⚡️ Pass with Confidence Sale - 40% off ALL packages! ⚡️

1 day, 7 hours remaining!
00:20:00

CompTIA A+ Practice Test (220-1202)

Use the form below to configure your CompTIA A+ Practice Test (220-1202). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA A+ 220-1202 (V15)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA A+ 220-1202 (V15) Information

CompTIA A+ Certification Overview

Exam Versions

The current versions of the CompTIA A+ certification exams are:

  • 220-1201 (Core 1)
  • 220-1202 (Core 2)

These versions were launched in April 2022 and are expected to retire approximately three years from their release date.

The A+ Certification Test

To earn the CompTIA A+ certification, candidates must pass two separate exams: 220-1201 and 220-1202. Each exam has a separate fee and can be taken in any order. Both exams must be completed before the retirement date and must be from the same set of objectives. The certification is valid for three years from the date of passing the exams.

Exam Details:

  • Format: Computer-based tests
  • Number of Questions: 90 questions per exam
  • Time Limit: 90 minutes per exam
  • Result Availability: Immediately after completion, following a short mandatory survey

CompTIA A+ 220-1202

The CompTIA A+ 220-1202 (Core 2) exam is an essential part of the A+ certification, focusing on the software and operational aspects of IT support. Launched in April 2022, this exam tests candidates on a variety of critical topics including operating systems, security, software troubleshooting, and operational procedures. The 220-1202 exam comprises 90 questions, featuring a mix of multiple-choice and performance-based questions that simulate real-world IT scenarios. With a 90-minute time limit, candidates must efficiently demonstrate their knowledge and problem-solving skills. The exam is designed to ensure that IT professionals are well-versed in managing and troubleshooting software issues, implementing security measures, and following best practices in IT operations. Successful completion of the 220-1202, alongside the 220-1201, certifies individuals for three years, highlighting their competence and readiness to handle diverse technical challenges in the IT field.

Exam Policies and Procedures

Candidates must agree to CompTIA's exam policies before starting the test. These policies include:

  • No Mobile Phones/Devices: Must be left outside the exam room
  • Question Review: Candidates can revisit and change answers before submitting the exam
  • Submission: Unanswered questions are marked, and a final review is available before submission

Testing Centers

Since July 9, 2012, CompTIA exams are available exclusively through Pearson VUE testing centers. Candidates can book exams online, by phone, or at the testing center. Options include:

  • In-Person Testing: At Pearson VUE testing centers
  • Online Testing: Through Pearson VUE's online platform

Performance-Based Questions (PBQs)

The A+ exams include Performance-Based Questions (PBQs), which require candidates to perform specific tasks or solve problems in a simulated environment. These questions test real-world skills in areas like command prompts, Windows OS, and networking environments.

Continuing Education (CE) Program

Certifications with the +CE (Continuing Education) suffix, including A+, Network+, and Security+, must be renewed every three years. Renewal options include:

  • Retaking the Exam: Passing the latest version of the exam
  • Higher-Level Certification: Passing a higher-level CompTIA exam
  • CE Program Requirements: Completing CE activities

Lifetime Certifications

Certifications earned on or before December 31, 2010, are valid for life. However, lifetime certifications are no longer available for new candidates.

More reading:

Free CompTIA A+ 220-1202 (V15) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 20
  • Time: Unlimited
  • Included Topics:
    Operating Systems
    Security
    Software Troubleshooting
    Operational Procedures
Question 1 of 20

An organization is evaluating an authentication method to centrally manage administrator access to network devices, including routers and switches.

Which of the following protocols is specifically designed for this purpose and provides granular control over authentication, authorization, and accounting (AAA)?

  • Kerberos

  • RADIUS

  • LDAP

  • TACACS+

Question 2 of 20

A user reports that a specific service is not starting on their Windows machine.

What is a common first step to address this issue?

  • Uninstall the related application

  • Check the service's status in the Services management console

  • Update the operating system

  • Reboot the computer

Question 3 of 20

Which feature best characterizes the Temporal Key Integrity Protocol in wireless networking?

  • It uses a fixed encryption key for the entire duration of a session.

  • It generates a unique encryption key for each data packet sent over the network.

  • It applies a more robust encryption algorithm than AES.

  • It is implemented in Bluetooth networks for secure communication.

Question 4 of 20

An office already uses electronic badge readers, CCTV cameras, and motion sensors at each entrance. Management wants an additional control that will actively deter intruders and provide an on-site response capability if a breach occurs. Which physical security measure BEST meets this requirement?

  • Add more motion-activated CCTV cameras with cloud recording

  • Upgrade badge readers to require multifactor authentication

  • Install fixed steel bollards in front of the entrances

  • Deploy trained security guards to monitor the facility and respond to incidents

Question 5 of 20

The security manager at Crucial Technologies wants to help mitigate the possibility of someone being able to access another user’s account by gaining access to the user’s password. What logical security technology should be implemented to satisfy this requirement?

  • MFA

  • WPA2

  • Password complexity rules

  • Encryption

Question 6 of 20

Which of the following documentation practices best facilitates troubleshooting and ensures another technician can resume work on a ticket without confusion?

  • Writing in clear, concise language that avoids jargon while recording the issue, actions taken, and current status

  • Using personal abbreviations and shorthand that only the original technician understands

  • Filling out a standard template but providing only the ticket title and no additional details

  • Copy-pasting long log files verbatim into the notes field without explanation

Question 7 of 20

What is the purpose of the System File Checker (SFC) tool in Windows?

  • To scan and replace corrupted or missing system files

  • To update device drivers

  • To reinstall Windows

  • To scan for malware

Question 8 of 20

What type of malicious software is designed to replicate itself and spread to other systems through files or programs?

  • Ransomware

  • Trojan

  • Virus

  • Spyware

Question 9 of 20

What is the primary purpose of standard operating procedures (SOPs) in a technical environment?

  • To establish a systematic process for the consistent execution of tasks

  • To encourage spontaneous decision-making in technical support scenarios

  • To set vague recommendations that can be interpreted differently by each team member

  • To define a flexible approach to problem-solving without specific guidelines

Question 10 of 20

A technician must upgrade several Windows 10 laptops to Windows 11 during scheduled maintenance. According to best practices for operating-system upgrades, which action should the technician perform first to minimize the risk of data loss and ensure a smooth upgrade process?

  • Temporarily disable any third-party antivirus software.

  • Run Disk Defragmenter to optimize the hard drive.

  • Create a full backup of user data and the current system image.

  • Convert the system volume to the FAT32 file system.

Question 11 of 20

A user is experiencing slow profile load times and intermittent errors when logging into their Windows computer. After careful evaluation, you suspect the Windows user profile has become corrupted. Your immediate action should be to:

  • Increase the size of the user's profile directory by allocating more disk space to their account

  • Rename the user's existing profile folder and have them log in to create a new profile

  • Run a full system antivirus scan to check for malware that may be corrupting the profile

  • Perform a disk defragmentation to optimize file access speeds and improve profile load times

Question 12 of 20

A company's technology team has noticed that employees are using company email accounts to sign up for personal streaming services, resulting in spam and phishing attacks. What should be implemented to prevent this behavior?

  • Increasing email monitoring by the technical team

  • Implementing an Acceptable Use Policy (AUP)

  • Installing anti-spam and phishing software

  • Conducting additional training sessions on cybersecurity

Question 13 of 20

An individual is able to gain access to a list that includes sensitive information of company employees. The list was found in the company trash bin. This is an example of what type of social engineering?

  • Phishing

  • Impersonation

  • Shoulder surfing

  • Dumpster diving

Question 14 of 20

Your CEO often travels and works from public areas. Due to the sensitive nature of the CEO's work you want a solution to prevent other people in the public areas from reading confidential data on the CEO's mobile device screen. What solution can help in this scenario?

  • VPN

  • ACL

  • Data Loss Prevention Policy

  • Privacy Screen

Question 15 of 20

An organization uses RFID key fobs for door access. Which of the following features is typically provided by the access-control software that manages these fobs?

  • One-time passwords sent by SMS

  • Automatic encryption of files stored on the workstation

  • Detection of rogue wireless access points

  • Time-stamped audit logs for each door entry

Question 16 of 20

A Windows 11 laptop is randomly crashing, and you suspect that protected operating-system files have become corrupted. From an elevated Command Prompt, which command-line tool should you run to scan all protected system files and automatically replace any incorrect versions with the correct Microsoft versions?

  • sfc /scannow

  • nslookup

  • chkdsk /f

  • gpupdate /force

Question 17 of 20

A technician is assisting a user who regularly renames files in a directory that contains many similarly named items. To avoid confusion, the user wants File Explorer to always display file-name extensions (such as .docx or .txt). Which setting in File Explorer Options should the technician modify to accomplish this?

  • Under the View tab, uncheck "Hide protected operating system files (Recommended)"

  • Under the View tab, uncheck "Hide extensions for known file types"

  • Under the View tab, uncheck "Always show icons, never thumbnails"

  • Under the General tab, select "This PC" from "Open File Explorer to"

Question 18 of 20

Which type of malware is designed to secretly gather information about a user's activities without their knowledge?

  • Trojan

  • Spyware

  • Rootkit

  • Ransomware

Question 19 of 20

A user with standard (non-administrator) privileges reports a Windows Security notification stating "Windows Defender Firewall is turned off." The user has not made any recent configuration changes, and no Group Policy settings should affect this standalone workstation.

Which of the following is the MOST likely reason the firewall was disabled?

  • A recent Windows Update temporarily turned the firewall off after a successful install.

  • The display driver crashed, causing Windows Security Center to report the firewall as off.

  • Malware on the system has disabled the firewall to avoid detection.

  • Battery saver mode automatically shut down non-essential services, including the firewall.

Question 20 of 20

What is typically displayed in a splash screen when logging into a corporate computer system?

  • A progress bar indicating the status of the system loading its resources.

  • Advertisements for upcoming company events or employee notifications.

  • Legal disclaimers or compliance messages that users must acknowledge before accessing the system.

  • An animated logo or product branding for user entertainment while the system loads.