Home Blog CompTIA A+ Study Guide (220-1101 & 1102): Your Guide to Success

CompTIA A+ Study Guide (220-1101 & 1102): Your Guide to Success

Tina Tran
Tina Tran
Created at July 31, 2025

If you’re preparing for the CompTIA A+ certification, having a reliable and up-to-date CompTIA A+ study guide is essential for your success. The certification includes two core exams, 220-1101 (Core 1) and 220-1102 (Core 2), which cover a wide range of topics from hardware and networking to security and troubleshooting. It can feel overwhelming at first, but this guide highlights the key areas you should focus on in your CompTIA A+ study plan. Let’s dive into what you’ll need to succeed.

CompTIA A+ study guide

CompTIA A+ study guide

CompTIA A+ study guide

The CompTIA A+ study guide is a resource designed to help you prepare for the CompTIA A+ certification, divided into two main parts:

  • Core 1 (220-1101): Focuses on hardware, networking, mobile devices, cloud computing, and hardware/network troubleshooting skills.
  • Core 2 (220-1102): Covers operating systems, security, software troubleshooting, and operational procedures to help you manage software issues and security challenges.

Each core covers different knowledge domains critical to entry-level IT roles. Passing both is required to earn the certification

CompTIA A+ 1101 study guide (core 1)

The CompTIA A+ 1101 study guide focuses on foundational IT skills, especially in hardware, networking, mobile devices, cloud computing, and troubleshooting techniques. It emphasizes not only technical knowledge but also understanding how different components and technologies relate to each other.

1. Mobile devices

Mobile devices

Mobile devices

Mobile computing devices are ubiquitous in modern IT environments. Understanding their hardware components, operating systems, and support requirements is foundational.
Ready to level up? Test your knowledge with this free CompTIA A+ mobile devices practice test

1.1 Device types and features

Each device has unique form factors and input/output capabilities.

Device Type Primary Input Method Primary Output Method Key Use Case
Laptop Keyboard + Touchpad Screen + Ports (HDMI, USB) General-purpose computing
Tablet Touchscreen + Stylus Touchscreen + Audio Media, education, mobile apps
Smartphone Touchscreen + Voice Touchscreen + Audio Communication, apps, and mobile use
E-Reader Touchscreen/Buttons E-Ink Display Reading digital books
GPS Unit Touchscreen/Buttons LCD + Voice Navigation Navigation in vehicles or outdoors
1.2 Mobile accessories

Mobile accessories enhance the functionality, usability, and productivity of mobile devices. They allow users to extend device features, especially in work or travel environments.

Docking stations and port replicators

  • Docking stations: Provide multiple input/output ports (USB, HDMI, Ethernet, etc.), allowing a laptop to connect to several peripherals using a single connection. Often includes charging capability. Used in office setups to turn a laptop into a desktop workstation.
  • Port replicators: Similar to docking stations but more basic. They expand connectivity (USB, VGA, Ethernet) without supplying power. More portable and often used during travel.

Wearables

Smartwatches and fitness trackers connect to mobile devices via Bluetooth and provide:

  • Notifications (calls, messages)
  • Health monitoring (heart rate, steps, sleep)
  • Music and voice assistant control

They enhance mobility and quick access to information without using a phone.

Other common accessories

  • External battery packs: For on-the-go charging
  • Stylus pens: Precise input for drawing or writing on tablets
  • Bluetooth headsets/earbuds: For communication and media
  • Car mounts: Hold devices securely while driving
  • Bluetooth keyboards: Improve productivity on tablets or smartphones
1.3 Mobile device synchronization

Synchronization refers to the process of ensuring that data across two or more devices remains consistent and up to date. For mobile devices, synchronization allows users to access the same contacts, emails, apps, and files regardless of the device they are using.

There are two primary synchronization methods: cloud-based and local syncing.

  • Cloud-based services (e.g., iCloud, Google)
  • Local syncing via USB/Bluetooth

2. Networking technologies

Networking technologies

Networking technologies

Network infrastructure knowledge is critical in supporting data communication within and across organizations.
Ready to strengthen your network skills? Dive into CompTIA A+ Networking practice questions and build the expertise employers demand.

2.1 Networking hardware
Device Function
Router Connects different networks
Switch Directs data packets within a network
Access Point Enables wireless device connections
Modem Interfaces with the ISP to transmit data
Patch Panel Organizes cables for structured wiring systems
2.2 Cable types and connectors

Cables and connectors are essential for building and maintaining wired networks. They come in copper-based and fiber-optic forms, each with distinct capabilities.

Cable type Shielding Max speed Common connectors Common use cases
UTP (Cat 5e/6) No 1–10 Gbps RJ-45 LAN, office networks
STP (Cat 6a) Yes 10 Gbps RJ-45 Industrial/high-interference networks
Coaxial (RG-6/59) Yes Varies (Mbps) F-type TV, cable internet, CCTV
Fiber (SM/MM) N/A 10 Gbps+ SC, LC, ST Long-distance, high-speed data
2.3 IP addressing and protocols

IPv4 (Internet Protocol version 4)

  • Format: Four numbers (called octets) separated by dots, e.g., 192.168.1.1
  • Bit Length: 32-bit address space
  • Range: 0.0.0.0 to 255.255.255.255
  • Private IP Ranges:
    • 10.0.0.0 – 10.255.255.255
    • 172.16.0.0 – 172.31.255.255
    • 192.168.0.0 – 192.168.255.255

IPv6 (Internet Protocol version 6)

  • Format: Eight groups of four hexadecimal characters, e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334
  • Bit Length: 128-bit address space
  • Designed to replace IPv4 due to address exhaustion
  • Provides better security and efficiency in routing

Subnetting

  • Subnetting divides large networks into smaller, manageable sub-networks.
  • Helps isolate traffic, improve performance, and enhance security.
  • Subnet mask examples:
    • /24 = 255.255.255.0 (256 IPs, 254 usable)
    • /16 = 255.255.0.0
  • CIDR (Classless Inter-Domain Routing) notation is used (e.g., 192.168.10.0/24).

Common ports

Protocol Port Use case
HTTP 80 Web browsing (insecure)
HTTPS 443 Secure web browsing (encrypted SSL)
FTP 21 File transfers (unencrypted)
SSH 22 Secure remote access (CLI-based)
RDP 3389 Remote Desktop Protocol (Windows GUI)
SMB 445 File/printer sharing on Windows

Wi-Fi Standards

Standard Frequency Max speed Notes
802.11a 5 GHz 54 Mbps Shorter range than 2.4 GHz
802.11b 2.4 GHz 11 Mbps Long range but slow speed
802.11g 2.4 GHz 54 Mbps Backward compatible with 802.11b
802.11n 2.4/5 GHz 600 Mbps Introduced MIMO
802.11ac 5 GHz 1+ Gbps Improved MIMO and beamforming
802.11ax (Wi-Fi 6) 2.4/5/6 GHz Up to 10 Gbps More efficient in crowded environments
2.4 SOHO networking
  • Setting up and securing small office/home office routers
  • Configuring SSIDs, encryption protocols (WPA2/WPA3), MAC filtering

3. Hardware

Hardware

Hardware

Hardware is a foundational domain of CompTIA A+ core 1 study guide, encompassing internal system components and peripheral connectivity.

3.1 RAM
  • Types: DDR3, DDR4, DDR5
  • Form factors: DIMM (desktop), SO-DIMM (laptop)
  • Specifications:
    • Clock speeds (e.g., PC3-12800 = DDR3-1600)
    • ECC vs non-ECC, buffered vs unbuffered
  • RAM installation follows matched pair configurations for dual-channel performance.
3.2 Storage devices
  • HDDs: Magnetic platters, 5400–7200 RPM
  • SSDs: Flash-based; SATA, M.2 NVMe interfaces
  • Hybrid drives (SSHD): Combines SSD cache with HDD capacity
  • Optical drives: CD, DVD, Blu-ray formats (increasingly legacy)

RAID levels

RAID type Description Fault tolerance Speed
RAID 0 Striping only No fault tolerance High
RAID 1 Mirroring Excellent fault tolerance Moderate
RAID 5 Striping with parity Good fault tolerance Moderate
RAID 10 Mirroring + striping Excellent fault tolerance High
3.3 Motherboards and CPUs

Motherboards

The motherboard is the main printed circuit board (PCB) in a computer that connects and allows communication between all hardware components, including the CPU, RAM, storage, and peripherals.

  • Form factors: ATX, Micro-ATX, Mini-ITX
  • Chipsets, power connectors, expansion slots (PCIe), sockets (LGA, PGA)

CPUs:

The CPU, often called the “brain” of the computer, performs all instructions from programs by executing basic arithmetic, logic, control, and input/output operations.

  • Multiple cores (e.g., dual-core, quad-core, octa-core) and threads enable multitasking.
  • Integrated GPU (iGPU) handles video output on supported CPUs.
  • Cooling solutions: Active (fan), passive (heatsink), liquid-based
3.4. Peripherals and expansion

Input/output devices

Input devices allow users to send data or commands to a computer system. These devices are critical for interacting with software applications and performing tasks.

Device Function
Keyboard Standard text and command input
Mouse Pointing device for navigating GUIs
Scanner Converts physical documents into digital form
Biometric Reader Reads fingerprints, facial features, etc., for identity verification
Touchscreen Acts as both input (via touch) and output (display)
Game Controller Specialized input for gaming or simulation
Webcam Captures video input for conferencing, recording

Output devices display, print, or transmit the results of a computer’s processing.

Device Function
Monitor Displays video output; connects via HDMI, DisplayPort, DVI, or VGA
Speakers Output sound from the system audio
Headphones Personal audio output
Printers Produce physical copies (hard copies) of documents
Projectors Project the visual output onto larger screens

Expansion options

To increase a system’s capabilities, technicians often install expansion cards or connect external devices.

  • PCIe cards for Wi-Fi, sound, and RAID controllers
  • External peripherals: USB, Thunderbolt, DisplayPort daisy-chaining

4. Cloud computing and virtualization

Cloud computing and virtualization

Cloud computing and virtualization

Virtualization and cloud computing are no longer future trends; they’re essential components of today’s IT landscape. These concepts appear frequently in the Core 1 exam, so don’t skip them. 

This solid CompTIA A+ study guide will walk you through the basics, but to reinforce what you learn, try free CompTIA A+ Virtualization and Cloud Computing practice test

4.1 Cloud models

Cloud services are typically categorized based on how the user interacts with the system and what is being managed by the provider vs. the user. These categories are called cloud service models.

Cloud service models

Model Description Examples
SaaS Cloud provider hosts applications; users access via web/browser or thin client. No infrastructure or platform management is needed by the user. Google Workspace, Microsoft 365, Dropbox
IaaS Provider offers virtualized computing resources (servers, storage, networks); users manage OS and applications. Amazon EC2, Microsoft Azure VM
PaaS Provider offers a development environment for building and deploying applications; users don’t manage OS or infrastructure. Heroku, Google App Engine, AWS Elastic Beanstalk

Deployment models
These describe where the cloud resources are located and who has access:

  • Public cloud: Services available to the general public over the internet. Shared infrastructure.
  • Private cloud: Services used exclusively by a single organization. Often on-premises or in a dedicated data center.
  • Hybrid cloud: Combines both public and private cloud environments. Offers flexibility and redundancy.
  • Community cloud: Shared among several organizations with common concerns (e.g., compliance).
4.2 Virtualization

Virtual machines run isolated OS environments via hypervisors.

  • Type 1: Bare-metal hypervisors (e.g., VMware ESXi)
  • Type 2: Hosted hypervisors (e.g., VirtualBox, Hyper-V on Windows)

5. Troubleshooting methodologies

Troubleshooting methodologies

Troubleshooting methodologies

Troubleshooting is a critical support function, and CompTIA promotes a consistent, structured approach:

5.1 The six-step process
  1. Identify the problem
  2. Establish a theory of probable cause
  3. Test the theory
  4. Establish a plan of action
  5. Verify full system functionality
  6. Document findings and outcomes
5.2 Hardware issues
  • Power supply failures, overheating, and POST errors
  • Memory errors (e.g., mismatched RAM, failed modules)
  • Drive failures (noisy, corrupted, S.M.A.R.T. warnings)
5.3 Network issues
  • IP misconfiguration, DNS/DHCP failures
  • Cabling or port defects
  • Wireless interference or incorrect SSID/security settings

Want to see how sharp your instincts really are? Take the Hardware and Network Troubleshooting practice test

CompTIA A+ 1102 study guide (core 2)

The CompTIA A+ core 2 study guide focuses on software environments, including:
operating systems, security best practices, troubleshooting user-level issues, and professional procedures. 

1. Operating systems

Operating systems

Operating systems

Operating systems aren’t just background software; they define how we interact with every device, from system setup to user permissions and file management.

If you’re ready to apply what you’ve studied, start with these operating systems practice questions

1.1 Windows operating systems

Windows remains the predominant desktop operating system in both consumer and enterprise environments. IT professionals are expected to understand the distinctions between Windows editions, their administrative tools, and the use of command-line utilities for system management and troubleshooting.

Windows editions

Windows 10 and Windows 11 are available in several editions tailored to different use cases:

  • Home edition: Designed for personal use. It lacks advanced administrative features such as domain joining, Group Policy management, and full BitLocker encryption.
  • Professional edition: Geared toward small businesses and power users. It includes domain join, Group Policy Editor, BitLocker, and Remote Desktop host capabilities.
  • Enterprise edition: Developed for large-scale organizations. It offers all Pro features plus additional tools such as AppLocker, Windows To Go, Credential Guard, and advanced security policies.

Administrative and system utilities

  • File explorer: Provides access to the file system for navigating, organizing, and managing files and directories.
  • Task manager: Monitors system performance, running processes, startup items, and allows forced termination of unresponsive applications.
  • Control panel: A legacy interface for managing system settings such as programs, hardware, user accounts, and network settings.
  • Settings app: The modern configuration interface for managing accounts, privacy, updates, and display settings.

Command-line tools

Technicians should be familiar with the following command-line tools for diagnostics and system maintenance:

  • ipconfig: Displays the current IP network configuration.
  • ping: Tests connectivity to a remote host.
  • netstat: Displays active TCP/IP connections and listening ports.
  • chkdsk: Scans and repairs file system errors and bad disk sectors.
  • sfc /scannow: Scans and repairs corrupted or missing system files.
  • taskkill: Terminates active processes by name or process ID.
  • format: Formats a specified drive or partition.
  • Diskpart: A command-line utility used for advanced disk partitioning.
1.2 Installation and upgrade methods

Windows can be installed via bootable USB, network (PXE), or recovery partitions. The choice depends on the environment and deployment scale.

Installation types:

  • Clean install: Erases everything and installs a fresh copy of Windows.
  • Upgrade install: Replaces the OS but retains files and apps.
  • Unattended install: Uses an answer file to automate setup.

File systems:

  • NTFS: Modern Windows default; supports permissions, encryption (EFS), and large files.
  • FAT32: Used in removable storage; lacks advanced features and has a 4 GB file size limit.
1.3 macOS and Linux
  • macOS: User-friendly UNIX-based OS with GUI emphasis
    • System Preferences, Terminal, Disk Utility
  • Linux: Open-source with variants like Ubuntu, Fedora
    • Command-line navigation (ls, cd, chmod, sudo, apt-get)

2. Security

Security

Security

As cybersecurity threats become increasingly prevalent, IT professionals must understand layered defense and system hardening. These aren’t just advanced skills; they’re fundamental topics covered in the CompTIA A+ study guide.
To see how well you’re absorbing these concepts, try Security practice questions. 

2.1 Threats and vulnerabilities

IT professionals must recognize and respond to common security threats, including malicious software and human-based attacks.

Malware types:

  • Virus: Attaches to files and replicates when executed.
  • Worm: Self-replicates across networks without user action.
  • Trojan Horse: Disguises itself as legitimate software.
  • Ransomware: Encrypts files and demands payment.
  • Rootkit: Hides deep within the OS to avoid detection.
  • Spyware: Secretly monitors user activity.
  • Keylogger: Records keystrokes to capture sensitive data.

Social engineering tactics:

  • Phishing: Fraudulent emails designed to steal information.
  • Vishing: Voice phishing via phone calls.
  • Shoulder surfing: Observing a user’s screen or keyboard to steal information.
  • Dumpster diving: Retrieving sensitive data from discarded materials.
2.2 Security measures

Effective system protection involves implementing layered security at the user, system, and physical levels.

User-level controls:

  • Enforce password complexity and account lockout policies.
  • Apply the principle of least privilege to limit user access.

System hardening:

  • Disable unused services and ports.
  • Enable host firewalls (e.g., Windows Defender Firewall).
  • Regularly apply OS and software updates to patch vulnerabilities.

Authentication methods:

  • Use secure local or domain-based login systems.
  • Implement multifactor authentication (e.g., password plus biometric or token).

Encryption and remote security:

  • Use EFS (Encrypting File System) for file-level encryption.
  • Use BitLocker for full-disk encryption.
  • Establish VPN connections for secure remote access.

Physical security:

  • Protect hardware with locks, cable restraints, controlled access, and surveillance.

3. Software troubleshooting

Software troubleshooting

Software troubleshooting

Software issues form a significant portion of day-to-day IT tasks. Structured problem-solving skills are essential.

Test your knowledge of software troubleshooting with real exam-style software troubleshooting questions.

3.1 Common OS problems

Some problems: 

  • Boot issues: e.g., missing bootmgr, incorrect boot device, BSOD
  • Slow performance: Often tied to startup apps, full disks, and malware
  • Application crashes: Incompatibility, corrupt installs, missing DLLs

Tools for resolution:

  • Task Manager: Kill or diagnose misbehaving apps
  • System Configuration (msconfig): Manage boot and startup services
  • Event Viewer: Logs system, application, and security events
  • Reliability Monitor: Timeline of crashes and failures
3.2 Mobile device troubleshooting

Mobile devices encounter a range of common issues that technicians must diagnose and resolve efficiently.

Hardware issues:

  • Battery degradation: Reduced capacity over time; may require replacement.
  • Overheating: Caused by heavy use, environment, or hardware failure.
  • Touchscreen failure: May result from hardware damage or software malfunction.

Software issues:

  • App crashes: Often resolved by clearing app cache/data, updating the app, or reinstalling.
  • Synchronization failures: Typically require checking cloud sync settings, ensuring proper login credentials, or resetting sync configurations.

4. Operational procedures

Operational procedures

Operational procedures

A certified professional must follow best practices in workplace conduct, documentation, and safety.

Think you’ve got workplace conduct and safety locked in? Prove it with operational procedures practice questions.

4.1 Documentation and change management
  • Use ticketing systems for tracking user issues and IT tasks
  • Maintain asset inventory, network diagrams, and license documentation
  • Change management process: Assess, approve, implement, review
4.2 Environmental controls and disposal

Proper environmental management and responsible disposal of hardware are essential in IT operations.

Environmental conditions:

  • Server and network equipment rooms must be maintained at stable temperatures (typically 18–27°C / 64–80°F) and controlled humidity levels (40–60%) to prevent hardware failure due to heat or moisture.
  • Use dedicated cooling systems, ventilation, and environmental monitoring tools to maintain optimal conditions.

E-Waste disposal:

  • Components such as batteries, ink/toner cartridges, circuit boards, and printers contain hazardous materials and must be disposed of via approved recycling programs or e-waste facilities.

Data destruction methods:

  • Degaussing: Uses a magnetic field to erase data from magnetic storage devices (e.g., hard drives, tapes).
  • Shredding: Physically destroys drives and media to prevent recovery.
  • Drilling/Punching: Physically damages storage platters to make recovery impossible.
  • Data wiping: Overwrites existing data using software tools to ensure it cannot be recovered.
4.3 Safety procedures

IT technicians must follow standard workplace safety protocols to protect themselves, users, and equipment.

Electrostatic discharge (ESD) prevention:

  • Use antistatic wrist straps, ESD mats, and grounding tools when handling sensitive components (RAM, CPUs, motherboards).
  • Store components in ESD-safe bags or containers.

Lifting and handling equipment:

  • Use proper lifting techniques: bend at the knees, keep the back straight, and avoid twisting.
  • Use team lifting or lifting equipment for heavy items such as servers or UPS units.

Fire safety:

  • Understand fire extinguisher classifications:
    • Class A: Ordinary combustibles (paper, wood)
    • Class B: Flammable liquids (oil, gasoline)
    • Class C: Electrical equipment fires (relevant to IT environments)
  • Know the location of fire exits, extinguishers, and how to respond to fire alarms.
4.4 Professionalism and communication

Effective communication and professional conduct are essential in technical support roles.

User interaction:

  • Use clear, respectful, and non-technical language when assisting users.
  • Avoid jargon and acronyms when speaking with non-technical individuals.
  • Practice active listening and remain patient and courteous at all times.

Documentation:

  • Accurately record symptoms, steps taken, tools used, and resolutions in a service ticket or report.
  • Good documentation ensures accountability, knowledge sharing, and efficient future troubleshooting.

Escalation procedures:

  • Follow the organization’s escalation path when an issue cannot be resolved at the technician’s level.
  • Communicate handoff details clearly to the next support tier to avoid redundant troubleshooting.

FAQs

1. What is the best CompTIA A+ study guide?

For the CompTIA A+ 220-1101 and 220-1102 exams, Mike Meyers’ All-in-One Guide (10th Edition) is widely considered the most comprehensive. It offers clear explanations, practice questions, and real-world examples, ideal for self-paced learners.

Quentin Docter’s CompTIA A+ Complete Study Guide (Sybex) is another excellent option. It’s well-structured, aligned directly with exam objectives, and suited for formal or academic study.

2. How to properly study for CompTIA A+?

Studying for the CompTIA A+ certification requires discipline and a structured plan to manage the extensive material effectively. 

For a detailed step-by-step plan, including daily goals, tool recommendations, and proven techniques, check out this guide: How to study for CompTIA A+?

3. Can I learn CompTIA A+ by myself?

Yes, you can learn CompTIA A+ on your own, and many candidates do so successfully. Self-study is a good option if you are motivated, able to manage your schedule, and comfortable learning from books, videos, and online resources without needing classroom instruction.

4. How to study for CompTIA A for free?

Yes, you can study for CompTIA A+ entirely for free using reputable resources like video courses, practice exams, and community forums. While free materials may be more limited in quantity compared to paid options, they are enough to help you pass the exam with discipline and the right strategy.

Final thoughts

The CompTIA A+ study guide is your key to starting a successful IT career. By focusing on exam objectives, practicing hands-on, and committing to structured learning, you’ll gain real-world skills in hardware, software, networking, and security. This certification proves your expertise and dedication, opening doors to new opportunities. Start today with the right resources and step confidently into the IT industry.