Test Online Tkj 1

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Ronny Aziz
R
Ronny Aziz
Community Contributor
Quizzes Created: 1 | Total Attempts: 27,287
| Attempts: 27,287 | Pertanyaan: 50
Please wait...
Tehnik Komputer dan Jaringan
Cretae By : Ronny Aziz
Question 1 / 50
0 %
0/100
Score 0/100
1. Piranti tambahan yang digunakan dalam sebuah jaringan dengan tujuan untuk memperoleh keamanan jaringan yaitu ....

Explanation

A firewall is an additional device used in a network to enhance network security. It acts as a barrier between the internal network and external networks, filtering incoming and outgoing network traffic based on predefined security rules. It helps to protect the network from unauthorized access, malware, and other security threats by monitoring and controlling network traffic.

Submit
Please wait...
About This Quiz
Test Online Tkj 1 - Quiz

Personalize your quiz and earn a certificate with your name on it!
2. Fungsi fundamental firewall antara lain ....

Explanation

Firewalls are network security devices that monitor and control incoming and outgoing network traffic. They act as a barrier between a trusted internal network and an untrusted external network. The fundamental function of a firewall is to regulate or control the flow of network traffic. It does this by examining the data packets and enforcing predetermined security rules. This allows the firewall to allow or block specific types of traffic based on the configured rules. By managing network traffic, firewalls help in protecting the network from unauthorized access, malicious activities, and potential threats.

Submit
3. Suatu aplikasi server yang berfungsi untuk tukar menukar file daslam suatu network yang menggunakan TCP koneksi adalah ....

Explanation

File Transfer Protocol (FTP) is the correct answer because it is a server application that facilitates the exchange of files over a network using TCP connections. FTP allows users to upload, download, and manipulate files on a remote server. It is commonly used for transferring files between a client computer and a server, making it a suitable choice for the given scenario. Proxy Server, Dynamic Host Configuration Protocol (DHCP), Web Server, and Domain Name System (DNS) are not specifically designed for file exchange purposes.

Submit
4. Antena Omni memiliki pancaran radiasi sebesar ....

Explanation

The correct answer is 360 degrees. Antena Omni is known for its ability to radiate signals in all directions, covering a full 360-degree range. This means that it can transmit and receive signals from any direction without the need for adjustment or repositioning.

Submit
5. Domain Name System (DNS) adalah suatu sistem yang memungkinkan nama suatu host pada jaringan komputer atau internet ditranslasikan menjadi ....

Explanation

DNS is a system that translates domain names into IP addresses. When a user enters a domain name in their web browser, the DNS server looks up the corresponding IP address for that domain name. This IP address is then used to establish a connection with the host or server associated with the domain name. Therefore, the correct answer is IP Address.

Submit
6. Suatu aplikasi server yang berfungsi untuk tukar menukar file daslam suatu network yang menggunakan TCP koneksi adalah ....

Explanation

The correct answer is File Transfer Protocol. File Transfer Protocol (FTP) is a server application that allows for the exchange of files over a network using TCP connections. It is commonly used to transfer files between a client and a server, allowing users to upload, download, and manage files on a remote server. FTP provides a reliable and efficient method for file transfer, making it a suitable choice for exchanging files within a network.

Submit
7. Berikut yang bukan merupakan jenis kabel untuk jaringan komputer adalah ....

Explanation

BNC (Bayonet Neill-Concelman) is a type of connector used for coaxial cables, not a type of cable itself. UTP (Unshielded Twisted Pair), STP (Shielded Twisted Pair), Fiber Optic, and Coaxial Cable are all types of cables used for computer networks.

Submit
8. Salah satu peralatan atau suatu aplikasi pada sistem operasi yang dibutuhkan oleh jaringan komputer untuk melindungi integritas data atau sistem jaringan dari serangan-serangan pihak yang tidak bertanggung jawab adalah ....

Explanation

A firewall is a security tool or application that is needed by a computer network to protect the integrity of data or network systems from unauthorized attacks. It acts as a barrier between the internal network and the external network, monitoring and filtering incoming and outgoing network traffic based on predefined security rules. It helps in preventing unauthorized access, malware, and other potential threats from entering or leaving the network, thereby ensuring the security of the network and its data.

Submit
9. Mendiagnosis permasalahan perangkat yang tersambung dengan jaringan luas (wireless) merupakan tugas dari ....

Explanation

The correct answer is Administrator. An administrator is responsible for diagnosing and troubleshooting issues with devices connected to a wireless network. They have the knowledge and access to network management tools to identify and resolve any problems that may arise. Clients, users, programmers, and servers may have different roles and responsibilities within a network, but the task of diagnosing network connectivity issues falls under the domain of an administrator.

Submit
10. Network firewall umunya bersifat ....

Explanation

A network firewall is typically transparent, meaning it operates in the background and does not interfere with the normal flow of network traffic. It allows legitimate data packets to pass through while blocking unauthorized or malicious traffic. This transparency ensures that the firewall does not disrupt the network's performance or cause unnecessary delays.

Submit
11. Kepanjangan NAT adalah ....

Explanation

The correct answer is "Network Address Translation." NAT stands for Network Address Translation, which is a technique used in computer networking to translate IP addresses from one network to another. It allows multiple devices to share a single IP address, which helps conserve IP addresses and provides a level of security by hiding the internal network structure.

Submit
12. Komputer yang akan digunakan sebagai router dalam jaringan WAN harus memiliki memori minimal ....

Explanation

The computer that will be used as a router in a WAN network should have a minimum of 64 Mbyte RAM. This is because routers need sufficient memory to handle the routing tables, which contain information about the network's topology and the best paths for data packets to travel. With 64 Mbyte RAM, the router will have enough memory to efficiently process and store these routing tables, ensuring smooth and reliable network communication.

Submit
13. Di antara beberapa teknologi di bawah ini yang tidak termasuk WAN adalah ...

Explanation

Buffer is not a technology, but rather a temporary storage area in a computer's memory. It is used to hold data while it is being transferred between devices or processes. WAN (Wide Area Network) refers to a network that covers a large geographical area, typically spanning multiple locations. Modem, ISDN, Frame Relay, and DSL are all technologies that can be used to establish a connection over a WAN. Therefore, Buffer is the correct answer as it does not belong to the category of WAN technologies.

Submit
14. Router wireless card dan kabel xoac, semuanya dapat digantikan dengan satu alat yang bernama ....

Explanation

An access point is a device that allows wireless devices to connect to a wired network. It can replace both the wireless card in a router and the xoac cable, as it provides wireless connectivity and acts as a bridge between the wired and wireless networks. Therefore, an access point is the most suitable option to replace both the router wireless card and xoac cable.

Submit
15. Macam firewall ada 2 yaitu ....

Explanation

The correct answer is Personal Firewall dan Network Firewall. Personal firewalls are designed to protect individual computers from unauthorized access and malicious activities. They monitor inbound and outbound network traffic and block any suspicious or unauthorized connections. Network firewalls, on the other hand, are designed to protect an entire network by filtering and controlling incoming and outgoing traffic based on predetermined security rules. They can be hardware or software-based and are typically placed at the network perimeter to prevent unauthorized access to the network.

Submit
16. Jenis firewall yang bekerja dengan cara membandingkan alamat sumber dari paket-paket tersebut dengan kebijakan pengontrolan akses yang terdaftar dalam Access Control List firewall adalah ....

Explanation

Packet Filter Firewall adalah jenis firewall yang bekerja dengan membandingkan alamat sumber dari paket-paket dengan kebijakan pengontrolan akses yang terdaftar dalam Access Control List (ACL) firewall. Firewall ini akan memeriksa setiap paket yang masuk atau keluar dari jaringan berdasarkan aturan yang telah ditentukan dalam ACL. Jika paket sesuai dengan aturan yang ada, maka paket tersebut diteruskan. Jika tidak sesuai, maka paket tersebut akan diblokir. Dengan demikian, Packet Filter Firewall dapat mengontrol akses ke jaringan berdasarkan alamat sumber paket.

Submit
17. Peralatan yang berfungsi sebagai media penghubung antara komputer client dengan komputer client lainnya untuk membentuk jaringan adalah ....

Explanation

The correct answer is "Kabel dan Konector" because cables and connectors are essential for connecting client computers to each other to form a network. Cables transmit data signals between devices, while connectors ensure a secure and reliable connection. Without cables and connectors, it would not be possible to establish a network between client computers.

Submit
18. Suatu sistem yang memungkinkan nama suatu host pada jaringan komputer atau situs ditranslasikan menjadi IP Address adalah ....

Explanation

DNS (Domain Name System) is a system that translates domain names into IP addresses. It allows users to access websites or hosts on a computer network by using easy-to-remember domain names instead of complicated IP addresses. DNS servers store a database of domain names and their corresponding IP addresses, allowing them to efficiently resolve domain names to the correct IP addresses. Therefore, DNS is the correct answer as it enables the translation of host names into IP addresses.

Submit
19. Firewall memberikan filter pengamanan untuk, kecuali ....

Explanation

Firewall memberikan filter pengamanan untuk virus, spyware, spam, dan injection. Namun, firewall tidak memberikan filter pengamanan untuk Trojan. Trojan adalah jenis malware yang menyamar sebagai program yang berguna tetapi sebenarnya memiliki tujuan jahat. Firewall tidak secara khusus dirancang untuk mendeteksi atau mencegah Trojan, sehingga pengguna perlu menggunakan perangkat lunak keamanan tambahan untuk melindungi sistem mereka dari serangan Trojan.

Submit
20. Komputer yang dapat menentukan semua akses data baik intranet atau internet dengan aturan sistem operasi server yang telah ditetapkan atau berlaku pada setiap sistem operasi disebut ...

Explanation

A computer that can determine all data access, both intranet and internet, based on the established rules of the server operating system or the applicable rules of each operating system is called an admin.

Submit
21. Yang bertindak  sebagai  gateway terhadap  dunia internet  untuk setiap komputer client adalah ....

Explanation

A Proxy Server acts as a gateway between the client computers and the internet. It receives requests from the clients and forwards them to the appropriate web servers. It also caches web pages and files, so that if a client requests the same content again, it can be served from the cache instead of fetching it from the internet. This helps in improving performance and reducing bandwidth usage. Therefore, a Proxy Server is responsible for controlling and managing the access to the internet for client computers.

Submit
22. Layanan yang secara otomatis memberikan nomor IP kepada komputer yang memintanya disebut ....

Explanation

DHCP stands for Dynamic Host Configuration Protocol. It is a network management protocol that automatically assigns IP addresses to computers that request them. DHCP eliminates the need for manual IP address configuration, making it more efficient and convenient for network administrators. Therefore, DHCP is the correct answer to the question.

Submit
23. Jenis ancaman pada jaringan komputer yang bertujuan untuk menipu seseorang disebut ....

Explanation

IP Spoofing is a type of network threat where an attacker disguises their IP address to make it appear as if it is coming from a trusted source. This can be used to deceive someone by making them believe that the communication is coming from a legitimate source. The attacker can use this technique to bypass authentication measures or launch other malicious activities while remaining undetected.

Submit
24. Proses autentifikasi dapat digunakan tanpa intervebsi pengguna, merupakan kelebihan dari ....

Explanation

The correct answer is User dan password. Usernames and passwords are commonly used for authentication purposes in various systems and applications. One of the advantages of using user and password authentication is that it can be done without the need for user intervention. This means that the authentication process can be automated, allowing users to log in to their accounts without having to manually enter their credentials every time. This convenience makes user and password authentication a popular choice for many online services and platforms.

Submit
25. Membandingkan alamat sumber dari paket dengan kebijakan dalam access control list, merupakan cara kerja firewall ....

Explanation

A packet filter firewall works by comparing the source address of a packet with the policies set in the access control list. It allows or blocks packets based on predefined rules, such as allowing packets from trusted sources and blocking packets from suspicious or unauthorized sources. This type of firewall operates at the network layer of the OSI model and is typically implemented in routers or dedicated firewall devices. It is efficient in filtering packets based on their IP addresses and port numbers, providing a basic level of security for a network.

Submit
26. Stateful firewall tersedia pada ....

Explanation

Keiro is the correct answer because it is a network security appliance that provides stateful firewall capabilities. Cisco PIX and Cisco PIC are also network security appliances, but they do not specifically mention stateful firewall capabilities. Sun Screen is not a recognized network security appliance, and ISA Server is a Microsoft product that provides firewall and other security features, but it does not mention stateful firewall specifically. Therefore, Keiro is the most appropriate answer.

Submit
27. Yang bertindak  sebagai  gateway terhadap  dunia internet  untuk setiap komputer client adalah ....

Explanation

A Proxy Server acts as a gateway between client computers and the internet. It receives requests from clients and forwards them to the appropriate web servers. It also caches web pages and files, which helps improve performance and reduce bandwidth usage. This allows the clients to access the internet indirectly through the proxy server, which can provide additional security and control over internet usage. Therefore, a Proxy Server is the correct answer as it serves as the gateway to the internet for client computers.

Submit
28. Kepanjangan dari SPI adalah ....

Explanation

Stateful Packet Inspection (SPI) is a firewall technology that monitors the state of active network connections and inspects the incoming and outgoing packets to determine whether they are legitimate or malicious. It keeps track of the state of each network connection and uses this information to make decisions about allowing or blocking traffic. This technique provides enhanced security by analyzing the context and content of network packets, rather than just the basic information like source and destination addresses.

Submit
29. Alat yang digunakan  untuk  menghubungkan  radio  pemancar dengan  antena  outdoor  adalah ....

Explanation

The correct answer is "Access Point." An access point is a device used to connect a radio transmitter with an outdoor antenna. It acts as a bridge between the transmitter and the antenna, allowing the radio signals to be transmitted over a larger distance.

Submit
30. DHCP yang akan memberikan alamat IP ke workstation adalah ....

Explanation

The correct answer is DHCP Server. A DHCP server is responsible for assigning IP addresses to workstations and other devices on a network. It manages the pool of available IP addresses and leases them to clients when they request one. The DHCP server also provides other network configuration information, such as subnet mask and default gateway, to the clients.

Submit
31. Firewall yang dipasang pada komputer yang menghubungkan komputer dengan modem adalah ....

Explanation

A hardware firewall is the correct answer because it is a physical device that is installed between the computer and the modem to protect the network from unauthorized access and malicious attacks. It acts as a barrier and filters incoming and outgoing network traffic based on predetermined security rules. Unlike software firewalls, which are installed on individual computers, a hardware firewall provides network-wide protection and is more effective in defending against external threats.

Submit
32. Alat yang berfungsi untuk menghubungkan dua network dengan mentransfer data diantara network tersebut adalah ....

Explanation

A bridge is a device that connects two networks and transfers data between them. It operates at the data link layer of the OSI model and uses the MAC address to forward data packets between networks. Unlike a hub or a switch, a bridge does not amplify or regenerate the signal, but it intelligently filters and forwards packets based on their destination MAC address. Therefore, a bridge is the correct answer for this question.

Submit
33. IP Address dipergunakan dalam masa waktu tertentu yang disebut dengan ....

Explanation

The correct answer is "Lease Periode". IP addresses are assigned to devices for a specific period of time, known as the lease period. During this time, the device is allowed to use the IP address. After the lease period expires, the IP address may be assigned to another device.

Submit
34. Komputer yang merequest koneksi FTP server untuk tujuan tukar menukar file adalah ....

Explanation

A computer that requests a connection to an FTP server for the purpose of exchanging files is called an FTP client. FTP (File Transfer Protocol) is a standard network protocol used for transferring files between a client and a server on a computer network. The client initiates the connection to the server and sends commands to request file transfers. The server responds to these commands and transfers the requested files. Therefore, an FTP client is the correct answer in this context.

Submit
35. Salah satu tugas dari firewall adalah ....

Explanation

Firewall bertugas melindungi sumber daya. Firewall digunakan untuk mengontrol dan membatasi akses ke jaringan dan sumber daya yang ada di dalamnya. Dengan menggunakan firewall, administrator jaringan dapat mengatur kebijakan keamanan yang memungkinkan hanya akses yang sah dan diizinkan untuk mengakses sumber daya jaringan. Firewall juga dapat memblokir akses yang tidak sah atau berbahaya ke jaringan, sehingga melindungi sumber daya jaringan dari serangan dan ancaman yang mungkin terjadi.

Submit
36. Firewall yang mengontrol lalulintas jaringan melakukan penapisan terhadap koneksi disebut ....

Explanation

A firewall that controls network traffic and filters connections is commonly known as a filtering firewall. This type of firewall examines incoming and outgoing network packets and applies a set of predefined rules to determine whether to allow or block the connection. It filters the traffic based on criteria such as source and destination IP addresses, ports, protocols, and other factors. The purpose of filtering is to protect the network from unauthorized access, malicious activities, and potential security threats.

Submit
37. Elemen-elemen dibawah yang dilihat oleh inspeksi paket, kecuali ....

Explanation

Inspeksi paket melibatkan pemeriksaan konten paket data yang dikirim melalui jaringan. Elemen-elemen yang dilihat oleh inspeksi paket termasuk alamat IP komputer sumber, alamat IP komputer tujuan, protokol IP, dan informasi header. Namun, inspeksi paket tidak melibatkan melihat port IP yang terbuka. Port IP yang terbuka adalah informasi yang relevan untuk konfigurasi jaringan, tetapi tidak termasuk dalam elemen yang dilihat oleh inspeksi paket.

Submit
38. Circuit level gateway berada pada lapisan ....

Explanation

The correct answer is Session layer. Circuit level gateway operates at the Session layer of the OSI model. This layer is responsible for establishing, managing, and terminating sessions between applications. Circuit level gateways are used to control and monitor the flow of data packets based on the information in the session layer headers. They can examine the session information to determine if the connection should be allowed or denied.

Submit
39. Sebuah komputer atau program komputer yang bertindak sebagai komputer lainnya untuk melakukan request terhadap content dari internet atau intranet adalah ....

Explanation

A proxy server is a computer or computer program that acts as an intermediary for requests made by another computer to access content from the internet or intranet. It receives the request from the client computer, forwards it to the appropriate server, and then sends the response back to the client. This allows the client to access the requested content without directly connecting to the server, providing additional security and privacy.

Submit
40. Dibawah ini merupakan perangkat yang di butuhkan untuk membangun RT/RW Net, kecuali ....

Explanation

The connector is not needed to build an RT/RW Net. The other items listed, such as the access point, tower, antenna, and UTP cable, are all necessary components for establishing an RT/RW Net. The connector may refer to a cable connector or a network connector, but regardless of its type, it is not essential for building the network.

Submit
41. Sebuah software yang memberikan layanan data yang berfungsi menerima permintaan HTTP atau HTTPS adalah ....

Explanation

A web server is a software that receives HTTP or HTTPS requests and provides data services. It is responsible for hosting websites and delivering web pages to clients. When a user types a URL or clicks on a link, the web server processes the request and sends the requested information back to the user's browser. It acts as an intermediary between the user and the website, handling the communication and serving the requested data. Therefore, a web server is the correct answer for the given question.

Submit
42. Komputer yang meminta IP Address disebut ....

Explanation

The correct answer is "User." A computer that requests an IP address is typically operated by a user who needs to connect to a network or the internet. The user interacts with the computer to initiate the request for an IP address, which is necessary for the computer to communicate and access resources on the network. The other options, such as server, workstation, and personal computer, refer to different types of computers but do not specifically indicate a computer that is requesting an IP address.

Submit
43. Perangkat jaringan wireless LAN memiliki persyaratan harus saling terlihat. Syarat ini lebih dikenal dengan sebutan ....

Explanation

The correct answer is "Line Of Sight". In wireless LAN networks, devices need to have a clear line of sight to communicate effectively. This means that there should be no obstructions or physical barriers between the devices. The term "Line Of Sight" refers to the requirement for devices to be able to visually see each other in order to establish a connection.

Submit
44. Di dalam sistem operasi server terdapat berbagai macam service yang menggunakan arsitektur client atau server, kecuali ....

Explanation

Proxy Server is not a service that uses client or server architecture. Instead, it acts as an intermediary between clients and servers, forwarding client requests to the appropriate server and returning the server's response to the client. Therefore, it does not fit the criteria mentioned in the question.

Submit
45. Dibawah ini merupakan Teknologi Firewall, kecuali ....

Explanation

The correct answer is "Scurity Gateway." The other options listed are all examples of different types of firewall technologies. Packet Filtering Gateway is a type of firewall that filters packets based on specific criteria such as source and destination IP addresses. Stateful Multi Layer Inspection Firewall is a more advanced type of firewall that not only filters packets but also examines the state and content of the packets. Application Level Gateway is a firewall that operates at the application layer of the network protocol stack, providing more granular control over specific applications. Circuit Level Gateway is a type of firewall that operates at the transport layer and monitors TCP handshakes to establish and manage connections.

Submit
46. Secara mendasar firewall dapat melakukan hal-hal berikut, kecuali ....

Explanation

Firewall dapat melakukan hal-hal berikut: mengatur dan mengontrol lalu lintas jaringan, melakukan autentikasi terhadap akses, melindungi sumber daya dalam jaringan privat, serta mencatat semua kejadian dan melaporkan kepada administrator. Namun, firewall tidak melakukan pengamanan terhadap data.

Submit
47. Proses yang dilakukan oleh firewall untuk menghadang dan memproses data dalam sebuah paket untuk menentukan bahwa paket tersebut diizinkan atau ditolak ....

Explanation

The correct answer is "Inspection Packet". A firewall performs the process of inspecting and processing data within a packet to determine whether the packet should be allowed or denied. This involves analyzing the packet's source and destination addresses, ports, and other relevant information to enforce security policies and protect the network from potential threats.

Submit
48. Dibawah ini merupakan cara untuk mengamankan host server, kecuali ....

Explanation

The given options are all related to securing a host server, except for "Administrasi Server" which does not contribute to the security aspect. While "Administrasi Account" involves managing user accounts and their access privileges, "Administrasi Password" focuses on enforcing strong password policies. "Administrasi Layanan" deals with managing services running on the server, and "Administrasi Akses" involves controlling and monitoring user access to the server. However, "Administrasi Server" does not specifically address any security measures but rather refers to the overall administration and management of the server.

Submit
49. Firewall  yang didesain  untuk melindungi jaringan secara keseluruhan dari berbagai serangan disebut ....

Explanation

A network firewall is designed to protect an entire network from various attacks. It acts as a barrier between the internal network and external networks or the internet, monitoring incoming and outgoing network traffic. It can filter and block unauthorized access, prevent malicious activities, and enforce security policies. Unlike personal firewalls that are designed for individual devices, a network firewall provides centralized protection for an entire network, making it an effective solution for securing the overall network infrastructure.

Submit
50. Suatu server yang menjalani software yang berfungsi untuk memberikan layanan adalah ....

Explanation

An FTP server is a type of server that runs software designed to provide file transfer services. It allows users to upload, download, and manage files remotely over a network. Unlike a web server that serves web pages or a DNS server that resolves domain names, an FTP server specifically focuses on file transfer functionality. Therefore, an FTP server is the most suitable option among the given choices for a server that provides services related to file transfer.

Submit
View My Results

Quiz Review Timeline (Updated): Jul 22, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jul 22, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 29, 2012
    Quiz Created by
    Ronny Aziz
Cancel
  • All
    All (50)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Piranti tambahan yang digunakan dalam sebuah jaringan dengan tujuan...
Fungsi fundamental firewall antara lain ....
Suatu aplikasi server yang berfungsi untuk tukar menukar file daslam...
Antena Omni memiliki pancaran radiasi sebesar ....
Domain Name System (DNS) adalah suatu sistem yang memungkinkan nama...
Suatu aplikasi server yang berfungsi untuk tukar menukar file daslam...
Berikut yang bukan merupakan jenis kabel untuk jaringan komputer...
Salah satu peralatan atau suatu aplikasi pada sistem operasi yang...
Mendiagnosis permasalahan perangkat yang tersambung dengan jaringan...
Network firewall umunya bersifat ....
Kepanjangan NAT adalah ....
Komputer yang akan digunakan sebagai router dalam jaringan WAN harus...
Di antara beberapa teknologi di bawah ini yang tidak termasuk WAN...
Router wireless card dan kabel xoac, semuanya dapat digantikan dengan...
Macam firewall ada 2 yaitu ....
Jenis firewall yang bekerja dengan cara membandingkan alamat sumber...
Peralatan yang berfungsi sebagai media penghubung antara komputer...
Suatu sistem yang memungkinkan nama suatu host pada jaringan komputer...
Firewall memberikan filter pengamanan untuk, kecuali ....
Komputer yang dapat menentukan semua akses data baik intranet atau...
Yang bertindak  sebagai  gateway terhadap  dunia...
Layanan yang secara otomatis memberikan nomor IP kepada komputer yang...
Jenis ancaman pada jaringan komputer yang bertujuan untuk menipu...
Proses autentifikasi dapat digunakan tanpa intervebsi pengguna,...
Membandingkan alamat sumber dari paket dengan kebijakan dalam access...
Stateful firewall tersedia pada ....
Yang bertindak  sebagai  gateway terhadap  dunia...
Kepanjangan dari SPI adalah ....
Alat yang digunakan  untuk  menghubungkan  radio...
DHCP yang akan memberikan alamat IP ke workstation adalah ....
Firewall yang dipasang pada komputer yang menghubungkan komputer...
Alat yang berfungsi untuk menghubungkan dua network dengan mentransfer...
IP Address dipergunakan dalam masa waktu tertentu yang disebut dengan...
Komputer yang merequest koneksi FTP server untuk tujuan tukar menukar...
Salah satu tugas dari firewall adalah ....
Firewall yang mengontrol lalulintas jaringan melakukan penapisan...
Elemen-elemen dibawah yang dilihat oleh inspeksi paket, kecuali ....
Circuit level gateway berada pada lapisan ....
Sebuah komputer atau program komputer yang bertindak sebagai komputer...
Dibawah ini merupakan perangkat yang di butuhkan untuk membangun RT/RW...
Sebuah software yang memberikan layanan data yang berfungsi menerima...
Komputer yang meminta IP Address disebut ....
Perangkat jaringan wireless LAN memiliki persyaratan harus saling...
Di dalam sistem operasi server terdapat berbagai macam service yang...
Dibawah ini merupakan Teknologi Firewall, kecuali ....
Secara mendasar firewall dapat melakukan hal-hal berikut, kecuali ....
Proses yang dilakukan oleh firewall untuk menghadang dan memproses...
Dibawah ini merupakan cara untuk mengamankan host server, kecuali ....
Firewall  yang didesain  untuk melindungi jaringan secara...
Suatu server yang menjalani software yang berfungsi untuk memberikan...
Alert!

Advertisement