1.
Orang yang melakukan pembongkaran lapisan enkripsi pada informasi / data, disebut…
Correct Answer
B. Cryptoanalist
Explanation
A cryptoanalyst is someone who specializes in breaking encryption codes and deciphering encrypted information or data. They have the knowledge and skills to analyze cryptographic systems and algorithms in order to find weaknesses or vulnerabilities that can be exploited to decrypt the information. They play a crucial role in ensuring the security of encrypted data by identifying any potential weaknesses and helping to improve encryption techniques.
2.
Orang yang melakukan pengamanan terhadap informasi / data yang dimilikinya disebut…
Correct Answer
A. Cryptographer
Explanation
A cryptographer is someone who ensures the security and protection of information or data they possess. They are responsible for designing and implementing cryptographic algorithms and protocols to encrypt and decrypt sensitive data. Cryptographers play a crucial role in safeguarding information from unauthorized access and ensuring the confidentiality, integrity, and authenticity of data. They are skilled in the field of cryptography and use their expertise to develop secure systems and protect sensitive information from potential threats and attacks.
3.
Kriptografi dapat menjamin aspek confidentiality dengan cara …
Correct Answer
D. Pilihan B dan C benar
Explanation
The correct answer is "pilihan B dan C benar" because both options B and C, which are using digital signatures and using digital certificates, can ensure confidentiality in cryptography. Digital signatures can verify the authenticity and integrity of the data, while digital certificates provide a way to securely exchange encryption keys. Both methods contribute to maintaining confidentiality in cryptography.
4.
CHELSEA, jika di enkripsi dengan menggunakan algoritma CAESAR CIPHER menghasilkan :
Correct Answer
C. FKHOVHD
Explanation
The given answer "FKHOVHD" is the result of encrypting the word "CHELSEA" using the Caesar Cipher algorithm. In this algorithm, each letter in the original word is shifted a certain number of positions to the right in the alphabet. The number of positions to shift is determined by a key. Without knowing the key, it is not possible to determine the exact encryption process used. However, based on the given answer, it can be inferred that the key used in this case is 3, as each letter in "CHELSEA" has been shifted three positions to the right in the alphabet to obtain "FKHOVHD".
5.
NOP, adalah hasil enkripsi dengan menggunakan algoritma ROT 13 dari plain text…
Correct Answer
D. ABC
Explanation
The given answer "ABC" is the correct result of encrypting the plain text using the ROT 13 algorithm. ROT 13 is a simple letter substitution cipher that replaces each letter with the letter 13 positions after it in the alphabet. In this case, starting with the plain text "NOP" and rotating each letter by 13 positions, we get "ABC" as the encrypted result.
6.
Confidentially, merupakan aspek utama keamanan komputer, yang artinya ...
Correct Answer
B. Informasi hanya dapat diubah oleh pihak yang memiliki wewenang
Explanation
The correct answer implies that confidentiality is the main aspect of computer security, meaning that information can only be modified by authorized parties. This suggests that unauthorized individuals or entities cannot alter the information, ensuring its integrity and protecting it from unauthorized changes.
7.
Berikut ini adalah yang termasuk penyalahgunaan database yang disengaja..
Correct Answer
A. Anomali yang disebabkan oleh akses database yang konkuren
Explanation
The correct answer is "anomali yang disebabkan oleh akses database yang konkuren" because it refers to anomalies caused by concurrent access to the database. This means that multiple users or processes are accessing the database simultaneously, leading to inconsistencies and errors in the data.
8.
Keamanan komputer terdiri dari 6 aspek keamanan, di bawah ini yang tidak termasuk ke 6 aspek itu adalah…
Correct Answer
C. Repudiation
Explanation
The correct answer is "Repudiation." Repudiation refers to the denial or rejection of responsibility or validity of a claim or action. While it is an important concept in other areas, such as legal or business contexts, it is not typically considered one of the six aspects of computer security. The six aspects of computer security usually include authentication, integrity, confidentiality, availability, non-repudiation, and accountability.
9.
Penyebab Meningkatnya Kejahatan Komputer adalah sebagai berikut : ....
Correct Answer
C. Semua jawaban benar
Explanation
The correct answer is "Semua jawaban benar" because all of the given options are valid reasons for the increase in computer crimes. The increasing use of information technology and computer networks in business applications, the transition from single-vendor to multi-vendor systems, and the complexity of the systems being used can all contribute to the rise in computer crimes.
10.
Ilmu dan seni menyembunyikan (embedded) informasi dengan cara menyisipkan pesan di dalam pesan lain adalah...
Correct Answer
A. Steganography
Explanation
Steganography is the correct answer because it refers to the practice of hiding information within other forms of data or messages. It involves concealing the existence of the hidden information, making it difficult for anyone to detect or decipher without the proper knowledge or tools. Steganography can be used in various forms, such as embedding messages in images, audio files, or even text. It is a technique commonly used for covert communication or to protect sensitive information from being discovered.
11.
Kata " “steganos” yang berarti tulisan tersembunyi berasal dari bahasa?...
Correct Answer
B. Yunani
Explanation
The word "steganos" meaning hidden writing originates from the Greek language.
12.
Berikut ini yang termasuk dalam Properti Steganografi adalah sebagai berikut, Kecuali .....
Correct Answer
C. Straight-object
Explanation
The given options are all related to steganography, which is the practice of hiding information within other forms of data. "Embedded message" refers to the hidden text that is concealed within a cover object. "Cover-object" is the term used for the original data that is used to hide the embedded message. "Stego-object" is the resulting data after the embedded message has been hidden within the cover object. However, "straight-object" does not have any clear meaning or relevance in the context of steganography. Therefore, it is the exception in this list of steganography properties.
13.
Apakah yang dimaksud dengan metode Least Significant Bit (LSB) pada steganografi?
Correct Answer
D. Teknik ini dilakukan dengan menyisipkan setiap bit content (data rahasia) ke dalam bit rendah atau bit paling kanan atau disebut juga Least Significant Bit (LSB) dari data carrier (file penampung).
Explanation
The Least Significant Bit (LSB) method in steganography refers to the technique of embedding each bit of secret data into the least significant bit or the rightmost bit of the carrier file. This method is chosen because the least significant bit has the least impact on the overall value of the pixel or byte, making it less likely to be detected by visual inspection. By replacing these least significant bits with the bits of the secret message, the original carrier file can be used to hide the confidential information without raising suspicion.
14.
Apa keuntungan menggunakan metode LSB dalam Steganografi?...
Correct Answer
A. Mudah diimplementasikan dan proses encoding cepat
Explanation
The advantage of using the LSB method in Steganography is that it is easy to implement and the encoding process is fast. This means that it can be quickly applied to hide information within a cover object without significant delays or complications.
15.
Berikut yang termasuk dalam dokumen digital adalah sebagai berikut, kecuali.......
Correct Answer
B. Semua jawaban benar
Explanation
Semua jawaban benar berarti semua opsi yang disebutkan sebelumnya termasuk dalam dokumen digital. Citra dalam format JPEG, GIF, BMP, dan TIFF, audio dalam format MP3 dan WAV, serta video dalam format MPEG semuanya dapat dikategorikan sebagai dokumen digital.
16.
Berikut ini adalah jenis-jenis Watermarking adalah?.....
Correct Answer
D. Semua jawaban benar
Explanation
The correct answer is "Semua jawaban benar" which means "All answers are correct" in English. This means that all of the listed options, which are Image Watermarking, Video Watermarking, and Audio Watermarking, are types of watermarking.
17.
Persyaratan umu watermarking adalah sebagai berikut, kecuali .....
Correct Answer
D. Unsecure
Explanation
The given correct answer is "Unsecure". This is because the question is asking for an exception to the requirements of watermarking. The other options - imperceptible, robustness, and secure - all relate to the qualities that are typically expected from watermarking techniques. However, "unsecure" goes against the requirement of watermarking, as it implies that the technique is not able to provide security or protection against unauthorized use or tampering.
18.
Tujuan utama dari Watermarking adalah sebagai berikut: .......
Correct Answer
C. Perlindungan copyright, Pembuktian kepemilikan (ownership), fingerprinting.
.
Explanation
The main purpose of watermarking is to protect copyright, provide proof of ownership, and enable fingerprinting. Watermarking allows for the embedding of identifying information into digital media, such as images or videos, to deter unauthorized use and provide evidence of ownership. This can be useful for artists, photographers, or content creators who want to protect their intellectual property. Additionally, watermarking can also serve as a way to track and identify the source of leaked or pirated content, making it a valuable tool for copyright enforcement.
19.
Temukan pesan yang terkandung dalam kalimat berikut ini. catatan, ambillah kata depan tiap kata dan susunlah.jika aku menangisselalu aku teringat upayamumemang akan lebih afdol melihatmubolehkah orang mengetahui?mengapa embun luluh, embun di atas kota
Correct Answer
B. Jam satu malam bom akan meledak
Explanation
The correct answer is "Jam satu malam bom akan meledak" which translates to "At one o'clock in the morning, the bomb will explode." This sentence implies a warning about a bomb that is set to explode at a specific time. It emphasizes the urgency and potential danger associated with the situation.
20.
Jelaskan alasan kita mempelajari algoritma klasik?
Correct Answer
A. Memahami konsep dasar kriptografi
Explanation
Algoritma klasik perlu dipelajari untuk memahami konsep dasar kriptografi. Dengan mempelajari algoritma klasik, kita dapat memahami bagaimana algoritma kriptografi bekerja dan bagaimana mereka digunakan untuk mengamankan data. Selain itu, mempelajari algoritma klasik juga membantu kita membedakan antara berbagai algoritma yang tersedia dalam kriptografi, sehingga kita dapat memilih yang paling sesuai untuk kebutuhan spesifik. Selain itu, memahami kelemahan dan kelebihan setiap algoritma klasik juga penting dalam memilih algoritma yang tepat untuk digunakan.
21.
Berikut contoh algoritma klasik adalah sebagai berikut: ....
Correct Answer
D. Cipher Substitusi dan cipher Transposisi
Explanation
The given answer states that "Cipher Substitusi dan cipher Transposisi" are examples of classical algorithms. These algorithms involve substituting or transposing characters in a message to create a cipher. In a substitution cipher, each letter in the original message is replaced with another letter according to a predetermined rule. In a transposition cipher, the letters in the original message are rearranged in a specific order. Both of these techniques have been used historically for secure communication and are considered classical algorithms in cryptography.
22.
Kata berikut "AWASI" jika digeser 3 hruf ke kanan akan memperoleh ciphertext?....
Correct Answer
C. DZDVL
Explanation
The given word "AWASI" is shifted 3 letters to the right to obtain the ciphertext "DZDVL". Each letter in "AWASI" is replaced with the letter that is 3 positions to the right in the alphabet. The letter "A" is replaced with "D", "W" with "Z", "A" with "D", "S" with "V", and "I" with "L". Therefore, the correct answer is "DZDVL".
23.
Berikut ini adalah jenis-jenis Cipher Substitusi adalah sebagai berikut, kecuali.....
Correct Answer
B. Caesar cipher
Explanation
The given options list different types of substitution ciphers, but one of them is not a type of substitution cipher. The Caesar cipher is a type of substitution cipher where each letter in the plaintext is shifted a certain number of positions down the alphabet. Therefore, the correct answer is Caesar cipher.
24.
Apa yang dimaksud dengan Cipher substitusi poligram?
Correct Answer
A. Blok karakter disubstitusi dengan blok cipherteks
Explanation
Cipher substitusi poligram adalah metode enkripsi di mana blok karakter digantikan dengan blok cipherteks. Ini berarti bahwa setiap blok karakter dalam plainteks akan digantikan dengan blok cipherteks yang sesuai. Metode ini tidak melibatkan perubahan posisi karakter atau penggunaan kunci berbeda. Setiap karakter plainteks hanya dipetakan ke salah satu karakter cipherteks yang mungkin.
25.
Apa yang dimaksud dengan Cipher abjad-tunggal?
Correct Answer
B. Satu karakter di plainteks diganti dengan satu karakter yang bersesuaian
Explanation
Cipher abjad-tunggal refers to a substitution cipher where each character in the plaintext is replaced with a corresponding character in the ciphertext. This means that for every character in the plaintext, there is a specific character in the ciphertext that replaces it. This type of cipher does not involve the use of multiple keys or substitution of blocks of characters. It is a simple substitution cipher that replaces one character with another.
26.
Apa yang dimaksud dengan Cipher Transposisi?...
Correct Answer
C. Ciphereteks diperoleh dengan mengubah posisinya
Explanation
Cipher Transposisi adalah metode enkripsi di mana ciphereteks diperoleh dengan mengubah posisi blok karakter. Dalam metode ini, urutan karakter dalam pesan asli diubah sesuai dengan aturan tertentu yang ditentukan oleh kunci. Jadi, jawaban yang benar menjelaskan bahwa ciphereteks diperoleh dengan mengubah posisinya.
27.
Berikut ini adalah jenis-jenis Cipher Substitusi, kecuali .........
Correct Answer
D. Poligon
Explanation
The given options are all types of substitution ciphers except for "Poligon".
28.
Apa yang dimaksud dengan "Monoalfabet"?
Correct Answer
A. Setiap karakter chipertext menggantikan satu macam karakter plaintext
Explanation
Monoalfabet encryption is a type of encryption where each character in the ciphertext replaces only one type of character in the plaintext. This means that each character in the ciphertext corresponds to a specific character in the plaintext and is not used to represent multiple characters.
29.
Apa yang dimaksud dengan "Polyalfabet" ?...
Correct Answer
C. Setiap karakter chipertext menggantikan lebih dari satu macam karakter plaintext
Explanation
"Polyalfabet" refers to a type of encryption where each character in the ciphertext replaces more than one type of character in the plaintext. This means that multiple characters in the plaintext can be encrypted into a single character in the ciphertext.
30.
Apa yang dimaksud dengan " Monograf /unilateral" ?...
Correct Answer
B. Satu enkripsi dilakukan terhadap satu karakter plaintext
Explanation
"Monograf /unilateral" refers to a type of encryption where each character of the plaintext is replaced by a single character of the ciphertext. In this case, the correct answer states that one encryption is performed on one character of the plaintext.
31.
Apa yang dimaksud dengan "Polygraf /multilateral" ?
Correct Answer
D. Satu enkripsi dilakukan terhadap lebih dari satu karakter plaintext
Explanation
The correct answer states that "Satu enkripsi dilakukan terhadap lebih dari satu karakter plaintext" which means "One encryption is performed on more than one character of plaintext." This suggests that in a "Polygraf /multilateral" encryption, multiple characters of plaintext are encrypted together, rather than each character being replaced by a different character in the ciphertext.
32.
Dalam enkripsi kita mengenal Vigenere cipher. bentuk bangun apa yang digunakan?
Correct Answer
A. Bujur sangkar
Explanation
The correct answer is "Bujur sangkar." In the Vigenere cipher, a square or table known as the Vigenere square or Vigenere tableau is used. It is a grid of alphabets, where each row is shifted to the left by one position compared to the previous row. The Vigenere square is used to encrypt and decrypt messages by finding the intersection of the plaintext and key letters. Therefore, the answer "Bujur sangkar" refers to the square shape of the Vigenere square used in the encryption process.
33.
Berikut ini adalah jeni-jenis algoritma simestri sebagai berikut ......
Correct Answer
B. AES
Explanation
The given list consists of different types of symmetric algorithms. Out of the given options, AES is the correct answer. AES (Advanced Encryption Standard) is a widely used symmetric encryption algorithm that is known for its security and efficiency. It is used for encrypting and decrypting data in various applications and industries.
34.
Berikut adalah jenis dari algoritma asimetris, kecuali.....
Correct Answer
C. MD5
Explanation
The given options RSA, DH, and DSA are all examples of asymmetric algorithms, which means they use different keys for encryption and decryption. However, MD5 is a hashing algorithm, not an asymmetric algorithm. Hashing algorithms are used to generate a fixed-size string of characters (hash value) from input data, and they are commonly used for data integrity checks. Therefore, MD5 is not a type of asymmetric algorithm.
35.
Siapakah penemu Algoritma RSA?
Correct Answer
A. Ron Rivest, Adi Shamir, dan Leonard Adleman
Explanation
Ron Rivest, Adi Shamir, and Leonard Adleman are the inventors of the RSA algorithm. The RSA algorithm is a widely used encryption and decryption method in computer security. It is named after the initials of the inventors' last names. This algorithm is based on the mathematical properties of large prime numbers and is used for secure communication and data transmission over networks.
36.
Ilmu yang mempelajari tentang kriptografi adalah?
Correct Answer
A. Cryptology
Explanation
Cryptology is the correct answer because it is the study of cryptography, which includes both the techniques of encryption and decryption, as well as the analysis and breaking of codes. Cryptology encompasses both cryptanalysis, which focuses on breaking codes and ciphers, and cryptosystems, which involve the creation and use of codes and ciphers for secure communication. Therefore, cryptology is the broadest term that encompasses the study of cryptography as a whole.
37.
Apa yang dimaksud dengan "Kerahasiaan Data" dalam Kriptografi?
Correct Answer
B. Layanan yang digunakan untuk menjaga isi dari informasi dari siapapun kecuali yang memiliki Otoritas atau kunci rahasia untuk membuka/mengupas informasi yang telah disandi
Explanation
"Kerahasiaan Data" dalam kriptografi merujuk pada layanan yang digunakan untuk menjaga isi informasi agar tidak dapat diakses oleh siapa pun kecuali mereka yang memiliki otoritas atau kunci rahasia untuk membuka/menguraikan informasi yang telah dienkripsi. Dengan menggunakan teknik kriptografi, data dapat diubah menjadi bentuk yang tidak dapat dibaca atau dimengerti oleh pihak yang tidak berwenang. Hal ini memastikan bahwa hanya pihak yang memiliki akses yang tepat yang dapat membaca atau mengakses informasi yang terenkripsi tersebut.
38.
Apa yang dimaksud dengan " Non-Repudiasi " dalam kriptografi "
Correct Answer
C. Usaha untuk mencegah terjadinya penyangkalan terhadap pengiriman/terciptanya suatu informasi oleh yang mengirimkan/membuat.
Usaha untuk mencegah terjadinya penyangkalan terhadap pengiriman/terciptanya suatu informasi oleh yang mengirimkan/membuat
Explanation
Non-repudiation in cryptography refers to the effort to prevent the denial of sending/creating information by the sender/creator. It ensures that the sender cannot later deny sending the information and provides evidence of the authenticity and integrity of the information. This is important in maintaining the security and trustworthiness of communication and transactions.
39.
Apa yang dimaksud dengan " Integritas data " dalam kriptografi "
Correct Answer
A. Berhubungan dengan penjagaan dari perubahan data secara tidak sah
Explanation
Integritas data dalam kriptografi berarti penjagaan dari perubahan data secara tidak sah. Ini berarti bahwa data harus tetap utuh dan tidak boleh diubah oleh pihak yang tidak berwenang. Dalam kriptografi, teknik seperti hashing digunakan untuk memastikan integritas data, di mana checksum atau nilai hash dari data dikirim bersama dengan data itu sendiri, dan penerima dapat memverifikasi apakah data telah diubah atau tidak dengan membandingkan nilai hash yang diterima dengan nilai hash yang dihitung dari data yang diterima.
40.
Apa yang dimaksud dengan "Autentikasi" dalam kriptografi"
Correct Answer
D. Berhubungan dengan identifikasi/pengenalan, baik secara kesatuan sistem maupun informasi itu sendiri.
Explanation
The term "Autentikasi" in cryptography refers to the process of identification and recognition, both in terms of the overall system and the information itself. It involves verifying the authenticity of a user or entity attempting to access the information or system. This ensures that only authorized individuals or entities are granted access, enhancing the security and integrity of the information.