You are on page 1of 6

2/22/2021 Post Test Week 2: Attempt review

KEAMANAN SIBER IF-42-08 [DRB]


Dashboard / My courses / CII3E3-IF-42-08 / CLO 1 - Menentukan langkah tepat ketika sistem pertahanan gagal bekerja / Post Test Week 2

Started on Monday, 22 February 2021, 7:39 PM

State Finished

Completed on Monday, 22 February 2021, 7:45 PM

Time taken 6 mins 5 secs

Grade 90.00 out of 100.00

Question 1

Correct

Mark 10.00 out of 10.00

An Act to make provision for securing computer material against unauthorised access or modi cation; and for connected
purposes

Select one:

a. The Fraud Act

b. IPA

c. GDPR

d. CMA 

The correct answer is: CMA

https://lms.telkomuniversity.ac.id/mod/quiz/review.php?attempt=1588832&cmid=839194 1/6
2/22/2021 Post Test Week 2: Attempt review

Question 2

Correct

Mark 10.00 out of 10.00

Berikut ini merupakan serangan cyber adalah

Select one:

a. war driving

b. hardening

c. identity theft 

d. phreaking

The correct answer is: identity theft

Question 3

Correct

Mark 10.00 out of 10.00

How do we recover from virus

Select one:

a. we need to contact the organisation which owns the data. In certain circumstances, this may also require the
involvement of the police or security services

b. we may need to reformat your hard drive, reinstall your operating system and reinstall your keys. 

c. we need specialised software to recover the le

d. we use the ‘Restore Point’ feature to revert your computer to a previous working state.

The correct answer is: we may need to reformat your hard drive, reinstall your operating system and reinstall your keys.

https://lms.telkomuniversity.ac.id/mod/quiz/review.php?attempt=1588832&cmid=839194 2/6
2/22/2021 Post Test Week 2: Attempt review

Question 4

Incorrect

Mark 0.00 out of 10.00

Manakah dibawah ini yang tidak termasuk ancaman terhadap keamanan informasi?

Select one:

a. information leakage 

b. unchanged default password

c. authentication

d. eavesdropping

Question 5

Correct

Mark 10.00 out of 10.00

Salah satu cara untuk melindungi dari serangan cyber adalah

Select one:

a. Menggunakan VPN 

b. Menggunakan software bajakan

c. Menggunakan public proxy server

d. Menggunakan public wi

The correct answer is: Menggunakan VPN

https://lms.telkomuniversity.ac.id/mod/quiz/review.php?attempt=1588832&cmid=839194 3/6
2/22/2021 Post Test Week 2: Attempt review

Question 6

Correct

Mark 10.00 out of 10.00

Salah satu cara untuk menjaga data availability adalah dengan menggunakan

Select one:

a. importing

b. recovery

c. altering

d. backup 

The correct answer is: backup

Question 7

Correct

Mark 10.00 out of 10.00

Serangan yang sulit untuk ditanggulangi adalah

Select one:

a. no authentication

b. Insider attack 

c. weak cryptography 

d. non secure connection

The correct answer is: Insider attack

https://lms.telkomuniversity.ac.id/mod/quiz/review.php?attempt=1588832&cmid=839194 4/6
2/22/2021 Post Test Week 2: Attempt review

Question 8

Correct

Mark 10.00 out of 10.00

Some signs that a victim might notice except

Select one:

a. their bank or credit card provider suddenly transfer an amout of fund 

b. they receive notice that their information was compromised by a data breach at a company where they do business or
have an account

c. debt collectors make contact about debts the victim knows nothing about

d. bills and other expected of cial letters don’t arrive

The correct answer is: their bank or credit card provider suddenly transfer an amout of fund

Question 9

Correct

Mark 10.00 out of 10.00

Which one is not the consequences of data loss

Select one:

a. the cost of recreating the lost data

b. the cost of losing an asset 

c. the cost of continuing without that data

d. the cost of informing others about the loss

The correct answer is: the cost of losing an asset

https://lms.telkomuniversity.ac.id/mod/quiz/review.php?attempt=1588832&cmid=839194 5/6
2/22/2021 Post Test Week 2: Attempt review

Question 10

Correct

Mark 10.00 out of 10.00

Which one is the data protection law

Select one:

a. CMA

b. DPA 

c. The Fraud Act

d. IPA

The correct answer is: DPA

Previous Activity

Jump to...

Next Activity

https://lms.telkomuniversity.ac.id/mod/quiz/review.php?attempt=1588832&cmid=839194 6/6

You might also like