0% found this document useful (0 votes)
497 views8 pages

Quiz Review - Pertemuan 3 - Attempt Review

1. The document is a quiz review from a course on computer and internet crime from Telkom University. 2. It reviews 15 multiple choice questions from a week 3 meeting covering topics like phishing, trojan horses, spam, exploits, DDoS attacks, script kiddies, computer forensics, risk assessment, worms, industrial spies, and hacktivism. 3. The student scored 13/15 points on the quiz with an 87% grade.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
497 views8 pages

Quiz Review - Pertemuan 3 - Attempt Review

1. The document is a quiz review from a course on computer and internet crime from Telkom University. 2. It reviews 15 multiple choice questions from a week 3 meeting covering topics like phishing, trojan horses, spam, exploits, DDoS attacks, script kiddies, computer forensics, risk assessment, worms, industrial spies, and hacktivism. 3. The student scored 13/15 points on the quiz with an 87% grade.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

3/1/2021 Quiz Review: Pertemuan 3: Attempt review

ETIKA PROFESI, REGULASI TEKNOLOGI INFORMASI DAN PROPERTI INTELEKTUAL SI-41-


05 [DWH]
Dashboard / My courses / ISI4F2-SI-41-05 / Computer and Internet Crime, pekan ke-3 / Quiz Review: Pertemuan 3

Started on Monday, 1 March 2021, 1:09 PM

State Finished

Completed on Monday, 1 March 2021, 1:18 PM

Time taken 8 mins 37 secs

Marks 13.00/15.00

Grade 8.67 out of 10.00 (87%)

Question 1

Correct

Mark 1.00 out of 1.00

Phishing melalui pesan teks disebut

Select one:

a. Smishing 

b. Hashing

c. Vishing

d. Spear-phishing

The correct answer is: Smishing

https://lms.telkomuniversity.ac.id/mod/quiz/review.php?attempt=1658529&cmid=1011239#question-1690488-15 1/8
3/1/2021 Quiz Review: Pertemuan 3: Attempt review

Question 2

Correct

Mark 1.00 out of 1.00

Kode berbahaya yang tersembunyi di dalam program yang tampaknya tidak berbahaya disebut

Select one:

a. Virus

b. DDoS

c. Trojan Horse 

d. Worm

The correct answer is: Trojan Horse

Question 3

Correct

Mark 1.00 out of 1.00

Iklan komersial berbiaya rendah untuk produk atau jasa biasanya melalui email disebut

Select one:

a. Trojan Horse

b. Virus

c. Spam 

d. Worm

The correct answer is: Spam

https://lms.telkomuniversity.ac.id/mod/quiz/review.php?attempt=1658529&cmid=1011239#question-1690488-15 2/8
3/1/2021 Quiz Review: Pertemuan 3: Attempt review

Question 4

Correct

Mark 1.00 out of 1.00

Mengambil keuntungan dari kerentanan sistem disebut

Select one:

a. patch

b. virus

c. exploit 

d. rewall

The correct answer is: exploit

Question 5

Incorrect

Mark 0.00 out of 1.00

Contoh resiko dari serangan ke perusahaan adalah?

Select one:

a. Harmfull Virus 

b. Semua benar

c. Harmfull Worm

d. Payment fraud

The correct answer is: Semua benar

https://lms.telkomuniversity.ac.id/mod/quiz/review.php?attempt=1658529&cmid=1011239#question-1690488-15 3/8
3/1/2021 Quiz Review: Pertemuan 3: Attempt review

Question 6

Incorrect

Mark 0.00 out of 1.00

Tindakan menggunakan email untuk membuat penerima mengungkapkan data pribadi disebut

Select one:

a. Virus

b. Worm

c. Spam

d. phising 

The correct answer is: Spam

Question 7

Correct

Mark 1.00 out of 1.00

membanjiri situs target dengan tuntutan data dan tugas kecil disebut

Select one:

a. Trojan Horse

b. DDoS 

c. Worm

d. Virus

The correct answer is: DDoS

https://lms.telkomuniversity.ac.id/mod/quiz/review.php?attempt=1658529&cmid=1011239#question-1690488-15 4/8
3/1/2021 Quiz Review: Pertemuan 3: Attempt review

Question 8

Correct

Mark 1.00 out of 1.00

Hacker yang tidak kompeten disebut

Select one:

a. script kiddies 

b. scripter

c. cracker

d. Beginner

The correct answer is: script kiddies

Question 9

Correct

Mark 1.00 out of 1.00

metode komputasi yang memberikan pengalaman komputasi yang aman disebut

Select one:

a. clould computing

b. Private clould

c. Social engineering

d. Trustworthy Computing 

The correct answer is: Trustworthy Computing

https://lms.telkomuniversity.ac.id/mod/quiz/review.php?attempt=1658529&cmid=1011239#question-1690488-15 5/8
3/1/2021 Quiz Review: Pertemuan 3: Attempt review

Question 10

Correct

Mark 1.00 out of 1.00

Orang yang menguji keterbatasan sistem karena keingintahuan intelektual adalah

Select one:

a. cracker

b. Malicious Insiders

c. Industrial Spies

d. hacker 

The correct answer is: hacker

Question 11

Correct

Mark 1.00 out of 1.00

Teknik untuk melakukan investigasi dalam kejahataan komputer disebut

Select one:

a. risk assessment

b. Trustworthy Computing

c. clould computing

d. computer forensics 

The correct answer is: computer forensics

https://lms.telkomuniversity.ac.id/mod/quiz/review.php?attempt=1658529&cmid=1011239#question-1690488-15 6/8
3/1/2021 Quiz Review: Pertemuan 3: Attempt review

Question 12

Correct

Mark 1.00 out of 1.00

proses menilai risiko terkait keamanan ke komputer dan jaringan organisasi disebut

Select one:

a. clould computing

b. risk assessment 

c. detection-respone

d. Trustworthy Computing

The correct answer is: risk assessment

Question 13

Correct

Mark 1.00 out of 1.00

Jenis serangan yang dapat menyebar tanpa campur tangan manusia adalah

Select one:

a. Spam

b. Virus

c. Trojan Horse

d. Worm 

The correct answer is: Worm

https://lms.telkomuniversity.ac.id/mod/quiz/review.php?attempt=1658529&cmid=1011239#question-1690488-15 7/8
3/1/2021 Quiz Review: Pertemuan 3: Attempt review

Question 14

Correct

Mark 1.00 out of 1.00

Menggunakan cara ilegal untuk mendapatkan rahasia dagang dari pesaing disebut

Select one:

a. Malicious Insiders

b. Industrial Spies 

c. cracker

d. hacker

The correct answer is: Industrial Spies

Question 15

Correct

Mark 1.00 out of 1.00

Peretasan untuk mencapai tujuan politik atau sosial adalah merupakan jenis kejahatan

Select one:

a. Industrial Spies

b. Cyberterrorists

c. Hacktivisme 

d. Malicious Insiders

The correct answer is: Hacktivisme

Previous Activity

Jump to...

Next Activity

https://lms.telkomuniversity.ac.id/mod/quiz/review.php?attempt=1658529&cmid=1011239#question-1690488-15 8/8

You might also like