Manakah dari berikut ini yang merupakan bidang 16-bit yang mengidentifikasi nomor port sumber dari program aplikasi di host yang mengirim segmen?
JARINGAN KOMPUTER

Quiz
•
Computers
•
University
•
Hard
oneil shakile
Used 1+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Sequence Number
Header Length
Acknowledgment Number
Source Port Address
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
John bekerja sebagai programmer C. Dia mengembangkan program C berikut:
Programnya rentan terhadap serangan __________.
SQL injection
Denial-of-Service
Buffer overflow
Cross site scripting
3.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Manakah dari berikut ini yang menganalisis lalu lintas jaringan untuk melacak transaksi tertentu dan dapat mencegat dan mencatat lalu lintas yang melewati jaringan digital? Setiap jawaban yang benar mewakili solusi lengkap. Pilih semua yang berlaku.
Wireless sniffer
Spectrum analyzer
Protocol analyzer
Performance Monitor
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:
`It is a Linux-based WLAN WEP cracking tool that recovers encryption keys. It operates by passively monitoring transmissions. It uses Ciphertext Only Attack and captures approximately 5 to 10 million packets to decrypt the WEP keys.`
Which of the following tools is John using to crack the wireless encryption keys?
PsPasswd
Kismet
AirSnort
Cain
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Manakah dari protokol berikut yang digunakan untuk bertukar informasi perutean antara dua gateway dalam jaringan sistem otonom?
IGMP
(Internet Group Management Protocol)
ICMP
(Internet Control Message Protocol)
EGP
(Exterior Gateway Protocol)
OSPF
(Open Shortest Path First)
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is a process that detects a problem, determines its cause, minimizes the damages, resolves the problem, and documents each step of response for future reference?
Incident response
Incident handling
Incident management
Incident planning
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is an intrusion detection system that monitors and analyzes the internals of a computing system rather than the network packets on its external interfaces?
IPS
HIDS
DMZ
NIDS
Create a free account and access millions of resources
Similar Resources on Quizizz
15 questions
012_Public Key Infrastructure - CompTIA Security+ Sy0-701 - 1.4

Quiz
•
12th Grade - University
10 questions
ITBP301_Chapter 02

Quiz
•
University
10 questions
Chapter 11 Quizz

Quiz
•
University
10 questions
Lecture 4

Quiz
•
University
15 questions
Cryptology

Quiz
•
9th Grade - University
10 questions
Quantum Computing

Quiz
•
8th Grade - University
15 questions
014_Key Exchange - CompTIA Security+ SY0-701 - 1.4

Quiz
•
12th Grade - University
13 questions
015_Key Exchange - CompTIA Security+ SY0-701 - 1.4

Quiz
•
9th Grade - University
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade