What exactly is covered on Core 2 (220-1202)?
Core 2 focuses on operating systems, security, software troubleshooting, and operational procedures. That means Windows/macOS/Linux/ChromeOS basics, account/permission models, updates and patching, malware response workflow, logging and diagnostics, and professional practices (documentation, change/incident, safety, privacy/disposal).
How is Core 2 different from Core 1?
- Core 1 (220-1201): hardware, mobile, networking, virtualization (client), and troubleshooting.
- Core 2 (220-1202): operating systems, security, software troubleshooting, operational procedures.
You need both to earn A+. Order doesn’t matter—take the one you’re more ready for first.
Yes, expect multiple-choice (single/multiple response) and a handful of performance-based questions (PBQs). PBQs simulate tasks (permissions, malware steps, log reading, recovery options). If a PBQ is time-consuming: skip and return. Don’t let one item drain your clock.
How many questions and how long is the exam?
CompTIA may vary items and time per form. Plan for check-in, NDA, the exam, and a brief survey. Pace steadily; keep a 5–10 minute buffer to revisit flagged items.
What Windows topics should I master?
- Editions & features: Home vs Pro vs Enterprise/Education (BitLocker, Domain join, Group Policy, Hyper-V, RDP host).
- Core tools: Settings panes, Device Manager, Services, Disk Management, Event Viewer, Task Manager.
- CLI basics:
ipconfig
, ping
, tracert
, nslookup
, sfc
, DISM
, bootrec
, bcdedit
, gpupdate
. - Startup & recovery: Safe Mode, WinRE, System Restore, Reset this PC (keep/remove), driver rollback.
- Permissions: NTFS vs Share, inheritance, ownership, effective permissions.
What about macOS and Linux?
You need fundamentals:
- macOS: About This Mac, Activity Monitor, Disk Utility, Software Update, FileVault, Time Machine.
- Linux: package managers (
apt
, dnf/yum
), services (systemctl
), network (ip
, ping
, dig
), logs (journalctl
, /var/log
), permissions (chmod
, chown
).
What does “effective permission” actually mean?
Users get the most restrictive combination of Share and NTFS where both apply:
- Over the network: Effective = intersection of Share and NTFS (whichever is more restrictive).
- Locally: Share doesn’t apply; NTFS rules.
If both group and user permissions exist, the most permissive NTFS usually wins within NTFS (except explicit denies which override).
How do I choose between local accounts, Microsoft accounts, and domain accounts?
- Local: standalone devices, labs, kiosks.
- Microsoft: consumer cloud features, sync (OneDrive), Store apps.
- Domain/Azure AD: enterprise SSO, Group Policy/Intune/MDM, centralized control. Core 2 expects you to recognize when each is appropriate.
What is the correct malware response order?
CompTIA expects this flow (and the why):
- Identify symptoms (pop-ups, resource spikes, unknown processes, blocked AV).
- Quarantine (isolate from the network; prevent spreading).
- Disable System Restore (avoid reinfection from restore points).
- Remediate (update definitions, Safe Mode scan, remove; reimage if needed).
- Schedule scans and updates; re-enable Restore.
- Create a restore point.
- Educate user (phishing, macros, downloads, USB hygiene).
How do I harden a Windows workstation quickly?
- Patch OS and apps; enable automatic updates.
- Keep Defender AV/Firewall on; correct network profile (Domain/Private/Public).
- Least privilege: standard user daily; elevate only when needed (UAC at default or higher).
- Enable BitLocker (Pro+) with TPM + PIN; store recovery keys securely.
- Limit RDP exposure; require NLA; restrict to groups; firewall rules; VPN if remote.
- Remove unused software, disable unnecessary services, set browser protections.
I’m confused about Safe Mode vs WinRE vs Reset—when to use each?
- Safe Mode: minimal drivers/services; great for drivers, startup apps, AV cleanup.
- WinRE: advanced recovery—Startup Repair, Command Prompt, System Restore, Uninstall Updates, UEFI settings.
- Reset this PC: last resort for persistent OS corruption; choose Keep files vs Remove everything; local vs cloud reinstall.
How do I troubleshoot “Access Denied” on a share?
- Confirm path and user/group.
- Check Share permissions (Everyone? Authenticated Users? Specific groups?).
- Check NTFS permissions on the target folder; ownership; inheritance.
- Confirm access scope (local vs network).
- If group policy applies, run
gpresult
/whoami /groups
(domain context) or re-logon.
What OS log sources should I know?
- Windows: Event Viewer → System, Application, Security; Windows Defender; Setup; Reliability Monitor.
- macOS: Console app; Unified Logging.
- Linux:
journalctl -xe
, /var/log/syslog
/messages
, service-specific logs (/var/log/apache2/*
, etc.).
What are typical “fix-order” expectations on Core 2?
- Favor reversible and low-risk steps first: restart service/app → disable startup item → driver rollback → repair tools (
sfc
, DISM
) → System Restore → Reset (as last resort). - Avoid unnecessary registry edits or third-party “cleaners”.
How much scripting do I need?
Basics only: recognize PowerShell/Bash/Python purpose, safe patterns, and typical tasks:
- PowerShell:
Get-Command
, Get-Help
, Get-Service
, pipeline, run as admin, execution policy awareness. - Bash: shebang, variables, loops, exit codes.
- Python: venv,
pip
, simple file/OS scripts.
Know when to schedule with Task Scheduler or cron/systemd timers.
What is the best way to study for PBQs?
- Practice workflows (permissions, malware steps, backup/restore).
- Rehearse where settings live (Windows tools; macOS/Linux locations).
- Build mini-labs: create a test folder tree with varying NTFS/Share rights; simulate a malware cleanup; walk through Safe Mode → WinRE → Reset decisions.
Can I bring notes? What about calculators or scratch paper?
Assume no external materials unless the testing provider explicitly allows them. On-screen tools and whatever the proctor provides are fair game. Always follow proctor instructions.
What are common Core 2 weak spots—and how do I fix them?
- Malware order: Write it on a sticky (for study) until automatic; drill scenario questions.
- Share vs NTFS: Build a local lab, change one permission at a time, test with a second user.
- Updates vs drivers: Know where to roll back and when to prefer vendor drivers.
- Logs: Practice finding actionable errors (time, source, event ID); correlate with symptoms.
- Reset vs Restore vs Rollback: Learn triggers for each option.
macOS: FileVault vs Time Machine—what’s the quick story?
- FileVault: full-disk encryption; protect data at rest; keep recovery key safe.
- Time Machine: versioned backups; external drive or network target; restore files or entire system.
Linux: which commands matter most for Core 2?
- Networking:
ip a
, ip r
, ping
, dig
. - Packages:
apt
, dnf/yum
. - Services:
systemctl status|start|stop
. - Permissions:
chmod
, chown
, sudo
. - Logs:
journalctl -xe
; check unit-specific logs.
What does Core 2 expect for mobile and MDM?
- Enrollment basics; passcode policy, remote lock/wipe, Wi-Fi/VPN profiles, app allow/deny.
- iOS: profiles via MDM, iCloud, Keychain, FileVault on mac side (awareness).
- Android: Google account, Work Profile, per-app permissions, biometrics.
Backups: which approach is most “CompTIA-correct”?
- 3-2-1 mindset (three copies, two media, one off-site).
- OS-native tools first (Time Machine; Windows File History / full-image solutions).
- Test restore paths; verify schedules; encrypt backups containing sensitive data.
What’s the difference between policies, standards, and procedures (Ops section)?
- Policy: high-level rule (e.g., “all laptops must be encrypted”).
- Standard: specific requirement to meet the policy (e.g., BitLocker with TPM+PIN).
- Procedure: step-by-step instructions to implement standards (how to enable BitLocker).
Core 2 expects you to recognize and apply the right layer in scenarios.
How do I structure my troubleshooting answers?
Use the classic six:
- Identify (gather, duplicate, ask what changed).
- Establish a theory of probable cause.
- Test the theory to confirm root cause.
- Plan and implement the fix.
- Verify full functionality; implement prevention (patch, doc, training).
- Document findings, actions, outcomes.
Choose least privilege, secure defaults, and reversible steps when options compete.
Any exam-day pacing advice beyond “skip PBQs”?
- First pass fast (≈ 60–70 seconds per item); flag long stems/PBQs.
- If a stem is long, skim the final question first to aim your reading.
- Eliminate choices that violate policy, least privilege, or safety.
- Keep a 5–10 minute buffer for flagged items and PBQs.
What if I forget a command’s exact syntax?
Know what tool to reach for and where it lives. You aren’t expected to memorize obscure flags—focus on purpose and order of operations (e.g., DISM
before/after sfc
, then Restore/Reset if needed).
How long should I study—and how do I structure it?
From light experience: 3–4 weeks. From near-zero: 5–6 weeks with labs.
Suggested cadence:
- Mon–Fri: 45–60 minutes reading + 20–25 mixed questions.
- Sat: PBQ lab (permissions, malware, recovery).
- Sun: Light review + 25–30 question set; log misses → 2-bullet rules of thumb.
How should I review my practice sets?
- Flag and revisit in one pass; study why each wrong answer is wrong.
- Convert recurring misses into 2-bullet rules (“Share vs NTFS intersection”, “Malware: quarantine early”).
- Re-test the same topic within 24 hours (spaced repetition).
What about retakes and CE renewal?
Policies evolve; always check the official site for current rules. A+ typically renews via CEUs or re-examination. Earning higher-level certs (e.g., Network+, Security+) can also provide CE credit.
After Core 2, what’s a smart next step?
Pick a role-aligned track:
- Support/Field Tech → Network+
- Security-minded → Security+
- Sysadmin/DevOps path → Linux+ / Server+
Keep practicing real workflows and documenting fixes—those habits carry into interviews and day-one roles.
Quick readiness checklist