JARINGAN KOMPUTER

Quiz
•
Computers
•
University
•
Hard
oneil shakile
Used 1+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Manakah dari berikut ini yang merupakan bidang 16-bit yang mengidentifikasi nomor port sumber dari program aplikasi di host yang mengirim segmen?
Sequence Number
Header Length
Acknowledgment Number
Source Port Address
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
John bekerja sebagai programmer C. Dia mengembangkan program C berikut:
Programnya rentan terhadap serangan __________.
SQL injection
Denial-of-Service
Buffer overflow
Cross site scripting
3.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Manakah dari berikut ini yang menganalisis lalu lintas jaringan untuk melacak transaksi tertentu dan dapat mencegat dan mencatat lalu lintas yang melewati jaringan digital? Setiap jawaban yang benar mewakili solusi lengkap. Pilih semua yang berlaku.
Wireless sniffer
Spectrum analyzer
Protocol analyzer
Performance Monitor
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:
`It is a Linux-based WLAN WEP cracking tool that recovers encryption keys. It operates by passively monitoring transmissions. It uses Ciphertext Only Attack and captures approximately 5 to 10 million packets to decrypt the WEP keys.`
Which of the following tools is John using to crack the wireless encryption keys?
PsPasswd
Kismet
AirSnort
Cain
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Manakah dari protokol berikut yang digunakan untuk bertukar informasi perutean antara dua gateway dalam jaringan sistem otonom?
IGMP
(Internet Group Management Protocol)
ICMP
(Internet Control Message Protocol)
EGP
(Exterior Gateway Protocol)
OSPF
(Open Shortest Path First)
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is a process that detects a problem, determines its cause, minimizes the damages, resolves the problem, and documents each step of response for future reference?
Incident response
Incident handling
Incident management
Incident planning
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is an intrusion detection system that monitors and analyzes the internals of a computing system rather than the network packets on its external interfaces?
IPS
HIDS
DMZ
NIDS
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
Cryptology

Quiz
•
9th Grade - University
10 questions
Quantum Computing

Quiz
•
8th Grade - University
15 questions
014_Key Exchange - CompTIA Security+ SY0-701 - 1.4

Quiz
•
12th Grade - University
15 questions
012_Public Key Infrastructure - CompTIA Security+ Sy0-701 - 1.4

Quiz
•
12th Grade - University
11 questions
Quiz 1

Quiz
•
University
10 questions
ITBP301_Chapter 04

Quiz
•
University
10 questions
Chapter 11 Quizz

Quiz
•
University
10 questions
Lecture 4

Quiz
•
University
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade