220-1102 · topic practice

Security practice questions

Use this page to practise 220-1102 Security practice questions. The goal is not to memorise dumps, but to understand the concept, review the explanation and improve your exam readiness.

20 questionsDomain: Security

What the exam tests

What to know about Security

Security questions test whether you can apply the concept in context, not just recognise a definition.

How the topic appears in realistic exam-style scenarios.

Which detail in the question changes the correct answer.

How to eliminate plausible but wrong options.

How to connect the question back to the wider exam objective.

Practice set

Security questions

20 questions · select your answer, then reveal the explanation

Question 1hardmultiple choice
Full question →

A company's change management policy requires all server changes to be approved by the Change Advisory Board (CAB). A technician discovers that a critical database server's operating system needs a security patch to comply with a new regulatory requirement that takes effect in one week. The patch has a known risk of causing service downtime. The next scheduled CAB meeting is in two weeks. What should the technician do FIRST?

Question 2mediummultiple choice
Full question →

A company wants to allow employees to securely access internal resources from home via the internet. Which method provides the highest level of security for remote desktop connections?

Question 3mediummultiple choice
Full question →

A change advisory board (CAB) approves an emergency change to apply a critical security patch to a critical server. After the patch is applied and the server is verified operational, the technician completes the documentation. According to change management best practices, what post-implementation step is unique to emergency changes?

Question 4mediummultiple choice
Full question →

A company is decommissioning several SSDs from high-security laptops. The SSDs were encrypted with BitLocker. The organization must ensure data is unrecoverable while complying with environmental disposal regulations. Which method should be used?

Question 5mediummultiple choice
Full question →

A company has a policy that requires all workstations to have antivirus software installed and keep it up to date. A technician finds that several computers have disabled their antivirus services. Which security control would have MOST effectively prevented users from disabling the antivirus?

Question 6hardmultiple choice
Full question →

A company requires all changes to production systems to be approved by the Change Advisory Board (CAB). A technician receives an urgent request from a manager to apply a critical security patch that fixes a zero-day vulnerability. The patch requires a reboot, and the server is currently in use. The CAB is not scheduled to meet for another week. Which of the following is the BEST course of action?

Question 7hardmultiple choice
Full question →

A company's security policy mandates that all workstations must have full disk encryption. Which Windows feature provides full disk encryption?

Question 8easymultiple choice
Full question →

A company has a standard operating procedure (SOP) for handling password reset requests. Why is it MOST important for help desk technicians to follow this SOP?

Question 9mediummultiple choice
Full question →

A company's receptionist receives a phone call from someone claiming to be from the IT help desk. The caller states there is a critical security issue with the receptionist's computer and requests the receptionist's username and password to fix it remotely. Which type of social engineering attack is this?

Question 10mediummultiple choice
Full question →

A company wants to protect the data on its fleet of laptops. The security policy requires that if a laptop is stolen, the data on the internal hard drive must be unreadable even if the drive is removed and placed into another computer. Which technology, available on Windows 10 Pro, meets this requirement?

Question 11hardmultiple choice
Full question →

A company has a data retention policy that requires all security logs to be retained for 90 days. A security incident occurred 60 days ago, but when the incident response team tries to retrieve logs from that period, they find that the logs have been overwritten due to insufficient storage capacity. Which security principle has been most directly compromised?

Question 12mediummultiple choice
Full question →

A company's security policy requires that all data on laptops be encrypted. A technician has enabled BitLocker on a laptop and saved the recovery key to the user's Microsoft account. After a motherboard failure, the laptop is replaced and the technician tries to access the old drive via a USB enclosure. The recovery key is not available because the user's Microsoft account was deleted. What could have been done to prevent this situation?

Question 13mediummultiple choice
Full question →

A critical security vulnerability has been discovered in the company's web server software. The vendor has released a patch, and the IT security team has verified it in a test environment. The change requires a server reboot, causing a 30-minute outage. The company's change management policy requires all changes to be pre-approved by the Change Advisory Board (CAB), which meets weekly on Fridays. The vulnerability is actively being exploited in the wild. What should the technician do NEXT?

Question 14mediummultiple choice
Full question →

A company's security policy requires that all mobile devices be encrypted and capable of being wiped remotely if lost or stolen. Which mobile management solution should the organization implement?

Question 15mediummultiple choice
Full question →

A company follows a strict change management process. A technician is applying a critical security patch to a web server during a scheduled maintenance window. The patch was fully tested in a lab environment and approved by the Change Advisory Board (CAB). During the installation, the technician discovers that the patch requires a software dependency that is not installed on the server. According to change management best practices, what should the technician do FIRST?

Question 16mediummultiple choice
Full question →

A company policy requires that all sensitive data stored on laptops must be encrypted. A technician enables BitLocker on a laptop, but after a reboot, the system prompts for a recovery key. The technician suspects the TPM is not being recognized. Which pre-operating system security feature should the technician check in the BIOS/UEFI?

Question 17mediummultiple choice
Full question →

A company policy requires that all laptops be encrypted to protect data in case of theft. A technician enables BitLocker Drive Encryption on a Windows 10 Pro laptop equipped with a TPM 2.0 chip. After encryption completes, which of the following is the MOST secure method to protect the BitLocker recovery key?

Question 18hardmultiple choice
Full question →

A company's current password policy requires a minimum of 14 characters with complexity (uppercase, lowercase, numbers, and special characters). Users frequently forget these complex passwords and submit help desk reset requests. Which alternative approach would BEST enhance security while reducing the burden on users?

Question 19hardmultiple choice
Full question →

A company's password policy requires a minimum length of 14 characters with complexity (uppercase, lowercase, numbers, and special characters). Users find these passwords difficult to remember and frequently reset them. Which alternative approach would BEST enhance security while reducing the user burden?

Question 20mediummultiple choice
Full question →

A company's security policy requires that all laptops have full disk encryption. A technician is configuring BitLocker on a Windows 10 Pro laptop. The laptop does not have a TPM chip. Which additional step must the technician take to enable BitLocker?

Watch out for

Common Security exam traps

  • Answering from memory before reading the full scenario.
  • Missing a constraint such as cost, availability, security, scope or command context.
  • Choosing a broad answer when the question asks for the most specific fix.
  • Ignoring why the wrong options are tempting.

Free account

Track your progress over time

Create a free account to save your results and see which topics improve across sessions.

Focused Security sessions

Start a Security only practice session

Every question in these sessions is drawn from the Security domain — nothing else.

Related practice questions

Related 220-1102 topic practice pages

Move into related areas when this topic feels solid.

Frequently asked questions

What does the 220-1102 exam test about Security?
Security questions test whether you can apply the concept in context, not just recognise a definition.
How should I use these practice questions?
Select your answer before revealing the explanation. Then read why each option is right or wrong — this active recall approach builds retention far faster than re-reading notes.
Can I practise just Security questions in a focused session?
Yes — the session launcher on this page draws every question from the Security domain. Use a 10-question session first to gauge your baseline, then move to 20 or 30 once the weak spots are clear.
Where can I practise other 220-1102 topics?
Use the topic links above to move to related areas, or go back to the 220-1102 question bank to see all topics.
Are these real exam questions or dumps?
These are original practice questions written to test the same concepts the 220-1102 exam covers. They are not copied from any real exam or dump site.