soal-semester-ganjil-sistem-keamanan

ODD SEMESTER OF KLS XII NETWORK SECURITY SYSTEM (TKJ PRODUCTIVE)

VOCATIONAL SCHOOL (VOCATIONAL SCHOOL) DARUSALAM

2013/2014 ODD SEMESTER EXAM


================================================== ======================

Subject   : Network Security Systems -                                         Class             : XII (Twelve)

                            (Earning TKJ)

Prog. Skills   : Computer and Network Engineering (TKJ)                          Time            : 90 Minutes

===================================== ===================================


Choose The Most Correct Answer

1. In securing the network aspects that must be considered, except ......

a. System stability

b. Data availability and confidentiality

c. Service availability

d. Control

e.    Weather

2. User Accounts that are on a computer, both Domain Controller and Client and can only be used to log into the computer where the account is created is ....

a.    Local Account                   

b. Domain Account

c. Local User Account       

d. Web Account

e. Domain User Account

3. Based on the scope of a group, there are 3 types of groups, each of which has its own scope, except ....

a. Domain Local Group            

b. Distribution group

c. Global Group    

d. Workgroup

e.    Universal Group

4. Based on its function, there are two types of groups, one of which is ....

a. Domain Local Group          

b. Universal Group

c. Global Group    

d. Workgroup

e. Security Group

5. One of the characteristics of the Client / Server network type is ....

a.    Everyone can connect to the network.

b. Limited expansion.

c. No file storage center

d. Security is not guaranteed

e. Unlimited expansion

6. Administrators must monitor the network system they are building, this is an aspect of security ....

a. Control

b. Confidentiality

c. Interests

d.    Monitoring

e. Service


7. Setting access rights in the network system is an aspect of security ......

a.    Control

b. Confidentiality

c. Interests

d. Monitoring

e. Service

8. Implementation of the Access Control mechanism, among others by using .....

a. User ID

b.    Password

c. Login

d. Sign out

e. Sign Up

9. In addition to the password, to maintain security or access rights, the system will ask for .......

a. Mobile Number

b.    User ID

c. Signature

d. KTP No

e. Photo

10. If there is an error in entering the password, this error will be recorded by the system and stored in .....

a. My Document

b. Template

c.    Logfile

d. Cache files

e. Bookmark

11. The following are the types of networks based on their scope, except ......

a.    Server                                       

b. MAN (Metroplotian Area Network)

c. LAN (Local Area Network)     

d. Internet

e. WAN (Wide Area Network)

12. There are several topologies used in computer networks, except the topology ...

a. Bus Linear                   

b.    Hub

c. Star               

d. Mesh

e. Tree

13. Characteristics of a Local Group Domain, are ....

a. Can consist of users or groups from any domain.

b.   This group can only be seen in the domain. where the group is created.

c. Stand alone

d. Not dependent on others.

e. Independent

14. The characteristics of the Global Group are ....

a. Can only consist of users or groups that are in the group

created.

b.   This group can be viewed from any domain on the network.

c. Unique

d. Independent

e. Important network elements

15. Which file system below supports Encryption and local security ....

a. FAT32               

b. Ext3

c. Fat16       

d. Ext2

e.    NTFS

16. How to display the configuration menu for users, groups and various objects of active directories ....

a. Start> Programs> Administrative Tools> Disk management.

b. Start> programs> Administrative Tools> Account Configuration

c. Start> programs> Administrative Tools> Active Directory User and Computer

d. Start> programs> Administrative Tools> Config User Account.

e. Start> programs> Administrative Tools> control panel

17. What limitations can be made on a user account ....

a. Limit Login time

b. Work Space

c.    Log in to the network

d. Storage space

e. Electricity

18. The combination of straight wiring on a computer network that conforms to international standards is…

a. White orange - orange - white green - blue - white blue - green - white brown - brown

b. White orange - orange - white green - green - white blue - blue - white brown - brown

c. White green - green - white orange - blue - white blue - orange - white brown - brown

d. White orange - orange - white green - green - white blue - blue - white brown - brown

e. Orange - white orange - green - white green - white blue - blue - white brown - brown

19. IP Address 126.46.5.6 is included in the IP Address class…:

a.    A

b. B

c. C

d. D

e. E

20. The command "PING" on the network is used for the following things, except ...:

a. Test the send function of a NIC

b. Test the receive function of a NIC

c. Test the suitability of a NIC

d. Test the TCP / IP configuration

e.    Test network connection

21. The process of changing / converting / encoding a certain form of information so that it is not understood by unauthorized parties is called ...

a. Description

b. Outlook

c. Validation

d. Property

e.    Encryption

22. Important data that is sent so that it is not easily intercepted must be encrypted, the following are the types of encryption, except ....

a. DES

b.    DOS

c. PEM

d. PGP

e. SSL

23. Attacks often occur in network security as described below, except ....

a. Scanning

b.    Sniffing

c. Exploit

d. Spoofing

e. Dubbing

24. Take advantage of system weaknesses for activities outside of normal use which are appropriately called ....

a. Scanning

b. Sniffing

c.    Exploit

d. Spoofing

e. Dubbing

25. Disguise IP security attacks are called .....

a. Scanning

b. Sniffing

c. Exploit

d.    Spoofing

e. Dubbing

26. Listening to information that passes through the network with any protocol is called an attack ....

a. Scanning

b.   Sniffing

c. Exploit

d. Spoofing

e. Dubbing

27. The advantages of a Peer-to-Peer network are, except ....

a.    Low cost

b. Everyone can connect the network

c. Unlimited expansion     

d. Does not require an administrator

e. Easy to setup and manage

28. Damage to the network system can be caused by an unstable power supply voltage or sudden shutdown, this can be overcome by using .......

a. Stavol

b. Stabilizer

c.    Oops

d. Travo

e. Stationary

29. The command "PING" on the network is used for the following things, except ...:

a. Test the send function of a NIC

b. Test the receive function of a NIC

c. Test the suitability of a NIC

d. Test the TCP / IP configuration

e.    Test network connection

30. To see an indication of the IP configuration installed on the computer, use the command…

a. Ping

b.    IPConfig

c. Tracert

d. Traceroute

e. Nslookup

31. To change the boot sequence before installing the operating system, we have to do the settings on…:

a.    BIOS

b. Kernel

c. TCP / IP

d. Windows

e. IP address

32. What is the speed of data access at an access point that has the IEEE 802.11g code standard…

a. 11Mb / s

b. 54Mb / s

c. 108Mb / s

d. 216Mb / s

e. 432Mb / s

33. Command text to view routing table in Windows is…:

a. route -n

b. route -a

c. route PRINT

d. route -D

e. route -t

34. The command text to check the IP address that we have on Linux is ...:

a. config

b. setconfig

c. read config

d. ipconfig

e.   ifconfig

35. The command text to check the IP address that we have in Windows is ...:

a. config

b. setconfig

c. read config

d.    ipconfig

e. ifconfig

36. The command text to check whether our network connection is already connected to depdiknas.org is…

a. ls depdiknas.org

b. vi depdiknas.org

c. cp depdiknas.org

d.    ping depdiknas.org

e. install depdiknas.org

37. The computer in charge of storing information on web pages that have been accessed before is…:

a. Router

b. Web server

c. Proxy server

d. Name server

e. Database server

38. The smallest unit of information known in data communication is…:

a.    Bit

b. Byte

c. Label

d. Packet

e. Segment

39. Almost all system usage activities include login failures. To fix this, the administrator must analyze the files in .....

a. Proxy

b. Cache

c. History

d. Bookmark

e.    Logfile

40. Connecting a LAN or computer to the internet will open up potential infiltration, this is often termed ....

a. Security atact

b.    Security hole

c. Scurity phishing

d. Security warning

e. Security hacking

41. There are many ways that can be used to increase network security, except ....

a.    Limiting usage time

b. Close the ports that are not used

c. Putting down a firewall

d. Using a scan listener

e. Using Apache

42. Procedures or regulations agreed internationally so that a computer can communicate with other computers is called ...

a. Proxy

b. Protocol

c. Procedure

d. Proposal

e. Program

43. Software utility that works on the computer and is designed to provide IP addresses to computer is called ...

a. DNS

b. Gateway

c. Protocol

d. DHCP

e. Ipconfig

44. The term TTL in the PING command is ....

a. Time to loose

b. Time to live

c. Time to leave

d. Time to lost

e. Time to lie

45. The device that is placed between the internet and the internal network is ....

a. DHCP

b. Gateway

c. Firewall

d. Protocol

e. Nslookup

46. ​​The tools used to implement the security policy are ....

a.    DHCP

b. Gateway

c. Firewall

d. Protocol

e. Nslookup

47. One of the Firewall functions is ....

a. Monitoring

b. Controling

c. Control

d.    Filtering

e. Accessing

48. Actions taken by a firewall by passing data packets or blocking data packets are aimed at actions .....

a. Monitoring

b.    Controling

c. Blocking

d. Filtering

e. Accessing

49. What causes unidentified network hardware devices ....

a. Driver not installed   

b. Unknown brand

c. Faulty hardware                    

d. All PC components are all damaged

e. Low price

50. Firewall function as a liaison between the client computer and the outside network is called the function ....

a.    Proxy

b. Monitoring

c. Controling

d. Filtering

e. Accessing


Happy Working

Комментарии