CompTIA A+ Practice Test (220-1201)
Use the form below to configure your CompTIA A+ Practice Test (220-1201). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA A+ 220-1201 (V15) Information
CompTIA A+ Certification Overview
Exam Versions
The current versions of the CompTIA A+ certification exams are:
- 220-1201 (Core 1)
- 220-1202 (Core 2)
These versions were launched in April 2022 and are expected to retire approximately three years from their release date.
The A+ Certification Test
To earn the CompTIA A+ certification, candidates must pass two separate exams: 220-1201 and 220-1202. Each exam has a separate fee and can be taken in any order. Both exams must be completed before the retirement date and must be from the same set of objectives. The certification is valid for three years from the date of passing the exams.
Exam Details:
- Format: Computer-based tests
- Number of Questions: 90 questions per exam
- Time Limit: 90 minutes per exam
- Result Availability: Immediately after completion, following a short mandatory survey
CompTIA A+ 220-1201
The CompTIA A+ 220-1201 (Core 1) exam is a key component of the A+ certification, designed to validate essential IT skills and knowledge. This exam, launched in April 2022, covers a broad range of topics critical for IT professionals, including mobile devices, networking technology, hardware, virtualization and cloud computing, and network troubleshooting. Comprising 90 questions, the test includes multiple-choice and performance-based questions, simulating real-world scenarios to assess the candidate's practical abilities. The 220-1201 exam emphasizes the foundational skills necessary for IT support roles, ensuring that certified individuals are equipped to handle a variety of technical issues. With a 90-minute time limit, the exam challenges candidates to demonstrate their proficiency efficiently, providing immediate results upon completion. The certification remains valid for three years, making it a crucial step for those aiming to establish or advance their careers in IT.
Exam Policies and Procedures
Candidates must agree to CompTIA's exam policies before starting the test. These policies include:
- No Mobile Phones/Devices: Must be left outside the exam room
- Question Review: Candidates can revisit and change answers before submitting the exam
- Submission: Unanswered questions are marked, and a final review is available before submission
Testing Centers
Since July 9, 2012, CompTIA exams are available exclusively through Pearson VUE testing centers. Candidates can book exams online, by phone, or at the testing center. Options include:
- In-Person Testing: At Pearson VUE testing centers
- Online Testing: Through Pearson VUE's online platform
Performance-Based Questions (PBQs)
The A+ exams include Performance-Based Questions (PBQs), which require candidates to perform specific tasks or solve problems in a simulated environment. These questions test real-world skills in areas like command prompts, Windows OS, and networking environments.
Continuing Education (CE) Program
Certifications with the +CE (Continuing Education) suffix, including A+, Network+, and Security+, must be renewed every three years. Renewal options include:
- Retaking the Exam: Passing the latest version of the exam
- Higher-Level Certification: Passing a higher-level CompTIA exam
- CE Program Requirements: Completing CE activities
Lifetime Certifications
Certifications earned on or before December 31, 2010, are valid for life. However, lifetime certifications are no longer available for new candidates.
More reading:
Free CompTIA A+ 220-1201 (V15) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Mobile DevicesNetworkingHardwareVirtualization and Cloud ComputingHardware and Network Troubleshooting
A technician is replacing the speaker on a customer's laptop. After reassembly, the customer reports that the sound is distorted and there's a noticeable buzzing noise when the volume is raised. The technician confirms that the sound issue was not present before the speaker replacement. What is the MOST likely cause of this new sound issue?
The speaker has not been properly seated or the connectors are not fully attached.
The speaker housing does not have a proper seal, causing air to escape and create distortion.
The replacement speaker has a different impedance rating, incompatible with the laptop's design.
There is electromagnetic interference from other internal components affecting speaker performance.
Answer Description
Buzzing or crackling that begins immediately after a speaker replacement almost always points to a bad physical connection: the small speaker cable or the driver itself is not fully seated, so the signal intermittently opens or shorts and the cone can vibrate against the chassis. Reseating the cable and mounting the speaker correctly normally restores clear audio. A leaky speaker enclosure can affect frequency response but rarely creates an electrical buzz, electromagnetic interference is typically heard as faint hiss or clicks, and an impedance mismatch can indeed cause distortion-but technicians usually install the manufacturer-specified part, so a loose connection is by far the more likely cause.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is impedance and why is it important for speakers?
What does it mean for a speaker to be 'properly seated'?
What is electromagnetic interference (EMI) and how can it affect speakers?
You are working for an IT consulting firm and have been tasked with setting up several SOHO wireless networks. Which of the following actions will best help protect the confidentiality of data transmitted over the wireless network?
Disabling SSID broadcast
Enabling wireless encryption
Configuring the lowest broadcast power possible
Enabling MAC address filtering
Answer Description
Enabling modern wireless encryption (such as WPA2 or WPA3) scrambles every frame with strong cryptography, so intercepted traffic cannot be read without the key. Simply lowering the access point's transmit power, hiding or disabling the SSID broadcast, or enabling MAC address filtering may deter casual users, but they do not encrypt traffic and can be bypassed with freely available tools.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is wireless encryption and how does it work?
What is SSID broadcast and why would you disable it?
What is MAC filtering and its effectiveness in securing a wireless network?
Which advantage does the display technology OLED have over other types of display technologies when used in mobile devices and smart phones?
Inherently faster response time than any other display technology
Longer lifespan with continuous use of static images
Ability to produce true blacks and high contrast ratios
Lower power consumption on white or bright backgrounds
Answer Description
Organic Light-Emitting Diode (OLED) displays are known for their ability to produce true blacks and high contrast ratios. This is because OLED pixels emit their own light, which can be completely turned off to achieve a true black, unlike Liquid Crystal Displays (LCDs) that rely on a backlight that cannot be turned off for individual pixels. This advantage allows OLED displays to have superior contrast ratios compared to other types, such as In-Plane Switching (IPS) or Twisted Nematic (TN) displays that are types of LCDs and cannot achieve the same level of black since they use a constant backlight.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the other display technologies used in mobile devices?
How does OLED technology achieve true blacks?
What impact does high contrast ratio have on viewing experience?
A company is hosting an e-commerce application in the cloud, which sees significant spikes in user traffic during holiday sales. The IT team wants to ensure that the application remains responsive regardless of user load without having to manually intervene to adjust resources. Which cloud computing characteristic is most appropriate to address this requirement?
File synchronization
Metered utilization
High availability
Rapid elasticity
Answer Description
Rapid elasticity is the characteristic of cloud services that allows systems to automatically scale resources up or down in response to fluctuating demand. This ensures that during peak times such as holiday sales, the e-commerce application can handle spikes in traffic without any manual intervention. High availability concerns the systems' ability to remain operational even during faults or maintenance, while metered utilization deals with tracking resource usage for billing. File synchronization is related to keeping files updated across systems but doesn't address scaling resources based on demand.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is rapid elasticity in cloud computing?
How does rapid elasticity differ from high availability?
Can you explain metered utilization and its significance?
A user reports that their smartphone is not charging properly. They have already tried using different charging cables and adapters, but the issue persists. What should the technician inspect NEXT to best determine the probable cause of the charging problem?
Check for any recent software updates that might affect charging.
Consider replacing the battery as it might be failing to hold charge.
Inspect the device for water damage.
Examine the charging port for obstructions or damage.
Answer Description
The most common issue after eliminating problems with the charging cable and adapter would be a damaged or dirty charging port. Lint, debris, or damage can prevent the charging cable from making proper contact with the internal connectors, leading to improper charging. Examining for water damage is important, as it can cause various issues including charging problems, but charging ports are more accessible for users to tamper with and commonly collect foreign matter. While replacing the battery might resolve charging issues if the battery itself is failing, this is less likely the cause if third-party cables and multiple adapters have been ruled out and it is often more complex than simply cleaning the port. Similarly, checking for software updates could potentially resolve battery management software problems, but it would not make sense as the next step given the physical nature of the client's complaint.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some signs of a damaged charging port?
How can I effectively clean a smartphone charging port?
What other common smartphone charging issues could arise after checking the charging port?
You are an End User Support Technician for a company that is purchasing new desktop computers. A key requirement is to select a form factor that minimizes the physical footprint of each workstation, allowing for the maximum number of employees in the existing office space. Which of the following motherboard form factors would be the best choice to meet this requirement?
Mini-ITX
ATX
BTX
Micro-ATX
Answer Description
Mini-ITX is the smallest of the common motherboard form factors, making it the ideal choice for compact computer builds where space is a primary concern. In terms of size, Mini-ITX (170mm x 170mm) is smaller than Micro-ATX (244mm x 244mm), which is smaller than the standard ATX form factor (305mm x 244mm). BTX is an older form factor that was designed by Intel to replace ATX but did not gain widespread adoption and is now considered obsolete.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a mini-ITX form factor and why is it suitable for small spaces?
How does mini-ITX compare to micro-ATX in terms of components and expandability?
What are the limitations of using a mini-ITX form factor?
Which connector type is most commonly used to terminate shielded or unshielded twisted-pair Ethernet network cables that follow the T568A/T568B wiring standards?
RJ45
F-type
LC
RJ11
Answer Description
The eight-position modular connector informally called an "RJ45" is specified by the TIA/EIA-568A and T568B wiring schemes for four-pair copper Ethernet cabling. RJ11 is a 6-position connector primarily for telephone lines, the F-type connector is a threaded coaxial fitting used with cable and satellite TV, and an LC connector terminates fiber-optic strands rather than copper pairs.
Sources:
- T568A and T568B Wiring Standards article confirms that both standards terminate four-pair cable in RJ45 connectors.
- Registered jack entry notes that RJ11 is used for single-line telephone service.
- F connector article describes its use with coaxial cable for TV and satellite signals.
- LC connector reference identifies it as a small-form-factor fiber-optic connector.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is GNSS and how does it relate to GPS?
How does a GPS device calculate its location?
What are some common uses of GPS technology?
Why would a technician use plenum-rated cables when installing new cabling in a datacenter?
Efficiently reduces EMI and crosstalk in STP cabling
Ensures an intruder cannot wiretap the cabling
Allows the cabling to be bent at sharp angles without snapping
Reduces hazardous fumes in the event of a fire
Answer Description
Plenum-rated cables have a special jacket made of fire-retardant materials. In the event of a fire, this jacket is designed to burn slowly and produce minimal amounts of smoke and hazardous fumes. This is a critical safety feature for cables run in plenum spaces, which are areas used for air circulation (like the space above a drop ceiling), as it helps prevent the spread of fire and toxic smoke throughout a building via the ventilation system.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does plenum rating mean?
What are the benefits of using shielded twisted pair (STP) cables?
Why is reducing hazardous fumes important in data-centers?
Which of the following port numbers is commonly used for Secure Shell (SSH) to securely log into a remote computer or server?
20/21
80
25
22
Answer Description
SSH is a protocol used for secure remote login and other secure network services. It is commonly associated with port number 22, thus the correct answer is 22. It's important to memorize standard port numbers as they are frequently referenced in networking and security tasks. Port 20/21 is used for FTP, port 25 is for SMTP, and port 80 is for HTTP, making these options incorrect for SSH.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is SSH and why is it important?
What are some common uses of port 22 aside from SSH?
Why are port numbers standardized in networking?
What type of desktop operating system cannot be installed and run as a guest of a Linux based host operating system?
macOS
Windows 11 N and KN editions
RHEL Linux Distros
Debian Linux Distros
Answer Description
Due to licensing agreements macOS cannot officially be run on anything but approved Apple hardware. You can run macOS as a virtual machine but the host OS must also be macOS running on Apple hardware. From a technical perspective it is possible to run macOS on non-official hardware, there is an online community dedicated to this called "Hackintosh". While technically possible, you should not do this in an enterprise environment due to the license violations it involves. Even Amazon Web Services (AWS) uses real Mac hardware instead of other commercially available options (more info).
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why can't macOS be run on non-Apple hardware?
What is a Hackintosh, and why is it controversial?
What are the implications of using AWS for macOS applications?
Which DNS record type is typically used to hold descriptive information, such as details for verifying domain ownership or email security features?
A record
TXT record
MX record
AAAA record
Answer Description
TXT records are used to hold free-form text of any type, often used for domain ownership verification by various services, or to implement email security measures like SPF, DKIM, and DMARC. An A record, on the other hand, maps a domain name to an IPv4 address and is not meant for descriptive text. The MX record directs mail to an email server and cannot hold descriptive text beyond the mail server's name. Similarly, an AAAA record links a domain with an IPv6 address.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is SPF, DKIM, and DMARC in relation to TXT records?
How do TXT records differ from A and MX records?
Can you give examples of how TXT records are used for domain ownership verification?
A server has experienced a hard drive failure in your data center. The server is utilizing a RAID 6 configuration. How many drives can fail and still avoid data loss?
N-1 drives
One drive
Two drives
No drives
Answer Description
In a RAID 6 configuration, you can lose up to two drives and still maintain fault tolerance. RAID 6 uses two parity blocks distributed across the drives, which allows the system to recover from the simultaneous failure of two drives without data loss. If a third drive fails, the array would lose data integrity.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the advantages of using RAID 6 over other RAID levels?
What is the difference between parity in RAID 5 and RAID 6?
How do I set up a RAID 6 configuration?
At power-up, a desktop PC emits several short beeps, pauses briefly, and then repeats this pattern in a loop. What does this beep pattern MOST likely indicate?
The CPU is overheating after the system has already booted into the OS.
A successful diagnostic routine indicating the system passed POST.
A hardware error such as a RAM or motherboard fault that prevented POST from completing.
The operating system boot loader cannot be found on the primary drive.
Answer Description
On most BIOS implementations, a repeating series of short beeps signifies that POST detected a critical hardware fault-commonly with RAM, the motherboard's power delivery, or another essential component. It is not an indication of a successful POST; a single short beep (IBM/Award) or a single long beep (AMI) generally signals that no errors were found. Technicians should reference the motherboard or BIOS documentation for exact meanings and begin hardware diagnostics, often starting with reseating or replacing memory modules.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are POST beep codes?
What should I do if I encounter a repetitive beep pattern?
What does a single short beep mean during POST?
A technician needs to configure an email client to retrieve emails using a protocol that does not necessarily require email to be stored on the server after it has been delivered to the client. Which of the following ports should be used to meet this requirement?
143
25
443
110
Answer Description
Port 110 is used for Post Office Protocol version 3 (POP3), which is designed to retrieve emails from a mail server. When using POP3, emails are downloaded to the client and can be deleted from the server thereafter, depending on the client's configuration. This is useful for users who want to manage their emails locally and keep the server mailbox from running out of space.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is POP3?
How does POP3 different from IMAP?
Why is port 110 used for email retrieval?
A technician is assembling a custom workstation that requires high-speed external storage with an existing 3.5-inch hard disk drive. The technician has decided to leverage the existing eSATA interface on the workstation's motherboard. Which type of cabling option should the technician choose to connect the drive to the workstation allowing the best performance of the interface?
A Cat 6 network cable connected to a capable NAS system
A USB 3.0 to SATA adapter cable for versatile connectivity
A standard SATA cable usually used within the computer case
An eSATA cable designed for external connection of the drive
Answer Description
The technician should use an eSATA cable, which is specifically designed to connect external SATA hard drives to an eSATA port on a computer motherboard or an eSATA PCIe card. eSATA cables are made to handle the external transfer speeds of SATA devices, which in this case is necessary for utilizing the high-speed data transfer capabilities of the existing interface on the workstation's motherboard efficiently. Other interfaces like USB or Ethernet are either not meant for direct hard drive connectivity or would significantly limit the transfer speed of the eSATA interface.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is eSATA and how does it differ from standard SATA?
Why is using an eSATA cable essential for achieving high-speed data transfer?
What are the benefits of using external storage with eSATA over USB or other interfaces?
That's It!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.