?
Hi buddy, I have a question for you. I see that there are 2 separate playlists for the A+ certificate and the content of the videos in them is different. Which one should I finish first or should I finish one of the two? I will be glad if you answer, have a good day.
3:32 you don’t need special software to do that you can in windows go to command prompt type diskpart select the disk and type clean all and it’ll overwrite the whole disk with zeros you can do it once twice three times your choice I think the Linux environment is the dd (data destroyer) command
Good refresher, but almost zero questions about Windows commands and tools? I heard that's a pretty big chunk of the exam.
Q15, you mention rainbow tables. That's used when a hacker has compromised a server and obtained the encrypted passwords (the hashes) of all accounts. Encryption is not normally reversible to find the original password. The rainbow table is a brute-force pre-computed list of every possible password character combination and the encrypted hash associated with it. The hacker can then can work backwards from the encrypted hash to find the original password. The known username and password can then be used to access other systems that use the same credentials. Building rainbow tables involves terabytes of storage and multiple CPUs generating the hashes as fast as possible. Salting can defeat it, as each randomly chosen salt value requires its entire own separate rainbow table.
hello! love your channel and all the info. Concerning question 27 about upgrading from a 32-bit version of Windows 7 to Windows 10 (64-bit): your answer is D (a clean install with the 64-bit version). Is that always the case? If the client had a 32-bit version of Windows couldn't you assume that they have a 32-bit operating system? My first instinct would have been to answer C. Do we know what processor they are running when we take the test? Thanks again!!!
Hello, I've completed an IT Support course and now preparing for a comptia A+ certification. I have a question. Do I just review 220-1101 and 220-1102? Can you please guide me through. Thank you so much.
I was curious as to how close the format of this video compares to the format of the test?
Would MAC or Content filtering work as a possible solution to 45 if you identify and blacklist devices or websites your neighbors are using? I understand why reducing broadcast power is the best option, but I am curious if these approaches have downsides I'm not thinking of (needs repeated updating to eliminate new devices or sites if the neighbors' behavior or devices change).
Taking core 2 test today 09/23/2023. Thank you for your videos.
I hope you did well and are A+ certified.
@willietrillos8946 congrats and thanks 😊
wishing you best pf luck. hope you did fairly well?
Thank you, sir. This video was a lifesaver, along with the core 1 vids!
Number 13 should be listed as Vishing or did I not learn it right ?
I'm taking my 1102 on the 1st. I'm nervous this one going to tougher than the 1101
Question 1: The answer is obviously B. Utilizing diskpart and format /p:6 are the ONLY federally accepted way to properly erase sensitive data, with the exception of physical destruction or Deguassing (electromagnetic sterilization).
You can use pre-boot recovery tools CLI on primary drive, or in the active OS (cmd / powershell) if the hdd is installed as a secondary drive.
Third party software cant always be trusted.
Although I agree with your reasoning, the phrasing of this question and it's answers are meant to confuse us. When it comes to data removal, we need to evaluate the security concern imposed and what level of precaution we should use in the data's removal. If we follow the way the DoD gets rid of data, we see that they use the standard for media removal outlined by the National Institute of Science and Technology (NIST). In the documentation "Guidelines for Media Sanitization" by the NIST, we can see that the steps to follow for media data removal for an organization is outlined in a given flow chart.
Now getting back to Question 1, the keyword to look at is that it says the company wants to "re-use" their own HDD. This implies the data on the HDD will not be leaving their company, therefore, imposing little security concern to the org. Knowing this, we can follow the flow chart for removal which means we only need to "clear" the hard drive. The keyword "clear" basically means at least one written pass over on the data needs to happen. This can be done via "using organizationally approved and validated overwriting
technologies/methods/tools".
Now for the answers. Answers A and B are effectively doing the same things. Deleting files or quick formatting don't actually overwrite anything, only marking areas as open. Using the command line as you explain in your comment would work for this scenario. However, answer B isn't actually implying a full format in the way you explain. Question B is basically saying use the command line to "delete" data, not wipe it as a full format would. Deleting data via the command line would just consist of using the rm command on given files/directories. The only possible answer left would be C) Disk Wiping Software. The vague mention of disk wiping software doesn't imply that it would have to be some untrusted 3rd party software, it could just be some validated and trusted software used by the orgs. Hopefully this clears up some misunderstandings.
I didn't plan on writing all this but I encountered something very similar on Prof. Dion's practice exams and had to do a bit of digging to understand the correct answer for one of the practice problems. Figured I'd write this up to clear up anyone else's confusion as well. If your curious to know more or I just explained it poorly you can get the information directly from the source "Guidelines for Media Sanitization".
I have a question on Q8. Why the answer is "Offsite backup" instead of "Full Backup"?
i swear I heard question 5 before and the answer for it was C not D on another site. This sort of "BEST CHOICE" inconsistency is what makes this shit so hard. To be clear, I agree with your answer not theirs which is why I remember it because I got it wrong.
Question 18 asks: which step should be done first? chose all that apply. How can you do more than one thing first? One will be first and another second, and so the second item will not be first and should not apply. Right?
pretty much means, choose all that apply that you " could " do first.
Question 13.
Isn't spoofing a term just for computer-related faking? Such as IP spoofing or ARP spoofing. While impersonation is for physical faking like a UPS uniform?
In which case, why didn't we choose Social Engineering, D?
do you have pbq for core 2?
❤️❤️❤️
I feel so confident watching these test preps because I seem to know all of the answers but a handful of them. However, the prep course I am in has practice tests and I get destroyed in those. Do they make these “for profit” test preps purposely harder so they can guarantee pass rates or am I just not there yet?
Yes and No. In most cases the practice tests are made with profit in mind and I don't like that which is why I give everything away for free.
I can't say for sure though if they make them hard on-purpose to get people to spend more money. I suppose some might but we probably can't through them all in the same box since some of them by honest and innocent.
Yea that makes sense. What I mean is some of the for profit places guarantee a 98% pass rate or whatever so in my mind, the only way to guarantee that is to make the tests really hard so that they can be sure you know your stuff before they pay for your test.
And thanks man!! A+ first then Sec+ and Net+, all before the new year if I can haha
question 16 when you're talking about PII. Credit card information would be pci-dss correct?
Also I work in a data center and we utilize man traps!
The extremely high network utilisation is sussy, I'd expect an RDP "trojan" so disconnecting the device from the network would prevent the peep on the other side seeing what's about to happen...
So define high...
Couldn't question number 23 answer be also B as well? If something like short message service (SMS) is considered to be under the Multifactor authentication category isn't it similar? You would obviously login with a username/email + password and then they would send you a PIN/SMS as a way to authenticate yourself? Because pin could be also meant in other ways...
I think it's referring to a PIN you know, such as the one for your bank card, not a verification code that is send via SMS or email. Here they are essentially saying a PIN IS a password and they are basically the same thing.
It's A because you physically HAVE your card on you and you KNOW the PIN. Two factors.
@mydnyghtamethyst dang I forgot about this... now that I am a+ certified, I understand where I went wrong, lol regardless thanks for your help
Does MDM only work on BYOD devices?
Nope. MDM's like Microsoft Intune work on both BYOD as well as company devices.
It does however generally work better with company devices because you would more often have "enrolled" the devices since they belong to the company.
BYOD devices are often not enrolled since they belong to the user. In those cases you don't have "as much" control over the devices. You can use things like "App protection policies" and such on those types of devices
Thank you for the excellent explanation fren! @@BurningIceTech
7:17 I am sorry but question 2; why aren’t we isolating the device first from the network? I mean we know that the device is eating resources (network) of the device, what if after uninstalling the app the device is still record high network utilisation, what next?
I love you
Your accent sounds like three different ones combined where you from mate?
"howzit my bra" ayeee im from South Africa too😝
Question 2 is A
I agree. You're supposed to quarantine the device first.
Questions should be more detailed. For example question 19 .
bro is a professional yapper
haha
@@BurningIceTech nice video man
Developer mode and root access are not the same thing.
Can i get a job withe google certification ?!?
No lol
@@OdysseyGamingOfficialWhy not?
ZA
Question2. Couldn't the hacker use the comp to run from the comp? I would think unplug from the network first?
Question8, is a great answer. How often do u do off site back ups?
Question 13 is so wrong, this is an example of Social Engineering
Pretending being someone else is definitely spoofing
I agree with you. Its a poorly written question.
Agreed, spoofing is more trying to have a certain data look different than it really is. An example would be if they changed the telephone number to make it look like the banks phone number. That would be spoofing. Making a email address look and appear like another is spoofing.
Where social engineering targets people typically trying to deceive them or confuse them. He makes it seem like social engineering can only happen in person in his explanation. Social engineering is a broad term that would include both spoofing and phishing. That being said spoofing doesn't apply really here. Yes, the caller could be using a spoofing attack, but that isn't relevant to the question. He also states that there could be a phishing attack, when phishing attacks are email type attacks. If he wanted to be more accurate he would have said Vishing and clarified, but I will say people do sometimes uses phishing to mean any kind of phishing related attack whether it be on the phone or SMS or email. phishing /Vishing attack would be closer to being correct than spoofing, because an example of a phishing attack would be say you get a email from someone pretending to be your bank to obtain credentials. Vishing would be the same thing, but on the phone. Since vishing isn't an option, the most accurate answer would be social engineering, but I could see why someone picked phishing. Since it's used interchangeably.
13 is definitely 100% Spoofing
@@dreddnawtmettlehead2913
This is from the FBI .gov website
Spoofing
Spoofing is when someone disguises an email address, sender name, phone number, or website URL-often just by changing one letter, symbol, or number-to convince you that you are interacting with a trusted source.
This was never in the question. It's a possibility that it could have been used, but wasn't the question.
Found this on Webster's dictionary
Social engineering
(in the context of information security) the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
As you can see spoofing deals more with change something such as gps, phone number, email address to make it appear as something else. Spoofing is specific type of social engineering tactic that doesn't apply to the question.
some of the answers to these questions are totally subjective lol
If anyone was wondering, this accent is South African, I would say someone who knows Afrikaans
haha xD I take it you might be from the same place
@@BurningIceTech Hehe no, I'm good with certain accents. I'm from 'murica, land of death
Watched this twice didn't pass, spent $500 on the two attemps got 660 and then 695 ( passing is 700)
Why’d you spend that much
Did you watch the other videos also? Or did you just want this one practice test video? This is only 50 questions. The 1102 is more like 90 questions. There is a lot of info covered on this test.
@@kaiozab4866Because the test costs around $250 each time you take it and they took it twice.
Got to let you guys know that professor Messer is trying but his stuff isn't that useful for the new exams anymore.
Thanks!
Thank you very much :)
I have computer contact lenses that sre compromised no one will help me
Can i get a job withe google certification ?!?
You should probably obtain job or volunteer experience. It will all depend on how you market yourself to the employer.
@@maxxmittelstadt4798 Get job experience first? lol