CompTIA A+ Practice Test (220-1202)
Use the form below to configure your CompTIA A+ Practice Test (220-1202). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA A+ 220-1202 (V15) Information
CompTIA A+ Certification Overview
Exam Versions
The current versions of the CompTIA A+ certification exams are:
- 220-1201 (Core 1)
- 220-1202 (Core 2)
These versions were launched in April 2022 and are expected to retire approximately three years from their release date.
The A+ Certification Test
To earn the CompTIA A+ certification, candidates must pass two separate exams: 220-1201 and 220-1202. Each exam has a separate fee and can be taken in any order. Both exams must be completed before the retirement date and must be from the same set of objectives. The certification is valid for three years from the date of passing the exams.
Exam Details:
- Format: Computer-based tests
- Number of Questions: 90 questions per exam
- Time Limit: 90 minutes per exam
- Result Availability: Immediately after completion, following a short mandatory survey
CompTIA A+ 220-1202
The CompTIA A+ 220-1202 (Core 2) exam is an essential part of the A+ certification, focusing on the software and operational aspects of IT support. Launched in April 2022, this exam tests candidates on a variety of critical topics including operating systems, security, software troubleshooting, and operational procedures. The 220-1202 exam comprises 90 questions, featuring a mix of multiple-choice and performance-based questions that simulate real-world IT scenarios. With a 90-minute time limit, candidates must efficiently demonstrate their knowledge and problem-solving skills. The exam is designed to ensure that IT professionals are well-versed in managing and troubleshooting software issues, implementing security measures, and following best practices in IT operations. Successful completion of the 220-1202, alongside the 220-1201, certifies individuals for three years, highlighting their competence and readiness to handle diverse technical challenges in the IT field.
Exam Policies and Procedures
Candidates must agree to CompTIA's exam policies before starting the test. These policies include:
- No Mobile Phones/Devices: Must be left outside the exam room
- Question Review: Candidates can revisit and change answers before submitting the exam
- Submission: Unanswered questions are marked, and a final review is available before submission
Testing Centers
Since July 9, 2012, CompTIA exams are available exclusively through Pearson VUE testing centers. Candidates can book exams online, by phone, or at the testing center. Options include:
- In-Person Testing: At Pearson VUE testing centers
- Online Testing: Through Pearson VUE's online platform
Performance-Based Questions (PBQs)
The A+ exams include Performance-Based Questions (PBQs), which require candidates to perform specific tasks or solve problems in a simulated environment. These questions test real-world skills in areas like command prompts, Windows OS, and networking environments.
Continuing Education (CE) Program
Certifications with the +CE (Continuing Education) suffix, including A+, Network+, and Security+, must be renewed every three years. Renewal options include:
- Retaking the Exam: Passing the latest version of the exam
- Higher-Level Certification: Passing a higher-level CompTIA exam
- CE Program Requirements: Completing CE activities
Lifetime Certifications
Certifications earned on or before December 31, 2010, are valid for life. However, lifetime certifications are no longer available for new candidates.
More reading:
Scroll down to see your responses and detailed results
Free CompTIA A+ 220-1202 (V15) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Operating SystemsSecuritySoftware TroubleshootingOperational Procedures
A user reports that their mobile application will not update and displays an error message when attempting to do so.
What actions should be taken first to resolve this issue?
Restart the device to reset connections
Change the network settings to a public connection
Adjust the date and time settings manually
Check for available storage space on the device
Answer Description
Checking available storage space is crucial because applications typically require free space to download and install updates. If the device is low on storage, the update process can fail or be blocked.
Other options, such as restarting the device or adjusting network settings, may help but addressing the storage issue is often the first step in troubleshooting update failures. Adjusting date and time settings may have minimal impact on updates unless they are drastically incorrect.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is checking available storage space important for app updates?
How can I check available storage space on my device?
What other factors could prevent an app from updating?
Which statement about running 32-bit (x86) and 64-bit (x64) applications on Microsoft Windows is true?
A 64-bit edition of Windows can execute 32-bit applications transparently by using the WOW64 compatibility layer.
Both 32-bit and 64-bit editions of Windows require separate disk partitions to install 32-bit applications.
64-bit editions of Windows can ONLY execute 64-bit applications; 32-bit software must be run inside a virtual machine.
A 32-bit edition of Windows can execute 64-bit applications as long as the CPU supports 64-bit instructions.
Answer Description
64-bit editions of Windows include the WOW64 subsystem, which creates a 32-bit environment so that most 32-bit applications can run without modification. Conversely, a 32-bit edition of Windows cannot load or execute 64-bit binaries because the operating system and processor are running in 32-bit mode. therefore statement A is correct, while the other options contradict these facts. [Microsoft Learn, "Overview of the compatibility considerations for 32-bit programs on 64-bit versions of Windows"]
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does it mean for an application to be 32-bit or 64-bit?
Why can a 64-bit operating system run 32-bit applications?
What are some examples of 32-bit and 64-bit applications?
During a scheduled maintenance window, your team needs to update the organization's email server. According to CompTIA A+ change-management best practices, which of the following details MUST be included on the change-request form?
Purpose of the change
Catering plan for the overnight maintenance crew
Weekly social-media content calendar
Preferred desktop wallpaper for the new webmail portal
Answer Description
Every change request must clearly state the purpose of the change so that all stakeholders understand why the work is necessary and what benefit is expected. Items such as catering plans, décor preferences, or unrelated marketing timelines are not required fields in a change-management document.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is enhancing security features more critical than replacing hardware?
What are some common security features that should be enhanced on an email server?
What risks are associated with not prioritizing security during server updates?
Which of the following statements BEST describes the primary behavior of ransomware?
It encrypts user files and demands payment to regain access.
It displays unwanted advertisements but does not encrypt data.
It uses hidden processes to record keystrokes without detection.
It secretly mines cryptocurrency using system resources.
Answer Description
Ransomware is malicious software that encrypts a victim's files or locks the system and then demands payment-usually in cryptocurrency-in exchange for the decryption key or restored access. Other listed options describe different malware types: displaying ads is characteristic of adware, recording keystrokes fits a keylogger, and covertly using system resources to generate cryptocurrency points to a cryptominer.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is ransomware and how does it work?
What are the common signs of a ransomware infection?
How can I protect my data from ransomware?
A user reports that their desktop is acting strangely: random pop-ups appear and applications open slowly. The help-desk technician suspects the system is infected with malware. According to CompTIA A+ malware-removal best-practice steps, which action should the technician take FIRST to prevent the threat from spreading to other computers on the network?
Use System Restore to roll the system back to an earlier date
Reinstall the operating system from known-good media
Disconnect the network cable or disable Wi-Fi to quarantine the PC
Boot the PC into Safe Mode and run a full antivirus scan
Answer Description
The first containment action in the CompTIA malware-removal sequence is to quarantine the infected system-usually by unplugging the network cable, disabling the Wi-Fi adapter, and isolating any removable media. This stops the malware from communicating with or copying itself to other devices. Booting into Safe Mode and scanning, reinstalling the OS, or using System Restore are remediation steps that occur later in the process.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Safe Mode and how does it help with virus removal?
Why is it not recommended to run a full antivirus scan in normal operational mode first?
What are the risks associated with reinstalling the operating system as a virus removal method?
You have just completed a repair for a client. To ensure all necessary information is documented properly, which of the following is the BEST practice?
List only the problem description and problem resolution.
Document the user's device information and the problem resolution.
Include only the problem description and the user's contact information.
Document the problem description, detailed progress notes, and the problem resolution.
Answer Description
The best practice for documenting services provided involves noting the problem description, progress notes, and problem resolution. This ensures comprehensive details are available for future reference and for any required follow-up.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What should be included in detailed progress notes?
Why is it important to document the problem description?
What is the significance of documenting the problem resolution?
A user calls you and asks to reset his password, you confirm that it is actually the user on the phone, and he says his username is bobsmith, you are in a Linux environment. What is the appropriate command for resetting his password?
su bobsmith
chown bobsmith
sudo passwd bobsmith
sudo pwd bobsmith [password]
Answer Description
"sudo passwd bobsmith" will run the passwd utility as a super user and will prompt you to enter a new password for bobsmith. "chown" is used to change file ownership, the syntax provided is also incorrect. "su bobsmith" will allow you to run commands as bobsmith. The "pwd" command shows your Present Working Directory, it has nothing to do with passwords.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does the 'sudo' command do?
What is the function of the 'passwd' utility?
Why is 'chown' not suitable for resetting a user's password?
You are being trained on the company's process for the physical destruction of hard drives. The method used involves exposing the drives to an intense magnetic field that erases the data and usually leaves the drive permanently inoperable. What is this destruction method called?
Shredding
Degaussing
Drilling
Incinerating
Answer Description
The correct answer is degaussing. A degausser generates a very strong magnetic field that randomizes the magnetic domains on the platters, erasing every bit-including the servo information the drive needs to function-so the drive can no longer be reused.
The other options are also valid destruction techniques, but they work by mechanically or thermally damaging the media, not by magnetic erasure:
- Drilling punches holes through the platters.
- Shredding grinds the drive into small pieces.
- Incinerating melts the drive at high temperature.
Because they do not rely on a magnetic field, these methods are not classified as degaussing.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a degausser and how does it work?
What are the advantages of using degaussing for data destruction?
Are there alternatives to degaussing for hard drive destruction?
You are assisting a user in trying to find a file in their C:\Users folder. You see that some of the folders appear differently than the others, appearing to be faded in, rather than full color. What do these icons refer to?
Folders currently backing up.
Hidden Folders.
Deleted items still utilizing resources.
Cached folders.
Answer Description
Folders that are grey and "ghosted" are hidden folders. These typically hold back-end information or files that the user does not need to access.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are hidden folders and why are they useful?
How do you view hidden folders on a Windows computer?
Can hidden folders contain viruses or malware?
An IT administrator is tasked with securing a workstation used by the HR department to access employee records. Which of the following measures would best protect sensitive data if the workstation is left unattended?
Install a magnetometer
Configure a software firewall
Enable screen saver locks
Change the default administrator’s password
Answer Description
Enabling screen saver locks ensures that the workstation automatically locks after a period of inactivity, preventing unauthorized access to sensitive information when the user is not present. This measure is commonly recommended to enhance physical security.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are screen saver locks and how do they work?
Why is it important to secure workstations in the HR department?
What are some additional measures to enhance workstation security?
What is the primary purpose of utilizing a Virtual Private Network (VPN) when establishing remote access to a corporate network?
To create a secure, encrypted connection over the Internet
To increase the speed of the Internet connection
To change the user's IP address to that of the corporate network
To allow the user direct access to the Internet without using a web browser
Answer Description
A VPN allows the creation of a secure connection to another network over the Internet. It encapsulates and encrypts Internet traffic and data to provide privacy and data integrity, essential when connecting to a corporate network remotely. This ensures that sensitive information is not easily intercepted or compromised by unauthorized parties.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does it mean for a VPN connection to be secure and encrypted?
What are some common protocols used in VPNs for secure connections?
How does using a VPN help protect sensitive information when working remotely?
A user's Windows computer is experiencing frequent application crashes, system freezes, and occasional blue screens of death (BSODs). You suspect that critical system files are corrupted. Which command should you run in an elevated Command Prompt to scan and repair Windows' protected system files?
chkdsk /f
sfc /scannow
sfc /verifyonly
dism /online /cleanup-image /restorehealth
Answer Description
Running sfc /scannow
from an elevated Command Prompt launches the System File Checker utility, which scans the integrity of all protected system files and automatically replaces corrupted or missing versions with a clean cached copy stored in the Windows component store (%WinDir%\WinSxS) or obtained from Windows Update if required. This often resolves instability caused by file corruption.
chkdsk /f
checks a disk volume for logical errors and repairs the file-system structure, but it does not validate individual Windows system files.
dism /online /cleanup-image /restorehealth
repairs the Windows component store itself; it is useful when SFC cannot run, but it is not the primary tool for scanning active system files.
sfc /verifyonly
performs the same integrity scan as SFC but does not attempt any repairs, making it insufficient when immediate remediation is needed.
Reference: Microsoft SFC documentation - the utility "retrieves the correct version of the file from the systemroot folder" when repairs are needed .
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of the 'sfc /scannow' command?
What are some common reasons for system file corruption?
What other commands can be used for system repair in Windows?
A user has reported unusual behavior on their workstation, including files disappearing and unauthorized applications being installed.
What is the most likely cause of this situation?
Spyware
Ransomware
A worm
A Trojan
Answer Description
The symptoms described indicate that a Trojan may be the malware responsible for the issue. Trojans often masquerade as legitimate software to gain access to systems, allowing unauthorized behavior such as file manipulation and application installation.
Other options, such as ransomware, focus on encrypting data for ransom, and a worm replicates itself without needing user interaction, which does not align with the context provided.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Trojan in the context of cybersecurity?
How do Trojans differ from other types of malware?
What steps can be taken to protect against Trojans?
Before performing a significant software update on a Windows operating system, you want to ensure that the system can be rolled back to its previous working state if the update causes problems. What is the BEST action to take immediately before starting the update to allow for quick system recovery?
Enable System Restore (if it is not already enabled) and create a manual restore point.
Defragment the hard disk to ensure optimal performance after the update.
Run a full system antivirus scan to ensure the update files are malware-free.
Delete all system temporary files to free up disk space before the update.
Answer Description
System Restore uses restore points-snapshots of system files, registry settings, and installed programs-to revert Windows to an earlier state. Manually enabling System Restore (if it is disabled) and creating a restore point just before installing a major update captures a known-good configuration, making it possible to undo the update if it introduces instability. Actions such as defragmenting the disk, deleting temporary files, or running an antivirus scan may be useful maintenance steps, but none of them provide a mechanism to restore the system to an earlier configuration.
Sources:
- Microsoft Support, "System Restore," explains that restore points can be created manually before significant events so you can revert the system to that point.
- PCWorld, "Repair Your Windows PC With System Restore," recommends creating a restore point "before making changes to the system or installing new software."
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a System Restore point?
How do I enable System Restore?
What should I do if I encounter problems after an update?
What type of malicious software is designed to replicate itself and spread to other systems through files or programs?
Virus
Ransomware
Trojan
Spyware
Answer Description
Virus - This is correct. A virus is a type of malicious software designed to replicate itself and spread to other systems by attaching itself to files or programs. When an infected file or program is executed, the virus spreads to other files, potentially causing damage or disruption to the system.
Spyware - Spyware is designed to secretly collect information about a user or system, such as browsing habits or sensitive data, without the user’s knowledge. It does not replicate or spread like a virus.
Ransomware - Ransomware encrypts a user's data and demands payment for decryption. While it can spread to other systems in some cases, its primary goal is extortion, not replication.
Trojan - A Trojan disguises itself as legitimate software to trick users into installing it. While it may cause harm or serve as a backdoor for other malicious activities, it does not replicate itself like a virus.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does a virus replicate itself?
What are some common signs that a virus might be present on a computer?
How are viruses different from other types of malware, like ransomware or Trojan horses?
Wow!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.