1.
Jaringan yang mencakup sebuah Negara disebut dengan . . . .
Correct Answer
C. WAN
Explanation
WAN stands for Wide Area Network, which refers to a network that covers a large geographic area, such as a country. Therefore, the correct answer for the given question is WAN.
2.
Berikur ini manfaat dari jaringan computer , kecuali . . . .
Correct Answer
D. Kita dapat mengakses data orang tanpa harus diketahui
Explanation
The given answer, "Kita dapat mengakses data orang tanpa harus diketahui" (We can access other people's data without being known), is not a benefit of computer networks. In fact, it is a violation of privacy and security. The other options mentioned, such as sharing resources, using data together, and having higher reliability, are all valid benefits of computer networks.
3.
Perangkat berikut yang berfungsi untuk menghubungkan dua LAN adalah . . . .
Correct Answer
B. Bridge
Explanation
A bridge is a device that connects two LANs and allows them to communicate with each other. It operates at the data link layer of the OSI model and uses MAC addresses to forward data packets between the LANs. Unlike a hub, which simply broadcasts data to all connected devices, a bridge intelligently filters and forwards packets only to the appropriate destination. A router, on the other hand, connects networks at the network layer and can also connect LANs, but it typically connects LANs to wide area networks (WANs) such as the internet. Kabel UTP is a type of network cable and not a device for connecting LANs.
4.
Perangkat berikut yang berfungsi untuk mengisolasi arus data yang datang dari satu LAN dengan yang dari LAN yang lain adalah . . . .
Correct Answer
A. Router
Explanation
A router is a device that is specifically designed to connect multiple networks and direct traffic between them. It acts as a gateway between different LANs, allowing data to be isolated and securely transferred between them. Unlike a bridge or a hub, which simply forward data packets to all connected devices, a router uses IP addresses to determine the most efficient path for data transmission. Therefore, a router is the correct answer for this question as it is the only device listed that can effectively isolate data coming from one LAN from another.
5.
Perangkat berikut yang memungkinkan dua buah computer saling berkomunikasi dan mempertukarkan data dalam jaringan adalah . . . .
Correct Answer
D. LAN Card
Explanation
A LAN card, also known as a network interface card (NIC), enables two computers to communicate and exchange data within a network. It acts as a physical connection between the computer and the network, allowing the computer to send and receive data packets. Without a LAN card, the computers would not be able to establish a connection or exchange data with each other. Therefore, a LAN card is the correct answer as it facilitates communication and data exchange between two computers in a network.
6.
Protokol jaringan yang berfungsi untuk mengirimkan dan menerima data ked an dari media fisik jaringan adalah . . . .
Correct Answer
D. Network Interface Layer
Explanation
The network interface layer is responsible for sending and receiving data between the computer and the physical network. It handles tasks such as converting data into a format that can be transmitted over the network, addressing the data with MAC addresses, and detecting and correcting errors in the data transmission. This layer interacts directly with the physical components of the network, such as network interface cards and cables.
7.
Bentu penyusupan yang dilakukan dengan cara memalsukan identitas user yang dikenal adalah . . . .
Correct Answer
A. Spoofing
Explanation
Spoofing refers to the act of falsifying or impersonating someone's identity in order to gain unauthorized access or deceive others. It involves disguising oneself as a known user or system to bypass security measures and carry out malicious activities. This can include spoofing IP addresses, email addresses, or websites to trick users into revealing sensitive information or granting unauthorized access. Spoofing is a common technique used by hackers and cybercriminals to launch various types of attacks, such as phishing, man-in-the-middle attacks, or denial of service attacks.
8.
Program yang berfungsi untuk memonitor jaringan dan menangkap paket data yang melewati jaringan disebut . . . .
Correct Answer
C. Sniffer
Explanation
A program that monitors and captures data packets passing through a network is called a sniffer. A sniffer is used to analyze network traffic and can be used for various purposes, such as troubleshooting network issues, detecting security vulnerabilities, or monitoring network activity. It captures packets of data, allowing network administrators or security professionals to analyze the data and gain insights into the network's performance or potential security threats.
9.
Teknik pengaman data yang dilakukan dengan cara menyandikan data-data yang dikirim dikenal dengan istilah . . . .
Correct Answer
C. Secure Socket Layer
Explanation
Secure Socket Layer (SSL) is a security protocol that provides encryption and authentication for data transmitted over the internet. It ensures that the data sent between a web server and a browser remains private and secure. SSL uses encryption algorithms to encode the data, making it unreadable to anyone who intercepts it. It also verifies the identity of the server, ensuring that the data is being sent to the intended recipient. This makes SSL an effective technique for securing data transmission and protecting against unauthorized access.
10.
Teknik pengaman data yang dilakukan dengan cara memfilter arus komunikasi yang masuk dan keluar dikenal dengan istilah . . . .
Correct Answer
A. Firewall
Explanation
Firewall is a technique used to secure data by filtering incoming and outgoing communication. It acts as a barrier between a trusted internal network and an untrusted external network, monitoring and controlling network traffic based on predetermined security rules. By allowing or blocking specific types of traffic, a firewall helps to prevent unauthorized access and protect against malicious activities such as hacking, viruses, and malware. Therefore, the correct answer is Firewall.