UJIAN TENGAH SEMESTER
Mata kuliah : Keamanan Komputer
Waktu : 90 Menit
Prodi : Teknik Informatika
1.Lapisan protocol yang urut adalah
a.Physical, network,transport
b.Transport, network, presentation
c.Network, Transport, session
d.Data link, network, session
2.Pengamanan dengan menggunakan ssh (secure shell) dilakukan padad layer:
a.Physical Layer
b.Data link layer
c.Network layer
d.Application Layer
3.Pengamanan dengan menggunakan Mac Address Authentication dilakukan pada layer
a.Physical Layer
b.Data link Layer
c.Network Layer
d.Application Layer
4.Pengamanan dengan WEP/WPA dillakukan pada layer:
a.Physical Layer
b.Data link Layer
c.Network Layer
d.Application Layer
5.Potensi lubang keamanan pada script (sisi client) antara lain
a.Pencurian cookie
b.Pencurian session
c.Script dipanggil berkali-kali sehingga berdampak server terbebani
d.A dan C benar
6.What is dsniff
a.Sniffer
b.IP address spoofer
c.Mac address spoofer
d.Collection of hackin tools
7.How does a Denial of Service attack work
a.Prevents legitimate use of a system
b.Imitates a valid user
c.Cracks passwords
d.Installs a Trojan service
8.What is an armoured virus
a.Hidden
b.Encrypted
c.Rooted
d.Tanked
9.Which cryptographic attack attempts to crack the code by looking for patterns and using statistical analysis
a.Choosen-plain text attack
b.Choosen-cipher text attack
c.Choosen text-only attack
d.Brute-force attack
10.What type of program is snort
a.NIDS
b.HIDS
c.Sniffer
d.Sniffer,HIDS, and traffic-logging tool
11.What year was Red Hat Linux released
a.1992
b.1984
c.1995
d.1998
12.Entering Blach’ Exec cmdshell into a web form in order to execute a shell is an example of
a.Buffer Overflow
b.SQL Injection
c.Stack-Based overflow
d.Head-Based overflow
13.How much data could a 3.5 inch floppy hold
a.1.2 MB
b.1.44 MB
c.880 KB
d.640 KB
14.What is an example of covert channel
a.Reserve WWW shell
b.Steganography
c.ICMP over email
d.Firewalking
15.Who invented the mouse
a.Bill Gates
b.Steve Wozniak
c.Douglas Engelbart
d.Steve Jobs
16.What type of device connects systems on a shared network
a.Hubs
b.Switches
c.Routers
d.Gateways
17.What is a covert channel
a.Tunneling software
b.Trojan backdoor
c.TCP/IP connection
d.Using a channel in non-standard way
18.What algorithm outputs a 128-bit message digest regardless of the length of the input
a.MD5
b.SHA
c.RC6
d.RC4
19.Which form of authentication does WPA2 default to
a.Only 802.1x/EAP/RADIUS
b.Passphrase or 802.1/EAP/RADIUS
c.AES
d.Only passphrase
20.Banner grabbing is an example of what
a.Application analysis
b.Foorprinting
c.Active OS Fingerprinting
d.Passive OS Fingerprinting
21.Which is a common web server vulnerability
a.Default installation
b.Limited user accounts
c.Closed directory acess
d.Shared passwords
22.What does the web acronym HTML stand for
a.Hotmail
b.Hyper transfer Markup language
c.Hyper text Markup language
d.Hi Tom Meet Lary
23.WEP is known as what
a.Wired Encryption Protocol
b.Wireless Encryption Privacy
c.Wired Equivalent Privacy
d.Wireless Encryption Protocol
24.What number of keys are needed for symmetric key encryption
a.3
b.2
c.4
d.1
25.What is privilege escalation
a.Adding a new user account
b.Elevating user account privileges
c.Adding an admin account
d.Clone a user account
Download soal & jawaban di sini.
Read more...
Mata kuliah : Keamanan Komputer
Waktu : 90 Menit
Prodi : Teknik Informatika
1.Lapisan protocol yang urut adalah
a.Physical, network,transport
b.Transport, network, presentation
c.Network, Transport, session
d.Data link, network, session
2.Pengamanan dengan menggunakan ssh (secure shell) dilakukan padad layer:
a.Physical Layer
b.Data link layer
c.Network layer
d.Application Layer
3.Pengamanan dengan menggunakan Mac Address Authentication dilakukan pada layer
a.Physical Layer
b.Data link Layer
c.Network Layer
d.Application Layer
4.Pengamanan dengan WEP/WPA dillakukan pada layer:
a.Physical Layer
b.Data link Layer
c.Network Layer
d.Application Layer
5.Potensi lubang keamanan pada script (sisi client) antara lain
a.Pencurian cookie
b.Pencurian session
c.Script dipanggil berkali-kali sehingga berdampak server terbebani
d.A dan C benar
6.What is dsniff
a.Sniffer
b.IP address spoofer
c.Mac address spoofer
d.Collection of hackin tools
7.How does a Denial of Service attack work
a.Prevents legitimate use of a system
b.Imitates a valid user
c.Cracks passwords
d.Installs a Trojan service
8.What is an armoured virus
a.Hidden
b.Encrypted
c.Rooted
d.Tanked
9.Which cryptographic attack attempts to crack the code by looking for patterns and using statistical analysis
a.Choosen-plain text attack
b.Choosen-cipher text attack
c.Choosen text-only attack
d.Brute-force attack
10.What type of program is snort
a.NIDS
b.HIDS
c.Sniffer
d.Sniffer,HIDS, and traffic-logging tool
11.What year was Red Hat Linux released
a.1992
b.1984
c.1995
d.1998
12.Entering Blach’ Exec cmdshell into a web form in order to execute a shell is an example of
a.Buffer Overflow
b.SQL Injection
c.Stack-Based overflow
d.Head-Based overflow
13.How much data could a 3.5 inch floppy hold
a.1.2 MB
b.1.44 MB
c.880 KB
d.640 KB
14.What is an example of covert channel
a.Reserve WWW shell
b.Steganography
c.ICMP over email
d.Firewalking
15.Who invented the mouse
a.Bill Gates
b.Steve Wozniak
c.Douglas Engelbart
d.Steve Jobs
16.What type of device connects systems on a shared network
a.Hubs
b.Switches
c.Routers
d.Gateways
17.What is a covert channel
a.Tunneling software
b.Trojan backdoor
c.TCP/IP connection
d.Using a channel in non-standard way
18.What algorithm outputs a 128-bit message digest regardless of the length of the input
a.MD5
b.SHA
c.RC6
d.RC4
19.Which form of authentication does WPA2 default to
a.Only 802.1x/EAP/RADIUS
b.Passphrase or 802.1/EAP/RADIUS
c.AES
d.Only passphrase
20.Banner grabbing is an example of what
a.Application analysis
b.Foorprinting
c.Active OS Fingerprinting
d.Passive OS Fingerprinting
21.Which is a common web server vulnerability
a.Default installation
b.Limited user accounts
c.Closed directory acess
d.Shared passwords
22.What does the web acronym HTML stand for
a.Hotmail
b.Hyper transfer Markup language
c.Hyper text Markup language
d.Hi Tom Meet Lary
23.WEP is known as what
a.Wired Encryption Protocol
b.Wireless Encryption Privacy
c.Wired Equivalent Privacy
d.Wireless Encryption Protocol
24.What number of keys are needed for symmetric key encryption
a.3
b.2
c.4
d.1
25.What is privilege escalation
a.Adding a new user account
b.Elevating user account privileges
c.Adding an admin account
d.Clone a user account
Download soal & jawaban di sini.