Anda di halaman 1dari 2

1. Which one of the following is not WLAN security requirements? a. Wireless Accountability b. Enhanced WEP c. Wireless Nonrepudiation d.

Wireless System Answer: D Pembahasan: Persyaratan keamanan WLAN adalah sebagai berikut: Authentication Wireless Nonrepudiation Wireless Accountability Wireless Integrity Wireless Privacy Standard WEP Enhanced WEP

2. A sacrificial server placed in such a manner as to attract the interest of the attacker is basic types of decoys .. a. Honey Pot b. Honey Net c. Honey Web d. Honey System Answer: A Pembahasan: Honey Pet adalah korban server yang ditempatkan sedemikian rupa untuk menarik minat penyerang. 3. Three technical methods of detecting a network intrusion is... a. Statistical, Ordinal, and Robust b. Statistical, Signature, and Neural c. Signature, Ordinal, and Neural d. Robust, Ordinal, and Signature Answer: B

Pembahasan: Ada 3 metode teknis untuk mendeteksi intrusi jaringan, yaitu Statistical, Signature, dan Neural. 4. Authentication function can be used to .. a. check data in storage b. detect intrusion c. digital certificates d. opened key of encryption Answer: C Pembahasan: Fungsi otentik dapat digunakan dalam hal-hal berikut: Digital Signature (tanda tangan digital) Digital Certificates (sertifikat digital) Public key decryption

Anda mungkin juga menyukai