AUDITOR KEAMANAN JARINGAN

AUDITOR KEAMANAN JARINGAN

Professional Development

35 Qs

quiz-placeholder

Similar activities

Struktur Data

Struktur Data

University - Professional Development

30 Qs

CompTia Network+

CompTia Network+

Professional Development

33 Qs

QUIZZ AIJ XII TKJ - BAB V - MANAJEMEN BANDWIDTH

QUIZZ AIJ XII TKJ - BAB V - MANAJEMEN BANDWIDTH

KG - Professional Development

30 Qs

KUIS PGSD

KUIS PGSD

Professional Development

30 Qs

Komputer Akuntansi Kelas XI AK

Komputer Akuntansi Kelas XI AK

KG - Professional Development

40 Qs

Comp_Sec_241-270

Comp_Sec_241-270

Professional Development

30 Qs

SKB Microsoft Office dan Struktur Data

SKB Microsoft Office dan Struktur Data

1st Grade - Professional Development

30 Qs

105p2 Modules 9, 10, 11, & 12

105p2 Modules 9, 10, 11, & 12

10th Grade - Professional Development

32 Qs

AUDITOR KEAMANAN JARINGAN

AUDITOR KEAMANAN JARINGAN

Assessment

Quiz

Computers

Professional Development

Practice Problem

Easy

Created by

Amru Susilo

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"Informasi hanya bisa diakses oleh pihak yang berwenang" merupakan sasaran keamanan yang manakah?

  1. Confidentiality

  1. Integrity

  1. Availability

  1. Authenticity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"Penerima informasi mampu membuktikan bahwa pengirim benar-benar mengirimkan informasi tersebut" merupakan sasaran keamanan yang manakah?

  1. Integrity

  1. Non Repudiation

  1. Authenticity

  1. Availability

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. "Pihak yang terlibat pertukaran data dapat diidentifikasi dengan benar" merupakan sasaran keamanan yang manakah?

  1. Integrity

  1. Availability

  1. Non Repudiation

  1. Authenticity

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Application Security Verification Standard (ASVS) disusun oleh:

  1. ISACA

  1. ISO

  1. NIST

  1. OWASP

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Auditor keamanan  informasi mengevaluasi integritas data yang tersimpan dalam suatu database merupakan kegiatan:

  1. Uji Kepatuhan

  1. Uji Kendali

  1. Uji Kesesuaian

  1. Uji Substantif

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Berikut adalah ciri-ciri dari Dynamic Application (Black Box) Security Testing, KECUALI:

  1. Pembetulan bug lebih murah

  1. Butuh eksekusi aplikasi

  1. Bug runtime bisa ditemukan

  1. Menemukan celah di akhir

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Berikut adalah ciri-ciri dari Static Application (White Box) Security Testing, KECUALI:

  1. Butuh source code

  1. Menemukan celah di akhir

  1. Pembetulan bug lebih murah

  1. Bug runtime tidak bisa ditemukan

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?