Table of Contents

Join Our Membership To Start Your Cybersecurity Journey Today!

CompTIA A+ Cheat Sheet: Everything You Need to Pass Fast

The Ultimate CompTIA A+ Cheat Sheet (220-1201 & 220-1202): Everything You Need to Pass Both Exams

The Night Before Panic is Real, this Cheat Sheet Fixes It.

You had been studying for three months. Stack of flashcards. Two textbooks. Dozens of videos. The night before your Core 1 exam, you sat at your desk and realized you couldn’t remember the difference between DDR3 and DDR4 pin counts. Or which RAID level uses double parity. Or the exact speeds for each USB version.

Three months of knowledge. Completely scrambled because there was no single organized reference.

This cheat sheet is what you needed.

Bookmark it. Print it. Tape it to your wall. However you learn best, make this your go-to.

The Big Picture: What Is CompTIA A+?

CompTIA A+ is the IT industry’s most recognized entry-level certification. It validates that you can install, configure, and maintain hardware components and mobile devices, troubleshoot hardware, network, and connectivity issues, configure SOHO networks, and apply basic cybersecurity methods.

Two exams. Both required. No shortcuts.

The latest exam codes are 220-1201 for Core 1 and 220-1202 for Core 2, available since March 2025 and retiring in 2027–2028. Both exams combined cost $265 USD.

Each exam has a maximum of 90 questions including multiple-choice, drag-and-drop, and performance-based questions, with 90 minutes to complete. The passing score for Core 1 is 675, and Core 2 requires 700, both on a scale of 900.

Core 1 (220-1201) Domain Breakdown

Domain Weight What It Means
Mobile Devices 13% Smartphones, tablets, configuration
Networking 23% Cables, protocols, wireless, IP addressing
Hardware 25% CPU, RAM, storage, printers, peripherals
Virtualization & Cloud 11% VMs, cloud models, containers
Hardware & Network Troubleshooting 28% Diagnosing and fixing real problems

Core 2 (220-1202) Domain Breakdown

Domain Weight What It Means
Operating Systems 28% Windows, Linux, macOS, mobile OS
Security 28% Malware, encryption, access controls
Software Troubleshooting 23% Fixing OS and application issues
Operational Procedures 21% Help desk, documentation, safety

The golden rule: Troubleshooting and Networking together make up more than half of Core 1. Security and Operating Systems dominate Core 2. Weight your study time accordingly.


The Troubleshooting Methodology – CompTIA A+ Cheat Sheet (Apply This to Everything)

The troubleshooting methodology is no longer a formal exam objective with explicit test items, but you still need to apply it when answering A+ questions. Think of it as your mental framework for every scenario question.

Step What You Do Real-World Example
1. Identify the problem Ask questions, gather information “When did it start? What changed?”
2. Establish theory of probable cause What’s most likely wrong? “Probably the RAM or the PSU”
3. Test the theory Confirm or eliminate Swap the RAM, try a different outlet
4. Establish plan of action Know your fix before you start “I’ll replace the DIMM and reboot”
5. Implement solution or escalate Fix it or hand it up Replace component, update drivers
6. Verify functionality Did it actually work? Test everything, not just the broken part
7. Document Write it down Ticket notes, asset management system

Exam tip: When a scenario question asks “what should you do FIRST,” the answer is almost always in steps 1-2. Identify and theorize before you touch anything.


CORE 1 (220-1201) CompTIA A+ CHEAT SHEET


1. Mobile Devices

Connection Types

Technology Range/Speed Use Case
Bluetooth Up to 100m (Class 1) Wireless peripherals, audio
NFC Within ~4 inches Tap-to-pay, file sharing
Wi-Fi Up to 100m+ Internet connectivity
Hotspot/Tethering Varies Share cellular data with other devices
GPS Global Location services
Cellular (4G/5G) Carrier-dependent Mobile internet

Bluetooth Classes

Class Range Common Use
Class 1 100m Industrial devices
Class 2 10m Most consumer devices
Class 3 1m Rarely used

Exam trap: Tethering = sharing your phone’s cellular data. Hotspot = same thing, wireless version. Don’t confuse docking station (charges device, expands ports) with port replicator (USB-only, no charging).

Mobile Device Management (MDM)

Feature What It Does
Remote wipe Erase device data remotely
Geofencing Restrict device by location
Application management Push/block specific apps
BYOD policy Personal device rules for corporate use
Corporate policy Company-owned device configuration

Cellular Technology Comparison

Standard Max Speed Notes
3G ~21 Mbps Legacy, being phased out
4G LTE ~150 Mbps Current mainstream standard
5G ~10 Gbps Latest, millimeter wave limitations

2. Networking

Essential Network Terminology

Term Meaning
LAN Local Area Network
WAN Wide Area Network
MAN Metropolitan Area Network
PAN Personal Area Network
WLAN Wireless LAN
VLAN Virtual LAN (logical segmentation)
VPN Virtual Private Network
SAN Storage Area Network
APIPA Automatic Private IP Addressing (169.254.x.x)
PoE Power over Ethernet
UTM Unified Threat Management

Network Devices

Device Function Key Detail
Switch Connects devices within a LAN Uses MAC addresses
Router Connects multiple networks Uses IP addresses
Hub Broadcasts to all ports Outdated, avoid
Firewall Filters traffic Hardware or software
WAP Wireless access point Extends wireless coverage
Modem Converts signal types DSL, cable, fiber

Ports and Protocols (Memorize These)

Port Protocol Memory Trick
21 FTP “21 = File Transfer”
22 SSH “22 = Secure Shell, 2 S’s”
23 Telnet “23 = Telnet (insecure, old)”
25 SMTP “25 = Send Mail To People”
53 DNS “53 = Domain Name System”
67/68 DHCP “67/68 = Dynamic (two ports)”
80 HTTP “80 = Web browsing”
110 POP3 “110 = Post Office (old email)”
143 IMAP “143 = Internet Mail (modern)”
389 LDAP “389 = Directory”
443 HTTPS “443 = Secure Web”
445 SMB “445 = File Sharing (Windows)”
587 SMTP (secure) “587 = Secure email sending”
3389 RDP “3389 = Remote Desktop”

Exam tip: POP3 downloads email (deletes from server by default). IMAP syncs email (stays on server). SMTP sends email. This distinction shows up constantly.

Wi-Fi Standards (802.11)

Standard Max Speed Frequency Memory Trick
802.11a 54 Mbps 5 GHz “a = alone on 5GHz”
802.11b 11 Mbps 2.4 GHz “b = barely fast”
802.11g 54 Mbps 2.4 GHz “g = good for its time”
802.11n 600 Mbps 2.4/5 GHz “n = notably dual band”
802.11ac 1.7 Gbps 5 GHz “ac = actually fast”
802.11ax (Wi-Fi 6) 9.6 Gbps 2.4/5/6 GHz “ax = extreme”

IP Addressing Quick Reference

Type Range Use
Class A 1.0.0.0 – 126.255.255.255 Large networks
Class B 128.0.0.0 – 191.255.255.255 Medium networks
Class C 192.0.0.0 – 223.255.255.255 Small networks
APIPA 169.254.0.0 – 169.254.255.255 DHCP failure
Loopback 127.0.0.1 Test local network card

Cable Types and Connectors

Cable Type Connector Max Speed Max Length
Cat 5 RJ45 100 Mbps 100m
Cat 5e RJ45 1 Gbps 100m
Cat 6 RJ45 10 Gbps 55m
Cat 6a RJ45 10 Gbps 100m
Cat 7 GG45/TERA 10 Gbps 100m
Cat 8 RJ45 40 Gbps 30m
Coaxial F-type, BNC Varies Varies
Fiber (single-mode) SC, ST, LC, FC 100 Gbps+ Miles
Fiber (multimode) SC, ST, LC 10 Gbps 550m

T568A vs T568B Wiring (Drag-and-Drop Favorite)

Pin T568A T568B
1 White/Green White/Orange
2 Green Orange
3 White/Orange White/Green
4 Blue Blue
5 White/Blue White/Blue
6 Orange Green
7 White/Brown White/Brown
8 Brown Brown

Memory trick: T568B = Business standard (most common in the US). T568A = used in government installations. A straight-through cable uses same standard on both ends. A crossover cable uses A on one end, B on the other.


3. Hardware

CPU Sockets

Intel Sockets AMD Sockets
LGA 775 AM3
LGA 1150/1151/1155/1156 AM3+
LGA 1200 AM4
LGA 1700 AM5
LGA 2011/2066 TR4/TRX40 (Threadripper)

Critical rule: Intel CPU socket ≠ AMD CPU socket. They are never interchangeable. If you see a build scenario, match the CPU brand to the correct socket family.

RAM Deep Dive

Type Pins (DIMM) Pins (SODIMM) Speed
DDR 184 200 Up to 400 MHz
DDR2 240 200 Up to 1066 MHz
DDR3 240 204 Up to 2133 MHz
DDR4 288 260 Up to 3200 MHz+
DDR5 288 262 Up to 6400 MHz+

Key RAM concepts:

  • Dual-channel: Install in matching slots (1&3 or 2&4). Doubles effective bandwidth
  • ECC RAM: Error-correcting memory. Used in servers, not consumer PCs
  • SODIMM: Small form factor for laptops
  • Virtual RAM (paging file): Uses hard drive as overflow RAM. Slow but better than crashing

Storage: HDD vs SSD vs NVMe

Type Interface Form Factor Speed Use Case
HDD (5400 RPM) SATA 2.5″/3.5″ ~100 MB/s Budget storage
HDD (7200 RPM) SATA 3.5″ ~150 MB/s Desktop storage
SSD (SATA) SATA III 2.5″/M.2 ~550 MB/s Everyday computing
SSD (NVMe) PCIe/M.2 M.2 ~3500 MB/s High performance
SSD (NVMe Gen 4) PCIe 4.0/M.2 M.2 ~7000 MB/s Workstation/gaming

RAID Levels (Exam Favorite)

RAID Type Min Drives Fault Tolerant Speed Capacity
RAID 0 Striping 2 No Fastest 100%
RAID 1 Mirroring 2 Yes (1 drive) Read fast 50%
RAID 5 Stripe + Parity 3 Yes (1 drive) Good ~67-94%
RAID 6 Double Parity 4 Yes (2 drives) Moderate Variable
RAID 10 Mirror + Stripe 4 Yes Fast 50%

Decision framework for exam scenarios:

  • “Maximum performance, redundancy not required” → RAID 0
  • “Must not lose data, only 2 drives” → RAID 1
  • “Balance of performance and redundancy, 3+ drives” → RAID 5
  • “Maximum protection, can afford drive failures” → RAID 6
  • “Best of both worlds, money no object” → RAID 10

Motherboard Form Factors

Form Factor Size Use Case
ATX 12″ × 9.6″ Standard desktop
MicroATX 9.6″ × 9.6″ Compact desktop
Mini-ITX 6.7″ × 6.7″ Small form factor
E-ATX 12″ × 13″ High-end workstations

PCIe Expansion Slots

Slot Lanes Typical Use
PCIe x1 1 Sound cards, network cards
PCIe x4 4 Some SSDs, network cards
PCIe x8 8 Some GPUs, RAID controllers
PCIe x16 16 Graphics cards (primary)

Power Supply (PSU) Connectors

Connector Pins Powers
24-pin ATX 24 Motherboard
4/8-pin EPS 4 or 8 CPU
6+2 PCIe 6 or 8 Graphics card
SATA power 15 SATA drives, optical
Molex 4 Older devices, fans

Video Connectors Comparison

Connector Max Resolution Digital/Analog Audio
VGA 1080p (limited) Analog
DVI-A 1080p Analog
DVI-D 1080p Digital
DVI-I 1080p Both
HDMI 10K (2.1) Digital
DisplayPort 16K (2.0) Digital
Thunderbolt 3/4 8K Digital

Exam tip: VGA is analog only, lowest quality. DisplayPort has the highest bandwidth. HDMI carries audio automatically. Thunderbolt uses the USB-C connector shape.

Thunderbolt Versions

Version Speed Connector Notes
Thunderbolt 1 10 Gbps Mini DisplayPort Original
Thunderbolt 2 20 Gbps Mini DisplayPort Daisy-chain
Thunderbolt 3 40 Gbps USB-C Major update
Thunderbolt 4 40 Gbps USB-C More requirements

USB Standards

Standard Speed Max Power
USB 1.1 12 Mbps 2.5W
USB 2.0 480 Mbps 2.5W
USB 3.0 (3.1 Gen 1) 5 Gbps 4.5W
USB 3.1 Gen 2 10 Gbps 100W
USB 3.2 20 Gbps 100W
USB 4 40 Gbps 100W

Printer Types and Troubleshooting

Problem Laser Printer Cause Inkjet Cause
Streaks on page Dirty/damaged drum Clogged printhead
Faded output Low toner Low ink
Ghosting/shadows Drum not fully erasing N/A (inkjet)
Smearing/smudging Faulty fuser Ink not dry
Paper jams Worn pickup rollers Paper type
Spots/dots Dirty drum Dirty printhead
Lines on top only Clogged toner Dried nozzles

Laser printer process (in order): Processing → Charging → Exposing → Developing → Transferring → Fusing → Cleaning

Memory trick: “Please Come Eat Dinner Tonight For Cake”

4. Virtualization and Cloud Computing

Cloud Service Models

Model What’s Managed By You Examples
IaaS (Infrastructure) OS, apps, data AWS EC2, Azure VMs
PaaS (Platform) Apps, data Google App Engine, Heroku
SaaS (Software) Just your data Microsoft 365, Salesforce

Memory trick: “I Prefer Standing” = IaaS → PaaS → SaaS (most control → least control)

Cloud Deployment Models

Model Access Who Uses It
Public Anyone Consumers, small businesses
Private One organization Large enterprises, government
Hybrid Mixed Organizations with compliance needs
Community Shared group Organizations with common needs

Hypervisors

Type What It Runs On Examples
Type 1 (Bare Metal) Directly on hardware VMware ESXi, Hyper-V
Type 2 (Hosted) On top of an OS VirtualBox, VMware Workstation

Exam tip: Type 1 is faster (no host OS overhead). Type 2 is easier to set up. For enterprise servers, Type 1. For practice labs, Type 2.

Virtualization Terms

Term Meaning
VM Snapshot Point-in-time copy of VM state
VM Template Pre-configured VM for rapid deployment
Container Lightweight, OS-level virtualization
VDI Virtual Desktop Infrastructure
Cloud bursting Extend on-premise resources to cloud when needed

CORE 2 (220-1202) CompTIA A+ CHEAT SHEET


5. Operating Systems

Windows Versions Quick Reference

Feature Windows 10 Home Windows 10 Pro Windows 10 Enterprise
Domain join
BitLocker
Group Policy Limited
Remote Desktop (host)
Hyper-V

Exam rule: Home ≠ business. Any domain, BitLocker, or Group Policy question = Pro or Enterprise minimum.

File Systems Comparison

File System OS Max File Size Max Volume Notes
FAT32 Windows 4GB 2TB Cross-platform, old
exFAT Windows/macOS 16 EB 128 PB Flash drives, cross-platform
NTFS Windows 16 TB 256 TB Permissions, encryption
EXT4 Linux 16 TB 1 EB Default Linux
APFS macOS 8 EB 8 EB Modern Mac standard
ReFS Windows Server 35 PB 35 PB Enterprise, resilient

The crossover rule: Need to use a USB drive on both Windows AND Mac? Use exFAT. FAT32 has a 4GB file limit (you’ll hit it with large videos). NTFS doesn’t play nice with older macOS.

Disk Partitioning: MBR vs GPT

Feature MBR GPT
Max disk size 2 TB 9.4 ZB
Max partitions 4 primary 128 primary
Boot mode Legacy BIOS UEFI
OS support All Windows Windows 8+, modern Linux/Mac

Rule of thumb: New systems = GPT. Old legacy systems = MBR. Drives over 2TB = must use GPT.

Essential Windows Command Line Tools

Command What It Does Critical Flags
ipconfig Shows network config /all /release /renew /flushdns
ping Tests connectivity -t (continuous) -n (count)
tracert Shows path to destination N/A
nslookup Tests DNS resolution N/A
netstat Shows active connections -an (all, numerical)
chkdsk Checks disk for errors /f (fix) /r (bad sectors)
sfc System File Checker /scannow
diskpart Disk partitioning Interactive tool
gpupdate Updates Group Policy /force
tasklist Lists running processes N/A
taskkill Kills a process /PID [number]
shutdown Shutdown/restart /s (shutdown) /r (restart)
format Formats a drive /q (quick) /fs (filesystem)
robocopy Advanced file copy More reliable than xcopy

Windows Troubleshooting Tools

Tool Access Purpose
Task Manager Ctrl+Alt+Del or Ctrl+Shift+Esc End tasks, monitor performance
Device Manager devmgmt.msc Driver issues, hardware conflicts
Disk Management diskmgmt.msc Partitions, volumes, formatting
Event Viewer eventvwr.msc System and application logs
Registry Editor regedit System configuration (careful!)
Services services.msc Start/stop/manage services
System Configuration msconfig Startup settings, boot options
Resource Monitor resmon Detailed CPU/RAM/Disk/Network usage
System Information msinfo32 Hardware and software inventory

Linux Commands Cheat Sheet Every A+ Candidate Should Know

Command Function
ls List directory contents
cd Change directory
pwd Print working directory
mkdir Make directory
rm Remove file
cp Copy file
mv Move/rename file
chmod Change file permissions
chown Change file ownership
sudo Run as superuser
grep Search text
cat Display file contents
ifconfig / ip addr Network configuration
ping Test connectivity
top System monitor
apt / yum Package managers

Boot Process (Windows)

BIOS/Legacy: POST → BIOS → MBR → Boot Manager → OS

UEFI/Modern: POST → UEFI → GPT → Boot Manager → OS

Key recovery options:

  • Startup Repair: Fixes boot issues automatically
  • System Restore: Rolls back system to a restore point
  • Safe Mode: Boots with minimal drivers
  • WinRE: Windows Recovery Environment (advanced)

6. Security

Malware Types (Know Every One)

Type What It Does Key Identifier
Virus Attaches to files, spreads Requires user action
Worm Self-replicates across network No user action needed
Trojan Disguises as legitimate software Looks useful, isn’t
Ransomware Encrypts files for payment Ransom demand
Rootkit Hides deep in OS Hard to detect/remove
Spyware Monitors activity Slow PC, data theft
Adware Shows unwanted ads Pop-ups everywhere
Keylogger Records keystrokes Credential theft
Botnet/Zombie Remote control of PC Part of attack network
Cryptominer Uses CPU for mining High unexplained CPU usage

Memory trick for worm vs virus: A worm travels through networks on its own. A virus needs a host (file) to ride.

Social Engineering Attacks

Attack Method Target
Phishing Fake email Anyone
Spear phishing Targeted fake email Specific person
Whaling Targets executives C-level executives
Vishing Voice/phone call Anyone
Smishing SMS text message Mobile users
Tailgating Following someone through a door Physical security
Shoulder surfing Looking over someone’s shoulder Physical access
Dumpster diving Going through trash Anyone with documents

Encryption Standards

Standard Type Key Size Use
AES Symmetric 128/192/256-bit Industry standard
DES Symmetric 56-bit Outdated, insecure
3DES Symmetric 112/168-bit Legacy
RSA Asymmetric 1024-4096-bit Key exchange, certificates
ECC Asymmetric 256-bit Mobile, modern

Windows Security Features

Feature What It Does
BitLocker Full disk encryption
EFS Encrypts individual files/folders
Windows Defender Antivirus and anti-malware
UAC Prompts for admin approval
Windows Firewall Blocks unauthorized network access
Secure Boot Prevents unauthorized OS loading
TPM Stores encryption keys in hardware

Key distinction: BitLocker encrypts the entire drive. EFS encrypts individual files. BitLocker requires TPM or USB key.

Authentication Methods

Method Category Example
Password Something you know PIN, passphrase
Smart card Something you have CAC card
Biometrics Something you are Fingerprint, face
Token Something you have Hardware key
MFA Multiple factors Password + fingerprint

Physical Security Controls

Control Type Purpose
Mantrap/airlock Physical Control entry to secure areas
Biometric scanner Physical Identify users by trait
Badge/key fob Physical Access restricted areas
Cable lock Physical Prevent laptop theft
Privacy screen Physical Prevent shoulder surfing
Camera/CCTV Physical Monitor activity
Bollards Physical Vehicle barrier

Malware Removal: The 6-Step Process

  1. Investigate and verify malware symptoms
  2. Quarantine the infected system (disconnect from network)
  3. Disable System Restore (prevent malware from hiding in restore points)
  4. Remediate (update antimalware, scan, remove)
  5. Schedule scans and run updates
  6. Enable System Restore and create new restore point
  7. Educate end user on how to avoid reinfection

7. Software Troubleshooting

Windows Error Messages and Causes

Error Likely Cause
BSOD (Stop Error) Hardware failure, driver conflict, RAM issue
Black screen Video card/driver issue, POST failure
Spinning wheel (no boot) Boot sector corruption, missing OS
Application crashes Software conflict, corrupted install
DLL errors Missing or corrupt system files
Slow performance RAM shortage, HDD failing, malware
High disk activity Low RAM (paging), failing HDD, malware

Mobile OS Troubleshooting

Symptom Likely Fix
Battery draining fast Background apps, location services
Overheating Too many apps, charging issue
App crashes Clear cache, reinstall app
No signal Airplane mode on, carrier issue
Slow performance Low storage, old OS, too many apps
Touch not responding Screen damage, restart device

8. Operational Procedures

Ticketing System Basics

Priority Description Response Time
Critical Entire organization affected Immediate
High Department or multiple users Within 1 hour
Medium Single user, significant impact Within 4 hours
Low Single user, minor impact Within 24 hours

Exam scenario: Server down affecting everyone = Critical. One person can’t print = Low.

Backup Types

Type What It Backs Up Clears Archive Bit Restore Process
Full Everything ✅ Yes Simple, one tape
Incremental Changes since last backup ✅ Yes Complex, need all tapes
Differential Changes since last full ❌ No Medium, need full + last diff

Memory trick: Incremental = I only keep today’s changes (fast to back up, slow to restore). Differential = Difference from the full (slower to back up, faster to restore).

Environmental Safety

Hazard Protection
ESD (static) Antistatic wrist strap, antistatic bag
Heat Thermal paste, proper airflow
Power spikes Surge protector, UPS
Battery disposal Local recycling, never regular trash
Toner/ink disposal Manufacturer recycling programs

Change Management Process

Step Purpose
Request Document what change is needed
Impact analysis Assess risk and affected systems
Approval Change control board signs off
Testing Test in sandbox first
Implementation Schedule maintenance window
Documentation Record what was done
Rollback plan Know how to undo if something breaks

Documentation Types

Document What It Contains
Network diagram Visual layout of network
Asset inventory All hardware and software
Knowledge base Solutions to common problems
Standard procedures Step-by-step processes
Incident report Record of security events

The Numbers You MUST Memorize

These numbers come up constantly in exam questions:

Exam Basics:

  • Max questions per exam: 90
  • Time per exam: 90 minutes
  • Core 1 passing score: 675/900
  • Core 2 passing score: 700/900
  • Cost per exam: $265
  • Retake wait time: 14 days
  • Certification validity: 3 years

Hardware:

  • Cat 5e max speed: 1 Gbps
  • Cat 6 max speed with full length: 1 Gbps (10 Gbps at 55m)
  • SATA III max speed: 6 Gbps
  • USB 3.0 speed: 5 Gbps
  • Thunderbolt 3 speed: 40 Gbps

Networking:

  • APIPA range: 169.254.x.x
  • Loopback: 127.0.0.1
  • Bluetooth Class 2 range: 10 meters
  • Maximum Ethernet cable length: 100 meters

Exam Day Strategy

The night before:

  • Review this cheat sheet
  • Get 8 hours sleep (seriously, this matters more than last-minute cramming)
  • Prepare your ID — no ID, no exam

First 5 minutes of the exam:

  • Skim through questions to gauge difficulty
  • Mark complex PBQs and return to them
  • Start with questions you know cold to build confidence

During the exam:

  • Read every question TWICE before answering
  • Eliminate obviously wrong answers first
  • “Most likely,” “FIRST,” and “BEST” = CompTIA’s favorite trap words
  • There’s no penalty for guessing — never leave a question blank

Time management:

  • Core 1: Roughly 1 minute per question
  • PBQs: Budget 8-12 minutes each
  • Leave 10 minutes at the end to review flagged questions

Your First 30 Days After Passing A+

You passed both exams. Now what?

Week 1-2:

  • Update LinkedIn with A+ certification
  • Start applying for Help Desk and IT Support roles
  • Salary range to expect: $45,000-$65,000 entry level

Week 3-4:

  • Begin studying for Network+ (logical next step)
  • Or pivot to Security+ for cybersecurity path
  • Build your home lab for hands-on practice

The career math: Certified professionals earn 15-25% more and have a 40% higher promotion rate in their first year compared to uncertified counterparts.

A+ opens doors to roles including technical support specialist, field service technician, help desk technician, service desk analyst, and desktop support administrator. Each of those roles leads somewhere bigger if you keep building your certification stack.

[Enroll in our CompTIA A+ training program today] and get lifetime access to everything you need to pass both exams and launch your IT career.

This cheat sheet covers the CompTIA A+ 220-1201 (Core 1) and 220-1202 (Core 2) exam objectives. Exam content is subject to change — always verify current objectives at comptia.org.

P.S. — Bookmark this page. Share it with study partners. Print it. Dog-ear it. The more you reference it during your studies, the more naturally the concepts will surface on exam day.

Scroll to Top