CompTIA Server+ Final Assessment
Exam 2025 Questions and Answers
A server is being set up with a Linux operating system. It needs to have its hard disks partitioned to
support very large partitions, ACL permissions, and compression. What file system should be used?
- ANSWER✔✔-ZFS
A sysadmin is troubleshooting an issue with connectivity. The sysadmin gets an Automatic Private
IP Addressing (APIPA) address. What is most likely the cause of the issue? - ANSWER✔✔-A
device fails to connect to DHCP.
A systems administrator is looking to cut down on Capital Expenses (CapEx) and to limit the cost
of on-premise installing, maintaining, patching, and upgrading the Content Relationship
Management (CRM) software. The CRM provider sells a service that meets these requirements.
What type of business model do they have? - ANSWER✔✔-Software-as-a-Service
A system administrator is troubleshooting issues in their environment. What is one command line
tool that can assist in intercepting network traffic? - ANSWER✔✔-tcpdump
A hardware firewall is having issues completing Virtual Private Network (VPN) connections. A
sysadmin needs to determine what step of the connection process it fails. What software can sniff
the traffic and display the contents of that transmission? - ANSWER✔✔-Wireshark
FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 1
, A server is being set up with 4 terabytes (TB) of storage in one partition, but the operating system
only sees 2 terabytes. What type of hard disk table configuration is being used? - ANSWER✔✔-
Master Boot Record (MBR)
A company approaches their sysadmin to give an assessment of the physical security of the
corporate office and its data center. They ask the sysadmin to recommend a couple options to deter
criminals. What are two examples of physical security? (Select all that apply.) - ANSWER✔✔-
*Lighting
*Fencing
A small organization reaches out to a junior sysadmin to recommend a centralized storage solution
for its users to save files to outside their workstation. They are concerned that a device may break
down or be stolen. If that happens, they will lose important and confidential data. However, they are
very price conscious. What recommendation would allow for centralized data storage, may include
redundancy, but is relatively inexpensive? - ANSWER✔✔-Network Attached Storage (NAS)
A fundamental concept of device access and security is the administration of user accounts.
Permissions for accessing file shares are typically assigned by security group. Users are then added to
security groups as necessary. In what ways can a sysadmin manage local user accounts in Windows?
(Select all that apply.) - ANSWER✔✔-*Computer Management
*cmd
A company purchased a new office building and needs to set up a network for employees to
complete their work. What is a network device that operates on Layer 3 of the OSI model? -
ANSWER✔✔-Router
FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 2
Exam 2025 Questions and Answers
A server is being set up with a Linux operating system. It needs to have its hard disks partitioned to
support very large partitions, ACL permissions, and compression. What file system should be used?
- ANSWER✔✔-ZFS
A sysadmin is troubleshooting an issue with connectivity. The sysadmin gets an Automatic Private
IP Addressing (APIPA) address. What is most likely the cause of the issue? - ANSWER✔✔-A
device fails to connect to DHCP.
A systems administrator is looking to cut down on Capital Expenses (CapEx) and to limit the cost
of on-premise installing, maintaining, patching, and upgrading the Content Relationship
Management (CRM) software. The CRM provider sells a service that meets these requirements.
What type of business model do they have? - ANSWER✔✔-Software-as-a-Service
A system administrator is troubleshooting issues in their environment. What is one command line
tool that can assist in intercepting network traffic? - ANSWER✔✔-tcpdump
A hardware firewall is having issues completing Virtual Private Network (VPN) connections. A
sysadmin needs to determine what step of the connection process it fails. What software can sniff
the traffic and display the contents of that transmission? - ANSWER✔✔-Wireshark
FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 1
, A server is being set up with 4 terabytes (TB) of storage in one partition, but the operating system
only sees 2 terabytes. What type of hard disk table configuration is being used? - ANSWER✔✔-
Master Boot Record (MBR)
A company approaches their sysadmin to give an assessment of the physical security of the
corporate office and its data center. They ask the sysadmin to recommend a couple options to deter
criminals. What are two examples of physical security? (Select all that apply.) - ANSWER✔✔-
*Lighting
*Fencing
A small organization reaches out to a junior sysadmin to recommend a centralized storage solution
for its users to save files to outside their workstation. They are concerned that a device may break
down or be stolen. If that happens, they will lose important and confidential data. However, they are
very price conscious. What recommendation would allow for centralized data storage, may include
redundancy, but is relatively inexpensive? - ANSWER✔✔-Network Attached Storage (NAS)
A fundamental concept of device access and security is the administration of user accounts.
Permissions for accessing file shares are typically assigned by security group. Users are then added to
security groups as necessary. In what ways can a sysadmin manage local user accounts in Windows?
(Select all that apply.) - ANSWER✔✔-*Computer Management
*cmd
A company purchased a new office building and needs to set up a network for employees to
complete their work. What is a network device that operates on Layer 3 of the OSI model? -
ANSWER✔✔-Router
FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 2