100% Money Back Guarantee

ExamsLabs has an unprecedented 99.6% first time pass rate among our customers. We're so confident of our products that we provide no hassle product exchange.

Go To 220-1002 Questions

  • Best exam practice material
  • Three formats are optional
  • 10+ years of excellence
  • 365 Days Free Updates
  • Learn anywhere, anytime
  • 100% Safe shopping experience

220-1002 Desktop Test Engine

  • Installable Software Application
  • Simulates Real 220-1002 Exam Environment
  • Builds 220-1002 Exam Confidence
  • Supports MS Operating System
  • Two Modes For 220-1002 Practice
  • Practice Offline Anytime
  • Software Screenshots
  • Total Questions: 850
  • Updated on: Aug 31, 2025
  • Price: $69.00

220-1002 PDF Practice Q&A's

  • Printable 220-1002 PDF Format
  • Prepared by CompTIA Experts
  • Instant Access to Download 220-1002 PDF
  • Study Anywhere, Anytime
  • 365 Days Free Updates
  • Free 220-1002 PDF Demo Available
  • Download Q&A's Demo
  • Total Questions: 850
  • Updated on: Aug 31, 2025
  • Price: $69.00

220-1002 Online Test Engine

  • Online Tool, Convenient, easy to study.
  • Instant Online Access 220-1002 Dumps
  • Supports All Web Browsers
  • 220-1002 Practice Online Anytime
  • Test History and Performance Review
  • Supports Windows / Mac / Android / iOS, etc.
  • Try Online Engine Demo
  • Total Questions: 850
  • Updated on: Aug 31, 2025
  • Price: $69.00

Refund you in full if you can't pass the exam

If our CompTIA A+ Certification Exam: Core 2 guide torrent can't help you pass the exam, we will refund you in full. If only the client provide the exam certificate and the scanning copy or the screenshot of the failure score of 220-1002 exam, we will refund the client immediately. The procedure of refund is very simple. If the clients have any problems or doubts about our 220-1002 exam materials you can contact us by sending mails or contact us online and we will reply and solve the client's problems as quickly as we can.

CompTIA 220-1002 Exam Syllabus Topics:

TopicDetails

Operating Systems - 27%

Compare and contrast common operating system types and their purposes.1. 32-bit vs. 64-bit
  • RAM limitations
  • Software compatibility

2. Workstation operating systems

  • Microsoft Windows
  • Apple Macintosh OS
  • Linux

3. Cell phone/tablet operating systems

  • Microsoft Windows
  • Android
  • iOS
  • Chrome OS

4. Vendor-specific limitations

  • End-of-life
  • Update limitations

5. Compatibility concerns between operating systems

Compare and contrast features of Microsoft Windows versions.1. Windows 7
2. Windows 8
3. Windows 8.1
4. Windows 10
5. Corporate vs. personal needs
  • Domain access
  • BitLocker
  • Media center
  • BranchCache
  • EFS

6. Desktop styles/user interface

Summarize general OS installation considerations and upgrade methods.1. Boot methods
  • Optical disc(CD-ROM, DVD, Blu-ray)
  • External drive/flash drive (USB/eSATA)
  • Network boot (PXE)
  • Internal fixed disk (HDD/SSD)
  • Internal hard drive (partition)

2. Type of installations

  • Unattended installation
  • In-place upgrade
  • Clean install
  • Repair installation
  • Multiboot
  • Remote network installation
  • Image deployment
  • Recovery partition
  • Refresh/restore

3. Partitioning

  • Dynamic
  • Basic
  • Primary
  • Extended
  • Logical
  • GPT

4. File system types/formatting

  • ExFAT
  • FAT32
  • NTFS
  • CDFS
  • NFS
  • ext3, ext4
  • HFS
  • Swap partition
  • Quick format vs. full format

5. Load alternate third-party drivers when necessary
6. Workgroup vs. Domain setup
7. Time/date/region/language settings
8. Driver installation, software, and Windows updates
9. Factory recovery partition
10. Properly formatted boot drive with the correct partitions/format
11. Prerequisites/hardware compatibility
12. Application compatibility
13. OS compatibility/upgrade path

Given a scenario, use appropriate Microsoft command line tools.1. Navigation
  • dir
  • cd
  • ..

2. ipconfig
3. ping
4. tracert
5. netstat
6. nslookup
7. shutdown
8. dism
9. sfc
10. chkdsk
11. diskpart
12. taskkill
13. gpupdate
14. gpresult
15. format
16. copy
17. xcopy
18. robocopy
19. net use
20. net user
21. [command name] /?
22. Commands available with standard privileges vs. administrative privileges

Given a scenario, use Microsoft operating system features and tools.1. Administrative
  • Computer Management
  • Device Manager
  • Local Users and Groups
  • Local Security Policy
  • Performance Monitor
  • Services
  • System Configuration
  • Task Scheduler
  • Component Services
  • Data Sources
  • Print Management
  • Windows Memory Diagnostics
  • Windows Firewall
  • Advanced Security
  • Event Viewer
  • User Account Management

2. MSConfig

  • General
  • Boot
  • Services
  • Startup
  • Tools

3. Task Manager

  • Applications
  • Processes
  • Performance
  • Networking
  • Users

4. Disk Management

  • Drive status
  • Mounting
  • Initializing
  • Extending partitions
  • Splitting partitions
  • Shrink partitions
  • Assigning/changing drive letters
  • Adding drives
  • Adding arrays
  • Storage spaces

5. System utilities

  • Regedit
  • Command
  • Services.msc
  • MMC
  • MSTSC
  • Notepad
  • Explorer
  • Msinfo32
  • DxDiag
  • Disk Defragmenter
  • System Restore
  • Windows Update
Given a scenario, use Microsoft Windows Control Panel utilities.1. Internet Options
  • Connections
  • Security
  • General
  • Privacy
  • Programs
  • Advanced

2. Display/Display Settings

  • Resolution
  • Color depth
  • Refresh rate

3. User Accounts
4. Folder Options

  • View hidden files
  • Hide extensions
  • General options
  • View options

5. System

  • Performance (virtual memory)
  • Remote settings
  • System protection

6. Windows Firewall
7. Power Options

  • Hibernate
  • Power plans
  • Sleep/suspend
  • Standby

8. Credential Manager
9. Programs and features
10. HomeGroup
11. Devices and Printers
12. Sound
13. Troubleshooting
14. Network and Sharing Center
15. Device Manager
16. BitLocker
17. Sync Center

Summarize application installation and configuration concepts.1. System requirements
  • Drive space
  • RAM

2. OS requirements

  • Compatibility

3. Methods of installation and deployment

  • Local (CD/USB)
  • Network-based

4. Local user permissions

  • Folder/file access for installation

5. Security considerations

  • Impact to device
  • Impact to network
Given a scenario, configure Microsoft Windows networking on a client/desktop.1. HomeGroup vs. Workgroup
2. Domain setup
3. Network shares/administrative shares/mapping drives
4. Printer sharing vs. network printer mapping
5. Establish networking connections
  • VPN
  • Dial-ups
  • Wireless
  • Wired
  • WWAN (Cellular)

6. Proxy settings
7. Remote Desktop Connection
8. Remote Assistance
9. Home vs. Work vs. Public network settings
10. Firewall settings

  • Exceptions
  • Configuration
  • Enabling/disabling Windows Firewall

11. Configuring an alternative IP address in Windows

  • IP addressing
  • Subnet mask
  • DNS
  • Gateway

12. Network card properties

  • Half duplex/full duplex/auto
  • Speed
  • Wake-on-LAN
  • QoS
  • BIOS (on-board NIC)
Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems.1. Best practices
  • Scheduled backups
  • Scheduled disk maintenance
  • System updates/App Store
  • Patch management
  • Driver/firmware updates
  • Antivirus/Anti-malware updates

2. Tools

  • Backup/Time Machine
  • Restore/Snapshot
  • Image recovery
  • Disk maintenance utilities
  • Shell/Terminal
  • Screen sharing
  • Force Quit

3. Features

  • Multiple desktops/Mission Control
  • Key Chain
  • Spot Light
  • iCloud
  • Gestures
  • Finder
  • Remote Disc
  • Dock
  • Boot Camp

4. Basic Linux commands

  • ls
  • grep
  • cd
  • shutdown
  • pwd vs. passwd
  • mv
  • cp
  • rm
  • chmod
  • chown
  • iwconfig/ifconfig
  • ps
  • su/sudo
  • apt-get
  • vi
  • dd
  • kill

Security - 24%

Summarize the importance of physical security measures.1. Access control vestibule
2. Badge reader
3. Smart card
4. Security guard
5. Door lock
6. Biometric locks
7. Hardware tokens
8. Cable locks
9. Server locks
10. USB locks
11. Privacy screen
12. Key fobs
13. Entry control roster
Explain logical security concepts.1. Active Directory
  • Login script
  • Domain
  • Group Policy/Updates
  • Organizational Units
  • Home Folder
  • Folder redirection

2. Software tokens
3. MDM policies
4. Port security
5. MAC address filtering
6. Certificates
7. Antivirus/Anti-malware
8. Firewalls
9. User authentication/strong passwords
10. Multifactor authentication
11. Directory permissions
12. VPN
13. DLP
14. Access control lists
15. Smart card
16. Email filtering
17. Trusted/untrusted software sources
18. Principle of least privilege

Compare and contrast wireless security protocols and authentication methods.1. Protocols and encryption
  • WEP
  • WPA
  • WPA2
  • TKIP
  • AES

2. Authentication

  • Single-factor
  • Multifactor
  • RADIUS
  • TACACS
Given a scenario, detect, remove, and prevent malware using appropriate tools and methods.1. Malware
  • Ransomware
  • Trojan
  • Keylogger
  • Rootkit
  • Virus
  • Botnet
  • Worm
  • Spyware

2. Tools and methods

  • Antivirus
  • Anti-malware
  • Recovery console
  • Backup/restore
  • End user education
  • Software firewalls
  • DNS configuration
Compare and contrast social engineering, threats, and vulnerabilities.1. Social engineering
  • Phishing
  • Spear phishing
  • Impersonation
  • Shoulder surfing
  • Tailgating
  • Dumpster diving

2. DDoS
3. DoS
4. Zero-day
5. On-path attack (previously known as man-in-the-middle attack)
6. Brute force
7. Dictionary
8. Rainbow table
9. Spoofing
10. Non-compliant systems
11. Zombie

Compare and contrast the differences of basic Microsoft Windows OS security settings.1. User and groups
  • Administrator
  • Power user
  • Guest
  • Standard user

2. NTFS vs. share permissions

  • Allow vs. deny
  • Moving vs. copying folders and files
  • File attributes

3. Shared files and folders

  • Administrative shares vs. local shares
  • Permission propagation
  • Inheritance

4. System files and folders
5. User authentication

  • Single sign-on

6. Run as administrator vs. standard user
7. BitLocker
8. BitLocker To Go
9. EFS

Given a scenario, implement security best practices to secure a workstation.1. Password best practices
  • Setting strong passwords
  • Password expiration
  • Screensaver required password
  • BIOS/UEFI passwords
  • Requiring passwords

2. Account management

  • Restricting user permissions
  • Logon time restrictions
  • Disabling guest account
  • Failed attempts lockout
  • Timeout/screen lock
  • Change default admin user account/password
  • Basic Active Directory functions
    1. Account creation
    2. Account deletion
    3. Password reset/unlock account
    4. Disable account

3. Disable autorun
4. Data encryption
5. Patch/update management

Given a scenario, implement methods for securing mobile devices.1. Screen locks
  • Fingerprint lock
  • Face lock
  • Swipe lock
  • Passcode lock

2. Remote wipes
3. Locator applications
4. Remote backup applications
5. Failed login attempts restrictions
6. Antivirus/Anti-malware
7. Patching/OS updates
8. Biometric authentication
9. Full device encryption
10. Multifactor authentication
11. Authenticator applications
12. Trusted sources vs. untrusted sources
13. Firewalls
14. Policies and procedures

  • BYOD vs. corporate-owned
  • Profile security requirements
Given a scenario, implement appropriate data destruction and disposal methods.1. Physical destruction
  • Shredder
  • Drill/hammer
  • Electromagnetic (Degaussing)
  • Incineration
  • Certificate of destruction

2. Recycling or repurposing best practices

  • Low-level format vs. standard format
  • Overwrite
  • Drive wipe
Given a scenario, configure security on SOHO wireless and wired networks.1. Wireless-specific
  • Changing default SSID
  • Setting encryption
  • Disabling SSID broadcast
  • Antenna and access point placement
  • Radio power levels
  • WPS

2. Change default usernames and passwords
3. Enable MAC filtering
4. Assign static IP addresses
5. Firewall settings
6. Port forwarding/mapping
7. Disabling ports
8. Content filtering/parental controls
9. Update firmware
10. Physical security

Software Troubleshooting - 26%

Given a scenario, troubleshoot Microsoft Windows OS problems.1. Common symptoms
  • Slow performance
  • Limited connectivity
  • Failure to boot
  • No OS found
  • Application crashes
  • Blue screens
  • Blank screens
  • Printing issues
  • Services fail to start
  • Slow bootup
  • Slow profile load

2. Common solutions

  • Defragment the hard drive
  • Reboot
  • Kill tasks
  • Restart services
  • Update network settings
  • Reimage/reload OS
  • Roll back updates
  • Roll back devices drivers
  • Apply updates
  • Repair application
  • Update boot order
  • Disable Windows services/applications
  • Disable application startup
  • Safe boot
  • Rebuild Windows profiles
Given a scenario, troubleshoot and resolve PC security issues.1. Common symptoms
  • Pop-ups
  • Browser redirection
  • Security alerts
  • Slow performance
  • Internet connectivity issues
  • PC/OS lockup
  • Application crash
  • OS updates failures
  • Rogue antivirus
  • Spam
  • Renamed system files
  • Disappearing files
  • File permission changes
  • Hijacked email
    - Responses from users regarding email
    - Automated replies from unknown sent email
  • Access denied
  • Invalid certificate (trusted root CA)
  • System/application log errors
Given a scenario, use best practice procedures for malware removal.1. Identify and research malware symptoms.
2. Quarantine the infected systems.
3. Disable System Restore (in Windows).
4. Remediate the infected systems.
  • Update the anti-malware software.
  • Scan and use removal techniques (safe mode, pre-installation environment).

5. Schedule scans and run updates.
6. Enable System Restore and create a restore point (in Windows).
7. Educate the end user.

Given a scenario, troubleshoot mobile OS and application issues.1. Common symptoms
  • Dim display
  • Intermittent wireless
  • No wireless connectivity
  • No Bluetooth connectivity
  • Cannot broadcast to external monitor
  • Touchscreen non-responsive
  • Apps not loading
  • Slow performance
  • Unable to decrypt email
  • Extremely short battery life
  • Overheating
  • Frozen system
  • No sound from speakers
  • Inaccurate touch screen response
  • System lockout
  • App log errors
Given a scenario, troubleshoot mobile OS and application security issues.1. Common symptoms
  • Signal drop/weak signal
  • Power drain
  • Slow data speeds
  • Unintended WiFi connection
  • Unintended Bluetooth pairing
  • Leaked personal files/data
  • Data transmission over limit
  • Unauthorized account access
  • Unauthorized location tracking
  • Unauthorized camera/microphone activation
  • High resource utilization

Operational Procedures - 23%

Compare and contrast best practices associated with types of documentation.1. Network topology diagrams
2. Knowledge base/articles
3. Incident documentation
4. Regulatory and compliance policy
5. Acceptable use policy
6. Password policy
7. Inventory management
  • Asset tags
  • Barcodes
Given a scenario, implement basic change management best practices.1. Documented business processes
2. Purpose of the change
3. Scope the change
4. Risk analysis
5. Plan for change
6. End-user acceptance
7. Change board
  • Approvals

8. Backout plan
9. Document changes

Given a scenario, implement basic disaster prevention and recovery methods.1. Backup and recovery
  • Image level
  • File level
  • Critical applications

2. Backup testing
3. UPS
4. Surge protector
5. Cloud storage vs. local storage backups
6. Account recovery options

Explain common safety procedures.1. Equipment grounding
2. Proper component handling and storage
  • Antistatic bags
  • ESD straps
  • ESD mats
  • Self-grounding

3. Toxic waste handling

  • Batteries
  • Toner
  • CRT
  • Cell phones
  • Tablets

4. Personal safety

  • Disconnect power before repairing PC
  • Remove jewelry
  • Lifting techniques
  • Weight limitations
  • Electrical fire safety
  • Cable management
  • Safety goggles
  • Air filter mask

5. Compliance with government regulations

Explain environmental impacts and appropriate controls.1. MSDS documentation for handling and disposal
2. Temperature, humidity level awareness, and proper ventilation
3. Power surges, under-voltage events, and power loss
  • Battery backup
  • Surge suppressor

4. Protection from airborne particles

  • Enclosures
  • Air filters/mask

5. Dust and debris

  • Compressed air
  • Vacuums

6. Compliance to government regulations

Explain the processes for addressing prohibited content/ activity, and privacy, licensing, and policy concepts.1. Incident response
  • First response
    - Identify
    - Report through proper channels
    - Data/device preservation
  • Use of documentation/documentation changes
  • Chain of custody
    Tracking of evidence/documenting process

2. Licensing/DRM/EULA

  • Open-source vs. commercial license
  • Personal license vs. enterprise licenses

3. Regulated data

  • PII
  • PCI
  • GDPR
  • PHI

4. Follow all policies and security best practices

Given a scenario, use proper communication techniques and professionalism.1. Use proper language and avoid jargon, acronyms, and slang, when applicable
2. Maintain a positive attitude/project confidence
3. Actively listen (taking notes) and avoid interrupting the customer
4. Be culturally sensitive
  • Use appropriate professional titles, when applicable

5. Be on time (if late, contact the customer)
6. Avoid distractions

  • Personal calls
  • Texting/social media sites
  • Talking to coworkers while interacting with customers
  • Personal interruptions

7. Dealing with difficult customers or situations

  • Do not argue with customers and/or be defensive
  • Avoid dismissing customer problems
  • Avoid being judgmental
  • Clarify customer statements (ask open-ended questions to narrow the scope of the problem, restate the issue, or question to verify understanding)
  • Do not disclose experiences via social media outlets

8. Set and meet expectations/timeline and communicate status with the customer

  • Offer different repair/replacement options, if applicable
  • Provide proper documentation on the services provided
  • Follow up with customer/user at a later date to verify satisfaction

9. Deal appropriately with customers’ confidential and private materials

  • Located on a computer, desktop, printer, etc.
Identify the basics of scripting.1. Script file types
  • .bat
  • .ps1
  • .vbs
  • .sh
  • .py
  • .js

2. Environment variables
3. Comment syntax
4. Basic script constructs

  • Basic loops
  • Variables

5. Basic data types

  • Integers
  • Strings
Given a scenario, use remote access technologies.1. RDP
2. Telnet
3. SSH
4. Third-party tools
  • Screen share feature
  • File share

5. Security considerations of each access method

Maybe there are so many candidates think the 220-1002 exam is difficult to pass that they be beaten by it. But now, you don't worry about that anymore, because we will provide you an excellent exam material. Our 220-1002 exam materials are very useful for you and can help you score a high mark in the test. It also boosts the function of timing and the function to simulate the exam so you can improve your speed to answer and get full preparation for the test. Trust us that our 220-1002 exam torrent can help you pass the exam and find an ideal job. If you have any question about the content of our 220-1002 exam materials, our customer service will give you satisfied answers online. Before you buy our product, please understand the characteristics and the advantages of our CompTIA A+ Certification Exam: Core 2 guide torrent in detail as follow.

DOWNLOAD DEMO

220-1002 Exam topics

Candidates must know the exam topics before they start of preparation. Because it will really help them in hitting the core. Our 220-1002 exam dumps will include the following topics:

  • Operating Systems 27%
  • Security 24%
  • Software Troubleshooting 26%
  • Operational Procedures 23%

Reference: https://certification.comptia.org/training/self-study/books/a-220-1001-220-1002-study-guide

Security (24%):

  • In a given scenario, configure security on SOHO wireless and wired networks.
  • In a given scenario, implement the best security practices to ensure security of a workstation;
  • Compare and contrast authentication techniques and wireless security protocols;
  • In a given scenario, implement relevant data destruction techniques and disposal methods;
  • Describe the concepts of logical security;
  • In a given scenario, implement different methods to secure mobile devices;
  • Summarize the major importance of physical security measures;
  • Compare and contrast the core differences of fundamental Microsoft Windows operating system security settings;
  • Compare and contrast the concepts of social engineering, vulnerabilities, and threats;
  • In a given scenario, define, eliminate, prevent bugs with the help of relevant tools and approaches;

Conclusion

The CompTIA 220-1002 test is an important step you need to take to earn the A+ credential. Passing this exam is not a walkover, but with the correct technique and guidance, you will ace it without straining. You must use various study materials to gain all the skills measured in the test. We hope that the information provided here will be helpful for you and enable you to clear CompTIA 220-1002 on your first try.

Extremely high passing rate

We provide 220-1002 exam torrent which are of high quality and can boost high passing rate and hit rate. Our passing rate is 99% and thus you can reassure yourself to buy our product and enjoy the benefits brought by our 220-1002 exam materials. Our product is efficient and can help you master the CompTIA A+ Certification Exam: Core 2 guide torrent in a short time and save your energy. The product we provide is compiled by experts and approved by the professionals who boost profound experiences. It is revised and updated according to the change of the syllabus and the latest development situation in the theory and the practice.

Great customer service online

We provide online customer service to the customers for 24 hours per day and we provide professional personnel to assist the client in the long distance online. If you have any questions and doubts about the CompTIA A+ Certification Exam: Core 2 guide torrent we provide before or after the sale, you can contact us and we will send the customer service and the professional personnel to help you solve your issue about using 220-1002 exam materials. The client can contact us by sending mails or contact us online. We will solve your problem as quickly as we can and provide the best service. Our after-sales service is great as we can solve your problem quickly and won't let your money be wasted. If you aren't satisfied with our 220-1002 exam torrent you can return back the product and refund you in full.

892 Customer ReviewsCustomers Feedback (* Some similar or old comments have been hidden.)

Pass 220-1002 exam Successfully.

Michell

Michell     5 star  

This 220-1002 exam dump is a great asset to pass the 220-1002 exams, if you use the questions from ExamsLabs, you will pass 220-1002 exam for sure.

Kent

Kent     4 star  

ExamsLabs not only enhance the professional skills but also make 220-1002 exam quite easy to pass. I recommend it to everyone who wants a sure success!

Jared

Jared     5 star  

My firend bought this 220-1002 practice dump for me for we have to practice football. I only studied it at my spread time and passed my 220-1002 exam out my imagination. I was lucky for your help!

Morgan

Morgan     4.5 star  

To the point material with real exam questions and answers made it so easy that I got 90% marks with just one week of training. Anyone can attempt 220-1002 exam with 220-1002 exam materials from ExamsLabs.

Isabel

Isabel     5 star  

Valid 220-1002 exam materials, it covers everything you need to kmow for 220-1002 exam. I passed my 220-1002 exam with preparing for it for about a week. You can trust them!

Warner

Warner     5 star  

I passed my certified 220-1002 exam in the first attempt. Thanks to ExamsLabs for providing the latest dumps that are surely a part of the original exam.

Tess

Tess     5 star  

Really stunned with the authority and validity of ExamsLabs 220-1002 study guide in pdf format. ExamsLabs provided material was straightforward and I was completely prepared 220-1002 92% Marks to show

Samantha

Samantha     5 star  

The 220-1002 questions were easy because they came back to me from the work book.

Regan

Regan     5 star  

I found the dump to be well written. It is good for the candidates that are preparing for the 220-1002. I passed with plenty to spare. Thanks for your help.

Levi

Levi     4.5 star  

I pass 220-1002 but can you send me the latest version time to time? Many of my friends still need to candidate the exam. Thanks please send to my email address you should know.

Wallis

Wallis     4.5 star  

I appreciate the service, they helped me a lot when I chose the 220-1002 exam materials.

Jason

Jason     5 star  

Hi to all, it’s really a nice for me to pay a quick visit this CompTIA web
page, it contains priceless and useful information for 220-1002.

Giles

Giles     4.5 star  

Flooded by the comments and congratulations messages after passing my CompTIA 220-1002 exam. People also asking about the preparation plan I followed, so decided to give my feedback

Joshua

Joshua     4.5 star  

I will suggest you to take 220-1002 practice test before appearing for the exam. They help preparing for actual exam. I passed yeasterday. Good luck!

Edith

Edith     4.5 star  

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Related Exams

Related Posts

Instant Download 220-1002

After Payment, our system will send you the products you purchase in mailbox in a minute after payment. If not received within 2 hours, please contact us.

365 Days Free Updates

Free update is available within 365 days after your purchase. After 365 days, you will get 50% discounts for updating.

Porto

Money Back Guarantee

Full refund if you fail the corresponding exam in 60 days after purchasing. And Free get any another product.

Security & Privacy

We respect customer privacy. We use McAfee's security service to provide you with utmost security for your personal information & peace of mind.