CompTIA A+ (220-1202) Exam Questions *NEW*
Your Path to IT Success: CompTIA A+ (220-1202) Certification

CompTIA A+ (220-1202) Exam Questions *NEW* free download
Your Path to IT Success: CompTIA A+ (220-1202) Certification
Test Details
Required Exam: A+ Core 1 (220-1202)
Number of Questions: Up to 90
Question Types: Multiple-choice and performance-based
Test Duration: 90 minutes
Recommended Experience: 12 months of hands-on experience in roles such as help desk support technician, desktop support technician, or field service technician
Passing Score: 675 (on a scale of 100–900)
Exam Objectives (Domains)
The following table outlines the domains covered by this exam and their respective weightings:
DomainPercentage of Examination:
1.0 Operating System
2.0 Security
3.0 Software Troubleshooting
4.0 Operational Procedures
1.0 Operating System
1.1 Explain common operating system (OS) types and their purposes
1.2 Given a scenario, perform OS installations and upgrades in a diverse environment
1.3 Compare and contrast basic features of Microsoft Windows editions
1.4 Given a scenario, use Microsoft Windows operating system features and tools
1.5 Given a scenario, use the appropriate Microsoft command-line tools
1.6 Given a scenario, configure Microsoft Windows settings
1.7 Given a scenario, configure Microsoft Windows networking features on a client/desktop
1.8 Explain common features and tools of the macOS/desktop operating system
1.9 Identify common features and tools of the Linux client/desktop operating system
1.10 Given a scenario, install applications according to requirements
1.11 Given a scenario, install and configure cloud-based productivity tools
2.0 Security
2.1 Summarize various security measures and their purposes
2.2 Given a scenario, configure and apply basic Microsoft Windows OS security settings
2.3 Compare and contrast wireless security protocols and authentication methods
2.4 Summarize types of malware and tools/methods for detection, removal, and prevention
2.5 Compare and contrast common social engineering attacks, threats, and vulnerabilities
2.6 Given a scenario, implement procedures for basic small office/home office (SOHO) malware removal
2.7 Given a scenario, apply workstation security options and hardening techniques
2.8 Given a scenario, apply common methods for securing mobile devices
2.9 Compare and contrast common data destruction and disposal methods
2.10 Given a scenario, apply security settings on SOHO wireless and wired networks
2.11 Given a scenario, configure relevant security settings in a browser
3.0 Software Troubleshooting
3.1 Given a scenario, troubleshoot common Windows OS issues
3.2 Given a scenario, troubleshoot common mobile OS and application issues
3.3 Given a scenario, troubleshoot common mobile OS and application security issues
3.4 Given a scenario, troubleshoot common personal computer (PC) security issues
4.0 Operational Procedures
4.1 Given a scenario, implement best practices associated with documentation and support systems information management
4.2 Given a scenario, apply change management procedures
4.3 Given a scenario, implement workstation backup and recovery methods
4.4 Given a scenario, use common safety procedures
4.5 Summarize environmental impacts and local environment controls
4.6 Explain the importance of prohibited content/activity and privacy, licensing, and policy concepts
4.7 Given a scenario, use proper communication techniques and professionalism
4.8 Explain the basics of scripting
4.9 Given a scenario, use remote access technologies
4.10 Explain basic concepts related to artificial intelligence (AI)