Manakah dari berikut ini yang merupakan bidang 16-bit yang mengidentifikasi nomor port sumber dari program aplikasi di host yang mengirim segmen?
JARINGAN KOMPUTER

Quiz
•
Computers
•
University
•
Hard
oneil shakile
Used 1+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Sequence Number
Header Length
Acknowledgment Number
Source Port Address
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
John bekerja sebagai programmer C. Dia mengembangkan program C berikut:
Programnya rentan terhadap serangan __________.
SQL injection
Denial-of-Service
Buffer overflow
Cross site scripting
3.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Manakah dari berikut ini yang menganalisis lalu lintas jaringan untuk melacak transaksi tertentu dan dapat mencegat dan mencatat lalu lintas yang melewati jaringan digital? Setiap jawaban yang benar mewakili solusi lengkap. Pilih semua yang berlaku.
Wireless sniffer
Spectrum analyzer
Protocol analyzer
Performance Monitor
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:
`It is a Linux-based WLAN WEP cracking tool that recovers encryption keys. It operates by passively monitoring transmissions. It uses Ciphertext Only Attack and captures approximately 5 to 10 million packets to decrypt the WEP keys.`
Which of the following tools is John using to crack the wireless encryption keys?
PsPasswd
Kismet
AirSnort
Cain
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Manakah dari protokol berikut yang digunakan untuk bertukar informasi perutean antara dua gateway dalam jaringan sistem otonom?
IGMP
(Internet Group Management Protocol)
ICMP
(Internet Control Message Protocol)
EGP
(Exterior Gateway Protocol)
OSPF
(Open Shortest Path First)
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is a process that detects a problem, determines its cause, minimizes the damages, resolves the problem, and documents each step of response for future reference?
Incident response
Incident handling
Incident management
Incident planning
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is an intrusion detection system that monitors and analyzes the internals of a computing system rather than the network packets on its external interfaces?
IPS
HIDS
DMZ
NIDS
Create a free account and access millions of resources
Similar Resources on Quizizz
15 questions
CompTIA Network+ - OSI Model

Quiz
•
University
10 questions
Ecommerce Security

Quiz
•
University
10 questions
UTS Kriptografi

Quiz
•
University
10 questions
PRETEST

Quiz
•
11th Grade - University
10 questions
Unit 3 - 4.1.2 Wireless Devices

Quiz
•
9th Grade - University
15 questions
Netw2-Quiz No.2 (final term) II-BINS

Quiz
•
University
15 questions
Netw2-Quiz No.1 (final term)

Quiz
•
University
10 questions
CLI - Basic Security

Quiz
•
University
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade