220-1102 · topic practice

Operating Systems practice questions

Use this page to practise 220-1102 Operating Systems practice questions. The goal is not to memorise dumps, but to understand the concept, review the explanation and improve your exam readiness.

20 questionsDomain: Operating Systems

What the exam tests

What to know about Operating Systems

Operating Systems questions test whether you can apply the concept in context, not just recognise a definition.

How the topic appears in realistic exam-style scenarios.

Which detail in the question changes the correct answer.

How to eliminate plausible but wrong options.

How to connect the question back to the wider exam objective.

Practice set

Operating Systems questions

20 questions · select your answer, then reveal the explanation

Question 1hardmultiple choice
Full question →

A company's change management policy requires all server changes to be approved by the Change Advisory Board (CAB). A technician discovers that a critical database server's operating system needs a security patch to comply with a new regulatory requirement that takes effect in one week. The patch has a known risk of causing service downtime. The next scheduled CAB meeting is in two weeks. What should the technician do FIRST?

Question 2hardmultiple choice
Full question →

A company requires all changes to production systems to be approved by the Change Advisory Board (CAB). A technician receives an urgent request from a manager to apply a critical security patch that fixes a zero-day vulnerability. The patch requires a reboot, and the server is currently in use. The CAB is not scheduled to meet for another week. Which of the following is the BEST course of action?

Question 3easymultiple choice
Full question →

A company has a standard operating procedure (SOP) for handling password reset requests. Why is it MOST important for help desk technicians to follow this SOP?

Question 4hardmultiple choice
Full question →

A company has a data retention policy that requires all security logs to be retained for 90 days. A security incident occurred 60 days ago, but when the incident response team tries to retrieve logs from that period, they find that the logs have been overwritten due to insufficient storage capacity. Which security principle has been most directly compromised?

Question 5mediummultiple choice
Full question →

A company policy requires that all sensitive data stored on laptops must be encrypted. A technician enables BitLocker on a laptop, but after a reboot, the system prompts for a recovery key. The technician suspects the TPM is not being recognized. Which pre-operating system security feature should the technician check in the BIOS/UEFI?

Question 6easymultiple choice
Full question →

A company's security policy requires that all laptops used by field employees have the entire operating system drive encrypted to protect data in case of theft. Which Windows feature should be enabled to meet this requirement?

Question 7easymultiple choice
Full question →

A help desk technician assists a user who cannot log into their workstation because they forgot their password. The technician follows the company's standard operating procedure for password resets. After successfully resetting the password and confirming the user can log in, what is the NEXT step according to best practices?

Question 8easymultiple choice
Full question →

A help desk technician receives a call from a user who states they clicked on a link in an email that appeared to be from the company's CEO requesting urgent action. The user entered their username and password on the resulting webpage. Which of the following is the FIRST step the technician should take according to incident response procedures?

Question 9hardmultiple choice
Full question →

A help desk technician receives a ticket from a user reporting that their computer is infected with ransomware. All files are encrypted, and a ransom note demands payment. According to the company's incident response policy, what is the FIRST action the technician should take?

Question 10easymultiple choice
Full question →

A help desk technician is documenting the steps for setting up a new employee workstation to ensure consistency across the team. Which type of document should the technician create to define the step-by-step process?

Question 11hardmultiple choice
Full question →

A security analyst is investigating a compromised workstation that is suspected of having a kernel-level rootkit. The workstation is currently running and the analyst needs to preserve evidence for forensic analysis. Which of the following actions should the analyst take FIRST?

Question 12hardmultiple choice
Full question →

A security technician has reimaged a user's Windows 10 workstation twice using a standard company image, but the machine continues to exhibit symptoms of a rootkit infection after each reimage. The technician has verified that the removable media used to deploy the image is clean and that the network boot server is not compromised. Which of the following is the MOST likely reason the rootkit persists?

Question 13hardmultiple choice
Full question →

A security analyst is reviewing logs after a malware infection on a user's workstation. The logs show that the malware attempted to contact multiple external IP addresses on port 445 (SMB) and also made several attempts to write to files with extensions like .docx, .xlsx, .pdf. The antivirus prevented the malware from executing but the analyst wants to contain the threat. According to incident response best practices, what should the analyst do FIRST?

Question 14hardmultiple choice
Full question →

A security analyst discovers that an employee's workstation is infected with a rootkit. The technician has attempted to remove the rootkit using standard antivirus and anti-malware tools, but the rootkit persists after each reboot. Which of the following is the MOST effective next step to eradicate the rootkit?

Question 15hardmultiple choice
Full question →

A security technician has confirmed that a user's workstation is infected with ransomware that has encrypted local files. The technician immediately isolated the system by disconnecting the network cable and then created a forensic image of the hard drive for evidence. According to standard incident response procedures, what should the technician do NEXT?

Question 16easymultiple choice
Full question →

A technician configured a dual-boot system with Windows 10 and Ubuntu Linux. After the installation, the computer boots directly into Windows without showing the GRUB menu. The technician boots from a Linux live USB and opens a terminal. Which command should the technician use to regenerate the GRUB configuration and detect the Windows boot loader?

Question 17mediummultiple choice
Full question →

A technician has just completed a scheduled change that involved updating the operating system on ten company workstations. The update was successful on all workstations. According to change management best practices, which of the following should the technician do to properly close the change?

Question 18easymultiple choice
Full question →

A technician has a change request approved by the Change Advisory Board (CAB) to upgrade the operating system on 50 company workstations. The technician has tested the upgrade on a pilot group of five workstations with no issues. According to change management best practices, what is the NEXT step the technician should take?

Question 19mediummultiple choice
Full question →

A technician implemented a change to a firewall rule on a production server. Shortly after, a critical business application stopped functioning. The technician reverted the change and restored service. According to change management best practices, which of the following should the technician have done BEFORE implementing the change?

Question 20hardmultiple choice
Full question →

A technician is cleaning a workstation that was infected with a rootkit. The technician has booted into a trusted recovery environment and run anti-malware scans. After removing the rootkit, the technician wants to ensure no remnants remain. Which of the following is the BEST next step?

Watch out for

Common Operating Systems exam traps

  • Answering from memory before reading the full scenario.
  • Missing a constraint such as cost, availability, security, scope or command context.
  • Choosing a broad answer when the question asks for the most specific fix.
  • Ignoring why the wrong options are tempting.

Free account

Track your progress over time

Create a free account to save your results and see which topics improve across sessions.

Focused Operating Systems sessions

Start a Operating Systems only practice session

Every question in these sessions is drawn from the Operating Systems domain — nothing else.

Related practice questions

Related 220-1102 topic practice pages

Move into related areas when this topic feels solid.

Frequently asked questions

What does the 220-1102 exam test about Operating Systems?
Operating Systems questions test whether you can apply the concept in context, not just recognise a definition.
How should I use these practice questions?
Select your answer before revealing the explanation. Then read why each option is right or wrong — this active recall approach builds retention far faster than re-reading notes.
Can I practise just Operating Systems questions in a focused session?
Yes — the session launcher on this page draws every question from the Operating Systems domain. Use a 10-question session first to gauge your baseline, then move to 20 or 30 once the weak spots are clear.
Where can I practise other 220-1102 topics?
Use the topic links above to move to related areas, or go back to the 220-1102 question bank to see all topics.
Are these real exam questions or dumps?
These are original practice questions written to test the same concepts the 220-1102 exam covers. They are not copied from any real exam or dump site.