220-1002 Practice Test Free – 50 Real Exam Questions to Boost Your Confidence
Preparing for the 220-1002 exam? Start with our 220-1002 Practice Test Free – a set of 50 high-quality, exam-style questions crafted to help you assess your knowledge and improve your chances of passing on the first try.
Taking a 220-1002 practice test free is one of the smartest ways to:
- Get familiar with the real exam format and question types
- Evaluate your strengths and spot knowledge gaps
- Gain the confidence you need to succeed on exam day
Below, you will find 50 free 220-1002 practice questions to help you prepare for the exam. These questions are designed to reflect the real exam structure and difficulty level. You can click on each Question to explore the details.
A smartphone user receives notice that a threshold for high-speed data usage, despite the user's usage behaviors being unchanged from previous periods. Which of the following troubleshooting steps should the user take FIRST?
A. Check network access permissions on recently loaded applications.
B. Limit data usage to WiFi networks only.
C. Wipe the device and restore to the factory default.
D. Change the lock screen password.
Joe, a mobile device user, reached his monthly quota of data about halfway through the current billing cycle. Joe contacts a technician to identify potential issues with the mobile device, as his usage patterns have not changed over the past month. Which of the following is MOST likely causing this issue?
A. There are unintended WiFi connections.
B. Location tracking has been enabled.
C. Applications are causing high resource utilization.
D. Malware is causing excessive data transmission.
Which of the following provide the MOST security for PCs and mobile devices? (Choose two.)
A. Access control lists
B. Multifactor authentication
C. Organizational unit
D. Trusted software sources
E. Data loss prevention
F. Pre-shared key
A technician is updating a Linux server that had been in storage. After booting into single-user mode, a command is issued that displays the technician's current location in the filesystem. Which of the following commands was issued?
A. pwd
B. passwd
C. apt-get
D. grep
A user is trying to install a very large .dmg file on a Windows computer but is receiving an error message. Which of the following is causing the error?
A. Small hard drive
B. Insufficient RAM
C. OS compatibility
D. Folder permissions
While attempting to install a new program, an end user is notified the workstation meets the memory requirements, but it does not meet the requirements for free space. Due to time constraints, the user needs a quick way to install and access the program. Which of the following is the user's BEST option given the situation?
A. Install to a network drive
B. Install to a USB drive
C. Install to a DVD-RW
D. Install to a secondary internal HDD
A customer is shopping for a new tablet. The customer is primarily concerned about transferring applications from the old tablet to the new one. Which of the following specifications is MOST important when selecting a new tablet?
A. Screen size
B. Storage
C. Wireless speed
D. Operating system
A technician is repairing a computer's motherboard in a clean environment. The technician needs to ensure all necessary safety procedures are taken prior to performing the replacement. Which of the following should the technician employ during this process to ensure safety? (Choose two.)
A. CPU paste
B. Safety goggles
C. Self-grounding
D. ESD straps
E. Antistatic bag
F. Air filter mask
After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked with limiting removable hard drive access to certain network users. USB ports are used for many devices, including scanners, printers, and signature pads, so a policy is created to deny access to removable hard drives only. When testing the policy, a removable drive is plugged in but can still be accessed. Which of the following command-line tools should the technician use to apply the new policy?
A. grupdate
B. diskpart
C. gpresult
D. net use
A technician is attempting to recover data from a damaged laptop that was running Windows 10. The technician removes the drive and places it in a known-good computer. The computer boots and sees the drive, but no data is displayed. Which of the following is the reason the technician is experiencing this issue?
A. exFAT security
B. Ext3 security
C. HFS security
D. EFS security
E. CDFS security
A security team is auditing a company's network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information. Which of the following actions should be taken to close the vulnerability? (Choose two.)
A. Disable guest account
B. Remove admin permissions
C. Modify AutoRun settings
D. Change default credentials
E. Run OS security updates
F. Install a software firewall
A SOHO user reports desktop applications are performing slowly, and no emails have been received all morning. A technician remotes in and determines Internet pages load slowly or not at all, CPU performance is normal, and the local router can successfully ping. The remote connection drops periodically. Which of the following steps should the technician take NEXT to resolve the problem?
A. Reboot into safe mode, uninstall the latest OS update, and run a repair on the OS
B. Update the antivirus software, run an antivirus scan, verify the browser settings, and check all email settings
C. Reboot to BIOS setup, verify the TPM is enabled, and start a System Restore from safe mode
D. Send a test email, open a command prompt to check the file system, and empty the browser cache
A user receives an error message when trying to upgrade an application on a work computer. Which of the following is the MOST likely reason the user cannot complete this task?
A. The computer does not meet the application’s minimum requirements.
B. The program is being deployed via optical media.
C. The user account lacks administrative rights.
D. A 32-bit application cannot be installed on a 64-bit system.
A technician needs to configure a user's PC so it can be powered on remotely by another employee who will be working at the help desk after hours. The technician puts the employee in the correct organizational unit; however, the employee is still unable to connect. Which of the following settings should the technician configure?
A. Remote Assistance
B. Firewall exceptions
C. Static IP address
D. Wake-on-LAN
A manager requests remote access to a server after hours and on weekends to check data. The manager insists on using the server. Before granting the access, which of the following is the MOST important step a technician can take to protect against possible infection?
A. Create a policy to remove Internet access from the server during off hours
B. Set the local antivirus software on the server to update and scan daily
C. Ensure the server is patched with the latest security updates
D. Educate the manager on safe Internet browsing practices
A technician is repairing a computer. Which of the following should the technician do to protect the computer from accidental voltage spikes?
A. Practice electrical fire safety.
B. Clean tools properly before use.
C. Remove any jewelry.
D. Connect a proper ESD strap.
Which of the following technologies can be utilized in a wireless network environment to provide secure SSO access for WiFi and network resources?
A. WPA2
B. AES
C. MAC filtering
D. RADIUS
E. WPS
A technician is cleaning malware on a Windows workstation. Which of the following would MOST likely prevent a recurrence of the same malware?
A. Enable Shadow Copy.
B. Disable System Restore.
C. Update root certificates.
D. Modify file permissions.
A project team is organized to implement a new wireless solution for a school. The team has already done the network diagrams and knows the locations that will need to be addressed in the project. The team is in the process of creating an SOW for the project as a whole and needs to add the critical pieces to the SOW to complete it and move to the next stage. Which of the following would the project team MOST likely add to the SOW?
A. Risk analysis
B. Plan to change
C. Backout plan
D. Change board approvals
A company seized an employee's laptop due to illegal activity. The computer has been locked in an office until it can be turned over to authorities, and no one is allowed to log on to it. Which of the following policies is this an example of?
A. PCI compliance
B. Proper reporting
C. Data preservation
D. Chain of custody
A technician needs to connect to a server using a secure terminal application. The technician must be able to reboot the server quickly and restart all the daemons with this application. Which of the following methods will the technician MOST likely use? (Choose two.)
A. SSH
B. Telnet
C. Putty
D. HTTPS
E. Remote Assistance
F. RDP
A user reports unwanted pop-ups are appearing on a computer's screen, and the system is performing slowly. Which of the following should a technician do FIRST to troubleshoot the threat? (Choose two.)
A. Kill all processes that are not related to Windows.
B. Restart the computer in safe mode.
C. Run antivirus and anti-malware scans.
D. Search for software related to the pop-ups.
E. Uninstall the network driver from the Device Manager.
F. Disable all non-Microsoft services.
A technician receives the Chief Executive Officer's (CEO's) Windows 10 laptop, which has been infected with malware. The technician wants to make sure best practices are followed for troubleshooting and remediating the malware. Which of the following best practices should the technician perform FIRST in this scenario? (Choose three.)
A. Disconnect the device from the network
B. Identify and research the symptoms
C. Restore the computer to the previous checkpoint
D. Scan and use removal techniques
E. Create a restore point
F. Educate the end user
G. Schedule scans and run updates
A technician is running Windows on a company's Mac workstations without incurring an additional expense to the company. The Windows licenses were purchased in the past. Users are required to run both Windows and Mac operating systems on their machines, but never at the same time. Which of the following would be the BEST way to accomplish this?
A. Perform a PXE boot on the workstations.
B. Install virtualization software.
C. Utilize Mission Control on the Mac workstations.
D. Install Boot Camp on the workstations.
Ann, a user, is attempting to log in to her email service form a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid. Ann then decides to reset her email password, but after the reset, the new credentials still do not work in the third-party email client. Which of the following settings or features is responsible for the problems Ann is experiencing?
A. Full device encryption
B. Account lock
C. Multifactor authentication
D. Strong password requirements
Several users at an office have noticed their computers have been behaving erratically over the past hour. A technician suspects there may be a network worm or a hardware failure because all the affected computers were purchased together. Which of the following should the technician perform FIRST?
A. Download antivirus updates
B. Update the device drivers
C. Quarantine the affected systems
D. Perform hardware diagnostics
A technician found that an employee is mining cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. Which of the following should be updated to reflect this new requirement?
A. MDM
B. EULA
C. IRP
D. AUP
A technician is troubleshooting an issue affecting all company laptops. All the laptops have exactly the same hardware. The screens present glitches every time the users move their mouse pointers over the screen. The technician discovers there was a recent OS update deployed throughout the company, which includes new versions for video drivers. Restarting the laptop in safe mode will not present the issue. Which of the following should the technician do NEXT?
A. Roll back the video card device drivers for all computers and escalate the issue to the video card vendor.
B. Remove the current video drivers from all computers and advise users to work this way until the issue gets fixed.
C. Advise all users to work in safe mode until the issue gets fixed and escalate the issue to the video card vendor.
D. Reinstall the OS on all devices in the company to eliminate any traces of the current video drivers, then rerun the updates manually excluding the video drivers.
A user's workstation is running extremely slow. A technician sees a pop-up on the workstation offering what appears to be fake technical support, so the technician begins the malware removal procedure. After disabling System Restore, the technician runs a malware scan, but the scan does not find any malware on the machine. Which of the following is the MOST likely reason the technician cannot find any malware?
A. The technician should not have disabled System Restore
B. The technician never quarantined the workstation
C. The technician did not update the anti-malware software
D. There is no malware on the workstation
A technician is PXE booting a computer. Which of the following is the technician MOST likely performing on the computer?
A. Image deployment
B. Multiboot configuration
C. In-place upgrade
D. System repair
Which of the following key and mouse combinations can be used to run an application as a different user?
A. FN + Right-click
B. Shift + Right-click
C. Alt + Right-click
D. Ctrl + Right-click
Joe, a user, reports the programs and icons on his Windows desktop are much larger than they were the day before. He tried changing the screen resolution and restarting the computer, but it still does not look right. Joe also states the computer showed it was finishing updates when he first powered it on. Which of the following should a technician perform NEXT?
A. Reboot the computer.
B. Roll back the video driver.
C. Reload the OS.
D. Boot into safe mode.
A technician needs to update the network firewall, which will cause a temporary outage. The technician submits a change management request to perform the required maintenance. Which of the following provides details about what the technician will need to do if the update fails?
A. Back-out plan
B. Scope of the change
C. Risk analysis
D. End-user acceptance
A manager with a restricted user account receives the following error message: Windows Update cannot currently check for updates because the service is not running. The manager contacts the help desk to report the error. A technician remotely connects to the user's computer and identifies the problem. Which of the following should the technician do NEXT?
A. Reboot the computer
B. Restart the network services
C. Roll back the device drivers
D. Rebuild the Windows profiles
While troubleshooting a software error on a user's computer, a technician finds inappropriate content. Which of the following should the technician perform FIRST?
A. Preserve the data on an external drive.
B. Report the discovery through proper channels.
C. Document the findings.
D. Erase the data and inform the user.
Which of the following threats commonly relies on DNS poisoning and spoofing to exploit an unknowing victim?
A. Rainbow tables
B. Brute force
C. Man-in-the-middle
D. Zero-day attacks
E. Phishing
Every time a user manually runs an antivirus scan, the workstation becomes unresponsive, and the user has to reboot. A technician is dispatched and sees an antivirus pop-up in the system tray, indicating the computer is severely damaged, and a "click here` button to resolve it. There is a timer in the pop-up, counting down the time until the computer is no longer usable. Which of the following should the technician do NEXT?
A. Research the pop-up to see if it is a legitimate malware solution.
B. Click on the pop-up window to resolve the issue before the time runs out.
C. Send an email to all staff members warning them of malware on their system.
D. Disconnect the Ethernet cable from the workstation and disable WiFi.
A technician accessed a network share from a computer joined to workgroup. The technician logged in as `user1` and directed the computer to save the username and password. Several weeks later, the technician wants to log in to this network share using the administrator account. The computer does not prompt for a username and password, but it automatically logs in to the network share under the `user1` account. Which of the following would allow the technician to log in using the `administrator` username?
A. Use the command: net use Z: fileservershare
B. Go to the Sync Center and disable the offline files feature.
C. Delete the ג€userג€ account for the network share in Credential Manager.
D. Join the computer and file server to a domain and delegate administrator rights to ג€user1ג€.
E. Use the Advanced Sharing options in the Network and Sharing Center and enable ג€turn on network discoveryג€.
A company has hired a new IT firm to manage its network switches and routers. The firm is geographically separated from the company and will need to able to securely access the devices. Which of the following will provide the ability to access these devices?
A. Telnet
B. SSH
C. RDP
D. VNC
A team needs to deploy a temporary server room at a site to provide support during construction. Which of the following should they use at this site while setting up the server room?
A. Air filters
B. Privacy screens
C. Vacuums
D. ESD mats
A technician was alerted by IT security of a potentially infected desktop, which is at a remote location. The technician will arrive on site after one hour. Which of the following steps should be performed prior to traveling to prevent further infection? (Choose two.)
A. Start system updates
B. Back up PC data
C. Run antivirus
D. Install the firewall
E. Turn off System Restore
F. Install a keylogger
A Mac user needs to configure a network device using a serial connection to enable a remote network connection. Which of the following utilities would MOST likely be used to make the necessary changes?
A. Terminal
B. Disk maintenance
C. iCloud
D. Image recovery
A customer's computer is powered on and working, but the customer is unable to get to any wired network resources, shared drives, printers, or the Internet. Which of the following command-line tools should be used to troubleshoot this scenario?
A. Ping
B. hwconfig
C. Nbtstat
D. Nslookup
Which of the following would MOST likely contain troubleshooting guides?
A. Acceptable use policy
B. Topology diagram
C. Knowledge base
D. Incident documentation
A technician has been asked to review the configuration of an executive's SOHO network following a recent news report regarding home Internet routers that are being added to botnets for malicious purposes. Which of the following would be BEST to prevent the router from being added to a botnet? (Choose two.)
A. Upgrading to an enterprise-grade router
B. Enabling WPA2-Enterprise encryption
C. Changing the default credentials
D. Updating to the latest firmware
E. Reducing the transmit power levels
F. Disabling the SSID from being broadcast
Which of the following Microsoft operating systems defaults to a tiled menu instead of the desktop?
A. Windows 7
B. Windows 8
C. Windows 8.1
D. Windows 10
A company brings in contractors several times a year to perform inventory, and the contractors use company-supplied laptops. The company's security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory. Which of the following BEST enforces this policy?
A. Delete the user accounts
B. Disable the user accounts
C. Restrict the user accounts
D. Reset the user accounts
A user reports malware activity on an isolated workstation used for testing. It is running an end-of-life OS, and a USB drive is the only method used to transfer files. After removing the malware and replacing the USB drive with a brand new one, the technician gives the approval to use the equipment. The next day the user reports the same malware activity is present after powering on the system. Which of the following did the technician forget to do to prevent reinfection?
A. Connect to the network and update the OS with the latest security patches
B. Scan and clean the USB device used to transfer data from the equipment
C. Disable System restore and remove all restore points from the system
D. Update the local antivirus and set it to scan automatically every evening
A user reports that a cell phone application is loading slowly and not functioning properly. Which of the following should a technician do FIRST to remedy this issue?
A. Remove and reinstall the application.
B. Hard reset the cell phone.
C. Reconnect the wireless network connection.
D. Close all running applications
Ann, a user, has purchased a new Android phone and is attempting to access a public hotspot. When she opens a browser, she gets a message indicating the page cannot be displayed. She notices there is a `?` in the radio icon in the toolbar. She has verified Bluetooth is active, airplane mode is off, and tethering is turned on. She uses the cell phone to call a technician for assistance. Which of the following is the MOST likely issue Ann is experiencing?
A. There is unauthenticated wireless connectivity
B. She has exceeded the data allowance
C. The phone is only 3G capable
D. It is an unrooted phone
E. The SIM card was not activated
F. A data plan was not purchased
Free Access Full 220-1002 Practice Test Free Questions
If you’re looking for more 220-1002 practice test free questions, click here to access the full 220-1002 practice test.
We regularly update this page with new practice questions, so be sure to check back frequently.
Good luck with your 220-1002 certification journey!