The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Proses pengiriman dan penerimaan data dari 2 device atau lebih yang terhubung dalam 1 jaringan.Kalimat tersebut merupakan pengertian dari…
A.
Komunikasi Data
B.
DCCU
C.
Sinkronisasi
D.
Destination
E.
Transmitter
Correct Answer
A. Komunikasi Data
Explanation The given sentence describes the process of sending and receiving data between two or more devices connected in a network. This process is known as "Komunikasi Data" or data communication.
Rate this question:
2.
Gambar berikut merupakan gambar..?
A.
Transmission System
B.
Komunikasi Suara
C.
Sinkronisasi
D.
Komunikasi Data
E.
Transmitter
Correct Answer
D. Komunikasi Data
Explanation The correct answer is "Komunikasi Data" because the image represents a data communication system. This can be inferred from the options provided, where "Transmission System" and "Komunikasi Suara" refer to voice communication, "Sinkronisasi" refers to synchronization, and "Transmitter" refers to a device that sends signals. "Komunikasi Data" is the only option that directly relates to transmitting and receiving data.
Rate this question:
3.
Sebutkan macam-macam System Transmisi !
A.
Transmission System, Radio, dan PC.
B.
Simplex Trasmission, Half Duplex Transmission, dan Full Duplex Transmission.
C.
Sinkronisasi, Asinkkron, dan DTE
D.
Komunikasi Data, Komunikasi Suara, dan Komunikasi Gambar.
E.
Transmitter, Source, dan Destinatin.
Correct Answer
B. Simplex Trasmission, Half Duplex Transmission, dan Full Duplex Transmission.
Explanation The given answer correctly lists the different types of transmission systems: Simplex Transmission, Half Duplex Transmission, and Full Duplex Transmission. Simplex Transmission allows data to flow in only one direction, Half Duplex Transmission allows data to flow in both directions but not simultaneously, and Full Duplex Transmission allows data to flow in both directions simultaneously. These different types of transmission systems are used in various communication technologies to facilitate the transfer of data efficiently.
Rate this question:
4.
Sebutkan Ragam Komunikasi…
A.
Suara (audio),Komunikasi Audio-Video, dan Komunikasi Data.
B.
Komunikasi Suara, Sinkronisasi, dan Komunikasi Data
C.
Packet Switching, Thoughput, dan Bandwidge
D.
Radio, Ht , dan Handphne.
E.
Transmitter, Dccu, dan Resolution
Correct Answer
A. Suara (audio),Komunikasi Audio-Video, dan Komunikasi Data.
Explanation The correct answer is Suara (audio), Komunikasi Audio-Video, dan Komunikasi Data. This answer lists three different forms of communication: audio communication, audio-video communication, and data communication. Audio communication refers to the transmission of sound or voice signals, while audio-video communication involves the transmission of both audio and video signals. Data communication, on the other hand, refers to the transmission of digital data or information. These three forms of communication cover a wide range of communication methods and technologies.
Rate this question:
5.
Apa kepanjangan dari VOIP
A.
Voice over internet protocol
B.
Voice open internet protocol
C.
Voice over interlocal protocol
D.
Voice over internet port
E.
Voice over international protocol
Correct Answer
A. Voice over internet protocol
Explanation The correct answer is "voice over internet protocol." Voice over internet protocol (VOIP) refers to a technology that allows voice communication over the internet. It converts voice signals into digital data packets and transmits them over an IP network, enabling users to make phone calls using internet connectivity rather than traditional phone lines.
Rate this question:
6.
Sebutkan model lapis Komunikasi Data yang diurukan dari bawah!
A.
Session, Physical, Data Link, Network, Transport, Presentation, dan Aplication Layer.
B.
Physical, Data Link, Network, Transport, Session, Presentation, dan Aplication Layer.
C.
Physical, Data Link, Transport, Session, Presentation, Network, dan Aplication Layer.
D.
Physical, Transport, Data Link, Network, Session, Presentation, dan Aplication Layer.
E.
Data Link, Physical, Network, Transport, Session, Presentation, dan Aplication Layer.
Correct Answer
B. pHysical, Data Link, Network, Transport, Session, Presentation, dan Aplication Layer.
Explanation The correct answer is "Physical, Data Link, Network, Transport, Session, Presentation, dan Aplication Layer." This is the correct order of the layers in the Data Communication model, starting from the bottom. The Physical layer is responsible for the physical transmission of data, the Data Link layer handles the framing and error detection, the Network layer deals with routing and addressing, the Transport layer ensures reliable delivery of data, the Session layer manages the communication sessions, the Presentation layer handles data formatting and encryption, and the Application layer provides the interface for user applications.
Rate this question:
7.
Apakah yang dimaksud dengan protocol…
A.
Aturan-aturan Komunikasi Data
B.
Kumpulan aturan
C.
Model Komunikasi Dara
D.
Model Data Bus
E.
Konversi sandi dari data
Correct Answer
A. Aturan-aturan Komunikasi Data
Explanation The correct answer is "Aturan-aturan Komunikasi Data". This answer is correct because it directly translates to "Rules of Data Communication" in English, which accurately describes what is meant by the term "protocol". Protocols are a set of rules and guidelines that govern the exchange of data between devices or systems in a network. Therefore, "Aturan-aturan Komunikasi Data" is the most appropriate answer among the given options.
Rate this question:
8.
Berikut yang merupakan pengertian dari Throughput adalah…
A.
Bandwidth yang opini pada suatu waktu tertentu
B.
Bandwidth yang agak sebenarnya (aktual) pada suatu waktu tertentu
C.
Bandwidth yang sebenarnya (aktual) pada suatu waktu tertentu
D.
Bandwidth yang tidak sebenarnya pada suatu waktu tertentu
E.
Bandwidth yang sebenarnya (Realio) pada suatu waktu tertentu
Correct Answer
C. Bandwidth yang sebenarnya (aktual) pada suatu waktu tertentu
Explanation Throughput adalah istilah yang digunakan untuk mengukur jumlah data yang dapat ditransmisikan melalui jaringan atau sistem komunikasi dalam suatu waktu tertentu. Dalam konteks ini, "bandwidth yang sebenarnya (aktual) pada suatu waktu tertentu" merupakan pengertian yang tepat untuk throughput. Pengertian ini mengacu pada jumlah data yang benar-benar dapat dikirim atau diterima dalam jaringan pada saat tertentu, tanpa memperhitungkan faktor-faktor lain seperti latensi atau kecepatan transfer.
Rate this question:
9.
Operating system yang digunakan untuk komunikasi data suara/video adalah…
A.
Windows 10
B.
Linux
C.
Asterisk
D.
Debian
E.
FreeBSD
Correct Answer
C. Asterisk
Explanation Asterisk is an open-source software that is commonly used as a communication platform for voice and video data. It is specifically designed to handle and route voice and video calls over IP networks. Unlike Windows 10, Linux, Debian, and FreeBSD, which are operating systems, Asterisk is a software application that can be installed on various operating systems. Therefore, Asterisk is the correct answer for the operating system used for voice and video data communication.
Rate this question:
10.
Aplikasi yang dapat digunakan untuk telepon dan video call dengan menggunakan server yang kita buat sendiri adalah…..
A.
X-Lite
B.
Facebook
C.
WhatsApp
D.
Line
E.
Ask.fm
Correct Answer
A. X-Lite
Explanation X-Lite is the correct answer because it is an application that allows users to make phone and video calls using their own server. It is a popular choice for businesses and individuals who want to have control over their communication system and ensure privacy and security. X-Lite offers features such as call recording, voicemail, and instant messaging, making it a comprehensive solution for communication needs.
Rate this question:
11.
Yang tidak termasuk fungsi PBX…
A.
Menyediakan Layanan Akutansi
B.
Menjaga Sambungan Selama Menggunakan Telepon
C.
Mematikan Sambungan Antara Koneksi Dengan Perintah Yang Sesuai
D.
Layanan Otomatis Panggilan
E.
Penyedia Layanan IP Address
Correct Answer
E. Penyedia Layanan IP Address
Explanation The correct answer is "Penyedia Layanan IP Address" because it does not belong to the functions of a PBX (Private Branch Exchange) system. PBX is a telephone system within an organization that allows for internal communication and external calls. The functions mentioned in the other options, such as providing accounting services, maintaining connections during phone usage, and disconnecting connections with appropriate commands, are all related to the operations of a PBX system. However, the provision of IP addresses is not a function typically associated with PBX systems.
Rate this question:
12.
Apakah kepanjangan dari OSI…
A.
Open System Intwernal
B.
Output Saluran Indor
C.
Open Sistem Interconection
D.
Operating System Internal
E.
Open System Interconection
Correct Answer
E. Open System Interconection
Explanation The correct answer is "Open System Interconection." OSI stands for Open System Interconnection, which is a conceptual framework that standardizes the functions of a communication system into seven different layers. It provides guidelines for how different computer systems can communicate with each other over a network.
Rate this question:
13.
Kepanjangan UTP adalah...
A.
Unshielded twisted-pair
B.
Uniersal twisted-pair
C.
Unshielded twisted-protocol
D.
Universal twisted-protcol
E.
Unshielded twinted-pair
Correct Answer
A. Unshielded twisted-pair
Explanation UTP stands for Unshielded Twisted-Pair. This refers to a type of cable commonly used in computer networking. It consists of pairs of insulated wires twisted together, without any additional shielding. The twisting of the wires helps to reduce electromagnetic interference and crosstalk between the pairs, allowing for faster and more reliable data transmission.
Rate this question:
14.
Dibawah ini media komunikasi dan informasi, kecuali...
A.
E-mail
B.
World wide web (WWW)
C.
File transfer protocol (FTP)
D.
Chat
E.
Sharing device
Correct Answer
E. Sharing device
Explanation The given options are all examples of media communication and information platforms, except for "Sharing device." A sharing device is not a form of communication or information platform but rather a physical device used to share files or resources between multiple devices. Therefore, it does not belong in the same category as the other options.
Rate this question:
15.
Adalah penyedia layanan telepon yang melayani pertukaran telepon dengan pusat di dalam suatu perusahaan, dan menjadi penghubung antara telepon dari publik ke telepon perusahaan atau jaringan telepon dari perusahaan ke jaringan perusahaan lainnya di area yang lebih luas sehingga dapat tercakup oleh publik.” Merupakan pengertian dari…
A.
VoIP
B.
X-Lite
C.
Asterisk
D.
PBX
E.
Linux
Correct Answer
D. PBX
Explanation The given passage describes a service provider that connects public telephones to a company's telephone network or other company networks in a larger area. This matches the definition of a PBX (Private Branch Exchange), which is a telephone system within an organization that manages incoming and outgoing calls. Therefore, the correct answer is PBX.
Rate this question:
16.
Suatu signalling protocol pada layer aplikasi yang berfungsi untuk membangun, memodifikasi, dan mengakhiri suatu sesi multimedia yang melibatkan satu atau beberapa pengguna. Sesi multimedia adalah pertukaran data antar pengguna yangbisa meliputi suara, video, dan text.Itu Pengertian Dari
A.
VOIP
B.
SP
C.
Suara
D.
SIP
E.
Dial
Correct Answer
D. SIP
Explanation SIP stands for Session Initiation Protocol. It is a signaling protocol used in the application layer to establish, modify, and terminate multimedia sessions involving one or multiple users. A multimedia session refers to the exchange of data between users, which can include voice, video, and text. SIP is responsible for initiating and managing these sessions, allowing users to establish communication over IP networks.
Rate this question:
17.
Context=default dalam konfigurasi serversoftswitch digunakan untuk perintah...
A.
Nama web server
B.
Nama context standart
C.
Log in password
D.
Nama context user
E.
Default port untuk SIP
Correct Answer
D. Nama context user
Explanation The correct answer is "nama context user". In the context of server softswitch configuration, the "nama context user" refers to the name of the user context. This could be a specific name assigned to a user or a group of users for identification purposes within the softswitch system. It helps in managing and organizing different users and their settings within the server.
Rate this question:
18.
WWW merupakan singkatan dari…
A.
Wide Web World
B.
Web World Wide
C.
Wen World Web
D.
World Web Wide
E.
World Wide Web
Correct Answer
E. World Wide Web
Explanation The correct answer is "World Wide Web". WWW is an abbreviation for World Wide Web, which is a system of interconnected documents and other resources, linked by hyperlinks and URLs. It is a global information space where users can access and share information through websites and webpages.
Rate this question:
19.
Cara mengkonfigurasi dial plan dengan cara mengetik
A.
Nano /etc/asterisk/extensions.conf
B.
Nano /etc/dialplan/extensions.conf
C.
Nano /etc/software/extensions.conf
D.
Nano /etc/config/extensions.conf
E.
Nano /etc/dial config/extensions.conf
Correct Answer
A. Nano /etc/asterisk/extensions.conf
Explanation The correct answer is "nano /etc/asterisk/extensions.conf" because this command is used to configure the dial plan in Asterisk. The dial plan is responsible for defining how incoming and outgoing calls are handled, including call routing, call features, and call flow. By editing the extensions.conf file using the nano text editor, users can specify the desired dial plan rules and settings for their Asterisk system.
Rate this question:
20.
Pengertian dari SLJJ dan SLI adalah…
A.
Saluran Jaringan Jauh dan Saluran Lingkup Indonesia Intenasional
B.
Saluran Jaringan Luas dan Saluran Luas Indonesia
C.
Saluran Jarak Jauh dan Saluran Internasional
D.
Saluran Jauh-jauh dan Saluran
E.
Saluran Jauh Sekali dan Dekat Sekali
Correct Answer
C. Saluran Jarak Jauh dan Saluran Internasional
Explanation The correct answer is "Saluran Jarak Jauh dan Saluran Internasional". This is because SLJJ stands for Saluran Jarak Jauh, which refers to long-distance communication channels, and SLI stands for Saluran Internasional, which refers to international communication channels.
Rate this question:
21.
Teknologi VOIP adalah…
A.
Cara berkomunikasi suara (voice) melalui jaringan internet, sehingga komunikasi jarak jauh SLJJ maupun SLJ dapat dilakukan dengan biaya local
B.
Teknologi komunikasi data dari ST
C.
Teknologi Tranfer data komunikasi
D.
Teknolodi untu komunikasi suara
E.
Teknologi untuk computer sekarang
Correct Answer
A. Cara berkomunikasi suara (voice) melalui jaringan internet, sehingga komunikasi jarak jauh SLJJ maupun SLJ dapat dilakukan dengan biaya local
Explanation The correct answer explains that VOIP technology allows voice communication over the internet, enabling long-distance communication at local costs. It mentions that it is a way to communicate voice through the internet network.
Rate this question:
22.
Salah satu keuntungan VOIP untuk sebuah perusahaan adalah…
A.
Lebih mudah menggunakannya
B.
Teknologinya baru, jadi perusahaanya bisa dibilang update. sambungan langsung jarak jauh, jadi tidak diperlukan tambahan biaya bulanan untuk komunikasi suara
C.
Bisa digunakan untuk SMS karyawan
D.
Biayanya lebih rendah untuk sambungan langsung jarak jauh, jadi tidak diperlukan tambahan biaya bulanan untuk komunikasi suara
E.
Biayanya lebih rendah untuk sambungan jarak jauh maupun dekat jadi tidak memerlukan biaya tambahan
Correct Answer
E. Biayanya lebih rendah untuk sambungan jarak jauh maupun dekat jadi tidak memerlukan biaya tambahan
Explanation The correct answer states that one of the advantages of VOIP for a company is that it has lower costs for both long-distance and local connections, eliminating the need for additional fees. This means that the company can save money on communication expenses, regardless of the distance of the calls.
Rate this question:
23.
Aplikasi yang lisensinya gratis dan terbuka disebut…
A.
Open Source
B.
Open Aplication
C.
Open Data Communication
D.
Open Networking
E.
Open Lisensi
Correct Answer
A. Open Source
Explanation Open Source refers to applications that are freely available for use and modification. These applications have their source code accessible to the public, allowing users to study, modify, and distribute the software as they wish. The term "open source" emphasizes the importance of transparency, collaboration, and community-driven development. Open source software is often developed and maintained by a community of volunteers and is known for its flexibility, security, and innovation.
Rate this question:
24.
Sebuah sentral privat dengan fitur seperti sentral public yang di gunakan oleh suatu lembaga / perusahaan dalam melayani komunikasi internet perusahaan tersebut.Pengertian Dari
A.
VOIP
B.
Internet
C.
HUB
D.
PBX
E.
Semua Benar
Correct Answer
D. PBX
Explanation A PBX (Private Branch Exchange) is a private central system used by an organization or company to handle internal and external communication, including internet communication. It provides features similar to a public central system but is exclusive to the organization's use. Therefore, the given answer "PBX" is correct as it accurately describes a private central system used for internet communication within a company or organization.
Rate this question:
25.
Terdiri dari berapakah Sistem IP PBX
A.
17 telepone SIP dan IP Proxy Server serta getway
B.
80 telepone SIP dan IP Proxy Server serta getway
C.
1 atau lebih telepone SIP dan Server IP PBX serta getway
D.
50 getway
E.
Server IP PBX saja
Correct Answer
C. 1 atau lebih telepone SIP dan Server IP PBX serta getway
Explanation The correct answer is "1 atau lebih telepone SIP dan Server IP PBX serta getway". This answer suggests that an IP PBX system consists of one or more SIP telephones, a Server IP PBX, and a gateway. This combination of components allows for the implementation of a communication system that can handle SIP calls and connect them to the PSTN network.
Rate this question:
26.
TCP/IP dibagi menjadi 4 layer yaitu…
A.
Layer Routing, Layer Transport, Layer Internerwork, dan Layer Network Interface
B.
Layer Aplikasi, Layer Transport, Layer Internerwork, dan Layer Network Interface
C.
Layer Aplikasi, Layer Transport, Layer Internerwork, dan Layer sesi Interface
D.
Layer Aplikasi, Layer Transfer, Layer Internerwork, dan Layer Network Interface
E.
Layer Aplikasi, Layer Transport, Layer Internerwork, dan Layer Network Internal
Correct Answer
B. Layer Aplikasi, Layer Transport, Layer Internerwork, dan Layer Network Interface
Explanation The correct answer is "Layer Aplikasi, Layer Transport, Layer Internerwork, dan Layer Network Interface." This answer correctly identifies the four layers of TCP/IP, which are Application, Transport, Internetwork, and Network Interface. These layers are responsible for different functions in the TCP/IP protocol stack, such as application-level protocols, data segmentation and reassembly, routing, and network interface control.
Rate this question:
27.
Apa definisi dari extensi pada server voip
A.
Sekumpulan perintah yang digunakan untuk menjalankan server voip
B.
Alur untuk bergantiannya data yang masuk
C.
Sebuah alat yang digunakan untuk berkomunikasi dalam voip
D.
Sebuah pelengkap dalam server voip
E.
Semuanya salah
Correct Answer
A. Sekumpulan perintah yang digunakan untuk menjalankan server voip
Explanation The correct answer is "Sekumpulan perintah yang digunakan untuk menjalankan server voip." This answer states that an extension on a VoIP server is a set of commands used to operate the server. This implies that extensions are a crucial component in managing and controlling the functionality of a VoIP server.
Rate this question:
28.
Mana yang benar fungsi firewall, pada dibawah ini..
A.
Mengontrol dan mengawasi paket data yang mengalir di jaringan Firewall harus dapat mengatur, menfilter dan mengontrol lalu lintas data yang dijizin untuk mengakses jaringan privat yang dilindungi firewall
B.
Melakukan autentifikasi terhadap akses
C.
Aplikasi proxy Firewall mampu memeriksa lebih dari sekedar header dari paket data, kemampuan ini menuntut firewall untuk mampu mendeteksi protokol aplikasi tertentu yang spesifikasi
D.
Mencatat setiap transaksi kejadian yang terjadi di firewall. Ini Memungkinkan membantu sebagai pendeteksian dini akan penjebolan jaringan
E.
Semua Benar
Correct Answer
E. Semua Benar
Explanation The given answer "Semua Benar" means "All are correct" in English. This means that all of the statements mentioned in the question are true regarding the functions of a firewall. The firewall is responsible for controlling and monitoring the flow of data packets in a network, it should be able to regulate, filter, and control the authorized data traffic to access the protected private network. It also performs authentication for access, the proxy firewall can inspect more than just the header of data packets, and it is capable of detecting specific application protocols. Additionally, it records every transaction event that occurs in the firewall, which helps in early detection of network breaches.
Rate this question:
29.
Tugas dari DTE (Data Terminal Equipment) adalah...
A.
Melakukan konversi sandi
B.
Melakukan pengujian kesalahan
C.
Mengatur masuk-keluarnya informasi/data
D.
Mengatur error recovery
E.
Menyalurkan data antar lokasi
Correct Answer
C. Mengatur masuk-keluarnya informasi/data
Explanation The correct answer is "Mengatur masuk-keluarnya informasi/data." This means that the task of DTE (Data Terminal Equipment) is to manage the incoming and outgoing information or data. DTE is responsible for controlling the flow of data between different locations.
Rate this question:
30.
Digital subscriber lina adalah…
A.
Teknologi yang menyediakan data digital tanpa kabel yang digunakan dalam jarak jauh dari jaringan komputer setempat
B.
Teknologi yang menyediakan data digital melewati kabel yang digunakan dalam jarak jauh dari jaringan telepon setempat
C.
Teknologi yang menyediakan data digital tanpa kabel yang digunakan dalam jarak dekat dari jaringan telepon setempat
D.
Teknologi yang menyediakan data digital tanpa kabel yang digunakan dalam jarak dekat dari jaringan komputer setempat
E.
Teknologi yang menyediakan penghantar data digital melewati kabel yang digunakan dalam jarak dekat dari jaringan telepon setempat
Correct Answer
E. Teknologi yang menyediakan penghantar data digital melewati kabel yang digunakan dalam jarak dekat dari jaringan telepon setempat
Explanation The correct answer is "Teknologi yang menyediakan penghantar data digital melewati kabel yang digunakan dalam jarak dekat dari jaringan telepon setempat." This answer suggests that digital subscriber line (DSL) technology provides a means of transmitting digital data through cables, specifically within a short distance from a local telephone network. DSL technology allows for high-speed internet access over existing telephone lines, making it a convenient option for households and businesses that are located close to a local telephone network.
Rate this question:
31.
Perintah ini dilakukan exten =>101,2,Hangup -->> setelah apa
A.
Hangup
B.
Setelah Hangup dilakukan time out
C.
Dial
D.
Voip
E.
Semua Salah
Correct Answer
B. Setelah Hangup dilakukan time out
Explanation The given correct answer states that after the Hangup command is executed, a timeout is performed. This means that the system waits for a certain period of time before moving on to the next command or action. This timeout allows for any necessary processes or actions to be completed before proceeding.
Rate this question:
32.
Yang dibutuhkan dalam prosedur pengamatan keselamatan kerja telekomunikasi VOIP yang benar adalah..
A.
Transmission Control Protocol (TCP) dan User Datagram Protocol (UDP)
B.
User Datagram Protocol (UDP) dan Local are network (LAN)
C.
Local Area Network dan Internet Protocol (IP)
D.
Internet Protocol (IP) dan Private Branch eXchange (PBX)
E.
Semua benar
Correct Answer
A. Transmission Control Protocol (TCP) dan User Datagram Protocol (UDP)
Explanation The correct answer is Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). These protocols are necessary for ensuring the safety and reliability of telecommunication in VOIP. TCP provides reliable and ordered delivery of data packets, while UDP allows for faster transmission with minimal error checking. By using both protocols, VOIP systems can ensure that data is transmitted securely and efficiently.
Rate this question:
33.
Fungsi firewall pada jaringan VOIP adalah
A.
Menjadi garis pertahanan pertama dalam mengantisipasi hacking
B.
Membuka port-port akses guna menjaga agar tetap terbuka
C.
Menjadi protocol penghubung dengan internet
D.
Menghapus berkas transaksi yang sudah dianggap sampah
E.
Pembangun paket data yang dipakai
Correct Answer
A. Menjadi garis pertahanan pertama dalam mengantisipasi hacking
Explanation The correct answer is "Menjadi garis pertahanan pertama dalam mengantisipasi hacking." A firewall in a VOIP network acts as the first line of defense against hacking attempts. It helps to prevent unauthorized access, monitor network traffic, and block any suspicious or malicious activities that could compromise the security of the network. By establishing a barrier between the internal network and the external internet, the firewall can detect and prevent potential hacking attempts, protecting the VOIP network from unauthorized access or data breaches.
Rate this question:
34.
Ancaman jaringan computer pada fisik contohnya adalah …
A.
Kerusakan pada computer dan perangkat komunikasi jaringan
B.
Kerusakan pada sistem operasi atau aplikasi
C.
Virus
D.
Sniffing
E.
Kelemahan sistem jaringan komunikasi
Correct Answer
A. Kerusakan pada computer dan perangkat komunikasi jaringan
Explanation The correct answer is "Kerusakan pada computer dan perangkat komunikasi jaringan." This is because physical threats to computer networks can include damage to computers and network communication devices. This can occur due to accidents, natural disasters, or intentional actions that physically disrupt the functioning of the network components.
Rate this question:
35.
Deep Freeze dikembangkan oleh …
A.
Faranics Comporation
B.
Faronics Comparation
C.
Farnocs Comparation
D.
Fardocs Comparation
E.
Faronics Corporation
Correct Answer
E. Faronics Corporation
Explanation Deep Freeze is a software program developed by Faronics Corporation. This program is designed to protect and preserve computer configurations by restoring them to their original state after each restart. Faronics Corporation is a software company that specializes in developing system management solutions for businesses and educational institutions. Therefore, the correct answer is Faronics Corporation.
Rate this question:
36.
Program yang menyebabkan kerusakan sistem ketika dijalankan disebut …
A.
Denial-of-Service
B.
Phishing
C.
Packet Snifer
D.
Social Engineering
E.
Malicious code
Correct Answer
E. Malicious code
Explanation Malicious code refers to a program or software that is intentionally designed to cause harm or damage to a computer system, network, or device. It can include viruses, worms, trojans, ransomware, and other types of malware. When executed, malicious code can disrupt the normal functioning of a system, steal sensitive information, or gain unauthorized access. Unlike the other options listed, which are specific techniques or methods used in cyber attacks, malicious code is a broader term encompassing various types of harmful software.
Rate this question:
37.
Terdiri dari database security, data security, dan device security adalah keamanan di level …
A.
0
B.
1
C.
2
D.
3
E.
4
Correct Answer
B. 1
Explanation The given answer, 1, is correct because database security, data security, and device security are all components of security at the level of data protection. These three aspects are crucial in ensuring the safety and integrity of data within an organization or system. By implementing measures to secure databases, protect data, and secure devices, organizations can mitigate the risk of unauthorized access, data breaches, and other security threats.
Rate this question:
38.
Serangan keamanan jaringan pada sisi sosial dengan memanfaatkan kepercayaan pengguna disebut …
A.
Social Engineering
B.
Deface
C.
Traffic Flooding
D.
Denial of Service
E.
Request Flooding
Correct Answer
A. Social Engineering
Explanation Social engineering is the correct answer because it refers to a type of network security attack that exploits the trust and manipulation of users to gain unauthorized access to sensitive information or systems. It involves tricking individuals into revealing confidential information or performing actions that can compromise the security of a network. This type of attack relies on psychological manipulation rather than technical vulnerabilities to achieve its objectives.
Rate this question:
39.
Logo Deep Freeze adalah …
A.
Hewan Beruang Hitam
B.
Hewan Beruang Putih
C.
Hewan Mawar Hitam
D.
Hewan Mawar Putih
E.
Tembok Api
Correct Answer
B. Hewan Beruang Putih
Explanation The correct answer is "Hewan Beruang Putih". The question is asking about the logo of Deep Freeze, and the correct answer is that it features a white polar bear.
Rate this question:
40.
Usaha untuk merusak system pada jaringan, seperti Trojanhorse, Logicbom, Trapdoor, Virus, Worm dan Zombie disebut …
A.
Destruction
B.
Denial
C.
Theft
D.
Modification
E.
Fraud
Correct Answer
A. Destruction
Explanation The correct answer is "Destruction" because the question is asking for the term that refers to the effort to damage or harm a system on a network. The options "Denial," "Theft," "Modification," and "Fraud" do not specifically relate to the act of damaging a system, whereas "Destruction" accurately describes the intention behind actions like using Trojan horses, logic bombs, trapdoors, viruses, worms, and zombies.
Rate this question:
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.