So'al Penilaian Tengah Semester (Pts) Mata Pelajaran : Keamanan Jaringan

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Nangazuz
N
Nangazuz
Community Contributor
Quizzes Created: 1 | Total Attempts: 479
| Attempts: 479 | Pertanyaan: 20
Please wait...
.
Question 1 / 20
0 %
0/100
Score 0/100
1. Sistem Operasi Windows memiliki Sistem yang teratur dan saling berkaitan (seperti rantai). Konfigurasi ini dapat dengan mudah kita ubah dengan menggunakan .....

Explanation

The correct answer is "Regedit.doc" because the question states that the Windows operating system has a system that is organized and interconnected like a chain. This system can be easily modified or changed using a specific tool or program. The file extension ".doc" is commonly associated with Microsoft Word documents, which are often used for editing and modifying text-based documents. Therefore, "Regedit.doc" is the most appropriate option as it suggests using the "Regedit" tool to modify or change the system configuration in the Windows operating system.

Submit
Please wait...
About This Quiz
Soal Penilaian Tengah Semester (Pts) Mata Pelajaran : Keamanan Jaringan - Quiz

2. Yang termasuk konfigurasi Firewall adalah

Explanation

The correct answer is "Screened Host Firewall system". This answer is correct because a screened host firewall system is a type of firewall configuration that involves placing a firewall between an internal network and an external network. This configuration allows the firewall to filter and control incoming and outgoing network traffic, providing an additional layer of security for the internal network. The other options listed (Screen Saver, Print Screen, Subnet Mask, and Gateway) are not configurations of a firewall.

Submit
3. Dibawah ini adalah Jenis Malware yang biasa dikenal, kecuali ......

Explanation

The given options are all types of malware except for "Brainware". Brainware is not a type of malware, but rather refers to the human intellect or cognitive abilities. The other options, such as virus, adware, worm, and Trojan, are all forms of malicious software that can harm computer systems or compromise user privacy.

Submit
4. Yang termasuk metode firewall adalah ....

Explanation

Metode firewall yang termasuk adalah security level gateway. Security level gateway merupakan jenis firewall yang bekerja pada tingkat jaringan dan dapat memantau dan mengontrol lalu lintas data yang masuk dan keluar dari jaringan. Metode ini menggunakan aturan dan kebijakan keamanan yang ketat untuk melindungi jaringan dari ancaman dan serangan yang mungkin terjadi. Metode firewall lainnya seperti programming level gateway, software level gateway, run level gateway, dan circuit level gateway tidak termasuk dalam metode firewall yang dimaksud dalam pertanyaan.

Submit
5. Program yang berjalan pada background komputer dinamakan .....

Explanation

The correct answer is Operating System. The operating system is a program that runs in the background of a computer and manages all the hardware and software resources. It provides a platform for other programs to run on and coordinates the execution of these programs. It also controls input and output devices, manages memory and storage, and provides security and protection for the computer system.

Submit
6. Perangkat lunak (Software) yang masuk ke dalam komputer tanpa disadari dan menjalankan aksi memata-matai komputer korban, dinamakan ....

Explanation

Spyware adalah perangkat lunak yang dapat masuk ke dalam komputer tanpa disadari pengguna dan melakukan aksi memata-matai. Perangkat lunak ini dapat mengumpulkan informasi pribadi, seperti riwayat penjelajahan, kata sandi, dan data sensitif lainnya, kemudian mengirimkannya ke pihak ketiga tanpa izin pengguna.

Submit
7. Melakukan proses pengerasan suatu lapisan yang lembut sehingga lapisan tersebut menjadi lebih kuat dan lebih tahan terhadap kerusakan, dinamakan ....

Explanation

Hardenning Server refers to the process of strengthening a soft layer to make it stronger and more resistant to damage. This process involves implementing security measures and configurations to protect the server from potential vulnerabilities and attacks. By hardening the server, it becomes more secure and less prone to breaches, ensuring the integrity and availability of the system.

Submit
8. Firewall yang dipasang pada komputer, yang menghubungkan komputer dengan modem, dinamakan ....

Explanation

A software firewall is a type of firewall that is installed on a computer to protect it from unauthorized access and malicious activities. It acts as a barrier between the computer and the internet, monitoring incoming and outgoing network traffic and blocking any suspicious or potentially harmful connections. Unlike a hardware firewall that is a separate physical device, a software firewall is a program or application that runs on the computer's operating system. It can be customized to allow or block specific applications or services, providing an additional layer of security to the computer's network connection.

Submit
9. Program yang dibuat dengan bahasa pemrograman yang berisi perintah melakukan perubahan di luar kewajaran sistem komputer dinamakan .....

Explanation

A program that is created with a programming language and contains commands to perform abnormal changes outside the normal behavior of a computer system is called malware. Malware refers to malicious software that is designed to disrupt, damage, or gain unauthorized access to a computer system. It includes various types of harmful programs such as viruses, worms, trojans, ransomware, and spyware. These programs are intentionally created to exploit vulnerabilities in a system and can cause significant harm to the user's data, privacy, and overall system functionality.

Submit
10. Server yang mempunyai sebuah program untuk menangani berbagai operasi aplikasi antara user dan database (misalnya aplikasi bisnis dari organisasi), dinamakan ....

Explanation

An application server is a server that has a program to handle various application operations between users and databases. It is specifically designed to run applications and provide services to client computers. This server is responsible for managing the execution of applications and ensuring that they run smoothly. It acts as an intermediary between the user and the database, handling requests and processing data. Therefore, an application server is the correct answer in this context.

Submit
11. Tindakan memperoleh akses ke komputer atau jaringan komputer untuk mendapatkan atau mengubah informasi tanpa otorisasi yang sah, dinamakan ....

Explanation

Hacking refers to the act of gaining unauthorized access to a computer or computer network in order to obtain or alter information. It involves bypassing security measures and exploiting vulnerabilities in the system. Hacking can be done for various purposes, such as stealing sensitive data, causing damage to the system, or gaining control over the network.

Submit
12. Jenis kerawanan yang cukup sering terjadi sehingga akan menimbulkan masalah/kerusakan yang sangat serius, dinamakan .....

Explanation

Denial of Service (DoS) Attacks are a type of vulnerability that occurs frequently and can result in serious problems or damage. DoS attacks aim to overwhelm a system or network with excessive traffic or requests, causing it to become unavailable to legitimate users. This can lead to service disruptions, loss of data, and financial losses. Therefore, DoS attacks can cause significant harm and are considered a major concern in terms of vulnerability and security.

Submit
13. Dalam memprogram virus, seorang VM (Virus Maker = Programmer/ Pembuat Virus) sering memasukkan teknik ini agar tidak dapat dilihat & tidak dicurigai oleh pengguna komputer. Intinya virus tetap ingin eksis. Tekniknya dinamakan ....

Explanation

The correct answer is "Menambah diri" (Self-replication). In programming a virus, a Virus Maker often includes this technique to make the virus undetectable and not suspicious to computer users. The virus wants to continue to exist and spread, so it replicates itself to infect other files or systems. This technique allows the virus to multiply and increase its presence without being easily noticed.

Submit
14. Tindakan  pemalsuan  terhadap  data  /  identitas  resmi yang  dilakukan  untuk  hal yang berkaitan  dengan  pemanfaatannya.  Phising  diawali dengan  mencuri  informasi personal melalui Internet, dinamakan .....

Explanation

Phishing is a type of cyber attack where the attacker steals personal information through the internet by tricking the victim into providing sensitive data such as passwords or credit card numbers. This stolen information can then be used for fraudulent purposes. The given correct answer, "Phishing," accurately describes this process of stealing personal information through deceptive means.

Submit
15. Dibawah ini adalah kerentanan aplikasi, kecuali .....

Explanation

A proxy server is not considered a vulnerability but rather a security measure. It acts as an intermediary between a client and a server, providing anonymity and enhancing security by filtering requests and blocking malicious traffic. It can help protect against various types of attacks, including unvalidated input, broken access control, modification attacks, and denial of service attacks. Therefore, it does not fit the category of vulnerabilities mentioned in the question.

Submit
16. Dibawah ini adalah langkah menentukan policy atau kebijakan, kecuali......

Explanation

The correct answer is "Menentukan individu atau kelompok-kelompok yang akan dikenakan policy atau kebijakan tersebut." This answer is correct because it is the only option that does not directly relate to determining the services or configurations needed for the policy or determining the scope of the policy based on the individuals or groups using the network. The answer "Berdasarkan Undang-Undang ITE" is not correct as it is not mentioned in the provided information.

Submit
17. Pencurian  data  terhadap  identitas  perbankan  seseorang,  misalnya  pencurian  nomor  kartu kredit, digunakan untuk memanfaatkan saldo yang terdapat pada rekening tersebut untuk keperluan belanja online, dinamakan ........

Explanation

The correct answer is "Carding." Carding refers to the theft of someone's banking identity, such as credit card numbers, to exploit the balance in their account for online shopping purposes.

Submit
18. Orang  yang  mempelajari sistem  yang  biasanya  sukar  dimengerti  untuk  kemudian mengelolanya dan men-share hasil ujicoba yang  dilakukannya, 

Explanation

A virus maker is someone who studies and understands computer systems, specifically the vulnerabilities and weaknesses in them, in order to create and distribute malicious software known as viruses. They may find it difficult to be understood by others due to the complexity of their knowledge and skills. They use their expertise to develop viruses and share the results of their experiments, which can cause harm to computer systems and compromise the security and privacy of users.

Submit
19. Program yang  sepertinya  bermanfaat dan/atau tidak berbahaya tetapi sesungguhnya  memiliki fungsi merusak  seperti unloading  hidden  program  atau command scripts yang membuat sistem rentan gangguan, dinamakan ......

Explanation

A worm is a type of malicious program that can replicate itself and spread from computer to computer. It may appear to be useful or harmless, but it actually has a destructive function, such as unloading hidden programs or command scripts that make the system vulnerable to disruptions. Unlike viruses, worms do not need to attach themselves to an existing program or file in order to spread. They can spread through network connections or by exploiting vulnerabilities in operating systems. Therefore, a worm is the correct answer for this question.

Submit
20. Sekumpulan  teknik  untuk  memanipulasi orang  sehingga  orang  tersebut  membocorkan informasi rahasia, dinamakan ......

Explanation

not-available-via-ai

Submit
View My Results

Quiz Review Timeline (Updated): Jul 22, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jul 22, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 26, 2017
    Quiz Created by
    Nangazuz
Cancel
  • All
    All (20)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Sistem Operasi Windows memiliki Sistem yang teratur dan saling...
Yang termasuk konfigurasi Firewall adalah
Dibawah ini adalah Jenis Malware yang biasa dikenal, kecuali ......
Yang termasuk metode firewall adalah ....
Program yang berjalan pada background komputer dinamakan .....
Perangkat lunak (Software) yang masuk ke dalam komputer tanpa disadari...
Melakukan proses pengerasan suatu lapisan yang lembut sehingga lapisan...
Firewall yang dipasang pada komputer, yang menghubungkan komputer...
Program yang dibuat dengan bahasa pemrograman yang berisi perintah...
Server yang mempunyai sebuah program untuk menangani berbagai operasi...
Tindakan memperoleh akses ke komputer atau jaringan komputer untuk...
Jenis kerawanan yang cukup sering terjadi sehingga akan menimbulkan...
Dalam memprogram virus, seorang VM (Virus Maker = Programmer/ Pembuat...
Tindakan  pemalsuan  terhadap  data  / ...
Dibawah ini adalah kerentanan aplikasi, kecuali .....
Dibawah ini adalah langkah menentukan policy atau kebijakan,...
Pencurian  data  terhadap  identitas ...
Orang  yang  mempelajari sistem  yang ...
Program yang  sepertinya  bermanfaat dan/atau tidak...
Sekumpulan  teknik  untuk  memanipulasi orang ...
Alert!

Advertisement