CompTIA A+ Practice Test (220-1202)
Use the form below to configure your CompTIA A+ Practice Test (220-1202). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA A+ 220-1202 (V15) Information
CompTIA A+ Certification Overview
Exam Versions
The current versions of the CompTIA A+ certification exams are:
- 220-1201 (Core 1)
- 220-1202 (Core 2)
These versions were launched in April 2022 and are expected to retire approximately three years from their release date.
The A+ Certification Test
To earn the CompTIA A+ certification, candidates must pass two separate exams: 220-1201 and 220-1202. Each exam has a separate fee and can be taken in any order. Both exams must be completed before the retirement date and must be from the same set of objectives. The certification is valid for three years from the date of passing the exams.
Exam Details:
- Format: Computer-based tests
- Number of Questions: 90 questions per exam
- Time Limit: 90 minutes per exam
- Result Availability: Immediately after completion, following a short mandatory survey
CompTIA A+ 220-1202
The CompTIA A+ 220-1202 (Core 2) exam is an essential part of the A+ certification, focusing on the software and operational aspects of IT support. Launched in April 2022, this exam tests candidates on a variety of critical topics including operating systems, security, software troubleshooting, and operational procedures. The 220-1202 exam comprises 90 questions, featuring a mix of multiple-choice and performance-based questions that simulate real-world IT scenarios. With a 90-minute time limit, candidates must efficiently demonstrate their knowledge and problem-solving skills. The exam is designed to ensure that IT professionals are well-versed in managing and troubleshooting software issues, implementing security measures, and following best practices in IT operations. Successful completion of the 220-1202, alongside the 220-1201, certifies individuals for three years, highlighting their competence and readiness to handle diverse technical challenges in the IT field.
Exam Policies and Procedures
Candidates must agree to CompTIA's exam policies before starting the test. These policies include:
- No Mobile Phones/Devices: Must be left outside the exam room
- Question Review: Candidates can revisit and change answers before submitting the exam
- Submission: Unanswered questions are marked, and a final review is available before submission
Testing Centers
Since July 9, 2012, CompTIA exams are available exclusively through Pearson VUE testing centers. Candidates can book exams online, by phone, or at the testing center. Options include:
- In-Person Testing: At Pearson VUE testing centers
- Online Testing: Through Pearson VUE's online platform
Performance-Based Questions (PBQs)
The A+ exams include Performance-Based Questions (PBQs), which require candidates to perform specific tasks or solve problems in a simulated environment. These questions test real-world skills in areas like command prompts, Windows OS, and networking environments.
Continuing Education (CE) Program
Certifications with the +CE (Continuing Education) suffix, including A+, Network+, and Security+, must be renewed every three years. Renewal options include:
- Retaking the Exam: Passing the latest version of the exam
- Higher-Level Certification: Passing a higher-level CompTIA exam
- CE Program Requirements: Completing CE activities
Lifetime Certifications
Certifications earned on or before December 31, 2010, are valid for life. However, lifetime certifications are no longer available for new candidates.
More reading:

Free CompTIA A+ 220-1202 (V15) Practice Test
- 20 Questions
- Unlimited
- Operating SystemsSecuritySoftware TroubleshootingOperational Procedures
A building currently uses badge readers that unlock doors when an employee swipes an NFC card. Management wants to add multifactor authentication (MFA) but does not want to purchase biometric scanners. Which change would satisfy the MFA requirement while allowing the existing badge hardware to remain in service?
Replace NFC badges with RFID key fobs that unlock the door on proximity.
Prompt users for a PIN after they swipe their existing NFC badge.
Disable badge readers and instead email a time-based one-time password (OTP) to each employee at the door.
Require employees to swipe the same NFC badge twice in succession.
Answer Description
MFA requires at least two different factor categories (knowledge, possession, or inherence). Swiping an NFC badge is a possession factor. Adding a PIN the user must enter after swiping introduces a knowledge factor, so the system now checks two distinct factors-meeting MFA guidelines. Swiping the badge twice or switching to another possession item (key fob) is still only one factor. Replacing the badge with an emailed OTP removes the possession factor entirely and still uses only one factor unless combined with something else.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between a possession factor and a knowledge factor in MFA?
How does NFC technology work in badge readers?
Why does swiping an NFC badge twice not qualify as MFA?
A user is experiencing frequent desktop alerts claiming that their antivirus protection is disabled. However, the antivirus software appears to be active and up to date when an administrator checks. What should the administrator do next to troubleshoot this issue?
Scan the system for malware.
Reinstall the antivirus software.
Disable the desktop alerts.
Update the operating system.
Answer Description
Scanning the system for malware is the best next step because the false desktop alerts could be a symptom of malware attempting to disable security features or impersonate antivirus warnings. Reinstalling the antivirus or updating the OS may not address potential malware infections, and disabling the alerts could leave the system vulnerable.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why would malware create false desktop alerts about antivirus protection?
How does scanning the system for malware address the issue?
What tools can an administrator use to scan for malware effectively?
What is the purpose of the System File Checker (SFC) tool in Windows?
To scan for malware
To reinstall Windows
To update device drivers
To scan and replace corrupted or missing system files
Answer Description
The System File Checker (SFC) tool is a built-in utility in Windows that scans and replaces corrupted or missing system files with healthy ones. It is a common troubleshooting step to run SFC when experiencing system instability, BSOD, or other system file-related issues. It is not a tool for updating drivers or applications, nor is it a tool for scanning for malware.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How do you run the System File Checker (SFC) tool in Windows?
What common problems can the SFC tool help resolve?
What should you do if SFC cannot repair corrupted system files?
A technician suspects that a network issue is causing slow connectivity to a remote web server. To troubleshoot, the technician needs to analyze the path and measure the transit delays of packets at each intermediate hop. Which command-line tool will provide the most detailed information on the path packets take to reach the target host?
tracert
ipconfig
hostname
ping
Answer Description
tracert
is the correct answer because it sends a sequence of Internet Control Message Protocol (ICMP) echo requests to a specified destination with incrementing Time To Live (TTL) values. At each hop where the TTL expires, the host sends back an ICMP time exceeded message, providing the IP address of the intermediate point and the round-trip time for that segment. This allows the user to see the entire path packets take to the destination, as well as the delays at each hop. ping
, while it measures the round-trip time to the remote host, does not show the intermediate hops. ipconfig
is used for displaying the current network configuration, particularly local addressing information, and hostname
provides the name of the current host, which does not contribute to the tracing of the packet's journey.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is ICMP, and why is it used in the `tracert` command?
What is TTL, and how does it function in the `tracert` command?
How does `tracert` differ from the `ping` command when diagnosing network issues?
A user calls the help desk with an issue that is above what the help desk can fix. The issue is then moved to a more advanced tech who can fix the problem. This is an example of what?
Severity
Description of problems
Categories
Escalation levels
Answer Description
Escalation levels are the different levels of support within an IT service department. The help desk is usually the first to place contacted about an issue. If the help desk is unable to resolve the issue, it is then “escalated” to the next level (also called a tier).
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are escalation levels in IT support?
What is the difference between Tier 1 and Tier 2 support?
How does escalation benefit an organization?
During the initial setup of a new Linux file server, you are asked to choose a filesystem for a 30 TB RAID array that will store large video files. The editors want to keep the volume online while it is grown in the future and during occasional defragmentation jobs. Which filesystem choice meets those requirements best?
FAT32
NTFS
ext4
XFS
Answer Description
XFS is a 64-bit, high-performance journaling filesystem that excels at handling very large files and volumes. It supports online expansion, allowing administrators to grow the filesystem while it is mounted, and it provides an online defragmentation utility (xfs_fsr) that runs without taking the volume offline. ext4 can grow online but its defragmentation options are limited and less effective for multi-terabyte workloads. FAT32 and NTFS are not native Linux choices for large, multi-terabyte data sets, and FAT32 has strict size limits. Therefore, XFS is the most appropriate choice for the stated requirements.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'RAID array' mean?
Why is XFS better suited for large files compared to ext4 in this scenario?
What is journaling in a filesystem like XFS?
You are responsible for managing the backups for a company's critical data. Which type of backup method creates a copy of all selected files and data every time it runs?
Differential
Incremental
Synthetic
Full
Answer Description
A full backup creates a complete copy of all selected files and data every time it runs, regardless of whether the data has changed since the last backup. This is essential for restoring the entire system if needed. Incremental and differential backups, on the other hand, only save changes made since previous backups, making them faster but requiring a full backup as a base for restoration.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the advantages and disadvantages of a full backup?
How do incremental backups differ from full backups?
What is the purpose of differential backups, and how do they compare to full backups?
While entering a secure data-center door that requires badge access, you notice an unfamiliar individual slip in directly behind you without presenting a badge or swiping the reader. What is the most appropriate immediate action to maintain physical security?
Prop the door open so they can retrieve their badge from a colleague
Assume they are an authorized contractor and continue to your workstation
Politely challenge the person and escort them to security or request a valid badge
Lend them your badge so they can swipe in once inside
Answer Description
This scenario describes tailgating-an unauthorized person following an authorized badge holder into a restricted area. Company policy should require you to stop or politely challenge the individual and direct them to show a valid badge or check in with security. Allowing entry without verification, lending your badge, or propping the door open defeats the access-control system and exposes the facility to physical compromise.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is tailgating in physical security?
Why is challenging unauthorized individuals important?
What are some best practices for preventing tailgating?
In the context of logical security, what does MDM stand for?
Mobile Device Management
Meta Data Management
Master Data Management
Malware Detection Microprocessor
Answer Description
Mobile Device Management (MDM) software is used to manage groups of mobile devices like smartphones and tablets. Because these devices run different operating systems than their PC counterparts, are often used by employees at home or on public wireless networks and can download applications from app stores, special management software is needed to ensure their security.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the main functions of MDM in logical security?
How does MDM differ from antivirus software?
What role does MDM play in BYOD (Bring Your Own Device) environments?
In an IT support ticketing system, why is it important to record the requester's (user's) information along with the technical issue they report?
It lets the ticketing system automatically close the ticket without human review once enough data is gathered.
It enables the marketing team to group users for promotional email campaigns.
It gives technicians essential context and contact details to troubleshoot effectively and follow up on the request.
It allows the organization to charge the user or department directly for the time spent on support.
Answer Description
User information-such as name, department, and contact details-provides context that helps technicians diagnose problems in the user's specific environment, follow up for additional details, and document ownership of the request. Without it, tracking, prioritizing, and communicating about the ticket become difficult.
Incorrect answers:
- Billing the user is handled by other processes, not the primary reason for collecting contact details.
- Marketing segmentation is unrelated to technical support activities.
- Automatic ticket closure without technician review would risk unresolved issues and is not a standard function of user-info fields.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is user information essential in troubleshooting IT issues?
How do organizations track ticket ownership?
Are user details used for billing or marketing purposes in IT support?
Which Windows feature provides full-disk encryption by encrypting the entire drive and can require a PIN, password, or startup key before the operating system boots?
System Restore
BitLocker Drive Encryption
File History
Encrypting File System (EFS)
Answer Description
BitLocker Drive Encryption is Microsoft's built-in full-disk encryption solution. It encrypts the entire volume and, when configured with a TPM PIN, password, or startup key, blocks access until the correct authentication method is supplied at boot. Encrypting File System (EFS) works only at the file or folder level, System Restore merely rolls system files back to a previous state, and File History is a backup tool; none of these protect the whole drive at startup. [Microsoft Learn - BitLocker overview]
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the role of the TPM in BitLocker?
How is BitLocker different from Encrypting File System (EFS)?
What happens if I lose the BitLocker recovery key?
A cybersecurity analyst must examine several suspicious email attachments without endangering the analyst's laptop or the corporate network. Each session should start from a clean state so any malicious changes are discarded automatically after the test. Which of the following purposes of a virtual machine BEST meets these requirements?
Sandbox virtual machine
Cross-platform virtualization
Application virtualization for legacy software
Test/development virtual machine
Answer Description
A sandbox virtual machine is designed for isolated, disposable testing. It keeps potential malware contained and can be reverted or destroyed after each run, ensuring no impact on the host operating system. Test/development VMs focus on building software, and application or cross-platform virtualization solve compatibility issues rather than providing strong isolation.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a sandbox virtual machine?
How is a sandbox VM different from a test/development VM?
Why are application virtualization or cross-platform virtualization unsuitable for this purpose?
What is the safest way to prepare for working on a powered device?
Turn off the device using the power button instead of unplugging.
Use a surge protector to safeguard against power surges during repairs.
Ground yourself with an ESD strap to prevent static discharge.
Unplug the device from the power source before starting any work.
Answer Description
The most effective way to ensure safety when working on a powered device is to unplug it from the power source. This step eliminates the risk of electric shock and accidental activation of the device.
Although other methods like using grounding techniques can reduce risks, they do not completely remove the potential danger as unplugging does. Always ensure the device is completely powered down before beginning repairs.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is unplugging the device safer than just turning it off?
What is an ESD strap and why isn’t it enough for safety?
What precautions should be taken after unplugging the device?
You are a systems administrator comparing multifactor authentication (MFA) methods for employee logins. Which of the following BEST explains why using SMS text messages as the second factor is considered less secure than using an authenticator app or hardware token?
Mobile-carrier fees for each text message raise operational costs.
SMS codes work only over Wi-Fi networks, limiting availability to traveling users.
Attackers can divert or intercept SMS codes through SIM-swapping or SS7 attacks.
SMS text messages are protected by strong end-to-end encryption that prevents interception.
Answer Description
SMS provides a second factor, but it relies on a phone number delivered across the public telephone network instead of a cryptographic secret stored on a trusted device. Attackers can use social-engineering techniques to transfer the victim's number to a new SIM card or exploit weaknesses in carrier signaling (such as SS7), letting them receive the one-time codes and bypass MFA. Authenticator apps and hardware tokens generate the codes locally and are not subject to carrier-network interception, so they offer stronger protection.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is SIM-swapping, and how does it compromise SMS-based MFA?
What is SS7, and why is it a security vulnerability for SMS-based MFA?
How do authenticator apps and hardware tokens enhance security compared to SMS codes?
What part of a ticketing system correlates to the urgency at which the issue needs to be addressed?
Escalation levels
Description of problems
Severity
Categories
Answer Description
Severity levels are used within a ticketing system to signify the urgency that a ticket needs to be addressed. This is usually reflected using the quantifiers, low, medium and high.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of severity levels in a ticketing system?
How do severity levels differ from escalation levels?
What factors influence how severity levels are assigned?
While troubleshooting a desktop PC that will not start Windows, you observe the following:
- After the POST completes, a black screen displays the message "Operating system not found."
- Entering the UEFI firmware setup shows that the internal NVMe SSD is not listed in the Boot Priority list.
Which of the following is the MOST likely cause of this error?
The NVMe SSD is disconnected or has failed.
The workstation is configured to obtain its IP address via DHCP.
Secure Boot is disabled in UEFI.
The monitor's video driver is outdated.
Answer Description
The UEFI firmware cannot list or hand off control to an operating-system loader if it does not detect a physical boot device. A loose cable, failed NVMe module, or otherwise unreadable drive will therefore trigger the "Operating system not found" message. Secure Boot settings, video-driver problems, or DHCP configuration do not prevent the firmware from detecting and listing the drive itself.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the role of UEFI firmware in booting a system?
Why might an NVMe SSD not appear in the Boot Priority list?
How does a failed or disconnected NVMe SSD cause the 'Operating system not found' error?
You are an IT technician at a medium-sized company and you've detected malware on one of the computers within the network. Your company maintains sensitive customer data and it's critical to prevent any further infection or data breach. What is your FIRST course of action to mitigate the threat?
Immediately shut down the computer to prevent any further actions by the malware
Notify all employees about the infection before taking any technical measures
Begin a full system antivirus scan
Disconnect the computer from the network
Answer Description
The first step in dealing with a malware infection is to quarantine the affected system to prevent the malware from spreading to other systems on the network or accessing network resources. Disconnecting the computer from the network can be achieved by physically unplugging it from the network or disabling its network connection. Isolation prevents malware from communicating with any command-and-control servers and stops it from spreading laterally across the network.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is disconnecting a computer from the network the first step in handling malware?
How do you disconnect a computer from the network effectively?
What is lateral movement in the context of malware?
A help-desk technician needs to enable BitLocker drive encryption on a user's Windows 10 laptop, but the option is not available in Settings. The user also wants to allow incoming Remote Desktop connections, yet that setting is missing, and the computer cannot join the company's on-premises Active Directory domain. The laptop was purchased retail for personal use and has never been upgraded.
Which Windows 10 edition is MOST likely installed on this PC?
Pro
Enterprise
Home
Pro for Workstations
Answer Description
Home - Correct. Windows 10 Home is aimed at consumers and lacks enterprise features such as BitLocker management, Remote Desktop host, and domain join.
Pro - Incorrect. Pro includes BitLocker, Remote Desktop host, and the ability to join a domain.
Enterprise - Incorrect. Enterprise builds on Pro with even more advanced security and deployment tools.
Pro for Workstations - Incorrect. This edition adds features for high-end hardware (e.g., ReFS, SMB Direct) and still includes BitLocker and Remote Desktop host capabilities.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is BitLocker and why is it unavailable in Windows 10 Home?
What is the Remote Desktop host feature, and why is it missing in Windows 10 Home?
What is the purpose of joining a Windows device to an Active Directory domain?
During checkpoint screening at a corporate data center, visitors walk through a magnetometer before accessing the lobby. Which statement best describes what the magnetometer does?
It captures millimeter-wave images to visualize non-metallic contraband hidden under clothing.
It weighs each person using load cells and flags differences that could indicate hidden items.
It monitors ionizing radiation levels to prevent radioactive materials from entering the facility.
It measures disturbances in a magnetic field to reveal ferromagnetic objects such as concealed weapons.
Answer Description
A magnetometer senses changes in a magnetic field. When a person carrying a ferromagnetic object (such as a firearm or knife) passes through its detection zone, the metal disturbs the field and triggers an alarm. This makes magnetometers effective for locating concealed weapons during security screenings. They do not create body-scan images, measure radiation, or weigh individuals.
- Magnetometer security systems use magnetic-field variations to identify metallic threats.
- Magnetometers can be used as metal detectors, detecting only magnetic (ferrous) metals.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does a magnetometer detect ferromagnetic objects?
What is the difference between ferromagnetic and non-ferromagnetic metals?
Are magnetometers the same as standard metal detectors?
A Windows 10 desktop began displaying a blue screen with the stop code "VIDEO_TDR_FAILURE" and immediately reboots whenever normal mode is selected. The user states a new graphics-card driver was installed from the manufacturer's website earlier in the day. The system will start successfully in Safe Mode with networking. Which action should the technician take first to restore normal operation?
Use Device Manager in Safe Mode to roll back the display adapter driver
Physically replace the graphics card with a known-good unit
Disable TDR (Timeout Detection and Recovery) by editing the registry
Run the command DISM /online /cleanup-image /restorehealth
Answer Description
The VIDEO_TDR_FAILURE stop code is almost always produced by an unstable or incompatible video driver. Because the system will boot in Safe Mode (which loads a basic Microsoft display driver), the quickest non-destructive fix is to roll back the recently installed driver in Device Manager. DISM and other file-repair tools target corrupted system files, not bad drivers, and replacing hardware or editing the registry should be attempted only after confirming the driver itself is not the cause.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the role of Device Manager in troubleshooting drivers?
What does the TDR (Timeout Detection and Recovery) process do in Windows?
When should DISM be used instead of rolling back a driver?
Smashing!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.