CompTIA A+ Practice Test (220-1202)
Use the form below to configure your CompTIA A+ Practice Test (220-1202). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA A+ 220-1202 Information
CompTIA A+ Certification Overview
Exam Versions
The current versions of the CompTIA A+ certification exams are:
- 220-1201 (Core 1)
- 220-1202 (Core 2)
These versions were launched in April 2022 and are expected to retire approximately three years from their release date.
The A+ Certification Test
To earn the CompTIA A+ certification, candidates must pass two separate exams: 220-1201 and 220-1202. Each exam has a separate fee and can be taken in any order. Both exams must be completed before the retirement date and must be from the same set of objectives. The certification is valid for three years from the date of passing the exams.
Exam Details:
- Format: Computer-based tests
- Number of Questions: 90 questions per exam
- Time Limit: 90 minutes per exam
- Result Availability: Immediately after completion, following a short mandatory survey
CompTIA A+ 220-1202
The CompTIA A+ 220-1202 (Core 2) exam is an essential part of the A+ certification, focusing on the software and operational aspects of IT support. Launched in April 2022, this exam tests candidates on a variety of critical topics including operating systems, security, software troubleshooting, and operational procedures. The 220-1202 exam comprises 90 questions, featuring a mix of multiple-choice and performance-based questions that simulate real-world IT scenarios. With a 90-minute time limit, candidates must efficiently demonstrate their knowledge and problem-solving skills. The exam is designed to ensure that IT professionals are well-versed in managing and troubleshooting software issues, implementing security measures, and following best practices in IT operations. Successful completion of the 220-1202, alongside the 220-1201, certifies individuals for three years, highlighting their competence and readiness to handle diverse technical challenges in the IT field.
Exam Policies and Procedures
Candidates must agree to CompTIA's exam policies before starting the test. These policies include:
- No Mobile Phones/Devices: Must be left outside the exam room
- Question Review: Candidates can revisit and change answers before submitting the exam
- Submission: Unanswered questions are marked, and a final review is available before submission
Testing Centers
Since July 9, 2012, CompTIA exams are available exclusively through Pearson VUE testing centers. Candidates can book exams online, by phone, or at the testing center. Options include:
- In-Person Testing: At Pearson VUE testing centers
- Online Testing: Through Pearson VUE's online platform
Performance-Based Questions (PBQs)
The A+ exams include Performance-Based Questions (PBQs), which require candidates to perform specific tasks or solve problems in a simulated environment. These questions test real-world skills in areas like command prompts, Windows OS, and networking environments.
Continuing Education (CE) Program
Certifications with the +CE (Continuing Education) suffix, including A+, Network+, and Security+, must be renewed every three years. Renewal options include:
- Retaking the Exam: Passing the latest version of the exam
- Higher-Level Certification: Passing a higher-level CompTIA exam
- CE Program Requirements: Completing CE activities
Lifetime Certifications
Certifications earned on or before December 31, 2010, are valid for life. However, lifetime certifications are no longer available for new candidates.
More reading:
Scroll down to see your responses and detailed results
Free CompTIA A+ 220-1202 Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Operating SystemsSecuritySoftware TroubleshootingOperational Procedures
A user reports that their documents and settings are not being saved correctly after logging onto a computer within a corporate network.
What setting might need to be verified?
Ensure that the computer is connected to the internet.
Verify the home folder is correctly configured in Active Directory.
Check if the user has administrative rights on their workstation.
Look into the default file locations set in the user's local profile.
Answer Description
The home folder is a specific directory assigned to a user account that stores their personal files and settings. If the home folder is not configured correctly in Active Directory, the user may experience issues with data accessibility and persistence. Ensuring the home folder is set up properly would resolve these issues.
Other answers may relate to user permissions or profile settings, but they would not specifically address the necessity of a correctly configured home folder.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Active Directory and how does it relate to home folders?
What are the consequences of an improperly configured home folder?
How can I verify if a user's home folder is set correctly?
System notifications advising that the firewall has been disabled, despite no recent changes made by the user, can indicate the presence of malware.
True
False
Answer Description
System notifications indicating that the firewall or other security features have been disabled without user intervention can suggest that malware may be trying to weaken the system's defenses to prevent detection or removal. This behavior is a manipulation tactic used by some forms of malware to maintain persistence on the infected system, making it more difficult for security measures to block malicious activities.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is malware and how does it affect my system?
What role does a firewall play in computer security?
What can I do if I suspect malware on my device?
Desktop alerts that persistently prompt a user to pay for virus removal or protection software are generally safe and can be trusted as legitimate warnings.
True
False
Answer Description
Persistent desktop alerts that prompt a user to pay for virus removal or protection software are likely a form of malware known as scareware. Scareware attempts to create a sense of panic or threat, coercing the user into purchasing unneeded and often harmful services or software. These alerts should not be trusted and indicate that the system may be compromised. Therefore, such alerts are not safe, and the user should not follow these prompts without verifying the legitimacy of the alerts through reputable security applications.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is scareware?
How can I verify if a desktop alert is legitimate?
What should I do if I get a persistent alert about virus removal?
A user's Windows computer is experiencing frequent application crashes, system freezes, and occasional blue screens of death (BSODs). You suspect that some system files might be corrupted. Which of the following commands should you run in an elevated Command Prompt to scan and repair protected system files?
chkdsk /f
sfc /verifyonly
dism /online /cleanup-image /restorehealth
sfc /scannow
Answer Description
Running sfc /scannow
in an elevated Command Prompt is the correct way to initiate a System File Check (SFC) scan, which will scan all protected system files and replace corrupted files with cached copies from the Windows installation media. This can often resolve issues caused by corrupted system files.
chkdsk /f
is used to check the disk for errors and fix them, but it does not specifically target system files. dism /online /cleanup-image /restorehealth
is used to repair the Windows image, which can be helpful in some cases, but it's not the primary tool for replacing corrupted system files. sfc /verifyonly
only scans for corrupted files but does not attempt to repair them, making it less effective in resolving the issue at hand.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of the 'sfc /scannow' command?
What are some common reasons for system file corruption?
What other commands can be used for system repair in Windows?
Which backup strategy ensures that data is preserved and protected against local disasters?
Off-site backups are stored in different locations to protect data from local disasters.
On-site backups provide faster data retrieval, but they do not address the risks posed by local disasters.
Both on-site and off-site backups are designed to store data effectively in case of emergencies.
Off-site backups are used for secure storage, providing protection against data loss.
Answer Description
Off-site backups are stored in different locations to protect data from local disasters - This is correct. Off-site backups ensure data is stored in geographically separate locations, protecting it from local disasters such as fires, floods, or theft that could affect on-site storage.
On-site backups provide faster data retrieval, but they do not address the risks posed by local disasters - This is true, but it is not the best strategy for protecting data against local disasters. On-site backups are vulnerable to the same risks as the primary data source.
Both on-site and off-site backups are designed to store data effectively in case of emergencies - While both types of backups are effective in different scenarios, only off-site backups provide robust protection against local disasters.
Off-site backups are used for secure storage, providing protection against data loss - While off-site backups do protect against data loss, this statement does not specifically address protection against local disasters.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some examples of off-site backup solutions?
How do I implement an effective off-site backup strategy?
What are the risks of relying solely on on-site backups?
A company is transitioning to solid-state drives and needs to securely prepare their existing mechanical hard drives for donation. To ensure data cannot be retrieved by third parties but still provide functional drives to the recipients, what process should be followed?
Fill the drives with dummy data files until the storage is full, then format the drives.
Dismantle the drives and manually scratch the magnetic platters before the donation.
Run a software-based data sanitization tool on the drives to overwrite existing data with random patterns.
Perform a quick format and encrypt the remaining data on each drive to prevent easy access.
Answer Description
The correct process is to use a software-based data sanitization tool that adheres to a recognized standard (like DoD 5220.22-M) for securely erasing the content of the drive. This tool overwrites all sectors with patterns of data to effectively prevent data recovery.
A quick format only removes the address tables and does not erase data thoroughly; recovery software could potentially retrieve the data. Encryption of existing data without the erasure does not remove the data, so if the encryption is broken, the data could be compromised. Dismantling the drive contradicts the goal of repurposing as it destroys the hardware.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a software-based data sanitization tool?
What does DoD 5220.22-M mean, and why is it important?
What is the difference between a quick format and a full format?
You work as an IT support technician. A user called the help desk reporting they think their system has been infected by malware. Using best practice procedures for malware removal, what should be your first step?
Quarantine infected systems
Disable system restore in Windows
Educate the end user
Investigate and verify malware symptoms
Answer Description
Before you began any other troubleshooting steps you need to verify that the user’s system is infected with malware. You should investigate and verify malware symptoms then progress through the rest of the steps.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are common symptoms of malware infection?
Why is investigating and verifying malware symptoms important before taking action?
What are best practices for malware removal after confirming infection?
Permissions set on a parent folder are automatically applied to all its child objects by default.
True
False
Answer Description
The statement is true because in NTFS (New Technology File System), permissions on a parent folder are typically inherited by all its child files and subfolders unless explicitly overridden. This ensures the consistent application of access rules throughout an entire directory structure, reducing the risk of accidental security gaps.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are NTFS permissions?
What does it mean for permissions to be inherited?
How can I override inherited permissions?
The 4 GB maximum file size limit and 2 TB maximum partition size limit are the characteristic features of:
exFAT
FAT32
NTFS
NFS
Answer Description
These limitations are only for the FAT32 file system and cannot be modified.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is FAT32 and how does it differ from other file systems?
Why is the 4 GB file size limit a concern for modern applications?
What are the advantages and disadvantages of using FAT32?
The command tracert can only be used in Windows operating systems.
False
True
Answer Description
This statement is False.
This is because tracert is the command used in Windows operating systems, while traceroute serves the same function in UNIX and Linux systems. Understanding both commands is important for troubleshooting network paths and identifying connectivity issues, as they provide similar outputs that map the route packets take from the source to the destination, helping to pinpoint where delays or failures may occur.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does the tracert command do?
What is the traceroute command and how does it differ from tracert?
Why is it important to understand both tracert and traceroute?
A technician needs to reimage a system that is failing to boot properly. The system has important data that needs to be preserved. Which of the following steps should the technician take FIRST to ensure both the reimaging process and data preservation?
Perform a clean installation of the operating system.
Boot the system using a live OS and back up the data to an external drive.
Replace the system's hard drive with a new one.
Run a disk defragmentation on the primary drive.
Answer Description
The correct step is to boot the system using a live operating system and then back up the data to an external drive. This approach ensures that all critical data is secured before reimaging, preventing data loss where possible.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a live operating system?
Why is data backup important before reimaging?
What tools or methods can be used to back up data in a live OS?
An employee reports that their company-issued smartphone has started rebooting randomly throughout the day. As a first step in troubleshooting, which of the following actions should the IT support team initially consider to address the problem?
Update the operating system
Check for recent updates or new apps that may cause instability
Replace the smartphone battery
Perform a factory reset
Answer Description
Checking for recent updates or new apps is a fundamental first step in the troubleshooting process for devices experiencing random reboots. This involves determining whether any new software installs or updates occurred prior to the issue arising, as they could be incompatible with the device's existing system or contain bugs causing instability. While other troubleshooting actions such as testing battery health, updating the operating system, or performing a factory reset may ultimately be necessary depending on the situation, these would generally follow an initial review of recent system changes.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What types of updates should I check for on the smartphone?
How can I determine if a new app is causing the reboot issue?
What other common reasons might cause a smartphone to reboot randomly?
A user reports that a specific service is not starting on their Windows machine.
What is a common first step to address this issue?
Uninstall the related application
Reboot the computer
Update the operating system
Check the service's status in the Services management console
Answer Description
The correct answer is to check the service's status in the Services management console, as this allows you to see if the service is disabled or stopped. If the service is stopped, you can attempt to start it from this interface. This is the initial step in diagnosing why a service won't start.
Other options, like uninstalling an application or rebooting the system, are broader and may not directly address the specific issue of a service failing to start.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the Services management console in Windows?
What types of service statuses can I see in the Services management console?
Why might a service fail to start on a Windows machine?
A user reports that their smartphone battery is draining much more quickly than normal, the device is overheating, and there are unfamiliar applications installed. The user admits to recently downloading an app from a third-party website. Which of the following is the MOST likely explanation for these issues?
The device is in need of an OS update to fix the battery life bug.
The device has probably been infected with malware from the third-party app installation.
The user has enabled developer mode, unintentionally causing these issues.
The battery needs to be replaced due to normal wear and tear.
Answer Description
The symptoms described are indicative of a malicious application being installed on the user's device, which can cause increased battery usage, overheating, and introduce unfamiliar applications. Third-party websites often lack the stringent security measures that official app stores have, making it easier to inadvertently download malware-ridden applications. The user's decision to download an app from such a source has likely led to these issues.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is malware, and how does it affect my device?
Why is downloading apps from third-party websites risky?
What steps can I take if my device is infected with malware?
A company is looking to implement a robust backup strategy for their mission-critical data. Which of the following scenarios best aligns with the 3-2-1 backup rule?
The company uses a single cloud storage service to make weekly backups of all their data.
The company stores all backups on different servers within the same onsite data center.
The company has one on-site backup on a network-attached storage device, one off-site backup stored in the cloud, and the original data on the company servers.
The company has one backup on an external hard drive kept in a safe onsite and makes regular backups on the same network the original data is stored.
Answer Description
The correct answer follows the 3-2-1 backup rule which states there should be 3 total copies of your data: 1 primary copy and 2 backups; 2 of the copies should be on different media or platforms; and at least 1 copy should be offsite. The correct answer includes 1 onsite backup, 1 offsite backup, and the original data set, with backups on different media, satisfying the rule's requirements. The incorrect answers do not fully comply with the 3-2-1 rule, either they don't provide two forms of media or they lack an offsite backup option.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the 3-2-1 backup rule?
Why is it important to have backups on different media?
What are the potential risks of not following the 3-2-1 rule?
Gnarly!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.