CompTIA A+ · 220-1201 & 220-1202 · 2026

CompTIA A+ Cheat Sheet

Every port, connector, RAM type, storage interface, Windows command, security threat, troubleshooting methodology, and key fact you need for the 220-1201 (Core 1) and 220-1202 (Core 2) exams — on one page.

Jump to section
Ports & Protocols Connectors & Cables RAM Types Storage Interfaces Display Connectors Networking Basics Wireless Standards Windows Commands Security Threats Troubleshooting Steps Key Acronyms
🔌 Ports & Protocols

The A+ exam tests port numbers in scenario questions — "a user can't send email" maps to ports 25/587. Know the port, protocol (TCP/UDP), and what breaks when it's blocked.

PortTCP/UDPServiceKey fact
20TCPFTP DataActive FTP data transfer
21TCPFTP ControlFTP commands — unencrypted, use SFTP instead
22TCPSSH / SFTP / SCPSecure remote access and file transfer — replaces Telnet and FTP
23TCPTelnetUnencrypted remote access — deprecated, sends credentials in plaintext
25TCPSMTPSends outgoing email — often blocked by ISPs to prevent spam
53TCP/UDPDNSUDP for queries, TCP for zone transfers and large responses
67 / 68UDPDHCP67 = server listens, 68 = client listens — DORA process
80TCPHTTPUnencrypted web — traffic visible to anyone on the network
110TCPPOP3Downloads email to device, removes from server
123UDPNTPClock synchronisation — Kerberos fails if clocks drift 5+ min
143TCPIMAPEmail stays on server, synced across devices
161 / 162UDPSNMP161 = queries to agent, 162 = traps from agent
389TCP/UDPLDAPActive Directory queries — unencrypted, use LDAPS (636)
443TCPHTTPSEncrypted web — TLS. Always prefer over HTTP.
445TCPSMBWindows file and printer sharing, Active Directory
465 / 587TCPSMTP Secure587 (STARTTLS) preferred for email submission — 465 = SMTPS
636TCPLDAPSLDAP over TLS — encrypted directory queries
993TCPIMAPSIMAP over TLS — encrypted email retrieval
995TCPPOP3SPOP3 over TLS — encrypted email download
3389TCP/UDPRDPWindows Remote Desktop — block at firewall, use VPN if needed externally
🔧 Connectors & Cables

Core 1 tests connector identification heavily — expect photos of connectors with multiple choice answers. Know the visual appearance, use case, and speed/standard for each.

ConnectorTypeKey facts
USB-AUSBRectangular — the classic USB. Host-side connector on PCs.
USB-BUSBSquare with bevelled corners — printers and older devices.
USB Mini-BUSBTrapezoidal 5-pin — older cameras, MP3 players.
USB Micro-BUSBThin, asymmetric — older Android phones.
USB-CUSBOval, reversible — USB 3.1/3.2/4, Thunderbolt 3/4, up to 240W charging. Used by modern devices.
USB 2.0USB480 Mbps max. Black port colour coding.
USB 3.0 / 3.2 Gen 1USB5 Gbps. Blue port — backward compatible with USB 2.0.
USB 3.1 / 3.2 Gen 2USB10 Gbps. Teal/red port on some motherboards.
Thunderbolt 1/2ThunderboltUses Mini DisplayPort physical connector. 10/20 Gbps. Lightning bolt icon.
Thunderbolt 3/4ThunderboltUses USB-C physical connector. 40 Gbps. Supports PCIe, DisplayPort, power.
RJ-11Telephone6-position, 2-contact (6P2C) — telephone/modem. Smaller than RJ-45.
RJ-45Ethernet8-position, 8-contact (8P8C) — Ethernet networking. The standard LAN connector.
LCFibre opticSmall form-factor — most common in enterprise. Push-pull latch.
SCFibre opticSquare snap-in connector. Larger than LC. Common in older installs.
STFibre opticBayonet-style — twist and lock. Legacy.
DB-9 / DE-9Serial9-pin D-sub — RS-232 serial. Console access to routers/switches.
DB-25Serial/Parallel25-pin D-sub — older parallel printer ports and serial interfaces.
⚡ Cable categories — Ethernet speed limits

Cat 5: 100 Mbps @ 100m (Fast Ethernet). Cat 5e: 1 Gbps @ 100m — most common in homes. Cat 6: 1 Gbps @ 100m / 10 Gbps @ 55m. Cat 6a: 10 Gbps @ 100m — augmented, shielded. Cat 7: 10 Gbps @ 100m, fully shielded. Cat 8: 25–40 Gbps @ 30m — data centres.

Straight-through: PC to switch/router. Crossover: PC to PC, switch to switch (modern switches use Auto-MDIX so crossover is rarely needed). Rollover/console: PC to router/switch console port.

🧠 RAM Types

Know the pin counts, speeds, and form factors — the exam will give you a scenario where you need to identify the correct module type for a given system.

TypeForm factorPins (DIMM)Pins (SO-DIMM)Key facts
DDR3Desktop / Laptop240-pin204-pin1066–2133 MHz. Notch positioned differently from DDR4 — not interchangeable.
DDR4Desktop / Laptop288-pin260-pin2133–3200+ MHz. Most common in systems from ~2014–2022. Lower voltage than DDR3.
DDR5Desktop / Laptop288-pin262-pin4800+ MHz. Current standard. Not backward compatible with DDR4 slots.
ECC RAMServerVariesError Correcting Code — detects and fixes single-bit errors. Required in servers and workstations. Not compatible with standard consumer motherboards.
SO-DIMMLaptop / Small formSmaller moduleSmall Outline DIMM — used in laptops, mini-PCs. Same DDR generation as full DIMM but physically smaller.
⚡ RAM exam tips

Dual-channel: Install matching pairs in correct slots (usually A1+B1 or A2+B2 — check motherboard manual) for double the memory bandwidth.

DIMM vs SO-DIMM: If the scenario mentions a laptop, the answer is SO-DIMM. Desktop = DIMM.

DDR generations are NOT backward compatible — a DDR4 stick will not fit in a DDR5 slot even if the pin count is the same. The notch position is different.

💾 Storage Interfaces & Types

The A+ exam tests storage connectors, interfaces, and form factors. Know what connects to what and the speed difference between HDD, SATA SSD, and NVMe SSD.

InterfaceMax speedConnectorKey facts
SATA III600 MB/s7-pin SATA data + 15-pin powerStandard for HDDs and 2.5" SSDs. Most common desktop/laptop interface.
M.2 SATA600 MB/sM.2 slot (B+M keyed)SATA speeds in M.2 form factor. Uses same SATA protocol — not faster than 2.5" SATA SSD.
NVMe (PCIe)3,500+ MB/sM.2 slot (M keyed) or PCIe slotNVMe = Non-Volatile Memory Express. Uses PCIe lanes directly — 5–7× faster than SATA. Current standard for SSDs.
PCIe 4.0 NVMe7,000 MB/sM.2 (M keyed)Double PCIe 3.0 NVMe speeds. Backward compatible — a PCIe 4 drive works in a PCIe 3 slot at reduced speed.
HDD (SATA)~150 MB/sSATAMechanical spinning disk — 5400 or 7200 RPM. Much slower than SSD, used for high-capacity bulk storage.
eMMC~400 MB/sSoldered to boardEmbedded MultiMediaCard — soldered storage in budget laptops and tablets. Not replaceable.
⚡ M.2 keying — B key vs M key vs B+M key

M.2 slots have physical keys (notch positions) that determine which drives are compatible. M key supports NVMe (PCIe) drives. B+M key supports SATA drives (and some NVMe). A drive that is M-keyed only will not fit in a B+M slot. Check the motherboard spec before purchasing an M.2 drive.

RAID basics: RAID 0 = striping (speed, no redundancy). RAID 1 = mirroring (redundancy, half capacity). RAID 5 = striping with parity (3+ drives, one drive fault tolerance). RAID 10 = mirroring + striping (4+ drives, best of both).

🖥️ Display Connectors

Display connector identification appears in Core 1 scenarios. Know the shape, pin count, and whether each carries audio.

ConnectorPins / signalAudio?Key facts
VGA15-pin D-subNoAnalogue only. Blue trapezoidal connector. Legacy — no longer supported by modern GPUs.
DVI-DDigital onlyNoAll-digital. Single-link = 1080p. Dual-link = 2560×1600. White rectangular connector.
DVI-AAnalogue onlyNoAnalogue signal only — compatible with VGA via adapter.
DVI-IAnalogue + DigitalNoIntegrated — supports both digital and analogue. Can adapt to VGA.
HDMI19-pinYesCarries audio + video. Multiple versions — HDMI 2.1 supports 8K/120Hz. Most common consumer display connector.
DisplayPort20-pinYesHigher bandwidth than HDMI for same generation. Supports daisy-chaining multiple monitors. Preferred for gaming monitors.
Mini DisplayPort20-pin (mini)YesPhysically smaller — used by Apple and some laptops. Same signal as full DisplayPort.
Thunderbolt 3/4USB-C physicalYesSupports DisplayPort signal over USB-C. Also carries PCIe and power simultaneously.
🌐 Networking Basics

A+ Core 1 covers networking fundamentals — IP addressing, subnet masks, DHCP, DNS, and troubleshooting connectivity. Know these cold.

IP addressing quick reference
Private IP ranges (not routable on internet):
  10.0.0.0  – 10.255.255.255     /8  — Class A private
  172.16.0.0 – 172.31.255.255   /12 — Class B private
  192.168.0.0 – 192.168.255.255 /16 — Class C private (most home networks)

Special addresses:
  127.0.0.1     → Loopback / localhost — tests local TCP/IP stack
  169.254.x.x   → APIPA — self-assigned when DHCP fails (link-local only)
  0.0.0.0       → Default route / unassigned address
  255.255.255.255 → Broadcast — sends to all hosts on network

Common subnet masks:
  /8  = 255.0.0.0       → 16,777,214 hosts
  /16 = 255.255.0.0     → 65,534 hosts
  /24 = 255.255.255.0   → 254 hosts   (most common small network)
  /25 = 255.255.255.128 → 126 hosts
  /26 = 255.255.255.192 → 62 hosts
  /30 = 255.255.255.252 → 2 hosts    (point-to-point links)
DHCP — DORA process
Discover — client broadcasts looking for a DHCP server
Offer — server offers an IP address
Request — client accepts the offer
Acknowledge — server confirms the lease

If DHCP fails → client self-assigns an APIPA address (169.254.x.x).
DNS — name resolution order
1. Local DNS cache (ipconfig /displaydns)
2. hosts file (C:\Windows\System32\drivers\etc\hosts)
3. DNS server query (configured in network settings)
4. Recursive query to root / TLD / authoritative servers

DNS uses UDP port 53 for queries, TCP port 53 for zone transfers.
📶 Wireless Standards

Know each 802.11 standard's frequency, maximum speed, and key distinguishing feature. The exam distinguishes between 2.4 GHz (range) and 5 GHz (speed).

StandardCommon nameFrequencyMax speedKey facts
802.11aWi-Fi 15 GHz54 Mbps5 GHz only — less interference but shorter range. Older standard.
802.11bWi-Fi 22.4 GHz11 MbpsFirst widely adopted standard. 2.4 GHz only — susceptible to interference from microwaves and Bluetooth.
802.11gWi-Fi 32.4 GHz54 MbpsBackward compatible with 802.11b. 2.4 GHz — longer range than 5 GHz.
802.11nWi-Fi 42.4 & 5 GHz600 MbpsFirst dual-band standard. Introduced MIMO (Multiple Input Multiple Output). Still common.
802.11acWi-Fi 55 GHz only3.5 GbpsMU-MIMO. Wave 2 added wider channels (160 MHz). Very common in home/enterprise.
802.11axWi-Fi 6 / 6E2.4, 5, 6 GHz9.6 GbpsOFDMA improves performance in dense environments. Wi-Fi 6E adds 6 GHz band (6E only).
802.11beWi-Fi 72.4, 5, 6 GHz46 GbpsMulti-Link Operation (MLO) — uses multiple bands simultaneously. Newest standard.
⚡ Wireless security protocols — know the order

WEP — broken, never use. Static keys, RC4 encryption, crackable in minutes.

WPA — TKIP encryption. Better than WEP but still has vulnerabilities.

WPA2 — AES/CCMP encryption. Current minimum standard. Personal (PSK) vs Enterprise (802.1X/RADIUS).

WPA3 — Strongest. SAE replaces PSK (eliminates offline dictionary attacks). Forward secrecy. Mandatory for Wi-Fi 6 certified devices.

Exam scenario: "Which wireless security protocol uses AES encryption?" → WPA2 or WPA3. "Which is the most secure?" → WPA3.

⌨️ Windows Commands

Core 2 tests command-line tools heavily — expect to be given a task ("check what ports are listening") and choose the correct command. Know what each does and when to use it.

Networking commands
ipconfig           → Shows IP, subnet mask, default gateway
ipconfig /all      → Full details including MAC address, DNS servers, DHCP lease info
ipconfig /release  → Releases DHCP-assigned IP address
ipconfig /renew    → Requests a new IP from DHCP server
ipconfig /flushdns → Clears DNS resolver cache — fixes stale DNS entries
ping               → Tests basic connectivity — sends ICMP echo requests
tracert            → Shows each hop to destination — identifies where traffic fails
nslookup           → Queries DNS — tests name resolution for a hostname
netstat            → Shows active TCP/UDP connections and listening ports
netstat -a         → All connections and listening ports
netstat -b         → Shows which executable is using each connection
arp -a             → Displays ARP cache — IP to MAC address mappings
net use            → Maps a network drive (net use Z: \\server\share)
System and disk commands
sfc /scannow       → System File Checker — repairs corrupted Windows system files
DISM /Online /Cleanup-Image /RestoreHealth
                   → Repairs Windows image when sfc fails
chkdsk             → Check Disk — scans for file system and physical disk errors
chkdsk /f /r       → /f fixes errors, /r locates bad sectors (requires reboot)
diskpart           → Disk partitioning utility — create, format, delete partitions
format             → Formats a drive with a filesystem (NTFS, FAT32, exFAT)
defrag             → Defragments HDD — do NOT use on SSDs
robocopy           → Robust file copy — preserves permissions, restarts on failure
xcopy              → Extended copy — copies files and directory trees
User, process, and admin commands
tasklist           → Lists all running processes (like Task Manager in CLI)
taskkill /PID xxxx → Kills a process by its Process ID
msconfig           → System Configuration — manage startup items, boot options
regedit            → Registry Editor — edit Windows registry (use with caution)
gpedit.msc         → Group Policy Editor — local security and config policies
lusrmgr.msc        → Local Users and Groups manager
services.msc       → Windows Services management console
eventvwr.msc       → Event Viewer — system, application, and security logs
mmc                → Microsoft Management Console — add snap-ins
gpupdate /force    → Forces immediate Group Policy refresh
shutdown /r /t 0   → Immediate restart (/s for shutdown, /t 0 = no delay)
🔒 Security Threats

Core 2 has a heavy security focus. Know each threat type by name — the exam describes a scenario and you identify the attack.

ThreatWhat it isKey indicator
PhishingFraudulent emails impersonating trusted organisations to steal credentials or install malwareUrgent email asking you to click a link and log in
Spear phishingTargeted phishing using personal details to appear more convincing — aimed at a specific personEmail that uses your name, role, or refers to a real project
WhalingSpear phishing targeting executives (CEO, CFO)Email impersonating a CEO requesting a wire transfer
VishingVoice phishing — fraudulent phone calls impersonating IT support, banks, or governmentCaller asks for your password or to install remote access software
SmishingSMS phishing — fraudulent text messages with malicious linksText claiming your package is held, click to reschedule
RansomwareMalware that encrypts files and demands payment for the decryption keyFiles have strange extensions, ransom note appears on screen
Trojan horseMalware disguised as legitimate software — appears harmless, installs malicious payloadFree software download that behaves oddly after install
RootkitMalware that hides itself and other malware from the OS — runs with elevated privilegesAntivirus can't find it but symptoms persist — requires bootable scanner
KeyloggerRecords keystrokes to capture passwords and sensitive dataCredentials compromised despite strong password practices
SpywareMonitors user activity and sends data to a third party without consentBrowser redirects, slow performance, unexpected pop-ups
AdwareDisplays unwanted advertisements — often bundled with free softwarePop-up ads in browser, homepage changed without permission
Man-in-the-MiddleAttacker intercepts and potentially alters communication between two partiesARP poisoning, rogue Wi-Fi hotspot — certificate errors can indicate MITM
Social engineeringManipulating people into revealing information or taking insecure actions — exploits trustSomeone calling claiming to be IT support needing your password
Tailgating / piggybackingPhysically following an authorised person through a secure doorPerson closely following you into a badge-access area
Shoulder surfingWatching someone enter credentials or view sensitive information in personSomeone standing behind you at an ATM or in a coffee shop
Dumpster divingSearching discarded materials for sensitive information — documents, drivesShredded documents, wiped drives mitigate this
🛠️ Troubleshooting Methodology

CompTIA's 7-step troubleshooting methodology is tested directly on both Core 1 and Core 2. Memorise the steps and order — scenario questions will ask which step comes next.

CompTIA 7-step troubleshooting methodology
Step 1 — Identify the problem
         Gather information, question the user, identify symptoms
         Check for recent changes — "what changed right before this started?"

Step 2 — Establish a theory of probable cause
         Question the obvious first — is it plugged in? Is the service running?
         Consider multiple possible causes before acting

Step 3 — Test the theory to determine cause
         Confirm or deny your theory
         If theory is confirmed → move to step 4
         If theory is NOT confirmed → return to step 2 with a new theory

Step 4 — Establish a plan of action to resolve the problem
         Consider effects of the fix on the rest of the system
         Notify affected users of planned downtime if applicable

Step 5 — Implement the solution or escalate as necessary
         Apply the fix — if beyond your expertise, escalate to senior tech

Step 6 — Verify full system functionality
         Confirm the original problem is resolved
         Implement preventive measures to stop recurrence

Step 7 — Document findings, actions, and outcomes
         Record what the problem was, what caused it, and what fixed it
         Update knowledge base — helps the whole team next time
POST beep codes — common patterns
POST (Power-On Self-Test) beeps indicate hardware failure during boot.

1 short beep — POST passed, system OK (on some BIOS)
Continuous beep — RAM not seated or failed
3 beeps — RAM error (varies by BIOS maker)
No beep + no video — CPU, RAM, or GPU issue

Beep code meanings vary by BIOS manufacturer (AMI, Award, Phoenix). Always check the motherboard manual.
Common hardware symptoms
Blue Screen of Death (BSOD) — hardware driver issue, RAM failure, or corrupted system files. Note the stop code.

Spinning wheel / slow boot — failing HDD, check with chkdsk
Overheating / random shutdown — clogged vents, failed fan, dried thermal paste
Clicking HDD — imminent drive failure — back up immediately
CMOS error on boot — dead CMOS battery (CR2032) — replace it
📖 Key Acronyms

The A+ exam uses acronyms constantly — both in questions and answer choices. If you hesitate on an acronym you lose time. Know every expansion below cold.

AcronymStands forOne-line description
APIPAAutomatic Private IP Addressing169.254.x.x — self-assigned when DHCP fails
BIOSBasic Input/Output SystemFirmware that initialises hardware at boot — legacy, replaced by UEFI
UEFIUnified Extensible Firmware InterfaceModern replacement for BIOS — supports GPT, Secure Boot, GUI
GPTGUID Partition TableModern partition scheme — supports 128 partitions, drives over 2 TB
MBRMaster Boot RecordLegacy partition scheme — max 4 primary partitions, max 2 TB drive
NTFSNew Technology File SystemWindows default file system — supports permissions, encryption, large files
FAT32File Allocation Table 32Cross-platform — max 4 GB per file. Used on USB drives for compatibility.
exFATExtended FATModern FAT — no file size limit. Used on large USB drives and SD cards.
RAIDRedundant Array of Independent DisksCombines multiple drives for speed and/or redundancy
UPSUninterruptible Power SupplyBattery backup that keeps systems running during brief power outages
KVMKeyboard, Video, Mouse switchAllows one keyboard/monitor/mouse to control multiple computers
VDIVirtual Desktop InfrastructureHosts desktop OS instances on a centralised server — thin clients connect
IaaSInfrastructure as a ServiceCloud provides VMs, storage, networking — you manage OS and apps (AWS EC2)
PaaSPlatform as a ServiceCloud provides runtime environment — you manage only the application code
SaaSSoftware as a ServiceCloud provides the full application — you just use it (Microsoft 365, Salesforce)
MDMMobile Device ManagementCentrally manages mobile devices — enforces policies, remote wipe
MFAMulti-Factor AuthenticationRequires two or more factors — something you know, have, or are
ACLAccess Control ListList of rules defining who can access what resource
TPMTrusted Platform ModuleHardware chip that stores encryption keys — required for BitLocker and Windows 11
BitLockerWindows full-disk encryption — uses TPM to store key. Protects data if drive is removed.

Ready to pass the A+ exam?

The best study guides, video courses, and practice exams for 220-1201 and 220-1202.

See A+ Study Resources →

Related Articles