Ultimate CompTIA A+ Cheat Sheet (220-1201 and 220-1202)

CompTIA A+ Cheat Sheet Featured Image

You’ve made an excellent choice aiming for the CompTIA A+ certification. It goes without saying that you want to excel in these exams. A+ gives you a solid footing as you embark on a new career in IT, and it contains essential IT knowledge for a journey into cyber security.

As A+ covers many technical topics broadly, it can be challenging to recall fine details, especially when troubleshooting problems described in the exam questions.
Therefore, we’ve prepared this CompTIA A+ cheat sheet for you as an ongoing revision checklist and to provide direction in your exam preparation. Get a copy of this CompTIA A+ cheat sheet for your desk here. When you’re ready, let’s review our must-know concepts below.

About CompTIA A+ Certifications

CompTIA A+ is a popular entry point into the IT and cyber security industry. If you’re seeking to become a technical support specialist, field service technician, help desk technician, service desk analyst, data support technician, or desktop support administrator, A+ will get your foot in the door.

You must pass two examinations to obtain A+: 

  • Core 1 (220-1201), which focuses on mobile devices, hardware, networking, virtualization, and cloud computing; and 
  • Core 2 (220-1202), which is about software, cyber security, and operational procedures. 

Troubleshooting is a main component in both exams.

Each of the Core examinations has at most 90 questions, either multiple-choice or performance-based. You must complete each exam in 90 minutes. On a scale of 100–900, the passing scores for Core 1 and Core 2 are 675 and 700, respectively.

The latest CompTIA A+ exam codes are 220-1201 for Core 1 and 220-1202 for Core 2. They have been available since March 2025 and will retire in 2027–2028. Both exams cost a combined total of $265 USD (see all pricing).

As an authorized CompTIA partner, we are able to offer significant discounts on exam vouchers. Click the banner below to see our prices.

A+ has no formal prerequisites, but CompTIA recommends that you have 12 months of hands-on experience in an IT support specialist job role.

Here is a chart on CompTIA A+ exam objectives (domains):

CompTIA A+ Exam Domain

CompTIA A+ Exam Domains

A+ Core 1 (220-1201) Domains:

Domain% of exam
Mobile Devices13%
Networking23%
Hardware25%
Virtualization and Cloud Computing11%
Hardware and Network Troubleshooting28%

A+ Core 2 (220-1202) Domains:

Domain% of exam
Operating Systems28%
Security28%
Software Troubleshooting23%
Operational Procedures21%

Despite its practicality and necessity for A+ competence, the Troubleshooting Methodology illustrated below is no longer a formal A+ examination objective with explicit test items. Still, you’ll have to apply it in answering A+ exam questions.

CompTIA A+ Troubleshooting Methodology

Technical Troubleshooting—Best Practice Methodology

Without further ado, let’s plunge into the cheat sheets for each of 220-1201 and 220-1202.

Core 1 220-1201 Cheat Sheet

This section covers important concepts for Core 1. We skip the domain on troubleshooting as it builds upon the other domains.

Mobile Devices

With the ubiquity of mobile devices, mastering the configuration of mobile devices is an essential skill for aspiring IT support technicians.

ConceptExplanation
Random Access Memory (RAM)• RAM DIMMs include DDR (184 pins), DDR2 (240 pins), DDR3 (240 pins) and DDR4 (288 pins).
• RAM SODIMMs include DDR (200 pin), DDR2 (200 pin), DDR3 (204 pin), and DDR4 (260 pin).
• Dual-channel: 2× width of 128-bit bus. 
• Triple-channel: 3× width of 192-bit bus. 
• Quad-channel: 4× width of 256-bit bus. 
• Latency measured as CL or CAS.
Hard disk drive (HDD)Speeds: 5,400 RPM, 7,200 RPM, 10,000 RPM, 15,000 RPM
Form factors: 3.5”, 2.5”
Solid-state drive (SSD)Communication interfaces:

• Non-Volatile Memory Express (NVMe)
SATA
• Peripheral Component Interconnect Express (PCIe): x1, x2, x8, x16

Form factors: M.2, mSATA
BluetoothShort-range technology for simplifying communication and connectivity among network devices
Bluetooth transmission range lengths• Class I: 100m
• Class II: 10m (most popular)
• Class III: 1m (unpopular)
Bluetooth maximum data transfer rate• Version 1: 721 Kb/s
• Version 2: 2.1 Mb/s
• Version 3: 24 Mb/s
Subscriber Identity Module (SIM)/eSIMUsed for identifying a user to a mobile network, allowing access to voice and data services.
TetheringUsing smartphone cellular data connection to provide internet access to another device
Docking stationHardware containing multiple ports to connect your laptop or mobile device to other devices, such as larger monitors, and lets you charge devices
Port replicatorHardware for quickly connecting multiple peripherals to a laptop via USB technologies. Be prepared for exam questions comparing docking station vs port replicator.

Recognizing data caps
• Monitor data usage
• Set data limits and warnings
• Limit background data
• Adjust sync frequency
• Disable automatic downloads
• Use Wi-Fi when possible
3G vs 4G vs 5G

Networking

A+ covers network topologies, the devices connecting them, ports, protocols, and the software aspects of networking.

ConceptExplanation
AAAAuthentication, Authorization, and Accounting
WISPWireless internet service provider
Transmission Control Protocol (TCP)Connection-oriented, SYN-ACK handshake (SSD)
User Datagram Protocol (UDP)Connectionless, best-effort
LANLocal area network
WANWide area network
MANMetropolitan area network
PANPersonal area network
SANStorage area network
WLANWireless local area network
VLANVirtual LAN
VPNVirtual private network
SwitchConnect computers in LAN
RouterConnects ≥2 LANs to the Internet
FirewallSafeguards computers and networks against unauthorized access
UTMUnified threat management
MACMedia access control
DSLDigital subscriber line
ONTOptical network terminal
APIPAAutomatic Private IP Addressing
PoEPower over Ethernet
DKIMDomainKeys Identified Mail
SPFSender Policy Framework
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image

Wireless Ethernet:

VersionData transmission rateFrequency modulation (GHz)
802.11a54 Mb/s5
802.11b11 Mb/s2.4
802.11g54 Mb/s2.4
802.11n300/600 Mb/s2.4, 5
802.11ac≥1.7 Gb/s5
802.11ax≤9.6 Gb/s2.4, 5, 6

Ports and Protocols:

PortNetwork protocol 
21File Transfer Protocol (FTP)
22Secure Shell (SSH)
23Telnet
25, 587Simple Mail Transfer Protocol (SMTP)
53Domain Naming System (DNS)
67/68Dynamic Host Configuration Protocol (DHCP)
80Hypertext Transfer Protocol (HTTP)
110Post Office Protocol (POP3)
137–139NetBIOS
143Internet Message Access Protocol (IMAP)
389Lightweight Directory Access Protocol (LDAP)
443HTTP Secure (HTTPS)
445Server Message Block (SMB)/Common Internet File System (CIFS)
3389Remote Desktop Protocol (RDP)

Remember to check out our Common Ports Cheat Sheet.

Common Ports And Protocol

Common ports and protocols

Hardware

Acquaint yourself with different hardware specifications and their purposes.

ConceptExplanation
MotherboardFor connecting all components.Form factors: ATX, microATX, and ITX.Types of expansion buses: PCI Express (PCIe) and PCI.Intel chipsets link to CPU via DMI or QPI.AMD CPU-to-chipset connection is HyperTransport.
Central processing unit (CPU)Handles most calculations. Each core contains L1/L2 cache. The entire CPU shares L3 cache.
Intel CPUs use these sockets:LGA77511501155115613662011
AMD CPUs use these sockets:AM3AM3+FM1FM2FM2
Serial Advanced Technology Attachment (SATA)Consists of a 15-pin power connection and a 7-pin data connector.
Revisions:Rev 1 (1.5 Gb/s),Rev 2 (3 Gb/s),Rev 3 (6 Gb/s),Rev 3.2 (SATA Express) (16 Gb/s),Rev 3.2 (SATA Express) (16 Gb/s).
mSATA = mini-SATA.eSATA = External SATA.
Redundant Array of Independent/Inexpensive Disks (RAID)RAID 0 = striping; not fault-tolerant.RAID 1 = mirroring. RAID 1 + two disk controllers = disk duplexing.RAID 5 = striping with parity.RAID 6 = double-parity RAID for fault tolerance and data redundancy.RAID 10 = mirrored sets in a striped set.
Small Computer Systems Interface (SCSI)Modern SCSI standards:Serial Attached SCSI (SAS)Internet SCSI
IPSIn-plane switching. Possesses wider viewing angle.
TNTwisted nematic
OLEDOrganic light-emitting diode
Mini-LEDMini light-emitting diode
Optical mediaOptical disc drives use changeable media to store and retrieve data.
Versions:read-only memory (ROM)write-once ®rewritable/write-many (RW)
LaptopPortable miniaturized versions of desktop computers. Uses M.2, Mini PCIe, and Mini PCI (internal) and ExpressCard /34 and /54 (external).
Replaceable components:KeyboardsTouchpadsSODIMM RAMScreensInvertersBatteriesOptical disc drivesSmart card readersHard drives (SSD, HDD, or hybrid).
Heat sinkWhen installing a heat sink, use thermal paste or pads for filling in gaps and increasing thermal conductivity between CPU and heat sink.
Liquid-based cooling systems have higher thermal transfer capabilities than air cooling.
To minimize overheating, a “dual-rail” power supply unit (PSU) separates and controls the current in each wire.
Sound cardLinks as x1 PCIe (or PCI cards) and will typically have PC 99 color-coded 1/8” mini-jacks for I/O and speakers and optical I/Os known as S/PDIF.
Video cardYou link them to motherboards through x16 PCIe or PCI expansion slots.
Video connector types and cables:DVIVGAHDMIMini-HDMIDisplayPortMini DisplayPortS-VideoComponent Video/RGBComposite
Typical color depths:16-bit24-bit32-bit
Typical resolutions (aspect ratio)1280×720 (720p, 16:9)1920×1080 (1080p, 16:9)1366×786 (16:9)1680×1050 (WSXGA+, 8:5)1920×1200 (WUXGA, 8:5)640×480 (VGA, 4:3)
BIOS/Unified Extensible Firmware Interface (UEFI)Locates, tests, and initializes components and boots to the hard drive, optical disc, USB flash drive, or network by PXE.CMOS stores time/date and passwords.A CR2032 lithium battery powers the CMOS.
ThunderboltVersion 1 is 10 Gb/s and uses DisplayPort;Version 2 is 20 Gb/s and also uses DisplayPort;Version 3 is 40 Gb/s and uses USB-C.
Universal Serial Bus (USB)USB 2.0USB 3.0USB-CmicroUSBminiUSB
T568AWhite/greenGreenWhite/orangeBlueWhite/blueOrangeWhite/brownBrown
T568BSwap “green” and “orange” in T568A
Single-mode vs. multimode(Optic fiber) Allowing one or multiple light modes to propagate
CoaxialF-type, Bayonet Neill–Concelman
Twinaxial/twinaxHas two inner conductors instead of one as in coaxial
STP/UTPShielded/Unshielded twisted pair; RJ45, RJ11 (Registered jack)
OpticalSC, ST, LC, FC, MT-RJ
SCSubscriber connector
STStraight tip
LCLucent connector
FCFibre Channel
Plenum-ratedFire-resistant cable; compare with riser-rated, non-plenum rated, and PVC
UTP categoryDefine speed and length of cables:Cat 3Cat 5Cat 5eCat 6/6aCat 7Cat 8
MolexPower connector in older computers and fans
LightningProprietary Apple connection interface for charging and data transfer
DisplayPortFor connecting a video source to a display device such as a monitor. Be prepared to compare DisplayPort vs HDMI in exam questions.

Virtualization and Cloud Computing

Both virtualization technologies and cloud computing were minor topics in earlier versions of A+, but they’re only getting more popular. Therefore, they’re here to stay.

AbbreviationExplanation
IaaSInfrastructure as a service
PaaSPlatform as a service
SaaSSoftware as a service
VDIVirtual desktop infrastructure

Virtual machines (VMs) come in these two types:

HypervisorElaboration
Type 1Bare or native metal
Type 2App-like VM on the operating system

Here are additional virtualization concepts to grasp:

ConceptExplanation
Ingress/EgressManagement of network traffic entering/leaving a specific environment
ElasticityDynamic adjustability of resource allocation in response to changing workload demands
AvailabilityOperationability and accessibility despite failures or planned downtime
MultitenancyA single instance of an application serves multiple users while maintaining separate data and configurations.

Core 2 220-1202 Cheat Sheet

This section covers key ideas for Core 2. We skip the domain on troubleshooting as it builds upon the other domains.

Operating Systems

It’s essential to become familiar with various operating systems, particularly Windows. You can also get our command-line cheat sheets for Linux and Unix (applies to Mac).

ConceptExplanation
Master boot record (MBR)A hard drive has up to four partitions but only one extended partition.
GPT (GUID Partition Table)A hard drive has 128 partitions and may exceed MBR’s 2 TB limit. Stored in multiple locations. Requires UEFI-compliant motherboard.
EOLEnd-of-life
CDFSCompact disc file system
NFSNetwork file system
NTFSNew Technology File System
ReFSResilient File System
FAT32File Allocation Table 32
ext4Fourth extended file systems
exFATExtensible File Allocation Table
XFSExtended filesystem
APFSApple File System

Security

Here are some essential cyber security concepts you must know to pass A+.

Wireless encryption protocols:

AcronymsExplanation
WPA2, WPA3 Wi-Fi Protected Access (version 2 and 3)
TKIPTemporal Key Integrity Protocol
AESAdvanced Encryption Standard
RADIUSRemote Authentication Dial-In User Service
TACACS+Terminal Access Controller Access-Control System

Social Engineering:

TechniqueExplanation
Phishing/Vishing/SmishingAttack by email/telephone or voicemail/SMS
QR code phishingAttack by QR code
Spear phishingAttack by emails purportedly from trusted senders
WhalingPhishing that targets high-ranking people, such as C-suite executives
Shoulder surfingLook over someone’s shoulder, often with a recording device
TailgatingUnauthorized entity follows authorized party into secured premises
ImpersonationAttacks using stolen credentials or personal information
Dumpster divingRecover information from trash
Evil twinSetting up a fake Wi-Fi access point, hoping people choose it over the genuine one.

Threats:

NameExplanation
Denial of service (DoS)Overwhelming a target using a single machine
Distributed denial of service (DDoS)DoS using multiple machines
Zero-day attackVulnerability unbeknownst to developers
SpoofingFaking authorized access
On-path attackWi-Fi network as a trap
Brute-force attackTrying character combinations
Dictionary attackUsing lists of probable passwords
Insider threatAn insider potentially uses their authorized access or understanding of an organization to harm that organization
Structured Query Language (SQL) injectionManipulating SQL to modify remote database (such as by using sqlmap)
Cross-site scripting (XSS)Injecting malicious scripts into normal websites
Business email compromise (BEC)Hijacking chain-of-command
Supply chain/pipeline attackCompromising the supply chain

Mitigations:

The following table is not an exhaustive list of mitigations.

AcronymExplanation
EDREndpoint detection and response
MDRManaged detection and response
XDRExtended detection and response
ACLAccess control list
Email security gatewayIncoming/outgoing email monitoring/filtering gatekeeper
Software firewallNetwork traffic monitor and controller

Malware:

NameExplanation
VirusRuns on a computer without the user’s knowledge.
Example: Boot sector virus
WormReplicates itself across a network
Trojan HorseUseful utility covering for malicious programs
SpywareSpies on a computer and records its activities.
Examples: keylogger, adware, stalkerware
RootkitGains administrator-level access to the system core undetected
RansomwareHolds a computer hostage until the user pays
CryptominerCPU hijacker to mine crypto
Fileless malwareRuns legitimate programs on RAM without creating or downloading files
PUP Potentially unwanted program
Best Practicess for Malware Removed

Best Practice Procedures for Malware Removal

Operational Procedures

The following table outlines some best practices related to documentation, change management, and backup/recovery.

Acronym/conceptExplanation
CMDBConfiguration Management Database
SLAService-level agreement
SOPStandard operating procedures
GFSGrandfather-father-son
Other backup rotation schemes:Onsite vs. offsite3-2-1 backup rule
ESDElectrostatic discharge
Ticketing systemsUser informationDevice informationDescription of issuesCategoriesSeverityEscalation levelsIssue descriptionProgress notesIssue resolution
BackupFullIncrementalDifferentialSynthetic full 

CompTIA A+ Cheat Sheet Conclusion

We hope this updated CompTIA A+ cheat sheet helps you in your studies as a brief recap of key points. 

Don’t forget to look into our latest CompTIA A+ courses and practice tests for comprehensive exam preparation. You can purchase our CompTIA Certification Path Foundation Course Bundle, granting lifetime access to Tech+ and A+ courses, practice tests, and flashcards.

Or join the StationX Master’s Program for access to over 30,000 courses and labs, covering everything you need for a career in IT, Network Administration, or Cyber Security.

You can also purchase your exam voucher through StationX at a discounted price. We offer savings of up to 30% on CompTIA exam voucher. See our voucher page for more details.

Above all, we wish you success in the exam and beyond.

Frequently Asked Questions

Guarantee Your Cyber Security Career with the StationX Master’s Program!

Get real work experience and a job guarantee in the StationX Master’s Program. Dive into tailored training, mentorship, and community support that accelerates your career.

  • Job Guarantee & Real Work Experience: Launch your cybersecurity career with guaranteed placement and hands-on experience within our Master’s Program.
  • 30,000+ Courses and Labs: Hands-on, comprehensive training covering all the skills you need to excel in any role in the field.
  • Pass Certification Exams: Resources and exam simulations that help you succeed with confidence.
  • Mentorship and Career Coaching: Personalized advice, resume help, and interview coaching to boost your career.
  • Community Access: Engage with a thriving community of peers and professionals for ongoing support.
  • Advanced Training for Real-World Skills: Courses and simulations designed for real job scenarios.
  • Exclusive Events and Networking: Join events and exclusive networking opportunities to expand your connections.

TAKE THE NEXT STEP IN YOUR CAREER TODAY!

  • Cassandra Lee

    Cassandra Lee is a Certified in Cybersecurity (CC) professional, freelance programmer, and former robotics operator. With a background in data science, web development, and journalism, she’s contributed to outlets like HuffPost and Ada Lovelace Day, and advocates passionately for women in STEM through writing, speaking, and mentorship. You can find Cassandra on LinkedIn and Linktree.

>

StationX Accelerator Pro

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Accelerator Pro Program. Stay tuned for more!

StationX Accelerator Premium

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Accelerator Premium Program. Stay tuned for more!

StationX Master's Program

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Master’s Program. Stay tuned for more!