220-1101 · topic practice
Security practice questions
Use this page to practise 220-1101 Security practice questions. The goal is not to memorise dumps, but to understand the concept, review the explanation and improve your exam readiness.
What the exam tests
What to know about Security
Security questions test whether you can apply the concept in context, not just recognise a definition.
How the topic appears in realistic exam-style scenarios.
Which detail in the question changes the correct answer.
How to eliminate plausible but wrong options.
How to connect the question back to the wider exam objective.
Practice set
Security questions
20 questions · select your answer, then reveal the explanation
A company is migrating its on-premises web servers to the cloud. They want to maintain full control over the operating system, web server software, and security configurations, but they do not want to manage the underlying physical hardware, storage, or network infrastructure. Which cloud service model best meets these requirements?
A company is developing a custom application that requires a specific Linux kernel version and full root access to install and configure third-party security modules. The company wants to minimize the management of physical infrastructure but needs complete control over the operating system environment, including the ability to modify kernel parameters. The cloud provider will be responsible for all underlying hardware and the hypervisor. Which cloud service model should the company choose?
A company runs multiple virtual machines (VMs) on a single hypervisor host. The administrator wants to ensure that if one VM is compromised by malware, it cannot read the memory contents of other VMs running on the same host. Which hypervisor feature primarily provides this protection?
A company wants to move its email system to the cloud. The IT team wants to avoid managing the underlying servers and email software but needs full administrative control over email settings, user accounts, and security policies. Which cloud service model should the company choose?
A company wants to move its on-premises email server to the cloud. The goal is to eliminate all management overhead related to the operating system, security patches, and the email application itself. The IT team needs the email service to be highly available and automatically scalable. Which cloud service model BEST meets these requirements?
A company wants to deploy a custom web application that includes a custom database and a web server with specific modules. The development team needs full control over the operating system, including the ability to apply security patches and install third-party software. The company does not want to manage the physical servers, hypervisors, or network infrastructure. The cloud provider will be responsible for the underlying hardware and virtualization layer. Which cloud service model BEST meets these requirements?
A company wants to migrate its on-premises email system to the cloud. They require a solution where the cloud provider manages the email servers, software updates, security patches, and storage infrastructure, while the company retains control over user accounts, mailbox policies, and email content. Which cloud service model BEST fits these requirements?
A company uses a public IaaS provider to host a web application. To protect against DDoS attacks, they configure a security appliance that inspects incoming traffic before it reaches the web servers. This appliance runs on a separate virtual machine in the same cloud environment. Which of the following cloud security concepts does this scenario BEST describe?
A company uses a Type 1 hypervisor to host multiple virtual machines. One VM runs a legacy application that requires a specific MAC address for licensing. The administrator needs to move the VM from the current host to another physical host without changing the MAC address. Which of the following virtualization features should the administrator use?
A company wants to migrate its on-premises infrastructure to the cloud. The security team requires that the company retains full control over network configuration, firewall rules, and security policies, but they do not want to manage physical servers, storage, or the underlying hypervisor. Which cloud service model BEST meets these requirements?
A company wants to migrate its on-premises infrastructure to the cloud while retaining full control over network configuration, firewall rules, and security policies. The company does not want to manage physical servers, storage, or the underlying hypervisor. Which cloud service model BEST meets these requirements?
A company wants to migrate its custom web application to the cloud. The development team needs full administrative access to the operating system, the ability to install custom middleware, and control over security configurations. They want to avoid managing the physical servers, hypervisors, and data center infrastructure. Which cloud service model should the company choose?
A company uses a cloud service that provides virtual machines. The company administrators have full control over the guest operating systems, install their own applications, and manage security patches and updates. The cloud provider is responsible for the underlying physical servers, storage, and networking. This scenario best describes which cloud service model?
A company wants to move its email system to the cloud. The IT team wants to avoid managing physical servers and applying software updates, but they need full control over email policies, user accounts, and security settings. Which cloud service model BEST meets these requirements?
A multinational company is migrating its customer data to a cloud provider. Legal requirements mandate that all customer data must be stored on servers physically located within the country of origin. Which cloud characteristic must the company verify before selecting a provider?
A company wants to deploy a custom web application in the cloud. They need full control over the operating system and software stack, including the ability to install and configure the web server, database, and security patches. They do not want to manage the underlying physical hardware or hypervisor. Which cloud service model best meets their requirements?
A healthcare organization must store electronic health records in a cloud environment that meets HIPAA compliance requirements. The organization wants to keep sensitive patient data on-premises servers while using cloud resources for less critical workloads and to handle peak demand. Which cloud deployment model would BEST meet these requirements?
A small business currently has a single router that provides internet access and DHCP services. The owner wants to add a second wireless router to extend Wi-Fi coverage to a far part of the building. The technician connects the WAN port of the new router to a LAN port on the existing router using a patch cable. Wireless clients can connect to the new router's SSID and obtain IP addresses, but they cannot access the internet or any resources on the main LAN. Which of the following is the most likely cause?
A network technician is configuring a managed switch for a small office. The security policy requires that only specific authorized devices should be allowed to connect to the network via the switch ports. The technician wants the switch to automatically learn the MAC addresses of the first device that connects to each port and then lock that port to only that MAC address. Any other device connecting to the same port should be blocked. Which switch feature should be configured to accomplish this?
Watch out for
Common Security exam traps
- ▸Answering from memory before reading the full scenario.
- ▸Missing a constraint such as cost, availability, security, scope or command context.
- ▸Choosing a broad answer when the question asks for the most specific fix.
- ▸Ignoring why the wrong options are tempting.
Free account
Track your progress over time
Create a free account to save your results and see which topics improve across sessions.
Focused Security sessions
Start a Security only practice session
Every question in these sessions is drawn from the Security domain — nothing else.
Related practice questions
Related 220-1101 topic practice pages
Move into related areas when this topic feels solid.
CompTIA A+ hardware practice questions
Practise 220-1101 questions linked to CompTIA A+ hardware.
CompTIA A+ mobile devices practice questions
Practise 220-1101 questions linked to CompTIA A+ mobile devices.
CompTIA A+ networking practice questions
Practise 220-1101 questions linked to CompTIA A+ networking.
CompTIA A+ operating systems practice questions
Practise 220-1101 questions linked to CompTIA A+ operating systems.
CompTIA A+ security practice questions
Practise 220-1101 questions linked to CompTIA A+ security.
CompTIA A+ software troubleshooting questions
Practise 220-1101 questions linked to CompTIA A+ software troubleshooting questions.
CompTIA A+ operational procedures questions
Practise 220-1101 questions linked to CompTIA A+ operational procedures questions.
Frequently asked questions
- What does the 220-1101 exam test about Security?
- Security questions test whether you can apply the concept in context, not just recognise a definition.
- How should I use these practice questions?
- Select your answer before revealing the explanation. Then read why each option is right or wrong — this active recall approach builds retention far faster than re-reading notes.
- Can I practise just Security questions in a focused session?
- Yes — the session launcher on this page draws every question from the Security domain. Use a 10-question session first to gauge your baseline, then move to 20 or 30 once the weak spots are clear.
- Where can I practise other 220-1101 topics?
- Use the topic links above to move to related areas, or go back to the 220-1101 question bank to see all topics.
- Are these real exam questions or dumps?
- These are original practice questions written to test the same concepts the 220-1101 exam covers. They are not copied from any real exam or dump site.
Track your progress
A free account saves results across sessions and highlights which topics need work.
Sign up freeStudy resources
Exam traps to avoid
- ▸Answering from memory before reading the full scenario.
- ▸Missing a constraint such as cost, availability, security, scope or command context.
- ▸Choosing a broad answer when the question asks for the most specific fix.
- ▸Ignoring why the wrong options are tempting.