220-1101 · topic practice

Security practice questions

Use this page to practise 220-1101 Security practice questions. The goal is not to memorise dumps, but to understand the concept, review the explanation and improve your exam readiness.

20 questionsDomain: Security

What the exam tests

What to know about Security

Security questions test whether you can apply the concept in context, not just recognise a definition.

How the topic appears in realistic exam-style scenarios.

Which detail in the question changes the correct answer.

How to eliminate plausible but wrong options.

How to connect the question back to the wider exam objective.

Practice set

Security questions

20 questions · select your answer, then reveal the explanation

Question 1hardmultiple choice
Full question →

A company hosts a critical database server on-premises. They want to migrate to a cloud solution that allows them to retain full administrative control over the operating system, database software, and security patches, but they do not want to manage the physical server hardware, rack space, or network cabling. Which cloud service model should they choose?

Question 2mediummultiple choice
Full question →

A company is migrating its on-premises web servers to the cloud. They want to maintain full control over the operating system, web server software, and security configurations, but they do not want to manage the underlying physical hardware, storage, or network infrastructure. Which cloud service model best meets these requirements?

Question 3hardmultiple choice
Full question →

A company is developing a custom application that requires a specific Linux kernel version and full root access to install and configure third-party security modules. The company wants to minimize the management of physical infrastructure but needs complete control over the operating system environment, including the ability to modify kernel parameters. The cloud provider will be responsible for all underlying hardware and the hypervisor. Which cloud service model should the company choose?

Question 4mediummultiple choice
Full question →

A company runs multiple virtual machines (VMs) on a single hypervisor host. The administrator wants to ensure that if one VM is compromised by malware, it cannot read the memory contents of other VMs running on the same host. Which hypervisor feature primarily provides this protection?

Question 5easymultiple choice
Full question →

A company wants to move its email system to the cloud. The IT team wants to avoid managing the underlying servers and email software but needs full administrative control over email settings, user accounts, and security policies. Which cloud service model should the company choose?

Question 6mediummultiple choice
Full question →

A company wants to move its on-premises email server to the cloud. The goal is to eliminate all management overhead related to the operating system, security patches, and the email application itself. The IT team needs the email service to be highly available and automatically scalable. Which cloud service model BEST meets these requirements?

Question 7mediummultiple choice
Full question →

A company wants to deploy a custom web application that includes a custom database and a web server with specific modules. The development team needs full control over the operating system, including the ability to apply security patches and install third-party software. The company does not want to manage the physical servers, hypervisors, or network infrastructure. The cloud provider will be responsible for the underlying hardware and virtualization layer. Which cloud service model BEST meets these requirements?

Question 8mediummultiple choice
Full question →

A company wants to migrate its on-premises email system to the cloud. They require a solution where the cloud provider manages the email servers, software updates, security patches, and storage infrastructure, while the company retains control over user accounts, mailbox policies, and email content. Which cloud service model BEST fits these requirements?

Question 9hardmultiple choice
Full question →

A company uses a public IaaS provider to host a web application. To protect against DDoS attacks, they configure a security appliance that inspects incoming traffic before it reaches the web servers. This appliance runs on a separate virtual machine in the same cloud environment. Which of the following cloud security concepts does this scenario BEST describe?

Question 10mediummultiple choice
Full question →

A company uses a Type 1 hypervisor to host multiple virtual machines. One VM runs a legacy application that requires a specific MAC address for licensing. The administrator needs to move the VM from the current host to another physical host without changing the MAC address. Which of the following virtualization features should the administrator use?

Question 11mediummultiple choice
Full question →

A company wants to migrate its on-premises infrastructure to the cloud. The security team requires that the company retains full control over network configuration, firewall rules, and security policies, but they do not want to manage physical servers, storage, or the underlying hypervisor. Which cloud service model BEST meets these requirements?

Question 12mediummultiple choice
Full question →

A company wants to migrate its on-premises infrastructure to the cloud while retaining full control over network configuration, firewall rules, and security policies. The company does not want to manage physical servers, storage, or the underlying hypervisor. Which cloud service model BEST meets these requirements?

Question 13mediummultiple choice
Full question →

A company wants to migrate its custom web application to the cloud. The development team needs full administrative access to the operating system, the ability to install custom middleware, and control over security configurations. They want to avoid managing the physical servers, hypervisors, and data center infrastructure. Which cloud service model should the company choose?

Question 14mediummultiple choice
Full question →

A company uses a cloud service that provides virtual machines. The company administrators have full control over the guest operating systems, install their own applications, and manage security patches and updates. The cloud provider is responsible for the underlying physical servers, storage, and networking. This scenario best describes which cloud service model?

Question 15mediummultiple choice
Full question →

A company wants to move its email system to the cloud. The IT team wants to avoid managing physical servers and applying software updates, but they need full control over email policies, user accounts, and security settings. Which cloud service model BEST meets these requirements?

Question 16easymultiple choice
Full question →

A multinational company is migrating its customer data to a cloud provider. Legal requirements mandate that all customer data must be stored on servers physically located within the country of origin. Which cloud characteristic must the company verify before selecting a provider?

Question 17mediummultiple choice
Full question →

A company wants to deploy a custom web application in the cloud. They need full control over the operating system and software stack, including the ability to install and configure the web server, database, and security patches. They do not want to manage the underlying physical hardware or hypervisor. Which cloud service model best meets their requirements?

Question 18easymultiple choice
Full question →

A healthcare organization must store electronic health records in a cloud environment that meets HIPAA compliance requirements. The organization wants to keep sensitive patient data on-premises servers while using cloud resources for less critical workloads and to handle peak demand. Which cloud deployment model would BEST meet these requirements?

Question 19mediummultiple choice
Full question →

A small business currently has a single router that provides internet access and DHCP services. The owner wants to add a second wireless router to extend Wi-Fi coverage to a far part of the building. The technician connects the WAN port of the new router to a LAN port on the existing router using a patch cable. Wireless clients can connect to the new router's SSID and obtain IP addresses, but they cannot access the internet or any resources on the main LAN. Which of the following is the most likely cause?

Question 20mediummultiple choice
Full question →

A network technician is configuring a managed switch for a small office. The security policy requires that only specific authorized devices should be allowed to connect to the network via the switch ports. The technician wants the switch to automatically learn the MAC addresses of the first device that connects to each port and then lock that port to only that MAC address. Any other device connecting to the same port should be blocked. Which switch feature should be configured to accomplish this?

Watch out for

Common Security exam traps

  • Answering from memory before reading the full scenario.
  • Missing a constraint such as cost, availability, security, scope or command context.
  • Choosing a broad answer when the question asks for the most specific fix.
  • Ignoring why the wrong options are tempting.

Free account

Track your progress over time

Create a free account to save your results and see which topics improve across sessions.

Focused Security sessions

Start a Security only practice session

Every question in these sessions is drawn from the Security domain — nothing else.

Related practice questions

Related 220-1101 topic practice pages

Move into related areas when this topic feels solid.

Frequently asked questions

What does the 220-1101 exam test about Security?
Security questions test whether you can apply the concept in context, not just recognise a definition.
How should I use these practice questions?
Select your answer before revealing the explanation. Then read why each option is right or wrong — this active recall approach builds retention far faster than re-reading notes.
Can I practise just Security questions in a focused session?
Yes — the session launcher on this page draws every question from the Security domain. Use a 10-question session first to gauge your baseline, then move to 20 or 30 once the weak spots are clear.
Where can I practise other 220-1101 topics?
Use the topic links above to move to related areas, or go back to the 220-1101 question bank to see all topics.
Are these real exam questions or dumps?
These are original practice questions written to test the same concepts the 220-1101 exam covers. They are not copied from any real exam or dump site.