1.
Dibawah ini yang bukan merupakan jenis database server adalah
Correct Answer
B. Microsoft Access
Explanation
The correct answer is Microsoft Access because it is not a type of database server. Oracle, ProgrestSQL, MySql, and Microsoft SQL Server are all examples of database servers commonly used in the industry. Microsoft Access, on the other hand, is a desktop database management system that is not typically used as a server for hosting databases.
2.
Untuk menghubungkan Switch dengan Switch digunakan Kabel UTP dengan susunan
Correct Answer
E. Crossover
Explanation
To connect two switches, a crossover cable is used. A crossover cable is a type of Ethernet cable that has the transmit and receive wires crossed over at one end. This allows the transmit signals from one switch to be connected to the receive signals of the other switch, and vice versa. This configuration is necessary because switches are both DTE (Data Terminal Equipment) devices, which means they transmit and receive data, unlike a DCE (Data Communications Equipment) device like a modem, which only receives or transmits data. Therefore, a crossover cable is required to establish a direct connection between two switches.
3.
Sebuah sistem yang menyimpan informasi tentang nama host maupun nama domain dalam bentuk basis data tersebar (distributed database) di dalam jaringan komputer disebut
Correct Answer
E. Domain Name System
Explanation
Domain Name System
4.
sebuah program klien yang berjalan di komputer pengguna, yang membuat permintaan DNS dari program aplikasi, adalah..
Correct Answer
B. DNS Resolver
Explanation
DNS Resolver
5.
yang melakukan pencarian melalui DNS sebagai tanggapan permintaan dari resolver, dan mengembalikan jawaban kepada para resolver tersebut
Correct Answer
A. Recursive DNS server
Explanation
Recursive DNS server
6.
server yang memberikan jawaban terhadap permintaan dari recursor, baik dalam bentuk sebuah jawaban, maupun dalam bentuk delegasi
Correct Answer
C. Authoritative DNS
Explanation
Authoritative DNS
7.
Ian Murdock pertama kali mengumumkan Debian pada tanggal..
Correct Answer
D. 16 Agustus 1993
Explanation
16 Agustus 1993
8.
Debian 5.0 (lenny) diluncurkan pada tanggal
Correct Answer
A. 14 Februari 2009
Explanation
14 Februari 2009
9.
Debian 4.0 (etch) dirilis pada tanggal
Correct Answer
C. 8 April 2007
Explanation
8 April 2007
10.
file database yang mengatur suatu domain bekerja dalam suatu system adalah
Correct Answer
D. Db.domain
Explanation
db.domain
11.
File yang mengkonfigurasi penyetingan atau konfigurasi-konfigurasi untuk pembangunan sebuah dns server adalah
Correct Answer
A. Named.conf
Explanation
db.domain
12.
file data base yang mengatur suatu alamat ip yang dijadikan server dns oleh kita, yaitu nantinya untuk pentranslitan dari alamat ip yang kita gunakan sebagai server dns ke dalam suatu nama domain adalah
Correct Answer
D. Db.ip
Explanation
db.ip
13.
Didalam perintah named.conf yang berada di dalam bind9 file zone yang pertama berfungsi untuk menujunkan
Correct Answer
C. Nama Domain
Explanation
Nama Domain
14.
Didalam perintah named.conf yang berada di dalam bind9 file zone yang kedua berfungsi untuk menujunkan...
Correct Answer
A. Ip address
Explanation
ip address
15.
SLS Kepanjangan dari
Correct Answer
C. Softlanding Linux System
Explanation
Softlanding Linux System
16.
Perintah untuk mengidentifikasi authority untuk data zone didalam file database bind9 adalah..
Correct Answer
A. SOA smkghalib.sch.id . root . smkghalib.sch.id . (
Explanation
SOA smkghalib.sch.id . root . smkghalib.sch.id . (
17.
Perintah untuk menunjukan host DNS server didalam database bin9 adalah
Correct Answer
B. @ NS smkghalib.sch.id.
Explanation
@ NS smkghalib.sch.id.
18.
Perintah untuk memetakan domain ke alamat ip didalam database bind9 adalah
Correct Answer
D. @ A 192.168.55.1
Explanation
@ A 192.168.55.1
19.
Perintah untuk menunjukan Host yang berfungsi sebagai email didalam database bind9 adalah
Correct Answer
E. MX
Explanation
MX
20.
Perintah untuk menunjukan Host yang berfungsi sebagai email didalam database bind9 adalah
Correct Answer
B. @ NS smkghalib.sch.id.
Explanation
NS smkghalib.sch.id.
21.
protokol POP3 untuk menerima pesan menggunakan port
Correct Answer
E. 110
Explanation
The correct answer is 110. The POP3 protocol is used to receive email messages from a mail server. It operates on port 110.
22.
protokol POP3 untuk mengirim pesan menggunakan port
Correct Answer
D. 25
Explanation
The correct answer is 25. The explanation for this is that the POP3 protocol is used to retrieve email messages from a mail server. It uses port 25 to communicate with the server and retrieve the messages.
23.
Pengalamatan port juga faktor sangat penting dalam OS Linux. Port 22 Digunakan untuk konfigurasi
Correct Answer
C. Ssh
Explanation
The correct answer is "ssh". In Linux, port addressing is crucial for various functions, and port 22 specifically is used for configuring secure shell (SSH) connections. SSH is a network protocol that allows secure remote access to a computer or server. It provides encrypted communication between the client and the server, ensuring confidentiality and integrity of data transmission. Therefore, port 22 is essential for establishing secure connections and managing Linux systems.
24.
Pengalamatan port juga faktor sangat penting dalam OS Linux. Port 53 Digunakan untuk konfigurasi
Correct Answer
E. Dns
Explanation
The correct answer is "dns" because port 53 is commonly used for DNS (Domain Name System) configuration in Linux. DNS is responsible for translating domain names into IP addresses, allowing users to access websites and other network resources using human-readable names. By using port 53, DNS requests and responses can be properly routed and managed within the Linux operating system.
25.
Dari sebuah personal computer terdapat data sebagai berikut: AMD Duron 1.8 Applebred 1.8 GHz Socket A Singgle-Core DHD1800DLV1C-OEM. Data tersebut merupakan spesifikasi dari
Correct Answer
E. PROCESSOR
Explanation
The given data represents the specifications of a processor. It mentions the brand (AMD), model (Duron 1.8 Applebred), clock speed (1.8 GHz), socket type (Socket A), and core type (Single-Core). Therefore, the correct answer is "PROCESSOR."
26.
Perintah konfigurasi firewall yang digunakan untuk mengambil paket data yang masuk menuju interface LAN Card sebelum di-routingkan untuk proses redirect adalah
Correct Answer
D. PREROUTING
Explanation
The correct answer is PREROUTING. PREROUTING is a configuration command used in firewall settings to manipulate packets before they are routed. In this case, it is used to capture incoming data packets before they are redirected for further processing.
27.
Perintah konfigurasi firewall yang digunakan untuk menyisipkan baris perintah firewall baru adalah..
Correct Answer
D. -A
Explanation
The correct answer is "-A". The option "-A" is used to add a new rule to the firewall configuration. It allows users to insert a new command or rule into the firewall's rule set. This option is commonly used when configuring firewalls to specify the action, protocol, source, destination, and other parameters for a new rule.
28.
Jenis command type yang di gunakan untuk konfigurasi firewall adalah
Correct Answer
A. -L
Explanation
The correct answer is -L. The -L command type is used to list the current firewall rules and configurations. It allows users to view the existing firewall settings and see which ports are open or closed. This command is helpful for troubleshooting and managing the firewall settings effectively.
29.
Jenis parameter type yang di gunakan untuk konfigurasi firewall adalah
Correct Answer
A. MASQUERADE
Explanation
The correct answer is MASQUERADE. MASQUERADE is a parameter type used for configuring a firewall. It is used to hide the identity of a network by replacing the source IP address of outgoing packets with the IP address of the firewall. This helps in protecting the internal network from being directly exposed to the external network. The other options (-D, -sport, -A, -p tcp) are not specifically related to firewall configuration.
30.
Dibawah ini yang bukan merupakan jenis database server adalah
Correct Answer
B. Microsoft Access
Explanation
Microsoft Access is not a type of database server. It is a desktop database management system (DBMS) that is used for creating and managing small-scale databases on a single computer. The other options listed (Oracle, PostgreSQL, MySQL, and Microsoft SQL Server) are all examples of database servers, which are designed to handle larger-scale databases and provide multi-user access and advanced features for data management and manipulation.
31.
Huruf “S” di penghujung HTTPS adalah singkatan dari
Correct Answer
C. Secure
Explanation
The correct answer is "Secure." The letter "S" at the end of HTTPS stands for "Secure." HTTPS is a protocol used to secure communication over the internet. It ensures that the data transmitted between a web browser and a website is encrypted and cannot be easily intercepted or tampered with by hackers. This added layer of security is especially important when sensitive information, such as passwords or credit card details, is being transmitted.
32.
Pada komputer klient, IP Server dan port yang harus dilewati dan harus diatur secara manual merupakan jenis proxy
Correct Answer
B. Nontransparent
Explanation
The correct answer is Nontransparent. Nontransparent proxies require the IP address and port of the server to be manually configured on the client computer. This means that the client computer needs to explicitly specify the proxy server it wants to use and the port number to connect to. In contrast, transparent proxies do not require manual configuration and are typically set up at the network level, intercepting all traffic without the need for client-side configuration.
33.
Protocol yang menyediakan layanan sharing data dan printer pada jaringan local sehingga memungkinkan komputer berbasis windows dan linux saling mengakses data secara bergantian adalah
Correct Answer
B. Samba server
Explanation
Samba server is the correct answer because it is a protocol that allows for file and printer sharing between Windows and Linux computers on a local network. It enables these computers to access data from each other's shared folders, making it possible for them to share files and resources seamlessly.
34.
Perintah yang digunakan untuk menampilkan daftar proses yang terjadi dalam sistem adalah
Correct Answer
A. Ps –a
Explanation
The correct answer is "Ps –a". The command "Ps –a" is used to display a list of all processes that are currently running in the system. It provides information such as the process ID (PID), the parent process ID (PPID), the CPU usage, and the memory usage for each process. This command is commonly used in Unix and Unix-like operating systems to monitor and manage processes.
35.
Perintah yang digunakan untuk menghentikan secara pakasa proses yang sedang berjalan dalam sistem linux adalah
Correct Answer
C. Kill
Explanation
The correct answer is "kill". In Linux, the "kill" command is used to terminate or forcefully stop a running process. It sends a specified signal to the process, which can be used to gracefully terminate the process or forcefully terminate it if necessary. This command is commonly used when a process becomes unresponsive or needs to be stopped immediately.
36.
Meningkatkan Akses internet dengan penyimpanan sementara content sebuah situs pada server lokal adalah fungsi dari
Correct Answer
A. Proxy server
Explanation
A proxy server is used to improve internet access by temporarily storing the content of a website on a local server. This allows for faster access to the website and reduces the need to retrieve the content from the original server every time a user requests it. Therefore, a proxy server is the correct answer for this question.
37.
FTP adalah bagian layana jaringa yang berkerja pada layer
Correct Answer
C. Transport
Explanation
The correct answer is "Transport" because FTP (File Transfer Protocol) is a network protocol that operates at the transport layer of the TCP/IP protocol suite. The transport layer is responsible for end-to-end communication between hosts and ensures reliable and error-free data transmission. FTP uses TCP (Transmission Control Protocol) as its transport protocol to establish a connection and transfer files between a client and a server.
38.
Perintah untuk menampilkan daftar port yang sedang aktif adalah
Correct Answer
A. Nmap
Explanation
The correct answer is Nmap. Nmap is a command-line tool used for network exploration and security auditing. It is commonly used to scan and discover open ports on remote systems. By running the Nmap command, users can obtain a list of active ports on a network or a specific host.
39.
Perintah untuk mengetahui spesifikasi RAM Adalah pada perintah linux adalah
Correct Answer
C. Meminfo
Explanation
The correct answer is "Meminfo" because "Meminfo" is a command in Linux that is used to display detailed information about the system's memory usage, including the RAM specifications. This command provides information about the total amount of memory, free memory, used memory, and other memory-related statistics. Therefore, using the "Meminfo" command would allow one to obtain the specifications of the RAM in a Linux system.
40.
Perintah untuk menampilkan daftar peranti yang tertancap / Terpasang pada slot PCI pada perintah linux adalah
Correct Answer
D. Lspci
Explanation
The correct answer is "lspci." This command is used in Linux to display a list of devices connected to the PCI slots on a computer. It provides detailed information about the devices, such as the vendor, device ID, and driver being used.
41.
Jaringan yang bersifat pribadi disebut
Correct Answer
E. VPN
Explanation
A VPN (Virtual Private Network) is a private network that allows users to securely connect to a remote network over the internet. It creates a secure and encrypted connection between the user's device and the network, ensuring privacy and confidentiality of data. Therefore, a VPN is the correct answer as it refers to a private network that is specifically designed to provide secure and private communication.
42.
HTTPS Singkatan dari
Correct Answer
B. Hyper Text Transfer Protocol Secure
Explanation
HTTPS stands for Hyper Text Transfer Protocol Secure. It is the secure version of HTTP, which is the protocol used for transmitting data over the internet. HTTPS ensures that the data transmitted between a user's browser and a website is encrypted and secure from unauthorized access. This is achieved through the use of SSL (Secure Sockets Layer) or TLS (Transport Layer Security) protocols, which encrypt the data and verify the authenticity of the website. By using HTTPS, sensitive information such as passwords, credit card details, etc., can be transmitted securely, protecting the user's privacy and preventing data breaches.
43.
Aplikasi webserver yang digunakan untuk mempercepat pengiriman konten dan aplikasi, meningkatkan keamanan, memfasilitasi ketersediaan dan skalabilitas untuk situs web adalah
Correct Answer
E. NGINX
Explanation
NGINX is a web server application that is used to enhance the delivery of content and applications, improve security, and facilitate availability and scalability for websites. It is known for its high performance, scalability, and low resource usage. NGINX is often used as a reverse proxy server, load balancer, and HTTP cache, making it an ideal choice for speeding up content delivery and improving website performance. It also supports various protocols, including HTTP, HTTPS, and SMTP, making it a versatile web server solution.
44.
Server web eksklusif untuk platform Unix dan Unix (termasuk Solaris, FreeBSD, HP-UX dan Linux) adalah
Correct Answer
C. ZWS
Explanation
The correct answer is ZWS. ZWS is a server web eksklusif untuk platform Unix dan Unix (termasuk Solaris, FreeBSD, HP-UX dan Linux), which means it is a web server exclusive to Unix and Unix platforms.
45.
Program klien FTP yang memulai debutnya pada tahun 1990 sebagai klien FTP alternatif pertama, adalah
Correct Answer
D. Ncftp
Explanation
Ncftp is a program that made its debut in 1990 as the first alternative FTP client.
46.
Sebuah Komputer memiliki RAM sebesar 1.0 Gb. Jika komouter tersebut akan diinstalasi sistem operasi Linux, swap yang harus dipasang minimal sebesar
Correct Answer
D. 2.0 GB
Explanation
The correct answer is 2.0 GB. When installing a Linux operating system, it is recommended to have a swap space that is at least equal to the amount of RAM in the computer. Since the computer has 1.0 GB of RAM, the minimum swap size should be 1.0 GB.
47.
Diketahui sebuah jaringan PC client mempunyai IP address 192.168.4.18/28. Maka IP Networknya adalah
Correct Answer
C. 192.168.4.16
Explanation
The given IP address 192.168.4.18/28 has a subnet mask of /28, which means the first 28 bits are used for the network portion and the remaining 4 bits are used for the host portion. To find the network address, we need to set all the host bits to zero. In this case, the last 4 bits are 0000, so the network address is 192.168.4.16.
48.
Diketahui IP Address 172.172.17.7/27. Berapa jumlah host tiap subnet
Correct Answer
C. 32
Explanation
The correct answer is 32. In this scenario, the IP address 172.172.17.7/27 indicates that the network has a subnet mask of 27 bits. This means that the first 27 bits of the IP address are used to identify the network, while the remaining 5 bits are used to identify the hosts within the network. With 5 bits, we can have 2^5 or 32 possible combinations, which means there can be 32 hosts in each subnet.
49.
Untuk menghubungkan Switch dengan Switch digunakan Kabel UTP dengan susunan
Correct Answer
E. Crossover
Explanation
To connect two switches, a crossover cable is used. A crossover cable is a type of Ethernet cable that has the transmit and receive wires crossed over at one end. This allows the transmit signals from one switch to be connected to the receive signals of the other switch, enabling communication between them. This is different from a straight-through cable, which is used to connect a switch to a computer or other network device. A rollover cable is used to connect a switch to a router, and a serial cable is used for serial communication between devices.
50.
Ada berapa cara untuk mendapatkan sistem operasi linux microtik
Correct Answer
B. 2 Cara
Explanation
There are two ways to obtain the Linux Microtik operating system.