Try 10 focused CompTIA A+ 220-1202 questions on Operating Systems, with explanations, then continue with IT Mastery.
Open the matching IT Mastery practice page for timed mocks, topic drills, progress tracking, explanations, and full practice.
Try CompTIA A+ 220-1202 on Web View full CompTIA A+ 220-1202 practice page
| Field | Detail |
|---|---|
| Exam route | CompTIA A+ 220-1202 |
| Topic area | Operating Systems |
| Blueprint weight | 31% |
| Page purpose | Focused sample questions before returning to mixed practice |
Use this page to isolate Operating Systems for CompTIA A+ 220-1202. Work through the 10 questions first, then review the explanations and return to mixed practice in IT Mastery.
| Pass | What to do | What to record |
|---|---|---|
| First attempt | Answer without checking the explanation first. | The fact, rule, calculation, or judgment point that controlled your answer. |
| Review | Read the explanation even when you were correct. | Why the best answer is stronger than the closest distractor. |
| Repair | Repeat only missed or uncertain items after a short break. | The pattern behind misses, not the answer letter. |
| Transfer | Return to mixed practice once the topic feels stable. | Whether the same skill holds up when the topic is no longer obvious. |
Blueprint context: 31% of the practice outline. A focused topic score can overstate readiness if you recognize the pattern too quickly, so use it as repair work before timed mixed sets.
These questions are original IT Mastery practice items aligned to this topic area. They are designed for self-assessment and are not official exam questions.
Topic: Operating Systems
A user is working in the Windows command prompt and wants to change into the Projects folder under Documents.
Based on the following output, which command should the technician run next to move into that folder?
C:\Users\Alex>cd Documents
C:\Users\Alex\Documents>dir
Volume in drive C is OS
Directory of C:\Users\Alex\Documents
01/15/2025 10:22 AM <DIR> .
01/15/2025 10:22 AM <DIR> ..
01/10/2025 03:14 PM <DIR> Projects
01/08/2025 09:01 AM <DIR> Receipts
0 File(s) 0 bytes
4 Dir(s) 120,345,600,000 bytes free
Options:
A. cd C:\Projects
B. cd ..\Projects
C. cd Projects
D. dir Projects
Best answer: C
Explanation: The exhibit shows the user has already changed into C:\Users\Alex\Documents and run dir there. The output lists a subdirectory named Projects on the line with “
Because the Projects folder is directly inside Documents, the simplest and correct command is cd Projects. This will change the prompt from C:\Users\Alex\Documents> to C:\Users\Alex\Documents\Projects>, placing the user in the requested folder.
The other options either point to the wrong location, only list contents instead of changing directories, or use a path that does not match the directory structure shown in the exhibit.
Topic: Operating Systems
A technician needs to shrink an existing partition and then assign a drive letter to a new volume on a Windows 11 workstation. Which Microsoft Management Console (MMC) snap‑in should the technician use to complete these tasks?
Options:
A. Task Scheduler
B. Event Viewer
C. Device Manager
D. Disk Management
Best answer: D
Explanation: In Windows, partition and volume management are handled through the Disk Management MMC snap‑in. This tool allows a technician to create, delete, shrink, and extend volumes, as well as assign and change drive letters and paths.
When a requirement mentions actions like shrinking a partition, creating a new volume, or assigning a drive letter, it points directly to Disk Management, not to device drivers, event logs, or scheduled tasks. Knowing which MMC snap‑in matches which category of task is a core Windows support skill.
Topic: Operating Systems
A technician is reviewing a configuration file on a Linux laptop to understand how its storage devices are set up. The following output is captured from the system:
$ cat /etc/fstab
UUID=1111-2222 / ext4 defaults 0 1
UUID=3333-4444 /home ext4 defaults 0 2
/dev/sdb1 /mnt/backup ext4 defaults 0 2
Based on this configuration, what is the primary role of this file in Linux?
Options:
A. Specify the DNS servers and search domains used for network name resolution
B. Store local user account names and their encrypted passwords
C. List static hostname-to-IP address mappings for local name resolution
D. Define which filesystems are mounted and where, typically at boot time
Best answer: D
Explanation: The exhibit shows the contents of the Linux file /etc/fstab. Each line in this file describes a filesystem: a device identifier (such as a UUID or /dev/sdb1), the directory where it should be attached to the filesystem tree (the mount point), the filesystem type (ext4), and mount options. The final numeric fields control dump and filesystem check behavior.
In Linux, /etc/fstab acts as a table of filesystems that the system should know about, especially those that should be mounted automatically at boot. At startup, the systemd and mount-related tools read /etc/fstab and mount the listed filesystems to their specified mount points.
This is different from other important configuration files such as /etc/passwd and /etc/shadow (user accounts and passwords), /etc/hosts (static hostname to IP mappings), and /etc/resolv.conf (DNS resolver settings). The presence of device identifiers, mount points like / and /home, and filesystem types like ext4 clearly indicate that the file’s role is to define filesystem mounts.
Topic: Operating Systems
Which TWO statements about configuring user access to cloud-based business email services (such as hosted Exchange, Microsoft 365, or Google Workspace) are correct? (Select TWO.)
Options:
A. When configuring an email app manually, you typically use the provider’s documented IMAP and SMTP server names with SSL/TLS enabled for secure access.
B. POP3 is preferred over IMAP for cloud-based corporate email because it keeps all messages on the server for shared access by multiple devices.
C. Multi-factor authentication (MFA) should be disabled for cloud email accounts to reduce the number of login prompts on mobile and remote devices.
D. To use a cloud-based email service, users must be connected to the same local network as the mail servers so that the client can reach private IP addresses.
E. Users can sign in to the provider’s webmail portal with their corporate credentials to access email without configuring a local email client.
Correct answers: A and E
Explanation: Cloud-based business email platforms such as hosted Exchange, Microsoft 365, and Google Workspace are designed to be accessed securely from almost anywhere over the internet. Users typically have at least two common access methods: a browser-based webmail portal and an email client or mobile app configured with the provider’s documented settings. Security controls like SSL/TLS encryption and multi-factor authentication (MFA) are standard and should be enabled.
When auto-discovery is not available, technicians configure email clients using the provider’s published server names, ports, and encryption requirements, commonly IMAP for incoming mail and SMTP for outgoing. POP3 is legacy and usually discouraged in modern multi-device environments because it does not synchronize state reliably between devices and can remove messages from the server. Cloud services use public endpoints, so users do not have to be on the same LAN as the mail servers, although organizations may add VPN or conditional access requirements for additional security.
Topic: Operating Systems
A small office uses a Windows 11 desktop to host an internal web tool on port 8443. To make it work, the user disabled Microsoft Defender Firewall entirely. You must restore protection while keeping the tool reachable on the local LAN. Which action is BEST?
Options:
A. Leave Microsoft Defender Firewall disabled and rely on the office router’s NAT for protection.
B. Enable Microsoft Defender Firewall and create an inbound rule for port 8443 on all profiles and all remote IP addresses.
C. Create an outbound TCP rule for port 8443 on all profiles, leaving the firewall otherwise enabled.
D. Re-enable Microsoft Defender Firewall and create an inbound TCP rule for port 8443 limited to the Private network profile.
Best answer: D
Explanation: The desktop is hosting a web tool, so other systems need to initiate connections to it on port 8443. That means you must allow inbound traffic on that port while keeping the firewall active. Disabling Microsoft Defender Firewall removes an important layer of protection on the endpoint and is not acceptable as a long-term solution.
Windows Defender Firewall lets you create inbound rules for specific ports and restrict them to particular network profiles, such as Private (trusted home/office network) or Public (untrusted networks). To optimize both security and functionality, you should:
This approach follows the principle of least privilege: only the specific traffic that is required is permitted, and only in the context where it is needed.
Topic: Operating Systems
A small office is rolling out a new cloud backup client that uploads all users’ Documents folders to an online service. The office shares a single, already busy internet connection, and several employees use older laptops that slow down easily. Management requires that user data be backed up offsite every day but wants minimal impact on daytime performance and network usage. Which deployment approach is the BEST choice?
Options:
A. Configure the backup client to run full backups continuously in real time with no limits so data is always protected immediately.
B. Schedule backups to run overnight with bandwidth and CPU throttling enabled, allowing users to work normally during the day while still meeting daily backup goals.
C. Request a higher-bandwidth internet plan from the ISP and leave the backup client on its default continuous-sync settings for all devices.
D. Install the backup client only on the newest desktops and exclude the older laptops from backup jobs to avoid slowing them down.
Best answer: B
Explanation: This scenario is about planning how to deploy a resource-intensive cloud backup client while respecting constraints on device performance and shared internet bandwidth. The key is to balance data protection requirements (daily offsite backups) with operational impact (CPU and network usage during business hours).
Cloud backup software can consume significant CPU, disk I/O, and network bandwidth, especially during initial and full backups. A help-desk or junior admin needs to recognize that most clients support scheduling and resource throttling to control this impact. Running large backups outside normal working hours and limiting how much CPU and bandwidth the client may use is a standard best practice in small offices.
The approach that schedules backups overnight with bandwidth and CPU throttling enabled satisfies all three needs: it protects data daily, reduces daytime performance impact on older laptops, and avoids saturating the already-busy internet link during working hours.
Topic: Operating Systems
A pilot upgrade from Windows 10 to Windows 11 on one company laptop completes, but after the reboot the touchscreen and fingerprint reader no longer work, and Device Manager shows them as unknown devices. The company plans to upgrade 50 identical laptops this weekend. To avoid this problem on the remaining systems, what should the technician do next?
Options:
A. Back up user data from all 50 laptops to an external drive before starting the upgrades.
B. Run Windows Update on the upgraded laptop and assume it will fix similar issues automatically on the others.
C. Enable System Restore on all 50 laptops so the drivers can be rolled back if there is a problem.
D. Review the laptop manufacturer’s Windows 11 compatibility list and driver downloads for this model before scheduling any more upgrades.
Best answer: D
Explanation: In-place upgrades from Windows 10 to Windows 11 can fail or cause hardware features to stop working if the underlying hardware or its drivers are not supported on the new OS. The touchscreen and fingerprint reader becoming unknown devices in Device Manager is a classic sign that there are no suitable Windows 11 drivers automatically installed.
Before rolling out an OS upgrade to a large number of similar systems, a technician should verify that each hardware model meets the OS requirements and that compatible drivers are available. This is typically done by checking the manufacturer’s Windows 11 compatibility information and driver downloads for the specific laptop model. Doing this up front is a key pre-upgrade task that prevents widespread issues after deployment.
While backups and restore points are also important pre-upgrade steps, they protect data and provide rollback options rather than preventing driver incompatibility. The best way to avoid repeating this exact problem on 50 more laptops is to confirm hardware and driver compatibility first and postpone or adjust the upgrade plan if support is not available.
Topic: Operating Systems
A user adds a brand-new 2TB SATA hard drive to a Windows 11 desktop as a secondary data drive. The system BIOS/UEFI and Disk Management both see the disk as “Disk 1, Unknown, Not initialized, Unallocated,” but it does not appear in File Explorer. The user wants to prepare the drive for use using command-line tools only.
Which of the following actions will best address this issue? (Select TWO.)
Options:
A. Enable BitLocker encryption on the uninitialized disk before creating any partitions.
B. Run sfc /scannow to repair missing or corrupted Windows system files.
C. Use diskpart to initialize the new disk and create a primary partition on it.
D. Run chkdsk /r against the new disk to repair file system errors and bad sectors.
E. Run the format command on the new volume to create an NTFS file system.
Correct answers: C and E
Explanation: The new hard drive is visible to the system firmware and Disk Management but shows as “Unknown” and “Unallocated,” and it does not appear in File Explorer. This indicates the disk has not been initialized, partitioned, or formatted yet.
To make a disk usable in Windows, you must:
On the command line, diskpart is used to manage disks and partitions, including initializing a disk and creating a primary partition. Once a partition exists and has a drive letter, the format command is used to create an NTFS (or other) file system. Only after these steps will the drive appear in File Explorer as a usable volume.
By contrast, chkdsk is for checking and repairing existing file systems, and sfc is for repairing Windows system files. BitLocker is applied after volumes are already created and formatted. These tools do not solve the core issue of an uninitialized, unformatted disk.
Even though diskpart and format are correct here, they are potentially destructive on disks that already contain data. In this scenario the drive is new and empty, so it is safe to use them, but on drives with existing data, you must use them very carefully to avoid data loss.
Topic: Operating Systems
In a typical Linux desktop system, what is the main purpose of the /etc/fstab file?
Options:
A. It stores local user account names and their encrypted password hashes.
B. It provides a list of local hostname-to-IP address mappings for the system.
C. It defines which filesystems to mount at boot and the options used for each mount.
D. It contains the system’s DNS server addresses for resolving hostnames.
Best answer: C
Explanation: On Linux systems, /etc/fstab is the filesystem table that tells the OS which disks, partitions, or network filesystems to mount at boot and where to mount them. It also specifies mount options, such as whether a filesystem should be mounted read-only, with specific permissions, or not mounted automatically at all. This makes /etc/fstab central to how storage is attached and presented to the user at startup.
The other configuration files mentioned are also important but serve completely different purposes related to user accounts or network name resolution rather than storage and mounting behavior.
Topic: Operating Systems
A user wants to install a new 3D modeling application on a Windows 11 laptop. Before proceeding, you review the vendor’s system requirements alongside the laptop’s specifications, as shown.
Exhibit:
| Component | Application requirement | This PC |
|---|---|---|
| OS | 64-bit Windows 10 or Windows 11 | Windows 11 Pro 64-bit |
| CPU | Dual-core, 2.0 GHz or faster | Intel Core i5, 4 cores, 2.3 GHz |
| RAM | 16 GB | 8 GB |
| GPU | DirectX 12 GPU with 2 GB VRAM | NVIDIA MX550, 4 GB VRAM |
| Storage | 40 GB free space | 120 GB free space |
Based on the exhibit, what should you do BEFORE installing the application to meet the requirements?
Options:
A. Install a 32-bit edition of the application instead of 64-bit
B. Replace the GPU with a model that has more VRAM
C. Upgrade the laptop’s RAM to at least 16 GB
D. Free up at least 60 GB more disk space before installing
Best answer: C
Explanation: The exhibit provides a side-by-side comparison of the application’s minimum system requirements and the laptop’s current specifications. To decide compatibility, you simply match each requirement row with the corresponding system spec.
For OS, the requirement is “64-bit Windows 10 or Windows 11,” and the PC has “Windows 11 Pro 64-bit,” which satisfies this. For CPU, a dual-core 2.0GHz or faster is required, and the system has a 4-core Intel Core i5 at 2.3GHz, which exceeds that requirement.
The RAM row shows the only mismatch: the application needs 16GB, but the laptop only has 8GB. GPU and storage both meet or exceed the requirements (4GB VRAM vs 2GB required, 120GB free vs 40GB required). Therefore, the one change needed before installation is to upgrade the RAM to at least 16GB.
Use the CompTIA A+ 220-1202 Practice Test page for the full IT Mastery route, mixed-topic practice, timed mock exams, explanations, and web/mobile app access.
Try CompTIA A+ 220-1202 on Web View CompTIA A+ 220-1202 Practice Test
Read the CompTIA A+ 220-1202 Cheat Sheet on Tech Exam Lexicon, then return to IT Mastery for timed practice.