Quiz 1 - Keamanan SiSTEM Informasi

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Asambul
A
Asambul
Community Contributor
Quizzes Created: 3 | Total Attempts: 4,047
| Attempts: 1,763 | Pertanyaan: 37
Please wait...

Question 1 / 37
0 %
0/100
Score 0/100
1. Untuk objek bertipe file dalam POSIX, “read permission” berarti:

Explanation

"Read permission" pada objek bertipe file dalam POSIX berarti bahwa pengguna diberikan izin untuk melihat atau membaca isi dari file tersebut.

Submit
Please wait...
About This Quiz
Quiz 1 - Keamanan Sistem Informasi - Quiz

2. Sebuah security policy menyatakan bahwa folder penyimpanan file harus dalam status read-only. Security mechanism yang memastikan policy ini dilaksanakan adalah:

Explanation

The correct answer is "File permission system." A file permission system allows the administrator to set specific permissions for each user or group, determining who can read, write, or execute files within a folder. By setting the folder containing the storage files to read-only status, the security policy is enforced, preventing unauthorized modifications to the files. Folder backup system, file encryption application, and automatic antivirus update are not directly related to enforcing read-only status on a folder.

Submit
3. Peralatan server jaringan merupakan jenis resource yang perlu dilindungi dan termasuk dalam kategori:

Explanation

Peralatan server jaringan merupakan jenis resource yang perlu dilindungi karena merupakan perangkat keras fisik yang digunakan untuk menjalankan dan mengelola jaringan. Peralatan server jaringan seperti server, switch, router, dan firewall memiliki nilai yang tinggi dan penting dalam menjaga keamanan dan ketersediaan jaringan. Oleh karena itu, peralatan server jaringan termasuk dalam kategori physical resource yang membutuhkan perlindungan fisik agar tidak rusak atau diakses oleh pihak yang tidak berwenang.

Submit
4. Perintah yang benar untuk memberi permission penuh kepada setiap user untuk mengakses sebuah file bernama “myfile” adalah:

Explanation

The correct answer is "chmod ugo+rwx myfile". This command grants full permission (read, write, and execute) to the owner, group, and others for the file named "myfile". The "u" represents the owner, "g" represents the group, and "o" represents others. The "+rwx" adds the read, write, and execute permissions.

Submit
5. Selain memiliki kartu ATM, seorang nasabah harus memasukkan nomor pin yang benar untuk bisa mengambil uang dari mesin ATM. Penggunaan pin seperti ini adalah salah satu contoh metode:

Explanation

Authentication is the correct answer because it refers to the process of verifying the identity of a user or entity. In this scenario, the customer needs to enter the correct PIN in order to access their account and withdraw money from the ATM. This verifies that they are the authorized user of the account.

Submit
6. Salah satu tindakan yang dilakukan oleh Kendali Akses Sistem untuk mendorong user dalam menjaga keamanan sistemnya sendiri adalah:

Explanation

One of the actions taken by System Access Control to encourage users to maintain the security of their system is by recommending updating antivirus every time the user is connected to the internet. This is because antivirus software helps to detect and remove any potential threats or malware that may enter the system through internet connections. Regularly updating the antivirus ensures that it has the latest virus definitions and security patches, providing better protection against new and emerging threats.

Submit
7. Tanda “d” pada field pertama keluaran perintah “ls” pada sistem operasi POSIX berarti:

Explanation

The letter "d" in the first field of the output of the "ls" command in the POSIX operating system signifies that the object is a directory.

Submit
8. Mengaktifkan sistem log dalam sistem operasi merupakan tindakan keamanan yang masuk dalam kategori:

Explanation

Activating system logs in an operating system is an action taken to monitor and record activities within the system. By enabling system logs, any suspicious or unauthorized activities can be detected and investigated. This helps in identifying potential security breaches or threats in real-time, allowing for timely response and mitigation. Therefore, activating system logs falls under the category of detection, as it helps in identifying and detecting security incidents or breaches.

Submit
9. Perusahaan XYZ mewajibkan semua karyawannya untuk mengganti password mereka minimal sebulan sekali. Tindakan ini berguna untuk meningkatkan unsur …. pada sistem.

Explanation

The correct answer is confidentiality. Requiring employees to change their passwords regularly helps to maintain the confidentiality of the system. By changing passwords frequently, the risk of unauthorized access or data breaches is reduced, as it becomes more difficult for individuals to guess or obtain others' passwords. This measure ensures that sensitive information remains confidential and protected from unauthorized disclosure.

Submit
10. Agus mencuri account internet-banking milik Alex dan menggunakannya untuk mentransfer sejumlah uang ke rekeningnya sendiri. Tindakan ini adalah kombinasi ancaman keamanan terhadap unsur ….

Explanation

The action of Agus stealing Alex's internet banking account and using it to transfer money to his own account is a violation of both confidentiality and integrity. Confidentiality is compromised because Agus gains unauthorized access to Alex's account, which should be kept private and confidential. Integrity is compromised because Agus manipulates the account by transferring money without Alex's consent, thus altering the integrity of the account's transactions.

Submit
11. Untuk objek bertipe file dalam POSIX, “write permission” berarti:

Explanation

"Write permission" for a file in POSIX means the ability or permission to modify the content of the file. This means that the user or process with write permission can make changes to the file's content, such as adding, editing, or deleting data within the file. It does not refer to the ability to view or execute the file.

Submit
12. Security mechanism yang digunakan untuk menghindari penerimaan email palsu adalah:

Explanation

Digital signature is a security mechanism used to avoid the acceptance of fake emails. It ensures the authenticity and integrity of the email by using cryptographic algorithms. A digital signature is created using the sender's private key, and it can be verified using the sender's public key. This ensures that the email has not been tampered with during transmission and that it has indeed been sent by the claimed sender. Digital signatures provide a higher level of security compared to passwords, antivirus, or encryption alone.

Submit
13. Pengelompokan user yang tidak termasuk dalam File System Object Permission dari POSIX adalah:

Explanation

The correct answer is "Admin". In POSIX file systems, the user groups are typically divided into three categories: Owner, Group, and Other. The owner refers to the user who created the file or directory and has the highest level of access and control over it. The group consists of other users who have been granted access to the file or directory by the owner. The "Other" category includes all remaining users who do not fall into the owner or group category. However, there is no specific category or designation for "Admin" in POSIX file systems.

Submit
14. Perintah: “chmod 770 myfile” berarti:

Explanation

The command "chmod 770 myfile" means giving full access rights to the owner and the users in the same group only. This command sets the permissions as follows: the owner has read, write, and execute permissions, the group has read, write, and execute permissions, and others have no permissions at all.

Submit
15. Jenis permission yang tidak termasuk dalam File System Object Permission dari POSIX adalah:

Explanation

The correct answer is "Copy" because file system object permissions in POSIX do not include a specific permission for copying files. The Read permission allows a user to view the contents of a file, the Write permission allows a user to modify the contents of a file, and the Execute permission allows a user to run executable files. However, there is no specific permission for copying files in POSIX.

Submit
16. Metode serangan email-bombing dilakukan dengan cara mengirimkan sejumlah besar email ke alamat email korban sehingga server emailnya menjadi lumpuh. Tujuan dari tindakan ini adalah menurunkan unsur …. dari korban.

Explanation

The correct answer is "Availability". Email-bombing is a method of attack where a large number of emails are sent to the victim's email address, causing their email server to become overwhelmed and unavailable. The objective of this action is to disrupt the availability of the victim's email service.

Submit
17. Mengupdate program Antivirus secara berkala merupakan tindakan keamanan yang masuk dalam kategori:

Explanation

Updating antivirus programs regularly is considered a preventive measure for security. By regularly updating the antivirus program, it ensures that it has the latest virus definitions and security patches, enabling it to detect and prevent new threats effectively. This helps in safeguarding the system from potential malware and viruses, reducing the risk of infections and potential damage to the system.

Submit
18. Untuk objek bertipe directory dalam POSIX, “read permission” berarti:

Explanation

"Read permission" for a directory in POSIX means having the ability to view the list of files within that directory. This permission allows the user to see the names of the files present in the directory but does not grant permission to create, delete, or access the content of the files.

Submit
19. Untuk objek bertipe directory dalam POSIX, “execute permission” berarti:

Explanation

"Execute permission" untuk objek bertipe direktori dalam POSIX berarti bahwa pengguna memiliki izin untuk mengakses dan melihat isi direktori tersebut. Ini berarti pengguna dapat membuka direktori dan melihat file dan sub-direktori yang ada di dalamnya.

Submit
20. Perintah yang digunakan untuk menampilkan detail permission sebuah file adalah:

Explanation

The correct answer is "ls". The "ls" command is used to list the files and directories in a directory. By default, it displays the file names, but with appropriate options, it can also display detailed information about the files, including their permissions. Therefore, using the "ls" command, one can view the detailed permissions of a file.

Submit
21. Perintah yang digunakan untuk merubah hak kepemilikan user sebuah file adalah:

Explanation

The command "chown" is used to change the ownership of a file. It allows the user to transfer the ownership of a file to a different user. This command is commonly used in Linux and Unix operating systems to change the ownership of files or directories. By using "chown", the user can modify the permissions and access rights of a file, giving ownership to a specific user.

Submit
22. Sebuah program trojan-horse yang sangat berbahaya disamarkan dalam sebuah game yang menarik dan dapat didownload secara gratis dari internet. Teknik ini adalah threat keamanan yang termasuk kategori:

Explanation

The correct answer is Deception. In this scenario, the trojan-horse program is disguised as an attractive and free game, tricking users into downloading it without being aware of its malicious intent. Deception involves misleading or tricking individuals into believing something false or misleading, which is exactly what is happening in this situation.

Submit
23. Security mechanism yang digunakan untuk menghindari ancaman network sniffing adalah:

Explanation

Encryption adalah mekanisme keamanan yang digunakan untuk menghindari ancaman network sniffing. Dengan menggunakan enkripsi, data yang dikirimkan melalui jaringan akan diubah menjadi bentuk yang tidak dapat dibaca oleh pihak yang tidak berwenang. Hal ini membuat sulit bagi penyerang untuk mendapatkan informasi sensitif yang dikirimkan melalui jaringan. Sehingga, penggunaan enkripsi dapat memberikan perlindungan tambahan terhadap ancaman network sniffing.

Submit
24. Setelah user sukses melewati tahapan login, sistem operasi akan menerapkan batasan-batasan keamanan terhadap user sesuai dengan skema keamanan dari user tersebut. Metode ini termasuk kategori:

Explanation

Setelah user berhasil melewati tahapan login, sistem operasi akan menerapkan batasan-batasan keamanan terhadap user sesuai dengan skema keamanan dari user tersebut. Metode ini disebut authorization, yang berarti memberikan izin atau hak akses kepada user untuk mengakses sumber daya atau melakukan tindakan tertentu dalam sistem. Dengan menggunakan metode authorization, sistem dapat memastikan bahwa user hanya dapat melakukan tindakan yang diizinkan dan tidak dapat mengakses atau melakukan tindakan yang tidak diizinkan.

Submit
25. Membuat backup isi harddisk secara berkala merupakan tindakan keamanan yang masuk dalam kategori:

Explanation

Membuat backup isi harddisk secara berkala merupakan tindakan pencegahan untuk mengamankan data. Dengan melakukan backup secara teratur, kita dapat mencegah kehilangan data yang tidak tergantikan akibat kegagalan sistem atau serangan malware. Dengan memiliki salinan data yang aman, kita dapat mengembalikan data yang hilang dengan mudah dan mengurangi dampak dari kejadian yang tidak diinginkan. Oleh karena itu, membuat backup isi harddisk secara berkala termasuk dalam kategori pencegahan.

Submit
26. Alex menerima sebuah sms tipuan yang nampaknya berasal dari sebuah perusahaan layanan komunikasi selular dan berisi pemberitahuan bahwa ia menjadi pemenang sebuah sayembara. Teknik ini termasuk ancaman keamanan unsur ….

Explanation

The correct answer is integrity. In this scenario, Alex received a deceptive SMS claiming that he won a contest from a cellular communication company. This technique involves a threat to the integrity of the information, as the message is designed to deceive and manipulate Alex.

Submit
27. Donny mengamati lalu lintas data jaringan dari dan ke komputer Lisa dengan tujuan mendapatkan password email milik Lisa. Tindakan ini adalah threat keamanan yang termasuk kategori:

Explanation

Donny's action of observing network traffic to obtain Lisa's email password is considered a threat to security because it involves the unauthorized disclosure of sensitive information. By monitoring the data traffic, Donny is accessing confidential information without permission, which can lead to potential breaches and compromise Lisa's privacy and security.

Submit
28. Elemen keamanan sistem informasi yang diukur dengan menggunakan assurance mechanism adalah:

Explanation

The correct answer is "Trust". Assurance mechanisms are used to measure the security of information systems, and trust is an important element in ensuring the security of these systems. Trust refers to the confidence or belief that users have in the system's ability to protect their information and perform as expected. By measuring trust through assurance mechanisms, organizations can assess the effectiveness of security measures and identify any weaknesses or vulnerabilities in the system.

Submit
29. Sistem operasi merupakan jenis resource yang perlu dilindungi dan termasuk dalam kategori:

Explanation

The correct answer is digital resource because operating systems are software programs that manage computer hardware and software resources. They provide a digital environment for users to interact with and control the computer system. Operating systems are stored and accessed digitally, making them a type of digital resource that needs to be protected.

Submit
30. Kelas permission “other” dalam POSIX berarti:

Explanation

The "other" permission in POSIX refers to users who are not part of the group owner. This means that it allows access to users who are not part of the specific group that owns the file or directory.

Submit
31. Jack ditangkap polisi dengan tuduhan melakukan pembobolan server di perusahaan tempatnya bekerja. Tuduhan tersebut dibuktikan oleh sistem log yang mencatat secara detil kegiatan peretasannya itu. Kasus ini membuktikan bahwa aspek ….. dari proteksi keamanan sistem perusahaan tersebut sudah cukup baik.

Explanation

The case of Jack being caught and proven guilty of hacking the company's server through detailed log records demonstrates that the aspect of accountability in the security system of the company is sufficient. Accountability refers to the ability to trace and attribute actions to individuals, ensuring that they can be held responsible for their actions. In this case, the system's ability to record and provide evidence of Jack's hacking activities highlights the effectiveness of the accountability aspect of the security system.

Submit
32. Elemen dalam ACM (Access Control Matrix) yang mengkaitkan antara objek dan subjek adalah:

Explanation

The correct answer is "Hak" because in an Access Control Matrix (ACM), "Hak" refers to the permissions or rights that are associated with both objects and subjects. These permissions determine what actions or operations a subject can perform on an object. Therefore, "Hak" is the element in the ACM that links objects and subjects by specifying the access rights or permissions.

Submit
33. Informasi nomor pin sebuah kartu ATM merupakan jenis resource yang perlu dilindungi dan termasuk dalam kategori:

Explanation

The correct answer is logical resource because the information of an ATM card's PIN is not a physical object that can be physically protected, but rather a piece of data that needs to be safeguarded through logical means such as encryption, access controls, and secure storage.

Submit
34. Jenis program berbahaya (malicious software) yang memiliki kemampuan menyembunyikan keberadaannya dalam sistem operasi sehingga pengguna tidak menyadari bahwa komputernya berada dalam bahaya, disebut:

Explanation

A rootkit is a type of malicious software that is designed to hide its presence within the operating system, making it difficult for users to detect that their computer is at risk. Unlike viruses, shareware, and spyware, which may be more easily detected and removed, a rootkit can remain hidden and continue to perform unauthorized actions on the computer without the user's knowledge. This makes rootkits particularly dangerous as they can be used to gain unauthorized access to sensitive information or control over the compromised system.

Submit
35. Berikut ini merupakan asumsi-asumsi yang harus dibuat dalam menyusun sebuah sistem keamanan, kecuali:

Explanation

The correct answer is "Policy mampu menegakkan mechanism." This statement suggests that the policy is capable of enforcing the mechanism. However, in order for a system to be secure, it is important that the mechanism is able to enforce the policy, not the other way around. The mechanism should have the necessary tools and controls to ensure that the policy is implemented and followed effectively.

Submit
36. Melakukan enkripsi pada email serta melengkapinya dengan digital signature sebelum dikirimkan merupakan tindakan keamanan yang bertujuan untuk meningkatkan unsur:

Explanation

Melakukan enkripsi pada email serta melengkapinya dengan digital signature sebelum dikirimkan bertujuan untuk meningkatkan unsur kerahasiaan (confidentiality) dan integritas (integrity) dari email tersebut. Enkripsi akan mengamankan konten email agar tidak dapat diakses oleh pihak yang tidak berwenang, sementara digital signature akan memastikan bahwa email tersebut tidak diubah atau dimanipulasi selama proses pengiriman.

Submit
37. Pernyataan-pernyataan di bawah ini adalah contoh dari security mechanism, kecuali:

Explanation

The statement "Semua proses login harus dicatat dalam log file" is not an example of a security mechanism. While logging login processes can be a security measure, it is not a security mechanism in itself. Security mechanisms refer to specific tools or techniques that are implemented to protect against threats or unauthorized access. Examples of security mechanisms in the given options include firewall, biometric authentication, and PKI encryption.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 16, 2009
    Quiz Created by
    Asambul
Cancel
  • All
    All (37)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Untuk objek bertipe file dalam POSIX, “read permission” berarti:
Sebuah security policy menyatakan bahwa ...
Peralatan server jaringan merupakan ...
Perintah ...
Selain memiliki kartu ATM, seorang ...
Salah satu tindakan yang dilakukan oleh ...
Tanda ...
Mengaktifkan sistem log dalam sistem ...
Perusahaan XYZ mewajibkan semua ...
Agus mencuri account internet-banking ...
Untuk objek bertipe file dalam POSIX, “write permission” berarti:
Security mechanism yang digunakan untuk ...
Pengelompokan user yang tidak termasuk ...
Perintah: “chmod 770 myfile” berarti:
Jenis permission yang tidak termasuk ...
Metode serangan email-bombing dilakukan ...
Mengupdate program Antivirus secara ...
Untuk objek bertipe directory dalam ...
Untuk objek bertipe directory dalam ...
Perintah ...
Perintah ...
Sebuah program trojan-horse yang sangat ...
Security mechanism yang digunakan untuk ...
Setelah user sukses melewati tahapan ...
Membuat backup isi harddisk secara ...
Alex menerima sebuah sms tipuan yang ...
Donny mengamati lalu lintas data ...
Elemen keamanan sistem informasi yang ...
Sistem operasi merupakan jenis resource ...
Kelas permission “other” dalam POSIX berarti:
Jack ditangkap polisi dengan tuduhan ...
Elemen dalam ACM (Access Control ...
Informasi nomor pin sebuah kartu ATM ...
Jenis program berbahaya (malicious ...
Berikut ini merupakan asumsi-asumsi ...
Melakukan enkripsi pada email serta ...
Pernyataan-pernyataan di bawah ini ...
Alert!

Advertisement