Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Pilihan jawaban:
A hole in a system
Administrator concern
Soal ke-2:
Pilihan jawaban:
Input validation
Social engineering
Soal ke-3:
Pilihan jawaban:
Soal ke-4:
Convert the decimal number 230 into its binary equivalent. Select the correct answer from the list
below.
Pilihan jawaban:
11110010
11011011
11110110
11100110
Soal ke-5:
A web server of a public institution is down for 1 hour due to Distributed Denial of Services (DDoS)
attack. Which security aspect has been compromised in this case?
Pilihan jawaban:
Confidentiality
Integrity
Availability
Non-repudiation
Soal ke-6:
Pilihan jawaban:
Cannot deny the data confidentiality
Cannot deny that he/she was the person who sent the data
Soal ke-7:
To withdraw money from automatic teller machine (ATM), Aliya inserts a card and types 4-digit PIN
code. This is an example of the following authentication principle…
Pilihan jawaban:
Soal ke-8:
While using your computer, an app window displays on your screen and tells you that all of your files are
encrypted. The app window demands that you make an anonymous payment if you ever want to
recover your data. What type of malware has infected your computer?
Pilihan jawaban:
Ransomware
Adware
Trojan horse
Worm
Soal ke-9:
Candra receives an email from someone that claimed to be the IT administration and saying that his
email account is almost reaching the quota and the storage needs to be increased. Then, the sender
asking for his username and password. This is an example of the following security threat?
Pilihan jawaban:
Malware
Virus
Social engineering
Botnet
Soal ke-10:
An attack where the attacker uses every possible length and alphanumeric password combination is
known as?
Pilihan jawaban:
Dictionary attack
Guessing attack
Soal ke-11:
Microsoft Word
Antivirus
Traceroute
Soal ke-12:
An activity when someone changed your password without your knowledge is called:
Pilihan jawaban:
Phishing
Theft
Scam
Denial of Service
Soal ke-13:
Which of the following technology ensures the transaction security when purchasing goods through an
online store?
Pilihan jawaban:
Antivirus software
Packet Analyzer
Soal ke-14:
Pilihan jawaban:
Use password
Soal ke-15:
Pilihan jawaban:
Phishing
Spoofing
Human error
Predator
Soal ke-16:
bambang1990
I Lov3 You!
T&5kBz90F$_
M4kanDulu@22756
Soal ke-17:
How to ensure that nobody else can know which websites we visited when we use a public computer?
Pilihan jawaban:
Delete cookies
Soal ke-18:
Pilihan jawaban:
Soal ke-19:
What is the security property that guarantees that sensitive information is changed only by an
authorized party?
Pilihan jawaban:
Accountability
Availability
Confidentiality
Integrity
Soal ke-20:
Pilihan jawaban:
Brute-force
Spoofing
Weak password
Man-in-the-middle
Selesai