1.
Jaringan yang dapat mencakup sebuah negara disebut ... .
Correct Answer
C. WAN
Explanation
A WAN (Wide Area Network) is a network that covers a large geographical area, such as a country. It connects multiple smaller networks, such as LANs (Local Area Networks) and MANs (Metropolitan Area Networks), allowing for communication and data exchange over long distances. Therefore, a WAN is the correct answer as it refers to a network that can cover an entire country.
2.
Berikut ini merupakan manfaat jaringan komputer, kecuali ... .
Correct Answer
D. Kita dapat mengakses data orang lain tanpa diketahui
Explanation
The given answer states that the benefit of computer networks is that we can access other people's data without being detected. However, this is not a valid benefit of computer networks. In fact, accessing someone else's data without permission is illegal and unethical. The correct benefits of computer networks mentioned in the other options are: sharing resources, using data collaboratively, and having higher reliability.
3.
Kabel yang mempunyai kemampuan untuk mengirim data paling cepat adalah ... .
Correct Answer
D. Fiber optik
Explanation
Fiber optik adalah kabel yang menggunakan serat optik untuk mengirim data. Serat optik ini mampu mentransmisikan data dengan kecepatan yang sangat tinggi, bahkan lebih cepat daripada kabel-kabel lainnya seperti UTP, STP, dan Coaxial. Oleh karena itu, fiber optik dianggap sebagai kabel yang memiliki kemampuan untuk mengirim data paling cepat.
4.
Perangkat berikut yang berfungsi untuk menghubungkan dua LAN adalah ... .
Correct Answer
B. Bridge
Explanation
A bridge is a device that connects two LANs (Local Area Networks) together, allowing them to communicate with each other. Unlike a hub, which simply broadcasts data to all connected devices, a bridge intelligently filters and forwards data only to the intended destination. This helps to improve network performance and reduce unnecessary network traffic. A router, on the other hand, connects multiple networks together, including LANs and WANs (Wide Area Networks), and is responsible for directing data packets between them. A cable UTP (Unshielded Twisted Pair) is a type of network cable used to connect devices within a LAN, but it does not directly connect two LANs together.
5.
Iaringan yang menggunakan Internet Protocol namun hanya dapat diakses oleh kalangan terbatas adalah ... .
Correct Answer
D. Intranet
Explanation
An intranet is a private network that uses Internet Protocol (IP) technology but is only accessible to a limited group of people, such as employees within an organization. It is designed to provide internal communication and collaboration tools, as well as access to company resources and information. Unlike the internet, which is a public network accessible to anyone, an intranet is restricted and requires authentication to access its services. Therefore, an intranet is the correct answer as it fits the description of a network that uses IP but is accessible only to a limited group of users.
6.
Perangkat yang berfungsi untuk melindungi jaringan dari serangan luar adalah ... .
Correct Answer
B. Firewall
Explanation
A firewall is a device that is designed to protect a network from external attacks. It acts as a barrier between the internal network and the external network, monitoring and controlling incoming and outgoing network traffic. It examines the data packets and filters them based on predetermined security rules. By doing so, it prevents unauthorized access and blocks malicious traffic from entering the network. A firewall is an essential component of network security, ensuring the confidentiality, integrity, and availability of the network resources.
7.
Protokol jaringan yang berfungsi untuk mengirimkan dan menerima data ke dan dari media fisik jaringan adalah ... .
Correct Answer
D. Network interface layer
Explanation
The correct answer is Network interface layer. The network interface layer is responsible for sending and receiving data to and from the physical network media. It provides the interface between the network protocol stack and the physical network. This layer handles tasks such as framing the data into packets, addressing, error detection and correction, and media access control.
8.
Data yang dikirmkan oleh sebuah situs dalam bentuk teks dan diterima oleh browser disebut ... .
Correct Answer
A. Cookies
Explanation
When a website sends data in the form of text to a browser, it is referred to as "cookies". Cookies are small files that are stored on the user's computer and contain information about the user's browsing activity on that particular website. They are commonly used for tracking, personalization, and authentication purposes.
9.
Teknik penipuan yang dilakukan dengan memalsukan IP Address disebut ... .
Correct Answer
C. Spoofing
Explanation
Spoofing is the correct answer because it refers to the technique of deceiving or tricking someone by falsifying information, such as IP addresses, in order to gain unauthorized access or manipulate data. In this case, the question specifically mentions the act of falsifying IP addresses, which aligns with the concept of spoofing. Email spoofing, pharming, and browser hijackers are related but not specifically focused on the manipulation of IP addresses.
10.
Program yang berfungsi untuk memata-matai aktivitas korban disebut ... .
Correct Answer
D. Spyware
Explanation
Spyware adalah program yang berfungsi untuk memata-matai aktivitas korban. Program ini secara diam-diam mengumpulkan informasi pribadi pengguna seperti riwayat browsing, kata sandi, dan data sensitif lainnya. Spyware dapat menginstal dirinya sendiri tanpa sepengetahuan pengguna dan dapat menjadi ancaman serius terhadap privasi dan keamanan online seseorang.
11.
Data hasil enkripsi disebut ... .
Correct Answer
C. Cipher teks
Explanation
The correct answer is "Cipher teks" because when data is encrypted, it is transformed into a form that is not easily understood or readable. This transformed data is called cipher text.
12.
Tindakan melakukan intercepsi secara real-time yang tidak diotorisasi terhadap komunikasi pribadi disebut ... .
Correct Answer
A. Eavesdropping
Explanation
Eavesdropping refers to the unauthorized act of intercepting and listening to private communications in real-time. It involves secretly accessing and monitoring conversations or messages without the knowledge or consent of the parties involved. This can be done through various means such as wiretapping, hacking into communication channels, or using specialized equipment to capture and decode signals. Eavesdropping is considered a violation of privacy and can be illegal in many jurisdictions.
13.
Pada topologi jaringan komputer semua sentral dihubungkan secara langsung pada medium transmisi, jaringan ini disebut ... .
Correct Answer
B. Bus
Explanation
In a bus network topology, all the nodes are connected directly to a common transmission medium, such as a single cable. Each node can communicate with all other nodes by broadcasting the message onto the medium. This type of network is called a bus network.
14.
Model LAN yang pemasangannya secara melingkar dinamakan model pemasangan ... .
Correct Answer
C. Ring
Explanation
The correct answer is "Ring". In a ring network, the installation is done in a circular manner, where each device is connected to two other devices forming a closed loop. This type of network allows data to flow in only one direction, ensuring efficient and reliable communication between devices.
15.
Gambar disamping adalah ... .
Correct Answer
C. Router
Explanation
The correct answer is "Router". The explanation for this is that the picture shown is most likely depicting a router. A router is a networking device that forwards data packets between computer networks. It acts as a central hub for connecting multiple devices to a network and allows them to communicate with each other. The picture may show multiple ports or antennas, which are common features of a router.
16.
Pihak yang meminta layanan pada jaringan komputer disebut dengan ... .
Correct Answer
D. Client
Explanation
The correct answer is "client". In computer networking, the term "client" refers to a device or software application that requests services or resources from a server. In this context, the "client" is the entity that initiates communication with the server and makes requests for data or services.
17.
Gambar disamping merupakan topologi jaringan model ... .
Correct Answer
D. Bus
Explanation
The given correct answer is "Bus". The explanation for this is that the image shown represents a network topology where all devices are connected to a single cable called the "bus". In this topology, data is transmitted in both directions along the bus, and all devices on the network receive the transmitted data.
18.
Berikut ini yang merupakan contoh jaringan LAN, kecuali jaringan komputer ... .
Correct Answer
C. Antar cabang suatu bank
Explanation
The correct answer is "antar cabang suatu bank". This is because a LAN (Local Area Network) refers to a network that is confined to a small geographical area, such as a single building or campus. While all the other options mentioned (dalam laboratorium, dalam satu perusahaan, dalam satu lembaga/kantor) can be examples of LANs, connecting branches of a bank is an example of a WAN (Wide Area Network) rather than a LAN.
19.
Perbedaan sistem jaringan LAN dan WAN adalah ... .
Correct Answer
D. Koneksi ke Internet
Explanation
The correct answer is "Koneksi ke Internet". The difference between LAN (Local Area Network) and WAN (Wide Area Network) lies in their connection to the Internet. LAN refers to a network that is confined to a small geographical area, such as a home, office, or building, and does not necessarily require an Internet connection. On the other hand, WAN refers to a network that covers a larger geographical area, such as multiple buildings, cities, or even countries, and requires an Internet connection to connect different LANs or other networks together.
20.
Konektor yang dihunakan pada kabel UTP adalah ... .
Correct Answer
C. RJ 45
Explanation
The correct answer is RJ 45. RJ 45 is the connector used for UTP (Unshielded Twisted Pair) cables, which are commonly used for Ethernet networks. RJ 45 connectors have eight pins and are designed to connect to the RJ 45 ports on devices such as computers, routers, and switches. These connectors provide a secure and reliable connection for transmitting data over the network.
21.
Jaringan komputer dibangun agar sharing data, informasi dan sumber daya dapat dilakukan dengan mudah.
Correct Answer
A. True
Explanation
The statement is true because computer networks are designed to facilitate the sharing of data, information, and resources among connected devices. By connecting computers and devices together, users can easily share files, access shared resources such as printers or storage devices, and communicate with each other through various network services. This enables efficient collaboration, improves productivity, and enhances the overall functionality of the connected devices.
22.
Komunikasi data antara dua komputer terjadi dengan menggunakan protokol TCP/IP.
Correct Answer
A. True
Explanation
The given statement states that data communication between two computers occurs using the TCP/IP protocol. This is true as TCP/IP is a set of protocols that enables communication between devices on the internet or a local network. It provides reliable and secure transmission of data by breaking it into packets and ensuring their delivery. TCP/IP is widely used for internet communication, making the given statement correct.
23.
Beberapa teknologi pengaman data antara lain firewall, kriptografi, dan secure socket layer (SSL)
Correct Answer
A. True
Explanation
The statement is true. The given technologies, such as firewall, cryptography, and secure socket layer (SSL), are indeed used for data security. Firewalls are used to monitor and control incoming and outgoing network traffic, while cryptography is used to encrypt and decrypt data to protect it from unauthorized access. SSL is a protocol that provides secure communication over the internet, ensuring that data transmitted between a web server and a browser remains encrypted and secure. These technologies play a crucial role in safeguarding data from potential threats and breaches.
24.
LAN sebuah jaringan yang mampu mencakup suatu negara tertentu.
Correct Answer
B. False
Explanation
The statement is false because a LAN (Local Area Network) is a network that covers a small geographical area, such as a single building or a campus. It is not capable of covering an entire country.
25.
Perangkat yang umum terdapat dalam sebuah jaringan komputer adalah komputer server, komputer klien, kartu jaringan,hub, kabel dan konektor, repeater, bridge, router dan firewall
Correct Answer
A. True
Explanation
The given statement is true. The common devices found in a computer network include server computers, client computers, network cards, hubs, cables and connectors, repeaters, bridges, routers, and firewalls. These devices are essential for establishing and maintaining a network infrastructure, allowing communication and data transfer between different devices and users within the network.