ODD SEMESTER OF KLS XII NETWORK SECURITY SYSTEM (TKJ PRODUCTIVE)
VOCATIONAL SCHOOL (VOCATIONAL SCHOOL) DARUSALAM
2013/2014 ODD SEMESTER EXAM
================================================== ======================
Subject : Network Security Systems - Class : XII (Twelve)
(Earning TKJ)
Prog. Skills : Computer and Network Engineering (TKJ) Time : 90 Minutes
===================================== ===================================
Choose The Most Correct Answer
1. In securing the network aspects that must be considered, except ......
a. System stability
b. Data availability and confidentiality
c. Service availability
d. Control
e. Weather
2. User Accounts that are on a computer, both Domain Controller and Client and can only be used to log into the computer where the account is created is ....
a. Local Account
b. Domain Account
c. Local User Account
d. Web Account
e. Domain User Account
3. Based on the scope of a group, there are 3 types of groups, each of which has its own scope, except ....
a. Domain Local Group
b. Distribution group
c. Global Group
d. Workgroup
e. Universal Group
4. Based on its function, there are two types of groups, one of which is ....
a. Domain Local Group
b. Universal Group
c. Global Group
d. Workgroup
e. Security Group
5. One of the characteristics of the Client / Server network type is ....
a. Everyone can connect to the network.
b. Limited expansion.
c. No file storage center
d. Security is not guaranteed
e. Unlimited expansion
6. Administrators must monitor the network system they are building, this is an aspect of security ....
a. Control
b. Confidentiality
c. Interests
d. Monitoring
e. Service
7. Setting access rights in the network system is an aspect of security ......
a. Control
b. Confidentiality
c. Interests
d. Monitoring
e. Service
8. Implementation of the Access Control mechanism, among others by using .....
a. User ID
b. Password
c. Login
d. Sign out
e. Sign Up
9. In addition to the password, to maintain security or access rights, the system will ask for .......
a. Mobile Number
b. User ID
c. Signature
d. KTP No
e. Photo
10. If there is an error in entering the password, this error will be recorded by the system and stored in .....
a. My Document
b. Template
c. Logfile
d. Cache files
e. Bookmark
11. The following are the types of networks based on their scope, except ......
a. Server
b. MAN (Metroplotian Area Network)
c. LAN (Local Area Network)
d. Internet
e. WAN (Wide Area Network)
12. There are several topologies used in computer networks, except the topology ...
a. Bus Linear
b. Hub
c. Star
d. Mesh
e. Tree
13. Characteristics of a Local Group Domain, are ....
a. Can consist of users or groups from any domain.
b. This group can only be seen in the domain. where the group is created.
c. Stand alone
d. Not dependent on others.
e. Independent
14. The characteristics of the Global Group are ....
a. Can only consist of users or groups that are in the group
created.
b. This group can be viewed from any domain on the network.
c. Unique
d. Independent
e. Important network elements
15. Which file system below supports Encryption and local security ....
a. FAT32
b. Ext3
c. Fat16
d. Ext2
e. NTFS
16. How to display the configuration menu for users, groups and various objects of active directories ....
a. Start> Programs> Administrative Tools> Disk management.
b. Start> programs> Administrative Tools> Account Configuration
c. Start> programs> Administrative Tools> Active Directory User and Computer
d. Start> programs> Administrative Tools> Config User Account.
e. Start> programs> Administrative Tools> control panel
17. What limitations can be made on a user account ....
a. Limit Login time
b. Work Space
c. Log in to the network
d. Storage space
e. Electricity
18. The combination of straight wiring on a computer network that conforms to international standards is…
a. White orange - orange - white green - blue - white blue - green - white brown - brown
b. White orange - orange - white green - green - white blue - blue - white brown - brown
c. White green - green - white orange - blue - white blue - orange - white brown - brown
d. White orange - orange - white green - green - white blue - blue - white brown - brown
e. Orange - white orange - green - white green - white blue - blue - white brown - brown
19. IP Address 126.46.5.6 is included in the IP Address class…:
a. A
b. B
c. C
d. D
e. E
20. The command "PING" on the network is used for the following things, except ...:
a. Test the send function of a NIC
b. Test the receive function of a NIC
c. Test the suitability of a NIC
d. Test the TCP / IP configuration
e. Test network connection
21. The process of changing / converting / encoding a certain form of information so that it is not understood by unauthorized parties is called ...
a. Description
b. Outlook
c. Validation
d. Property
e. Encryption
22. Important data that is sent so that it is not easily intercepted must be encrypted, the following are the types of encryption, except ....
a. DES
b. DOS
c. PEM
d. PGP
e. SSL
23. Attacks often occur in network security as described below, except ....
a. Scanning
b. Sniffing
c. Exploit
d. Spoofing
e. Dubbing
24. Take advantage of system weaknesses for activities outside of normal use which are appropriately called ....
a. Scanning
b. Sniffing
c. Exploit
d. Spoofing
e. Dubbing
25. Disguise IP security attacks are called .....
a. Scanning
b. Sniffing
c. Exploit
d. Spoofing
e. Dubbing
26. Listening to information that passes through the network with any protocol is called an attack ....
a. Scanning
b. Sniffing
c. Exploit
d. Spoofing
e. Dubbing
27. The advantages of a Peer-to-Peer network are, except ....
a. Low cost
b. Everyone can connect the network
c. Unlimited expansion
d. Does not require an administrator
e. Easy to setup and manage
28. Damage to the network system can be caused by an unstable power supply voltage or sudden shutdown, this can be overcome by using .......
a. Stavol
b. Stabilizer
c. Oops
d. Travo
e. Stationary
29. The command "PING" on the network is used for the following things, except ...:
a. Test the send function of a NIC
b. Test the receive function of a NIC
c. Test the suitability of a NIC
d. Test the TCP / IP configuration
e. Test network connection
30. To see an indication of the IP configuration installed on the computer, use the command…
a. Ping
b. IPConfig
c. Tracert
d. Traceroute
e. Nslookup
31. To change the boot sequence before installing the operating system, we have to do the settings on…:
a. BIOS
b. Kernel
c. TCP / IP
d. Windows
e. IP address
32. What is the speed of data access at an access point that has the IEEE 802.11g code standard…
a. 11Mb / s
b. 54Mb / s
c. 108Mb / s
d. 216Mb / s
e. 432Mb / s
33. Command text to view routing table in Windows is…:
a. route -n
b. route -a
c. route PRINT
d. route -D
e. route -t
34. The command text to check the IP address that we have on Linux is ...:
a. config
b. setconfig
c. read config
d. ipconfig
e. ifconfig
35. The command text to check the IP address that we have in Windows is ...:
a. config
b. setconfig
c. read config
d. ipconfig
e. ifconfig
36. The command text to check whether our network connection is already connected to depdiknas.org is…
a. ls depdiknas.org
b. vi depdiknas.org
c. cp depdiknas.org
d. ping depdiknas.org
e. install depdiknas.org
37. The computer in charge of storing information on web pages that have been accessed before is…:
a. Router
b. Web server
c. Proxy server
d. Name server
e. Database server
38. The smallest unit of information known in data communication is…:
a. Bit
b. Byte
c. Label
d. Packet
e. Segment
39. Almost all system usage activities include login failures. To fix this, the administrator must analyze the files in .....
a. Proxy
b. Cache
c. History
d. Bookmark
e. Logfile
40. Connecting a LAN or computer to the internet will open up potential infiltration, this is often termed ....
a. Security atact
b. Security hole
c. Scurity phishing
d. Security warning
e. Security hacking
41. There are many ways that can be used to increase network security, except ....
a. Limiting usage time
b. Close the ports that are not used
c. Putting down a firewall
d. Using a scan listener
e. Using Apache
42. Procedures or regulations agreed internationally so that a computer can communicate with other computers is called ...
a. Proxy
b. Protocol
c. Procedure
d. Proposal
e. Program
43. Software utility that works on the computer and is designed to provide IP addresses to computer is called ...
a. DNS
b. Gateway
c. Protocol
d. DHCP
e. Ipconfig
44. The term TTL in the PING command is ....
a. Time to loose
b. Time to live
c. Time to leave
d. Time to lost
e. Time to lie
45. The device that is placed between the internet and the internal network is ....
a. DHCP
b. Gateway
c. Firewall
d. Protocol
e. Nslookup
46. The tools used to implement the security policy are ....
a. DHCP
b. Gateway
c. Firewall
d. Protocol
e. Nslookup
47. One of the Firewall functions is ....
a. Monitoring
b. Controling
c. Control
d. Filtering
e. Accessing
48. Actions taken by a firewall by passing data packets or blocking data packets are aimed at actions .....
a. Monitoring
b. Controling
c. Blocking
d. Filtering
e. Accessing
49. What causes unidentified network hardware devices ....
a. Driver not installed
b. Unknown brand
c. Faulty hardware
d. All PC components are all damaged
e. Low price
50. Firewall function as a liaison between the client computer and the outside network is called the function ....
a. Proxy
b. Monitoring
c. Controling
d. Filtering
e. Accessing
Happy Working
Комментарии
Отправить комментарий