Jumat, 29 Mei 2015

Soal UTS Keamanan Komputer Semester Genap 2014/2015

UJIAN TENGAH SEMESTER
Mata kuliah : Keamanan Komputer
Waktu : 90 Menit
Prodi        : Teknik Informatika

1.Lapisan protocol yang urut adalah
  a.Physical, network,transport
  b.Transport, network, presentation
  c.Network, Transport, session
  d.Data link, network, session

2.Pengamanan dengan menggunakan ssh (secure shell) dilakukan padad layer:
  a.Physical Layer
  b.Data link layer
  c.Network layer
  d.Application Layer

3.Pengamanan dengan menggunakan Mac Address Authentication dilakukan pada layer
  a.Physical Layer
  b.Data link Layer
  c.Network Layer
  d.Application Layer

4.Pengamanan dengan WEP/WPA dillakukan pada layer:
  a.Physical Layer
  b.Data link Layer
  c.Network Layer
  d.Application Layer

5.Potensi lubang keamanan pada script (sisi client) antara lain
  a.Pencurian cookie
  b.Pencurian session
  c.Script dipanggil berkali-kali sehingga berdampak server terbebani
  d.A dan C benar

6.What is dsniff
  a.Sniffer
  b.IP address spoofer
  c.Mac address spoofer
  d.Collection of hackin tools

7.How does a Denial of Service attack work
  a.Prevents legitimate use of a system
  b.Imitates a valid user
  c.Cracks passwords
  d.Installs a Trojan service

8.What is an armoured virus
  a.Hidden
  b.Encrypted
  c.Rooted
  d.Tanked

9.Which cryptographic attack attempts to crack the code by looking for patterns and using statistical analysis
  a.Choosen-plain text attack
  b.Choosen-cipher text attack
  c.Choosen text-only attack
  d.Brute-force attack

10.What type of program is snort
  a.NIDS
  b.HIDS
  c.Sniffer
  d.Sniffer,HIDS, and traffic-logging tool

11.What year was Red Hat Linux released
  a.1992
  b.1984
  c.1995
  d.1998

12.Entering Blach’ Exec cmdshell into a web form in order to execute a shell is an example of
  a.Buffer Overflow
  b.SQL Injection
  c.Stack-Based overflow
  d.Head-Based overflow

13.How much data could a 3.5 inch floppy hold
  a.1.2 MB
  b.1.44 MB
  c.880 KB
  d.640 KB

14.What is an example of covert channel
  a.Reserve WWW shell
  b.Steganography
  c.ICMP over email
  d.Firewalking

15.Who invented the mouse
  a.Bill Gates
  b.Steve Wozniak
  c.Douglas Engelbart
  d.Steve Jobs

16.What type of device connects systems on a shared network
  a.Hubs
  b.Switches
  c.Routers
  d.Gateways

17.What is a covert channel
  a.Tunneling software
  b.Trojan backdoor
  c.TCP/IP connection
  d.Using a channel in non-standard way

18.What algorithm outputs a 128-bit message digest regardless of the length of the input
  a.MD5
  b.SHA
  c.RC6
  d.RC4

19.Which form of authentication does WPA2 default to
  a.Only 802.1x/EAP/RADIUS
  b.Passphrase or 802.1/EAP/RADIUS
  c.AES
  d.Only passphrase

20.Banner grabbing is an example of what
  a.Application analysis
  b.Foorprinting
  c.Active OS Fingerprinting
  d.Passive OS Fingerprinting

21.Which is a common web server vulnerability
  a.Default installation
  b.Limited user accounts
  c.Closed directory acess
  d.Shared passwords

22.What does the web acronym HTML stand for
  a.Hotmail
  b.Hyper transfer Markup language
  c.Hyper text Markup language
  d.Hi Tom Meet Lary

23.WEP is known as what
  a.Wired Encryption Protocol
  b.Wireless Encryption Privacy
  c.Wired Equivalent Privacy
  d.Wireless Encryption Protocol

24.What number of keys are needed for symmetric key encryption
  a.3
  b.2
  c.4
  d.1

25.What is privilege escalation
  a.Adding a new user account
  b.Elevating user account privileges
  c.Adding an admin account
  d.Clone a user account



Download soal & jawaban di sini.


Written by: Admin ngampus mulu, ga mampus Updated at : 15:32

0 komentar:

Posting Komentar