CompTIA Server+ Exam 2025
Questions and Answers
An administrator is developing a storage growth plan for a new file server. Which of the following
should be implemented on the server so that storage growth is
restricted?
A. Disk quotas
B. Disk compression
C. Automatic usage reports
D. Automatic defragmentation - ANSWER✔✔-A. Disk quotas
A server administrator is researching the purchase of SSD for a server. The administrator receives a
report from the datacenter technician detailing current storage
requirements and future growth planning estimates as follows:
ServerA: Current-15TB-Future-50% growth
ServerB: Current-20TB-Future-80% growth
FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 1
,Based on this report, which of the following represents the MINIMUM storage requirements
needed?
A. ServerA-18TB, ServerB-24TB
B. ServerA-22TB, ServerB-22TB
C. ServerA-23TB, ServerB-36TB
D. ServerA-25TB, ServerB-40TB - ANSWER✔✔-C
A network administrator is tasked to block all outbound SSH connections on the default port from a
network subnet of 10.152.8.0/21 on a Linux based firewall.
Which of the following rule sets would accomplish this task?
A. iptables -i OUTPUT -d 10.152.8.0/21 -p TCP --dport 22 -j REJECT
B. iptables -i OUTPUT -d 10.152.8.0/21 -p TCP --dport 23 -j REJECT
C. iptables -i OUTPUT -d 10.152.8.0/21 -p TCP --dport 22 -j ACCEPT
D. iptables -i OUTPUT -d 10.152.8.0/21 -p TCP --dport 23 -j ACCEPT - ANSWER✔✔-A
A company has recently had sensitive data stolen by a contractor who plugged a flash drive into a
server. Which of the following is the BEST method to prevent
future occurrences?
A. Disable any unused physical ports until needed
B. Implement a BIOS password on all the servers
C. Install chassis locks on all the servers
FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 2
,D. Restrict usage of flash drives in company policy - ANSWER✔✔-A
Network devices between two firewalls are included in which of the following?
A. VPN
B. SAN
C. VLAN
D. DMZ - ANSWER✔✔-D. DMZ
A system administrator is tasked with dividing the network so that each department is separate from
the other. Which of the following should be used to accomplish
this task?
A. VLAN
B. VPN
C. VNC
D. VM - ANSWER✔✔-A. VLAN
Which of the following provides two-factor authentication?
A. Bank card and PIN.
B. Username and password.
C. Fingerprint and iris scan.
D. Key and proximity badge. - ANSWER✔✔-A. Bank card and PIN.
FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 3
, Which of the following is the MOST secure method of storing critical and sensitive system
information (e.g., administrative passwords, trusted signing keys)?
A. Store the information encrypted and offline in a storage safe.
B. Encrypt the information using a zip file with a password.
C. Utilize a drive with full disk encryption enabled.
D. Create an encrypted virtual disk for storage - ANSWER✔✔-A
Which of the following is an example of the principle of least privilege and is the MOST secure
when granting access to a shared network drive used by the Accounting department?
A. Grant appropriate permissions to only users in the Accounting department for both the share
and NTFS
B. Grant all users full control permissions for the share only
C. Grant the Accounting department full control for the share and appropriate NTFS permissions
D. Grant modify permissions to the Accounting department and deny NTFS permissions to all
other users - ANSWER✔✔-A
Which of the following methods should a technician perform to properly clear a hard drive before
disposal?
A. Delete the FAT
B. Zero all block sectors
C. Delete the partition
FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 4
Questions and Answers
An administrator is developing a storage growth plan for a new file server. Which of the following
should be implemented on the server so that storage growth is
restricted?
A. Disk quotas
B. Disk compression
C. Automatic usage reports
D. Automatic defragmentation - ANSWER✔✔-A. Disk quotas
A server administrator is researching the purchase of SSD for a server. The administrator receives a
report from the datacenter technician detailing current storage
requirements and future growth planning estimates as follows:
ServerA: Current-15TB-Future-50% growth
ServerB: Current-20TB-Future-80% growth
FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 1
,Based on this report, which of the following represents the MINIMUM storage requirements
needed?
A. ServerA-18TB, ServerB-24TB
B. ServerA-22TB, ServerB-22TB
C. ServerA-23TB, ServerB-36TB
D. ServerA-25TB, ServerB-40TB - ANSWER✔✔-C
A network administrator is tasked to block all outbound SSH connections on the default port from a
network subnet of 10.152.8.0/21 on a Linux based firewall.
Which of the following rule sets would accomplish this task?
A. iptables -i OUTPUT -d 10.152.8.0/21 -p TCP --dport 22 -j REJECT
B. iptables -i OUTPUT -d 10.152.8.0/21 -p TCP --dport 23 -j REJECT
C. iptables -i OUTPUT -d 10.152.8.0/21 -p TCP --dport 22 -j ACCEPT
D. iptables -i OUTPUT -d 10.152.8.0/21 -p TCP --dport 23 -j ACCEPT - ANSWER✔✔-A
A company has recently had sensitive data stolen by a contractor who plugged a flash drive into a
server. Which of the following is the BEST method to prevent
future occurrences?
A. Disable any unused physical ports until needed
B. Implement a BIOS password on all the servers
C. Install chassis locks on all the servers
FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 2
,D. Restrict usage of flash drives in company policy - ANSWER✔✔-A
Network devices between two firewalls are included in which of the following?
A. VPN
B. SAN
C. VLAN
D. DMZ - ANSWER✔✔-D. DMZ
A system administrator is tasked with dividing the network so that each department is separate from
the other. Which of the following should be used to accomplish
this task?
A. VLAN
B. VPN
C. VNC
D. VM - ANSWER✔✔-A. VLAN
Which of the following provides two-factor authentication?
A. Bank card and PIN.
B. Username and password.
C. Fingerprint and iris scan.
D. Key and proximity badge. - ANSWER✔✔-A. Bank card and PIN.
FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 3
, Which of the following is the MOST secure method of storing critical and sensitive system
information (e.g., administrative passwords, trusted signing keys)?
A. Store the information encrypted and offline in a storage safe.
B. Encrypt the information using a zip file with a password.
C. Utilize a drive with full disk encryption enabled.
D. Create an encrypted virtual disk for storage - ANSWER✔✔-A
Which of the following is an example of the principle of least privilege and is the MOST secure
when granting access to a shared network drive used by the Accounting department?
A. Grant appropriate permissions to only users in the Accounting department for both the share
and NTFS
B. Grant all users full control permissions for the share only
C. Grant the Accounting department full control for the share and appropriate NTFS permissions
D. Grant modify permissions to the Accounting department and deny NTFS permissions to all
other users - ANSWER✔✔-A
Which of the following methods should a technician perform to properly clear a hard drive before
disposal?
A. Delete the FAT
B. Zero all block sectors
C. Delete the partition
FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 4