PTS Ganjil AIJ Kelas XII TKJ

PTS Ganjil AIJ Kelas XII TKJ

12th Grade

20 Qs

quiz-placeholder

Similar activities

Let's Check!

Let's Check!

12th Grade - Professional Development

15 Qs

SLR05.3 Open or Closed?

SLR05.3 Open or Closed?

9th Grade - University

16 Qs

UH Jaringan Komputer Kelas 7

UH Jaringan Komputer Kelas 7

7th Grade - University

20 Qs

KPD3024:K1&K2 QUIZ BY APACHE GROUP

KPD3024:K1&K2 QUIZ BY APACHE GROUP

KG - Professional Development

15 Qs

Networking Fundementals

Networking Fundementals

9th Grade - University

15 Qs

Mid Semester Simulasi Digital

Mid Semester Simulasi Digital

12th Grade - University

20 Qs

PRE & POST MAINTENANCE

PRE & POST MAINTENANCE

1st - 12th Grade

20 Qs

Data, Information, Knowledge Yr12-1

Data, Information, Knowledge Yr12-1

12th Grade

16 Qs

PTS Ganjil AIJ Kelas XII TKJ

PTS Ganjil AIJ Kelas XII TKJ

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Maratus Soleha

Used 2+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Program yang menyebabkan kerusakan sistem ketika dijalankan disebut ....
Denial of Service
Malicious Code
Phishing
Packet Snifer
Social Engineering

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Metode pengamanan komputer yang terdiri atas database security, data security, dan device security ada pada ....
Keamanan Level 0
Keamanan Level 1
Keamanan Level 2
Keamanan Level 3
Keamanan Level 4

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Suatu aktivitas menganalisis jaringan untuk mengetahui bagian sistem yang cenderung untuk diserang disebut ....
Threat
Impact
Frequency
Recommended countermeasures
Vulnerability

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Orang yang tak diotorisasi tidak hanya dapat mengakses tetapi juga mengubah atau merusak sumber daya. Contohnya, mengubah isi pesan atau mengacak program. Ini merupakan ancaman yang disebut dengan...
Inruder
Interuption
Modification
Interception
Fabrication

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Usaha untuk merusak sistem pada jaringan, seperti Trojanhorse, Logicbom, Trapdoor, Virus, Worm, dan Zombie disebut ....
Destruction
Denial
Theft
Modification
Fraud

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Suatu program yang menangkap data dari paket yang lewat di jaringan (username, password, dan informasi penting lainnya) disebut ....
Hacking
IP Spoofing
Packet Snifer
Denial-of-Service
Malicious code

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Yang bukan penyebab cracker melakukan penyerangan
Spite
Sport
Stupidity
Curiosity
Availability

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?