Remedial Administrasi Infrastruktur Jaringan

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Khusairi
K
Khusairi
Community Contributor
Quizzes Created: 1 | Total Attempts: 692
Questions: 20 | Attempts: 693

SettingsSettingsSettings
Remedial Administrasi Infrastruktur Jaringan - Quiz

Kerjakan dengan jujur dan jangan lupa berdoa


Questions and Answers
  • 1. 

    Dalam Model OSI Layer, yang berfungsi untuk menentukan pertukaran frame data yang melewati kabel adalah

    • A.

      Data link layer

    • B.

      Physical layer

    • C.

      Session Layer

    • D.

      Application layer

    Correct Answer
    A. Data link layer
    Explanation
    The correct answer is the Data link layer. In the OSI model, the Data link layer is responsible for the exchange of data frames over the physical network. It ensures the reliable transmission of data between two directly connected devices by providing error detection and correction, flow control, and addressing. This layer also handles the framing of data into packets and the synchronization of data transmission.

    Rate this question:

  • 2. 

    Action dari konfigurasi firewall mikrotik yang menolak paket dan mengirimkan pesan penolakan ICMP adalah

    • A.

      Tarpit

    • B.

      Drop

    • C.

      Allow

    • D.

      Reject

    Correct Answer
    D. Reject
    Explanation
    The correct answer is "Reject." In the context of a MikroTik firewall configuration, "Reject" refers to the action of denying a packet and sending an ICMP rejection message back to the source. This means that when a packet is rejected, the sender will receive a notification indicating that their packet was denied by the firewall.

    Rate this question:

  • 3. 

    2 kilobyte (KB)= ..... Bits

    • A.

      800

    • B.

      8000

    • C.

      16000

    • D.

      1600

    Correct Answer
    C. 16000
    Explanation
    One kilobyte (KB) is equal to 8,000 bits. Therefore, to convert 2 kilobytes to bits, we multiply 2 by 8,000, which gives us 16,000 bits.

    Rate this question:

  • 4. 

    Tindakan merubahan terhadap tampilan suatu website secara illegal disebut

    • A.

      Defacing

    • B.

      Cracking

    • C.

      Hacking

    • D.

      Phising

    Correct Answer
    A. Defacing
    Explanation
    Defacing is the correct answer because it refers to the act of making unauthorized changes to the appearance of a website. This can involve altering the visual elements, such as replacing images or defacing the homepage, without the owner's permission. Cracking, hacking, and phishing are related terms but they do not specifically refer to illegal changes in the appearance of a website.

    Rate this question:

  • 5. 

    Kepanjangan dari VPN

    • A.

      Visual Private Network

    • B.

      Virtual Personal Network

    • C.

      Vitrual Private Network

    • D.

      Virtual Private Newton

    Correct Answer
    C. Vitrual Private Network
    Explanation
    The correct answer is "Virtual Private Network". A VPN is a technology that allows users to create a secure connection over a public network, such as the internet. It provides privacy and anonymity by encrypting the data that is transmitted between the user's device and the VPN server. This ensures that the user's online activities are protected from surveillance and unauthorized access.

    Rate this question:

  • 6. 

    Pembagi sinyal data bagi Network­ Interface Card (NIC) dan sekaligus berfungsi sebagai penguat sinyal disebut

    • A.

      Hub

    • B.

      Switch

    • C.

      Router

    • D.

      Bridge

    Correct Answer
    A. Hub
    Explanation
    A hub is a device that serves as a signal divider for data signals for a Network Interface Card (NIC) and also functions as a signal amplifier. It is a networking device that connects multiple devices in a network and broadcasts the data to all connected devices. Unlike switches or routers, hubs do not have the capability to filter or direct data to specific devices. Therefore, a hub is the correct answer in this context.

    Rate this question:

  • 7. 

    Usaha untuk merusak system pada jaringan, seperti Trojanhorse, Logicbom, Trapdoor, Virus, Worm dan Zombie disebut

    • A.

      Description

    • B.

      Destruction

    • C.

      Desepticon

    • D.

      Determination

    Correct Answer
    B. Destruction
    Explanation
    The correct answer is "Destruction" because the question asks for a term that describes the effort to damage or harm a system on a network. The options "Description," "Desepticon," and "Determination" do not accurately describe this concept.

    Rate this question:

  • 8. 

    PC yang dapat difungsikan sebagai router selama memiliki lebih dari satu interface jaringan, mampu mem-fordward paket IP, serta menjalankan program untuk mengatur routing paket disebut

    • A.

      Routear PC

    • B.

      Router Board

    • C.

      Switch

    • D.

      Modem

    Correct Answer
    A. Routear PC
    Explanation
    A PC that can function as a router is one that has multiple network interfaces, can forward IP packets, and runs programs to manage packet routing. This means that the PC is capable of receiving packets from one network interface and forwarding them to another based on the routing rules set by the programs running on it. It essentially acts as a router by performing the necessary functions to direct network traffic between different networks.

    Rate this question:

  • 9. 

    10 megabit = .... bits

    • A.

      1000

    • B.

      10000

    • C.

      1000000

    • D.

      100000

    Correct Answer
    C. 1000000
    Explanation
    The prefix "mega" represents a multiplier of one million. Therefore, 10 megabits is equal to 10 multiplied by one million bits, which equals 10,000,000 bits.

    Rate this question:

  • 10. 

    Action dari konfigurasi firewall yang menolak paket secara diam-diam adalah

    • A.

      Reject

    • B.

      Tarpit

    • C.

      Loss

    • D.

      Drop

    Correct Answer
    D. Drop
    Explanation
    The correct answer is "Drop". When a firewall configuration is set to "Drop", it silently discards or ignores incoming packets without sending any response to the sender. This action helps to protect the network by not revealing its existence to potential attackers. It is different from "Reject" where a response is sent back to the sender indicating the rejection of the packet.

    Rate this question:

  • 11. 

    Malicious code yang memiliki karakteristik memungkinkan mengcopy dirinya melalui jaringan komputer adalah

    • A.

      Trojan

    • B.

      FAT virus

    • C.

      Worm

    • D.

      Polymorpic

    Correct Answer
    C. Worm
    Explanation
    A worm is a type of malicious code that is capable of copying itself over a computer network. Unlike viruses, worms do not require a host program to spread. They can independently replicate and spread across a network, infecting multiple computers and causing damage. This makes worms particularly dangerous as they can quickly spread and infect a large number of systems. Therefore, the given correct answer for the question is "Worm".

    Rate this question:

  • 12. 

    Proses mengirim data dari perangkat komputer ke perangkat lain dengan menggunakan jaringan internet disebut

    • A.

      Download

    • B.

      Matching

    • C.

      Sending

    • D.

      Upload

    Correct Answer
    D. Upload
    Explanation
    The process of sending data from a computer device to another device using the internet is referred to as "upload".

    Rate this question:

  • 13. 

    Program yang menyebabkan kerusakan sistem ketika dijalankan disebut malicious code

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Malicious code refers to a program or software that is designed to cause harm or damage to a computer system or network when executed. It can include viruses, worms, trojan horses, ransomware, and other types of malware. These malicious codes can steal sensitive information, corrupt files, disrupt system operations, and even take control of the infected system. Therefore, the statement "Program yang menyebabkan kerusakan sistem ketika dijalankan disebut malicious code" is true as it accurately describes the nature and purpose of such programs.

    Rate this question:

  • 14. 

    Sebutan  untuk beberapa firewall logis yang berada dalam sebuah perangkat fisik (komputer atau perangkat firewall lainnya) disebut private firewall

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The given statement is false. The correct term for multiple logical firewalls within a physical device (computer or another firewall device) is virtual firewalls, not private firewalls.

    Rate this question:

  • 15. 

    Urutan pertama pada layer OSI adalah Application layer

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The first layer in the OSI model is the Physical layer, not the Application layer. The Physical layer is responsible for the actual physical transmission of data through the network, including the electrical, mechanical, and functional aspects of the network interface. The Application layer, on the other hand, is the seventh and highest layer in the OSI model, responsible for providing network services to applications and enabling communication between the network and the user.

    Rate this question:

  • 16. 

    Jenis bandwidth yang perbedaan frekuensinya dihitung dalah rentang hertz adalah bandwidth digital

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement in the question states that the bandwidth with different frequency calculations is measured in hertz, which is incorrect. Bandwidth refers to the range of frequencies that can be transmitted over a communication channel, and it can be measured in hertz. However, the statement implies that only the bandwidth with different frequency calculations is measured in hertz, which is not true. Bandwidth can be measured in hertz for both analog and digital signals. Therefore, the correct answer is false.

    Rate this question:

  • 17. 

    Jenis firewall yang bekerja pada Network layer OSI adalah Packet Filtering Layer

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The given statement is true. Packet Filtering is a type of firewall that operates at the Network layer of the OSI model. It examines packets of data passing through a network and filters them based on predetermined rules. This type of firewall can analyze the source and destination IP addresses, port numbers, and other packet header information to determine whether to allow or block the packet. By working at the Network layer, Packet Filtering firewalls can provide basic security by controlling the flow of network traffic.

    Rate this question:

  • 18. 

    Network Address Transaction adalah kepanjangan dari NAT

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The given statement is incorrect. Network Address Transaction (NAT) is not the abbreviation for NAT. Therefore, the correct answer is False.

    Rate this question:

  • 19. 

    Tindakan merubahan terhadap tampilan suatu website secara illegal disebut Phising

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Phishing is not the correct term for illegally changing the appearance of a website. Phishing refers to the act of tricking individuals into revealing sensitive information, such as passwords or credit card numbers, by disguising oneself as a trustworthy entity. Illegally changing the appearance of a website would typically fall under the category of hacking or website defacement. Therefore, the correct answer is false.

    Rate this question:

  • 20. 

    Malicious code yang memiliki karakteristik memungkinkan mengcopy dirinya melalui jaringan komputer adalah worm

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A worm is a type of malicious code that has the ability to copy itself over a computer network. Unlike viruses, which require a host file or program to spread, worms can self-replicate and spread autonomously. They can exploit vulnerabilities in computer systems and use network connections to propagate to other computers. Therefore, it is true that a worm can copy itself through a computer network.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 08, 2019
    Quiz Created by
    Khusairi
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.