CompTIA A+ (220-1202) Exam Questions *NEW*

Your Path to IT Success: CompTIA A+ (220-1202) Certification

CompTIA A+ (220-1202) Exam Questions *NEW*
CompTIA A+ (220-1202) Exam Questions *NEW*

CompTIA A+ (220-1202) Exam Questions *NEW* free download

Your Path to IT Success: CompTIA A+ (220-1202) Certification

Test Details


Required Exam: A+ Core 1 (220-1202)


Number of Questions: Up to 90


Question Types: Multiple-choice and performance-based


Test Duration: 90 minutes


Recommended Experience: 12 months of hands-on experience in roles such as help desk support technician, desktop support technician, or field service technician


Passing Score: 675 (on a scale of 100–900)


Exam Objectives (Domains)


The following table outlines the domains covered by this exam and their respective weightings:


DomainPercentage of Examination:


1.0 Operating System

2.0 Security

3.0 Software Troubleshooting

4.0 Operational Procedures


1.0 Operating System

1.1 Explain common operating system (OS) types and their purposes


1.2 Given a scenario, perform OS installations and upgrades in a diverse environment


1.3 Compare and contrast basic features of Microsoft Windows editions


1.4 Given a scenario, use Microsoft Windows operating system features and tools


1.5 Given a scenario, use the appropriate Microsoft command-line tools


1.6 Given a scenario, configure Microsoft Windows settings


1.7 Given a scenario, configure Microsoft Windows networking features on a client/desktop


1.8 Explain common features and tools of the macOS/desktop operating system


1.9 Identify common features and tools of the Linux client/desktop operating system


1.10 Given a scenario, install applications according to requirements


1.11 Given a scenario, install and configure cloud-based productivity tools


2.0 Security

2.1 Summarize various security measures and their purposes


2.2 Given a scenario, configure and apply basic Microsoft Windows OS security settings


2.3 Compare and contrast wireless security protocols and authentication methods


2.4 Summarize types of malware and tools/methods for detection, removal, and prevention


2.5 Compare and contrast common social engineering attacks, threats, and vulnerabilities


2.6 Given a scenario, implement procedures for basic small office/home office (SOHO) malware removal


2.7 Given a scenario, apply workstation security options and hardening techniques


2.8 Given a scenario, apply common methods for securing mobile devices


2.9 Compare and contrast common data destruction and disposal methods


2.10 Given a scenario, apply security settings on SOHO wireless and wired networks


2.11 Given a scenario, configure relevant security settings in a browser


3.0 Software Troubleshooting

3.1 Given a scenario, troubleshoot common Windows OS issues


3.2 Given a scenario, troubleshoot common mobile OS and application issues


3.3 Given a scenario, troubleshoot common mobile OS and application security issues


3.4 Given a scenario, troubleshoot common personal computer (PC) security issues


4.0 Operational Procedures

4.1 Given a scenario, implement best practices associated with documentation and support systems information management


4.2 Given a scenario, apply change management procedures


4.3 Given a scenario, implement workstation backup and recovery methods


4.4 Given a scenario, use common safety procedures


4.5 Summarize environmental impacts and local environment controls


4.6 Explain the importance of prohibited content/activity and privacy, licensing, and policy concepts


4.7 Given a scenario, use proper communication techniques and professionalism


4.8 Explain the basics of scripting


4.9 Given a scenario, use remote access technologies


4.10 Explain basic concepts related to artificial intelligence (AI)