Kripto 1

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Catherine Halcomb
Catherine Halcomb
Community Contributor
Quizzes Created: 1443 | Total Attempts: 6,668,640
| Attempts: 2,402
SettingsSettings
Please wait...
  • 1/89 Pitanja

    Kod One-Time Pad C=1001, K=1111

    • P=0110
    • P=1100
    • P=1111
    • P=0010
Please wait...


Quiz Preview

  • 2. 

    Operacija šifrovanja i dešifrovanja kod apsolutno tajnih šifarskih sistema je

    • AND

    • INC

    • XOR

    • DEC

    • ADD

    • SIF

    Correct Answer
    A. XOR
    Explanation
    XOR (exclusive OR) is the correct answer for the question. XOR is a logical operation that returns true if the inputs are different and false if they are the same. In the context of encryption and decryption in absolutely secret cipher systems, XOR is commonly used as it provides a high level of security. XORing a message with a secret key produces the encrypted message, and XORing the encrypted message with the same key retrieves the original message. This operation is reversible and ensures that the encrypted message cannot be easily deciphered without the key.

    Rate this question:

  • 3. 

    Integritet moze biti narusen u slucaju npada:

    • Neovlascenih korisnika

    • Autentifikovanih i autorizovanih korisnika

    • Ovlascenih korisnika koji zloupotrebljavaju svoja prava

    Correct Answer(s)
    A. Neovlascenih korisnika
    A. Ovlascenih korisnika koji zloupotrebljavaju svoja prava
    Explanation
    Integrity can be compromised by unauthorized users and authorized users who misuse their privileges. Unauthorized users may gain access to sensitive information or systems, leading to potential data breaches or unauthorized modifications. On the other hand, authorized users who abuse their privileges can intentionally or unintentionally alter or delete data, jeopardizing the integrity of the system. Both scenarios pose a risk to the integrity of the system and can result in data corruption or loss.

    Rate this question:

  • 4. 

    U oblasti zastite informacija CIA oznacava:

    • Condensation, Internet and Arpanet

    • Confidentiality, Integrity and Availability

    • Central Institute of America

    • Certified Internal Auditor

    • Central Intelligence Agency

    Correct Answer
    A. Confidentiality, Integrity and Availability
    Explanation
    The correct answer is "Confidentiality, Integrity and Availability." In the field of information security, CIA stands for these three fundamental principles. Confidentiality ensures that information is only accessible to authorized individuals, integrity ensures that information is accurate and unaltered, and availability ensures that information is accessible and usable when needed. These principles help protect sensitive information and ensure its reliability and accessibility.

    Rate this question:

  • 5. 

    Integritet moze biti narusen u slucaju napada:

    • Autentifikovanih i autorizovanih korisnika

    • Ovlascenih korisnika koji zloupotrebljavaju svoja prava

    • Neovlascenih korisnika

    Correct Answer(s)
    A. Ovlascenih korisnika koji zloupotrebljavaju svoja prava
    A. Neovlascenih korisnika
    Explanation
    The correct answer is "Ovlascenih korisnika koji zloupotrebljavaju svoja prava, Neovlascenih korisnika" which translates to "Authorized users who abuse their privileges, Unauthorized users" in English. This answer suggests that integrity can be compromised when authorized users misuse their rights and when unauthorized users gain access to the system. Both scenarios can lead to unauthorized modifications, deletions, or alterations of data, thus compromising its integrity.

    Rate this question:

  • 6. 

    Ako se kod One-time pad sifre isti tajni radni kljuc upotrebi za dve razlicite poruke nastaje:

    • Ako se ANDuju dobijeni sifrati dobija se otvorena poruka

    • Ako se uporede dobijeni sifrati vidi se da se minimalno razlikuju

    • Ako se oduzmu dobijeni sifrati dobija se kljuc

    • Ako se XORuju dva dobijena sifrata iz rezultata se gubi tajni kljuc

    Correct Answer
    A. Ako se XORuju dva dobijena sifrata iz rezultata se gubi tajni kljuc
    Explanation
    If two ciphertexts obtained from the One-time pad cipher are XORed, the result will not reveal the secret key.

    Rate this question:

  • 7. 

    Autentifikacija obezbeđuje

    • Sigurnu implementaciju protokola

    • Proveru identiteta

    • Integritet poruke

    • Proveru autoriteta

    Correct Answer
    A. Proveru identiteta
    Explanation
    Autentifikacija obezbeđuje proveru identiteta. This means that authentication ensures that the identity of the user or entity trying to access a system or resource is verified. It helps in confirming that the user is who they claim to be, preventing unauthorized access and protecting against identity theft or impersonation.

    Rate this question:

  • 8. 

    Karakteristika "tajnih algoritama":

    • Tesko ostaju tajna duzi period

    • Danasnji algoritmi su tajni algoritmi

    • Kada se otvore za javnost, najcesce imaju slabosti

    • Ostaju tajni zauvek

    Correct Answer(s)
    A. Tesko ostaju tajna duzi period
    A. Kada se otvore za javnost, najcesce imaju slabosti
    Explanation
    The characteristics of "secret algorithms" are that they are difficult to remain secret for a long period of time and when they are made public, they often have weaknesses.

    Rate this question:

  • 9. 

    Blokovske sifre su zasnovane na konceptu kodnih knjiga gde:

    • Svaka strana predstavlja novu kodnu knjigu

    • Kodne knjige stvaraju neodredjenost sifrata

    • Svaki kljuc odredjuje novu kodnu knjigu

    Correct Answer
    A. Svaki kljuc odredjuje novu kodnu knjigu
    Explanation
    In block ciphers, each key determines a new codebook. This means that for each different key used, a different codebook is generated, which is used for encryption and decryption. The codebook creates uncertainty in the cipher, making it difficult for an attacker to decipher the encrypted message without knowing the key. Therefore, the statement "Svaki kljuc odredjuje novu kodnu knjigu" (Each key determines a new codebook) is a correct explanation of how block ciphers work.

    Rate this question:

  • 10. 

    Sifarski sistem je bezbedan:

    • Ako je kljuc duzine 256 bita

    • Ako za njega garantuje treca strana od poverenja svojim sertifikacionim telom

    • Ako je nabolji moguci napad - potpuna pretraga kljuceva

    • Ako je algoritam nelinearan

    • Ako se za sifrovanje koriste mocni racunari

    Correct Answer
    A. Ako je nabolji moguci napad - potpuna pretraga kljuceva
    Explanation
    The given correct answer states that the sifarski sistem is secure if the best possible attack is a complete search of the keys. This implies that if the system is designed in such a way that it is not vulnerable to other types of attacks, such as brute force or cryptographic attacks, and the only feasible way to compromise the system is through a complete search of all possible keys, then it can be considered secure.

    Rate this question:

  • 11. 

    Za apsolutno tajni sifarski sistem karakteristika kljuca je:

    • Dvostruki niz

    • Slucajni niz

    • Deterministicki niz

    • Jedinstveni niz

    • Prirodni niz

    Correct Answer
    A. Slucajni niz
    Explanation
    The correct answer is "Slucajni niz" which translates to "Random sequence" in English. This means that the key characteristics of an absolutely secret cryptographic system are based on a random sequence. Randomness is crucial in cryptography as it adds unpredictability and makes it difficult for attackers to decipher the encrypted information. Therefore, using a random sequence as a key helps to enhance the security and confidentiality of the system.

    Rate this question:

  • 12. 

    Blokovske sifre su zasnovane na konceptu kodnih knjiga gde:

    • Kodne knjige stvaraju neodredjenost sifrata

    • Svaka strana predstavlja novu kodnu knjigu

    • Svaki kljuc odredjuje novu kodnu knjigu

    Correct Answer
    A. Svaki kljuc odredjuje novu kodnu knjigu
    Explanation
    In block ciphers, a key determines a specific codebook or code table that is used for encryption and decryption. Each key corresponds to a unique codebook, which is a collection of mappings between plaintext and ciphertext. By using different keys, different codebooks are generated, introducing uncertainty and making it difficult for an attacker to decipher the encrypted message without the correct key. Therefore, the statement "Svaki kljuc odredjuje novu kodnu knjigu" (Each key determines a new codebook) is a correct explanation of the concept of block ciphers.

    Rate this question:

  • 13. 

    Rec "bit" moze da se skrembluje na:

    • 3 nacina

    • 6 nacina

    • 8 nacina

    • 9 nacina

    Correct Answer
    A. 6 nacina
    Explanation
    The word "bit" can be scrambled in 6 different ways.

    Rate this question:

  • 14. 

    Sifra je ekonomicna ako je E=N(ST)/N(OT):

    • E daleko manje od 1

    • E daleko vece od 1

    • E priblizno jedanko 1

    • E razlicito od 1

    Correct Answer
    A. E priblizno jedanko 1
    Explanation
    The correct answer is "E priblizno jedanko 1." This is because the equation states that E is economical if it is approximately equal to 1.

    Rate this question:

  • 15. 

    Sakrivanje informacija ili:

    • Manipulacija

    • Kriptografija

    • Data hiding

    • Steganografija

    • Stegoanaliza

    • Stereoskopija

    Correct Answer
    A. Steganografija
    Explanation
    Steganografija je proces skrivanja informacija unutar drugih oblika medija, kao što su slike, zvukovi ili tekstovi, na način da se promene ili sakriju tako da ne budu primetne. Ova tehnika se koristi kako bi se poruke ili podaci tajno preneli, a da ne izazovu sumnju ili privuku pažnju. Steganografija se razlikuje od kriptografije jer se ne bavi šifrovanjem samih podataka, već njihovim skrivanjem unutar drugih medija.

    Rate this question:

  • 16. 

    One-time pad sifra:

    • Koristi se na mestima gde se zahteva najvisi nivo tajnosti

    • Koristi se za zastitu brzih racunarskih komunikacija

    • Veoma je prakticna za upotrebu

    • Veoma je neprakticna za upotrebu u racunarskim mrezama

    Correct Answer(s)
    A. Koristi se na mestima gde se zahteva najvisi nivo tajnosti
    A. Veoma je neprakticna za upotrebu u racunarskim mrezama
    Explanation
    The given correct answer states that the one-time pad cipher is used in places where the highest level of secrecy is required and it is highly impractical for use in computer networks. This implies that the one-time pad cipher provides a high level of security and confidentiality, making it suitable for sensitive information. However, it is not practical for use in computer networks due to its limitations, such as the need for a pre-shared key of the same length as the message and the challenge of securely distributing and managing the keys.

    Rate this question:

  • 17. 

    Ključ za klasične šifre tipa TRANSPOZICIJE KOLONA je

    • Broj redova

    • Broj kolona

    • Dužina poruke

    • Dužina šifrata

    • Broj vodećih nula

    Correct Answer
    A. Broj kolona
    Explanation
    The correct answer is "Broj kolona." In classical column transposition ciphers, the key is determined by the number of columns used to rearrange the letters of the message. The number of columns determines the order in which the letters are written out to form the ciphertext. Therefore, the number of columns is an essential element in decrypting the message correctly.

    Rate this question:

  • 18. 

    Kod sifre transpozicije:

    • Sifrat je duzi od otvorenog teksta

    • Slova se premestaju

    • Slova se menjaju drugim slovima

    • Slova se menjaju kodnom reci

    • Utvrdjuje se korak zamne

    Correct Answer
    A. Slova se premestaju
    Explanation
    The correct answer is "Slova se premestaju" because the given information suggests that the code is using a transposition cipher, which involves rearranging the letters of the message. The other options mentioned, such as changing letters to other letters or using a keyword, are not directly related to transposition ciphers.

    Rate this question:

  • 19. 

    Supstitucija predstavlja:

    • Sifre transpozicije

    • Kodne knjige

    • Sifre zamene

    • Racunarski sigurne sifre

    • One-Time pad

    Correct Answer
    A. Sifre zamene
    Explanation
    The correct answer is "Sifre zamene" which translates to "Substitution ciphers" in English. Substitution ciphers are a type of encryption technique where each letter in the plaintext is replaced with another letter or symbol. This method of encryption involves replacing the original letters with different letters or symbols according to a predetermined substitution key. Substitution ciphers are commonly used in cryptography to protect sensitive information and ensure data security.

    Rate this question:

  • 20. 

    Ulazni parametri u sifarski sistem su:

    • Smart kartica

    • Otvoreni tekst

    • Linearni pomeracki registri

    • Ugovoreni vid tajnog pisanja

    • Kljuc za sifrovanje

    Correct Answer(s)
    A. Otvoreni tekst
    A. Kljuc za sifrovanje
    Explanation
    The correct answer is "Otvoreni tekst, Kljuc za sifrovanje". This means that the input parameters in the cipher system are the plaintext and the encryption key. The plaintext refers to the original message that needs to be encrypted, while the encryption key is the secret information used to perform the encryption process. These two parameters are crucial in the cipher system as they determine the encryption and decryption process. The other mentioned parameters, such as the smart card, linear shift registers, and agreed mode of secret writing, may also be important components in the cipher system, but they are not specifically mentioned as input parameters in this question.

    Rate this question:

  • 21. 

    One-time pad sifra:

    • Veoma je prakticna za upotrebu

    • Koristi se za zastitu brzih racunarskih komunikacija

    • Koristi se na mestima gde se zahteva najvisi nivo tajnosti

    • Veoma je neprakticna za upotrebu u racunarskim mrezama

    Correct Answer(s)
    A. Koristi se na mestima gde se zahteva najvisi nivo tajnosti
    A. Veoma je neprakticna za upotrebu u racunarskim mrezama
    Explanation
    The correct answer states that the one-time pad cipher is used in places where the highest level of secrecy is required and that it is very impractical for use in computer networks. This means that the one-time pad cipher is highly secure and effective for protecting sensitive information in certain contexts. However, it is not suitable for use in computer networks due to its impracticality, possibly because it requires a large amount of resources and is difficult to implement and manage in such systems.

    Rate this question:

  • 22. 

    Kod sifre transpozicije:

    • Slova se menjaju kodnom reci

    • Utvrdjuje se korak zamene

    • Slova se menjaju drugim slovima

    • Sifrat je duzi od otvorenog teksta

    • Slova se premestaju

    Correct Answer
    A. Slova se premestaju
    Explanation
    The given answer "Slova se premestaju" is correct because the phrase "Kod sifre transpozicije" translates to "Transposition cipher" in English. In a transposition cipher, the letters of the plaintext are rearranged or shuffled to form the ciphertext. This means that the letters are indeed being moved or shifted, which aligns with the answer "Slova se premestaju."

    Rate this question:

  • 23. 

    Obeleziti sta cini dvostruku transpoziciju:

    • Transpozicija sifrata

    • Transpozicija redova

    • Transpozicija kolona

    • Transpozicija kljuceva

    • Transpozicija tabela

    • Transpozicija tabela

    Correct Answer(s)
    A. Transpozicija redova
    A. Transpozicija kolona
    Explanation
    The correct answer is "Transpozicija redova, Transpozicija kolona". This is because the given options are related to different types of transposition. "Transpozicija redova" refers to the transposition of rows, while "Transpozicija kolona" refers to the transposition of columns. These two operations are commonly used in cryptography and data manipulation to rearrange the order of rows and columns in a matrix or table.

    Rate this question:

  • 24. 

    Supstitucije predstavljaju:

    • Sifre transpozicije

    • One-Time pad

    • Racunarski sigurne sifre

    • Sifre zamene

    • Kodne knjige

    Correct Answer
    A. Sifre zamene
    Explanation
    The correct answer is "Sifre zamene" which translates to "Substitution ciphers" in English. Substitution ciphers are a type of encryption method where each letter in the plaintext is replaced by a different letter or symbol in the ciphertext. This method is commonly used in cryptography to protect sensitive information.

    Rate this question:

  • 25. 

    Nevidljivi vid tajnog pisanja odnosi se na:

    • Koriscenje "tajnih mastila"

    • Sifre transpozicije

    • Sifre supstitucije

    • Koriscenje "nevidljivih olovki"

    • Koriscenje tajnih kodnih knjiga

    Correct Answer
    A. Koriscenje "tajnih mastila"
    Explanation
    The correct answer is "Korišćenje tajnih mastila". This refers to the use of invisible ink, which is a type of secret writing technique. Invisible ink is a substance that is not visible to the naked eye, but can be revealed by applying heat, chemicals, or special light. It was historically used for covert communication or to hide sensitive information. By using invisible ink, messages can be written in plain sight without anyone knowing the true content unless they possess the means to reveal it.

    Rate this question:

  • 26. 

    "Otvoren tekst" u kriptologiji moze da bude:

    • Poruka koja moze da se dodaje

    • Slika

    • Video signal

    • Govorni signal

    • Tekst

    • Hardver

    • Signal koji moze da se otvori

    Correct Answer(s)
    A. Slika
    A. Video signal
    A. Govorni signal
    A. Tekst
    Explanation
    In the field of cryptology, "otvoren tekst" refers to plaintext or unencrypted text. The given answer options - Slika (image), Video signal, Govorni signal (audio signal), and Tekst (text) - all represent different forms of data that can be considered as plaintext or unencrypted text. Therefore, all of these options can be classified as "otvoren tekst" in cryptology.

    Rate this question:

  • 27. 

    Obeleziti tipican primer napada na servis "raspolozivost":

    • Frekvencijaska analiza

    • Kasicki ispitivanje

    • Denial of Servise

    • Man in the Middle

    • Brute Force napad

    Correct Answer
    A. Denial of Servise
    Explanation
    Denial of Service (DoS) attack is a typical example of an attack on the "availability" of a service. In a DoS attack, the attacker overwhelms a system or network with an excessive amount of traffic or requests, causing it to become unavailable to legitimate users. This type of attack aims to disrupt the normal functioning of a service by exhausting its resources, such as bandwidth, processing power, or memory. By targeting the availability of a service, the attacker aims to prevent users from accessing or using the service effectively.

    Rate this question:

  • 28. 

    Sekvencijalne sifre predstavljaju:

    • Pseudo generator sekvenci blokova, a tipicni predstavnici su DES, JDES, AES

    • Pseudo generator ciji je izlaz radni kljuc priblizno slucajan kao kod One-time pad

    • Pseudo generator unutrasnjeg kljuca

    Correct Answer
    A. Pseudo generator ciji je izlaz radni kljuc priblizno slucajan kao kod One-time pad
    Explanation
    Sequential ciphers are pseudo generators whose output key is approximately random, similar to the one-time pad. These ciphers, such as DES, JDES, and AES, generate a sequence of blocks that are used to encrypt and decrypt data. The output key is not truly random like the one-time pad, but it is designed to be unpredictable and provide a high level of security.

    Rate this question:

  • 29. 

    Neporecivost je servis koji oznacava:

    • Predajna strana ne moze da porekne da j eporuka ispravna

    • Prijemna strana ne moze da porekne da je primila poruku

    • Strana koja je primila poruku ne moze da porekne da je promenila poruku

    • Strana koja je poslala poruku ne moze da porekne da je to uradila

    Correct Answer
    A. Strana koja je poslala poruku ne moze da porekne da je to uradila
    Explanation
    The correct answer states that "Strana koja je poslala poruku ne moze da porekne da je to uradila" which translates to "The party that sent the message cannot deny having done so." This means that once a message has been sent, the sender cannot claim that they did not send it. This concept is known as non-repudiation, which ensures that the sender of a message cannot later deny their involvement or responsibility for the message.

    Rate this question:

  • 30. 

    Sifarski sistem sa javnim kljucem koristi:

    • Privatni kljuc za sifrovanje, a javni za desiforvanje

    • Privatni kljuc za sifrovanje i desifrovanje

    • Javni kljuc za sifrovanje i desfirovanje

    • Javni za sifrovanje, a privatni za desiforvanje

    • Simetricni kljuc za desifrovanje

    Correct Answer
    A. Javni za sifrovanje, a privatni za desiforvanje
    Explanation
    The correct answer is "Javni za sifrovanje, a privatni za desiforvanje" which means that a public key is used for encryption and a private key is used for decryption. In a public key encryption system, anyone can use the public key to encrypt a message, but only the intended recipient with the corresponding private key can decrypt and read the message. This ensures that the message remains secure and only accessible to the intended recipient.

    Rate this question:

  • 31. 

    Osnovne pretpostavke simetricnog sifarskog sistema su:

    • Kljuc se cuva kod trece osobe od poverenja

    • Kljuc je javan

    • Kljuc je tajan

    • Algoritam i kljuc su nepoznati

    • Algoritam je javan

    • Algoritam je tajan

    Correct Answer(s)
    A. Kljuc je tajan
    A. Algoritam je javan
    Explanation
    The basic assumptions of a symmetric cipher system are that the key is kept secret and the algorithm is publicly known. This means that the key used for encryption and decryption is only known to the authorized parties, while the algorithm used for encryption and decryption is openly available to everyone. This allows for secure communication between parties, as the secrecy of the key ensures that only authorized individuals can decrypt the encrypted messages, while the public knowledge of the algorithm allows for transparency and verification of the encryption process.

    Rate this question:

  • 32. 

    Sifra A5/1 je primer:

    • Sifre transpozicije

    • Sifre superpozicije

    • Blokovske sifre

    • Sekvencijalne sifre

    • Javne sifre

    • Tajne sifre

    Correct Answer
    A. Sekvencijalne sifre
    Explanation
    The correct answer is "Sequential codes." Sequential codes are a type of encryption that generates a sequence of numbers or characters based on a predetermined algorithm. These codes are used in various applications, such as generating unique identification numbers or in cryptographic systems. They are called "sequential" because the next code in the sequence can be easily determined from the previous one. This makes them less secure compared to other encryption methods, such as block ciphers or public-key cryptography.

    Rate this question:

  • 33. 

    Kod sifarskih sistema sa generatorima pseudoslucajnog niza, pored tajnog kljuca, koristi se obavezno:

    • Javni kljuc

    • Sesijski kljuc

    • Privatni kljuc

    • Jednokratni kljuc

    • Sigurni kljuc

    Correct Answer
    A. Sesijski kljuc
    Explanation
    In cryptographic systems with pseudorandom number generators, in addition to the secret key, a session key is used. The session key is a temporary key that is generated for a specific session or communication session between two parties. It is used to encrypt and decrypt the data exchanged during that session, providing security and confidentiality. The session key is different for each session, making it more secure than using a single key for all communications.

    Rate this question:

  • 34. 

    Kod blokovskih algoritama:

    • Poruku delimo u blokove fiksne duzine

    • Poruku delimo na bajtove po osam bita (stream)

    • Poruku skremblujemo linearnim nizom

    • Poruku delimo u blokove razlicitih duzina

    • Poruku delimo u bigrame i trigrame

    Correct Answer
    A. Poruku delimo u blokove fiksne duzine
    Explanation
    The correct answer suggests that the message is divided into blocks of fixed length. This means that the message is broken down into equal-sized chunks, each containing a specific number of characters or bits. This approach allows for easier processing and manipulation of the message data.

    Rate this question:

  • 35. 

    Procedura C = E(P, K):

    • Proces steganografije

    • Proces desifrovanja

    • Predstavlja digitalno potpisivanje

    • Proces izracunavanja HASH funkcije

    • Predstavlja proces sifrovanja

    Correct Answer
    A. Predstavlja proces sifrovanja
    Explanation
    The correct answer is "Predstavlja proces sifrovanja." The given text mentions "Procedura C = E(P, K)" which indicates a process of encryption (sifrovanja). Therefore, the correct answer is that it represents the process of encryption.

    Rate this question:

  • 36. 

    Sifra A5/1 zasniva se na:

    • Tajnim kodovima

    • Promenljivim tabelama

    • Linearnim pomerackim registrima

    • Permutatorima

    • Kombinacionim linearnim mrezama

    • Invertorima

    Correct Answer
    A. Linearnim pomerackim registrima
    Explanation
    Sifra A5/1 se zasniva na linearnim pomerackim registrima. To znači da se koriste registri za pomeranje bitova kako bi se generisao ključ za šifrovanje. Ovi registri pomeraju bitove u određenom obrascu koji se koristi za kombinovanje sa podacima i stvaranje šifrovane poruke. Linearni pomeracki registri su ključni element u algoritmu A5/1 i omogućavaju generisanje sigurnih šifrovanih poruka.

    Rate this question:

  • 37. 

    Obeleziti bezbednosne racunarske protokole:

    • IpSec

    • DNS

    • AES

    • SSL

    • HTTP

    • Kerberos

    Correct Answer(s)
    A. IpSec
    A. SSL
    A. Kerberos
    Explanation
    The correct answer includes the protocols IpSec, SSL, and Kerberos. These protocols are all related to computer security. IpSec is a protocol used for securing internet communications by encrypting and authenticating IP packets. SSL (Secure Sockets Layer) is a protocol that provides secure communication over the internet, commonly used for websites that require sensitive information. Kerberos is a network authentication protocol that provides secure authentication for client/server applications. Therefore, these protocols are all examples of security protocols used to protect computer systems and data.

    Rate this question:

  • 38. 

    Sifre zamene dele se na:

    • Alfabetske

    • Polialfabetske

    • Asinhrone

    • Transpozicione

    • Numericke

    • Monoalfabetske

    Correct Answer(s)
    A. Polialfabetske
    A. Monoalfabetske
    Explanation
    The given answer suggests that the substitution cipher can be classified as both polialphabetic and monoalphabetic. A polialphabetic cipher is a cipher that uses multiple cipher alphabets, while a monoalphabetic cipher uses only one cipher alphabet. Therefore, the cipher in question involves the use of multiple cipher alphabets (polialphabetic) as well as the use of a single cipher alphabet (monoalphabetic).

    Rate this question:

  • 39. 

    Cilj servisa raspolozivosti je:

    • Da omoguci distribuciju zasticenih podataka samo on-line korisnicima

    • Da nesmetano pruza ulusgu ovlascenom korisniku

    • Da u svakom momentu stiti integritet poruke

    • Da se postigne robusnost prenete poruke u odnosu na sum u komunikacionom kanalu

    • Da obezbedi jednoznacno sifrovanje-desifrovanje neke poruke

    Correct Answer
    A. Da nesmetano pruza ulusgu ovlascenom korisniku
    Explanation
    The purpose of the availability service is to ensure uninterrupted service to authorized users.

    Rate this question:

  • 40. 

    Izlaz iz linearnog pomerackog registra (LPR) ima sledece karakteristike:

    • Dobijeni niz je stabilan

    • Dobijeni niz je pseudoslucajan

    • Dobijeni niz je priodican

    • Dobijeni niz je slucajan

    • Dobijeni niz je stohasticki

    • Dobijeni niz je nepredvidiv

    Correct Answer
    A. Dobijeni niz je pseudoslucajan
    Explanation
    The correct answer is "Dobijeni niz je pseudoslucajan" which means "The resulting sequence is pseudorandom". This means that the output sequence appears to be random, but it is actually generated by an algorithm that follows a specific pattern or formula. Pseudorandom sequences are often used in simulations, cryptography, and other applications where true randomness is not necessary but a high level of unpredictability is desired.

    Rate this question:

  • 41. 

    Sekvencijalne šifre su nalik

    • Šiframa supstitucije

    • Vižnerovoj šifri

    • Cezarovoj šifri

    • One-Time Pad

    • Šiframa transpozicije

    Correct Answer
    A. One-Time Pad
    Explanation
    The correct answer is One-Time Pad. The One-Time Pad is a type of encryption where a random key is used only once to encrypt a message. It is considered to be one of the most secure encryption methods because it provides perfect secrecy if used correctly. The other options mentioned, such as substitution ciphers, Vigenere cipher, and Caesar cipher, are all different types of encryption methods but do not provide the same level of security as the One-Time Pad. Transposition ciphers involve rearranging the letters of a message, but they also do not provide the same level of security as the One-Time Pad.

    Rate this question:

  • 42. 

    Racunarski bezbedan sifarski sistem ili:

    • Maksimalno tajan sistem

    • Apsoloutno tajan sistem

    • Prakticno tajan sistem

    • Digitalno potpisan sistem

    Correct Answer
    A. Prakticno tajan sistem
    Explanation
    The correct answer is "Prakticno tajan sistem." This means "Practically secret system" in English. This term refers to a computer security system that is designed to be as secret as possible, but not necessarily completely secret. It implies that while the system may have measures in place to protect sensitive information, it acknowledges that achieving absolute secrecy is difficult or impractical.

    Rate this question:

  • 43. 

    Ukoliko napadac poznaje jedan od kljuceva sifarskog sistema sa javnim kljucevima:

    • Ne moze da izracuna drugi kljuc

    • Moze da desifruje poruku

    • Moze da izracuna drugi kljuc

    • Moze da izracuna kljuc ako je entropija sifrata manja od 1

    • Nista od ponudjenog

    Correct Answer
    A. Ne moze da izracuna drugi kljuc
    Explanation
    If an attacker knows one of the keys of a public key encryption system, they cannot calculate the other key. This is because public key encryption relies on the use of a pair of keys - a public key for encryption and a private key for decryption. The keys are mathematically related, but it is computationally infeasible to calculate one key based on the knowledge of the other key. Therefore, the attacker cannot calculate the second key if they only know one of the keys.

    Rate this question:

  • 44. 

    Kod sekvencijalnih sifara:

    • Koristimo blok otvorenog teksta

    • Koristimo oba kljuca u isto vreme

    • Koristimo radni kljuc za generisanje inicijalnog stanja algoritma

    • Koristimo unutrasnji kljuc za generisanje radnog kljuca

    Correct Answer
    A. Koristimo unutrasnji kljuc za generisanje radnog kljuca
    Explanation
    In sequential ciphers, the inner key is used to generate the working key. This means that the inner key is responsible for generating the key that will be used in the encryption or decryption process. The working key is derived from the inner key and is used to initialize the algorithm's initial state. Therefore, the inner key plays a crucial role in generating the working key, which is essential for the functioning of sequential ciphers.

    Rate this question:

  • 45. 

    Autentifikacija može da se zasniva na

    • Onom što jesmo

    • Onom što se podrazumeva

    • Onom što se poseduje

    • Onom što znamo

    • Onom što je suštinsko

    • Onom što je komplikovano

    Correct Answer(s)
    A. Onom što jesmo
    A. Onom što se poseduje
    A. Onom što znamo
    Explanation
    The correct answer includes three options: "Onom što jesmo" (based on who we are), "Onom što se poseduje" (based on what we possess), and "Onom što znamo" (based on what we know). These options suggest different ways in which authentication can be established. "Onom što jesmo" refers to biometric authentication, where individuals are authenticated based on unique physical or behavioral characteristics. "Onom što se poseduje" refers to possession-based authentication, where individuals are authenticated based on something they possess, such as a token or a smart card. "Onom što znamo" refers to knowledge-based authentication, where individuals are authenticated based on something they know, such as a password or a PIN.

    Rate this question:

  • 46. 

    Poznati kriptoanalitički metodi za VIžnerovu šifru su

    • Totalna pretraga

    • Kaziskijev test

    • Fridmenov test

    • Diferencijalna analiza

    • Statistički test

    • Test frekvencija

    Correct Answer(s)
    A. Kaziskijev test
    A. Fridmenov test
    Explanation
    The given answer states that the well-known cryptographic methods for the Vigenère cipher are the Kasiski test and the Friedman test. The Kasiski test is used to find the length of the keyword used in the Vigenère cipher by analyzing the repeated patterns in the ciphertext. The Friedman test is used to determine the length of the keyword by analyzing the index of coincidence in the ciphertext. Both of these tests are commonly used in cryptanalysis to break the Vigenère cipher.

    Rate this question:

  • 47. 

    Upotrebom testa frekvencija, vrlo lako razbijamo:

    • XOR

    • Cezarovu sifru

    • One time pad

    • Viznerovu sifru

    • Skitalu

    Correct Answer
    A. Cezarovu sifru
    Explanation
    By using a frequency test, it is easy to break the Caesar cipher. The Caesar cipher is a simple substitution cipher where each letter in the plaintext is shifted a certain number of places down or up the alphabet. Since the frequency of letters in any given language is not evenly distributed, a frequency analysis can be used to determine the shift used in the Caesar cipher. This makes it vulnerable to decryption.

    Rate this question:

  • 48. 

    Kod sekvencijalnih sifara koristimo:

    • Radni kljuc za generisanje inicijalnog stanja algoritma

    • Oba kljuca u isto vreme

    • Digitalno potpisivanje simetricnih kljuceva

    • Sertifikat za prenos tajnih kljuceva

    • Unutrasnji kljuc za generisanje radnog kljuca

    Correct Answer
    A. Unutrasnji kljuc za generisanje radnog kljuca
    Explanation
    In sequential ciphers, we use an internal key to generate a working key. This internal key is used to determine the initial state of the algorithm and is essential for generating the working key. The working key is then used in the encryption or decryption process.

    Rate this question:

  • 49. 

    Obeleziti sta je tacno za softver zatvorenog koda:

    • Moguce je da sadrzi tzv. "tajna vrata"

    • Ako je softver skup garantuje kvalitetnu zastitu

    • To je odlicna osnova za gradnju kriptografskih resenja

    • Obezbedjuje visok kvaliet zastite

    • Ako je proizvodjac renomiran, softver je bezbedan

    • Ne sme se imati povrenja u softver zatvorenog koda

    Correct Answer(s)
    A. Moguce je da sadrzi tzv. "tajna vrata"
    A. Ne sme se imati povrenja u softver zatvorenog koda
    Explanation
    The correct answer states that closed-source software may contain "backdoors" and that one should not trust closed-source software. This means that closed-source software has the potential to have hidden vulnerabilities or malicious code that can be exploited by unauthorized individuals. Therefore, it is important to be cautious and skeptical when using closed-source software, as its security cannot be guaranteed.

    Rate this question:

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 28, 2018
    Quiz Created by
    Catherine Halcomb
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.