1.
Salah satu peralatan atau suatu aplikasi pada sistem operasi yang dibutuhkan oleh jaringan komputer untuk melindungi integritas data atau sistem jaringan dari serangan-serangan pihak yang tidak bertanggung jawab adalah ....
Correct Answer
B. Filewall
Explanation
A firewall is a security tool or application that is needed by a computer network to protect the integrity of data or network systems from unauthorized attacks. It acts as a barrier between the internal network and the external network, monitoring and filtering incoming and outgoing network traffic based on predefined security rules. It helps in preventing unauthorized access, malware, and other potential threats from entering or leaving the network, thereby ensuring the security of the network and its data.
2.
Firewall yang didesain untuk melindungi jaringan secara keseluruhan dari berbagai serangan disebut ....
Correct Answer
C. Network Firewall
Explanation
A network firewall is designed to protect an entire network from various attacks. It acts as a barrier between the internal network and external networks or the internet, monitoring incoming and outgoing network traffic. It can filter and block unauthorized access, prevent malicious activities, and enforce security policies. Unlike personal firewalls that are designed for individual devices, a network firewall provides centralized protection for an entire network, making it an effective solution for securing the overall network infrastructure.
3.
Macam firewall ada 2 yaitu ....
Correct Answer
E. Personal Firewall dan Nerwork Firewall
Explanation
The correct answer is Personal Firewall dan Network Firewall. Personal firewalls are designed to protect individual computers from unauthorized access and malicious activities. They monitor inbound and outbound network traffic and block any suspicious or unauthorized connections. Network firewalls, on the other hand, are designed to protect an entire network by filtering and controlling incoming and outgoing traffic based on predetermined security rules. They can be hardware or software-based and are typically placed at the network perimeter to prevent unauthorized access to the network.
4.
Fungsi fundamental firewall antara lain ....
Correct Answer
A. Mengatur lalu lintas jaringan
Explanation
Firewalls are network security devices that monitor and control incoming and outgoing network traffic. They act as a barrier between a trusted internal network and an untrusted external network. The fundamental function of a firewall is to regulate or control the flow of network traffic. It does this by examining the data packets and enforcing predetermined security rules. This allows the firewall to allow or block specific types of traffic based on the configured rules. By managing network traffic, firewalls help in protecting the network from unauthorized access, malicious activities, and potential threats.
5.
Firewall memberikan filter pengamanan untuk, kecuali ....
Correct Answer
B. Trojan
Explanation
Firewall memberikan filter pengamanan untuk virus, spyware, spam, dan injection. Namun, firewall tidak memberikan filter pengamanan untuk Trojan. Trojan adalah jenis malware yang menyamar sebagai program yang berguna tetapi sebenarnya memiliki tujuan jahat. Firewall tidak secara khusus dirancang untuk mendeteksi atau mencegah Trojan, sehingga pengguna perlu menggunakan perangkat lunak keamanan tambahan untuk melindungi sistem mereka dari serangan Trojan.
6.
Domain Name System (DNS) adalah suatu sistem yang memungkinkan nama suatu host pada jaringan komputer atau internet ditranslasikan menjadi ....
Correct Answer
A. IP Address
Explanation
DNS is a system that translates domain names into IP addresses. When a user enters a domain name in their web browser, the DNS server looks up the corresponding IP address for that domain name. This IP address is then used to establish a connection with the host or server associated with the domain name. Therefore, the correct answer is IP Address.
7.
IP Address dipergunakan dalam masa waktu tertentu yang disebut dengan ....
Correct Answer
B. Lease Periode
Explanation
The correct answer is "Lease Periode". IP addresses are assigned to devices for a specific period of time, known as the lease period. During this time, the device is allowed to use the IP address. After the lease period expires, the IP address may be assigned to another device.
8.
Firewall yang mengontrol lalulintas jaringan melakukan penapisan terhadap koneksi disebut ....
Correct Answer
E. Filtering
Explanation
A firewall that controls network traffic and filters connections is commonly known as a filtering firewall. This type of firewall examines incoming and outgoing network packets and applies a set of predefined rules to determine whether to allow or block the connection. It filters the traffic based on criteria such as source and destination IP addresses, ports, protocols, and other factors. The purpose of filtering is to protect the network from unauthorized access, malicious activities, and potential security threats.
9.
Elemen-elemen dibawah yang dilihat oleh inspeksi paket, kecuali ....
Correct Answer
D. Port IP yang terbuka
Explanation
Inspeksi paket melibatkan pemeriksaan konten paket data yang dikirim melalui jaringan. Elemen-elemen yang dilihat oleh inspeksi paket termasuk alamat IP komputer sumber, alamat IP komputer tujuan, protokol IP, dan informasi header. Namun, inspeksi paket tidak melibatkan melihat port IP yang terbuka. Port IP yang terbuka adalah informasi yang relevan untuk konfigurasi jaringan, tetapi tidak termasuk dalam elemen yang dilihat oleh inspeksi paket.
10.
Proses autentifikasi dapat digunakan tanpa intervebsi pengguna, merupakan kelebihan dari ....
Correct Answer
C. User dan password
Explanation
The correct answer is User dan password. Usernames and passwords are commonly used for authentication purposes in various systems and applications. One of the advantages of using user and password authentication is that it can be done without the need for user intervention. This means that the authentication process can be automated, allowing users to log in to their accounts without having to manually enter their credentials every time. This convenience makes user and password authentication a popular choice for many online services and platforms.
11.
Membandingkan alamat sumber dari paket dengan kebijakan dalam access control list, merupakan cara kerja firewall ....
Correct Answer
D. Packet filter firewall
Explanation
A packet filter firewall works by comparing the source address of a packet with the policies set in the access control list. It allows or blocks packets based on predefined rules, such as allowing packets from trusted sources and blocking packets from suspicious or unauthorized sources. This type of firewall operates at the network layer of the OSI model and is typically implemented in routers or dedicated firewall devices. It is efficient in filtering packets based on their IP addresses and port numbers, providing a basic level of security for a network.
12.
Circuit level gateway berada pada lapisan ....
Correct Answer
A. Sesssion layer
Explanation
The correct answer is Session layer. Circuit level gateway operates at the Session layer of the OSI model. This layer is responsible for establishing, managing, and terminating sessions between applications. Circuit level gateways are used to control and monitor the flow of data packets based on the information in the session layer headers. They can examine the session information to determine if the connection should be allowed or denied.
13.
Kepanjangan NAT adalah ....
Correct Answer
B. Network Addres Translation
Explanation
The correct answer is "Network Address Translation." NAT stands for Network Address Translation, which is a technique used in computer networking to translate IP addresses from one network to another. It allows multiple devices to share a single IP address, which helps conserve IP addresses and provides a level of security by hiding the internal network structure.
14.
Stateful firewall tersedia pada ....
Correct Answer
C. Keiro
Explanation
Keiro is the correct answer because it is a network security appliance that provides stateful firewall capabilities. Cisco PIX and Cisco PIC are also network security appliances, but they do not specifically mention stateful firewall capabilities. Sun Screen is not a recognized network security appliance, and ISA Server is a Microsoft product that provides firewall and other security features, but it does not mention stateful firewall specifically. Therefore, Keiro is the most appropriate answer.
15.
Komputer yang akan digunakan sebagai router dalam jaringan WAN harus memiliki memori minimal ....
Correct Answer
D. 64 Mbyte RAM
Explanation
The computer that will be used as a router in a WAN network should have a minimum of 64 Mbyte RAM. This is because routers need sufficient memory to handle the routing tables, which contain information about the network's topology and the best paths for data packets to travel. With 64 Mbyte RAM, the router will have enough memory to efficiently process and store these routing tables, ensuring smooth and reliable network communication.
16.
Piranti tambahan yang digunakan dalam sebuah jaringan dengan tujuan untuk memperoleh keamanan jaringan yaitu ....
Correct Answer
D. Firewall
Explanation
A firewall is an additional device used in a network to enhance network security. It acts as a barrier between the internal network and external networks, filtering incoming and outgoing network traffic based on predefined security rules. It helps to protect the network from unauthorized access, malware, and other security threats by monitoring and controlling network traffic.
17.
Secara mendasar firewall dapat melakukan hal-hal berikut, kecuali ....
Correct Answer
B. Melakukan pengamanan terhadap data
Explanation
Firewall dapat melakukan hal-hal berikut: mengatur dan mengontrol lalu lintas jaringan, melakukan autentikasi terhadap akses, melindungi sumber daya dalam jaringan privat, serta mencatat semua kejadian dan melaporkan kepada administrator. Namun, firewall tidak melakukan pengamanan terhadap data.
18.
Firewall yang dipasang pada komputer yang menghubungkan komputer dengan modem adalah ....
Correct Answer
C. Hardware Firewall
Explanation
A hardware firewall is the correct answer because it is a physical device that is installed between the computer and the modem to protect the network from unauthorized access and malicious attacks. It acts as a barrier and filters incoming and outgoing network traffic based on predetermined security rules. Unlike software firewalls, which are installed on individual computers, a hardware firewall provides network-wide protection and is more effective in defending against external threats.
19.
Kepanjangan dari SPI adalah ....
Correct Answer
B. Stateful Packet Inspection
Explanation
Stateful Packet Inspection (SPI) is a firewall technology that monitors the state of active network connections and inspects the incoming and outgoing packets to determine whether they are legitimate or malicious. It keeps track of the state of each network connection and uses this information to make decisions about allowing or blocking traffic. This technique provides enhanced security by analyzing the context and content of network packets, rather than just the basic information like source and destination addresses.
20.
Salah satu tugas dari firewall adalah ....
Correct Answer
E. Melindungi sumber daya
Explanation
Firewall bertugas melindungi sumber daya. Firewall digunakan untuk mengontrol dan membatasi akses ke jaringan dan sumber daya yang ada di dalamnya. Dengan menggunakan firewall, administrator jaringan dapat mengatur kebijakan keamanan yang memungkinkan hanya akses yang sah dan diizinkan untuk mengakses sumber daya jaringan. Firewall juga dapat memblokir akses yang tidak sah atau berbahaya ke jaringan, sehingga melindungi sumber daya jaringan dari serangan dan ancaman yang mungkin terjadi.
21.
Jenis firewall yang bekerja dengan cara membandingkan alamat sumber dari paket-paket tersebut dengan kebijakan pengontrolan akses yang terdaftar dalam Access Control List firewall adalah ....
Correct Answer
C. Packet Filter Firewall
Explanation
Packet Filter Firewall adalah jenis firewall yang bekerja dengan membandingkan alamat sumber dari paket-paket dengan kebijakan pengontrolan akses yang terdaftar dalam Access Control List (ACL) firewall. Firewall ini akan memeriksa setiap paket yang masuk atau keluar dari jaringan berdasarkan aturan yang telah ditentukan dalam ACL. Jika paket sesuai dengan aturan yang ada, maka paket tersebut diteruskan. Jika tidak sesuai, maka paket tersebut akan diblokir. Dengan demikian, Packet Filter Firewall dapat mengontrol akses ke jaringan berdasarkan alamat sumber paket.
22.
Dibawah ini merupakan Teknologi Firewall, kecuali ....
Correct Answer
B. Scurity Gateway
Explanation
The correct answer is "Scurity Gateway." The other options listed are all examples of different types of firewall technologies. Packet Filtering Gateway is a type of firewall that filters packets based on specific criteria such as source and destination IP addresses. Stateful Multi Layer Inspection Firewall is a more advanced type of firewall that not only filters packets but also examines the state and content of the packets. Application Level Gateway is a firewall that operates at the application layer of the network protocol stack, providing more granular control over specific applications. Circuit Level Gateway is a type of firewall that operates at the transport layer and monitors TCP handshakes to establish and manage connections.
23.
Network firewall umunya bersifat ....
Correct Answer
E. Transparan
Explanation
A network firewall is typically transparent, meaning it operates in the background and does not interfere with the normal flow of network traffic. It allows legitimate data packets to pass through while blocking unauthorized or malicious traffic. This transparency ensures that the firewall does not disrupt the network's performance or cause unnecessary delays.
24.
Proses yang dilakukan oleh firewall untuk menghadang dan memproses data dalam sebuah paket untuk menentukan bahwa paket tersebut diizinkan atau ditolak ....
Correct Answer
C. Inpeksi Packet
Explanation
The correct answer is "Inspection Packet". A firewall performs the process of inspecting and processing data within a packet to determine whether the packet should be allowed or denied. This involves analyzing the packet's source and destination addresses, ports, and other relevant information to enforce security policies and protect the network from potential threats.
25.
Dibawah ini merupakan cara untuk mengamankan host server, kecuali ....
Correct Answer
D. Administrasi Server
Explanation
The given options are all related to securing a host server, except for "Administrasi Server" which does not contribute to the security aspect. While "Administrasi Account" involves managing user accounts and their access privileges, "Administrasi Password" focuses on enforcing strong password policies. "Administrasi Layanan" deals with managing services running on the server, and "Administrasi Akses" involves controlling and monitoring user access to the server. However, "Administrasi Server" does not specifically address any security measures but rather refers to the overall administration and management of the server.
26.
Di antara beberapa teknologi di bawah ini yang tidak termasuk WAN adalah ...
Correct Answer
C. Buffer
Explanation
Buffer is not a technology, but rather a temporary storage area in a computer's memory. It is used to hold data while it is being transferred between devices or processes. WAN (Wide Area Network) refers to a network that covers a large geographical area, typically spanning multiple locations. Modem, ISDN, Frame Relay, and DSL are all technologies that can be used to establish a connection over a WAN. Therefore, Buffer is the correct answer as it does not belong to the category of WAN technologies.
27.
Mendiagnosis permasalahan perangkat yang tersambung dengan jaringan luas (wireless) merupakan tugas dari ....
Correct Answer
A. Administrator
Explanation
The correct answer is Administrator. An administrator is responsible for diagnosing and troubleshooting issues with devices connected to a wireless network. They have the knowledge and access to network management tools to identify and resolve any problems that may arise. Clients, users, programmers, and servers may have different roles and responsibilities within a network, but the task of diagnosing network connectivity issues falls under the domain of an administrator.
28.
Router wireless card dan kabel xoac, semuanya dapat digantikan dengan satu alat yang bernama ....
Correct Answer
A. Access Point
Explanation
An access point is a device that allows wireless devices to connect to a wired network. It can replace both the wireless card in a router and the xoac cable, as it provides wireless connectivity and acts as a bridge between the wired and wireless networks. Therefore, an access point is the most suitable option to replace both the router wireless card and xoac cable.
29.
Peralatan yang berfungsi sebagai media penghubung antara komputer client dengan komputer client lainnya untuk membentuk jaringan adalah ....
Correct Answer
B. Kabel dan Konector
Explanation
The correct answer is "Kabel dan Konector" because cables and connectors are essential for connecting client computers to each other to form a network. Cables transmit data signals between devices, while connectors ensure a secure and reliable connection. Without cables and connectors, it would not be possible to establish a network between client computers.
30.
Layanan yang secara otomatis memberikan nomor IP kepada komputer yang memintanya disebut ....
Correct Answer
B. DHCP
Explanation
DHCP stands for Dynamic Host Configuration Protocol. It is a network management protocol that automatically assigns IP addresses to computers that request them. DHCP eliminates the need for manual IP address configuration, making it more efficient and convenient for network administrators. Therefore, DHCP is the correct answer to the question.
31.
Komputer yang meminta IP Address disebut ....
Correct Answer
D. User
Explanation
The correct answer is "User." A computer that requests an IP address is typically operated by a user who needs to connect to a network or the internet. The user interacts with the computer to initiate the request for an IP address, which is necessary for the computer to communicate and access resources on the network. The other options, such as server, workstation, and personal computer, refer to different types of computers but do not specifically indicate a computer that is requesting an IP address.
32.
Antena Omni memiliki pancaran radiasi sebesar ....
Correct Answer
E. 360 Derajat
Explanation
The correct answer is 360 degrees. Antena Omni is known for its ability to radiate signals in all directions, covering a full 360-degree range. This means that it can transmit and receive signals from any direction without the need for adjustment or repositioning.
33.
Perangkat jaringan wireless LAN memiliki persyaratan harus saling terlihat. Syarat ini lebih dikenal dengan sebutan ....
Correct Answer
B. Line Of Sight
Explanation
The correct answer is "Line Of Sight". In wireless LAN networks, devices need to have a clear line of sight to communicate effectively. This means that there should be no obstructions or physical barriers between the devices. The term "Line Of Sight" refers to the requirement for devices to be able to visually see each other in order to establish a connection.
34.
Alat yang digunakan untuk menghubungkan radio pemancar dengan antena outdoor adalah ....
Correct Answer
D. Access Point
Explanation
The correct answer is "Access Point." An access point is a device used to connect a radio transmitter with an outdoor antenna. It acts as a bridge between the transmitter and the antenna, allowing the radio signals to be transmitted over a larger distance.
35.
Komputer yang dapat menentukan semua akses data baik intranet atau internet dengan aturan sistem operasi server yang telah ditetapkan atau berlaku pada setiap sistem operasi disebut ...
Correct Answer
A. Admin
Explanation
A computer that can determine all data access, both intranet and internet, based on the established rules of the server operating system or the applicable rules of each operating system is called an admin.
36.
Dibawah ini merupakan perangkat yang di butuhkan untuk membangun RT/RW Net, kecuali ....
Correct Answer
C. Konector
Explanation
The connector is not needed to build an RT/RW Net. The other items listed, such as the access point, tower, antenna, and UTP cable, are all necessary components for establishing an RT/RW Net. The connector may refer to a cable connector or a network connector, but regardless of its type, it is not essential for building the network.
37.
Jenis ancaman pada jaringan komputer yang bertujuan untuk menipu seseorang disebut ....
Correct Answer
B. IP Spoofing
Explanation
IP Spoofing is a type of network threat where an attacker disguises their IP address to make it appear as if it is coming from a trusted source. This can be used to deceive someone by making them believe that the communication is coming from a legitimate source. The attacker can use this technique to bypass authentication measures or launch other malicious activities while remaining undetected.
38.
DHCP yang akan memberikan alamat IP ke workstation adalah ....
Correct Answer
B. DHCP Server
Explanation
The correct answer is DHCP Server. A DHCP server is responsible for assigning IP addresses to workstations and other devices on a network. It manages the pool of available IP addresses and leases them to clients when they request one. The DHCP server also provides other network configuration information, such as subnet mask and default gateway, to the clients.
39.
Berikut yang bukan merupakan jenis kabel untuk jaringan komputer adalah ....
Correct Answer
A. BNC
Explanation
BNC (Bayonet Neill-Concelman) is a type of connector used for coaxial cables, not a type of cable itself. UTP (Unshielded Twisted Pair), STP (Shielded Twisted Pair), Fiber Optic, and Coaxial Cable are all types of cables used for computer networks.
40.
Suatu sistem yang memungkinkan nama suatu host pada jaringan komputer atau situs ditranslasikan menjadi IP Address adalah ....
Correct Answer
C. DNS
Explanation
DNS (Domain Name System) is a system that translates domain names into IP addresses. It allows users to access websites or hosts on a computer network by using easy-to-remember domain names instead of complicated IP addresses. DNS servers store a database of domain names and their corresponding IP addresses, allowing them to efficiently resolve domain names to the correct IP addresses. Therefore, DNS is the correct answer as it enables the translation of host names into IP addresses.
41.
Sebuah software yang memberikan layanan data yang berfungsi menerima permintaan HTTP atau HTTPS adalah ....
Correct Answer
C. Web Server
Explanation
A web server is a software that receives HTTP or HTTPS requests and provides data services. It is responsible for hosting websites and delivering web pages to clients. When a user types a URL or clicks on a link, the web server processes the request and sends the requested information back to the user's browser. It acts as an intermediary between the user and the website, handling the communication and serving the requested data. Therefore, a web server is the correct answer for the given question.
42.
Suatu aplikasi server yang berfungsi untuk tukar menukar file daslam suatu network yang menggunakan TCP koneksi adalah ....
Correct Answer
B. File Transfer Protocol
Explanation
The correct answer is File Transfer Protocol. File Transfer Protocol (FTP) is a server application that allows for the exchange of files over a network using TCP connections. It is commonly used to transfer files between a client and a server, allowing users to upload, download, and manage files on a remote server. FTP provides a reliable and efficient method for file transfer, making it a suitable choice for exchanging files within a network.
43.
Komputer yang merequest koneksi FTP server untuk tujuan tukar menukar file adalah ....
Correct Answer
B. FTP Client
Explanation
A computer that requests a connection to an FTP server for the purpose of exchanging files is called an FTP client. FTP (File Transfer Protocol) is a standard network protocol used for transferring files between a client and a server on a computer network. The client initiates the connection to the server and sends commands to request file transfers. The server responds to these commands and transfers the requested files. Therefore, an FTP client is the correct answer in this context.
44.
Yang bertindak sebagai gateway terhadap dunia internet untuk setiap komputer client adalah ....
Correct Answer
A. Proxy Server
Explanation
A Proxy Server acts as a gateway between client computers and the internet. It receives requests from clients and forwards them to the appropriate web servers. It also caches web pages and files, which helps improve performance and reduce bandwidth usage. This allows the clients to access the internet indirectly through the proxy server, which can provide additional security and control over internet usage. Therefore, a Proxy Server is the correct answer as it serves as the gateway to the internet for client computers.
45.
Suatu aplikasi server yang berfungsi untuk tukar menukar file daslam suatu network yang menggunakan TCP koneksi adalah ....
Correct Answer
B. File Transfer Protocol
Explanation
File Transfer Protocol (FTP) is the correct answer because it is a server application that facilitates the exchange of files over a network using TCP connections. FTP allows users to upload, download, and manipulate files on a remote server. It is commonly used for transferring files between a client computer and a server, making it a suitable choice for the given scenario. Proxy Server, Dynamic Host Configuration Protocol (DHCP), Web Server, and Domain Name System (DNS) are not specifically designed for file exchange purposes.
46.
Yang bertindak sebagai gateway terhadap dunia internet untuk setiap komputer client adalah ....
Correct Answer
A. Proxy Server
Explanation
A Proxy Server acts as a gateway between the client computers and the internet. It receives requests from the clients and forwards them to the appropriate web servers. It also caches web pages and files, so that if a client requests the same content again, it can be served from the cache instead of fetching it from the internet. This helps in improving performance and reducing bandwidth usage. Therefore, a Proxy Server is responsible for controlling and managing the access to the internet for client computers.
47.
Alat yang berfungsi untuk menghubungkan dua network dengan mentransfer data diantara network tersebut adalah ....
Correct Answer
C. Bridge
Explanation
A bridge is a device that connects two networks and transfers data between them. It operates at the data link layer of the OSI model and uses the MAC address to forward data packets between networks. Unlike a hub or a switch, a bridge does not amplify or regenerate the signal, but it intelligently filters and forwards packets based on their destination MAC address. Therefore, a bridge is the correct answer for this question.
48.
Sebuah komputer atau program komputer yang bertindak sebagai komputer lainnya untuk melakukan request terhadap content dari internet atau intranet adalah ....
Correct Answer
E. Proxy Server
Explanation
A proxy server is a computer or computer program that acts as an intermediary for requests made by another computer to access content from the internet or intranet. It receives the request from the client computer, forwards it to the appropriate server, and then sends the response back to the client. This allows the client to access the requested content without directly connecting to the server, providing additional security and privacy.
49.
Suatu server yang menjalani software yang berfungsi untuk memberikan layanan adalah ....
Correct Answer
B. FTP Server
Explanation
An FTP server is a type of server that runs software designed to provide file transfer services. It allows users to upload, download, and manage files remotely over a network. Unlike a web server that serves web pages or a DNS server that resolves domain names, an FTP server specifically focuses on file transfer functionality. Therefore, an FTP server is the most suitable option among the given choices for a server that provides services related to file transfer.
50.
Di dalam sistem operasi server terdapat berbagai macam service yang menggunakan arsitektur client atau server, kecuali ....
Correct Answer
E. Proxy Server
Explanation
Proxy Server is not a service that uses client or server architecture. Instead, it acts as an intermediary between clients and servers, forwarding client requests to the appropriate server and returning the server's response to the client. Therefore, it does not fit the criteria mentioned in the question.