Usbn - Sistem Keamanan Jaringan

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By ASEP WAHYUDIN
A
ASEP WAHYUDIN
Community Contributor
Quizzes Created: 1 | Total Attempts: 511
Questions: 45 | Attempts: 511

SettingsSettingsSettings
Usbn - Sistem Keamanan Jaringan - Quiz

PETUNJUK Isikan nama lengkap dan masukkan alamat email yang valid ! Tekan STAR untuk memulai ujian dan pilih jawaban yang paling tepat ! Periksa kembali jawaban dengan teliti sebelum mengakhiri ujian ! Download Sertifikat hasil ujiannya dan kumpulkan di tugas edmodo ! SELAMAT MENGERJAKAN !


Questions and Answers
  • 1. 

    Perhatikan gambar/skema dibawah ini. Pada topologi tersebut bagaimana pengaturan IP address yang valid pada komputer clients sebanyak 30?

    • A.

      A. IP: 192.168.1.1-30, netmask: 255.255.255.240, GW: 192.168.1.2

    • B.

      B. IP: 192.168.1.1-30, netmask: 255.255.255.0, GW: 192.168.1.1

    • C.

      C. IP: 192.168.50.1-30, netmask: 255.255.255.192, GW: 192.168.50.40

    • D.

      D. IP: 192.168.50.1-30, netmask: 255.255.255.240, GW: 192.168.1.2

    • E.

      E. IP: 192.168.1.1-30 netmask: 255.255.255.0, GW: 192.168.50.40

    Correct Answer
    C. C. IP: 192.168.50.1-30, netmask: 255.255.255.192, GW: 192.168.50.40
    Explanation
    The correct answer is C because it provides a valid IP address range (192.168.50.1-30) with a corresponding subnet mask (255.255.255.192) that allows for 30 client computers. The gateway (192.168.50.40) is also within the same network range, ensuring proper communication between the clients and other devices on the network.

    Rate this question:

  • 2. 

    Langkah pengamanan jaringan LAN yang terhubung ke internet dapat dilakukan dengan cara ...

    • A.

      A. konfigurasi sistem Firewall dan Proxy yang tepat pada router/server gateway

    • B.

      B. memberikan password pada OS server/gateway

    • C.

      C. menggunakan password pada router

    • D.

      D. menginstall antivirus pada komputer client

    • E.

      E. menggunakan sistem operasi Linux

    Correct Answer
    A. A. konfigurasi sistem Firewall dan Proxy yang tepat pada router/server gateway
    Explanation
    The correct answer is A. Configuring the Firewall and Proxy system correctly on the router/server gateway. This is the most effective way to secure a LAN network connected to the internet. A firewall acts as a barrier between the LAN and the external network, monitoring and controlling incoming and outgoing network traffic. It can block unauthorized access and filter out potentially harmful data. A proxy server can enhance security by acting as an intermediary between the LAN and the internet, filtering and caching web content, and providing an additional layer of protection.

    Rate this question:

  • 3. 

    Pengamanan akses file yang berlaku ketika diakses dari jaringan / komputer lain di jaringan ....

    • A.

      A. Shared Permission

    • B.

      B. Security Permission

    • C.

      C. Disk Permission

    • D.

      D. Folder permission

    • E.

      E. Open permission

    Correct Answer
    A. A. Shared Permission
    Explanation
    Shared permission refers to the access control settings that determine the level of access granted to a file or folder when it is accessed from another computer or network. It allows multiple users or computers to access and modify the file or folder simultaneously, while also providing options to restrict or limit certain actions. This ensures that only authorized individuals or systems can access and manipulate the file or folder, maintaining security and preventing unauthorized access or modifications.

    Rate this question:

  • 4. 

    Tahapan konfigurasi server berbasis Linux OS, agar bisa menjalankan fungsi NAT dan gateway internet adalah ….

    • A.

      A. ~# iptables –t nat –p tcp –A POSTROUITNG --dport 80 to-port 8080 –j REDIRECT

    • B.

      B. ~# iptables –t nat –I PREROUTING –p tcp --dport 80 –j REDIRECT --to-port 8080

    • C.

      C. ~# iptables –t nat –A POSTROUTING –o eth0 –j MASQUERADE

    • D.

      D. ~# iptables –A INPUT –p tcp –s 0/0 –-dport 8080 –j ACCEPT

    • E.

      E. ~# iptables –A FORWARD –p tcp –dport 80 –j ACCEPT –-to-port 8080

    Correct Answer
    C. C. ~# iptables –t nat –A POSTROUTING –o eth0 –j MASQUERADE
    Explanation
    The correct answer is C because it uses the correct syntax and options for configuring a Linux server to perform NAT and act as an internet gateway. The "-t nat" option specifies the nat table, which is used for network address translation. The "-A POSTROUTING" option appends a rule to the POSTROUTING chain, which is used for packets that are being forwarded and leaving the server. The "-o eth0" option specifies the outgoing interface, and the "-j MASQUERADE" option tells iptables to perform network address translation on the packets.

    Rate this question:

  • 5. 

    Di bawah ini beberapa keuntungan penggunaan sistim basis data berbasis web, kecuali ….

    • A.

      A. kemudahan akses user dari lokasi manapun

    • B.

      B. lebih mudah dikelola oleh administrator

    • C.

      C. informasi bisa dilihat secara global

    • D.

      D. resiko terhadap keamanan integritas data lebih kecil

    • E.

      E. akses data dan informasi dengan cepat

    Correct Answer
    D. D. resiko terhadap keamanan integritas data lebih kecil
    Explanation
    The given answer states that the risk to the security and integrity of the data is smaller when using a web-based database system. This means that web-based databases are considered to have a higher level of security and data integrity compared to other types of database systems. This is because web-based databases often have built-in security measures such as encryption, authentication, and access control, which help protect the data from unauthorized access, modification, or loss.

    Rate this question:

  • 6. 

    Lihatlah script MySQL dibawah ini : $hostmysql = “localhost”; $username = “root”; $password = “ ”; $database = “siswa”; $conn = mysql_connect(”$hostmysql”,”$username”,”$password”); if (!$conn) die (”Koneksi gagal”); mysql_select_db($database,$conn) or die (”Database tidak ditemukan”); > Statement “mysql_connect” digunakan untuk ....

    • A.

      A. memilih database yang akan digunakan

    • B.

      B. membuat koneksi dari php ke server mysql

    • C.

      C. menampilkan pesan kesalahan

    • D.

      D. mengikutsertakan sebuah file

    • E.

      E. menampilkan data dari tabel

    Correct Answer
    B. B. membuat koneksi dari php ke server mysql
    Explanation
    The given script is using the "mysql_connect" statement to establish a connection between PHP and the MySQL server. This statement is used to create a connection object that allows PHP to interact with the MySQL database. Therefore, option B is the correct answer as it accurately describes the purpose of the "mysql_connect" statement in the given script.

    Rate this question:

  • 7. 

    Dalam mendesain sistem keamanan jaringan, salah satu hal yang perlu diperhatikan adalah mengaudit kebutuhan pengendalian sistem. Informasi yang diperlukan untuk mendesain sistem dengan performasi yang lebih baik adalah sebagai berikut, kecuali...

    • A.

      Mengontrol sistem kendali pengamanan jaringan dari beberapa perangkat jaringan

    • B.

      Lebih mengutamakan kecepatan CPU daripada kecepatan jaringan sehingga tidak menimbulkan efek kemacetan jaringan

    • C.

      Mengurangi jumlah paket untuk mengurangi overhead software

    • D.

      Menambah jumlah bandwith untuk menghindari penundaan yang terlalu lama, meningkatkan kecepatan pemrosesan, serta mengurangi masalah kemacetan.

    • E.

      Untuk mengontrol timeout, jangan menset timeout terlalu lama atau terlalu cepat

    Correct Answer
    A. Mengontrol sistem kendali pengamanan jaringan dari beberapa perangkat jaringan
    Explanation
    The given answer is the correct one because it goes against the principle of designing a security system to control security control systems from multiple network devices. This can lead to a lack of centralized control and coordination, making it difficult to effectively manage and secure the network. It is important to have a centralized control system to ensure proper monitoring and enforcement of security policies across the network.

    Rate this question:

  • 8. 

    Hal-hal yang menjadi tolak ukur penggunaan maksimum jaringan adalah sebagai berikut, kecuali....

    • A.

      Pengiriman paket yang ada (actual packets/sec) berbanding pengiriman paket maksimum ( vs max packets/sec)

    • B.

      Persentase dari penggunaan bandwidth yang ada berbanding jumlah bandwidth maksimum yang tersedia

    • C.

      Perbandingan keefektifan dari komputer yang sedang menjalankan program aplikasi yang banyak di-download dari Internet

    • D.

      Jumlah bandwidth nyata (Throughput) bps yang diterima berbanding dengan jumlah maksimum Throughput bps yang mungkin

    Correct Answer
    C. Perbandingan keefektifan dari komputer yang sedang menjalankan program aplikasi yang banyak di-download dari Internet
    Explanation
    The given options discuss various factors that can be used as benchmarks for measuring the maximum usage of a network. However, the option "Perbandingan keefektifan dari komputer yang sedang menjalankan program aplikasi yang banyak di-download dari Internet" (Comparison of the effectiveness of a computer running multiple applications downloaded from the Internet) does not directly relate to measuring the maximum usage of a network. Therefore, it is the exception among the given options.

    Rate this question:

  • 9. 

    Berikut ini yang termasuk kedalam komponen Threats (ancaman) adalah....

    • A.

      Radiasi

    • B.

      Keteledoran

    • C.

      Cetakan (print out)

    • D.

      Crackers

    Correct Answer
    D. Crackers
    Explanation
    The correct answer is "Crackers". Crackers refer to individuals or groups who attempt to gain unauthorized access to computer systems or networks with malicious intent. They pose a threat to the security and integrity of data and can cause significant damage to systems, steal sensitive information, or disrupt operations. Therefore, crackers are considered a threat component in the context of computer security.

    Rate this question:

  • 10. 

     Usaha-usaha berikut ini merupakan usaha yang dapat digunakan untuk menanggulangi resiko (risk) pada suatu sistem jaringan, kecuali...

    • A.

      Usaha untuk mengurangi Vulnerability

    • B.

      Mendeteksi kejadian yang tidak bersahabat (hostile event)

    • C.

      Memberikan userid dan password kepada orang yang paling kita percayai

    • D.

      Tidak ada jawaban yang benar

    Correct Answer
    C. Memberikan userid dan password kepada orang yang paling kita percayai
    Explanation
    The given answer, "Memberikan userid dan password kepada orang yang paling kita percayai" (Giving userid and password to the person we trust the most), is not a valid effort to mitigate risk in a network system. Sharing sensitive login credentials with someone, even if they are trusted, increases the vulnerability of the system and can lead to unauthorized access or misuse of information. Therefore, this option does not help in addressing or reducing risk in the network system.

    Rate this question:

  • 11. 

    Perusahaan XYZ mewajibkan semua karyawannya untuk mengganti password mereka minimal sebulan sekali. Tindakan ini berguna untuk meningkatkan unsur …. pada sistem.

    • A.

      Confidentiality

    • B.

      Integrity

    • C.

      Availability

    • D.

      Pilihan (a) dan (c) benar

    Correct Answer
    A. Confidentiality
    Explanation
    The correct answer is "Confidentiality." Requiring employees to change their passwords regularly helps to maintain the confidentiality of sensitive information within the system. By regularly changing passwords, the risk of unauthorized access to confidential data is reduced, ensuring that only authorized individuals can access and view sensitive information.

    Rate this question:

  • 12. 

    Metode serangan email-bombing dilakukan dengan cara mengirimkan sejumlah besar email ke alamat email korban sehingga server emailnya menjadi lumpuh. Tujuan dari tindakan ini adalah menurunkan unsur …. dari korban.

    • A.

      Confidentiality

    • B.

      Integrity

    • C.

      Availability

    • D.

      Pilihan (a) dan (b) benar

    Correct Answer
    C. Availability
    Explanation
    The correct answer is "Availability". Email-bombing is a method of attack where a large number of emails are sent to the victim's email address, causing their email server to become overwhelmed and unavailable. The purpose of this action is to disrupt the availability of the victim's email service.

    Rate this question:

  • 13. 

    Melakukan enkripsi pada email serta melengkapinya dengan digital signature sebelum dikirimkan merupakan tindakan keamanan yang bertujuan untuk meningkatkan unsur:

    • A.

      Confidentiality

    • B.

      Integrity

    • C.

      Availability

    • D.

      Pilihan (a) dan (b) benar

    Correct Answer
    D. Pilihan (a) dan (b) benar
    Explanation
    Performing encryption on an email and adding a digital signature before sending it enhances both confidentiality and integrity. Encryption ensures that only the intended recipient can access the content of the email, maintaining confidentiality. The digital signature ensures that the email has not been tampered with during transmission, ensuring integrity. Therefore, both options (a) and (b) are correct.

    Rate this question:

  • 14. 

    Alex menerima sebuah sms tipuan yang nampaknya berasal dari sebuah perusahaan layanan komunikasi selular dan berisi pemberitahuan bahwa ia menjadi pemenang sebuah sayembara. Teknik ini termasuk ancaman keamanan unsur ….

    • A.

      Confidentiality

    • B.

      Integrity

    • C.

      Availability

    • D.

      Pilihan (a) dan (b) benar

    Correct Answer
    B. Integrity
    Explanation
    The correct answer is integrity. In this scenario, the text message is a deceptive one, pretending to be from a cellular communication company and claiming that Alex has won a contest. This is an example of a breach of integrity, as the message is misleading and manipulative. Integrity refers to the trustworthiness and accuracy of information, and in this case, the message is intentionally deceptive, compromising the integrity of the communication.

    Rate this question:

  • 15. 

    Agus mencuri account internet-banking milik Alex dan menggunakannya untuk mentransfer sejumlah uang ke rekeningnya sendiri. Tindakan ini adalah kombinasi ancaman keamanan terhadap unsur ….

    • A.

      Confidentiality dan Integrity

    • B.

      Integrity dan Availability

    • C.

      Availability dan Confidentiality

    • D.

      Semua unsur dalam CIA

    Correct Answer
    A. Confidentiality dan Integrity
    Explanation
    The action of Agus stealing Alex's internet banking account and transferring money to his own account involves a threat to both confidentiality and integrity. Confidentiality is compromised because Agus gains unauthorized access to Alex's account and can view sensitive information. Integrity is compromised because Agus manipulates the account by transferring money to his own account without Alex's permission, causing unauthorized changes to the account's data. Therefore, the correct answer is "Confidentiality and Integrity."

    Rate this question:

  • 16. 

    Selain memiliki kartu ATM, seorang nasabah harus memasukkan nomor pin yang benar untuk bisa mengambil uang dari mesin ATM. Penggunaan pin seperti ini adalah salah satu contoh metode:

    • A.

      Identification

    • B.

      Authentication

    • C.

      Authorization

    • D.

      Accountability

    Correct Answer
    B. Authentication
    Explanation
    Authentication is the correct answer because it refers to the process of verifying the identity of a user or entity. In this scenario, the user needs to input the correct PIN number to prove their identity and gain access to their account.

    Rate this question:

  • 17. 

    Setelah user sukses melewati tahapan login, sistem operasi akan menerapkan batasan-batasan keamanan terhadap user sesuai dengan skema keamanan dari user tersebut. Metode ini termasuk kategori:

    • A.

      Identification

    • B.

      Authentication

    • C.

      Authorization

    • D.

      Accountability

    Correct Answer
    C. Authorization
    Explanation
    After a user successfully passes the login stage, the operating system will apply security restrictions to the user based on their security scheme. This process is known as authorization, where the system grants or denies access to specific resources or actions based on the user's privileges and permissions. Identification is the process of identifying the user, authentication is the process of verifying the user's identity, and accountability is the process of tracking and logging user actions. Therefore, the correct answer is authorization.

    Rate this question:

  • 18. 

    Jack ditangkap polisi dengan tuduhan melakukan pembobolan server di perusahaan tempatnya bekerja. Tuduhan tersebut dibuktikan oleh sistem log yang mencatat secara detil kegiatan peretasannya itu. Kasus ini membuktikan bahwa aspek ….. dari proteksi keamanan sistem perusahaan tersebut sudah cukup baik.

    • A.

      Identification

    • B.

      Authentication

    • C.

      Authorization

    • D.

      Accountability

    Correct Answer
    D. Accountability
    Explanation
    The case of Jack being caught by the police for hacking into the company's server and the detailed log system providing evidence of his actions demonstrates that the aspect of accountability in the security protection of the company's system is sufficient. Accountability refers to the ability to trace and assign responsibility for actions taken within a system. In this case, the log system allows for tracking and identifying Jack's activities, making him accountable for his actions.

    Rate this question:

  • 19. 

    Jenis program berbahaya (malicious software) yang memiliki kemampuan menyembunyikan keberadaannya dalam sistem operasi sehingga pengguna tidak menyadari bahwa komputernya berada dalam bahaya, disebut:

    • A.

      Virus

    • B.

      Shareware

    • C.

      Spyware

    • D.

      Rootkit

    Correct Answer
    D. Rootkit
    Explanation
    A rootkit is a type of malicious software that is capable of hiding its presence within an operating system, making it difficult for users to realize that their computer is at risk. Unlike viruses, shareware, and spyware, rootkits are specifically designed to remain undetected and can give attackers unauthorized access to a system. They can manipulate system functions, disable security measures, and even control the entire operating system. Therefore, rootkits pose a significant threat to the security and privacy of a computer system.

    Rate this question:

  • 20. 

    Security mechanism yang digunakan untuk menghindari ancaman network sniffing adalah:

    • A.

      Password

    • B.

      Antivirus

    • C.

      Encryption

    • D.

      Digital signature

    Correct Answer
    C. Encryption
    Explanation
    Encryption is the security mechanism used to prevent network sniffing threats. It involves converting plaintext data into ciphertext using an encryption algorithm and a secret key. This ensures that even if an attacker intercepts the network traffic, they cannot understand the information without the key to decrypt it. Encryption provides confidentiality and protects sensitive data from being accessed or understood by unauthorized individuals.

    Rate this question:

  • 21. 

    Sebuah security policy menyatakan bahwa folder penyimpanan file harus dalam status read-only. Security mechanism yang memastikan policy ini dilaksanakan adalah:

    • A.

      File permission system

    • B.

      Folder backup system

    • C.

      File encryption application

    • D.

      Automatic antivirus update

    Correct Answer
    A. File permission system
    Explanation
    The correct answer is the File permission system. This security mechanism ensures that the folder storing files is set to read-only status, preventing any unauthorized modifications or deletions. By setting appropriate file permissions, the system can control access to the folder and ensure that only authorized users have the necessary privileges to make changes. This helps enforce the security policy stated in the question. Folder backup system, file encryption application, and automatic antivirus update are not directly related to enforcing read-only status on the folder.

    Rate this question:

  • 22. 

    Salah satu tindakan yang dilakukan oleh Kendali Akses Sistem untuk mendorong user dalam menjaga keamanan sistemnya sendiri adalah:

    • A.

      Menganjurkan updating antivirus setiap kali user terkoneksi dengan internet

    • B.

      Menampilkan isian userid dan password setiap kali komputer diaktifkan

    • C.

      Mencatat setiap event yang dilakukan oleh user

    • D.

      Menganalisa semua trafik jaringan yang keluar-masuk ke dalam sistem

    Correct Answer
    A. Menganjurkan updating antivirus setiap kali user terkoneksi dengan internet
    Explanation
    One action that the System Access Control takes to encourage users to maintain the security of their system is by recommending updating antivirus every time the user is connected to the internet. This is because antivirus software helps protect the system from various malware and viruses that can be encountered while browsing the internet. Regularly updating the antivirus ensures that the system has the latest virus definitions and security patches, enhancing its ability to detect and prevent potential threats.

    Rate this question:

  • 23. 

    Berikut merupakan jenis-jenis keamanan jaringan yang dapat diterapkan pada komputer jaringan …..

    • A.

      A. Computer Name

    • B.

      B Network ID

    • C.

      C. Subnet Mask

    • D.

      D. Workgroup

    • E.

      E. SUID

    Correct Answer
    E. E. SUID
    Explanation
    The given options are all related to network security, except for option E, SUID. SUID stands for Set User ID, which is a permission that allows a user to execute a program with the privileges of the program's owner. This is not directly related to network security, but rather a permission setting in Unix-like operating systems. Therefore, the correct answer is E. SUID.

    Rate this question:

  • 24. 

    Firewall pada pengamanan jaringan bertujuan sebagai berikut  ….

    • A.

      A. Membatasi akses jaringan bagi user

    • B.

      B. Menyediakan layanan data

    • C.

      C. Memberikan bandwidth yang besar

    • D.

      D. Merupakan aplikasi anti virus

    • E.

      E. Software aplikasi Remote Client

    Correct Answer
    A. A. Membatasi akses jaringan bagi user
    Explanation
    Firewall pada pengamanan jaringan bertujuan untuk membatasi akses jaringan bagi user. Firewall berfungsi sebagai filter yang dapat mengontrol lalu lintas data yang masuk dan keluar dari jaringan. Dengan membatasi akses jaringan, firewall dapat melindungi jaringan dari serangan yang tidak diinginkan dan mencegah pengguna yang tidak berwenang untuk mengakses sumber daya jaringan.

    Rate this question:

  • 25. 

    Berikut merupakan masalah keamanan jaringan yang disebakan oleh faktor ancaman manusia (user), yatu ….

    • A.

      A. Penulisan IP Address

    • B.

      B. Kesalahan pemograman install software

    • C.

      C. Gangguan arus listrik

    • D.

      D. Backup data

    • E.

      E. Instal anti vrus

    Correct Answer
    B. B. Kesalahan pemograman install software
    Explanation
    The correct answer is B. Kesalahan pemograman install software. This answer suggests that the security issue in the network is caused by programming errors during the installation of software. These errors could potentially create vulnerabilities that can be exploited by attackers to gain unauthorized access or compromise the network's security.

    Rate this question:

  • 26. 

    Berikut merupakan cara kerja HTTPS dalam keamanan jaringan,  ….

    • A.

      A. Layanan akses data

    • B.

      B. Enkripsi informasi terkirim dari server

    • C.

      C. IP Protokol

    • D.

      D. Membagi bandwitdh, akses jaringan cepat

    • E.

      E. Menyediakan layanan website

    Correct Answer
    B. B. Enkripsi informasi terkirim dari server
    Explanation
    HTTPS (Hypertext Transfer Protocol Secure) adalah protokol yang digunakan untuk mengamankan komunikasi antara server dan browser. Cara kerja HTTPS adalah dengan menggunakan enkripsi untuk melindungi informasi yang dikirimkan dari server ke pengguna. Enkripsi ini menggunakan teknik kriptografi yang membuat data tidak dapat dibaca oleh pihak yang tidak berwenang. Dengan demikian, HTTPS membantu menjaga kerahasiaan dan keutuhan data yang dikirimkan melalui jaringan.

    Rate this question:

  • 27. 

    Berikut merupakan Tools keamanan jaringan, yaitu ….

    • A.

      A. CCTV

    • B.

      B. Ami Pro

    • C.

      C. Data Encryption

    • D.

      D. Sniffer

    • E.

      E. HTFS

    • F.

      E. HTFS

    Correct Answer
    D. D. Sniffer
    Explanation
    A sniffer is a network security tool used to capture and analyze network traffic. It allows network administrators to monitor and analyze the data packets flowing through a network, which helps in detecting any suspicious activities or identifying potential security threats. By capturing and analyzing network traffic, a sniffer can provide valuable insights into the network's security vulnerabilities and help in implementing appropriate measures to protect against unauthorized access or data breaches.

    Rate this question:

  • 28. 

    Berikut yang termasuk kedalam identifikasi pengendalian jaringan, yaitu …

    • A.

      A. Konfigurasi IP Address

    • B.

      B. Remote Admin

    • C.

      C. Physical Access Control

    • D.

      D. Password

    • E.

      E. Client Remote

    Correct Answer
    C. C. Physical Access Control
    Explanation
    Physical Access Control refers to the measures taken to prevent unauthorized physical access to a network or system. This can include physical barriers such as locks, security guards, and surveillance cameras, as well as access control systems like key cards or biometric scanners. By implementing physical access control, organizations can ensure that only authorized individuals are able to physically access their network infrastructure, reducing the risk of unauthorized access, theft, or damage to the system.

    Rate this question:

  • 29. 

    Berikut langkah yang dilakukan oleh administrator keamanan jaringan dalam logical access control, yaitu ….

    • A.

      A. Identifikasi akses jaringan

    • B.

      B. Identifikasi instalasi software

    • C.

      C. Menyediakan autentikasi user jaringan

    • D.

      D. Memberikan akses data secara free akses

    • E.

      E. Instal sistem operasi jaringan

    Correct Answer
    C. C. Menyediakan autentikasi user jaringan
    Explanation
    The correct answer is C. Menyediakan autentikasi user jaringan (Providing network user authentication). In logical access control, the network security administrator's role is to ensure that only authorized users are granted access to the network. This is done through the process of authentication, where users are required to provide credentials such as usernames and passwords to prove their identity before gaining access to the network. By providing network user authentication, the administrator can verify the identity of users and prevent unauthorized access to the network.

    Rate this question:

  • 30. 

    Dalam jaringan terdapat komputer yang difungsikan sebagai Data base Server, Data base server bertujuan sebagai berikut ……

    • A.

      A. Penyedia data dan koneksi dengan cabang lain

    • B.

      B. Sebagai filter akses jaringan

    • C.

      C. Merupakan sistem firewall

    • D.

      D. Penyedia password log in

    • E.

      E. Pemindai user jaringan

    Correct Answer
    A. A. Penyedia data dan koneksi dengan cabang lain
    Explanation
    The correct answer is A. Penyedia data dan koneksi dengan cabang lain. In a network, a computer functioning as a database server is responsible for providing data and establishing connections with other branches or locations. It serves as a central repository for storing and managing data, allowing other computers on the network to access and retrieve information as needed. Additionally, it facilitates communication and data exchange between different branches or locations of an organization.

    Rate this question:

  • 31. 

    Pendeteksian gangguan keamanan jaringan bisa disebut juga dengan  ….

    • A.

      A. Blayteam

    • B.

      B. Anti spayware

    • C.

      C. Instrusion Detection System

    • D.

      D. Oneways

    • E.

      E. Deteksi Sistem

    Correct Answer
    C. C. Instrusion Detection System
    Explanation
    The correct answer is C. Intrusion Detection System. Intrusion Detection System refers to the process of detecting unauthorized access or malicious activities in a network. It helps in identifying and responding to potential security breaches, thus ensuring the security of the network. The other options such as Blayteam, Anti spayware, Oneways, and Deteksi Sistem are not relevant or accurate terms for network security detection.

    Rate this question:

  • 32. 

    Firewall jenis ini beroperasi pada level yang lebih tinggi dalam model referensi tujuh lapis OSI, yaitu ….

    • A.

      A. Network Address Translation

    • B.

      B. Packet Filtering Firewall

    • C.

      C. Circuit Level Gateway

    • D.

      D. Virtual Circuit

    • E.

      E. Packet Filter Firewall

    Correct Answer
    E. E. Packet Filter Firewall
    Explanation
    Packet filter firewalls operate at a higher level in the seven-layer OSI reference model. They examine individual packets of data and make decisions based on information such as source and destination IP addresses, port numbers, and protocol types. This allows them to filter and block specific packets based on predefined rules. Packet filter firewalls are considered less secure compared to other types of firewalls because they do not inspect the contents of the packets, making them more susceptible to certain types of attacks.

    Rate this question:

  • 33. 

    Sebuah firewall yang menggabungkan keunggulan yang ditawarkan oleh packet-filtering firewall, NAT firewall, Circuit-Level firewall dan Proxy firewall dalam satu sistem adalah ….

    • A.

      A. Virtual Firewall

    • B.

      B. Stateful Firewall

    • C.

      C. Sreened Host Firewall

    • D.

      D. Virtual Circuit

    • E.

      E. Bridging Firewall

    Correct Answer
    B. B. Stateful Firewall
    Explanation
    A stateful firewall combines the advantages offered by packet-filtering firewall, NAT firewall, Circuit-Level firewall, and Proxy firewall into one system. It is capable of monitoring the state of network connections and keeping track of the context of each connection. This allows the firewall to make more informed decisions about which packets to allow or block based on the connection's current state. Stateful firewalls provide better security and control over network traffic compared to other types of firewalls.

    Rate this question:

  • 34. 

    Penggunaan perangkat elektronik untuk mengirimkan pesan secara bertubi-tubi ke alamat email tanpa dikehendaki oleh penerimanya disebut….

    • A.

      A. Spyware

    • B.

      B. Malware

    • C.

      C. Virus

    • D.

      D. Spam

    • E.

      E. Hacking

    Correct Answer
    D. D. Spam
    Explanation
    Spam refers to the unwanted and unsolicited messages that are sent in bulk to email addresses. These messages are typically promotional in nature and are sent without the consent or desire of the recipient. Therefore, the usage of electronic devices to send such messages without the recipient's consent is referred to as spam.

    Rate this question:

  • 35. 

    Berikut ini yang bukan termasuk tipe-tipe firewall, adalah ……

    • A.

      A. Packet Filtering Firewall

    • B.

      B. Dual homed Gateway Firewall

    • C.

      C. Autentikasi Firewall

    • D.

      D. Sreened Host Firewall

    • E.

      E. Sreened Subnet Firewall

    Correct Answer
    C. C. Autentikasi Firewall
    Explanation
    The correct answer is C. Autentikasi Firewall. Autentikasi refers to the process of verifying the identity of a user or device. While authentication is an important aspect of network security, it is not a type of firewall. The other options, including Packet Filtering Firewall, Dual homed Gateway Firewall, Sreened Host Firewall, and Sreened Subnet Firewall, are all types of firewalls that provide different levels of protection and security for a network.

    Rate this question:

  • 36. 

    Proses autentikasi dapat terjadi tanpa intervensi pengguna adalah keunggulan dari ….

    • A.

      A. Shared Key

    • B.

      B. Sertifikat Digital

    • C.

      C. Xauth

    • D.

      D. Intrasrtuktur

    • E.

      E. Pre Shared Key

    Correct Answer
    B. B. Sertifikat Digital
    Explanation
    Sertifikat digital adalah metode autentikasi yang memungkinkan proses autentikasi terjadi tanpa intervensi pengguna. Sertifikat digital menggunakan kunci publik dan kunci privat untuk memverifikasi identitas pengguna dan memastikan bahwa komunikasi aman antara dua pihak. Dengan menggunakan sertifikat digital, proses autentikasi dapat dilakukan secara otomatis dan tanpa perlu campur tangan pengguna.

    Rate this question:

  • 37. 

    Tindakan yang dilakukan oleh Firewall dengan melewatkan paket data atau memblok paket data ketujuannya adalah tindakan …..

    • A.

      A. Monitoring

    • B.

      B. Bocking

    • C.

      C. Controling

    • D.

      D. Filtering

    • E.

      E. Accessing

    Correct Answer
    C. C. Controling
    Explanation
    Firewall melakukan tindakan "filtering" dengan melewatkan atau memblokir paket data sesuai dengan tujuannya. Tindakan ini dilakukan untuk mengontrol lalu lintas data yang masuk dan keluar dari jaringan, sehingga dapat melindungi jaringan dari ancaman yang tidak diinginkan.

    Rate this question:

  • 38. 

    Symantec Norton Personal Firewall, Keri O Personal adalah contoh dari macam-macam firewall….

    • A.

      A. Firewall

    • B.

      B. Free Firewall

    • C.

      C. Commercial Firewall

    • D.

      D. Packet Filter Firewall

    • E.

      E. Personal Firewall

    Correct Answer
    E. E. Personal Firewall
    Explanation
    The given correct answer is E. Personal Firewall. This is because Symantec Norton Personal Firewall and Keri O Personal are mentioned as examples, which implies that they fall under the category of personal firewalls. Personal firewalls are designed to protect individual computers from unauthorized access and malicious activities, providing security at the user's personal level.

    Rate this question:

  • 39. 

    Sebuah system atau grup system yang menjalankan control akses keamanan diantara jaringan internal yang aman dan jaringan yang untrusted seperti internet adalah ….

    • A.

      A. Firewall

    • B.

      B. Spyware

    • C.

      C. Network

    • D.

      D. Malware

    • E.

      E. Anti virus

    Correct Answer
    A. A. Firewall
    Explanation
    A firewall is a system or group of systems that controls access to security between a secure internal network and an untrusted network such as the internet. It acts as a barrier, monitoring and filtering incoming and outgoing network traffic based on predetermined security rules. This helps prevent unauthorized access, malicious attacks, and the spread of malware or viruses from the untrusted network to the internal network.

    Rate this question:

  • 40. 

    Fungsi Firewall yang sebagai penghubung antara komputer Client dengan jaringan luar disebut dengan fungsi ….

    • A.

      A. Monitoring

    • B.

      B. Filtering

    • C.

      C. Controling

    • D.

      D. Accessing

    • E.

      E. Proxy

    Correct Answer
    E. E. Proxy
    Explanation
    The correct answer is E. Proxy. A proxy server acts as an intermediary between a client computer and the internet, allowing the client to make indirect network connections to other servers. It helps to improve security and privacy by hiding the client's IP address and filtering out malicious or unwanted traffic. It also helps to improve performance by caching frequently accessed web pages and reducing the load on the client's network.

    Rate this question:

  • 41. 

    Proses pengubahan/konversi/penyandian suatu informasi kebentuk tertentu sehingga tidak di-mengerti oleh pihak yang tidak berhak disebut

    • A.

      A. Deskripsi

    • B.

      B. Validasi

    • C.

      C. Property

    • D.

      D. Proteksi

    • E.

      E. Enkripsi

    Correct Answer
    E. E. Enkripsi
    Explanation
    The correct answer is E. Enkripsi. Enkripsi is the process of converting or encoding information into a specific form so that it cannot be understood by unauthorized parties. It is a method used to protect sensitive data and ensure its confidentiality.

    Rate this question:

  • 42. 

    Selain password, untuk menjaga keamanan atau hak akses maka sistem akan meminta …

    • A.

      A. User ID

    • B.

      B. Computer Name

    • C.

      C. Nomor ID Card

    • D.

      D. IP Address

    • E.

      E. Workgoup

    Correct Answer
    A. A. User ID
    Explanation
    To ensure security and access rights, systems often require a user ID in addition to a password. A user ID is a unique identifier assigned to each user, allowing the system to differentiate between different users and grant appropriate access privileges. By requesting a user ID, the system can verify the identity of the user and determine their level of authorization. This helps prevent unauthorized access and protects sensitive information.

    Rate this question:

  • 43. 

    Jaringan antarsitus adalah....

    • A.

      Blog

    • B.

      Spam

    • C.

      Email

    • D.

      Wan

    • E.

      Internet

    Correct Answer
    E. Internet
    Explanation
    The correct answer is Internet because jaringan antarsitus refers to the network of interconnected computer networks, which is commonly known as the Internet. The other options (blog, Spam, email, wan) are all specific components or activities that can be found within the Internet, but they do not encompass the entire network itself.

    Rate this question:

  • 44. 

    Persentase dari penggunaan trafik yang secara benar di transmisikan  pada sistem, yang berhubungan dengan trafik, termasuk error yang terjadi saat transmisi, yang juga berhubungan dengan penggunaan aplikasi jaringan dan jaringan itu sendiri. Dibawah ini yang merupakan defenisi dari pernyataan diatas adalah...

    • A.

      Accuracy

    • B.

      Availability

    • C.

      Respon time

    • D.

      Performansi

    Correct Answer
    A. Accuracy
    Explanation
    The given statement describes the percentage of correctly transmitted traffic on a system, including transmission errors related to network application usage and the network itself. Accuracy refers to the correctness or precision of the transmitted data, making it the most suitable definition for the given statement.

    Rate this question:

  • 45. 

    Berikut ini yang tidak termasuk protokol jaringan adalah....

    • A.

      IPX/SPX

    • B.

      PDU

    • C.

      TCP/IP

    • D.

      UDP

    Correct Answer
    B. PDU
    Explanation
    The given options are IPX/SPX, PDU, TCP/IP, and UDP. The correct answer is PDU. PDU stands for Protocol Data Unit, which is a term used to refer to the data that is being transmitted over a network. It is not a network protocol itself but rather a concept that is used to describe the data being sent. The other options, IPX/SPX, TCP/IP, and UDP, are all network protocols that are used for communication between devices in a network.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 15, 2019
    Quiz Created by
    ASEP WAHYUDIN
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.