Sei sulla pagina 1di 9

Soal ke-1:

Which one was requirement to do a penetration testing?

Pilihan jawaban:

A hole in a system

Consent from system owner

Administrator concern

Breach in the system

Soal ke-2:

Below was a list of software vulnerabilities, except?

Pilihan jawaban:

Memory safety violation

Input validation

Side channel Attack

Social engineering

Soal ke-3:

Three main goals of cyber security are?

Pilihan jawaban:

Confidentiality, integrity, protection

Availability, confidentiality, integrity

Integrity, availability, access control

Access control, protection, confidentiality

Soal ke-4:
Convert the decimal number 230 into its binary equivalent. Select the correct answer from the list
below.

Pilihan jawaban:

11110010

11011011

11110110

11100110

Soal ke-5:

A web server of a public institution is down for 1 hour due to Distributed Denial of Services (DDoS)
attack. Which security aspect has been compromised in this case?

Pilihan jawaban:

Confidentiality

Integrity

Availability

Non-repudiation

Soal ke-6:

Which of the following statement is the most correct definition of non-repudiation?

Pilihan jawaban:
Cannot deny the data confidentiality

Cannot deny the modification of data

Cannot deny that he/she was the person who sent the data

None of the above

Soal ke-7:

To withdraw money from automatic teller machine (ATM), Aliya inserts a card and types 4-digit PIN
code. This is an example of the following authentication principle…

Pilihan jawaban:

What you are and what you have

What you know and what you have

What you know and what you are

What you have only

Soal ke-8:

While using your computer, an app window displays on your screen and tells you that all of your files are
encrypted. The app window demands that you make an anonymous payment if you ever want to
recover your data. What type of malware has infected your computer?

Pilihan jawaban:

Ransomware

Adware

Trojan horse
Worm

Soal ke-9:

Candra receives an email from someone that claimed to be the IT administration and saying that his
email account is almost reaching the quota and the storage needs to be increased. Then, the sender
asking for his username and password. This is an example of the following security threat?

Pilihan jawaban:

Malware

Virus

Social engineering

Botnet

Soal ke-10:

An attack where the attacker uses every possible length and alphanumeric password combination is
known as?

Pilihan jawaban:

Rainbow table attack

Brute force attack

Dictionary attack

Guessing attack

Soal ke-11:

Which program do we need to detect trojan that infected our computer?


Pilihan jawaban:

Microsoft Word

Antivirus

Traceroute

None of the above

Soal ke-12:

An activity when someone changed your password without your knowledge is called:

Pilihan jawaban:

Phishing

Theft

Scam

Denial of Service

Soal ke-13:

Which of the following technology ensures the transaction security when purchasing goods through an
online store?

Pilihan jawaban:

Antivirus software

Secure Socket Layer


Firewall

Packet Analyzer

Soal ke-14:

How to prevent other person to access confidential data in your computer?

Pilihan jawaban:

Use the latest WiFi standard, such as IEEE 802.11ac

Back up data in a Tier-1 ISO-certified Data Center

Use password

Regularly updating the antivirus definition database

Soal ke-15:

A type of threat when someone accidentally delete an important file is:

Pilihan jawaban:

Phishing

Spoofing

Human error

Predator

Soal ke-16:

Which of the following password is a weak password?


Pilihan jawaban:

bambang1990

I Lov3 You!

T&5kBz90F$_

M4kanDulu@22756

Soal ke-17:

How to ensure that nobody else can know which websites we visited when we use a public computer?

Pilihan jawaban:

Delete cookies

Empty recycle bin or trash

Update the operating system

Turn off the computer

Soal ke-18:

What is VLAN stands for?

Pilihan jawaban:

Virtual Link Address Network

Virtual Link Area Network


Virtual Local Area Network

Virtual Local Address Network

Soal ke-19:

What is the security property that guarantees that sensitive information is changed only by an
authorized party?

Pilihan jawaban:

Accountability

Availability

Confidentiality

Integrity

Soal ke-20:

Which one of these are vulnerabilities?

Pilihan jawaban:

Brute-force

Spoofing

Weak password

Man-in-the-middle

Selesai

Periksa kembali jawaban Anda, lalu tekan tombol berikut:


SELESAI UJIAN

Potrebbero piacerti anche