Minggu, 18 Maret 2012

TI 3

31.Komputer yang bertugas menyimpan informasi halaman web yang pernah diakses sebelumnya adalah..... a. Router b. Web server c. Proxy server d. Name server e. Database server 32.Program atau utilitas yang digunakan untuk mendiagnosis konfigurasi DNS Server adalah.... http://tkjsmkn1purwodadi.blogspot.com/ a. debug b. cmd c. netsh d. route e. nslookup 33.Perintah yang digunakan untuk mengetahui MAC Address LAN Card yang kita pasang adalah .... a. localhost b. run c. ping d. ipconfig e. mkdir 34.Bilangan 125 jika dikonversikan dengan bilangan biner menjadi... a. 1111111 b. 1111101 c. 1111001 d. 1110111 e. 1111110 35.MAC atau Media Access Control di OSI Layer berada pada layer.... a. phisical b. network c. datalink d. transport e. session 36.Webserver yang banyak digunakan digunakan adalah..... a. APACHE b. MySQL c. SQUID d. MYOB e. DBFSL 37.Kemampuan sistem operasi yang dapat digunakan oleh banyak user disebut... a. Multiuser b. Pipelining c. Threading d. Multitasking e. Managemen 38.Singkatan dari apakah MAC Address? a. Media Access Controlling b. Medium Access Control Address c. Media Access Card Address d. Media Access Control Address e. Media Address Control 39.Aplikasi yang bisa digunakan untuk mengirim file antar komputer … a. VOIP b. MIRC c. BROWSER d. FTP e. IRC 40.Antena merupakan media untuk memaksimalkan coverage radio frekuensi. Berikut yang bukan merupakan tipe-tipe antenna adalah a. Antenna yagi b. Antenna parabolic c. Antenna grid d. Antenna wireless e. Antenna omni Read More...

IT 2

16.Terjadinya tabrakan pengiriman data pada suatu jaringan komputer dikenal dengan istilah… a. Collision b. Broken c. Explode d. Fusion e. Attacking 17.Salah satu protokol internet yang digunakan untuk transfer data / file adalah… a. HTTPS b. APN c. FTP d. HTTP e. SMTP 18.Untuk men-seting IP secara manual pada windows XP pada tab …. a. General b. Authentication c. Advanced d. Configure e. Option 19.Lapisan OSI yang berfungsi sebagai interface antar user dan computer adalah layer… a. Application Layer b. Presentation Layer c. Session Layer d. Transport Layer e. Network Layer 20.Lapisan OSI yang ketiga adalah…. a. Application Layer b. Presentation Layer c. Session Layer d. Transport Layer e. Network Layer 21.Tombol keyboard yang digunakan untuk melakukan seting BIOS ketika PC booting, adalah… a. F1 b. F4 c. Del d. Ins e. Esc 22.Suara beep panjang berulang-ulang ketika PC melakukan POST kemungkinan besar disebabkan oleh permasalahan… a. Power supply b. CPU c. BIOS d. RAM e. keyboard 23.Di bawah ini merupakan kelebihan dari topologi star, kecuali… a. Pemasangan kabel mudah b. Memudahkan penambahan koneksi c. Memudahkan pengurangan koneksi d. Memudahkan deteksi kesalahan e. Hemat kabel 24.Standar kabel yang digunakan untuk menghubungkan PC dengan router adalah… a. Straight b. Cross over c. Roll over d. Cross line e. Console 25.Perintah di bawah ini yang digunakan untuk menguji koneksi jaringan adalah…. a. ping b. ipconfig c. ifconfig d. traceroute e. tracert 26.Perintah Linux yang digunakan untuk menampilkan konfigurasi jaringan adalah…. A. ping B. ipconfig C. ifconfig D. traceroute E. tracert 27.Data rate pada jaringan WiFi standar IEEE082.11b adalah… a. 11 Mbps b. 24 Mbps c. 56 Mbps d. 64 Mbps e. 300 Mbps 28.Perangkat jaringan yang fungsinya untuk memancarkan sinyal wireless yang digunakan untuk akses internet adalah… a. Hotspot b. Wireless Access Point c. Wireless Client d. Modem e. Wireless adapter 29.Teknik melakukan penyamaran sehingga terdeteksi sebagai identitas yang bukan sebenarnya, merupakan serangan keamanan jaringan jenis…. a. Spoofing b. DoS c. DDoS d. Virus attact e. Hacking 30.Teknik yang digunakan untuk melindungi jaringan, dengan menyaring, membatasi atau bahkan menolak koneksi adalah…. a. Proxy b. Firewall c. IP Filter d. MAC Filter e. Firewire Read More...

TI 1

1. Tipe kabel manakah yang cocok untuk ATA High-speed (66 Mbps or 100 Mbps)… a. 40-konduktor kabel b. 20-konduktor kabel c. 80-konduktor kabel d. 60-konduktor kabel e. 50-konduktor kabel 2. Ketika POST terdengar bunyi beep pendek 1 kali. Apa yang kemungkinan terjadi? a. Masalah pada RAM b. Cacat pada motherboard c. POST sukses d. Masalah pada VGA e. Processor terlalu panas 3. Physical sector pertama pada bootable hardisk berisi tentang…. a. Directory Area b. Data Area c. MBR d. FAT e. Software Aplication 4. Modem eksternal berfungsi untuk mengubah data yang masuk dari…. a. Analog ke serial b. Serial ke digital c. Analog ke digital d. Pararel ke digital e. Digital ke digital 5. Perintah dibawah ini yang digunakan untuk menghapus file secara permanen… a. Ctrl + Del b. Shift + Del c. Alt + Del d. Ctrl + Shift + Del e. Ctrl + Alt + Del 6. Dibawah ini yang termasuk keuntungan dari topologi BUS adalah…. a. Hemat kabel b. Memudahkan deteksi kesalahan karena system control terpusat c. Komputer akan langsung terhubung dengan computer lainnya d. Didukung banyak hardware dan softwarenya e. Jika jaringan utama rusak, seluruh segmen akan rusak juga 7. Dibawah ini yang bukan merupakan perangkat proses adalah…. a. VGA b. RAM c. Processor d. Motherboard e. HDD 8. Resistor memiliki kode warna kuning-ungu-merah-perak. Memiliki nilai resistansinya adalah… a. 470 Ω + 10% b. 4K7 Ω + 10% c. 4K3 Ω + 10% d. 3K9 Ω + 10% e. 6,8K Ω + 10% 9.Perhatikan gambar disamping! Tabel kebenaran di samping merupakan fungsi logika untuk gerbang ….

a.OR b. NAND c. AND d. NOR e.EX-OR 10.IP dibawah ini yang bisa terkoneksi dengan 197.168.10.17 adalah… a. 198.168.10.16 b. 197.169.10.16 c. 197.168.0.16 d. 192.168.10.16 e. 197.168.10.16 11.Urutan pemasangan warna kabel untuk T568A adalah…. a. White Green – Green – White Orange – Blue – White Blue – Orange – White Brown – Brown b. White Green – Green – White Orange – White Blue – Blue – Orange –White Brown – Brown c. White Orange – Orange – White Green – Blue – White Blue – Green – White Brown – Brown d. White Orange – Orange – White Green – White Blue – Blue –Green – White Brown – Brown e. White Orange – Orange – White Green – Green – White Blue – Blue – White Brown – Brown 12.Address Range IP 192.168.1.109/27 adalah …. a. 192.168.1.97 – 192.168.1.126 b. 192.168.1.96 – 192.168.1.111 c. 192.168.1.96 – 192.168.1.127 d. 192.168.1.97 – 192.168.1.110 e. 192.168.1.1 – 192.168.1.254 13.Bilangan biner dari IP 192.168.1.109 adalah… a. 11000000.10101100.00000001.01101101 b. 11000000.10101000.00000001.01101110 c. 11000000.10101000.00000011.01101101 d. 11000000.10111000.00000001.01101101 e. 11000000.10101000.00000001.01101101 14.Pernyataan dibawah ini yang paling benar adalah…. a. Fn + F2 berfungsi sebagai help b. Fn + F2 berfungsi sebagai wifi c. Fn + F1 berfungsi sebagai help d. Fn + F1 berfungsi sebagai wifi e. Fn + F2 berfungsi sebagai setup BIOS 15.Jaringan komputer yang wilayahnya hanya mencakup kantor-kantor yang letaknya berdekatan atau dalam suatu kota, disebut jenis jaringan… a. LAN b. WAN c. MAN d. Internet e. Wireless LAN
Read More...

Rabu, 15 Juni 2011

42.As an assignment, a computer science student needs to present data in binary format. What are the two possible values that the student can use? (Choose two.)

0#**#

1#**#

2

A

F



43.What measurement is commonly used to describe communication speed when transferring data?

bps#**#

cps

Hz

MB




44.Which two components are configured via software in order for a PC to participate in a network environment? (Choose two.)

MAC address

IP address#**#

kernel

shell

subnet mask#**#



45.A company has a web server that must be accessible to both external and internal clients. Which security policy best practice should be followed to maximize security of the server?

Place the web server in a DMZ.

Keep the web server on the external network#**#.

Configure a firewall device to serve as the web server.

Locate the web server in the server farm of the internal network.






46.What is the most common reason that ISPs provide asymmetrical transfer services?

to carry a large amount of data in both directions at equal rates

to host servers on the Internet

to work with applications that require significant bandwidth#**#

to work with large business applications

47.Which portion of the packet does a router use to forward the packet to the destination?

source IP address

user data

destination IP address#**#

control information

destination MAC address

48.Which protocol is used to transfer files among network devices and perform file-management functions?

DNS

FTP#**#

HTML

HTTP

49.After issuing the ipconfig/all command on a host that has DHCP enabled, a network administrator notes that the output contains faulty IP configuration information. What is the first step the administrator should take to resolve this issue?

Replace the NIC in the host.

Change the IP address of the DHCP server.

Use static addressing to assign the correct IP address.

Use the release and renew options supported by the ipconfig command.#**#

50.Which three addresses belong to the category of private IP addresses? (Choose three.)

10.0.0.1#**#

128.0.0.1

150.0.0.1

172.16.0.1#**#

192.168.31.19#**#

172.168.31.1

51.A host wants to send information simultaneously to all the other hosts in the same network. Which domain will support this type of communication?

broadcast#**#

unicast

local

multicast

52.What describes the external IP address that is obtained by a router through a cable or DSL modem?

a public address that is obtained from ICANN

a private address that is manually configured by the administrator

a public address that is obtained through DHCP from the ISP#**#

a private address that converts to a public address on the internal LAN

Read More...




Refer to the exhibit. The network is experiencing excessive broadcast traffic from multiple hosts. What can be done to reduce the broadcast traffic that each host receives without compromising connectivity to the corporate servers?

Separate the switches with a router#**#.

Create a separate VLAN for the servers and hosts.

Change from Ethernet switches to FastEthernet switches.

Increase the number of switches to reduce the number of PCs that are connected to each switch.




Refer to the exhibit. In the wireless network, what is the maximum number of hosts supported if the IP addressing scheme contains four host bits?

6

14

16

30

32

254




When NAT is employed in a small office, which address type is typically used for hosts on the local LAN?

private IP addresses

global public IP addresses

Internet-routable addresses

both private and public IP addresses





Refer to the graphic. Based on the information that is shown, what statement is true?

This configuration would be commonly found in an ad hoc wireless network.

Any wireless client that is attached to this access point would have the same IP address and SSID.

All wireless devices that are connected to this access point must have an assigned SSID of Academy#**#.

In addition to accepting wireless client requests, this access point must connect to the wired network.



What must be identical on all devices in a WLAN for successful wireless communication between the devices?

SSID#**#

antenna type

network mode

wireless NIC driver






Which protocol in its default configuration downloads e-mail messages to the client computer and deletes them from the server?

FTP

POP3#**#

SMTP

IMAP4

Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a computer?

FM

radar

infrared#**#

ultraviolet

What two pieces of information should a help desk technician document while troubleshooting connectivity issues with an end user? (Choose two.)

the CPU clock speed of the computer

the number of network jacks that are in the room

if the user can ping the default gateway address#**#

if the word processing software is installed correctly

whether the PC uses dynamic or static IP addressing#**#


Which portion of a received datagram is decoded and used by the internetwork layer of the TCP/IP model?

IP address

port number

MAC address

HTML/user data


38.TCP/IP data transmission between the source and destination host is de-encapsulated in four steps:

A. The TCP header is removed.
B. Bits are decoded and the destination MAC address is recognized.
C. The IP header is removed and the contents are passed to the next layer.
D. The Ethernet header and trailer are removed.

What is the correct sequence of these steps?

A, B, C, D

A, C, B, D

B, C, D, A

B, D, C, A#**#

C, A, B, D

39.A network technician suspects that malware on a user PC is opening multiple TCP connections to a specific foreign host address. Which Windows command line utility can be used to confirm the multiple TCP connections?

ping

netstat#**#

tracert

ipconfig

nslookup

















Read More...

16.

Which statement is true concerning stateful packet inspection?

Access is permitted based on IP addresses of the source and destination devices.

Access is permitted based on the MAC addresses of the source and destination devices.

Access is permitted only if the type of application that is attempting to reach the internal host is allowed.

Access is permitted only if it is a legitimate response to a request from an internal host ##**#.

Which type of network supports DHCP and DNS services for network users in a network domain?

client/server

peer-to-peer

hierarchical#**#

ad hoc

What is the common DHCP role of the ISR router in home and small office networks?

The ISR router acts only as a DHCP client.

The ISR router acts only as a DHCP server.

The ISR router acts as both a DHCP client and server.

The ISR router forwards all DHCP traffic and acts as neither a client nor a server.

Which function is available on the network when TCP is used as the transport protocol?

traffic encryption

best effort delivery

user authentication

delivery acknowledgement

Which network design layer provides a connection point for end user devices to the network?

access#**#

core

distribution

network

A user wishes to secure a home wireless network against unknown host associations. Which procedure will do this?

filtering MAC addresses

disabling SSID broadcasting

changing the default password of the AP

changing the default IP address of the AP

How do ISPs obtain public IP addresses?

They create the addresses themselves.

They obtain the addresses from the home PCs.

They obtain the addresses from the Internet registry.

They obtain the addresses from the RFC.

For devices that do not autosense, which connection requires a crossover cable?

hub port to router port

PC to hub port

PC to switch port

PC port to PC port#**#

Which Windows command is used to display the configured IP address, subnet mask, and default gateway?

ipconfig

netstat

nslookup

tracert

What is the purpose of pop-up blocker software?

It detects and removes spyware.

It detects and removes viruses.

It prevents the display of advertisement windows.#**#

It removes unwanted e-mail.

27What destination IP address is used in a unicast packet?

a specific host

a group of hosts

all hosts on the network

the network broadcast address

28.What are two advantages of purchasing a custom-built computer? (Choose two.)

usually a lower cost

no waiting period for assembly

user can specify higher performance components#**#

supports higher-end graphics and gaming applications#**#

fewer components to replace

Read More...




1.Refer to the exhibit. A Linksys integrated services router is being used by wireless clients to access a server which is directly connected to an Ethernet port on the router. The server and the clients are using DHCP for IP addressing from the Linksys device and are on the same subnet. The server and the wireless clients are obtaining the correct IP configuration and can ping the Linksys device, but are unable to ping each other. What could be causing this issue?

The ping failures indicate a routing problem on the Linksys device. Check for proper routes.

The symptoms indicate a physical connection problem on the server. Check for the proper cable type and the physical connection.

The problem is most likely occurring on the Linksys device. Check all configurations on the Linksys device to ensure no security restrictions could be causing the issue.

Radio frequency problems are the likely problem if the clients cannot connect to the server on the same subnet. Begin by checking the signal strength at the wireless clients.



2.Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked while using a bottom-up troubleshooting approach?

the default gateway on the host

the IP address on the host

the IP address on the router

the link status LED on the front of the router#**#

the subnet mask on the host

4.When is the use of a DSL modem necessary?

when a cellular telephone provides the service

when a high-speed connection is provided over a cable TV network

when a high-speed digital connection is required over the regular telephone line #**#

when a satellite dish is used

6.When would infrared be used to connect network devices?

when connecting multiple host devices to a wireless access point

when synchronizing a PC with a PDA that is in line of sight#**#

when connecting a PC to a network switch that is located in another room

when updating two access points that are located in separate buildings

7.Which adapter card would be required for a PC to exchange information with other PCs on a LAN?

NIC#**#

video card

sound card

internal modem




8.Refer to the exhibit. If host H8 sends a message to host H5 and the destination MAC address is in the MAC tables of both switches, which host device or devices will receive the message?

only host H5#**#

all hosts on the network

all hosts that are connected to switch Sw1

all hosts that are connected to switch Sw2 and host H5.

all hosts that are connected to hub Hub1 and switch Sw1

9.Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID and password?

brute force

denial of service

data manipulation

social engineering#**#

c








10How does a straight-through cable connect two unlike devices?

It connects the receive pins on the first device to the receive pins on the second device.

It connects the transmit pins on the first device to the receive pins on the second device.#**#

It disconnects the transmit pins and uses only the receive pins.

It uses the same pins for transmitting and receiving.

11.Which of the following are transport layer protocols of the TCP/IP model? (Choose two.)

FTP

UDP#**#

SMTP

TFTP

TCP#**#

12.For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected?

identifying the problem

asking end-users questions

documenting the troubleshooting process#**#

using structured techniques to solve a problem

Microsoft Word is an example of a network application.

Network applications are accessible from a remote computer#**#.

Network applications are installed on a special type of computer that supports only network applications.

Network applications are installed on a network server.#**#

Network applications are accessible by one computer at a time.

15.Which type of computer has an integrated mouse?

desktop

laptop#**#

mainframe

server

pocket PC

Read More...

TERIMA KASIH TELAH MENGUNJUNGI BLOG INI by:bhakti.santoso