Aij Kelas 12 Tkj Gnc

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Tekaje151181
T
Tekaje151181
Community Contributor
Quizzes Created: 1 | Total Attempts: 3,087
Pertanyaan: 20 | Attempts: 3,087

SettingsSettingsSettings
Aij Kelas 12 Tkj Gnc - Quiz

.


Questions and Answers
  • 1. 

    Sebuah sistem atau perangkat yang mengizinkan lalu lintas jaringan yang dianggap aman untuk melaluinya dan mencegah lalu lintas jaringan yang tidak aman adalah pengertian dari ….

    • A.

      Router

    • B.

      Server

    • C.

      Spftware Security

    • D.

      Application Management

    • E.

      Firewall

    Correct Answer
    E. Firewall
    Explanation
    A firewall is a system or device that allows secure network traffic to pass through it and prevents insecure network traffic. It acts as a barrier between a trusted internal network and an untrusted external network, filtering incoming and outgoing traffic based on predefined security rules. By doing so, it helps protect the network from unauthorized access, malware, and other potential threats.

    Rate this question:

  • 2. 

    Tipe firewall yang terdiri dari sebuah bastion host (host yang berupa application level gateway) dan dua router packet filtering adalah ….

    • A.

      Screened Subnet Firewall

    • B.

      Screened Host Firewall

    • C.

      Screened Broadcast Firewall

    • D.

      Dual-homed Gateway Firewall

    • E.

      Packet-filtering Firewall

    Correct Answer
    B. Screened Host Firewall
    Explanation
    A screened host firewall is a type of firewall that consists of a bastion host (an application level gateway) and two packet filtering routers. The bastion host acts as a single point of entry and exit for all network traffic, and it applies security measures such as authentication and access control. The two packet filtering routers are responsible for filtering and forwarding network packets based on predefined rules. This configuration provides an added layer of security by separating the internal network from the external network and controlling the flow of traffic between them.

    Rate this question:

  • 3. 

    Tipe firewall yang terdiri dari router diantara jaringan internal dan eksternal yang aman, digunakan untuk menolak dan mengijinkan trafik adalah ….

    • A.

      Screened Subnet Firewall

    • B.

      Screened Host Firewall

    • C.

      Screened Broadcast Firewall

    • D.

      Dual-homed Gateway Firewall

    • E.

      Packet-filtering Firewall

    Correct Answer
    E. Packet-filtering Firewall
    Explanation
    A packet-filtering firewall is a type of firewall that is implemented using a router between an internal and external network. It is designed to examine each packet of data that passes through it and make decisions on whether to allow or deny the traffic based on a set of predefined rules. This type of firewall is considered secure because it can effectively block unwanted traffic while allowing legitimate traffic to pass through.

    Rate this question:

  • 4. 

    Program yang menyebabkan kerusakan sistem ketika dijalankan disebut ….

    • A.

      Denial-of-Service

    • B.

      Malicious code

    • C.

       Phishing

    • D.

      Packet Snifer

    • E.

      Social Engineering

    Correct Answer
    B. Malicious code
    Explanation
    Malicious code refers to any program or software that is designed to harm or disrupt computer systems, networks, or data. When executed, malicious code can cause a range of issues, including system crashes, data corruption, unauthorized access, and other harmful activities. It is often created with malicious intent, such as stealing sensitive information, gaining control over a system, or causing damage to the target system. Therefore, the program mentioned in the question that causes system damage when run is appropriately referred to as malicious code.

    Rate this question:

  • 5. 

    Suatu aktivitas menganalisis jaringan untuk mengetahui bagian dari sistem yang cenderung untuk diserang disebut ….

    • A.

      Threat

    • B.

      Impact

    • C.

      Frequency

    • D.

      Recommended countermeasures

    • E.

      Vulnerability

    Correct Answer
    E. Vulnerability
    Explanation
    Vulnerability refers to the weakness or flaw in a system that can be exploited by attackers. Analyzing the network to identify the parts of the system that are more likely to be targeted helps in understanding these vulnerabilities. By identifying vulnerabilities, appropriate countermeasures can be recommended to mitigate the risk and protect the system from potential attacks.

    Rate this question:

  • 6. 

    Berikut rumus dari... ​​​​​​​

    • A.

      Bandwidth pada jaringan

    • B.

      Bandwidth

    • C.

      Bandwidth pada hosting

    • D.

      Throughput

    • E.

      Kecepatan

    Correct Answer
    B. Bandwidth
    Explanation
    The given correct answer is "Bandwidth". Bandwidth refers to the maximum amount of data that can be transmitted over a network or a communication channel in a given period of time. It is a measure of the capacity of the network or channel to carry data. In the context of networking and hosting, bandwidth is an important factor as it determines the speed and efficiency of data transfer. Higher bandwidth allows for faster data transmission and better performance.

    Rate this question:

  • 7. 

    ​​​​​​Luas atau lebar cakupan frekuensi yang digunakan oleh sinyal dalam medium transmisi adalah...

    • A.

      Bandwidth

    • B.

      Throughput

    • C.

      Bandwidth pada hosting

    • D.

      Bandwidth pada jaringan

    • E.

      Bus

    Correct Answer
    A. Bandwidth
    Explanation
    The correct answer is "Bandwidth." Bandwidth refers to the amount of data that can be transmitted through a medium in a given amount of time. It represents the capacity or the "width" of the frequency range used by a signal in a transmission medium. It is commonly used to measure the speed or capacity of a network connection or the amount of data that can be transferred in a given time period.

    Rate this question:

  • 8. 

    Transfer rate/jumlah data yang dapat dibawa dari sebuah titik ke titik lain dalam jangka waktu tertentu (pada umumnya dalam detik) adalah...

    • A.

      Andwidth

    • B.

      Throughput

    • C.

      Bandwidth pada hosting

    • D.

      Bandwidth pada jaringan

    • E.

      Bus

    Correct Answer
    D. Bandwidth pada jaringan
    Explanation
    Bandwidth pada jaringan mengacu pada transfer rate atau jumlah data yang dapat dibawa dari satu titik ke titik lain dalam jangka waktu tertentu. Ini berkaitan dengan kemampuan jaringan untuk mengirim data dengan kecepatan tertentu. Pilihan lain seperti throughput dan bandwidth pada hosting tidak menjelaskan tentang transfer rate atau jumlah data yang dapat dibawa dalam jangka waktu tertentu. Pilihan "bus" juga tidak relevan dengan konsep transfer rate atau jumlah data yang dapat dibawa dalam jangka waktu tertentu pada jaringan.

    Rate this question:

  • 9. 

    Bandwidth yang sebenarnya (aktual) pada suatu waktu tertentu dan pada kondisi dan jaringan internet tertentu adalah...

    • A.

      Bandwidth

    • B.

      Throughput

    • C.

      Bandwidth pada hosting

    • D.

      Bandwidth pada jaringan

    • E.

      Bus

    Correct Answer
    B. Throughput
    Explanation
    Throughput refers to the actual amount of data that can be transmitted over a network or a communication channel in a given period of time. It represents the real-time data transfer rate and is influenced by various factors such as network congestion, latency, and the efficiency of the network protocols being used. Unlike bandwidth, which is the theoretical maximum capacity of a network, throughput provides a more accurate measure of the actual data transfer speed in real-world conditions.

    Rate this question:

  • 10. 

    ​​​​​​Antrean data dalam setiap kartu Ethernet disebut …

    • A.

      Qdisc

    • B.

      FIFO

    • C.

      Penjadwalan

    • D.

      Prioritas

    • E.

      Shape and Drop

    Correct Answer
    A. Qdisc
    Explanation
    The correct answer is Qdisc. In networking, Qdisc stands for Queueing Discipline. It is responsible for managing the transmission of data packets in a network interface. Qdisc determines the order in which packets are transmitted and handles congestion control. It ensures that packets are sent in a fair and efficient manner, preventing any one packet from monopolizing the network resources.

    Rate this question:

  • 11. 

    #iptables -A FORWARD -p icmp -j Accept  Maksud dari perintah diatas adalah ...

    • A.

      Firewall mengizinkan paket ICMP akan keluar

    • B.

      Firewall mengizinkan paket ICMP akan masuk

    • C.

      Firewall tidak mengizinkan paket ICMP masuk

    • D.

      Firewall mengizinkan paket ICMP yang akan melintas

    • E.

      Firewall tidak mengizinkan paket ICMP melintas

    Correct Answer
    D. Firewall mengizinkan paket ICMP yang akan melintas
    Explanation
    The given command "iptables -A FORWARD -p icmp -j Accept" adds a rule to the firewall's FORWARD chain to allow ICMP packets to pass through. This means that the firewall will permit ICMP packets to traverse from one network interface to another.

    Rate this question:

  • 12. 

    Tabel pada iptables yang digunakan untuk manipulasi paket data adalah ...

    • A.

      Mangle

    • B.

      Nat

    • C.

      Filter

    • D.

      DMZ

    • E.

      IP Masquerade

    Correct Answer
    A. Mangle
    Explanation
    The correct answer is "mangle". In iptables, the mangle table is used for packet alteration. It allows you to modify certain aspects of the packet such as the TOS (Type of Service) field, TTL (Time to Live) value, and packet size. This table is commonly used for advanced network manipulation and can be used for tasks like traffic shaping, packet marking, and QoS (Quality of Service) implementation.

    Rate this question:

  • 13. 

    Metode yang dapat mengizinkan beberapa host yang tidak mempunyai IP publik atau tidak mempunyai blok IP dari jaringan eksternal dapat terkoneksi dengan jaringan internet disebut ..

    • A.

      Mangle

    • B.

      Nat

    • C.

      Filter

    • D.

      DMZ

    • E.

      IP Masquerade

    Correct Answer
    E. IP Masquerade
    Explanation
    IP Masquerade is a method that allows multiple hosts without public IP addresses or without a block of IP addresses from an external network to connect to the internet. It works by disguising the private IP addresses of the internal hosts behind the public IP address of the router or gateway. This allows the internal hosts to communicate with the internet using the public IP address, while the router or gateway keeps track of the connections and routes the traffic appropriately.

    Rate this question:

  • 14. 

    Perangkat Lunak iptables merupakan jenis firewall yang ada dalam sistem operasi ...

    • A.

      WIndows

    • B.

      DOS

    • C.

      LINUX

    • D.

      Mac OS

    • E.

      UNIX

    Correct Answer
    C. LINUX
    Explanation
    The correct answer is LINUX because iptables is a software program that is commonly used as a firewall in the Linux operating system. It allows users to configure and manage network traffic by creating rules and filters. Therefore, iptables is specific to the Linux operating system and is not available in Windows, DOS, Mac OS, or UNIX.

    Rate this question:

  • 15. 

    Untuk memblokir sebuah website yang mengandung sebuah isi/informasi/kata tertentu, kita dapat membuat rule filter firewall berdasarkan ...

    • A.

      Interface

    • B.

      IP Address

    • C.

      Waktu

    • D.

      Content

    • E.

      MAC Address

    Correct Answer
    D. Content
    Explanation
    To block a website that contains specific content, we can create a rule filter in the firewall based on the content. This means that the firewall will analyze the content of the website and if it matches the specified criteria, it will block access to that website. This method is effective in preventing users from accessing websites that contain inappropriate or harmful content.

    Rate this question:

  • 16. 

    Menu pada Winbox yang dapat memanajemen bandwidth adalah ...

    • A.

      Traffic

    • B.

      General

    • C.

      Total

    • D.

      Queue

    • E.

      Advanced

    Correct Answer
    D. Queue
    Explanation
    The correct answer is "Queue". In Winbox, the "Queue" menu allows users to manage bandwidth by setting up queues for different types of traffic. By configuring queues, users can prioritize or limit the bandwidth for specific applications or network devices, ensuring a fair distribution of available bandwidth and preventing one device or application from hogging all the resources. This menu provides options for creating and managing queues, as well as setting up rules and limits for different types of traffic.

    Rate this question:

  • 17. 

    Teknik antrean HTB dikembangkan oleh ..

    • A.

      Marcus

    • B.

      Alexander

    • C.

      Montesque

    • D.

      Martin Devera

    • E.

      Linus Torvalds

    Correct Answer
    D. Martin Devera
    Explanation
    Martin Devera is the correct answer because he is the developer of the Hierarchical Token Bucket (HTB) queuing discipline. HTB is a technique used in network traffic management to prioritize and control bandwidth allocation.

    Rate this question:

  • 18. 

    Tampilan dibawah ini dalam mikrotik digunakan untuk konfigurasi ...

    • A.

      DNS DHCP

    • B.

      IP Address

    • C.

      Router

    • D.

      Router

    • E.

      IP Server

    Correct Answer
    B. IP Address
    Explanation
    The given answer, "IP Address," is correct because the provided information states that the configuration is done in MikroTik. In networking, an IP address is a unique identifier assigned to each device connected to a network. Configuring the IP address involves setting up the network parameters for the device, such as the IP address, subnet mask, default gateway, and DNS servers. Therefore, it is logical to assume that the given configuration in MikroTik is related to setting up the IP address for a device.

    Rate this question:

  • 19. 

    Menu berikut digunakan untuk konfigurasi ..  

    • A.

      IP Firewall dstnat

    • B.

      IP Address

    • C.

      IP Firewall scrnat

    • D.

      IP masquerade

    • E.

      IP Gateway

    Correct Answer
    C. IP Firewall scrnat
    Explanation
    The given menu options are used for configuring different aspects of IP Firewall. Among these options, "IP Firewall scrnat" specifically refers to the configuration of source network address translation. This option allows the modification of the source IP address of outgoing packets, providing a way to hide the original source IP address and replace it with a different one.

    Rate this question:

  • 20. 

    Menu berikut digunakan untuk ...

    • A.

      Membuat Hotspot

    • B.

      Membuat User Profile

    • C.

      Membuat Bandwidth

    • D.

      Membuat Wireless

    • E.

      Membuat User

    Correct Answer
    B. Membuat User Profile
    Explanation
    The menu is used to create user profiles, which are sets of predefined settings and configurations that can be applied to multiple users. User profiles help in efficiently managing and organizing user accounts by allowing administrators to assign specific settings to different groups of users. This menu option enables the creation of user profiles for easier management of user accounts.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 22, 2019
    Quiz Created by
    Tekaje151181
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.