Answer: d) Defining the duration for which data must be retained
Explanation: A retention policy is a set of guidelines and rules that determine how long data must be stored and the conditions under which it can be deleted or destroyed. It helps in ensuring that data is preserved for a defined period to comply with legal, regulatory, or business requirements.
14. Which of the following encryption paradigms is used to protect data in transit?
a) RSA
b) AES
c) SSL/TLS
d) SHA-256
Answer: c) SSL/TLS
Explanation: Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are encryption protocols used to secure data in transit over networks such as the internet. They use a combination of symmetric and asymmetric encryption methods to provide confidentiality, integrity, and authenticity.
15. What is the purpose of disaster recovery in server administration?
a) To prevent data loss due to hardware failure
b) To secure servers from external threats
c) To manage and optimize server configurations
d) To provide a plan of action in the event of a disaster or disruption
Answer: d) To provide a plan of action in the event of a disaster or disruption
Explanation: Disaster recovery is a process that involves creating and implementing a plan of action to recover from a disaster or disruption that may affect the availability of critical systems or data. It involves taking measures such as data backups, testing recovery procedures, and implementing redundancy and failover mechanisms to minimize downtime and ensure business continuity.
16. What is the purpose of virtualization in server administration?
A) To increase security
B) To reduce hardware costs
C) To speed up network communication
D) To simplify user access
Answer: B) To reduce hardware costs. Virtualization allows multiple virtual machines to run on a single physical machine, reducing the need for additional hardware.
17. What is the purpose of asset management in server administration?
A) To document server configurations
B) To manage server security
C) To manage server licensing
D) To track server hardware and software inventory
Answer: D) To track server hardware and software inventory. Asset management is the process of tracking and managing hardware and software inventory, including make, model, serial number, and asset tag.
18. Which of the following encryption paradigms is used to protect data in transit?
A) Data at rest encryption
B) AES encryption
C) SSL/TLS encryption
D) Data masking
Answer: C) SSL/TLS encryption. SSL/TLS encryption is used to protect data in transit, such as when data is sent over the internet or between servers.
19. Which of the following is an example of a disaster recovery retention policy?
A) Backing up data every hour
B) Storing backups in a secure, off-site location
C) Retaining backups for 90 days
D) All of the above
Answer: D) All of the above. A disaster recovery retention policy includes the frequency of data backups, the location where backups are stored, and the length of time backups are retained.
20. What is the purpose of UEFI/BIOS passwords in server administration?
A) To prevent unauthorized access to the server
B) To encrypt data at rest
C) To speed up server boot times
D) To improve server performance
Answer: A) To prevent unauthorized access to the server. UEFI/BIOS passwords are used to restrict access to the server during the boot process and prevent unauthorized users from accessing the system.