CompTIA 220-1202 - CompTIA A+ Core 2 (2026 Exam Update)
A senior administrator asks a help desk technician to run a set of commands on a remote network switch. After running the commands, the technician needs to collect the output and provide it to the administrator. Which of the following should the technician use to fulfill the administrator ' s request?
Technicians are failing to document user contact information, device asset tags, and a clear description of each issue in the ticketing system. What should the help desk management implement?
A user ' s application only works with a legacy version of the OS. The OS is reaching its end-of-life date. For security reasons, the company is migrating to the current version of the OS. Which of the following is the most efficient way to complete the migration while maintaining accessibility to the application?
A company wants to use a single operating system for its workstations and servers and avoid licensing fees. Which of the following operating systems would the company most likely select?
A technician is creating an MDM policy using hardening techniques that are unique to each user. Which of the following techniques is the technician using?
A user is attempting to open on a mobile phone a HD video that is hosted on a popular media streaming website. The user is receiving connection timeout errors. The mobile reception icon area is showing two bars next to 3G. Which of the following is the most likely cause of the issue?
A customer’s computer does not have an active connection to the network. A technician goes through a few troubleshooting steps but is unable to resolve the issue. The technician has exhausted their knowledge. The customer expresses frustration at the time taken to resolve this issue. Which of the following should the technician do?
A user receives an unexpected text message containing a link to reset an expired password. Which of the following social engineering attacks is taking place?
An employee receives a message urging them to scan an image with their company-owned smartphone that will access the account management portal in order to reset their password. Which of the following describes this type of social engineering attack?
A user needs to download some files from a vendor website. Downloading the specific file type is blocked when using the Microsoft Edge web browser. A technician determines that the files the user wants to download are safe. Which of the following should the technician configure to allow these files to be downloaded?
