🔷️RAID 0



🔷️RAID 1



🔷️RAID 5



🔷️RAID 6



🔷️RAID 10




No alternative text description for this image

CompTIA A+ 1002 Objectives

1.0 Operating Systems 27%

2.0 Security 24%

3.0 Software Troubleshooting 26%

4.0 Operational Procedures 23%

1.0 Operating Systems

1.1 Compare and contrast common operating system types and their purposes.

• 32-bit vs. 64-bit • Workstation operating systems • Cell phone/tablet operating systems • Vendor-specific limitations • Compatibility concerns between operating systems

1.2 Compare and contrast features of Microsoft Windows versions.

• Windows 7 • Windows 8 • Windows 8.1 • Windows 10 • Corporate vs. personal needs

1.3 Summarize general OS installation considerations and upgrade methods.

• Boot methods • Type of installations • Partitioning • File system types/formatting • Load alternate third-party drivers when necessary • Workgroup vs. Domain setup • Time/date/region/language settings • Driver installation, software, and Windows updates • Factory recovery partition • Properly formatted boot drive with the correct partitions/format • Prerequisites/hardware compatibility • Application compatibility • OS compatibility/upgrade path

1.4 Given a scenario, use appropriate Microsoft command line tools.

• shutdown • dism • sfc • chkdsk • diskpart • taskkill • gpupdate • gpresult • format • copy • xcopy • robocopy • net use • net user • [command name] /? • Commands available with standard privileges vs. administrative privileges

1.5 Given a scenario, use Microsoft operating system features and tools.

• Administrative • MSConfig • Task Manager • Disk Management • System utilities

1.6 Given a scenario, use Microsoft Windows Control Panel utilities.

• Internet Options • Display/Display Settings • User Accounts • Credential Manager • Programs and features • HomeGroup • Devices and Printers • Sound • Troubleshooting • Network and Sharing Center • Device Manager • Bitlocker • Sync Center

1.7 Summarize application installation and configuration concepts.

• System requirements • OS requirements • Methods of installation and deployment • Local user permissions

1.8 Given a scenario, configure Microsoft Windows networking on a client/desktop.

• HomeGroup vs. Workgroup • Domain setup • Network shares/administrative shares/mapping drives • Printer sharing vs. network printer mapping • Establish networking connections • Proxy settings • Remote Desktop Connection • Remote Assistance • Home vs. Work vs. Public network settings • Firewall settings

1.9 Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems.

• Best practices • Tools • Features • Basic Linux commands

2.0 Security

2.1 Summarize the importance of physical security measures.

• Mantrap • Badge reader • Smart card • Security guard • Door lock • Biometric locks • Hardware tokens • Cable locks • Server locks • USB locks • Privacy screen • Key fobs • Entry control roster

2.2 Explain logical security concepts.

• MDM policies • Port security • MAC address filtering • Certificates • Antivirus/Anti-malware • Firewalls • User authentication/strong passwords • Multifactor authentication • Directory permissions • VPN • DLP • Access control lists • Smart card • Email filtering • Trusted/untrusted software sources • Principle of least privilege

2.3 Compare and contrast wireless security protocols and authentication methods

• Protocols and encryption • Authentication

2.4 Given a scenario, detect, remove, and prevent malware using appropriate tools and methods.

• Malware • Tools and methods

2.5 Compare and contrast social engineering, threats, and vulnerabilities.

• DDoS • DoS • Zero-day • Man-in-the-middle • Brute force • Dictionary • Rainbow table • Spoofing • Non-compliant systems • Zombie

2.6 Compare and contrast the differences of basic Microsoft Windows OS security settings.

User and groups • NTFS vs. share permissions • Shared files and folders • Run as administrator vs. standard user • BitLocker • BitLocker To Go • EFS

2.7 Given a scenario, implement security best practices to secure a workstation.

• Password best practices • Account management • Disable autorun • Data encryption • Patch/update management

2.8 Given a scenario, implement methods for securing mobile devices.

• Screen locks • Remote wipes • Locator applications • Remote backup applications • Failed login attempts restrictions • Antivirus/Anti-malware • Patching/OS updates • Biometric authentication • Full device encryption • Multifactor authentication

2.9 Given a scenario, implement appropriate data destruction and disposal methods.

• Physical destruction • Recycling or repurposing best practices

2.10 Given a scenario, configure security on SOHO wireless and wired networks.

• Wireless-specific s • Firewall settings • Port forwarding/mapping • Disabling ports • Content filtering/parental controls • Update firmware • Physical security

3.0 Software Troubleshooting

3.1 Given a scenario, troubleshoot Microsoft Windows OS problems.

• Common symptoms • Common solutions

3.2 Given a scenario, troubleshoot and resolve PC security issues.

• Common symptoms

3.3 Given a scenario, use best practice procedures for malware removal.

1. Identify and research malware symptoms. 2. Quarantine the infected systems. 3. Disable System Restore (in Windows). 4. Remediate the infected systems. 5. Schedule scans and run updates. 6. Enable System Restore and create a restore point (in Windows). 7. Educate the end user.

3.4 Given a scenario, troubleshoot mobile OS and application issues.

• Common symptoms

3.5 Given a scenario, troubleshoot mobile OS and application security issues.

• Common symptoms

4.0 Operational Procedures

4.1 Compare and contrast best practices associated with types of documentation.

Network topology diagrams • Knowledge base/articles • Incident documentation • Regulatory and compliance policy • Acceptable use policy

4.2 Given a scenario, implement basic change management best practices.

Documented business processes • Purpose of the change • Scope the change • Risk analysis • Plan for change • End-user acceptance

4.3 Given a scenario, implement basic disaster prevention and recovery methods

• Surge protector • Cloud storage vs. local storage backups • Account recovery options • Backup testing • UPS

4.4 Explain common safety procedures

• Equipment grounding • Proper component handling and storage

4.5 Explain environmental impacts and appropriate controls.

• MSDS documentation for handling and disposal • Temperature, humidity level awareness, and proper ventilation

4.6 Explain the processes for addressing prohibited content/ activity, and privacy, licensing, and policy concepts.

• Incident response • Licensing/DRM/EULA • Regulated data Follow all policies and security best practices

4.7 Given a scenario, use proper communication techniques and professionalism.

• Use proper language and avoid jargon, acronyms, and slang, when applicable • Maintain a positive attitude/ project confidence • Actively listen (taking notes) and avoid interrupting the customer • Be culturally sensitive

4.8 Identify the basics of scripting.

• Environment variables • Comment syntax • Basic script constructs

4.9 Given a scenario, use remote access technologies.

• RDP • Telnet • SSH • Third-party tools

Looking for online A+ training? Visit

CompTIA A+ Acronyms

Here’s the Network+ Objectives as well

AC Alternating Current

ACL Access Control List

ACPI Advanced Configuration Power Interface

ADF Automatic Document Feeder

ADSL Asymmetrical Digital Subscriber Line

AES Advanced Encryption Standard

AHCI Advanced Host Controller Interface AP Access Point

APIPA Automatic Private Internet Protocol Addressing

APM Advanced Power Management

ARP Address Resolution Protocol

ASR Automated System Recovery

ATA Advanced Technology Attachment

ATAPI Advanced Technology Attachment Packet Interface

ATM Asynchronous Transfer Mode

ATX Advanced Technology Extended

AUP Acceptable Use Policy

A/V Audio Video

BD-R Blu-ray Disc Recordable

BIOS Basic Input/Output System

BD-RE Blu-ray Disc Rewritable

BNC Bayonet-Neill-Concelman

BSOD Blue Screen of Death

BYOD Bring Your Own Device CAD Computer-Aided Design CAPTCHA Completely Automated Public Turing test to tell Computers and Humans Apart CD Compact Disc

CD-ROM Compact Disc-Read-Only Memory

CD-RW Compact Disc-Rewritable

CDFS Compact Disc File System

CERT Computer Emergency Response Team

CFS Central File System, Common File System, or Command File System

CGA Computer Graphics and Applications

CIDR Classless Inter-Domain Routing

CIFS Common Internet File System

CMOS Complementary Metal-Oxide Semiconductor

CNR Communications and Networking Riser

COMx Communication port (x=port number)

CPU Central Processing Unit

CRT Cathode-Ray Tube

DaaS Data as a Service

DAC Discretionary Access Control

DB-25 Serial Communications

D-Shell Connector, 25 pins DB-9 Serial Communications D-Shell Connector, 9 pins D

DaaS Database as a Service

DC Direct Current

DDoS Distributed Denial of Service

DDR Double Data Rate

DDR RAM Double Data Rate Random Access Memory

DFS Distributed File System

DHCP Dynamic Host Configuration Protocol

DIMM Dual Inline Memory Module

DIN Deutsche Industrie Norm

DLT Digital Linear Tape

DLP Digital Light Processing or Data Loss Prevention

DMA Direct Memory Access

DMZ Demilitarized Zone

DNS Domain Name Service or Domain Name Server

DoS Denial of Service

DRAM Dynamic Random Access Memory

DRM Digital Rights Management

DSL Digital Subscriber Line

DVD Digital Versatile Disc

DVD-RAM Digital Versatile Disc-Random Access Memory

DVD-ROM Digital Versatile Disc-Read Only Memory

DVD-R Digital Versatile Disc-Recordable

DVD-RW Digital Versatile Disc-Rewritable

DVI Digital Visual Interface

DVI-D Digital Visual Interface–Digital

ECC Error Correcting Code

ECP Extended Capabilities Port

EEPROM Electrically Erasable Programmable Read-Only Memory

EFS Encrypting File System

EIDE Enhanced Integrated Drive Electronics

EMI Electromagnetic Interference

EMP Electromagnetic Pulse

EPROM Erasable Programmable Read-Only Memory

EPP Enhanced Parallel Port

ERD Emergency Repair Disk

eSATA External Serial Advanced Technology Attachment

ESD Electrostatic Discharge

EULA End User License Agreement

EVGA Extended Video Graphics Adapter/Array

Ext2 Second Extended File System

exFAT Extended File Allocation Table

FAT File Allocation Table

FAT12 12-bit File Allocation Table

FAT16 16-bit File Allocation Table

FAT32 32-bit File Allocation Table

FDD Floppy Disk Drive

FPM Fast Page Mode

FSB Front-Side Bus FTP File Transfer Protocol

FQDN Fully Qualified Domain Name

GDDR Graphics Double Data Rate

GDI Graphics Device Interface

GUI Graphical User Interface

GUID Globally Unique Identifier

GPS Global Positioning System

GPT Partition Table

GPU Graphics Processing Unit

GSM Global System for Mobile Communications

HAL Hardware Abstraction Layer

HAV Hardware Assisted Virtualization

HCL Hardware Compatibility List

HDCP High-Bandwidth Digital Content Protection

HDD Hard Disk Drive

HDMI High Definition Media Interface

HIPS Host Intrusion Prevention System

HPFS High Performance File System

HTML Hypertext Markup Language

HTPC Home Theater PC

HTTP Hypertext Transfer Protocol

HTTPS Hypertext Transfer Protocol Secure

I/O Input/Output

IaaS Infrastructure as a Service

ICMP Internet Control Message Protocol

ICR Intelligent Character Recognition

IDE Integrated Drive Electronics

IDS Intrusion Detection System

IEEE Institute of Electrical and Electronics Engineers

IIS Internet Information Services

IMAP Internet Mail Access Protocol

IMEI International Mobile Equipment Identity

IMSI International Mobile Subscriber Identity

IP Internet Protocol

IPConfig Internet Protocol Configuration

IPP Internet Printing Protocol

IPS Intrusion Prevention System

IPSec Internet Protocol Security

IR Infrared

IrDA Infrared Data Association

IRP Incident Response Plan

IRQ Interrupt Request

ISA Industry Standard Architecture

ISDN Integrated Services Digital Network

ISO International Organization for Standardization

ISP Internet Service Provider

JBOD Just a Bunch of Disks

KB Knowledge Base

KVM Kernel-based Virtual Machine

KVM Keyboard-Video-Mouse

LAN Local Area Network

LBA Logical Block Addressing

LC Lucent Connector

LCD Liquid Crystal Display

LDAP Lightweight Directory Access Protocol

LED Light Emitting Diode

LPD/LPR Line Printer Daemon/Line Printer Remote

LPT Line Printer Terminal

LVD Low Voltage Differential

MAC Media Access Control/Mandatory Access Control

MAN Metropolitan Area Network

MAPI Messaging Application Programming Interface

mATX Micro Advanced Technology Extended

MAU Media Access Unit/Media Attachment Unit

MBR Master Boot Record

MBSA Microsoft Baseline Security Analyzer

MDM Mobile Device Management

MFA Multifactor Authentication

MFD Multifunction Device

MFP Multifunction Product

MicroDIMM Micro Dual Inline Memory Module

MIDI Musical Instrument Digital Interface

MIME Multipurpose Internet Mail Extension

MIMO Multiple Input Multiple Output

MMC Microsoft Management Console

MP3 Moving Picture Experts Group Layer 3 Audio

MP4 Moving Picture Experts Group Layer 4

MPEG Moving Picture Experts Group

MSConfig Microsoft Configuration

MSDS Material Safety Data Sheet

MT-RJ Mechanical Transfer Registered Jack

MUI Multilingual User Interface

NaaS Network as a Service

NAC Network Access Control

NAS Network-Attached Storage

NAT Network Address Translation

NetBIOS Networked Basic Input/Output System

NetBEUI Networked Basic Input/Output System Extended User Interface

NFC Near Field Communication

NFS Network File System

NIC Network Interface Card

NiCd Nickel Cadmium

NiMH Nickel Metal Hydride

NLX New Low-profile Extended

NNTP Network News Transfer Protocol

NTFS New Technology File System

NTLDR New Technology Loader

NTP Network Time Protocol

NTSC National Transmission Standards Committee

NVMe Non-volatile Memory Express

OCR Optical Character Recognition

OEM Original Equipment Manufacturer

OLED Organic Light Emitting Diode

OS Operating System

PaaS Platform as a Service

PAL Phase Alternating Line

PAN Personal Area Network

PAT Port Address Translation

PC Personal Computer

PCI Peripheral Component Interconnect

PCI Payment Card Industry

PCIe Peripheral Component Interconnect Express

PCIX Peripheral Component Interconnect Extended

PCL Printer Control Language

PCMCIA Personal Computer Memory Card International Association

PE Preinstallation Environment

PGA Pin Grid Array

PGA2 Pin Grid Array 2

PGP Pretty Good Protection

PII Personally Identifiable Information

PIN Personal Identification Number

PHI Personal Health Information

PKI Public Key Infrastructure

PnP Plug and Play

PoE Power over Ethernet

POP3 Post Office Protocol 3

PoS Point of Sale

POST Power-On Self-Test

POTS Plain Old Telephone Service

PPM Pages Per Minute

PPP Point-to-Point Protocol

PPTP Point-to-Point Tunneling Protocol

PRI Primary Rate Interface

PROM Programmable Read-Only Memory

PS/2 Personal System/2 connector

PSTN Public Switched Telephone Network

PSU Power Supply Unit

PVA Patterned Vertical Alignment

PVC Permanent Virtual Circuit

PXE Preboot Execution Environment

QoS Quality of Service

RADIUS Remote Authentication Dial-In User Server

RAID Redundant Array of Independent (or Inexpensive) Disks RAM Random Access Memory

RAS Remote Access Service

RDP Remote Desktop Protocol

RF Radio Frequency

RFI Radio Frequency Interference

RFID Radio Frequency Identification

RGB Red Green Blue RIP Routing Information Protocol

RIS Remote Installation Service

RISC Reduced Instruction Set Computer

RJ-11 Registered Jack Function 11

RJ-45 Registered Jack Function 45

RMA Returned Materials Authorization

ROM Read-Only Memory

RPO Recovery Point Objective

RTC Real-Time Clock

RT Recovery Time Objective

Saas Software as a Service

SAN Storage Area Network

SAS Serial Attached SCSI

SATA Serial Advanced Technology Attachment

SC Subscription Channel

SCP Secure Copy Protection

SCSI Small Computer System Interface

SCSI ID Small Computer System Interface Identifier

SD card Secure Digital Card

SEC Single Edge Connector

SFC System File Checker

SFF Small Form Factor

SFTP Secure File Transfer Protocol

SIM Subscriber Identity Module

SIMM Single In-Line Memory Module

SLI Scalable Link Interface or System Level Integration or Scanline Interleave Mode

S.M.A.R.T. Self-Monitoring, Analysis, and Reporting Technology

SMB Server Message Block

SMTP Simple Mail Transfer Protocol

SNMP Simple Network Management Protocol

SoDIMM Small Outline Dual Inline Memory Module

SOHO Small Office/Home Office

SP Service Pack

SPDIF Sony-Philips Digital Interface Format

SPGA Staggered Pin Grid Array

SRAM Static Random Access Memory

SSD Solid State Drive

SSH Secure Shell

SSID Service Set Identifier

SSL Secure Sockets Layer

SSO Single Sign-on

ST Straight Tip

STP Shielded Twisted Pair

SXGA Super Extended Graphics Array

TACACS Terminal Access Controller Access-Control System

TCP Transmission Control Protocol

TCP/IP Transmission Control Protocol/Internet Protocol

TDR Time Domain Reflectometer

TFTP Trivial File Transfer Protocol

TKIP Temporal Key Integrity Protocol

TLS Transport Layer Security

TN Twisted Nematic

TPM Trusted Platform Module

UAC User Account Control

UDF User Defined Functions or Universal Disk Format or Universal Data Format

UDP User Datagram Protocol

UEFI Unified Extensible Firmware Interface

UNC Universal Naming Convention

UPnP Universal Plug and Play

UPS Uninterruptible Power Supply

URL Uniform Resource Locator

USB Universal Serial Bus

USMT User State Migration Tool

UTM Unified Threat Management

UTP Unshielded Twisted Pair

UXGA Ultra Extended Graphics Array

VA Vertical Alignment

VDC Volts DC

VDI Virtual Desktop Infrastructure

VESA Video Electronics Standards Association

VFAT Virtual File Allocation Table

VGA Video Graphics Array

VLAN Virtual LAN

VM Virtual Machine

VNC Virtual Network Computer

VoIP Voice over Internet Protocol

VPN Virtual Private Network

VRAM Video Random Access Memory

WAN Wide Area Network

WAP Wireless Access Protocol/Wireless Access Point

WEP Wired Equivalent Privacy

WIFI Wireless Fidelity WINS Windows Internet Name Service

WLAN Wireless Local Area Network

WMN Wireless Mesh Network

WPA Wireless Protected Access

WPA2 WiFi Protected Access 2

WPS WiFi Protected Setup

WUXGA Wide Ultra Extended Graphics Array

WWAN Wireless Wide Area Network

XGA Extended Graphics Array

ZIF Zero-Insertion-Force

ZIP Zigzag Inline Package

Looking for online A+ training? Visit

CompTIA A+ 1001 Objectives

The CompTIA exam has six domains with several objectives within each domain.

1.0 Mobile Devices 14%

2.0 Networking 20%

3.0 Hardware 27%

4.0 Virtualization and Cloud Computing 12%

5.0 Hardware and Network Troubleshooting 27%

1.0 Mobile Devices

1.1 Given a scenario, install and configure laptop hardware and components

• Hardware/device replacement

1.2 Given a scenario, install components within the display of a laptop

• Types • WiFi antenna connector/placement • Webcam • Microphone • Inverter • Digitizer/touchscreen

1.3 Given a scenario, use appropriate laptop features.

• Docking station • Port replicator • Physical laptop lock and cable lock • Rotating/removable screens Special function keys

1.4 Compare and contrast characteristics of various types of other mobile devices.

• Tablets • Smartphones • Wearable technology devices • E-readers • GPS

1.5 Given a scenario, connect and configure accessories and ports of other mobile devices.

• Connection types • Accessories

1.6 Given a scenario, configure basic mobile device network connectivity and application support.

• Wireless/cellular data network (enable/disable) • Bluetooth • Corporate and ISP email configuration • Integrated commercial provider email configuration • PRI updates/PRL updates/ baseband updates • Radio firmware • IMEI vs. IMSI • VPN

1.7 Given a scenario, use methods to perform mobile device synchronization.

• Synchronization methods • Types of data to synchronize • Mutual authentication for multiple services (SSO) • Software requirements to install the application on the PC • Connection types to enable synchronization

2.0 Networking

2.1 Compare and contrast TCP and UDP ports, protocols, and their purposes.

• Ports and protocols • TCP vs. UDP

2.2 Compare and contrast common networking hardware devices

• Routers • Switches Access points • Cloud-based network controller • Firewall • Network interface card • Repeater • Hub • Cable/DSL modem • Bridge • Patch panel • Power over Ethernet (PoE)

2.3 Given a scenario, install and configure a basic wired/wireless SOHO network.

• Router/switch functionality • Access point settings • IP addressing • NIC configuration • End-user device configuration • IoT device configuration • Cable/DSL modem configuration • Firewall settings • QoS • Wireless settings

2.4 Compare and contrast wireless networking protocols.

• 802.11a • 802.11b • 802.11g • 802.11n • 802.11ac • Frequencies • Bluetooth • NFC • RFID • Zigbee • Z-Wave • 3G • 4G • 5G • LTE

2.5 Summarize the properties and purposes of services provided by networked hosts.

• Server roles • Internet appliance

2.6 Explain common network configuration concepts.

• IP addressing • DNS • DHCP • IPv4 vs. IPv6 • Subnet mask • Gateway • VPN • VLAN • NAT

2.7 Compare and contrast Internet connection types, network types, and their features.

• Internet connection types • Network types

2.8 Given a scenario, use appropriate networking tools.

• Crimper • Cable stripper • Multimeter • Tone generator and probe • Cable tester • Loopback plug • Punchdown tool • WiFi analyzer

3.0 Hardware

3.1 Explain basic cable types, features, and their purposes.

• Network cables • Video cables • Multipurpose cables • Peripheral cables • Hard drive cables

3.2 Identify common connector types.

RJ-11 • RJ-45 • RS-232 • BNC • RG-59 • RG-6 • USB • Micro-USB • Mini-USB • USB-C • DB-9 • Lightning • SCSI • eSATA • Molex

3.3 Given a scenario, install RAM types.

• RAM types • Single channel • Dual channel • Triple channel • Error correcting • Parity vs. non-parity

3.4 Given a scenario, select, install and configure storage devices.

• Optical drives • Solid-state drives • Magnetic hard drives • Hybrid drives • Flash

3.5 Given a scenario, install and configure motherboards, CPUs, and add-on cards.

Motherboard form factor • Motherboard connectors types • BIOS/UEFI settings • CMOS battery • CPU features • Compatibility • Cooling mechanism • Expansion cards

3.6 Explain the purposes and uses of various peripheral types

Printer • ADF/flatbed scanner • Barcode scanner/QR scanner • Monitors • VR headset • Optical • DVD drive • Mouse • Keyboard • Touchpad • Signature pad • Game controllers • Camera/webcam • Microphone • Speakers • Headset • Projector • External storage drives • KVM • Magnetic reader/chip reader • NFC/tap pay device • Smart card reader

3.7 Summarize power supply types and features

• Input 115V vs. 220V • Output 5.5V vs. 12V • 24-pin motherboard adapter • Wattage rating • Number of devices/types of devices to be powered

3.8 Given a scenario, select and configure appropriate components for a custom PC configuration to meet customer specifications or needs

• Graphic/CAD/CAM design workstation • Audio/video editing workstation • Virtualization workstation • Gaming PC • Standard thick client • Thin client

3.9 Given a scenario, install and configure common devices.

• Desktop • Laptop/common mobile devices

3.10 Given a scenario, configure SOHO multifunction devices/printers and settings.

• Use appropriate drivers for a given operating system • Device sharing • Public/shared devices

3.11 Given a scenario, install and maintain various print technologies.

• Laser • Inkjet • Thermal • Impact 3D Printers

4.0 Virtualization and Cloud Computing

4.1 Compare and contrast cloud computing concepts

• Common cloud models • Shared resources • Rapid elasticity • On-demand • Resource pooling • Measured service • Metered • Off-site email applications • Cloud file storage services • Virtual application streaming/ cloud-based applications

4.2 Given a scenario, set up and configure client-side virtualization.

• Purpose of virtual machines • Resource requirements • Emulator requirements • Security requirements • Network requirements • Hypervisor

5.0 Hardware and Network Troubleshooting

5.1 Given a scenario, use the best practice methodology to resolve problems.

• Always consider corporate policies, procedures, and impacts before implementing changes 1. Identify the problem 2. Establish a theory of probable cause (question the obvious) 3. Test the theory to determine cause 4. Establish a plan of action to resolve the problem and implement the solution 5. Verify full system functionality and, if applicable, implement preventive measures 6. Document findings, actions, and outcomes

5.2 Given a scenario, troubleshoot problems related to motherboards, RAM, CPUs, and power.

• Common symptoms

5.3 Given a scenario, troubleshoot hard drives and RAID arrays

• Common symptoms

5.4 Given a scenario, troubleshoot video, projector, and display issues.

• Common symptoms

5.5 Given a scenario, troubleshoot common mobile device issues while adhering to the appropriate procedures.

• Common symptoms • Disassembling processes for proper reassembly

5.6 Given a scenario, troubleshoot printers.

• Common symptoms

5.6 Common symptoms Given a scenario, troubleshoot common wired and wireless network problems.

• Common symptoms

Looking for online A+ training? Visit

New CompTIA A+ Exam Requirements

CompTIA A+ Exam Requirements

The A+ exam was just updated to the 220 1001/1002.  Below is what to expect.



The  CompTIA A+ Exam A+ exam is broken down into two exams:

  •  CompTIA A+ Exam 901 – Focuses on hardware 170$ US
  •  CompTIA A+ Exam 902- Focuses on software 170$ US

Total examination costs =330$ US (varies depending on location).  

To become  CompTIA  A+ certified students must successfully complete both exams



You have 90 minutes to complete the CompTIA A+ Exam.  However, once the exam has started there are no breaks given unless there is a malfunction with the test.



The CompTIA A+ exam has a maximum of 90 questions.  There is a myriad of questions types such as:

  • Multiple Choice
  • Multiple Answer
  • Drag & Drop
  • Simulation

Passing Score


The passing score for each test is as follows:

  • 901- 675 out of 900
  • 902- 700 OUT OF 900



Students must recertify every three years.  Students can waive recertification by enrolling into CompTIA’s continuing education for an annual fee.  Another route to recertification is by simply acquiring a higher level certification.  For example, a student who is A+ certified, can get security+ certified as well.  In doing so they not only obtain the Security+ certification but also renew their A+ certification.