00:20:00

CompTIA A+ Practice Test (220-1202)

Use the form below to configure your CompTIA A+ Practice Test (220-1202). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA A+ 220-1202 (V15)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA A+ 220-1202 (V15) Information

CompTIA A+ Certification Overview

Exam Versions

The current versions of the CompTIA A+ certification exams are:

  • 220-1201 (Core 1)
  • 220-1202 (Core 2)

These versions were launched in March 2025 and are expected to retire approximately three years from their release date.

The A+ Certification Test

To earn the CompTIA A+ certification, candidates must pass two separate exams: 220-1201 and 220-1202. Each exam has a separate fee and can be taken in any order. Both exams must be completed before the retirement date and must be from the same set of objectives. The certification is valid for three years from the date of passing the exams.

Exam Details:

  • Format: Computer-based tests
  • Number of Questions: 90 questions per exam
  • Time Limit: 90 minutes per exam
  • Result Availability: Immediately after completion, following a short mandatory survey

CompTIA A+ 220-1202

The CompTIA A+ 220-1202 (Core 2) exam is an essential part of the A+ certification, focusing on the software and operational aspects of IT support. Launched in April 2022, this exam tests candidates on a variety of critical topics including operating systems, security, software troubleshooting, and operational procedures. The 220-1202 exam comprises 90 questions, featuring a mix of multiple-choice and performance-based questions that simulate real-world IT scenarios. With a 90-minute time limit, candidates must efficiently demonstrate their knowledge and problem-solving skills. The exam is designed to ensure that IT professionals are well-versed in managing and troubleshooting software issues, implementing security measures, and following best practices in IT operations. Successful completion of the 220-1202, alongside the 220-1201, certifies individuals for three years, highlighting their competence and readiness to handle diverse technical challenges in the IT field.

Exam Policies and Procedures

Candidates must agree to CompTIA's exam policies before starting the test. These policies include:

  • No Mobile Phones/Devices: Must be left outside the exam room
  • Question Review: Candidates can revisit and change answers before submitting the exam
  • Submission: Unanswered questions are marked, and a final review is available before submission

Testing Centers

Since July 9, 2012, CompTIA exams are available exclusively through Pearson VUE testing centers. Candidates can book exams online, by phone, or at the testing center. Options include:

  • In-Person Testing: At Pearson VUE testing centers
  • Online Testing: Through Pearson VUE's online platform

Performance-Based Questions (PBQs)

The A+ exams include Performance-Based Questions (PBQs), which require candidates to perform specific tasks or solve problems in a simulated environment. These questions test real-world skills in areas like command prompts, Windows OS, and networking environments.

Continuing Education (CE) Program

Certifications with the +CE (Continuing Education) suffix, including A+, Network+, and Security+, must be renewed every three years. Renewal options include:

  • Retaking the Exam: Passing the latest version of the exam
  • Higher-Level Certification: Passing a higher-level CompTIA exam
  • CE Program Requirements: Completing CE activities

Lifetime Certifications

Certifications earned on or before December 31, 2010, are valid for life. However, lifetime certifications are no longer available for new candidates.

More reading:

CompTIA A+ 220-1202 (V15) Logo
  • Free CompTIA A+ 220-1202 (V15) Practice Test

  • 20 Questions
  • Unlimited
  • Operating Systems
    Security
    Software Troubleshooting
    Operational Procedures
Question 1 of 20

Which setting on a firewall would you configure to restrict access to a specific service on a private network?

  • Port forwarding

  • Firmware updates

  • Changing channels

  • Disabling SSID broadcast

Question 2 of 20

A Windows 11 Pro laptop has displayed the stop code "MEMORY_MANAGEMENT" three times this week. The technician wants a quick, graphical timeline that highlights critical errors such as Blue Screen of Death (BSOD) events, application crashes, and other reliability problems without digging through raw Event Viewer logs. Which built-in Windows utility should the technician open to review this historical stability data?

  • Device Manager

  • Event Viewer

  • Performance Monitor

  • Reliability Monitor

Question 3 of 20

A team member reports that their laptop does not enter hibernation after a set period of inactivity, even though they set the option is enabled in the settings.

What should you check FIRST to resolve this issue?

  • Ensure the device is not plugged into a power source while attempting to hibernate.

  • Inspect the advanced power settings to confirm that hibernation is enabled for the current power plan.

  • Verify if there are any system updates pending that might affect power management.

  • Check the display settings to see if there is a timeout configured for sleep mode.

Question 4 of 20

A Linux technician needs to provision a new 4 TB internal drive on Ubuntu 22.04 used for video editing. The drive must store single files larger than 4 GB, reduce fragmentation through extent-based allocation, and be fully supported by the Linux kernel without extra drivers. Which filesystem should the technician choose?

  • ext4

  • NTFS

  • ReFS

  • FAT32

Question 5 of 20

You receive an email from an outside party stating that the client computers on your network have been encrypted and that the only way to decrypt them is to send Bitcoin to a hacker calling themselves "Zero Cool." Your company has fallen victim to a/an:

  • Ransomware attack.

  • Rootkit attack.

  • Phishing attack.

  • Man-in-the-Middle attack.

Question 6 of 20

A user reports that their Windows 10 computer has become extremely slow and is occasionally crashing. The IT technician suspects a corrupted Windows system file is the cause. Which of the following tools should the technician use FIRST to repair the Windows system files?

  • Disk Cleanup

  • System Restore

  • System File Checker (SFC)

  • Windows Recovery Environment (WinRE)

Question 7 of 20

A user reports intermittent periods in which the workstation can access shared folders on the local network but cannot open external websites or cloud applications. No other users are affected, and the workstation is configured to obtain its TCP/IP settings automatically. Which initial troubleshooting step should the technician perform?

  • Use ipconfig /all to review the current DHCP-assigned address, gateway, and DNS servers, then renew the lease if needed.

  • Reset the web browser to its default settings.

  • Add the required web domains to the endpoint security whitelist.

  • Open the hosts file to check for incorrect static entries.

Question 8 of 20

An organization is evaluating an authentication method to centrally manage administrator access to network devices, including routers and switches.

Which of the following protocols is specifically designed for this purpose and provides granular control over authentication, authorization, and accounting (AAA)?

  • RADIUS

  • Kerberos

  • LDAP

  • TACACS+

Question 9 of 20

During a system-wide upgrade, several support tickets are opened by users in the accounting department. To triage and prioritize these tickets correctly, which piece of information should the technician make sure is documented for each ticket?

  • The fact that all affected users are in the accounting department

  • The exact date and time each user first noticed the problem

  • The usernames and workstation asset tags for the affected users

  • The severity or business-impact level of the issue

Question 10 of 20

While onsite, you observe an Android user demonstrate a problem: When they tap Update for a well-known productivity app in Google Play, the status stays at "Downloading…" for several minutes and never progresses. The handset shows a strong Wi-Fi signal, 60 percent battery, and over 4 GB of free internal storage. Before recommending more drastic measures, which action should you try first to resolve the failed update?

  • Enable Developer options and turn on USB debugging

  • Disable Wi-Fi and force the update to download over mobile data

  • Perform a factory reset and restore the device from backup

  • Clear the Google Play Store cache from App info and relaunch the store

Question 11 of 20

Which Control Panel utility in Windows 10 allows a user to view a comprehensive list of devices and printers connected to the system, facilitating management tasks such as adding new devices or checking printer statuses?

  • Hardware and Sound

  • Network and Sharing Center

  • Devices and Printers

  • System

Question 12 of 20

Which of the following methods provides a possession factor that can be used as part of multifactor authentication for user sign-in?

  • Answering user-chosen security questions

  • Drawing an unlock pattern on a touch-screen

  • Typing a username and password

  • Voice call that delivers or prompts for a one-time passcode to a registered phone number

Question 13 of 20

Which Windows command tool allows you to prepare a storage device for use by erasing all existing data and setting up a new file system?

Question 14 of 20

Which Active Directory feature can be used to apply settings across multiple computers and users within a domain?

  • Login Script

  • Organizational Units

  • Group Policy

  • Home Folder

Question 15 of 20

A user sees repeated desktop pop-ups stating that their antivirus definitions are out of date-even though the antivirus console shows that the last update succeeded less than an hour ago. Clicking the pop-up opens a web page that offers to download a different "security" product.

Which of the following BEST describes what is occurring on the system?

  • Rogue security software (FakeAV/scareware) is generating fraudulent alerts.

  • The antivirus subscription has expired and needs renewal.

  • The system clock is incorrect, so the antivirus believes the signatures are old.

  • The antivirus requires a full system scan before it will clear the alert flag.

Question 16 of 20

During the initial configuration of several new Windows laptops for a small office, a technician discovers that the built-in account named "Administrator" is still using the manufacturer's default credentials. To MOST effectively reduce the risk that an attacker could use publicly known credentials to gain full control of these systems, which of the following actions should the technician perform FIRST?

  • Create a separate standard user account for each employee.

  • Disable SSID broadcast on the office Wi-Fi access point.

  • Enable Remote Desktop Protocol and open TCP port 3389 in the firewall.

  • Rename the built-in Administrator account and set a unique, complex password.

Question 17 of 20

Which of the following is the BEST practice to ensure that a third-party vendor responsible for data destruction has followed proper procedures?

  • Conduct regular in-house inspections.

  • Rely on random audits of the vendor's facilities.

  • Obtain a certification of destruction or recycling from the vendor.

  • Choose a reputable third-party vendor.

Question 18 of 20

While working on resolving a user's network connectivity issue, the technician has tested the network cable, verified network settings, and checked for any software updates. What should be included in the progress notes to ensure clear communication for future follow-up?

  • Tested network cable, verified network settings, checked for software updates.

  • User's computer was restarted, server status was checked.

  • User reported the problem, network cable was replaced.

  • System rebooted, antivirus scan performed, user contacted.

Question 19 of 20

A user reports that their computer frequently experiences sudden shutdowns and sluggish performance.

What is the most likely underlying issue?

  • Overheating components due to dust buildup or inadequate cooling

  • Outdated device drivers

  • Malware infection affecting system performance

  • Excessive startup programs

Question 20 of 20

An organization wants to let traveling executives access a restricted voicemail box by calling in from any phone. The solution must rely on a biometric factor without requiring specialized hardware on the handset or forcing the user to remember additional credentials. Which physical access security control best meets these requirements?

  • Retina scan

  • Facial recognition camera

  • Fingerprint scanner

  • Voiceprint recognition (voice biometrics)