1.
Dalam Model OSI Layer, yang berfungsi untuk menentukan pertukaran frame data yang melewati kabel adalah
Correct Answer
A. Data link layer
Explanation
The correct answer is the Data link layer. In the OSI model, the Data link layer is responsible for the exchange of data frames over the physical network. It ensures the reliable transmission of data between two directly connected devices by providing error detection and correction, flow control, and addressing. This layer also handles the framing of data into packets and the synchronization of data transmission.
2.
Action dari konfigurasi firewall mikrotik yang menolak paket dan mengirimkan pesan penolakan ICMP adalah
Correct Answer
D. Reject
Explanation
The correct answer is "Reject." In the context of a MikroTik firewall configuration, "Reject" refers to the action of denying a packet and sending an ICMP rejection message back to the source. This means that when a packet is rejected, the sender will receive a notification indicating that their packet was denied by the firewall.
3.
2 kilobyte (KB)= ..... Bits
Correct Answer
C. 16000
Explanation
One kilobyte (KB) is equal to 8,000 bits. Therefore, to convert 2 kilobytes to bits, we multiply 2 by 8,000, which gives us 16,000 bits.
4.
Tindakan merubahan terhadap tampilan suatu website secara illegal disebut
Correct Answer
A. Defacing
Explanation
Defacing is the correct answer because it refers to the act of making unauthorized changes to the appearance of a website. This can involve altering the visual elements, such as replacing images or defacing the homepage, without the owner's permission. Cracking, hacking, and phishing are related terms but they do not specifically refer to illegal changes in the appearance of a website.
5.
Kepanjangan dari VPN
Correct Answer
C. Vitrual Private Network
Explanation
The correct answer is "Virtual Private Network". A VPN is a technology that allows users to create a secure connection over a public network, such as the internet. It provides privacy and anonymity by encrypting the data that is transmitted between the user's device and the VPN server. This ensures that the user's online activities are protected from surveillance and unauthorized access.
6.
Pembagi sinyal data bagi Network Interface Card (NIC) dan sekaligus berfungsi sebagai penguat sinyal disebut
Correct Answer
A. Hub
Explanation
A hub is a device that serves as a signal divider for data signals for a Network Interface Card (NIC) and also functions as a signal amplifier. It is a networking device that connects multiple devices in a network and broadcasts the data to all connected devices. Unlike switches or routers, hubs do not have the capability to filter or direct data to specific devices. Therefore, a hub is the correct answer in this context.
7.
Usaha untuk merusak system pada jaringan, seperti Trojanhorse, Logicbom, Trapdoor, Virus, Worm dan Zombie disebut
Correct Answer
B. Destruction
Explanation
The correct answer is "Destruction" because the question asks for a term that describes the effort to damage or harm a system on a network. The options "Description," "Desepticon," and "Determination" do not accurately describe this concept.
8.
PC yang dapat difungsikan sebagai router selama memiliki lebih dari satu interface jaringan, mampu mem-fordward paket IP, serta menjalankan program untuk mengatur routing paket disebut
Correct Answer
A. Routear PC
Explanation
A PC that can function as a router is one that has multiple network interfaces, can forward IP packets, and runs programs to manage packet routing. This means that the PC is capable of receiving packets from one network interface and forwarding them to another based on the routing rules set by the programs running on it. It essentially acts as a router by performing the necessary functions to direct network traffic between different networks.
9.
10 megabit = .... bits
Correct Answer
C. 1000000
Explanation
The prefix "mega" represents a multiplier of one million. Therefore, 10 megabits is equal to 10 multiplied by one million bits, which equals 10,000,000 bits.
10.
Action dari konfigurasi firewall yang menolak paket secara diam-diam adalah
Correct Answer
D. Drop
Explanation
The correct answer is "Drop". When a firewall configuration is set to "Drop", it silently discards or ignores incoming packets without sending any response to the sender. This action helps to protect the network by not revealing its existence to potential attackers. It is different from "Reject" where a response is sent back to the sender indicating the rejection of the packet.
11.
Malicious code yang memiliki karakteristik memungkinkan mengcopy dirinya melalui jaringan komputer adalah
Correct Answer
C. Worm
Explanation
A worm is a type of malicious code that is capable of copying itself over a computer network. Unlike viruses, worms do not require a host program to spread. They can independently replicate and spread across a network, infecting multiple computers and causing damage. This makes worms particularly dangerous as they can quickly spread and infect a large number of systems. Therefore, the given correct answer for the question is "Worm".
12.
Proses mengirim data dari perangkat komputer ke perangkat lain dengan menggunakan jaringan internet disebut
Correct Answer
D. Upload
Explanation
The process of sending data from a computer device to another device using the internet is referred to as "upload".
13.
Program yang menyebabkan kerusakan sistem ketika dijalankan disebut malicious code
Correct Answer
A. True
Explanation
Malicious code refers to a program or software that is designed to cause harm or damage to a computer system or network when executed. It can include viruses, worms, trojan horses, ransomware, and other types of malware. These malicious codes can steal sensitive information, corrupt files, disrupt system operations, and even take control of the infected system. Therefore, the statement "Program yang menyebabkan kerusakan sistem ketika dijalankan disebut malicious code" is true as it accurately describes the nature and purpose of such programs.
14.
Sebutan untuk beberapa firewall logis yang berada dalam sebuah perangkat fisik (komputer atau perangkat firewall lainnya) disebut private firewall
Correct Answer
B. False
Explanation
The given statement is false. The correct term for multiple logical firewalls within a physical device (computer or another firewall device) is virtual firewalls, not private firewalls.
15.
Urutan pertama pada layer OSI adalah Application layer
Correct Answer
B. False
Explanation
The first layer in the OSI model is the Physical layer, not the Application layer. The Physical layer is responsible for the actual physical transmission of data through the network, including the electrical, mechanical, and functional aspects of the network interface. The Application layer, on the other hand, is the seventh and highest layer in the OSI model, responsible for providing network services to applications and enabling communication between the network and the user.
16.
Jenis bandwidth yang perbedaan frekuensinya dihitung dalah rentang hertz adalah bandwidth digital
Correct Answer
B. False
Explanation
The statement in the question states that the bandwidth with different frequency calculations is measured in hertz, which is incorrect. Bandwidth refers to the range of frequencies that can be transmitted over a communication channel, and it can be measured in hertz. However, the statement implies that only the bandwidth with different frequency calculations is measured in hertz, which is not true. Bandwidth can be measured in hertz for both analog and digital signals. Therefore, the correct answer is false.
17.
Jenis firewall yang bekerja pada Network layer OSI adalah Packet Filtering Layer
Correct Answer
A. True
Explanation
The given statement is true. Packet Filtering is a type of firewall that operates at the Network layer of the OSI model. It examines packets of data passing through a network and filters them based on predetermined rules. This type of firewall can analyze the source and destination IP addresses, port numbers, and other packet header information to determine whether to allow or block the packet. By working at the Network layer, Packet Filtering firewalls can provide basic security by controlling the flow of network traffic.
18.
Network Address Transaction adalah kepanjangan dari NAT
Correct Answer
B. False
Explanation
The given statement is incorrect. Network Address Transaction (NAT) is not the abbreviation for NAT. Therefore, the correct answer is False.
19.
Tindakan merubahan terhadap tampilan suatu website secara illegal disebut Phising
Correct Answer
B. False
Explanation
Phishing is not the correct term for illegally changing the appearance of a website. Phishing refers to the act of tricking individuals into revealing sensitive information, such as passwords or credit card numbers, by disguising oneself as a trustworthy entity. Illegally changing the appearance of a website would typically fall under the category of hacking or website defacement. Therefore, the correct answer is false.
20.
Malicious code yang memiliki karakteristik memungkinkan mengcopy dirinya melalui jaringan komputer adalah worm
Correct Answer
A. True
Explanation
A worm is a type of malicious code that has the ability to copy itself over a computer network. Unlike viruses, which require a host file or program to spread, worms can self-replicate and spread autonomously. They can exploit vulnerabilities in computer systems and use network connections to propagate to other computers. Therefore, it is true that a worm can copy itself through a computer network.