CompTIA A+ Practice Test (220-1202)
Use the form below to configure your CompTIA A+ Practice Test (220-1202). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA A+ 220-1202 (V15) Information
CompTIA A+ Certification Overview
Exam Versions
The current versions of the CompTIA A+ certification exams are:
- 220-1201 (Core 1)
- 220-1202 (Core 2)
These versions were launched in April 2022 and are expected to retire approximately three years from their release date.
The A+ Certification Test
To earn the CompTIA A+ certification, candidates must pass two separate exams: 220-1201 and 220-1202. Each exam has a separate fee and can be taken in any order. Both exams must be completed before the retirement date and must be from the same set of objectives. The certification is valid for three years from the date of passing the exams.
Exam Details:
- Format: Computer-based tests
- Number of Questions: 90 questions per exam
- Time Limit: 90 minutes per exam
- Result Availability: Immediately after completion, following a short mandatory survey
CompTIA A+ 220-1202
The CompTIA A+ 220-1202 (Core 2) exam is an essential part of the A+ certification, focusing on the software and operational aspects of IT support. Launched in April 2022, this exam tests candidates on a variety of critical topics including operating systems, security, software troubleshooting, and operational procedures. The 220-1202 exam comprises 90 questions, featuring a mix of multiple-choice and performance-based questions that simulate real-world IT scenarios. With a 90-minute time limit, candidates must efficiently demonstrate their knowledge and problem-solving skills. The exam is designed to ensure that IT professionals are well-versed in managing and troubleshooting software issues, implementing security measures, and following best practices in IT operations. Successful completion of the 220-1202, alongside the 220-1201, certifies individuals for three years, highlighting their competence and readiness to handle diverse technical challenges in the IT field.
Exam Policies and Procedures
Candidates must agree to CompTIA's exam policies before starting the test. These policies include:
- No Mobile Phones/Devices: Must be left outside the exam room
- Question Review: Candidates can revisit and change answers before submitting the exam
- Submission: Unanswered questions are marked, and a final review is available before submission
Testing Centers
Since July 9, 2012, CompTIA exams are available exclusively through Pearson VUE testing centers. Candidates can book exams online, by phone, or at the testing center. Options include:
- In-Person Testing: At Pearson VUE testing centers
- Online Testing: Through Pearson VUE's online platform
Performance-Based Questions (PBQs)
The A+ exams include Performance-Based Questions (PBQs), which require candidates to perform specific tasks or solve problems in a simulated environment. These questions test real-world skills in areas like command prompts, Windows OS, and networking environments.
Continuing Education (CE) Program
Certifications with the +CE (Continuing Education) suffix, including A+, Network+, and Security+, must be renewed every three years. Renewal options include:
- Retaking the Exam: Passing the latest version of the exam
- Higher-Level Certification: Passing a higher-level CompTIA exam
- CE Program Requirements: Completing CE activities
Lifetime Certifications
Certifications earned on or before December 31, 2010, are valid for life. However, lifetime certifications are no longer available for new candidates.
More reading:
Scroll down to see your responses and detailed results
Free CompTIA A+ 220-1202 (V15) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Operating SystemsSecuritySoftware TroubleshootingOperational Procedures
Free Preview
This test is a free preview, no account required.
Subscribe to unlock all content, keep track of your scores, and access AI features!
In a scenario where you are managing an organization's asset management system, how should assigned users be documented?
By listing the user's name and the total number of assets they have access to.
By providing a general overview of all users without designating specific assets or assignment timelines.
By summarizing all assigned users in a single document without specific asset details.
By linking each asset to a unique user identifier, capturing their role and the assignment date.
Answer Description
By linking each asset to a unique user identifier, capturing their role and the assignment date - This is correct. Effective asset management requires detailed documentation that links each asset to the specific user responsible for it. Including their role and the assignment date provides traceability and accountability, ensuring assets are tracked over time and are aligned with organizational roles.
By summarizing all assigned users in a single document without specific asset details - This approach lacks the specificity needed for effective asset management. Without tying users to specific assets, it is difficult to track usage, ownership or accountability.
By listing the user's name and the total number of assets they have access to - While listing the total number of assets might provide a general sense of asset allocation, it fails to document specific asset-user relationships, roles or timelines, which are critical for detailed management and accountability.
By providing a general overview of all users without designating specific assets or assignment timelines - A general overview of users does not provide the necessary detail to track assets effectively. This approach is insufficient for ensuring proper asset management.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a unique user identifier, and why is it important in asset management?
How do you document a user's role in asset management, and why is it relevant?
What are the best practices for logging assignment dates in asset management?
What is the maximum amount of physical memory (RAM) supported by the Windows 11 Home edition (64-bit)?
2 TB
4 GB
There is no memory limit in a 64-bit OS
128 GB
Answer Description
Windows 11 Home (64-bit) can address up to 128 GB of physical memory. This cap is imposed by the OS edition, not by the 64-bit architecture itself. Higher editions raise the ceiling: Windows 11 Pro and Education allow up to 2 TB, while Enterprise and Pro for Workstations support as much as 6 TB.
Source: Microsoft Learn - "Memory limits for Windows releases."
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why does Windows 11 Home have a memory limit of 128GB?
What are the differences between the editions of Windows 11 in terms of memory support?
What does it mean that there is no memory limit in 64-bit operating systems?
Which of the following items would MOST likely appear on an IT new-user onboarding checklist to be completed before a new employee's first day?
Create the employee's user accounts and assign the required hardware
Review last quarter's network performance metrics
Schedule the employee's annual performance appraisal meeting
Decommission legacy servers that are no longer in use
Answer Description
The IT team must provision the new hire's environment in advance. Creating the employee's user accounts and assigning the required hardware (laptop, peripherals, mobile device, etc.) ensures the person can authenticate to company resources and start work immediately. Tasks such as reviewing network performance metrics, scheduling performance appraisals, or decommissioning servers occur in other processes and are not part of a new-user setup checklist.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is user account creation and why is it important?
What types of hardware might be assigned to a new employee?
What does software installation entail during the onboarding process?
In a small office/home office (SOHO) environment, the network administrator is configuring the office wireless router to secure the network against external threats. Which of the following actions would BEST increase the security of the network?
Changing the router's service set identifier (SSID)
Disabling SSID broadcast
Setting up port forwarding/mapping to unspecified services
Disabling UPnP on the router
Answer Description
Disabling Universal Plug and Play (UPnP) on a wireless router can significantly enhance the security of a network. UPnP can be exploited by malware to open ports without a user's knowledge, potentially allowing external threats to penetrate the network. Therefore, disabling it reduces the risks of such vulnerabilities. Changing the SSID does not inherently secure the network—this action just changes the network name. While disabling SSID broadcast may somewhat obscure the network from casual discovery, it is not a robust security measure as SSID can be discovered by more determined attackers using simple tools. Port forwarding/mapping is typically used to allow external devices to access services within the private network and is not a method to enhance network security.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is UPnP and why is it a security risk?
What is an SSID and how does changing it affect network security?
What are the implications of disabling SSID broadcast?
Crucial Technologies wants to give remote employees a complete Windows desktop environment that runs as a virtual machine on servers in the company's data center. Users connect with thin clients over the network; the virtual desktop keeps running on the host even after they log off, and all processing and storage remain centralized. Which desktop-virtualization model best describes this solution?
Application virtualization
Containerization
Type 2 hypervisor
Virtual Desktop Infrastructure (VDI)
Answer Description
Virtual Desktop Infrastructure (VDI) delivers full, persistent (or non-persistent) desktop operating systems as virtual machines hosted on a hypervisor cluster in the data center. End users connect through a broker over RDP-type protocols, so everything-CPU cycles, memory, and storage-remains on the server. Application virtualization delivers only individual apps, containers package code at the OS-kernel level, and a Type 2 hypervisor runs VMs on top of a client OS rather than on a dedicated host server.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the advantages of using Single Sign-On (SSO)?
How does Single Sign-On (SSO) work technically?
What are some examples of Single Sign-On (SSO) systems?
Which hypervisor type installs directly on bare-metal hardware, eliminating the need for a separate host operating system and offering the most direct access to system resources?
Type 1 hypervisor
Container runtime engine
Type 2 hypervisor
Virtual Desktop Infrastructure (VDI)
Answer Description
Type 1 (bare-metal) hypervisors load directly on a computer's hardware without relying on a traditional host OS. This allows virtual machines to run with minimal overhead and typically provides better performance and security isolation. In contrast, Type 2 hypervisors install on top of a host operating system, while container runtimes and VDI are different virtualization technologies altogether.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a smart card and how does it work for authentication?
What are the benefits of using a smart card for physical access control?
What are some alternatives to smart cards for physical access control?
A user reports that a specific application on their smartphone fails to update despite having an active internet connection. What is the BEST step to take first to address this issue?
Clear the application cache
Uninstall and reinstall the application
Check for compatibility of the app with the current OS version
Check if there is sufficient storage space available on the device
Answer Description
Checking for sufficient storage space is the most logical first step in this situation because insufficient storage can prevent applications from updating, despite the presence of an active internet connection. Clearing the app cache, checking app compatibility, or reinstalling the app might address other issues but aren't typically the first steps if the primary issue is just an update failure.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is checking storage space important for app updates?
What are the common signs that an app is failing to update?
How can I clear the application cache, and when should I do it?
A school's IT department needs to manage a fleet of Chromebook devices used by students. Which feature should be utilized to centrally control user access, enforce security policies, and install applications across those devices?
Chrome Remote Desktop
CloudReady
Google Workspace
Chrome Education Upgrade
Answer Description
Chrome Education Upgrade (formerly called a Chromebook management license) unlocks ChromeOS device management in the Google Admin console. With this upgrade applied to each Chromebook, administrators can push or block apps and extensions, apply hundreds of security policies, and restrict or allow user sign-ins.
Incorrect options:
- Google Workspace provides productivity and collaboration apps; it does not on its own grant full ChromeOS device-level management-an upgrade license is still required.
- CloudReady (now ChromeOS Flex) is an operating-system replacement for non-Chromebook hardware and does not itself provide centralized management.
- Chrome Remote Desktop is a remote-access tool, not a fleet-management platform.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Chrome Enterprise Upgrade?
How does centralized management work with Chrome Enterprise Upgrade?
What are the benefits of using Chrome Enterprise Upgrade over the other options?
Which feature of Windows Defender Firewall allows administrators to regulate how applications can access other network resources based on their network usage?
Connection security rules
Network isolation rules
Inbound rules
Outbound rules
Answer Description
The correct answer is 'Outbound rules', as this feature specifically controls the traffic that is allowed to leave the system based on the application.
In contrast, 'Inbound rules' govern incoming traffic, and 'Connection security rules' focus on defining security for connections rather than individual application traffic. Therefore, the 'Outbound rules' option aligns best with regulating application access for network usage.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are outbound rules in Windows Defender Firewall?
How do inbound rules differ from outbound rules?
What are connection security rules?
You are tasked with testing a new software update in a controlled environment before a full deployment. Which best practice should be conducted to minimize the risk of impacting the production systems?
Perform sandbox testing
Directly implement the change in the production environment
Conduct a risk analysis
Submit a change request form
Answer Description
Sandbox testing involves setting up an isolated environment that replicates the production setup. This allows you to test new updates, changes, or software without affecting the live environment. Using sandbox testing helps ensure that any issues are identified and resolved before implementing changes in the production environment. Other practices, like performing risk analysis and submitting change request forms, are equally important but come into play at different stages of the change management process.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is sandbox testing?
What are the key benefits of using a sandbox for software testing?
What is a change management process in IT?
A Windows 11 desktop consistently shows a time that drifts several minutes each day while the computer is running. Manually resetting the clock only fixes the problem temporarily. Which of the following actions will provide the MOST reliable long-term solution to this time-drift issue?
Update or reinstall the display adapter driver in Device Manager.
Clear the Trusted Platform Module (TPM) to reset secure-boot keys.
Configure the Windows Time (W32Time) service to synchronise with a reliable external NTP server at shorter polling intervals.
Disable Fast Startup in Windows power-management settings.
Answer Description
Configuring the Windows Time service (W32Time) to poll a reliable external NTP server ensures the operating-system clock is automatically corrected at regular intervals, preventing ongoing drift while the PC is powered on. Replacing display drivers, disabling Fast Startup, or clearing the TPM do not affect timekeeping.
Sources:
- Steadfast Knowledgebase: "Correcting Windows Clock Drift" (explains that installing/configuring an NTP service corrects drift) https://support.steadfast.net/Knowledgebase/Article/View/88/0/correcting-windows-clock-drift-under-high-cpu-conditions/n- Twingate Glossary: "NTP Drift" (defines clock drift and NTP correction) https://www.twingate.com/blog/glossary/ntp drift
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is time drift, and why does it happen?
What is CMOS, and how does it affect the system clock?
What is NTP, and how does it help with time synchronization?
On Windows 10 what tool can be used to configure automate updates or roll back to a previous version?
Windows Settings > Update & Security > Windows Updates
Ctrl + Alt + Del > Task Manager > Windows Updates
Control panel > Administrative Tools > Update Settings
msconfig > Startup and Services > Updates
Answer Description
You can configure and rollback updates in Windows 10 by opening Windows Settings and selecting Update & Security followed by Windows Updates
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Windows Settings and how do I access it?
What are Windows Updates and why are they important?
What does it mean to roll back to a previous version of Windows?
A user reports that their computer is experiencing frequent application crashes and shows low memory warnings. They also mention that they have not installed any new applications recently.
What is the most appropriate initial step to take in this troubleshooting process?
Reboot the system
Increase the virtual memory allocation
Uninstall the latest applications
Run a system file check
Answer Description
Rebooting the system is often one of the first and simplest troubleshooting steps in dealing with performance issues. It can clear temporary memory, stop processes that may be consuming resources, and help reset the application environment.
Other options like uninstalling applications might be premature since the user did not recently install any new software. Running a system file check would also come later, as the first step should focus on clearing the current state of the operating system.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is rebooting the system often the first step in troubleshooting?
What are the common reasons for application crashes?
What is virtual memory allocation, and how does it relate to application performance?
You are carrying several video cards and network cards from a storage area to the workbench where you will install them into several computers. What option should you use to protect the components while moving them between rooms?
Antistatic bag
Gloves
Electrostatic Discharge Wristband
Styrofoam protectant case
Answer Description
Antistatic bags are used to protect sensitive components like motherboards, processors, memory and more from Electrostatic Discharge (ESD). They should be used when moving these types of components around between rooms or when shipping. An ESD wristband can also protect against ESD but not usable when moving around between areas like different rooms, hallways, etc.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Electrostatic Discharge (ESD) and why is it harmful to computer components?
How do antistatic bags work to protect computer components?
Are there other ways to prevent ESD besides using antistatic bags?
During a troubleshooting session with a customer, what is the most professional approach towards handling an incoming personal call?
Take the personal call and keep the troubleshooting session on hold
Share the personal call content with the customer to excuse yourself
Silence the personal phone or turn it off during the interaction
Explain to the customer that you need to take a quick personal call
Answer Description
The correct answer is to silence the personal phone or turn it off during the customer interaction. This approach shows professionalism and respect for the customer's time, ensuring that the focus remains on their issue without any personal distractions. Placing the phone on silent or turning it off prevents interruptions and conveys to the customer that they are a priority. The incorrect answers suggest handling personal calls during a customer interaction or discussing personal matters with customers, which diminishes professionalism and may lead to customer dissatisfaction.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some tips for maintaining professionalism during customer interactions?
Why is it important to avoid distractions during customer support?
What are some common distractions in a customer support setting?
Gnarly!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.