Online Quiz 2 - Keamanan SiSTEM Informasi

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Asambul
A
Asambul
Community Contributor
Quizzes Created: 3 | Total Attempts: 4,047
| Attempts: 1,499 | Pertanyaan: 37
Please wait...

Question 1 / 37
0 %
0/100
Score 0/100
1. "Whois” adalah salah satu alat VA yang termasuk dalam tahapan ….

Explanation

"Whois" is a tool used for gathering information about domain names, IP addresses, and other related information. It helps in discovering the ownership and contact details of a particular website or IP address. Therefore, it falls under the category of information gathering and discovery, as it assists in obtaining relevant data during the initial stages of a cybersecurity assessment or investigation.

Submit
Please wait...
About This Quiz
Online Quiz 2 - Keamanan Sistem Informasi - Quiz

Personalize your quiz and earn a certificate with your name on it!
2. Sesi komunikasi di layer transport protokol TCP/IP selalu diawali dengan sebuah mekanisme yg disebut Three Way Handshake. Mekanisme ini dapat diekploitasi sebagai sebuah lubang keamanan dengan teknik Session Spoofing & Hijacking. Lubang keamanan ini termasuk kategori …

Explanation

The correct answer is "Salah desain (design flaw)". This is because the question is discussing a security vulnerability in the Three Way Handshake mechanism in the transport layer of the TCP/IP protocol. The fact that this mechanism can be exploited for Session Spoofing & Hijacking indicates a flaw in the design of the protocol, rather than an issue with implementation, configuration, or usage.

Submit
3. Pada tahun 1995, Thomas Lopatic menemukan sebuah lubang keamanan dalam sebuah program standar sistem operasi Unix bernama “Finger” yang dapat dieksploitasi dengan teknik buffer overflow. Lubang keamanan seperti ini masuk kategori …

Explanation

The correct answer is "Salah implementasi" (Implementation error). This is because Thomas Lopatic discovered a security hole in the Unix operating system's "Finger" program, which could be exploited using buffer overflow technique. This indicates that there was an error or flaw in the way the program was implemented, leading to the security vulnerability.

Submit
4. Dengan sebuah software khusus bernama “Retina”, dapat diketahui apakah suatu sistem atau aplikasi rawan terhadap serangan atau tidak. Software seperti ini adalah salah satu alat VA yang termasuk dalam tahapan ….

Explanation

The given correct answer for this question is "Detection". This is because the "Retina" software mentioned in the question is specifically designed to determine whether a system or application is vulnerable to attacks or not. This process of identifying vulnerabilities and potential threats is a part of the detection phase in the vulnerability assessment (VA) process.

Submit
5. Sebuah message berisi nama jaringan nirkabel tertentu secara reguler di-broadcast oleh Access Point untuk membantu station mengetahui keberadaan jaringan nirkabel tersebut. Message ini disebut ….

Explanation

SSID broadcasting refers to the process in which an Access Point regularly broadcasts a message containing the name of a specific wireless network. This helps stations to identify the presence of the wireless network.

Submit
6. Mengira terhubung dengan Access Point milik fakultasnya, Dick mencoba mengakses server dengan memberikan informasi loginnya di jaringan yang salah. Tindakan ini masuk kategori ….

Explanation

Dick's action of trying to access the server by providing his login information on the wrong network is categorized as accidental association. Accidental association refers to the unintentional connection to an unauthorized network or device, thinking it is a legitimate access point. In this case, Dick mistakenly believed that he was connecting to the Access Point of his faculty, but he was actually connecting to a different network. This mistake can lead to potential security risks and unauthorized access to personal information.

Submit
7. Salah satu kelemahan teknik enkripsi WEP dalam hal password adalah ….

Explanation

The weakness of WEP encryption technique in terms of password lies in using a shared-key. This means that the same key is shared among multiple users or devices, making it easier for an attacker to intercept and guess the password. This lack of uniqueness and randomness in the shared-key makes it vulnerable to brute-force attacks and increases the likelihood of unauthorized access to the encrypted data.

Submit
8. Kesenjangan antara kondisi level keamanan aktual dengan level keamanan yang diinginkan (ideal) disebut ….

Explanation

The term "security gap" refers to the difference or distance between the actual level of security and the desired or ideal level of security. It suggests that there is a disparity or deficiency in the current security measures that need to be addressed in order to achieve the desired level of security. This term is commonly used in the context of evaluating and improving security systems and protocols.

Submit
9. Ben memaksa Access Point jaringan kampusnya untuk melakukan reassociation dengan cara mengirimkan paket-paket sampah dalam jumlah besar. Tindakan ini masuk kategori ….

Explanation

The action of Ben forcing the campus network's Access Point to reassociate by sending a large number of garbage packets falls under the category of Denial of Service. Denial of Service attacks aim to disrupt or disable a network or system by overwhelming it with a flood of malicious or useless traffic, rendering it inaccessible or unusable for legitimate users. In this case, Ben's actions are intentionally causing a disruption to the network's normal functioning by flooding it with garbage packets.

Submit
10. Tujuan dari evaluasi keamanan adalah … antara level keamanan saat ini dan level keamanan yg diinginkan.

Explanation

The correct answer is "Mengidentifikasi security gap." The purpose of security evaluation is to identify any gaps or vulnerabilities in the current security level and compare it with the desired security level. This helps in identifying any weaknesses or areas that need improvement in order to enhance the overall security measures.

Submit
11. Ancaman keamanan tertentu yg sudah dikenali/teridentifikasi disebut ….

Explanation

The correct answer is "Hazard." A hazard refers to a potential source of harm or danger that has been recognized or identified. It can include various threats to security, such as natural disasters, accidents, or intentional acts of violence. Hazards are typically assessed and managed to minimize the risks they pose to individuals, communities, or organizations.

Submit
12. Suatu pagi, Phillip mendapatkan email berisi tawaran asuransi dengan premi rendah dari sebuah perusahaan asuransi terkenal. Tertarik dengan tawaran tsb, Phillip melakukan pendaftaran termasuk dgn memasukkan informasi kartu kreditnya. Seminggu kemudian, ia menyadari telah tertipu setelah mengetahui bahwa perusahaan tsb tidak pernah memiliki tawaran seperti itu. Serangan yang dialami oleh Phillip adalah ….

Explanation

Phillip fell victim to email phishing, which is a fraudulent attempt to obtain sensitive information such as credit card details by disguising as a trustworthy entity in an electronic communication. In this case, the email offering low insurance premiums was a scam, and Phillip unknowingly provided his credit card information to the scammers. This type of attack is common and can lead to identity theft or financial loss for the victims.

Submit
13. Contoh Information System Audit yang masuk kategori automated audit adalah ….

Explanation

System log is categorized as an automated audit in the context of Information System Audit. This is because system logs are automatically generated by computer systems to record events and activities. These logs provide valuable information about the functioning of the system, including user activities, errors, security incidents, and more. Automated tools can analyze these logs to identify any anomalies or potential issues, making it an effective method for auditing and monitoring the system's performance and security.

Submit
14. Dalam model OSI, enkripsi WEP bekerja pada layer ….

Explanation

The correct answer is "Data link." In the OSI model, the data link layer is responsible for the reliable transfer of data between two nodes on a network. It provides error detection and correction, as well as flow control. WEP (Wired Equivalent Privacy) is a security protocol that operates at the data link layer, providing encryption and authentication for wireless networks. Therefore, WEP works at the data link layer in the OSI model.

Submit
15. Salah satu kelemahan teknik enkripsi WEP yang bisa dieksploitasi di level sistem operasi adalah karena ia dirancang untuk bekerja di layer datalink dan bukan di layer ….

Explanation

The weakness of the WEP encryption technique can be exploited at the application layer of the operating system. This means that the encryption is not designed to work effectively at the application layer, making it vulnerable to attacks.

Submit
16. Adi secara tidak sengaja mengatur shared folder pribadinya dengan hak akses writeable bagi user publik, sehingga bisa diekploitasi misalnya dengan memasukkan file bervirus ke dalam folder tersebut. Lubang keamanan seperti ini masuk kategori …

Explanation

Adi accidentally configured his shared folder with writeable access for public users, allowing them to exploit it by inserting virus-infected files into the folder. This security vulnerability falls under the category of "Salah konfigurasi" or "misconfiguration."

Submit
17. Satu-satunya anggota keluarga protokol 802.11 yang tidak menggunakan teknik modulasi OFDM adalah ….

Explanation

Protokol 802.11b is the correct answer because it is the only protocol among the options that does not use OFDM (Orthogonal Frequency Division Multiplexing) modulation technique. OFDM is a modulation technique used in wireless communication to increase data transfer rates and improve signal quality. Protocols 802.11a, 802.11g, and 802.11n all use OFDM, but 802.11b uses a different modulation technique called Direct Sequence Spread Spectrum (DSSS).

Submit
18. Perangkat jaringan nirkabel yang dapat digunakan untuk menghubungkan sebuah jaringan nirkabel dengan jaringan kabel adalah ….

Explanation

An access point is a wireless networking device that allows wireless devices to connect to a wired network. It acts as a bridge between the wireless network and the wired network, enabling communication between the two. Therefore, an access point is the correct answer as it can be used to connect a wireless network to a wired network.

Submit
19. Dalam proses enkripsi WEP, operasi logika yang diterapkan antara bit stream keluaran RC4 dengan plaintext adalah ….

Explanation

In the process of WEP encryption, the logical operation applied between the output bit stream of RC4 and the plaintext is XOR. XOR (exclusive OR) operation combines the bits from both inputs and produces an output where each bit is set if the corresponding bits in the inputs are different. This operation is commonly used in encryption algorithms to ensure that the encrypted data is secure and can only be decrypted using the correct key.

Submit
20. Dengan sebuah software tertentu, Jeffrey melakukan remote scanning terhadap komputer Gina dan memperoleh informasi tentang sistem operasi yg digunakan di dalam komputer tersebut. Software seperti ini adalah salah satu alat VA yang termasuk dalam tahapan ….

Explanation

The given correct answer is "Enumeration." In this scenario, Jeffrey is using a specific software to remotely scan Gina's computer and gather information about the operating system being used. Enumeration is the process of actively gathering information about a target system, such as open ports, services running, and system configurations. It is an important step in vulnerability assessment (VA) as it helps identify potential vulnerabilities and weaknesses in the system.

Submit
21. Leo dan kawan-kawannya membuka sebuah biro jasa pengelolaan keamanan sistem informasi dengan target klien perusahaan dan/atau instansi pemerintah. Bentuk usaha seperti ini disebut ….

Explanation

Leo dan kawan-kawannya membuka sebuah biro jasa pengelolaan keamanan sistem informasi dengan target klien perusahaan dan/atau instansi pemerintah. Bentuk usaha seperti ini disebut Managed Service Provider (MSP). MSP adalah penyedia jasa yang mengelola dan menyediakan layanan IT kepada klien mereka. Mereka bertanggung jawab atas pengelolaan, pemantauan, dan pemeliharaan sistem keamanan informasi klien mereka. Dalam konteks ini, Leo dan kawan-kawannya menyediakan layanan pengelolaan keamanan sistem informasi kepada perusahaan dan instansi pemerintah, sehingga menjadikan mereka sebagai Managed Service Provider (MSP).

Submit
22. Jack menelepon perusahaan XYZ dan berpura-pura menjadi karyawan kantor pusat untuk mendapatkan informasi account di server perusahaan tersebut. Tindakan ini masuk dalam kategori ….

Explanation

Jack's action of pretending to be an employee of the XYZ company's headquarters in order to gain access to account information on their server falls under the category of social engineering. Social engineering refers to the manipulation of individuals to deceive them into revealing confidential information or granting unauthorized access to systems. In this case, Jack is using deception and impersonation to manipulate the company's employees and gain access to sensitive information.

Submit
23. Alex secara sengaja meletakkan sebuah Access Point lain dalam sebuah jaringan nirkabel yang sudah ada dengan tujuan melakukan sniffing password. Tindakan ini masuk kategori ….

Explanation

The correct answer is Malicious association. This is because Alex intentionally placed another Access Point in an existing wireless network with the purpose of sniffing passwords. This action is considered malicious as it involves unauthorized access and potential harm to the network and its users.

Submit
24. Menjaga agar security gap berada pada tingkatan yg adequate (memadai, sesuai) adalah tugas dari ....

Explanation

A security mechanism refers to the various tools, techniques, and protocols implemented to protect an organization's systems and data from potential threats. It is responsible for safeguarding against security gaps or vulnerabilities by providing controls and countermeasures. While security assessments, policies, and audits play important roles in maintaining security, it is the security mechanism that actively defends against potential breaches and ensures that the security gap remains at an adequate level.

Submit
25. Ben memasang sebuah dummy-AP sebagai perantara yang menghubungkan station2 dalam jaringan nirkabel kampusnya dengan AP yang asli. Tindakan ini masuk kategori ….

Explanation

The action of installing a dummy-AP as an intermediary to connect stations in a wireless campus network with the original AP falls under the category of Man-in-the-middle attacks. In this scenario, the attacker is intercepting and potentially altering the communication between the stations and the genuine AP, allowing them to eavesdrop on sensitive information or manipulate the data being transmitted.

Submit
26. Untuk menghindari eksploitasi lubang keamanan dengan teknik Buffer Overflow, programmer harus melakukan ….

Explanation

Insufficient bound checking refers to the practice of not properly validating the size or length of input data before storing it in a buffer. This can lead to buffer overflow vulnerabilities, where an attacker can overwrite adjacent memory locations and potentially execute malicious code. To avoid this, programmers need to ensure that they validate and limit the size of input data to prevent buffer overflows and potential exploitation.

Submit
27. Account root memiliki permission level yang paling tinggi dalam sistem operasi UNIX. Salah menggunakan perintah dengan menggunakan permission level ini sangat berbahaya dan dapat merusak sistem dalam sekejab. Lubang keamanan seperti ini masuk kategori …

Explanation

The given question is asking for the category that the security vulnerability falls into when someone misuses the root account's permission level in the UNIX operating system. The correct answer is "Salah penggunaan" which translates to "Misuse" in English. This means that the vulnerability is caused by the incorrect or dangerous use of the root account, which can potentially damage the system.

Submit
28. Untuk meminimalkan ancaman keamanan, Marry ingin agar nama jaringan nirkabel yang dikelolanya tidak terdeteksi oleh station2 anggota jaringan tersebut. Teknik yang dapat digunakan untuk keperluan ini adalah ….

Explanation

Stop SSID Broadcasting is a technique that can be used to minimize security threats by preventing the wireless network name from being detected by other devices. By disabling SSID broadcasting, the network becomes "hidden" and only devices that already know the network name can connect to it. This adds an extra layer of security as it makes it more difficult for unauthorized users to discover and attempt to access the network.

Submit
29. Bill mengaduk-aduk tempat sampah di halaman belakang kantor perusahaan XYZ untuk mendapatkan informasi berharga tentang network perusahaan tersebut. Tindakan ini disebut ….

Explanation

Dumster diving is the correct answer because it refers to the act of searching through trash or garbage in order to find valuable or useful information. In the given scenario, Bill is rummaging through the trash in the backyard of XYZ company's office to gather valuable information about their network.

Submit
30. Berikut ini adalah alasan-alasan yg tepat untuk melakukan system monitoring secara berkala, kecuali:

Explanation

System monitoring is important for various reasons such as identifying new security holes, detecting configuration errors, and managing the addition of new software or hardware. However, the need for new requirements in the information system may not directly correlate with the need for regular system monitoring. This answer suggests that the need for new requirements may not be a reason to perform system monitoring periodically.

Submit
31. Dari ke-4 pendekatan untuk melakukan Security Assessment, pendekatan yang melibatkan cost analysis adalah ….

Explanation

The correct answer is Security Risk Evaluation. This approach involves analyzing the potential risks and vulnerabilities in a system or organization's security measures. It includes assessing the likelihood and impact of security threats, as well as evaluating the cost of implementing security measures to mitigate these risks. By conducting a security risk evaluation, organizations can make informed decisions about allocating resources and implementing appropriate security measures to protect their assets and data.

Submit
32. Jenni ingin agar signal AP jaringan nirkabel yang dikelolanya tidak bisa digunakan di luar gedung kantornya. Teknik yang dapat digunakan untuk keperluan ini adalah ….

Explanation

RF Shielding is a technique that can be used to prevent wireless signals from being used outside of the office building. It involves creating a physical barrier or shield around the area to block the signals from escaping. This can be done using materials that are designed to absorb or reflect the radio waves, effectively preventing them from reaching beyond the designated area. By implementing RF shielding, Jenni can ensure that the wireless signals managed by her cannot be accessed or utilized outside of her office building.

Submit
33. Dari ke-4 pendekatan untuk melakukan Security Assessment, pendekatan dimana sebagian besar pekerjaan dilimpahkan ke pihak eksternal adalah ….

Explanation

The correct answer is "Manage Service Provider". In this approach, most of the work is outsourced to external parties to manage the service provider. This means that the organization relies on external experts to assess and manage the security of their service provider. This approach allows the organization to leverage the expertise and resources of the service provider to ensure the security of their systems and data.

Submit
34. Komponen jaringan nirkabel yang tidak dispesifikasikan dalam protokol 802.11 namun memiliki tugas penting yakni menghubungkan sebuah jaringan nirkabel dengan jaringan yang lainnya, adalah....

Explanation

The distribution system is a component of a wireless network that is not specified in the 802.11 protocol but has an important task of connecting a wireless network to other networks. It serves as a bridge between the wireless network and other networks, allowing for communication and data transfer between them. This component is essential for expanding the reach and connectivity of a wireless network beyond its local area.

Submit
35. John ingin agar sesi komunikasi yang terjadi antar station dalam jaringan nirkabel yang dikelolanya tidak mudah di-spoofing oleh hacker. Teknik yang dapat digunakan untuk keperluan ini adalah ….

Explanation

WEP (Wired Equivalent Privacy) is a technique that can be used to prevent easy spoofing of communication sessions between stations in a wireless network. WEP provides a level of encryption to the data being transmitted, making it difficult for hackers to intercept and manipulate the communication. By using WEP, John can ensure that the data transmitted within his wireless network is secure and not easily spoofed by hackers.

Submit
36. Berikut ini adalah cara untuk meminimalkan peluang terjadinya serangan Social Engineering, kecuali ….

Explanation

Memperketat security mechanism yang digunakan adalah salah satu cara untuk meminimalkan peluang terjadinya serangan Social Engineering. Dengan meningkatkan keamanan pada mekanisme yang digunakan, seperti mengaktifkan fitur otentikasi dua faktor, enkripsi data, dan firewall yang kuat, dapat membuat serangan social engineering menjadi lebih sulit dilakukan oleh pihak yang tidak berwenang. Dengan demikian, menjaga keamanan pada security mechanism yang digunakan dapat membantu mengurangi risiko serangan social engineering.

Submit
37. Dari ke-4 pendekatan untuk melakukan Security Assessment, pendekatan sifatnya menyeluruh termasuk mengevaluasi strength dan weakness dari sistem keamanan yang digunakan, adalah ….

Explanation

The correct answer is Security Risk Evaluation. This approach involves conducting a comprehensive assessment of the security system used, including evaluating its strengths and weaknesses. It focuses on identifying and analyzing potential risks and threats to the system's security. By conducting a security risk evaluation, organizations can gain insights into their overall security posture and make informed decisions to mitigate risks and enhance their security measures.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 14, 2009
    Quiz Created by
    Asambul
Cancel
  • All
    All (37)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
"Whois” adalah salah satu alat VA yang termasuk dalam tahapan ….
Sesi komunikasi di layer transport ...
Pada tahun 1995, Thomas Lopatic ...
Dengan sebuah software khusus bernama ...
Sebuah message berisi nama jaringan ...
Mengira terhubung dengan Access Point ...
Salah ...
Kesenjangan antara kondisi level ...
Ben memaksa Access Point jaringan ...
Tujuan dari evaluasi keamanan adalah … ...
Ancaman keamanan tertentu yg sudah ...
Suatu pagi, Phillip mendapatkan email ...
Contoh Information System Audit yang ...
Dalam model OSI, enkripsi WEP bekerja pada layer ….
Salah ...
Adi secara tidak sengaja mengatur ...
Satu-satunya anggota keluarga protokol ...
Perangkat jaringan nirkabel yang dapat ...
Dalam ...
Dengan sebuah software tertentu, ...
Leo dan kawan-kawannya membuka sebuah ...
Jack menelepon perusahaan XYZ dan ...
Alex secara sengaja meletakkan sebuah ...
Menjaga agar security gap berada pada ...
Ben memasang sebuah dummy-AP sebagai ...
Untuk menghindari eksploitasi lubang ...
Account root memiliki permission level ...
Untuk meminimalkan ancaman keamanan, ...
Bill mengaduk-aduk tempat sampah di ...
Berikut ini adalah alasan-alasan yg ...
Dari ...
Jenni ...
Dari ...
Komponen jaringan nirkabel yang tidak ...
John ingin agar sesi komunikasi yang ...
Berikut ini adalah cara untuk ...
Dari ...
Alert!

Advertisement