The Ultimate CompTIA A+ Cheat Sheet (220-1201 & 220-1202): Everything You Need to Pass Both Exams
The Night Before Panic is Real, this Cheat Sheet Fixes It.
You had been studying for three months. Stack of flashcards. Two textbooks. Dozens of videos. The night before your Core 1 exam, you sat at your desk and realized you couldn’t remember the difference between DDR3 and DDR4 pin counts. Or which RAID level uses double parity. Or the exact speeds for each USB version.
Three months of knowledge. Completely scrambled because there was no single organized reference.
This cheat sheet is what you needed.
Bookmark it. Print it. Tape it to your wall. However you learn best, make this your go-to.
The Big Picture: What Is CompTIA A+?
CompTIA A+ is the IT industry’s most recognized entry-level certification. It validates that you can install, configure, and maintain hardware components and mobile devices, troubleshoot hardware, network, and connectivity issues, configure SOHO networks, and apply basic cybersecurity methods.
Two exams. Both required. No shortcuts.
The latest exam codes are 220-1201 for Core 1 and 220-1202 for Core 2, available since March 2025 and retiring in 2027–2028. Both exams combined cost $265 USD.
Each exam has a maximum of 90 questions including multiple-choice, drag-and-drop, and performance-based questions, with 90 minutes to complete. The passing score for Core 1 is 675, and Core 2 requires 700, both on a scale of 900.
Core 1 (220-1201) Domain Breakdown
| Domain | Weight | What It Means |
|---|---|---|
| Mobile Devices | 13% | Smartphones, tablets, configuration |
| Networking | 23% | Cables, protocols, wireless, IP addressing |
| Hardware | 25% | CPU, RAM, storage, printers, peripherals |
| Virtualization & Cloud | 11% | VMs, cloud models, containers |
| Hardware & Network Troubleshooting | 28% | Diagnosing and fixing real problems |
Core 2 (220-1202) Domain Breakdown
| Domain | Weight | What It Means |
|---|---|---|
| Operating Systems | 28% | Windows, Linux, macOS, mobile OS |
| Security | 28% | Malware, encryption, access controls |
| Software Troubleshooting | 23% | Fixing OS and application issues |
| Operational Procedures | 21% | Help desk, documentation, safety |
The golden rule: Troubleshooting and Networking together make up more than half of Core 1. Security and Operating Systems dominate Core 2. Weight your study time accordingly.
The Troubleshooting Methodology – CompTIA A+ Cheat Sheet (Apply This to Everything)
The troubleshooting methodology is no longer a formal exam objective with explicit test items, but you still need to apply it when answering A+ questions. Think of it as your mental framework for every scenario question.
| Step | What You Do | Real-World Example |
|---|---|---|
| 1. Identify the problem | Ask questions, gather information | “When did it start? What changed?” |
| 2. Establish theory of probable cause | What’s most likely wrong? | “Probably the RAM or the PSU” |
| 3. Test the theory | Confirm or eliminate | Swap the RAM, try a different outlet |
| 4. Establish plan of action | Know your fix before you start | “I’ll replace the DIMM and reboot” |
| 5. Implement solution or escalate | Fix it or hand it up | Replace component, update drivers |
| 6. Verify functionality | Did it actually work? | Test everything, not just the broken part |
| 7. Document | Write it down | Ticket notes, asset management system |
Exam tip: When a scenario question asks “what should you do FIRST,” the answer is almost always in steps 1-2. Identify and theorize before you touch anything.
CORE 1 (220-1201) CompTIA A+ CHEAT SHEET
1. Mobile Devices
Connection Types
| Technology | Range/Speed | Use Case |
|---|---|---|
| Bluetooth | Up to 100m (Class 1) | Wireless peripherals, audio |
| NFC | Within ~4 inches | Tap-to-pay, file sharing |
| Wi-Fi | Up to 100m+ | Internet connectivity |
| Hotspot/Tethering | Varies | Share cellular data with other devices |
| GPS | Global | Location services |
| Cellular (4G/5G) | Carrier-dependent | Mobile internet |
Bluetooth Classes
| Class | Range | Common Use |
|---|---|---|
| Class 1 | 100m | Industrial devices |
| Class 2 | 10m | Most consumer devices |
| Class 3 | 1m | Rarely used |
Exam trap: Tethering = sharing your phone’s cellular data. Hotspot = same thing, wireless version. Don’t confuse docking station (charges device, expands ports) with port replicator (USB-only, no charging).
Mobile Device Management (MDM)
| Feature | What It Does |
|---|---|
| Remote wipe | Erase device data remotely |
| Geofencing | Restrict device by location |
| Application management | Push/block specific apps |
| BYOD policy | Personal device rules for corporate use |
| Corporate policy | Company-owned device configuration |
Cellular Technology Comparison
| Standard | Max Speed | Notes |
|---|---|---|
| 3G | ~21 Mbps | Legacy, being phased out |
| 4G LTE | ~150 Mbps | Current mainstream standard |
| 5G | ~10 Gbps | Latest, millimeter wave limitations |
2. Networking
Essential Network Terminology
| Term | Meaning |
|---|---|
| LAN | Local Area Network |
| WAN | Wide Area Network |
| MAN | Metropolitan Area Network |
| PAN | Personal Area Network |
| WLAN | Wireless LAN |
| VLAN | Virtual LAN (logical segmentation) |
| VPN | Virtual Private Network |
| SAN | Storage Area Network |
| APIPA | Automatic Private IP Addressing (169.254.x.x) |
| PoE | Power over Ethernet |
| UTM | Unified Threat Management |
Network Devices
| Device | Function | Key Detail |
|---|---|---|
| Switch | Connects devices within a LAN | Uses MAC addresses |
| Router | Connects multiple networks | Uses IP addresses |
| Hub | Broadcasts to all ports | Outdated, avoid |
| Firewall | Filters traffic | Hardware or software |
| WAP | Wireless access point | Extends wireless coverage |
| Modem | Converts signal types | DSL, cable, fiber |
Ports and Protocols (Memorize These)
| Port | Protocol | Memory Trick |
|---|---|---|
| 21 | FTP | “21 = File Transfer” |
| 22 | SSH | “22 = Secure Shell, 2 S’s” |
| 23 | Telnet | “23 = Telnet (insecure, old)” |
| 25 | SMTP | “25 = Send Mail To People” |
| 53 | DNS | “53 = Domain Name System” |
| 67/68 | DHCP | “67/68 = Dynamic (two ports)” |
| 80 | HTTP | “80 = Web browsing” |
| 110 | POP3 | “110 = Post Office (old email)” |
| 143 | IMAP | “143 = Internet Mail (modern)” |
| 389 | LDAP | “389 = Directory” |
| 443 | HTTPS | “443 = Secure Web” |
| 445 | SMB | “445 = File Sharing (Windows)” |
| 587 | SMTP (secure) | “587 = Secure email sending” |
| 3389 | RDP | “3389 = Remote Desktop” |
Exam tip: POP3 downloads email (deletes from server by default). IMAP syncs email (stays on server). SMTP sends email. This distinction shows up constantly.
Wi-Fi Standards (802.11)
| Standard | Max Speed | Frequency | Memory Trick |
|---|---|---|---|
| 802.11a | 54 Mbps | 5 GHz | “a = alone on 5GHz” |
| 802.11b | 11 Mbps | 2.4 GHz | “b = barely fast” |
| 802.11g | 54 Mbps | 2.4 GHz | “g = good for its time” |
| 802.11n | 600 Mbps | 2.4/5 GHz | “n = notably dual band” |
| 802.11ac | 1.7 Gbps | 5 GHz | “ac = actually fast” |
| 802.11ax (Wi-Fi 6) | 9.6 Gbps | 2.4/5/6 GHz | “ax = extreme” |
IP Addressing Quick Reference
| Type | Range | Use |
|---|---|---|
| Class A | 1.0.0.0 – 126.255.255.255 | Large networks |
| Class B | 128.0.0.0 – 191.255.255.255 | Medium networks |
| Class C | 192.0.0.0 – 223.255.255.255 | Small networks |
| APIPA | 169.254.0.0 – 169.254.255.255 | DHCP failure |
| Loopback | 127.0.0.1 | Test local network card |
Cable Types and Connectors
| Cable Type | Connector | Max Speed | Max Length |
|---|---|---|---|
| Cat 5 | RJ45 | 100 Mbps | 100m |
| Cat 5e | RJ45 | 1 Gbps | 100m |
| Cat 6 | RJ45 | 10 Gbps | 55m |
| Cat 6a | RJ45 | 10 Gbps | 100m |
| Cat 7 | GG45/TERA | 10 Gbps | 100m |
| Cat 8 | RJ45 | 40 Gbps | 30m |
| Coaxial | F-type, BNC | Varies | Varies |
| Fiber (single-mode) | SC, ST, LC, FC | 100 Gbps+ | Miles |
| Fiber (multimode) | SC, ST, LC | 10 Gbps | 550m |
T568A vs T568B Wiring (Drag-and-Drop Favorite)
| Pin | T568A | T568B |
|---|---|---|
| 1 | White/Green | White/Orange |
| 2 | Green | Orange |
| 3 | White/Orange | White/Green |
| 4 | Blue | Blue |
| 5 | White/Blue | White/Blue |
| 6 | Orange | Green |
| 7 | White/Brown | White/Brown |
| 8 | Brown | Brown |
Memory trick: T568B = Business standard (most common in the US). T568A = used in government installations. A straight-through cable uses same standard on both ends. A crossover cable uses A on one end, B on the other.
3. Hardware
CPU Sockets
| Intel Sockets | AMD Sockets |
|---|---|
| LGA 775 | AM3 |
| LGA 1150/1151/1155/1156 | AM3+ |
| LGA 1200 | AM4 |
| LGA 1700 | AM5 |
| LGA 2011/2066 | TR4/TRX40 (Threadripper) |
Critical rule: Intel CPU socket ≠ AMD CPU socket. They are never interchangeable. If you see a build scenario, match the CPU brand to the correct socket family.
RAM Deep Dive
| Type | Pins (DIMM) | Pins (SODIMM) | Speed |
|---|---|---|---|
| DDR | 184 | 200 | Up to 400 MHz |
| DDR2 | 240 | 200 | Up to 1066 MHz |
| DDR3 | 240 | 204 | Up to 2133 MHz |
| DDR4 | 288 | 260 | Up to 3200 MHz+ |
| DDR5 | 288 | 262 | Up to 6400 MHz+ |
Key RAM concepts:
- Dual-channel: Install in matching slots (1&3 or 2&4). Doubles effective bandwidth
- ECC RAM: Error-correcting memory. Used in servers, not consumer PCs
- SODIMM: Small form factor for laptops
- Virtual RAM (paging file): Uses hard drive as overflow RAM. Slow but better than crashing
Storage: HDD vs SSD vs NVMe
| Type | Interface | Form Factor | Speed | Use Case |
|---|---|---|---|---|
| HDD (5400 RPM) | SATA | 2.5″/3.5″ | ~100 MB/s | Budget storage |
| HDD (7200 RPM) | SATA | 3.5″ | ~150 MB/s | Desktop storage |
| SSD (SATA) | SATA III | 2.5″/M.2 | ~550 MB/s | Everyday computing |
| SSD (NVMe) | PCIe/M.2 | M.2 | ~3500 MB/s | High performance |
| SSD (NVMe Gen 4) | PCIe 4.0/M.2 | M.2 | ~7000 MB/s | Workstation/gaming |
RAID Levels (Exam Favorite)
| RAID | Type | Min Drives | Fault Tolerant | Speed | Capacity |
|---|---|---|---|---|---|
| RAID 0 | Striping | 2 | No | Fastest | 100% |
| RAID 1 | Mirroring | 2 | Yes (1 drive) | Read fast | 50% |
| RAID 5 | Stripe + Parity | 3 | Yes (1 drive) | Good | ~67-94% |
| RAID 6 | Double Parity | 4 | Yes (2 drives) | Moderate | Variable |
| RAID 10 | Mirror + Stripe | 4 | Yes | Fast | 50% |
Decision framework for exam scenarios:
- “Maximum performance, redundancy not required” → RAID 0
- “Must not lose data, only 2 drives” → RAID 1
- “Balance of performance and redundancy, 3+ drives” → RAID 5
- “Maximum protection, can afford drive failures” → RAID 6
- “Best of both worlds, money no object” → RAID 10
Motherboard Form Factors
| Form Factor | Size | Use Case |
|---|---|---|
| ATX | 12″ × 9.6″ | Standard desktop |
| MicroATX | 9.6″ × 9.6″ | Compact desktop |
| Mini-ITX | 6.7″ × 6.7″ | Small form factor |
| E-ATX | 12″ × 13″ | High-end workstations |
PCIe Expansion Slots
| Slot | Lanes | Typical Use |
|---|---|---|
| PCIe x1 | 1 | Sound cards, network cards |
| PCIe x4 | 4 | Some SSDs, network cards |
| PCIe x8 | 8 | Some GPUs, RAID controllers |
| PCIe x16 | 16 | Graphics cards (primary) |
Power Supply (PSU) Connectors
| Connector | Pins | Powers |
|---|---|---|
| 24-pin ATX | 24 | Motherboard |
| 4/8-pin EPS | 4 or 8 | CPU |
| 6+2 PCIe | 6 or 8 | Graphics card |
| SATA power | 15 | SATA drives, optical |
| Molex | 4 | Older devices, fans |
Video Connectors Comparison
| Connector | Max Resolution | Digital/Analog | Audio |
|---|---|---|---|
| VGA | 1080p (limited) | Analog | ❌ |
| DVI-A | 1080p | Analog | ❌ |
| DVI-D | 1080p | Digital | ❌ |
| DVI-I | 1080p | Both | ❌ |
| HDMI | 10K (2.1) | Digital | ✅ |
| DisplayPort | 16K (2.0) | Digital | ✅ |
| Thunderbolt 3/4 | 8K | Digital | ✅ |
Exam tip: VGA is analog only, lowest quality. DisplayPort has the highest bandwidth. HDMI carries audio automatically. Thunderbolt uses the USB-C connector shape.
Thunderbolt Versions
| Version | Speed | Connector | Notes |
|---|---|---|---|
| Thunderbolt 1 | 10 Gbps | Mini DisplayPort | Original |
| Thunderbolt 2 | 20 Gbps | Mini DisplayPort | Daisy-chain |
| Thunderbolt 3 | 40 Gbps | USB-C | Major update |
| Thunderbolt 4 | 40 Gbps | USB-C | More requirements |
USB Standards
| Standard | Speed | Max Power |
|---|---|---|
| USB 1.1 | 12 Mbps | 2.5W |
| USB 2.0 | 480 Mbps | 2.5W |
| USB 3.0 (3.1 Gen 1) | 5 Gbps | 4.5W |
| USB 3.1 Gen 2 | 10 Gbps | 100W |
| USB 3.2 | 20 Gbps | 100W |
| USB 4 | 40 Gbps | 100W |
Printer Types and Troubleshooting
| Problem | Laser Printer Cause | Inkjet Cause |
|---|---|---|
| Streaks on page | Dirty/damaged drum | Clogged printhead |
| Faded output | Low toner | Low ink |
| Ghosting/shadows | Drum not fully erasing | N/A (inkjet) |
| Smearing/smudging | Faulty fuser | Ink not dry |
| Paper jams | Worn pickup rollers | Paper type |
| Spots/dots | Dirty drum | Dirty printhead |
| Lines on top only | Clogged toner | Dried nozzles |
Laser printer process (in order): Processing → Charging → Exposing → Developing → Transferring → Fusing → Cleaning
Memory trick: “Please Come Eat Dinner Tonight For Cake”
4. Virtualization and Cloud Computing
Cloud Service Models
| Model | What’s Managed By You | Examples |
|---|---|---|
| IaaS (Infrastructure) | OS, apps, data | AWS EC2, Azure VMs |
| PaaS (Platform) | Apps, data | Google App Engine, Heroku |
| SaaS (Software) | Just your data | Microsoft 365, Salesforce |
Memory trick: “I Prefer Standing” = IaaS → PaaS → SaaS (most control → least control)
Cloud Deployment Models
| Model | Access | Who Uses It |
|---|---|---|
| Public | Anyone | Consumers, small businesses |
| Private | One organization | Large enterprises, government |
| Hybrid | Mixed | Organizations with compliance needs |
| Community | Shared group | Organizations with common needs |
Hypervisors
| Type | What It Runs On | Examples |
|---|---|---|
| Type 1 (Bare Metal) | Directly on hardware | VMware ESXi, Hyper-V |
| Type 2 (Hosted) | On top of an OS | VirtualBox, VMware Workstation |
Exam tip: Type 1 is faster (no host OS overhead). Type 2 is easier to set up. For enterprise servers, Type 1. For practice labs, Type 2.
Virtualization Terms
| Term | Meaning |
|---|---|
| VM Snapshot | Point-in-time copy of VM state |
| VM Template | Pre-configured VM for rapid deployment |
| Container | Lightweight, OS-level virtualization |
| VDI | Virtual Desktop Infrastructure |
| Cloud bursting | Extend on-premise resources to cloud when needed |
CORE 2 (220-1202) CompTIA A+ CHEAT SHEET
5. Operating Systems
Windows Versions Quick Reference
| Feature | Windows 10 Home | Windows 10 Pro | Windows 10 Enterprise |
|---|---|---|---|
| Domain join | ❌ | ✅ | ✅ |
| BitLocker | ❌ | ✅ | ✅ |
| Group Policy | Limited | ✅ | ✅ |
| Remote Desktop (host) | ❌ | ✅ | ✅ |
| Hyper-V | ❌ | ✅ | ✅ |
Exam rule: Home ≠ business. Any domain, BitLocker, or Group Policy question = Pro or Enterprise minimum.
File Systems Comparison
| File System | OS | Max File Size | Max Volume | Notes |
|---|---|---|---|---|
| FAT32 | Windows | 4GB | 2TB | Cross-platform, old |
| exFAT | Windows/macOS | 16 EB | 128 PB | Flash drives, cross-platform |
| NTFS | Windows | 16 TB | 256 TB | Permissions, encryption |
| EXT4 | Linux | 16 TB | 1 EB | Default Linux |
| APFS | macOS | 8 EB | 8 EB | Modern Mac standard |
| ReFS | Windows Server | 35 PB | 35 PB | Enterprise, resilient |
The crossover rule: Need to use a USB drive on both Windows AND Mac? Use exFAT. FAT32 has a 4GB file limit (you’ll hit it with large videos). NTFS doesn’t play nice with older macOS.
Disk Partitioning: MBR vs GPT
| Feature | MBR | GPT |
|---|---|---|
| Max disk size | 2 TB | 9.4 ZB |
| Max partitions | 4 primary | 128 primary |
| Boot mode | Legacy BIOS | UEFI |
| OS support | All Windows | Windows 8+, modern Linux/Mac |
Rule of thumb: New systems = GPT. Old legacy systems = MBR. Drives over 2TB = must use GPT.
Essential Windows Command Line Tools
| Command | What It Does | Critical Flags |
|---|---|---|
ipconfig |
Shows network config | /all /release /renew /flushdns |
ping |
Tests connectivity | -t (continuous) -n (count) |
tracert |
Shows path to destination | N/A |
nslookup |
Tests DNS resolution | N/A |
netstat |
Shows active connections | -an (all, numerical) |
chkdsk |
Checks disk for errors | /f (fix) /r (bad sectors) |
sfc |
System File Checker | /scannow |
diskpart |
Disk partitioning | Interactive tool |
gpupdate |
Updates Group Policy | /force |
tasklist |
Lists running processes | N/A |
taskkill |
Kills a process | /PID [number] |
shutdown |
Shutdown/restart | /s (shutdown) /r (restart) |
format |
Formats a drive | /q (quick) /fs (filesystem) |
robocopy |
Advanced file copy | More reliable than xcopy |
Windows Troubleshooting Tools
| Tool | Access | Purpose |
|---|---|---|
| Task Manager | Ctrl+Alt+Del or Ctrl+Shift+Esc | End tasks, monitor performance |
| Device Manager | devmgmt.msc | Driver issues, hardware conflicts |
| Disk Management | diskmgmt.msc | Partitions, volumes, formatting |
| Event Viewer | eventvwr.msc | System and application logs |
| Registry Editor | regedit | System configuration (careful!) |
| Services | services.msc | Start/stop/manage services |
| System Configuration | msconfig | Startup settings, boot options |
| Resource Monitor | resmon | Detailed CPU/RAM/Disk/Network usage |
| System Information | msinfo32 | Hardware and software inventory |
Linux Commands Cheat Sheet Every A+ Candidate Should Know
| Command | Function |
|---|---|
ls |
List directory contents |
cd |
Change directory |
pwd |
Print working directory |
mkdir |
Make directory |
rm |
Remove file |
cp |
Copy file |
mv |
Move/rename file |
chmod |
Change file permissions |
chown |
Change file ownership |
sudo |
Run as superuser |
grep |
Search text |
cat |
Display file contents |
ifconfig / ip addr |
Network configuration |
ping |
Test connectivity |
top |
System monitor |
apt / yum |
Package managers |
Boot Process (Windows)
BIOS/Legacy: POST → BIOS → MBR → Boot Manager → OS
UEFI/Modern: POST → UEFI → GPT → Boot Manager → OS
Key recovery options:
- Startup Repair: Fixes boot issues automatically
- System Restore: Rolls back system to a restore point
- Safe Mode: Boots with minimal drivers
- WinRE: Windows Recovery Environment (advanced)
6. Security
Malware Types (Know Every One)
| Type | What It Does | Key Identifier |
|---|---|---|
| Virus | Attaches to files, spreads | Requires user action |
| Worm | Self-replicates across network | No user action needed |
| Trojan | Disguises as legitimate software | Looks useful, isn’t |
| Ransomware | Encrypts files for payment | Ransom demand |
| Rootkit | Hides deep in OS | Hard to detect/remove |
| Spyware | Monitors activity | Slow PC, data theft |
| Adware | Shows unwanted ads | Pop-ups everywhere |
| Keylogger | Records keystrokes | Credential theft |
| Botnet/Zombie | Remote control of PC | Part of attack network |
| Cryptominer | Uses CPU for mining | High unexplained CPU usage |
Memory trick for worm vs virus: A worm travels through networks on its own. A virus needs a host (file) to ride.
Social Engineering Attacks
| Attack | Method | Target |
|---|---|---|
| Phishing | Fake email | Anyone |
| Spear phishing | Targeted fake email | Specific person |
| Whaling | Targets executives | C-level executives |
| Vishing | Voice/phone call | Anyone |
| Smishing | SMS text message | Mobile users |
| Tailgating | Following someone through a door | Physical security |
| Shoulder surfing | Looking over someone’s shoulder | Physical access |
| Dumpster diving | Going through trash | Anyone with documents |
Encryption Standards
| Standard | Type | Key Size | Use |
|---|---|---|---|
| AES | Symmetric | 128/192/256-bit | Industry standard |
| DES | Symmetric | 56-bit | Outdated, insecure |
| 3DES | Symmetric | 112/168-bit | Legacy |
| RSA | Asymmetric | 1024-4096-bit | Key exchange, certificates |
| ECC | Asymmetric | 256-bit | Mobile, modern |
Windows Security Features
| Feature | What It Does |
|---|---|
| BitLocker | Full disk encryption |
| EFS | Encrypts individual files/folders |
| Windows Defender | Antivirus and anti-malware |
| UAC | Prompts for admin approval |
| Windows Firewall | Blocks unauthorized network access |
| Secure Boot | Prevents unauthorized OS loading |
| TPM | Stores encryption keys in hardware |
Key distinction: BitLocker encrypts the entire drive. EFS encrypts individual files. BitLocker requires TPM or USB key.
Authentication Methods
| Method | Category | Example |
|---|---|---|
| Password | Something you know | PIN, passphrase |
| Smart card | Something you have | CAC card |
| Biometrics | Something you are | Fingerprint, face |
| Token | Something you have | Hardware key |
| MFA | Multiple factors | Password + fingerprint |
Physical Security Controls
| Control | Type | Purpose |
|---|---|---|
| Mantrap/airlock | Physical | Control entry to secure areas |
| Biometric scanner | Physical | Identify users by trait |
| Badge/key fob | Physical | Access restricted areas |
| Cable lock | Physical | Prevent laptop theft |
| Privacy screen | Physical | Prevent shoulder surfing |
| Camera/CCTV | Physical | Monitor activity |
| Bollards | Physical | Vehicle barrier |
Malware Removal: The 6-Step Process
- Investigate and verify malware symptoms
- Quarantine the infected system (disconnect from network)
- Disable System Restore (prevent malware from hiding in restore points)
- Remediate (update antimalware, scan, remove)
- Schedule scans and run updates
- Enable System Restore and create new restore point
- Educate end user on how to avoid reinfection
7. Software Troubleshooting
Windows Error Messages and Causes
| Error | Likely Cause |
|---|---|
| BSOD (Stop Error) | Hardware failure, driver conflict, RAM issue |
| Black screen | Video card/driver issue, POST failure |
| Spinning wheel (no boot) | Boot sector corruption, missing OS |
| Application crashes | Software conflict, corrupted install |
| DLL errors | Missing or corrupt system files |
| Slow performance | RAM shortage, HDD failing, malware |
| High disk activity | Low RAM (paging), failing HDD, malware |
Mobile OS Troubleshooting
| Symptom | Likely Fix |
|---|---|
| Battery draining fast | Background apps, location services |
| Overheating | Too many apps, charging issue |
| App crashes | Clear cache, reinstall app |
| No signal | Airplane mode on, carrier issue |
| Slow performance | Low storage, old OS, too many apps |
| Touch not responding | Screen damage, restart device |
8. Operational Procedures
Ticketing System Basics
| Priority | Description | Response Time |
|---|---|---|
| Critical | Entire organization affected | Immediate |
| High | Department or multiple users | Within 1 hour |
| Medium | Single user, significant impact | Within 4 hours |
| Low | Single user, minor impact | Within 24 hours |
Exam scenario: Server down affecting everyone = Critical. One person can’t print = Low.
Backup Types
| Type | What It Backs Up | Clears Archive Bit | Restore Process |
|---|---|---|---|
| Full | Everything | ✅ Yes | Simple, one tape |
| Incremental | Changes since last backup | ✅ Yes | Complex, need all tapes |
| Differential | Changes since last full | ❌ No | Medium, need full + last diff |
Memory trick: Incremental = I only keep today’s changes (fast to back up, slow to restore). Differential = Difference from the full (slower to back up, faster to restore).
Environmental Safety
| Hazard | Protection |
|---|---|
| ESD (static) | Antistatic wrist strap, antistatic bag |
| Heat | Thermal paste, proper airflow |
| Power spikes | Surge protector, UPS |
| Battery disposal | Local recycling, never regular trash |
| Toner/ink disposal | Manufacturer recycling programs |
Change Management Process
| Step | Purpose |
|---|---|
| Request | Document what change is needed |
| Impact analysis | Assess risk and affected systems |
| Approval | Change control board signs off |
| Testing | Test in sandbox first |
| Implementation | Schedule maintenance window |
| Documentation | Record what was done |
| Rollback plan | Know how to undo if something breaks |
Documentation Types
| Document | What It Contains |
|---|---|
| Network diagram | Visual layout of network |
| Asset inventory | All hardware and software |
| Knowledge base | Solutions to common problems |
| Standard procedures | Step-by-step processes |
| Incident report | Record of security events |
The Numbers You MUST Memorize
These numbers come up constantly in exam questions:
Exam Basics:
- Max questions per exam: 90
- Time per exam: 90 minutes
- Core 1 passing score: 675/900
- Core 2 passing score: 700/900
- Cost per exam: $265
- Retake wait time: 14 days
- Certification validity: 3 years
Hardware:
- Cat 5e max speed: 1 Gbps
- Cat 6 max speed with full length: 1 Gbps (10 Gbps at 55m)
- SATA III max speed: 6 Gbps
- USB 3.0 speed: 5 Gbps
- Thunderbolt 3 speed: 40 Gbps
Networking:
- APIPA range: 169.254.x.x
- Loopback: 127.0.0.1
- Bluetooth Class 2 range: 10 meters
- Maximum Ethernet cable length: 100 meters
Exam Day Strategy
The night before:
- Review this cheat sheet
- Get 8 hours sleep (seriously, this matters more than last-minute cramming)
- Prepare your ID — no ID, no exam
First 5 minutes of the exam:
- Skim through questions to gauge difficulty
- Mark complex PBQs and return to them
- Start with questions you know cold to build confidence
During the exam:
- Read every question TWICE before answering
- Eliminate obviously wrong answers first
- “Most likely,” “FIRST,” and “BEST” = CompTIA’s favorite trap words
- There’s no penalty for guessing — never leave a question blank
Time management:
- Core 1: Roughly 1 minute per question
- PBQs: Budget 8-12 minutes each
- Leave 10 minutes at the end to review flagged questions
Your First 30 Days After Passing A+
You passed both exams. Now what?
Week 1-2:
- Update LinkedIn with A+ certification
- Start applying for Help Desk and IT Support roles
- Salary range to expect: $45,000-$65,000 entry level
Week 3-4:
- Begin studying for Network+ (logical next step)
- Or pivot to Security+ for cybersecurity path
- Build your home lab for hands-on practice
The career math: Certified professionals earn 15-25% more and have a 40% higher promotion rate in their first year compared to uncertified counterparts.
A+ opens doors to roles including technical support specialist, field service technician, help desk technician, service desk analyst, and desktop support administrator. Each of those roles leads somewhere bigger if you keep building your certification stack.
[Enroll in our CompTIA A+ training program today] and get lifetime access to everything you need to pass both exams and launch your IT career.
This cheat sheet covers the CompTIA A+ 220-1201 (Core 1) and 220-1202 (Core 2) exam objectives. Exam content is subject to change — always verify current objectives at comptia.org.
P.S. — Bookmark this page. Share it with study partners. Print it. Dog-ear it. The more you reference it during your studies, the more naturally the concepts will surface on exam day.