Labor Day Flash Sale: 30% off Today Only!

4 hours, 3 minutes remaining!
00:15:00

CompTIA A+ Practice Test (220-1202)

Use the form below to configure your CompTIA A+ Practice Test (220-1202). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA A+ 220-1202 (V15)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA A+ 220-1202 (V15) Information

CompTIA A+ Certification Overview

Exam Versions

The current versions of the CompTIA A+ certification exams are:

  • 220-1201 (Core 1)
  • 220-1202 (Core 2)

These versions were launched in April 2022 and are expected to retire approximately three years from their release date.

The A+ Certification Test

To earn the CompTIA A+ certification, candidates must pass two separate exams: 220-1201 and 220-1202. Each exam has a separate fee and can be taken in any order. Both exams must be completed before the retirement date and must be from the same set of objectives. The certification is valid for three years from the date of passing the exams.

Exam Details:

  • Format: Computer-based tests
  • Number of Questions: 90 questions per exam
  • Time Limit: 90 minutes per exam
  • Result Availability: Immediately after completion, following a short mandatory survey

CompTIA A+ 220-1202

The CompTIA A+ 220-1202 (Core 2) exam is an essential part of the A+ certification, focusing on the software and operational aspects of IT support. Launched in April 2022, this exam tests candidates on a variety of critical topics including operating systems, security, software troubleshooting, and operational procedures. The 220-1202 exam comprises 90 questions, featuring a mix of multiple-choice and performance-based questions that simulate real-world IT scenarios. With a 90-minute time limit, candidates must efficiently demonstrate their knowledge and problem-solving skills. The exam is designed to ensure that IT professionals are well-versed in managing and troubleshooting software issues, implementing security measures, and following best practices in IT operations. Successful completion of the 220-1202, alongside the 220-1201, certifies individuals for three years, highlighting their competence and readiness to handle diverse technical challenges in the IT field.

Exam Policies and Procedures

Candidates must agree to CompTIA's exam policies before starting the test. These policies include:

  • No Mobile Phones/Devices: Must be left outside the exam room
  • Question Review: Candidates can revisit and change answers before submitting the exam
  • Submission: Unanswered questions are marked, and a final review is available before submission

Testing Centers

Since July 9, 2012, CompTIA exams are available exclusively through Pearson VUE testing centers. Candidates can book exams online, by phone, or at the testing center. Options include:

  • In-Person Testing: At Pearson VUE testing centers
  • Online Testing: Through Pearson VUE's online platform

Performance-Based Questions (PBQs)

The A+ exams include Performance-Based Questions (PBQs), which require candidates to perform specific tasks or solve problems in a simulated environment. These questions test real-world skills in areas like command prompts, Windows OS, and networking environments.

Continuing Education (CE) Program

Certifications with the +CE (Continuing Education) suffix, including A+, Network+, and Security+, must be renewed every three years. Renewal options include:

  • Retaking the Exam: Passing the latest version of the exam
  • Higher-Level Certification: Passing a higher-level CompTIA exam
  • CE Program Requirements: Completing CE activities

Lifetime Certifications

Certifications earned on or before December 31, 2010, are valid for life. However, lifetime certifications are no longer available for new candidates.

More reading:

Free CompTIA A+ 220-1202 (V15) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    Operating Systems
    Security
    Software Troubleshooting
    Operational Procedures
Question 1 of 15

A user reports that their mobile application will not update and displays an error message when attempting to do so.

What actions should be taken first to resolve this issue?

  • Restart the device to reset connections

  • Change the network settings to a public connection

  • Adjust the date and time settings manually

  • Check for available storage space on the device

Question 2 of 15

Which statement about running 32-bit (x86) and 64-bit (x64) applications on Microsoft Windows is true?

  • A 64-bit edition of Windows can execute 32-bit applications transparently by using the WOW64 compatibility layer.

  • Both 32-bit and 64-bit editions of Windows require separate disk partitions to install 32-bit applications.

  • 64-bit editions of Windows can ONLY execute 64-bit applications; 32-bit software must be run inside a virtual machine.

  • A 32-bit edition of Windows can execute 64-bit applications as long as the CPU supports 64-bit instructions.

Question 3 of 15

During a scheduled maintenance window, your team needs to update the organization's email server. According to CompTIA A+ change-management best practices, which of the following details MUST be included on the change-request form?

  • Purpose of the change

  • Catering plan for the overnight maintenance crew

  • Weekly social-media content calendar

  • Preferred desktop wallpaper for the new webmail portal

Question 4 of 15

Which of the following statements BEST describes the primary behavior of ransomware?

  • It encrypts user files and demands payment to regain access.

  • It displays unwanted advertisements but does not encrypt data.

  • It uses hidden processes to record keystrokes without detection.

  • It secretly mines cryptocurrency using system resources.

Question 5 of 15

A user reports that their desktop is acting strangely: random pop-ups appear and applications open slowly. The help-desk technician suspects the system is infected with malware. According to CompTIA A+ malware-removal best-practice steps, which action should the technician take FIRST to prevent the threat from spreading to other computers on the network?

  • Use System Restore to roll the system back to an earlier date

  • Reinstall the operating system from known-good media

  • Disconnect the network cable or disable Wi-Fi to quarantine the PC

  • Boot the PC into Safe Mode and run a full antivirus scan

Question 6 of 15

You have just completed a repair for a client. To ensure all necessary information is documented properly, which of the following is the BEST practice?

  • List only the problem description and problem resolution.

  • Document the user's device information and the problem resolution.

  • Include only the problem description and the user's contact information.

  • Document the problem description, detailed progress notes, and the problem resolution.

Question 7 of 15

A user calls you and asks to reset his password, you confirm that it is actually the user on the phone, and he says his username is bobsmith, you are in a Linux environment. What is the appropriate command for resetting his password?

  • su bobsmith

  • chown bobsmith

  • sudo passwd bobsmith

  • sudo pwd bobsmith [password]

Question 8 of 15

You are being trained on the company's process for the physical destruction of hard drives. The method used involves exposing the drives to an intense magnetic field that erases the data and usually leaves the drive permanently inoperable. What is this destruction method called?

  • Shredding

  • Degaussing

  • Drilling

  • Incinerating

Question 9 of 15

You are assisting a user in trying to find a file in their C:\Users folder. You see that some of the folders appear differently than the others, appearing to be faded in, rather than full color. What do these icons refer to?

  • Folders currently backing up.

  • Hidden Folders.

  • Deleted items still utilizing resources.

  • Cached folders.

Question 10 of 15

An IT administrator is tasked with securing a workstation used by the HR department to access employee records. Which of the following measures would best protect sensitive data if the workstation is left unattended?

  • Install a magnetometer

  • Configure a software firewall

  • Enable screen saver locks

  • Change the default administrator’s password

Question 11 of 15

What is the primary purpose of utilizing a Virtual Private Network (VPN) when establishing remote access to a corporate network?

  • To create a secure, encrypted connection over the Internet

  • To increase the speed of the Internet connection

  • To change the user's IP address to that of the corporate network

  • To allow the user direct access to the Internet without using a web browser

Question 12 of 15

A user's Windows computer is experiencing frequent application crashes, system freezes, and occasional blue screens of death (BSODs). You suspect that critical system files are corrupted. Which command should you run in an elevated Command Prompt to scan and repair Windows' protected system files?

  • chkdsk /f

  • sfc /scannow

  • sfc /verifyonly

  • dism /online /cleanup-image /restorehealth

Question 13 of 15

A user has reported unusual behavior on their workstation, including files disappearing and unauthorized applications being installed.

What is the most likely cause of this situation?

  • Spyware

  • Ransomware

  • A worm

  • A Trojan

Question 14 of 15

Before performing a significant software update on a Windows operating system, you want to ensure that the system can be rolled back to its previous working state if the update causes problems. What is the BEST action to take immediately before starting the update to allow for quick system recovery?

  • Enable System Restore (if it is not already enabled) and create a manual restore point.

  • Defragment the hard disk to ensure optimal performance after the update.

  • Run a full system antivirus scan to ensure the update files are malware-free.

  • Delete all system temporary files to free up disk space before the update.

Question 15 of 15

What type of malicious software is designed to replicate itself and spread to other systems through files or programs?

  • Virus

  • Ransomware

  • Trojan

  • Spyware