TES KSI WEEK 6

TES KSI WEEK 6

University

7 Qs

quiz-placeholder

Similar activities

Organisasi dan Arsitektur Komputer

Organisasi dan Arsitektur Komputer

University

8 Qs

Scams and Schemes

Scams and Schemes

KG - University

11 Qs

FOS Ch 2: Part 1 (Quiz 5)

FOS Ch 2: Part 1 (Quiz 5)

University

10 Qs

Review Time!

Review Time!

University

10 Qs

Kontrol Akses

Kontrol Akses

University

10 Qs

Quiz 1 IT Forensics

Quiz 1 IT Forensics

University

10 Qs

Quiz 3 Pengantar Organisasi Komputer 2023-1

Quiz 3 Pengantar Organisasi Komputer 2023-1

University

10 Qs

Managing User Accounts

Managing User Accounts

9th Grade - University

10 Qs

TES KSI WEEK 6

TES KSI WEEK 6

Assessment

Quiz

Computers

University

Medium

Created by

Muhamad Nasrullah

Used 3+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 10 pts

Type Control yang berdasarkan dari Environment based antara lain

Technical Control & Call Back

Technical Model & Administrative Control

Technical Control & Text Mining

Technical Control & Administrative Control

2.

MULTIPLE CHOICE QUESTION

10 sec • 10 pts

Type Control yang berasal dari Phase Base antara lain

Kontrol Pencegahan, Kontrol Deteksi, Kontrol Model

Kontrol Pencegahan, Kontrol Deteksi, Kontrol Koreksi

Kontrol Pencegahan, Kontrol System, Kontrol Koreksi

Kontrol Perulangan, Kontrol Deteksi, Kontrol Model

3.

MULTIPLE CHOICE QUESTION

10 sec • 10 pts

Tahapan pada Security Management Process antara lain

Identification - Implementation - Monitoring

Identification - Input Handling - Monitoring

Identification - Input Handling - Eror Handling

Identification - Implementation - Eror Handling

4.

MULTIPLE CHOICE QUESTION

10 sec • 10 pts

Skema otentikasi berdasarkan identifikasi individu dengan karakteristik fisik mereka disebut Biometrics

True

False

5.

MULTIPLE CHOICE QUESTION

10 sec • 10 pts

Objek fisik atau virtual yang menyimpan informasi otentikasi. Contoh umum termasuk kartu pintar, lencana ID, dan paket data disebut...

Token

Biometrics

Geo Location

Key Activities

6.

MULTIPLE CHOICE QUESTION

10 sec • 10 pts

Protokol yang digunakan untuk memonitor device-device yang terhubung ke suatu jaringan. Sebagai contoh penggunaan CPU, hardisk, memory, traffic jaringan dll adalah Simple Network Management Protocol

True

False

7.

MULTIPLE CHOICE QUESTION

10 sec • 10 pts

Proses mengidentifikasi letak geografis suatu objek disebut..

Password

Biometrics

Geolocation

Token