00:20:00

CompTIA A+ Practice Test (220-1202)

Use the form below to configure your CompTIA A+ Practice Test (220-1202). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA A+ 220-1202 (V15)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA A+ 220-1202 (V15) Information

CompTIA A+ Certification Overview

Exam Versions

The current versions of the CompTIA A+ certification exams are:

  • 220-1201 (Core 1)
  • 220-1202 (Core 2)

These versions were launched in April 2022 and are expected to retire approximately three years from their release date.

The A+ Certification Test

To earn the CompTIA A+ certification, candidates must pass two separate exams: 220-1201 and 220-1202. Each exam has a separate fee and can be taken in any order. Both exams must be completed before the retirement date and must be from the same set of objectives. The certification is valid for three years from the date of passing the exams.

Exam Details:

  • Format: Computer-based tests
  • Number of Questions: 90 questions per exam
  • Time Limit: 90 minutes per exam
  • Result Availability: Immediately after completion, following a short mandatory survey

CompTIA A+ 220-1202

The CompTIA A+ 220-1202 (Core 2) exam is an essential part of the A+ certification, focusing on the software and operational aspects of IT support. Launched in April 2022, this exam tests candidates on a variety of critical topics including operating systems, security, software troubleshooting, and operational procedures. The 220-1202 exam comprises 90 questions, featuring a mix of multiple-choice and performance-based questions that simulate real-world IT scenarios. With a 90-minute time limit, candidates must efficiently demonstrate their knowledge and problem-solving skills. The exam is designed to ensure that IT professionals are well-versed in managing and troubleshooting software issues, implementing security measures, and following best practices in IT operations. Successful completion of the 220-1202, alongside the 220-1201, certifies individuals for three years, highlighting their competence and readiness to handle diverse technical challenges in the IT field.

Exam Policies and Procedures

Candidates must agree to CompTIA's exam policies before starting the test. These policies include:

  • No Mobile Phones/Devices: Must be left outside the exam room
  • Question Review: Candidates can revisit and change answers before submitting the exam
  • Submission: Unanswered questions are marked, and a final review is available before submission

Testing Centers

Since July 9, 2012, CompTIA exams are available exclusively through Pearson VUE testing centers. Candidates can book exams online, by phone, or at the testing center. Options include:

  • In-Person Testing: At Pearson VUE testing centers
  • Online Testing: Through Pearson VUE's online platform

Performance-Based Questions (PBQs)

The A+ exams include Performance-Based Questions (PBQs), which require candidates to perform specific tasks or solve problems in a simulated environment. These questions test real-world skills in areas like command prompts, Windows OS, and networking environments.

Continuing Education (CE) Program

Certifications with the +CE (Continuing Education) suffix, including A+, Network+, and Security+, must be renewed every three years. Renewal options include:

  • Retaking the Exam: Passing the latest version of the exam
  • Higher-Level Certification: Passing a higher-level CompTIA exam
  • CE Program Requirements: Completing CE activities

Lifetime Certifications

Certifications earned on or before December 31, 2010, are valid for life. However, lifetime certifications are no longer available for new candidates.

More reading:

CompTIA A+ 220-1202 (V15) Logo
  • Free CompTIA A+ 220-1202 (V15) Practice Test

  • 20 Questions
  • Unlimited
  • Operating Systems
    Security
    Software Troubleshooting
    Operational Procedures
Question 1 of 20

A building currently uses badge readers that unlock doors when an employee swipes an NFC card. Management wants to add multifactor authentication (MFA) but does not want to purchase biometric scanners. Which change would satisfy the MFA requirement while allowing the existing badge hardware to remain in service?

  • Replace NFC badges with RFID key fobs that unlock the door on proximity.

  • Prompt users for a PIN after they swipe their existing NFC badge.

  • Disable badge readers and instead email a time-based one-time password (OTP) to each employee at the door.

  • Require employees to swipe the same NFC badge twice in succession.

Question 2 of 20

A user is experiencing frequent desktop alerts claiming that their antivirus protection is disabled. However, the antivirus software appears to be active and up to date when an administrator checks. What should the administrator do next to troubleshoot this issue?

  • Scan the system for malware.

  • Reinstall the antivirus software.

  • Disable the desktop alerts.

  • Update the operating system.

Question 3 of 20

What is the purpose of the System File Checker (SFC) tool in Windows?

  • To scan for malware

  • To reinstall Windows

  • To update device drivers

  • To scan and replace corrupted or missing system files

Question 4 of 20

A technician suspects that a network issue is causing slow connectivity to a remote web server. To troubleshoot, the technician needs to analyze the path and measure the transit delays of packets at each intermediate hop. Which command-line tool will provide the most detailed information on the path packets take to reach the target host?

  • tracert

  • ipconfig

  • hostname

  • ping

Question 5 of 20

A user calls the help desk with an issue that is above what the help desk can fix. The issue is then moved to a more advanced tech who can fix the problem. This is an example of what?

  • Severity

  • Description of problems

  • Categories

  • Escalation levels

Question 6 of 20

During the initial setup of a new Linux file server, you are asked to choose a filesystem for a 30 TB RAID array that will store large video files. The editors want to keep the volume online while it is grown in the future and during occasional defragmentation jobs. Which filesystem choice meets those requirements best?

  • FAT32

  • NTFS

  • ext4

  • XFS

Question 7 of 20

You are responsible for managing the backups for a company's critical data. Which type of backup method creates a copy of all selected files and data every time it runs?

  • Differential

  • Incremental

  • Synthetic

  • Full

Question 8 of 20

While entering a secure data-center door that requires badge access, you notice an unfamiliar individual slip in directly behind you without presenting a badge or swiping the reader. What is the most appropriate immediate action to maintain physical security?

  • Prop the door open so they can retrieve their badge from a colleague

  • Assume they are an authorized contractor and continue to your workstation

  • Politely challenge the person and escort them to security or request a valid badge

  • Lend them your badge so they can swipe in once inside

Question 9 of 20

In the context of logical security, what does MDM stand for?

  • Mobile Device Management

  • Meta Data Management

  • Master Data Management

  • Malware Detection Microprocessor

Question 10 of 20

In an IT support ticketing system, why is it important to record the requester's (user's) information along with the technical issue they report?

  • It lets the ticketing system automatically close the ticket without human review once enough data is gathered.

  • It enables the marketing team to group users for promotional email campaigns.

  • It gives technicians essential context and contact details to troubleshoot effectively and follow up on the request.

  • It allows the organization to charge the user or department directly for the time spent on support.

Question 11 of 20

Which Windows feature provides full-disk encryption by encrypting the entire drive and can require a PIN, password, or startup key before the operating system boots?

  • System Restore

  • BitLocker Drive Encryption

  • File History

  • Encrypting File System (EFS)

Question 12 of 20

A cybersecurity analyst must examine several suspicious email attachments without endangering the analyst's laptop or the corporate network. Each session should start from a clean state so any malicious changes are discarded automatically after the test. Which of the following purposes of a virtual machine BEST meets these requirements?

  • Sandbox virtual machine

  • Cross-platform virtualization

  • Application virtualization for legacy software

  • Test/development virtual machine

Question 13 of 20

What is the safest way to prepare for working on a powered device?

  • Turn off the device using the power button instead of unplugging.

  • Use a surge protector to safeguard against power surges during repairs.

  • Ground yourself with an ESD strap to prevent static discharge.

  • Unplug the device from the power source before starting any work.

Question 14 of 20

You are a systems administrator comparing multifactor authentication (MFA) methods for employee logins. Which of the following BEST explains why using SMS text messages as the second factor is considered less secure than using an authenticator app or hardware token?

  • Mobile-carrier fees for each text message raise operational costs.

  • SMS codes work only over Wi-Fi networks, limiting availability to traveling users.

  • Attackers can divert or intercept SMS codes through SIM-swapping or SS7 attacks.

  • SMS text messages are protected by strong end-to-end encryption that prevents interception.

Question 15 of 20

What part of a ticketing system correlates to the urgency at which the issue needs to be addressed?

  • Escalation levels

  • Description of problems

  • Severity

  • Categories

Question 16 of 20

While troubleshooting a desktop PC that will not start Windows, you observe the following:

  • After the POST completes, a black screen displays the message "Operating system not found."
  • Entering the UEFI firmware setup shows that the internal NVMe SSD is not listed in the Boot Priority list.

Which of the following is the MOST likely cause of this error?

  • The NVMe SSD is disconnected or has failed.

  • The workstation is configured to obtain its IP address via DHCP.

  • Secure Boot is disabled in UEFI.

  • The monitor's video driver is outdated.

Question 17 of 20

You are an IT technician at a medium-sized company and you've detected malware on one of the computers within the network. Your company maintains sensitive customer data and it's critical to prevent any further infection or data breach. What is your FIRST course of action to mitigate the threat?

  • Immediately shut down the computer to prevent any further actions by the malware

  • Notify all employees about the infection before taking any technical measures

  • Begin a full system antivirus scan

  • Disconnect the computer from the network

Question 18 of 20

A help-desk technician needs to enable BitLocker drive encryption on a user's Windows 10 laptop, but the option is not available in Settings. The user also wants to allow incoming Remote Desktop connections, yet that setting is missing, and the computer cannot join the company's on-premises Active Directory domain. The laptop was purchased retail for personal use and has never been upgraded.

Which Windows 10 edition is MOST likely installed on this PC?

  • Pro

  • Enterprise

  • Home

  • Pro for Workstations

Question 19 of 20

During checkpoint screening at a corporate data center, visitors walk through a magnetometer before accessing the lobby. Which statement best describes what the magnetometer does?

  • It captures millimeter-wave images to visualize non-metallic contraband hidden under clothing.

  • It weighs each person using load cells and flags differences that could indicate hidden items.

  • It monitors ionizing radiation levels to prevent radioactive materials from entering the facility.

  • It measures disturbances in a magnetic field to reveal ferromagnetic objects such as concealed weapons.

Question 20 of 20

A Windows 10 desktop began displaying a blue screen with the stop code "VIDEO_TDR_FAILURE" and immediately reboots whenever normal mode is selected. The user states a new graphics-card driver was installed from the manufacturer's website earlier in the day. The system will start successfully in Safe Mode with networking. Which action should the technician take first to restore normal operation?

  • Use Device Manager in Safe Mode to roll back the display adapter driver

  • Physically replace the graphics card with a known-good unit

  • Disable TDR (Timeout Detection and Recovery) by editing the registry

  • Run the command DISM /online /cleanup-image /restorehealth