Search Header Logo

JARINGAN KOMPUTER

Authored by oneil shakile

Computers

University

Used 1+ times

JARINGAN KOMPUTER
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Manakah dari berikut ini yang merupakan bidang 16-bit yang mengidentifikasi nomor port sumber dari program aplikasi di host yang mengirim segmen?

Sequence Number

Header Length

Acknowledgment Number

Source Port Address

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

John bekerja sebagai programmer C. Dia mengembangkan program C berikut:

Programnya rentan terhadap serangan __________.

SQL injection

Denial-of-Service

Buffer overflow

Cross site scripting

3.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Manakah dari berikut ini yang menganalisis lalu lintas jaringan untuk melacak transaksi tertentu dan dapat mencegat dan mencatat lalu lintas yang melewati jaringan digital? Setiap jawaban yang benar mewakili solusi lengkap. Pilih semua yang berlaku.

Wireless sniffer

Spectrum analyzer

Protocol analyzer

Performance Monitor

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:
`It is a Linux-based WLAN WEP cracking tool that recovers encryption keys. It operates by passively monitoring transmissions. It uses Ciphertext Only Attack and captures approximately 5 to 10 million packets to decrypt the WEP keys.`
Which of the following tools is John using to crack the wireless encryption keys?

PsPasswd

Kismet

AirSnort

Cain

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Manakah dari protokol berikut yang digunakan untuk bertukar informasi perutean antara dua gateway dalam jaringan sistem otonom?

IGMP

(Internet Group Management Protocol)

ICMP

(Internet Control Message Protocol)

EGP

(Exterior Gateway Protocol)

OSPF

(Open Shortest Path First)

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a process that detects a problem, determines its cause, minimizes the damages, resolves the problem, and documents each step of response for future reference?

Incident response

Incident handling

Incident management

Incident planning

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an intrusion detection system that monitors and analyzes the internals of a computing system rather than the network packets on its external interfaces?

IPS

HIDS

DMZ

NIDS

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?