Jul 24, 2025 3 min read

Differences between the A+ Core 2, 220-1102 and 220-1202

Differences between the A+ Core 2, 220-1102 and 220-1202
Photo by Growtika / Unsplash
Table of Contents

Here's a list of the differences between the older Core 2, 220-1102 exam objectives and the newer Core 2, 220-1202 objectives. Scroll down for additions and removals.

💡
Note: The Core 2, 220-1202 is also known as version 15 or simply V15.
Domain 1102 1202
Operating Systems 31% 28%
Security 25% 28%
Software Troubleshooting 22% 23%
Operational Procedures 22% 21%

Added Content

💡
Numbers before the topic indicate the objective # within the 220-1202.

1.3 - Windows 11 editions:

  • Enterprise
    N versions
    Hardware requirements

1.5 - Informational

  • whoami

1.10 - Distribution Methods

  • Downloadable package
  • Image deployment

1.1 - File System types

  • Extended filesystem (XFS)

1.2 - Boot Methods

  • Multiboot

1.2 - Installation types

  • Zero-touch deployment

1.8 - macOS System folders

  • /Applications
  • /Users
  • /Library
  • /System
  • /Users/Library

1.8 - macOS Features

  • iCloud
  • iMessage
  • FaceTime
  • Drive
  • Continuity

1.9 - Linux Filesystem management

  • fsck
  • mount

1.9 - Linux Common configuration files

  • /etc/passwd
  • /etc/shadow
  • /etc/hosts
  • /etc/fstab
  • /etc/resolv.conf

1.9 - Linux OS components

  • systemd
  • kernel
  • bootloader

1.9 - Linux Root account

1.11 - Storage

  • Sync/folder settings

1.11 - Collaboration tools

  • Spreadsheets
  • Videoconferencing
  • Presentation tools
  • Word processing tools
  • Instant messaging

1.11 - Identity synchronization

1.11 - Licensing assignment

2.1 - Physical Access Security

  • Mobile digital key
  • Facial recognition technology (FRT)
  • Voice recognition technology

2.1 - Logical Security

  • Zero Trust model
  • Time-based one-time password (TOTP)
  • One time password (OTP)
  • Security Assertions Markup Language SAML
  • Single Sign On (SSO)
  • Just in time Access
  • Privileged access management (PAM)
  • Data loss prevention (DLP)
  • Identity access management (IAM)

2.4 - Malware

  • Stalkerware
  • Fileless Adware
  • Potentially unwanted program (PUP)

2.4 - Tools and Methods

  • Email security gateway
  • Software firewalls
  • Managed detection and response (MDR)
  • Extended detection and response (XDR)
  • Endpoint detection and response (EDR)

2.5 - Social Engineering

  • Smishing
  • QR code phishing
  • Spear phishing

2.5 - Threats

  • Business email compromise (BEC)
  • Supply chain/pipeline attack

2.2 - Login OS options

  • Passwordless/Windows Hello

    2.2 - Active Directory (taken from previous 2.1 in the 1102)
  • Joining domain
  • Assigning log-in script
  • Moving objects within
    organizational units
  • Assigning home folders
  • Applying Group Policy
  • Selecting security groups
  • Configuring folder redirection

2.7 - Password Considerations

  • Uniqueness
  • Complexity

2.8 - Failed Log-in attempts restrictions
2.8 - Endpoint Security software

  • Content Filtering

2.8 - Policies and procedures

  • MDM
  • Profile Security Requirements

2.9 - Regulatory and environmental requirements

2.10 - Router Settings

  • Configure secure management access

2.10 - Wireless specific

  • Configuring guest access

2.11 - Browser patching Settings

  • Proxy
  • Secure DNS

2.11 - Browser feature management

  • Enable/disable
  • Plug-ins
  • Extensions
  • Features

3.4 - Common Symptoms

  • Inability to access files

3.4 - Browser-Related Symptoms

  • Degraded browser performance

3.2 - Application fails to install

3.3 - Security Concerns

  • Application source/unofficial application stores
  • Unauthorized/malicious application

4.1 - Asset Management

  • Configuration management database (CMDB)

4.1 - Types of Documentation

  • Service-level agreements (SLAs)
  • Internal
  • External/third-party

4.2 - Documented business processes

  • Backup plan

4.2 - Change Management

  • Change type
  • standard
  • normal
  • emergency
  • Change freeze
  • Maintenance windows Approvals
  • Implementation
  • Peer review

4.3 - Recovery

  • In-place/overwrite
  • Alternative location

4.4 - Cable management

4.5 - Uninterruptible power supply (UPS)

4.6 - Order of volatility
4.6 - Non-disclosure agreement

4.9 - Methods and Tools

  • Simple Protocol for Independent Computing Environments (SPICE)
  • Windows Remote Management (WinRM)

4.10 - Application Integration Policy

  • Appropriate use
  • Plagiarism

4.10 - Limitations

  • Bias
  • Hallucinations
  • Accuracy

4.10 - Private vs. public

  • Data security
  • Data source
  • Data privacy

Removed Content

💡
Objective numbers here are referencing the older 1102 objectives.

old 1.2 - Drive navigation inputs: M 'C': or D: or x:
old 1.2 - Command-line Tools: xcopy, copy,shutdown

old 1.7 - OS requirements for applications

  • Application to OS compatibility
  • 32-bit vs. 64-bit OS

old 1.8 - File System types

  • Third extended filesystem
    (ext3)

old 1.11 - Common Commands

  • yum

old 1.11 - Best practices

  • Backups
  • Antivirus
  • Updates/patches

old 1.11 - Tools

  • Shell/terminal
  • Samba

old 2.9:

  • Dynamic Host Configuration Protocol (DHCP) reservations
  • Static wide-area network (WAN) IP
  • Disabling guest access
  • Changing channels

old 3.1: Common troubleshooting steps

  • Reboot
  • Restart services
  • Uninstall/reinstall/update
    applications
  • Add resources
  • Verify requirements
  • System file check
  • Repair Windows
  • Restore
  • Reimage
  • Roll back updates
  • Rebuild Windows profiles

old 3.4 - Connectivity Issue

  • AirDrop

old 3.5 - Security Concerns

  • Android package (APK) source

old 4.1:

Asset Management

  • Database system

Types of Documentation

  • Network topology diagram
    (Moved to 4.6)
  • Acceptable use policy (AUP)
  • Regulatory compliance
    requirements
  • Splash screens

old 4.5 - Proper power handling, battery backup

old 4.9 - Microsoft Remote Assistance (MSRA)

Great! You’ve successfully signed up.
Welcome back! You've successfully signed in.
You've successfully subscribed to Prowse Tech.
Your link has expired.
Success! Check your email for magic link to sign-in.
Success! Your billing info has been updated.
Your billing was not updated.