
JARINGAN KOMPUTER
Authored by oneil shakile
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Manakah dari berikut ini yang merupakan bidang 16-bit yang mengidentifikasi nomor port sumber dari program aplikasi di host yang mengirim segmen?
Sequence Number
Header Length
Acknowledgment Number
Source Port Address
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
John bekerja sebagai programmer C. Dia mengembangkan program C berikut:
Programnya rentan terhadap serangan __________.
SQL injection
Denial-of-Service
Buffer overflow
Cross site scripting
3.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Manakah dari berikut ini yang menganalisis lalu lintas jaringan untuk melacak transaksi tertentu dan dapat mencegat dan mencatat lalu lintas yang melewati jaringan digital? Setiap jawaban yang benar mewakili solusi lengkap. Pilih semua yang berlaku.
Wireless sniffer
Spectrum analyzer
Protocol analyzer
Performance Monitor
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:
`It is a Linux-based WLAN WEP cracking tool that recovers encryption keys. It operates by passively monitoring transmissions. It uses Ciphertext Only Attack and captures approximately 5 to 10 million packets to decrypt the WEP keys.`
Which of the following tools is John using to crack the wireless encryption keys?
PsPasswd
Kismet
AirSnort
Cain
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Manakah dari protokol berikut yang digunakan untuk bertukar informasi perutean antara dua gateway dalam jaringan sistem otonom?
IGMP
(Internet Group Management Protocol)
ICMP
(Internet Control Message Protocol)
EGP
(Exterior Gateway Protocol)
OSPF
(Open Shortest Path First)
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is a process that detects a problem, determines its cause, minimizes the damages, resolves the problem, and documents each step of response for future reference?
Incident response
Incident handling
Incident management
Incident planning
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is an intrusion detection system that monitors and analyzes the internals of a computing system rather than the network packets on its external interfaces?
IPS
HIDS
DMZ
NIDS
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Microcontroller
Quiz
•
11th Grade - University
14 questions
Input, output and storage de
Quiz
•
8th Grade - Professio...
15 questions
IT 209
Quiz
•
University
15 questions
Assessment 08
Quiz
•
University
12 questions
ICT450-TOPIC 1
Quiz
•
University
15 questions
Algoritma dan Pemrograman Bab 1
Quiz
•
University
11 questions
Video Watermaking
Quiz
•
University
13 questions
bts
Quiz
•
KG - Professional Dev...
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade