1.
Sebuah sistem atau perangkat yang mengizinkan lalu lintas jaringan yang dianggap aman untuk melaluinya dan mencegah lalu lintas jaringan yang tidak aman adalah pengertian dari ….
Correct Answer
E. Firewall
Explanation
A firewall is a system or device that allows secure network traffic to pass through it and prevents insecure network traffic. It acts as a barrier between a trusted internal network and an untrusted external network, filtering incoming and outgoing traffic based on predefined security rules. By doing so, it helps protect the network from unauthorized access, malware, and other potential threats.
2.
Tipe firewall yang terdiri dari sebuah bastion host (host yang berupa application level gateway) dan dua router packet filtering adalah ….
Correct Answer
B. Screened Host Firewall
Explanation
A screened host firewall is a type of firewall that consists of a bastion host (an application level gateway) and two packet filtering routers. The bastion host acts as a single point of entry and exit for all network traffic, and it applies security measures such as authentication and access control. The two packet filtering routers are responsible for filtering and forwarding network packets based on predefined rules. This configuration provides an added layer of security by separating the internal network from the external network and controlling the flow of traffic between them.
3.
Tipe firewall yang terdiri dari router diantara jaringan internal dan eksternal yang aman, digunakan untuk menolak dan mengijinkan trafik adalah ….
Correct Answer
E. Packet-filtering Firewall
Explanation
A packet-filtering firewall is a type of firewall that is implemented using a router between an internal and external network. It is designed to examine each packet of data that passes through it and make decisions on whether to allow or deny the traffic based on a set of predefined rules. This type of firewall is considered secure because it can effectively block unwanted traffic while allowing legitimate traffic to pass through.
4.
Program yang menyebabkan kerusakan sistem ketika dijalankan disebut ….
Correct Answer
B. Malicious code
Explanation
Malicious code refers to any program or software that is designed to harm or disrupt computer systems, networks, or data. When executed, malicious code can cause a range of issues, including system crashes, data corruption, unauthorized access, and other harmful activities. It is often created with malicious intent, such as stealing sensitive information, gaining control over a system, or causing damage to the target system. Therefore, the program mentioned in the question that causes system damage when run is appropriately referred to as malicious code.
5.
Suatu aktivitas menganalisis jaringan untuk mengetahui bagian dari sistem yang cenderung untuk diserang disebut ….
Correct Answer
E. Vulnerability
Explanation
Vulnerability refers to the weakness or flaw in a system that can be exploited by attackers. Analyzing the network to identify the parts of the system that are more likely to be targeted helps in understanding these vulnerabilities. By identifying vulnerabilities, appropriate countermeasures can be recommended to mitigate the risk and protect the system from potential attacks.
6.
Berikut rumus dari...
​​​​​​​
Correct Answer
B. Bandwidth
Explanation
The given correct answer is "Bandwidth". Bandwidth refers to the maximum amount of data that can be transmitted over a network or a communication channel in a given period of time. It is a measure of the capacity of the network or channel to carry data. In the context of networking and hosting, bandwidth is an important factor as it determines the speed and efficiency of data transfer. Higher bandwidth allows for faster data transmission and better performance.
7.
​​​​​​Luas atau lebar cakupan frekuensi yang digunakan oleh sinyal dalam medium transmisi adalah...
Correct Answer
A. Bandwidth
Explanation
The correct answer is "Bandwidth." Bandwidth refers to the amount of data that can be transmitted through a medium in a given amount of time. It represents the capacity or the "width" of the frequency range used by a signal in a transmission medium. It is commonly used to measure the speed or capacity of a network connection or the amount of data that can be transferred in a given time period.
8.
Transfer rate/jumlah data yang dapat dibawa dari sebuah titik ke titik lain dalam jangka waktu tertentu (pada umumnya dalam detik) adalah...
Correct Answer
D. Bandwidth pada jaringan
Explanation
Bandwidth pada jaringan mengacu pada transfer rate atau jumlah data yang dapat dibawa dari satu titik ke titik lain dalam jangka waktu tertentu. Ini berkaitan dengan kemampuan jaringan untuk mengirim data dengan kecepatan tertentu. Pilihan lain seperti throughput dan bandwidth pada hosting tidak menjelaskan tentang transfer rate atau jumlah data yang dapat dibawa dalam jangka waktu tertentu. Pilihan "bus" juga tidak relevan dengan konsep transfer rate atau jumlah data yang dapat dibawa dalam jangka waktu tertentu pada jaringan.
9.
Bandwidth yang sebenarnya (aktual) pada suatu waktu tertentu dan pada kondisi dan jaringan internet tertentu adalah...
Correct Answer
B. Throughput
Explanation
Throughput refers to the actual amount of data that can be transmitted over a network or a communication channel in a given period of time. It represents the real-time data transfer rate and is influenced by various factors such as network congestion, latency, and the efficiency of the network protocols being used. Unlike bandwidth, which is the theoretical maximum capacity of a network, throughput provides a more accurate measure of the actual data transfer speed in real-world conditions.
10.
​​​​​​Antrean data dalam setiap kartu Ethernet disebut …
Correct Answer
A. Qdisc
Explanation
The correct answer is Qdisc. In networking, Qdisc stands for Queueing Discipline. It is responsible for managing the transmission of data packets in a network interface. Qdisc determines the order in which packets are transmitted and handles congestion control. It ensures that packets are sent in a fair and efficient manner, preventing any one packet from monopolizing the network resources.
11.
#iptables -A FORWARD -p icmp -j Accept
Maksud dari perintah diatas adalah ...
Correct Answer
D. Firewall mengizinkan paket ICMP yang akan melintas
Explanation
The given command "iptables -A FORWARD -p icmp -j Accept" adds a rule to the firewall's FORWARD chain to allow ICMP packets to pass through. This means that the firewall will permit ICMP packets to traverse from one network interface to another.
12.
Tabel pada iptables yang digunakan untuk manipulasi paket data adalah ...
Correct Answer
A. Mangle
Explanation
The correct answer is "mangle". In iptables, the mangle table is used for packet alteration. It allows you to modify certain aspects of the packet such as the TOS (Type of Service) field, TTL (Time to Live) value, and packet size. This table is commonly used for advanced network manipulation and can be used for tasks like traffic shaping, packet marking, and QoS (Quality of Service) implementation.
13.
Metode yang dapat mengizinkan beberapa host yang tidak mempunyai IP publik atau tidak mempunyai blok IP dari jaringan eksternal dapat terkoneksi dengan jaringan internet disebut ..
Correct Answer
E. IP Masquerade
Explanation
IP Masquerade is a method that allows multiple hosts without public IP addresses or without a block of IP addresses from an external network to connect to the internet. It works by disguising the private IP addresses of the internal hosts behind the public IP address of the router or gateway. This allows the internal hosts to communicate with the internet using the public IP address, while the router or gateway keeps track of the connections and routes the traffic appropriately.
14.
Perangkat Lunak iptables merupakan jenis firewall yang ada dalam sistem operasi ...
Correct Answer
C. LINUX
Explanation
The correct answer is LINUX because iptables is a software program that is commonly used as a firewall in the Linux operating system. It allows users to configure and manage network traffic by creating rules and filters. Therefore, iptables is specific to the Linux operating system and is not available in Windows, DOS, Mac OS, or UNIX.
15.
Untuk memblokir sebuah website yang mengandung sebuah isi/informasi/kata tertentu, kita dapat membuat rule filter firewall berdasarkan ...
Correct Answer
D. Content
Explanation
To block a website that contains specific content, we can create a rule filter in the firewall based on the content. This means that the firewall will analyze the content of the website and if it matches the specified criteria, it will block access to that website. This method is effective in preventing users from accessing websites that contain inappropriate or harmful content.
16.
Menu pada Winbox yang dapat memanajemen bandwidth adalah ...
Correct Answer
D. Queue
Explanation
The correct answer is "Queue". In Winbox, the "Queue" menu allows users to manage bandwidth by setting up queues for different types of traffic. By configuring queues, users can prioritize or limit the bandwidth for specific applications or network devices, ensuring a fair distribution of available bandwidth and preventing one device or application from hogging all the resources. This menu provides options for creating and managing queues, as well as setting up rules and limits for different types of traffic.
17.
Teknik antrean HTB dikembangkan oleh ..
Correct Answer
D. Martin Devera
Explanation
Martin Devera is the correct answer because he is the developer of the Hierarchical Token Bucket (HTB) queuing discipline. HTB is a technique used in network traffic management to prioritize and control bandwidth allocation.
18.
Tampilan dibawah ini dalam mikrotik digunakan untuk konfigurasi ...
Correct Answer
B. IP Address
Explanation
The given answer, "IP Address," is correct because the provided information states that the configuration is done in MikroTik. In networking, an IP address is a unique identifier assigned to each device connected to a network. Configuring the IP address involves setting up the network parameters for the device, such as the IP address, subnet mask, default gateway, and DNS servers. Therefore, it is logical to assume that the given configuration in MikroTik is related to setting up the IP address for a device.
19.
Menu berikut digunakan untuk konfigurasi ..
Correct Answer
C. IP Firewall scrnat
Explanation
The given menu options are used for configuring different aspects of IP Firewall. Among these options, "IP Firewall scrnat" specifically refers to the configuration of source network address translation. This option allows the modification of the source IP address of outgoing packets, providing a way to hide the original source IP address and replace it with a different one.
20.
Menu berikut digunakan untuk ...
Correct Answer
B. Membuat User Profile
Explanation
The menu is used to create user profiles, which are sets of predefined settings and configurations that can be applied to multiple users. User profiles help in efficiently managing and organizing user accounts by allowing administrators to assign specific settings to different groups of users. This menu option enables the creation of user profiles for easier management of user accounts.