Remedial Administrasi Infrastruktur Jaringan

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Khusairi
K
Khusairi
Community Contributor
Quizzes Created: 1 | Total Attempts: 694
| Attempts: 694 | Questions: 20
Please wait...
Question 1 / 20
0 %
0/100
Score 0/100
1. Dalam Model OSI Layer, yang berfungsi untuk menentukan pertukaran frame data yang melewati kabel adalah

Explanation

The correct answer is the Data link layer. In the OSI model, the Data link layer is responsible for the exchange of data frames over the physical network. It ensures the reliable transmission of data between two directly connected devices by providing error detection and correction, flow control, and addressing. This layer also handles the framing of data into packets and the synchronization of data transmission.

Submit
Please wait...
About This Quiz
Remedial Administrasi Infrastruktur Jaringan - Quiz

Kerjakan dengan jujur dan jangan lupa berdoa

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. Malicious code yang memiliki karakteristik memungkinkan mengcopy dirinya melalui jaringan komputer adalah worm

Explanation

A worm is a type of malicious code that has the ability to copy itself over a computer network. Unlike viruses, which require a host file or program to spread, worms can self-replicate and spread autonomously. They can exploit vulnerabilities in computer systems and use network connections to propagate to other computers. Therefore, it is true that a worm can copy itself through a computer network.

Submit
3. PC yang dapat difungsikan sebagai router selama memiliki lebih dari satu interface jaringan, mampu mem-fordward paket IP, serta menjalankan program untuk mengatur routing paket disebut

Explanation

A PC that can function as a router is one that has multiple network interfaces, can forward IP packets, and runs programs to manage packet routing. This means that the PC is capable of receiving packets from one network interface and forwarding them to another based on the routing rules set by the programs running on it. It essentially acts as a router by performing the necessary functions to direct network traffic between different networks.

Submit
4. 2 kilobyte (KB)= ..... Bits

Explanation

One kilobyte (KB) is equal to 8,000 bits. Therefore, to convert 2 kilobytes to bits, we multiply 2 by 8,000, which gives us 16,000 bits.

Submit
5. 10 megabit = .... bits

Explanation

The prefix "mega" represents a multiplier of one million. Therefore, 10 megabits is equal to 10 multiplied by one million bits, which equals 10,000,000 bits.

Submit
6. Action dari konfigurasi firewall mikrotik yang menolak paket dan mengirimkan pesan penolakan ICMP adalah

Explanation

The correct answer is "Reject." In the context of a MikroTik firewall configuration, "Reject" refers to the action of denying a packet and sending an ICMP rejection message back to the source. This means that when a packet is rejected, the sender will receive a notification indicating that their packet was denied by the firewall.

Submit
7. Pembagi sinyal data bagi Network­ Interface Card (NIC) dan sekaligus berfungsi sebagai penguat sinyal disebut

Explanation

A hub is a device that serves as a signal divider for data signals for a Network Interface Card (NIC) and also functions as a signal amplifier. It is a networking device that connects multiple devices in a network and broadcasts the data to all connected devices. Unlike switches or routers, hubs do not have the capability to filter or direct data to specific devices. Therefore, a hub is the correct answer in this context.

Submit
8. Malicious code yang memiliki karakteristik memungkinkan mengcopy dirinya melalui jaringan komputer adalah

Explanation

A worm is a type of malicious code that is capable of copying itself over a computer network. Unlike viruses, worms do not require a host program to spread. They can independently replicate and spread across a network, infecting multiple computers and causing damage. This makes worms particularly dangerous as they can quickly spread and infect a large number of systems. Therefore, the given correct answer for the question is "Worm".

Submit
9. Program yang menyebabkan kerusakan sistem ketika dijalankan disebut malicious code

Explanation

Malicious code refers to a program or software that is designed to cause harm or damage to a computer system or network when executed. It can include viruses, worms, trojan horses, ransomware, and other types of malware. These malicious codes can steal sensitive information, corrupt files, disrupt system operations, and even take control of the infected system. Therefore, the statement "Program yang menyebabkan kerusakan sistem ketika dijalankan disebut malicious code" is true as it accurately describes the nature and purpose of such programs.

Submit
10. Jenis firewall yang bekerja pada Network layer OSI adalah Packet Filtering Layer

Explanation

The given statement is true. Packet Filtering is a type of firewall that operates at the Network layer of the OSI model. It examines packets of data passing through a network and filters them based on predetermined rules. This type of firewall can analyze the source and destination IP addresses, port numbers, and other packet header information to determine whether to allow or block the packet. By working at the Network layer, Packet Filtering firewalls can provide basic security by controlling the flow of network traffic.

Submit
11. Kepanjangan dari VPN

Explanation

The correct answer is "Virtual Private Network". A VPN is a technology that allows users to create a secure connection over a public network, such as the internet. It provides privacy and anonymity by encrypting the data that is transmitted between the user's device and the VPN server. This ensures that the user's online activities are protected from surveillance and unauthorized access.

Submit
12. Proses mengirim data dari perangkat komputer ke perangkat lain dengan menggunakan jaringan internet disebut

Explanation

The process of sending data from a computer device to another device using the internet is referred to as "upload".

Submit
13. Action dari konfigurasi firewall yang menolak paket secara diam-diam adalah

Explanation

The correct answer is "Drop". When a firewall configuration is set to "Drop", it silently discards or ignores incoming packets without sending any response to the sender. This action helps to protect the network by not revealing its existence to potential attackers. It is different from "Reject" where a response is sent back to the sender indicating the rejection of the packet.

Submit
14. Tindakan merubahan terhadap tampilan suatu website secara illegal disebut

Explanation

Defacing is the correct answer because it refers to the act of making unauthorized changes to the appearance of a website. This can involve altering the visual elements, such as replacing images or defacing the homepage, without the owner's permission. Cracking, hacking, and phishing are related terms but they do not specifically refer to illegal changes in the appearance of a website.

Submit
15. Urutan pertama pada layer OSI adalah Application layer

Explanation

The first layer in the OSI model is the Physical layer, not the Application layer. The Physical layer is responsible for the actual physical transmission of data through the network, including the electrical, mechanical, and functional aspects of the network interface. The Application layer, on the other hand, is the seventh and highest layer in the OSI model, responsible for providing network services to applications and enabling communication between the network and the user.

Submit
16. Network Address Transaction adalah kepanjangan dari NAT

Explanation

The given statement is incorrect. Network Address Transaction (NAT) is not the abbreviation for NAT. Therefore, the correct answer is False.

Submit
17. Tindakan merubahan terhadap tampilan suatu website secara illegal disebut Phising

Explanation

Phishing is not the correct term for illegally changing the appearance of a website. Phishing refers to the act of tricking individuals into revealing sensitive information, such as passwords or credit card numbers, by disguising oneself as a trustworthy entity. Illegally changing the appearance of a website would typically fall under the category of hacking or website defacement. Therefore, the correct answer is false.

Submit
18. Usaha untuk merusak system pada jaringan, seperti Trojanhorse, Logicbom, Trapdoor, Virus, Worm dan Zombie disebut

Explanation

The correct answer is "Destruction" because the question asks for a term that describes the effort to damage or harm a system on a network. The options "Description," "Desepticon," and "Determination" do not accurately describe this concept.

Submit
19. Sebutan  untuk beberapa firewall logis yang berada dalam sebuah perangkat fisik (komputer atau perangkat firewall lainnya) disebut private firewall

Explanation

The given statement is false. The correct term for multiple logical firewalls within a physical device (computer or another firewall device) is virtual firewalls, not private firewalls.

Submit
20. Jenis bandwidth yang perbedaan frekuensinya dihitung dalah rentang hertz adalah bandwidth digital

Explanation

The statement in the question states that the bandwidth with different frequency calculations is measured in hertz, which is incorrect. Bandwidth refers to the range of frequencies that can be transmitted over a communication channel, and it can be measured in hertz. However, the statement implies that only the bandwidth with different frequency calculations is measured in hertz, which is not true. Bandwidth can be measured in hertz for both analog and digital signals. Therefore, the correct answer is false.

Submit
View My Results

Quiz Review Timeline (Updated): Jul 22, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jul 22, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 08, 2019
    Quiz Created by
    Khusairi
Cancel
  • All
    All (20)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Dalam Model OSI Layer, yang berfungsi untuk menentukan pertukaran...
Malicious code yang memiliki karakteristik memungkinkan mengcopy...
PC yang dapat difungsikan sebagai router selama memiliki lebih dari...
2 kilobyte (KB)= ..... Bits
10 megabit = .... bits
Action dari konfigurasi firewall mikrotik yang menolak paket dan...
Pembagi sinyal data bagi Network­ Interface Card (NIC) dan...
Malicious code yang memiliki karakteristik memungkinkan mengcopy...
Program yang menyebabkan kerusakan sistem ketika dijalankan disebut...
Jenis firewall yang bekerja pada Network layer OSI adalah Packet...
Kepanjangan dari VPN
Proses mengirim data dari perangkat komputer ke perangkat lain dengan...
Action dari konfigurasi firewall yang menolak paket secara diam-diam...
Tindakan merubahan terhadap tampilan suatu website secara...
Urutan pertama pada layer OSI adalah Application layer
Network Address Transaction adalah kepanjangan dari NAT
Tindakan merubahan terhadap tampilan suatu website secara...
Usaha untuk merusak system pada jaringan, seperti Trojanhorse,...
Sebutan  untuk beberapa firewall logis yang berada dalam sebuah...
Jenis bandwidth yang perbedaan frekuensinya dihitung dalah rentang...
Alert!

Advertisement