Jawaban VC LSP - Soal Latihan Merancang Keamanan Jaringan by Aditya Nugraha Ramadhan
Jawaban VC LSP - Soal Latihan Merancang Keamanan Jaringan by Aditya Nugraha Ramadhan
Answer saved
Marked out of 5.00
Flag question
Question text
Select one:
a. Physical security
b. Publik
c. Personel
d. Keamanan dalam operasi
Question 2
Answer saved
Marked out of 5.00
Flag question
Question text
Menganalisis pengaruh-pengaruh apa saja yang diakibatkan oleh serangan yang terjadi
dalam jaringan, maksud dari:
Select one:
a. Threat
b. Vulnerability
c. Impact
d. Frequency
Question 3
Answer saved
Marked out of 5.00
Flag question
Question text
Select one:
a. Data
b. Hasil
c. Dokumentasi
d. Komunikasi
Question 4
Answer saved
Marked out of 5.00
Flag question
Question text
Select one:
a. Threat
b. Vulnerability
c. Impact
d. Frequency
Question 5
Answer saved
Marked out of 5.00
Flag question
Question text
untuk mengetahui dan mempelajari kemungkinan ancaman atau serangan yang datang
dari luar maupun dari dalam jaringan, ialah:
Select one:
a. Impact
b. Vulnerability
c. Threat
d. Frequency
Question 6
Answer saved
Marked out of 5.00
Flag question
Question text
Select one:
a. Brainware
b. Software
c. Malware
d. Hardware
Question 7
Answer saved
Marked out of 5.00
Flag question
Question text
Select one:
a. Availability
b. Accuracy
c. Minimum
d. Response time
Question 8
Answer saved
Marked out of 5.00
Flag question
Question text
Select one:
a. Impact
b. Vulnerability
c. Frequency
d. Threat
Question 9
Answer saved
Marked out of 5.00
Flag question
Question text
Select one:
a. authorized users
b. oversight
c. cetakan
d. bugs
Question 10
Answer saved
Marked out of 5.00
Flag question
Question text
Select one:
a. Fault Management
b. Configuration Management
c. Security Management
d. Aplication Management
Question 11
Answer saved
Marked out of 5.00
Flag question
Question text
Select one:
a. Kebutuhan keamanan host
b. Kebutuhan authentikasi
c. Kebutuhan pengaksesan data dari luar
d. Kebutuhan security guest
Question 12
Answer saved
Marked out of 5.00
Flag question
Question text
Select one:
a. Asset
b. Threats
c. Vulnerabilities
d. User
Question 13
Answer saved
Marked out of 5.00
Flag question
Question text
Select one:
a. Kebutuhan Peformansi
b. Kebutuhan Manajemen
c. Kebutuhan Kesehatan
d. Kebutuhan Aplikasi
Question 14
Answer saved
Marked out of 5.00
Flag question
Question text
Kontrol & Penyelesaian Masalah Keamanan Jaringan, yang merupakan tugas kontrol:
Select one:
a. Detective
b. Deactive
c. Corective
d. Preventive
Question 15
Answer saved
Marked out of 5.00
Flag question
Question text
Select one:
a. accident
b. virus
c. user
d. Crackers
Question 16
Answer saved
Marked out of 5.00
Flag question
Question text
Select one:
a. Anti virus
b. Proxy
c. MRTG
d. Firewall
Question 17
Answer saved
Marked out of 5.00
Flag question
Question text
Select one:
a. access list
b. email
c. akses internet
d. file
Question 18
Answer saved
Marked out of 5.00
Flag question
Question text
Computer Security is preventing attackers form achieving objectives through
unathorized access or unauthorized use of computers & Networks. Ialah menurut:
Select one:
a. James C. Howard
b. Jonathan C. Howard
c. John C. Howard
d. John D. Howard
Question 19
Answer saved
Marked out of 5.00
Flag question
Question text
Yang bukan merupakan keamanan komputer Menurut Garfinkel dan Spafford, ialah:
Select one:
a. Data Control
b. Confidentiality
c. Availability
d. Audit
Question 20
Answer saved
Marked out of 5.00
Flag question
Question text
Select one:
a. proses untuk melindungi sistem dalam Hardware, dengan mencegah dan mendeteksi
penggunaan yang tidak berhak dalam software.
b. proses untuk melindungi sistem dalam jaringan, dengan mencegah dan mendeteksi
penggunaan yang tidak berhak dalam jaringan.
c. untuk mengetahui bagian dari sistem yang cenderung/sering diserang (kelemahan-
kelemahan pada sistem jaringan)
d. untuk mengetahui dan mempelajari kemungkinan ancaman atau serangan yang
datang dari luar maupun dari dalam jaringan