JARINGAN KOMPUTER

JARINGAN KOMPUTER

University

10 Qs

quiz-placeholder

Similar activities

012_Public Key Infrastructure - CompTIA Security+ Sy0-701 - 1.4

012_Public Key Infrastructure - CompTIA Security+ Sy0-701 - 1.4

12th Grade - University

15 Qs

Security

Security

12th Grade - University

12 Qs

Computer Science HARD STUFF

Computer Science HARD STUFF

1st Grade - Professional Development

7 Qs

Quiz 1

Quiz 1

University

11 Qs

Computer Networks Assignment : 1

Computer Networks Assignment : 1

University

15 Qs

Topic 4 - Understanding System Vulnerabilities

Topic 4 - Understanding System Vulnerabilities

12th Grade - University

15 Qs

Mitigating Threats

Mitigating Threats

University

12 Qs

Cryptology

Cryptology

9th Grade - University

15 Qs

JARINGAN KOMPUTER

JARINGAN KOMPUTER

Assessment

Quiz

Computers

University

Hard

Created by

oneil shakile

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Manakah dari berikut ini yang merupakan bidang 16-bit yang mengidentifikasi nomor port sumber dari program aplikasi di host yang mengirim segmen?

Sequence Number

Header Length

Acknowledgment Number

Source Port Address

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

John bekerja sebagai programmer C. Dia mengembangkan program C berikut:

Programnya rentan terhadap serangan __________.

SQL injection

Denial-of-Service

Buffer overflow

Cross site scripting

3.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Manakah dari berikut ini yang menganalisis lalu lintas jaringan untuk melacak transaksi tertentu dan dapat mencegat dan mencatat lalu lintas yang melewati jaringan digital? Setiap jawaban yang benar mewakili solusi lengkap. Pilih semua yang berlaku.

Wireless sniffer

Spectrum analyzer

Protocol analyzer

Performance Monitor

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:
`It is a Linux-based WLAN WEP cracking tool that recovers encryption keys. It operates by passively monitoring transmissions. It uses Ciphertext Only Attack and captures approximately 5 to 10 million packets to decrypt the WEP keys.`
Which of the following tools is John using to crack the wireless encryption keys?

PsPasswd

Kismet

AirSnort

Cain

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Manakah dari protokol berikut yang digunakan untuk bertukar informasi perutean antara dua gateway dalam jaringan sistem otonom?

IGMP

(Internet Group Management Protocol)

ICMP

(Internet Control Message Protocol)

EGP

(Exterior Gateway Protocol)

OSPF

(Open Shortest Path First)

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a process that detects a problem, determines its cause, minimizes the damages, resolves the problem, and documents each step of response for future reference?

Incident response

Incident handling

Incident management

Incident planning

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an intrusion detection system that monitors and analyzes the internals of a computing system rather than the network packets on its external interfaces?

IPS

HIDS

DMZ

NIDS

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?