CompTIA A+ Core 2 (220-1202) Cheatsheet — High-Yield OS, Security & Ops

Fast recall for 220-1202: Windows/macOS/Linux basics, key utilities and commands, startup & recovery, user/account and permissions, security hardening & malware response, mobile/MDM, scripting, and operational procedures.

Use this for last-mile review. Star weak rows and re-drill with practice.


1) Windows editions & features (quick map)

FeatureHomeProEnterprise/EducationNotes
Domain join / Group PolicyBusiness environments
BitLockerFull-disk encryption
Hyper-VVirtualization
Remote Desktop hostClient → host access
Assigned Access / AppLockerLimitedKiosk / allow-lists

2) Core Windows tools (where to click)

NeedToolPath
System overviewSystem / AboutSettings → System → About
Device driversDevice ManagerWin+X → Device Manager
Network basicsNetwork & InternetSettings → Network & Internet
Local securityLocal Security Policysecpol.msc (Pro+)
Local users/groupslusrmgr.mscPro+ (not Home)
ServicesServicesservices.msc
Disk tasksDisk Managementdiskmgmt.msc
Resource viewTask ManagerCtrl+Shift+Esc
LogsEvent Viewereventvwr.msc

3) Windows command quickies

TaskCommandNotes
IP/DNSipconfig /allStack config
Reachabilityping, tracertPath/latency
Name lookupnslookupDNS test
Filesystem checkchkdsk /fFix errors (may require reboot)
System filessfc /scannowVerify/repair protected files
Image repairDISM /Online /Cleanup-Image /RestoreHealthUse before/after SFC
Boot repairbootrec /fixmbr bootrec /fixboot bootrec /rebuildbcdWinRE
Boot configbcdeditEdit boot entries
Startup appstaskmgr → Startup tabEnable/disable
Processestasklist, taskkill /PID n /FCLI control
Policy refreshgpupdate /forcePro+

4) Startup, recovery & reset

  • Safe Mode: Shift+Restart → Troubleshoot → Advanced → Startup Settings.
  • WinRE tools: Startup Repair, System Restore, Command Prompt, Uninstall Updates, UEFI Firmware Settings.
  • System Restore: Roll back system files/registry (not documents).
  • Reset this PC: Keep files vs remove everything; local vs cloud reinstall.
  • MSConfig (legacy): Diagnostic/Selective startup; today prefer Task Manager + Services.

5) Disks, file systems & shares

  • NTFS: permissions, quotas, EFS; exFAT for flash; FAT32 legacy.
  • Share vs NTFS permissions: Effective = most restrictive. Share applies over network; NTFS local & network.
  • Attributes: Read-only, Hidden, System; show via Folder Options.
  • Map network drive: Explorer or net use Z: \\server\share /user:DOMAIN\user.

6) Accounts, UAC & permissions

  • Local vs Microsoft accounts; Groups: Administrators, Users, Guests.
  • UAC: prompts on elevation; keep at default or higher.
  • Least privilege: standard user for daily tasks; elevate only when needed.
  • Run as: Shift-right-click → Run as different user.

7) Security hardening (Windows)

  • Updates: Windows Update automatic.
  • Defender AV/Firewall: on by default; real-time + periodic scans.
  • Firewall profiles: Domain, Private, Public; set correct network profile.
  • BitLocker (Pro+): TPM + PIN for best protection; store recovery key safely.
  • RDP: allow only when required; restrict via firewall, NLA, and groups.
  • Account policies: lockout thresholds; password length/age (or passphrases + MFA).

8) Malware response (CompTIA order)

  1. Identify symptoms (pop-ups, slowdowns, unknown processes).
  2. Quarantine the system (isolate network, no file sharing).
  3. Disable System Restore (prevents re-infection from restore points).
  4. Remediate: update definitions, Safe Mode scan, remove malware; reimage if needed.
  5. Schedule scans / updates; enable System Restore.
  6. Create restore point.
  7. Educate the user (phishing, attachments, macros, downloads).

9) macOS essentials

NeedToolPath
System infoAbout This Mac → About
ActivityActivity MonitorApplications → Utilities
DisksDisk UtilityApps → Utilities
UpdatesSystem Settings → General → Software Update
Terminalbash/zshApps → Utilities
  • Time Machine backups; FileVault full-disk encryption; Keychain passwords/certs.

10) Linux essentials

  • Package managers: apt, dnf, yum, pacman.
  • Services: systemctl status|start|stop <svc>.
  • Network: ip a, ip r, nmcli, ping, dig.
  • Permissions: chmod, chown, sudo.
  • Logs: /var/log, journalctl.
  • Editors: nano, vi.

11) Mobile OS & MDM (Core 2 depth)

  • iOS: Face ID/Touch ID, iCloud, Screen Time, profiles via MDM.
  • Android: Google account, biometric unlock, app permissions, Work Profile.
  • MDM controls: passcode policy, remote lock/wipe, app allow/deny, Wi-Fi/VPN profiles, certificate deployment.
  • Secure comms: company portal apps, per-app VPN, device compliance checks.

12) Authentication & access

  • Something you know/have/are; prefer MFA.
  • Biometrics: Windows Hello, Touch ID, Android biometrics.
  • Certificates/Smart cards in enterprise; 802.1X (awareness).
  • SSO improves UX; still enforce least privilege.

13) Scripting basics (PowerShell, Bash, Python)

  • PowerShell: objects, Get-Command, Get-Help, Get-Service, Get-Process, pipes; run as admin.
  • Bash: shebang #!/usr/bin/env bash, variables, if/for, exit codes $?.
  • Python: shebang, venv, pip, simple file/OS tasks.
  • Task scheduling: Task Scheduler (Windows), cron/systemd timers (Linux).
  • Safety: test in non-prod; log actions; parameterize paths; validate inputs.

14) Operational procedures

  • Documentation: ticket notes, change records, asset tags, diagrams.
  • Change management: request → assess risk → approvals → maintenance window → backout plan → comms.
  • Incident response: identify → contain → eradicate → recover → lessons learned.
  • SLAs/OLAs: response vs resolution targets; prioritize accordingly.
  • Professionalism: active listening, empathy, avoid jargon, confirm resolution, follow-up.

15) Privacy, safety & disposal

  • PII/PHI/PCI: handle on a need-to-know basis; encrypt at rest/in transit.
  • Safety: ESD strap/mat, proper lifting, cable management, power off & unplug before service.
  • Disposal: shred/drill platters, secure erase/crypto-erase SSDs, follow e-waste laws.

16) Quick pickers (scenario speed)

  • App won’t start after update → Safe Mode, roll back/uninstall, Event Viewer, sfc/DISM.
  • Slow login on domain → Network profile/Public firewall, DNS to domain controller, GPO processing.
  • High CPU/Mem → Task Manager → sort by usage; check startup items/services.
  • Disk 100% → Resource Monitor; check Superfetch/SysMain, updates, AV scan, SMART.
  • Browser hijack → Extensions/add-ons, reset profile, DNS, hosts file, full malware workflow.
  • Access denied → NTFS permissions vs share; ownership; run elevated.
  • BitLocker prompt for key → Hardware change/TPM event; retrieve key from Azure AD/AD or printed copy.

How to use: If you hesitate on any row, convert it into a 2-bullet rule of thumb and drill a 20–25 question set on that topic tomorrow.