Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
  • Login
  • Register
Quesions Library
  • Cisco
    • 200-301
    • 200-901
      • Multiple Choice
      • Drag Drop
    • 350-401
      • Multiple Choice
      • Drag Drop
    • 350-701
    • 300-410
      • Multiple Choice
      • Drag Drop
    • 300-415
      • Multiple Choice
      • Drag Drop
    • 300-425
    • Others
  • AWS
    • CLF-C02
    • SAA-C03
    • SAP-C02
    • ANS-C01
    • Others
  • Microsoft
    • AZ-104
    • AZ-204
    • AZ-305
    • AZ-900
    • AI-900
    • SC-900
    • Others
  • CompTIA
    • SY0-601
    • N10-008
    • 220-1101
    • 220-1102
    • Others
  • Google
    • Associate Cloud Engineer
    • Professional Cloud Architect
    • Professional Cloud DevOps Engineer
    • Others
  • ISACA
    • CISM
    • CRIS
    • Others
  • LPI
    • 101-500
    • 102-500
    • 201-450
    • 202-450
  • Fortinet
    • NSE4_FGT-7.2
  • VMware
  • >>
    • Juniper
    • EC-Council
      • 312-50v12
    • ISC
      • CISSP
    • PMI
      • PMP
    • Palo Alto Networks
    • RedHat
    • Oracle
    • GIAC
    • F5
    • ITILF
    • Salesforce
Contribute
Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
Practice Test Free
No Result
View All Result
Home Practice Exam Free

220-1002 Practice Exam Free

Table of Contents

Toggle
  • 220-1002 Practice Exam Free – 50 Questions to Simulate the Real Exam
  • Free Access Full 220-1002 Practice Exam Free

220-1002 Practice Exam Free – 50 Questions to Simulate the Real Exam

Are you getting ready for the 220-1002 certification? Take your preparation to the next level with our 220-1002 Practice Exam Free – a carefully designed set of 50 realistic exam-style questions to help you evaluate your knowledge and boost your confidence.

Using a 220-1002 practice exam free is one of the best ways to:

  • Experience the format and difficulty of the real exam
  • Identify your strengths and focus on weak areas
  • Improve your test-taking speed and accuracy

Below, you will find 50 realistic 220-1002 practice exam free questions covering key exam topics. Each question reflects the structure and challenge of the actual exam.

Question 1

A Windows user reports that clicking on links when browsing the Internet results in unexpected destination pages with advertisements or virus infection warnings.
The user reboots the computer, but the issue persists. Which of the following should a technician perform to identify and resolve the issue? (Choose two.)

A. Run a virus scan with updated signature files

B. Uninstall any unknown browser extensions or add-ons

C. Install the latest version of the Internet browser

D. Enable SSL 3.0 in the browser settings

E. Delete all unknown registry keys and reboot

 


Suggested Answer: AB

 

Question 2

After installing an application on a smartphone, a user starts receiving pop-up ads for recently visited physical stores. The user also receives prompts to install other applications. Which of the following permissions should be revoked to disable the unwanted notifications?

A. Account access

B. Mobile data

C. Location access

D. Contacts access

 


Suggested Answer: A

Community Answer: C

 

Question 3

A technician needs to format a 64GB flash drive. Which of the following formats will the technician MOST likely use?

A. FAT

B. ExFAT

C. FAT32

D. CDFS

 


Suggested Answer: C

Community Answer: B

 

Question 4

A user who is running Windows XP calls a technician to upgrade the computer to a newer Windows OS. The user states the computer has only 1GB of RAM and
16GB of hard drive space with a 1.7GHz processor.
Which of the following OSs should the technician recommended to ensure the BEST performance on this computer?

A. Windows 7

B. Windows 8

C. Windows 8.1

D. Windows 10

 


Suggested Answer: A

Community Answer: A

 

Question 5

An administrator is creating a new user account and wants to grant access to only the resources required to perform the user's assigned job duties.
Which of the following will the administrator MOST likely use?

A. Access control lists

B. Multifactor authentication

C. Directory permissions

D. Principle of least privilege

 


Suggested Answer: D

 

Question 6

A user's mobile social media application is sending emails on behalf of the user. However, the user has not authorized any new permissions for the social media application. The user only has this application installed on their smart phone and no other devices. Which of the following should a technician perform to resolve the issue?

A. Run a malware scan on the device.

B. Instruct the user to change the device’s password.

C. Disable access to the user’s contacts.

D. Deny access to text messages.

 


Suggested Answer: B

Community Answer: C

 

Question 7

Which of the following uses a remote access server to forward a user's logon password to an authentication server, allowing or denying access to a system?

A. WPA2-PSK

B. AES

C. TACACS

D. TKIP

 


Suggested Answer: C

 

Question 8

A technician is adding a folder to a structure that is several levels down from the top level. The technician wants to make sure the new folder will have the same permissions as the top level. Which of the following should the technician configure?

A. Attributes

B. Shares

C. Inheritance

D. Replication

 


Suggested Answer: C

 

Question 9

Which of the following threats uses personalized information in an attempt at obtaining information?

A. Whaling

B. Impersonation

C. Spoofing

D. Spear phishing

 


Suggested Answer: D

Community Answer: D

 

Question 10

Joe, a technician, has his daily plans forwarded to him by his supervisor. Upon arrival to the second support call of the day, Joe realizes the issue will require much more time than initially scheduled, and several support calls will not be completed. Which of the following would be the appropriate action for Joe?

A. Contact his supervisor so the supervisor can make scheduling changes.

B. Move the appointments to the next business day.

C. Reach out to a colleague to assist in completing the jobs.

D. Continue to work on the current call, and get to the other as soon as possible.

 


Suggested Answer: A

 

Question 11

A customer is having trouble opening several files on a computer. The customer renames one of the files, but then the correct program will no longer open it.
Which of the following settings is a solution to the issue?

A. Set the view options to detail

B. Hide the extensions

C. Utilize Credential Manager

D. View the system files

 


Suggested Answer: B

Community Answer: B

 

Question 12

A technician is removing a virus from a user's Windows workstation. The virus was installed by the user while downloading pirated software from the Internet.
Which of the following should the technician do to address this issue?

A. End the current explorer.exe task. Update and run an antivirus scanning utility to remove the threat. Relaunch explorer.exe using Task Manager.

B. End the current explorer.exe task using the command line. Update and run an antivirus scanning utility to remove the threat.

C. Launch explorer.exe using Task Manager. Update and run an antivirus scanning utility to remove the threat.

D. Update and run an antivirus scanning utility to remove the threat. Launch explorer.exe using Task Manager.

 


Suggested Answer: D

Community Answer: C

 

Question 13

A technician has enabled port security on a switchport.
Which of the following BEST describes the effect this will have?

A. Devices must match a list of allowed MAC addresses before accessing the network.

B. Devices need to conform to the policies set forth by the MDM software.

C. Data loss prevention software will be monitoring for data exfiltration on the port.

D. A firewall is actively monitoring the network traffic using heuristic analysis.

 


Suggested Answer: A

 

Question 14

SIMULATION -
Welcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.
INSTRUCTIONS -
Click on individual tickets to see the ticket details. View attachments to determine the problem.
Select the appropriate issue from the 'Issue' drop-down menu. Then, select the MOST efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper command or verification to remediate or confirm your fix of the issue form he 'Verify/Resolve' drop-down menu.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
 Image
[1]
 Image
[1]
 Image
 Image
[1]
 Image

 


Suggested Answer: See explanation below.

First (High Priority) Ticket ג€” Incorrect IP Address ג€” Create DHCP reservation ג€” ipconfig/renew
Second (Low Priority) Ticket ג€” BSOD ג€” Uninstall Application – Safemode

Question 15

A technician determines a newly installed service is keeping a device from functioning in Windows. Which of the following tools should the technician use to keep the service from being loaded on the PC reboot?

A. Task Scheduler

B. MSINFO32

C. System Restore

D. MSConfig

 


Suggested Answer: D

 

Question 16

Joe, an employee, took a company-issued Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server. Joe has verified he is connected to the Internet.
Which of the following would explain why Joe cannot access his personal shares?

A. An IP conflict is present

B. A corporate VPN is enabled

C. A firewall exception must be set

D. HomeGroup must be enabled

 


Suggested Answer: D

Community Answer: B

 

Question 17

After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked with limiting removable hard drive access to certain network users. USB ports are used for many devices, including scanners, printers, and signature pads, so a policy is created to deny access to removable hard drives only.
When testing the policy, a removable drive is plugged in but can still be accessed.
Which of the following command-line tools should the technician use to apply the new policy?

A. grupdate

B. diskpart

C. gpresult

D. net use

 


Suggested Answer: A

Community Answer: A

 

Question 18

A technician has completed troubleshooting and repairing a newly found bug on a user's workstation. The technician wants to share the repair steps with the rest of the team. Which of the following methods will the technician MOST likely use?

A. Knowledge-base entry

B. Team chat message

C. Email to the team leader

D. Incident documentation

 


Suggested Answer: D

Community Answer: A

 

Question 19

Which of the following application installation methods requires the use of a valid IP address?

A. USB

B. Network-based

C. Script-based

D. CD-ROM

 


Suggested Answer: B

 

Question 20

A technician is working on an infected computer that is currently turned off. The technician is concerned the boot sector is affected.
Which of the following is the BEST method for the technician to use to scan the boot sector?

A. Mount the drive using a forensic platform.

B. Boot into safe mode.

C. Boot to last known good configuration.

D. Boot the drive in another computer.

 


Suggested Answer: A

 

Question 21

Which of the following is a reason to use WEP over WPA?

A. Device compatibility

B. Increased security

C. TACACS

D. Multifactor authentication

 


Suggested Answer: A

 

Question 22

An executive has contacted you through the help-desk chat support about an issue with a mobile device.
Assist the executive to help resolve the issue.
INSTRUCTIONS -
Select the MOST appropriate statement for each response.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
 Image
Let's take a look at your phone settings.
 Image
 Image
Please change the port number on your mail settings to 993.
Which of the following should be done NEXT?

A. Close the ticket out

B. Educate the user on the solution that was performed

C. Tell the user to take time to fix it themselves next time

D. Send an email to Telecom to inform them of the issue and prevent reoccurrence

 


Suggested Answer: B

 

Question 23

A technician is running Windows on a company's Mac workstations without incurring an additional expense to the company. The Windows licenses were purchased in the past. Users are required to run both Windows and Mac operating systems on their machines, but never at the same time. Which of the following would be the BEST way to accomplish this?

A. Perform a PXE boot on the workstations.

B. Install virtualization software.

C. Utilize Mission Control on the Mac workstations.

D. Install Boot Camp on the workstations.

 


Suggested Answer: B

Community Answer: D

 

Question 24

A recent outbreak of a virus has uncovered that a company must put a security template in place to mitigate future virus outbreaks.
Which of the following best practices would a technician MOST likely implement as part of the security template? (Choose two.)

A. Failed attempts lockout policy

B. Restricting user permissions

C. Login time restrictions

D. Setting strong passwords

E. Patch/update management

 


Suggested Answer: BE

 

Question 25

Which of the following provide the BEST security for a server room? (Choose two.)

A. Badge reader

B. Bollard

C. Biometric lock

D. Cable lock

E. USB token

F. Privacy window shades

 


Suggested Answer: AC

 

Question 26

Ann, an employee, has been trying to use a company-issued mobile device to access an internal fileshare while traveling abroad. She restarted the device due to a mobile OS update, but she is now unable to access company information. Ann calls the help desk for assistance, and a technician verifies she can make calls and access websites. Which of the following should the technician suggest NEXT to try to fix the issue?

A. Navigate to the VPN profile in the device settings, delete the pre-shared key, and restart the device

B. Instruct Ann to open the company’s MDM application to ensure proper functionality

C. Navigate to the corporate intranet page and use hyperlinks to access the fileshare

D. Instruct Ann to disable TLS 1.0 in the device settings

 


Suggested Answer: A

 

Question 27

A user received a brand new mobile device about six months ago. The device is now running very slowly and is hotter than normal, and certain applications crash when they are started.
Which of the following are the BEST options for troubleshooting this phone? (Choose two.)

A. Check for any applications that are running and stop them.

B. Check the device’s battery and replace it.

C. Check the smartphone’s screen and replace it.

D. Check the smartphone’s charging cable to ensure it is working properly.

E. Check for any unnecessary applications and uninstall them.

F. Check for any OS updates and install them.

 


Suggested Answer: BE

Community Answer: AF

 

Question 28

Joe, a systems administrator, is setting up a risk management plan for the IT department. Part of the plan is to take daily backups of all servers. The server backups will be saved locally to NAS.
Which of the following can Joe do to ensure the backups will work if needed?

A. Frequently restore the servers from backup files and test them

B. Configure the backups to restore to virtual machines for quick recovery

C. Set up scripts that automatically rerun failed backup jobs

D. Set up alerts to let administrators know when backups fail

E. Store copies of the backups off-side in a secure datacenter

 


Suggested Answer: A

Community Answer: B

 

Question 29

Which of the following security permissions takes precedence over the other?

A. File permissions over share permissions

B. Share permissions over inherited permissions

C. Share permissions over file permissions

D. File permissions over user permissions

 


Suggested Answer: A

Reference:
https://www.ntfs.com/ntfs-permissions-precedence.htm

Question 30

A systems administrator needs to add security to the server room.
Which of the following would provide the BEST security for the room? (Choose two.)

A. Universal serial bus locks

B. Personal identity verification cards

C. Privacy screen

D. Entry control roster

E. Door locks

F. Privacy window

 


Suggested Answer: EF

Community Answer: BE

 

Question 31

After a security audit, a technician is tasked with implementing new measures to help secure company workstations. The new policy states that all workstations must be signed off at night, a password is necessary to boot the computer, and encryption must be enabled.
Which of the following features should the technician implement to BEST meet these requirements? (Choose three.)

A. Screen locks

B. Screensaver passwords

C. UEFI passwords

D. Login time restrictions

E. Strong passwords

F. Multifactor authentication

G. BitLocker

H. Credential Manager

 


Suggested Answer: ABG

Community Answer: CDG

 

Question 32

A company needs to destroy several SSDs that contain sensitive information. Which of the following methods is BEST suited for the total destruction of the SSDs?

A. Overwriting

B. Formatting

C. Incinerating

D. Degaussing

 


Suggested Answer: C

Community Answer: C

 

Question 33

Ann, a user, calls the help desk regarding an issue on her laptop. While working remotely, she appears to be connecting to WiFi but is unable to retrieve her corporate email. The wireless name is listed as `ConnectMe` and appears as unsecure.
Which of the following should the help desk perform to fix the issue?

A. Remote into Ann’s system and restart the wireless adapter

B. Ask Ann to open a browser and watch for a redirect page

C. Advice Ann to plug an Ethernet cable into her laptop

D. Direct Ann to run an antivirus program on her laptop

 


Suggested Answer: B

 

Question 34

A technician is running updates on a Windows PC. Some of the updates install properly, while others appear as failed. While troubleshooting, the technician restarts the PC and attempts to install the failed updates again. The updates continue to fail.
Which of the following is the FIRST option to check?

A. Visit the Microsoft Update website to see if there is an issue with a specific update

B. Look up the error number associated with the failed update

C. Look at the system Event Viewer to find more information on the failure

D. Download the failed update to install manually

 


Suggested Answer: B

 

Question 35

A technician needs to install Windows 10 on a 4TB hard drive. Which of the following should the technician perform to accomplish this task?

A. Format the drive to use exFAT.

B. Configure the drive to use the GPT.

C. Configure the drive to use an MBR.

D. Format the drive to use CDFS.

 


Suggested Answer: B

 

Question 36

Which of the following extensions identify files that are typically implemented as scripts? (Choose two.)

A. .vbs

B. .txt

C. .exe

D. .zip

E. .bat

F. .xlsx

 


Suggested Answer: AE

 

Question 37

Which of the following operating systems has versions for servers, workstations, and phones?

A. Android

B. iOS

C. Chrome OS

D. Windows

 


Suggested Answer: D

 

Question 38

A company is creating a disaster recovery plan. Which of the following should be implemented to BEST ensure the company's data can be successfully restored in the event of a disaster?

A. File-level backups

B. Backups for critical applications

C. Regular backup testing

D. Backups to cloud storage

E. Redundant backups on site

 


Suggested Answer: A

Community Answer: C

 

Question 39

A user's computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening.
Which of the following should the technician attempt NEXT?

A. Reboot into safe mode and roll back the updates

B. Repair the Windows Registry

C. Configure boot options in the BIOS

D. Disable Windows services and applications

 


Suggested Answer: A

Community Answer: A

 

Question 40

Which of the following must be enabled to configure 20 new machines to be booted over a network?

A. Multi-boot

B. Dynamic

C. PXE

D. GPT

 


Suggested Answer: C

 

Question 41

Joe, a mobile device user, reached his monthly quota of data about halfway through the current billing cycle. Joe contacts a technician to identify potential issues with the mobile device, as his usage patterns have not changed over the past month.
Which of the following is MOST likely causing this issue?

A. There are unintended WiFi connections.

B. Location tracking has been enabled.

C. Applications are causing high resource utilization.

D. Malware is causing excessive data transmission.

 


Suggested Answer: A

Community Answer: D

 

Question 42

An office location regularly experiences brownouts. Which of the following would be the MOST appropriate solution to protect the office computers?

A. Uninterruptible power supply

B. Voltage regulator

C. Surge suppressor

D. Generator

 


Suggested Answer: A

Community Answer: A

 

Question 43

An office building lost power, and the generator started up. Users on several floors have reported their machines will not start, even though the generator is running. A technician works to divert power from other floors until all users are able to work. Which of the following is the BEST solution for the technician to recommend?

A. Add more redundancy to the power cabling

B. Purchase more battery backups for individual users

C. Implement desktop virtualization

D. Increase the capacity of the backup generator

 


Suggested Answer: D

 

Question 44

The Chief Executive Offer (CEO) of a company receives an email from a local bank. It states the company's account has several suspicious transactions and instructs the CEO to log in immediately to validate the transactions; otherwise, the account will be frozen. Which of the following BEST describes this email?

A. Spear phishing

B. Impersonation

C. Dumpster diving

D. Whaling

 


Suggested Answer: D

 

Question 45

A technician submitted a change control request to upgrade the firmware on all company switches at the same time, during off hours, and through automation.
Which of the following change management documents is MOST important to create to ensure the upgrade will not adversely affect the business?

A. Plan for the change

B. Scope of the change

C. Risk analysis of the change

D. Documentation of the change

 


Suggested Answer: C

 

Question 46

Which of the following NTFS security settings overrides all other settings?

A. Deny

B. Modify

C. Read

D. Write

 


Suggested Answer: A

 

Question 47

A Mac user's operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC.
Which of the following built-in utilities should be used?

A. Time Machine

B. Snapshot

C. System Restore

D. Boot Camp

 


Suggested Answer: A

Community Answer: A

 

Question 48

A corporate fileshare holds files for multiple departments. Individual users in each department create reports that are meant to be read by the rest of the company.
Recently, a user ran a malicious executable that encrypted all of the documents on the fileshare. The software asked for money to be transferred via cryptocurrency in order to decrypt the files; however, the files were not decrypted after the company paid the ransom. Which of the following would MOST likely minimize the damage to a fileshare in this type of situation?

A. Enable System Restore on the file server and make frequent restore points.

B. Disable full disk encryption on the file server.

C. Install a next-generation firewall at the network edge.

D. Use a host-based intrusion detection system and continuously monitor filesystem changes.

E. Use granular file permissions on the share and follow the principle of least privilege.

 


Suggested Answer: D

Community Answer: E

 

Question 49

During a network server outage, the administrator's computer received an IP address of 169.254.0.10 and had no access to internal or external resources.
Which of the following should be configured to ensure the administrator's computer retains network access?

A. Alternative IP address

B. Wake-on-LAN

C. APIPA

D. Proxy setting

 


Suggested Answer: B

Community Answer: A

 

Question 50

A technician is helping a remote user who has a Windows issue. The user is working from a shared office space and is not on the corporate network. Which of the following remote access methods is MOST likely to be successful in this case?

A. Telnet

B. Remote desktop

C. Third-party screen sharing

D. Secure shell

 


Suggested Answer: A

Community Answer: C

 

Free Access Full 220-1002 Practice Exam Free

Looking for additional practice? Click here to access a full set of 220-1002 practice exam free questions and continue building your skills across all exam domains.

Our question sets are updated regularly to ensure they stay aligned with the latest exam objectives—so be sure to visit often!

Good luck with your 220-1002 certification journey!

Share18Tweet11
Previous Post

220-1001 Practice Exam Free

Next Post

220-1101 Practice Exam Free

Next Post

220-1101 Practice Exam Free

220-1102 Practice Exam Free

2V0-21.19 Practice Exam Free

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Network+ Practice Test

Comptia Security+ Practice Test

A+ Certification Practice Test

Aws Cloud Practitioner Exam Questions

Aws Cloud Practitioner Practice Exam

Comptia A+ Practice Test

  • About
  • DMCA
  • Privacy & Policy
  • Contact

PracticeTestFree.com materials do not contain actual questions and answers from Cisco's Certification Exams. PracticeTestFree.com doesn't offer Real Microsoft Exam Questions. PracticeTestFree.com doesn't offer Real Amazon Exam Questions.

  • Login
  • Sign Up
No Result
View All Result
  • Quesions
    • Cisco
    • AWS
    • Microsoft
    • CompTIA
    • Google
    • ISACA
    • ECCouncil
    • F5
    • GIAC
    • ISC
    • Juniper
    • LPI
    • Oracle
    • Palo Alto Networks
    • PMI
    • RedHat
    • Salesforce
    • VMware
  • Courses
    • CCNA
    • ENCOR
    • VMware vSphere
  • Certificates

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.