Senin, 27 Mei 2013

Hasil SNM PTN Diumumkan Besok Total Pelamar 780 Ribu, Berebut 132 Ribu Kursi


JAKARTA -Jadwal pengumuman hasil seleksi nasional masuk perguruan tinggi negeri (SNM PTN) maju. Dari rencana diumumkan Selasa (28/5), maju menjadi Senin (27/5) besok. Pelamar SNM PTN bisa melihat pengumuman melalui internet besok sekitar pukul 18.00 WIB atau di media massa keesokan harinya.
    
"Data di upload ke internet setelah ada konferensi pers dengan media masa di ITB (Institut Teknologi Bandung, red)," kata Ketua Umum Panitia SNM PTN 2013 Akhmaloka kemarin. Konferensi pers hasil SNM PTN 2013 digelar sekitar pukul 15.00 WIB.

Pengumuman kelulusan SNM PTN 2013 dibayangi perbedaan data kelulusan siswa antara versi Kemendikbud dengan dinas pendidikan provinsi. Perbedaan itu terjadi hampir di seluruh provinsi. Salah satunya di Sumatera Utara (Sumut). Versi Kemendikbud ada 641 murid SMA dan sederajat yang tidak lulus. Versi Dinas Pendidikan Sumut, yang tidak lulus 2.948 siswa.
    
Kasus serupa terjadi di Jawa Timur (Jatim). Versi Kemendikbud ada 56 siswa yang tidak lulus. Sedangkan versi dinas pendidikan setempat ada 154 siswa yang tidak lulus. Perbedaan data berpotensi merugikan pelamar SNM PTN. Bukan tidak mungkin ada pelamar SNM PTN yang diyatakan lulus padahal dia tidak lulus SMA.
    
"Panitia SNM PTN dapat data resmi dari Kemendikbud. Kami tidak mengumpulkan data dari provinsi-provinsi," seru Akhmaloka.

Rektor ITB itu mengatakan, panitia sedang konsentrasi menyaring pelamar SNM PTN yang sebelumnya sudah di-ranking. Jika ada siswa yang masuk daftar ranking tetapi tidak lulus unas, namanya langsung di-drop alias tidak diterima.
    
Akhmaloka menyatakan perbedaan data kelulusan siswa sejauh ini tidak mengganggu proses SNM PTN. Untuk mengatasi pontesi ada siswa lulus SNM PTN tetapi yang bersangkutan tidak lulus SMA, panitia punya cara. Yakni, seluruh pelamar wajib membawa bukti kelulusan ketika mendaftar ulang pada 18-19 Juni mendatang. "Pokoknya yang boleh kuliah itu yang sudah lulus atau menamatkan SMA atau sederajat," tegasnya.
    
Dari catatan panitia, jumlah pelamar SNM PTN 2013 mencapai 780 ribuan. Sedangkan kuota yang tersedia sekitar 132 ribu kursi mahasiswa baru. Bagi yang tidak lulus SNM PTN, masih punya peluang kuliah di kampus negeri lewat jalur tes tulis atau SBM PTN (seleksi bersama masuk perguruan tinggi negeri).

0 komentar:

Rabu, 22 Mei 2013

Form 3 - Exam Viewer - DHomesb Final Exam - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

بِسْــــــــــــــــمِ اﷲِالرَّحْمَنِ اارَّحِيم

1
Which protocol is used to transfer files among network devices and perform file-management functions?
DNS
FTP
HTML
HTTP

2
What is the function of the DNS server?
It assigns IP addresses to clients.
It accepts HTTP requests from clients.
It maps a hostname to a corresponding IP address.
It manages the domain that clients are assigned to.

3
A computer joins the network and announces itself to all hosts on the LAN. What type of message does
 the computer send out?
broadcast
simulcast
multicast
unicast

4
As an assignment, a computer science student needs to present data in binary format. What are the two
 possible values that the student can use? (Choose two.)
0
1
2
A
F

5
What type of message is sent to a specific group of hosts?
static
unicast
dynamic
multicast
broadcast

6
Which term is associated with logical addressing?
IP addresses
port addresses
physical addresses
Media Access Control addresses

7
What destination IP address is used in a unicast packet?
a specific host
a group of hosts
all hosts on the network
the network broadcast address

8
Which value would be considered the physical address for data that is sent across an Ethernet segment?
IP address
port address
MAC address
network address

9
Refer to the exhibit. Which option correctly represents the encapsulation of a packet that is sent by
Host1 to the web server?
<<< TRUE

10
What are two examples of peripheral output devices? (Choose two.)
barcode reader
digital camera
external DVD
headphones
printer

11
What does the term "attenuation" mean in data communication?
loss of signal strength as distance increases
time for a signal to reach its destination
leakage of signals from one cable pair to another
strengthening of a signal by a networking device

12
Which network design layer provides a connection point for end user devices to the network?
access
core
distribution
network

13
Which two statements are true about local applications? (Choose two.)
They run on the network.
An example of a local application is e-mail.
They are accessed from a remote computer.
They are stored on the local hard disk.
They run on the computer where they are installed.

14
Which portion of the packet does a router use to forward the packet to the destination?
source IP address
user data
destination IP address
control information
destination MAC address

15
Refer to the exhibit. H1 can ping H2, H3, and the Fa0/0 interface of router R1. H2 and H3 but not H1
can ping H4 and H5. What is a possible cause for the H1 failure?
Router R1 has no route to the destination network.
Switch S1 does not have an IP address configured.
The link between router R1 and switch S2 has failed.
Host H1 does not have a default gateway configured.

16
Refer to the exhibit. If H4 sends a message to H1 and the destination MAC address is in the MAC table
 for both Switch1 and Switch2, which host devices will receive the message?
only H1
hosts H1 and H4
all hosts that are connected to Switch1
all hosts that are connected to Switch1 and Switch2

17
Refer to the exhibit. Which statement is true based on the information that is shown in the exhibit?
All wireless devices that are connected to this AP must have an assigned SSID of College.
Any wireless client that is attached to this AP must have the same IP address and SSID.
The AP is not physically wired to the local LAN.
This configuration is found only in an ad hoc wireless network.

18
Refer to the exhibit. A home network is configured with the information in the graphic. A user tries to
manually create a new connection to the network using the SSID Ciscoclass. However, a connection
cannot be made. What could be the problem?
The SSID is case-sensitive.
The SSID must contain at least one number.
The SSID should be used with the default name.
The SSID must contain a minimum of 32 characters.

19
Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to
 a Linksys integrated router. What can be deduced from the output?
The DHCP configuration on the router needs to be verified.
The WEP key or SSID needs to be verified.
The wireless connection is operational.
The wireless NIC driver or the NIC itself needs to be reinstalled.

20
What will be one result of using a wireless infrastructure when designing the communications infrastructure
 for a new building?
Wireless devices will be easy to add or relocate.
Infrastructure installation will be difficult and expensive.
There will be less interference from outside electronic sources.
Data transmitted over wireless networks will be more secure than when transmitted over wired networks.

21
What is specified by the network number in an IP address?
the network to which the host belongs
the physical identity of the computer on the network
the node of the subnetwork which is being addressed
the broadcast identity of subnetwork

22
Refer to the exhibit. Given the use of default masks, which network will router R1 use as the destination
network for communications from PC1 to PC2?
128.0.0.0
128.107.0.0
128.107.1.0
192.0.0.0
192.135.0.0
192.135.14.0

23
Which two values represent the network number and default mask for the address 209.165.200.225? (Choose two.)
209.0.0.0
209.165.0.0
209.165.200.0
255.0.0.0
255.255.0.0
255.255.255.0

24
Which three address ranges can be used to depict private IP addresses? (Choose three.)
10.0.0.0 to 10.0.0.255
127.16.0.0 to 127.16.255.255
150.150.0.0 to 150.150.255.255
172.16.1.0 to 172.16.1.255
192.168.22.0 to 192.168.22.255
200.100.50.0 to 200.100.50.255

25
Under what circumstance would it be appropriate to use private IP addresses?
for communication between two ISPs
for a network that is directly connected to the Internet
for addresses that are used exclusively within an organization.
for a host with more than one direct connection to the Internet

26
Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a computer?
FM
radar
infrared
ultraviolet

27
Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?
acceptable use
incident handling
network maintenance
remote access

28
What wireless technology has the ability to communicate with many devices at the same time, makes use of the 2.4 GHz band, and is limited to low-speed, short-range communications?
RF
ISM
infrared
Bluetooth

29
Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID and password?
brute force
denial of service
data manipulation
social engineering

30
Refer to the exhibit. An organization needs to connect PC systems that use private IP addressing to the Internet. The organization has multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal?
authentication
DHCP
encryption
firewall
NAT
WEP

31
A network administrator is setting up an application filtering firewall. Company security policy states that FTP sessions that are coming from the Internet and use the standard FTP port must be blocked. Which TCP/UDP port must the administrator block on the firewall to be in compliance?
21
23
53
80

32
What is the name for the contract between a customer and an ISP that specifies requirements for uptime and service response time?
DSL
IAB
NAP
SLA

33
How does a crossover cable make it possible for two "like devices" (for example, two switches) to communicate?
The transmit pins are disconnected and only the receive pins are used.
The transmit pins on one device are connected to the transmit pins on the other device.
The receive pins on one device are connected to the receive pins on the other device.
The transmit pins on one device are connected to the receive pins on the other device.

34
Which attribute must be the same for wireless devices on one network to be able to communicate with devices on a different network?
DNS server
MAC address
default gateway
operating system
wireless equipment vendor

35
Which picture shows a USB port on a PC?
<<< TRUE

36
A college network administrator is planning a wireless LAN to provide service in the student lounge and outdoor patio. The requirements include a range of at least 80 meters and a speed of 30 Mb/s. Which wireless LAN standard meets these requirements?
802.11
802.11a
802.11b
802.11g

37
Which type of computer has an integrated mouse?
desktop
laptop
mainframe
server
pocket PC

38
What is true about a wireless access point that is equipped with an omnidirectional antenna?
concentrates signal in one direction
typically used in bridging applications
radiates the signal equally in all directions
provides the greatest transmission distance of all antenna types that are used by APs

39
What are two ways that a user can interact with an operating system shell? (Choose two.)
CLI
OS
GUI
NIC
kernel

40
Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked if using a bottom-up troubleshooting approach?
the default gateway on the host
the IP address on the host
the IP address on the router
the link status LED on the front of the router
the subnet mask on the host

41
For devices that do not autosense, which connection requires a crossover cable?
hub port to router port
PC to hub port
PC to switch port
PC port to PC port

42
Which statement is true about UTP cable termination?
Cables with RJ-45 connectors are always preterminated.
An RJ-45 connector is used on only one end of the UTP cable.
Up to 2 to 3 inches of cable may be untwisted at each end of the cable to allow for easier installation of the RJ-45 connector.
The RJ-45 connector should be pushed over the wire jacket for a smooth connection.

43
A local PC has the correct configuration that is required to access the network. A ping command that is sourced at the PC does not receive a response from a remote device. Which operating system command might be used to determine where the connection failed?
netstat
tracert
ipconfig
nslookup

44
An administrator is troubleshooting a network problem that involves the inability of users to reach Internet sites. During troubleshooting, the administrator is able to successfully ping web sites by their IP address, but pings to domain names are unsuccessful. Which service is most likely at fault?
DHCP
DNS
FTP
NAT

45
What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)
ipconfig /release
ipconfig /all
ipconfig /flushdns
ipconfig /renew
ipconfig

46
Which installation option should be chosen when the current operating system is too damaged to work properly?
upgrade
multi-boot
clean install
virtualization

47
A user is unable to send e-mail. To begin troubleshooting this problem, the network technician uses the browser on the PC and tries to access some popular Internet websites. Which troubleshooting approach is being followed?
bottom-up
divide-and-conquer
top-down
trial and error

48
Which two causes of networking problems are related to the physical layer? (Choose two.)
damaged cables and connectors
incorrect addressing
incorrect subnet mask
overheated components
incorrect default gateway

49
Which statement accurately describes a recommended strategy for end users to employ when they interact with a help desk technician?
Provide as much information about the problem as possible.
Expect first-level help desk technicians to solve the problem, because they are highly-trained personnel.
Hand over the problem to the help desk professionals, then do not interfere with them.
At the beginning of the call, ask for the name and number of the supervisor of the help desk technician.

50
What does it mean when a problem is being escalated by a helpdesk?
The helpdesk is following up on a resolved problem.
The helpdesk has made the problem a lower priority.
The helpdesk has solved the problem and is closing the ticket.
The helpdesk is moving the problem to a higher level support staff.

1 komentar:

Exam Viewer - DHomesb Chapter 8 - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)


بِسْــــــــــــــــمِ اﷲِالرَّحْمَنِ اارَّحِيم
1
Identify three techniques used in social engineering. (Choose three.)
fishing
vishing
phishing
spamming
pretexting
junk mailing

2
During a pretexting event, how is a target typically contacted?
by e-mail
by phone
in person
through another person

3
While surfing the Internet, a user notices a box claiming a prize has been won. The user opens the box unaware that a program is being installed. An intruder now accesses the computer and retrieves personal information. What type of attack occurred?
worm
virus
Trojan horse
denial of service

4
What is a major characteristic of a Worm?
malicious software that copies itself into other executable programs
tricks users into running the infected software
a set of computer instructions that lies dormant until triggered by a specific event
exploits vulnerabilities with the intent of propagating itself across a network

5
A flood of packets with invalid source-IP addresses requests a connection on the network. The server busily tries to respond, resulting in valid requests being ignored. What type of attack occurred?
Trojan horse
brute force
ping of death
SYN flooding

6
What type of advertising is typically annoying and associated with a specific website that is being visited?
adware
popups
spyware
tracking cookies

7
What is a widely distributed approach to marketing on the Internet that advertises to as many individual users as possible via IM or e-mail?
brute force
spam
spyware
tracking cookies

8
What part of the security policy states what applications and usages are permitted or denied?
identification and authentication
remote access
acceptable use
incident handling

9
Which statement is true regarding anti-virus software?
Only e-mail programs need to be protected.
Only hard drives can be protected.
Only after a virus is known can an anti-virus update be created for it.
Only computers with a direct Internet connection need it.

10
Which two statements are true concerning anti-spam software? (Choose two.)
Anti-spam software can be loaded on either the end-user PC or the ISP server, but not both.
When anti-spam software is loaded, legitimate e-mail may be classified as spam by mistake.
Installing anti-spam software should be a low priority on the network.
Even with anti-spam software installed, users should be careful when opening e-mail attachments.
Virus warning e-mails that are not identified as spam via anti-spam software should be forwarded to other users immediately.

11
What term is used to describe a dedicated hardware device that provides firewall services?
server-based
integrated
personal
appliance-based

12
Which abbreviation refers to an area of the network that is accessible by both internal, or trusted, as well as external, or untrusted, host devices?
SPI
DMZ
ISR
ISP

13
Which statement is true about port forwarding within a Linksys integrated router?
Only external traffic that is destined for specific internal ports is permitted. All other traffic is denied.
Only external traffic that is destined for specific internal ports is denied. All other traffic is permitted.
Only internal traffic that is destined for specific external ports is permitted. All other traffic is denied.
Only internal traffic that is destined for specific external ports is denied. All other traffic is permitted.

14
To which part of the network does the wireless access point part of a Linksys integrated router connect?
DMZ
external
internal
a network other than the wired network

15
What statement is true about security configuration on a Linksys integrated router?
A DMZ is not supported.
The router is an example of a server-based firewall.
The router is an example of an application-based firewall.
Internet access can be denied for specific days and times.

16
What environment would be best suited for a two-firewall network design?
a large corporate environment
a home environment with 10 or fewer hosts
a home environment which requires secure VPN access
a small business environment which is experiencing continuing DDoS attacks

17
What is one function that is provided by a vulnerability analysis tool?
It provides various views of possible attack paths.
It identifies missing security updates on a computer.
It identifies wireless weak points such as rogue access points.
It identifies all network devices on the network that do not have a firewall installed.
It identifies MAC and IP addresses that have not been authenticated on the network.

18
Many best practices exist for wired and wireless network security. The list below has one item that is not a best practice. Identify the recommendation that is not a best practice for wired and wireless security.
Periodically update anti-virus software.
Be aware of normal network traffic patterns.
Periodically update the host operating system.
Activate the firewall on a Linksys integrated router.
Configure login permissions on the integrated router.
Disable the wireless network when a vulnerability analysis is being performed.

19
What best practice relates to wireless access point security?
activation of a popup stopper
a change of the default IP address
an update in the antivirus software definitions
physically securing the cable between the access point and client

0 komentar: