Salah desain (design flaw)
Salah implementasi
Salah konfigurasi
Salah penggunaan
Rate this question:
Salah desain (design flaw)
Salah implementasi
Salah konfigurasi
Salah penggunaan
Rate this question:
Corrupt array checking
Insufficient bound checking
String concatenation checking
Source code debugging
Rate this question:
Salah desain (design flaw)
Salah implementasi
Salah konfigurasi
Salah penggunaan
Rate this question:
Salah desain (design flaw)
Salah implementasi
Salah konfigurasi
Salah penggunaan
Rate this question:
Security problem
Security gap
Security assessment
Security flaw
Rate this question:
Mengidentifikasi security gap
Memperkecil security gap
Menjaga agar tetap pada level yg sesuai, security gap
Memperbaiki security gap
Rate this question:
Security assessment
Security policy
Security mechanism
Security audit
Rate this question:
Information gathering and discovery
Enumeration
Detection
Recovery
Rate this question:
Information gathering and discovery
Enumeration
Detection
Recovery
Rate this question:
Information gathering and discovery
Enumeration
Detection
Recovery
Rate this question:
Survey (kuisioner, interview dll)
Vulnerability scan
System log
Whois service
Rate this question:
Security system auditor (SSA)
Security system mintor (SSM)
Managed Service Provider (MSP)
Security Service Provider (SSP)
Rate this question:
Hazard
Threat
Vulnerability
Security hole
Rate this question:
Network spoofing
Server hacking
Web defacing
Social engineering
Rate this question:
Trash finding
Information seeking
Dumster diving
Trash diving
Rate this question:
Email hacking
Email phraking
Email spoofing
Email phishing
Rate this question:
Menetapkan security policy yang jelas dan komprehensif
Membuat user menyadari potensi terjadinya serangan social engineering
Memperketat security mechanism yang digunakan
Mengaudit security policy secara berkala.
Rate this question:
Protokol 802.11a
Protokol 802.11b
Protokol 802.11g
Protokol 802.11n
Rate this question:
Station
Wireless medium
Access point
Distribution system
Rate this question:
Station
Wireless medium
Access point
Distribution system
Rate this question:
SSID broadcasting
MAC request broadcasting
DNS broadcasting
NETBIOS broadcasting
Rate this question:
Accidental association
Malicious association
Identity Theft
Man-in-the-middle attacks
Rate this question:
Accidental association
Malicious association
Identity Theft
Man-in-the-middle attacks
Rate this question:
Accidental association
Malicious association
Identity Theft
Man-in-the-middle attacks
Rate this question:
Network Injection
Denial of Service
Identity Theft
Man-in-the-middle attacks
Rate this question:
MAC ID Filtering
Static IP Addressing
Stop SSID Broadcasting
Using WEP
Rate this question:
MAC ID Filtering
Static IP Addressing
Stop SSID Broadcasting
Using WEP
Rate this question:
MAC ID Filtering
Hide SSID broadcast message
USB token
RF Shielding
Rate this question:
Physical
Data link
Network
Transport
Rate this question:
NOT
AND
OR
XOR
Rate this question:
Physical
Application
Transport
Network
Rate this question:
Menggunakan public-key
Menggunakan shared-key
Menggunakan private-key
Menggunakan secret-key
Rate this question:
Vulnerability Assessment
Information System Audit
Security Risk Evaluation
Manage Service Provider
Rate this question:
Vulnerability Assessment
Information System Audit
Security Risk Evaluation
Manage Service Provider
Rate this question:
Vulnerability Assessment
Information System Audit
Security Risk Evaluation
Manage Service Provider
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.