Start a practice session for CompTIA A+ Core 2 (220-1202) below, or open the full app in a new tab.
For the best experience, open the full app in a new tab and navigate with swipes/gestures or the mouse wheel—just like on your phone or tablet.
▶ Click to Load Interactive App
Open Full App in a New Tab
A small set of questions is available for free preview.
Subscribers can unlock full access by signing in with the same account used on mobile.
Prefer to practice on your phone or tablet? Download the
AWS Exam Prep – AWS, Azure, GCP & CompTIA exam prep app for iOS
or
AWS Exam Prep app on Google Play (Android)
and then sign in with the same account on web to continue your sessions on desktop.
Tip: Begin with 20–25 question domain drills for weak areas, then move to mixed sets and full mocks . Aim for consistent ~75–80% before test day.
Suggested progression
Domain drills (daily): 2× 20–25 question sets focused on a single Core 2 theme (Operating Systems, Security, Software Troubleshooting, Operational Procedures, Mobile/MDM awareness).
Mixed sets (alternate days): 1× 30–40 questions combining 2–3 domains to build transfer.
Full mock (final week): 2–3 complete exams mirroring live-exam tone/coverage. Review every miss and tag weak objectives.
Timeboxing
Domain set: ~30–40 minutes
Mixed set: ~55–65 minutes
Full mock: ~90 minutes (leave a buffer to revisit flagged items and PBQs)
Scoring & review
Mark + return: Flag uncertain items; review after you finish the set.
Pattern log: Track recurring themes (e.g., malware workflow order , share vs NTFS effective permissions , Safe Mode vs WinRE vs Reset , BitLocker/FileVault basics , Event Viewer triage ).
Turn misses into notes: Convert each theme into 1–2 “rules of thumb,” then re-drill that domain the next day.
Malware response order: Identify → Quarantine → Disable restore → Remediate (update, scan, remove/reimage) → Enable restore → Schedule scans/updates → Create restore point → Educate .
Access denied: Check Share vs NTFS ; compute effective permissions (most restrictive over network), ownership/inheritance, group membership.
Recovery choices:
Driver/app break → Safe Mode → rollback/disable startup → test
System file corruption → sfc → DISM → System Restore → Reset
Boot issues → Startup Repair (WinRE) → bootrec/bcdedit
Hardening quick-start: Updates on, Defender/Firewall (correct profile), least privilege/UAC, BitLocker/FileVault, limit RDP exposure.
What to pair with practice
Syllabus: Objective-by-domain outline → view
Cheatsheet: High-yield commands, flows, and pickers → open
Overview: Format, pacing, and compact plan → read
Tips for exam-style pacing
First pass fast: ~60–70 seconds per item; skip PBQs early and return later.
Eliminate aggressively: Toss options that break least privilege , policy/safety , or order of operations (e.g., cleaning before quarantine).
Aim your reading: For long scenarios, skim the final question first to target key details.
Ready to drill?
Open the app above and choose:
Domain Drills: Operating Systems • Security • Software Troubleshooting • Operational Procedures • Mobile/MDM
Mixed Sets: Combine 2–3 domains for transfer practice
Full Mocks: Exam-length simulations with review mode
Exam snapshot
Certification: CompTIA A+ — Core 2 (220-1202)
Audience: Help desk/desktop support, field techs, career-switchers, students finishing A+
Experience target: ~6–12 months hands-on or equivalent labs/projects
Format: Multiple choice (single/multiple) + PBQs (performance-based questions)
Timing / count: Varies by form; plan a buffer to review flagged items
Credential requirement: Pass Core 1 (220-1201) and Core 2 (220-1202)
Study funnel: Read this Overview → work the Syllabus
objective-by-objective → keep the Cheatsheet
open for last-mile recall → validate with Practice
.
What Core 2 measures (by theme)
1) Operating systems (Windows, macOS, Linux, ChromeOS)
Editions/features (e.g., Windows Home/Pro/Enterprise), updates, servicing
Core tools & MMCs: Device Manager, Services, Disk Management, Event Viewer, Task Manager
Filesystems, partitions, drivers, logs, startup items, processes
2) Security fundamentals
Hardening: patching, Defender/AV/EDR, firewall profiles (Domain/Private/Public)
Access control & authentication: accounts, UAC, least privilege, MFA/biometrics
Encryption basics: BitLocker/FileVault; key/recovery handling
3) Malware response workflow
Identification → Quarantine → Disable restore → Remediate (update, scan, remove/reimage)
Re-enable restore → Schedule scans/updates → Create restore point → User education
4) Software troubleshooting
App/driver instability, startup/services, performance bottlenecks
Boot failures and recovery tools (Safe Mode, WinRE, System Restore, Reset this PC)
Browser/profile remediation (extensions, cache/profile reset, DNS/hosts)
5) Operational procedures
Documentation, tickets/diagrams, asset tracking
Change/incident lifecycles, SLAs/OLAs, communication & professionalism
Safety, privacy, data handling, disposal (PII/PHI/PCI), licensing basics
6) Mobile & MDM (awareness level)
Enrollment, passcode policy, remote lock/wipe, Wi-Fi/VPN profiles, app allow/deny
Readiness checklist (be honest)
I can navigate Device Manager, Services, Disk Management, Event Viewer confidently.
I know when to use Safe Mode , System Restore , WinRE tools , and Reset this PC .
I can compute effective permissions (Share ∩ NTFS) and resolve Access Denied .
I can recite and justify the malware response order .
I can harden a workstation quickly (updates, Defender/Firewall, least privilege, BitLocker/FileVault).
I can run ipconfig, ping, tracert, nslookup, sfc , DISM , bootrec, bcdedit and explain outputs.
I understand macOS/Linux basics : where logs live, package managers, service control.
I can articulate change/incident steps and write a clear ticket note.
If you checked fewer than 6, slow down and spend two extra days on the Cheatsheet flows + small labs.
Compact 3–5 week study plan
Week 1 — OS Foundations
Windows editions/features, updates/servicing
Core MMCs & Settings paths; disks/partitions/filesystems; drivers/logs
Daily: 20-question drill (OS tools)
Week 2 — Security & Malware
Hardening (Firewall profiles, Defender/AV/EDR, UAC, least privilege, BitLocker/FileVault)
Malware workflow lab: practice the order and the “why”
Mixed set (OS + security)
Week 3 — Troubleshooting & Recovery
Startup/services, performance triage, app/driver rollbacks
Safe Mode vs WinRE vs Restore vs Reset (decision practice)
PBQ-style practice (permissions, logs, recovery)
Week 4 — Operational Procedures & MDM
Change/incident, tickets/diagrams, professionalism, safety/privacy/disposal
MDM basics (enrollment, policies)
Full mock #1 ; convert misses into 2-bullet rules; re-drill
Week 5 (optional) — Polish
Full mock #2 ; refine weak objectives; quick labs (permissions share/NTFS, malware cleanup)
High-yield workflows to memorize
Malware (must-know order)
Identify → Quarantine → Disable restore → Remediate (update, scan, remove/reimage) → Enable restore → Schedule scans/updates → Create restore point → Educate .
Recovery chooser (quick logic)
Driver/app broke? → Safe Mode → rollback/disable startup → test
System corruption? → sfc → DISM → System Restore → Reset (keep/remove)
Boot issues? → WinRE Startup Repair → bootrec / bcdedit as needed
Permissions (effective access)
Over network: Effective = most restrictive of Share & NTFS (denies override). Locally: NTFS only. Fix via group membership, inheritance, ownership.
Hardening quick-start
Updates on → Defender/Firewall on (right profile) → least privilege + UAC → encrypt disk (BitLocker/FileVault) → RDP limited (NLA, groups, firewall) → remove cruft & risky extensions.
PBQ expectations & practice ideas
Permissions PBQ: calculate effective access; fix with the smallest change.
Malware PBQ: order steps correctly; justify quarantine before cleanup.
Recovery PBQ: choose Safe Mode/WinRE/Restore/Reset given symptoms.
Logs PBQ: find the relevant error in Event Viewer and pick the next step.
Build tiny labs: a folder tree with varied NTFS/share rights; a throwaway VM to run Safe Mode/Restore/Reset; a mock malware workflow without real malware (use dummy files).
Exam-day tactics
First pass fast (~60–70 seconds/item); flag PBQs & long stems for the end.
Skim long scenarios, then read the final question to target your reading.
Eliminate options that violate least privilege , policy/safety , or order of operations .
Preserve a 5–10 minute buffer to revisit flagged items.
What to read next
Syllabus: domain objectives & quick links → Open
Cheatsheet: commands, flows, pickers → Open
Practice: timed drills, mixed sets, full mocks → Start