Sloju OSI I TCP/Ah Komunikacionih

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Salesale
S
Salesale
Community Contributor
Quizzes Created: 1 | Total Attempts: 2,037
| Attempts: 2,037 | Pitanja: 131
Please wait...

Question 1 / 131
0 %
0/100
Score 0/100
1. Uniformni lokator resursa (URL) koji podrazumeva autentifikaciju korisnika za prisput resursu sadrzi simbol:

Explanation

The correct answer is "@". In a Uniform Resource Locator (URL), the "@" symbol is used to indicate that authentication is required for accessing the resource. This symbol is typically followed by the username and password of the user.

Submit
Please wait...
About This Quiz
Sloju OSI I TCP/Ah Komunikacionih - Quiz

2. Uredjaj sa podrskom za rad na mreznom sloju je:

Explanation

A device with network layer support is a router. Routers are responsible for routing data packets between different networks based on their IP addresses. They operate at the network layer of the OSI model and use routing tables to determine the best path for data transmission. Routers also provide network address translation (NAT) and firewall functionalities. A signal amplifier (pojacivac signala) and a switch (komutator) do not operate at the network layer and do not provide the same level of network routing capabilities as a router.

Submit
3. U domenskom imenu www.singidunum.ac.rs domen najviseg nivoa je

Explanation

The correct answer is "rs" because in the given domain name "www.singidunum.ac.rs", "rs" is the top-level domain (TLD). A TLD is the last part of a domain name, which represents the highest level in the domain name system hierarchy. In this case, "rs" indicates that the website belongs to Serbia.

Submit
4. Administrator mreze zeli da korisnicima omoguci sinhronizovanu glasovnu komunikaciju koriscenjem rachunarske mreze.U ovu svrhu ce aktivirati:

Explanation

The correct answer is VoIP. VoIP stands for Voice over Internet Protocol, which enables users to make voice calls over the internet instead of using traditional telephone lines. By activating VoIP, the administrator will be able to provide synchronized voice communication to the users through the computer network. HTTP (Hypertext Transfer Protocol) is used for transferring data on the World Wide Web, and TCP (Transmission Control Protocol) is a protocol that ensures reliable and ordered delivery of data packets. However, neither HTTP nor TCP specifically facilitate voice communication like VoIP does.

Submit
5. Istrazivanja pokazuju da od ukupnog broja poslatih pisama za elektronsku postu sledeci udeo cine nezeljene (spem) poruke:

Explanation

The correct answer is "preko 80%". The question states that research shows the proportion of unwanted (spam) messages among the total number of sent emails. The answer "preko 80%" indicates that more than 80% of the emails sent are considered spam.

Submit
6. Mrezni prolaz (engl. gateway) ima osnovnu funkciju:

Explanation

A gateway enables communication between neighboring computer networks.

Submit
7. Za izradu i odrzavanje Veb sajtova danas se cesto koriste:

Explanation

The correct answer is "sistemi za upravljanje sadrzajem (CMS)". This is because CMS (Content Management Systems) are commonly used for the creation and maintenance of websites. CMS allows users to easily manage and update website content without requiring technical knowledge or coding skills. It provides a user-friendly interface for content editing, organizing, and publishing, making it an essential tool for website development and maintenance.

Submit
8. Staticko rutiranje je efikasno kod:

Explanation

Staticko rutiranje je efikasno kod manjih i staticnih mreza. Ovo je zato što u manjim mrezama ima manje cvorova i rutiranje je jednostavnije. Takođe, u staticnim mrezama, gde se konfiguracija rutiranja ne menja često, statičko rutiranje je dovoljno efikasno. Velike i dinamičke mreže, sa velikim brojem cvorova i promenljivom konfiguracijom rutiranja, zahtevaju složenije rutiranje, kao što je dinamičko rutiranje.

Submit
9. Danas je na raspolaganju:

Explanation

There is a large number of public IP addresses available today.

Submit
10. Danas je na raspolaganju:

Explanation

There is a large number of public IP addresses available today. This means that there are a significant amount of unique addresses that can be assigned to devices connected to the internet. This allows for a large number of devices to be connected and communicate with each other over the internet without running out of available addresses.

Submit
11. Najpopularnija softverska realizacija serverske strane Veb servisa danas je:

Explanation

The correct answer is "Apac." This refers to Apache, which is the most popular software implementation of a server-side web service. Apache is widely used due to its reliability, scalability, and extensive features. It is an open-source software that supports the HTTP protocol, making it a preferred choice for hosting websites and serving web content.

Submit
12. Veb servis Internet mreze je nastao:

Explanation

The correct answer is 1991. godine. This is because the World Wide Web (WWW), which is a system of interlinked hypertext documents accessed through the internet, was invented by Tim Berners-Lee in 1989 and became publicly available in 1991. Therefore, the development of web services on the internet can be attributed to this time period.

Submit
13. Obratite paznju na sledecu ilustraciju (slika cmd-a):: Sa velikom verovatnocom se moze zakljuciti da navedeni sistemi prvi put ostvaruju vezu putem SSH protokola:

Explanation

The given illustration is a screenshot of a command prompt window. Since the question states that "it can be concluded with a high probability that the mentioned systems establish a connection via the SSH protocol for the first time," it implies that the command prompt window is showing the process of establishing an SSH connection. Therefore, it can be inferred that the systems are indeed establishing a connection using the SSH protocol for the first time.

Submit
14. Rucni unos zapisa tabele rutiranja od strane administratora mreze naziva se:

Explanation

The correct answer is "staticno rutiranje". This term refers to the manual input of routing table entries by a network administrator. In static routing, the network administrator manually configures the routes in the routing table, specifying the next hop for each destination network. This method is typically used in small networks with a simple and stable network topology, where the routes do not change frequently.

Submit
15. Elektronska posta je u upotrevi vec: 

Explanation

Electronic mail, commonly known as email, has been in use for 40 years. It was first introduced in the early 1970s and has since become one of the most widely used methods of communication. With the advent of the internet, email has become an essential tool for both personal and professional communication, allowing people to send and receive messages, documents, and other types of media quickly and efficiently.

Submit
16. Jedan od tipova jednosmerne asinhrone video—konferencije putem Internet mreze naziva se:

Explanation

Webcasting is a type of one-way asynchronous video conference conducted over the internet. It involves the broadcasting of audio and video content to a large audience, allowing them to view the conference remotely. Unlike internet telephony, which involves two-way communication, webcasting is primarily focused on delivering content to viewers rather than facilitating interactive communication. Broadcasting refers to the transmission of audio or video signals to a large number of recipients simultaneously, but it does not specifically refer to video conferences conducted over the internet. Therefore, the correct answer is webcasting.

Submit
17. Klase mreznih adresa su zamenljive besklasnim adresovanjem:

Explanation

In 1993, the Internet Engineering Task Force (IETF) introduced the Classless Inter-Domain Routing (CIDR) system, which replaced the traditional classful addressing system. CIDR allowed for more efficient allocation of IP addresses by allowing networks to be divided into smaller subnets. This eliminated the need for strict class boundaries and made the addressing system more flexible. Therefore, the statement "Klase mreznih adresa su zamenljive besklasnim adresovanjem" means that network classes were replaced by classless addressing in 1993.

Submit
18. U dokumentu kojim se opisuje uvodjenje novog servisa u racunarsku mrezu pominju se protokoli H.323 i SIP. Najverovatnije je u pitanju:

Explanation

The mention of protocols H.323 and SIP in a document describing the introduction of a new service in a computer network suggests that the most likely answer is Internet telephony. H.323 and SIP are both protocols commonly used in the field of Internet telephony for establishing and managing communication sessions over IP networks. This indicates that the document is discussing the implementation of a service related to Internet telephony.

Submit
19. Dva najcesce koriscena metoda HTTP protokola su:

Explanation

The correct answer is POST and GET. These are the two most commonly used methods in the HTTP protocol. POST is used to send data to the server to create or update a resource, while GET is used to retrieve data from the server. These methods are essential for communication between clients and servers in web applications.

Submit
20. Automatizovani unos zapisa u tabelu rutiranja naziva se:

Explanation

Automatizovani unos zapisa u tabelu rutiranja se naziva dinamičko rutiranje. Dinamičko rutiranje je proces u kojem se mrežni uređaji automatski ažuriraju sa informacijama o najboljim putanjama za slanje podataka. Ova tehnika omogućava mreži da se prilagođava promenama u mrežnom saobraćaju i obezbeđuje efikasno i optimizovano rutiranje.

Submit
21. Koriscenjem alata za snimanje mreznog saobracaja uhvacen je paket ICMP protokola. Kao verovatni izvor ovog paketa moze se uzeti:

Explanation

The correct answer is "alat ping" because ICMP (Internet Control Message Protocol) is commonly used by the "ping" tool to send echo request messages and receive echo reply messages. The "ping" tool is used to test the connectivity and response time of a network device. Therefore, it is likely that the ICMP packet was captured from the use of the "ping" tool.

Submit
22. Podrazumevano vreme vazenja informacija koje pruza DNS server je:

Explanation

The default time for which information provided by a DNS server is valid is one day. This means that the information will be considered accurate and up-to-date for a period of 24 hours before it needs to be refreshed or updated.

Submit
23. Protokoli SMB i CIFS najcesce se koriste na operativnim sistemima:

Explanation

SMB (Server Message Block) and CIFS (Common Internet File System) protocols are most commonly used on MS Windows operating systems. These protocols allow for file sharing and remote access to files and printers on a network. Mac OS and UNIX operating systems have their own file sharing protocols and mechanisms, such as AFP (Apple Filing Protocol) for Mac OS and NFS (Network File System) for UNIX. However, SMB and CIFS are primarily associated with MS Windows, making it the correct answer.

Submit
24. Protokol za kontrolu prenosa (engl. Transmission Control Protocol, TCP) radi:

Explanation

The correct answer is "sa uspostavljanjem veze" which means "with establishing a connection" in English. This means that TCP protocol works by establishing a connection between the sender and receiver before transmitting data. This connection ensures reliable and ordered delivery of data packets.

Submit
25. Hosts fajlovi danas su:

Explanation

not-available-via-ai

Submit
26. Ukoliko zelimo da odredjenu racunarsku mrezu podelimo na dve manje mreze, to ce se na mreznu masku rezultovati u vidu:

Explanation

When dividing a computer network into two smaller networks, the network mask will result in changing one bit from a value of 0 to a value of 1. This is because the network mask is used to determine the network portion and the host portion of an IP address. By changing one bit from 0 to 1, the network portion will be divided into two separate networks.

Submit
27. U genericke domene najviseg nivoa spadaju (check box):

Explanation

The correct answer is net, org, com. These three domain extensions, net, org, and com, are considered generic top-level domains (gTLDs). They are commonly used for various purposes and are not specific to any particular country or region. The other options, rs, srb, and me, are country code top-level domains (ccTLDs) that are specific to Serbia, Serbia and Montenegro, and Montenegro respectively.

Submit
28. Vreme potrebno za uskladjivanje informacija izmedju svih rutera u mrezi naziva se:

Explanation

Vreme potrebno za usklađivanje informacija između svih rutera u mreži naziva se vreme konvergencije. Ovo je vreme koje je potrebno da se svi ruteri u mreži usklade sa ažuriranim informacijama o mreži, kao što su promene u topologiji ili rutiranju. Vreme konvergencije je važno jer utiče na stabilnost i performanse mreže, jer što je kraće vreme konvergencije, to će mreža brže reagovati na promene i preusmeriti saobraćaj na optimalan put.

Submit
29. Sistem domenskih imena (engl. Domain Name System, DNS) realizovan je u arhitekturi:

Explanation

The correct answer is klijent-server. The Domain Name System (DNS) is implemented using a client-server architecture. In this architecture, the client sends a request to the DNS server to resolve a domain name into an IP address. The server then responds with the corresponding IP address. This client-server interaction allows for efficient and reliable domain name resolution on the internet.

Submit
30. Osnovna jedinica podataka protokola na mreznom sloju je:

Explanation

The correct answer is "paket" because at the network layer, data is divided into packets before being transmitted over the network. These packets contain the necessary information such as source and destination addresses, as well as the actual data being transmitted. The packet is then encapsulated into a frame at the data link layer for transmission over the physical network. Therefore, the packet is the basic unit of data at the network layer.

Submit
31. Paketi Internet protokola se nazivaju:

Explanation

Paketi Internet protokola se nazivaju "datagrami". Datagrami su jedinice podataka koje se prenose preko Interneta putem IP protokola. Svaki datagram sadrži informacije o izvoru i odredištu podataka, kao i sam sadržaj podataka koji se prenosi. Datagrami se koriste za prenos podataka između različitih računara i mreža na Internetu.

Submit
32. Podrazumevani protokol za koriscenje Veb servisa je:

Explanation

The correct answer is HTTP. HTTP (Hypertext Transfer Protocol) is the default protocol used for communication between web services. It allows for the transfer of hypertext, such as HTML pages, over the internet. FTP (File Transfer Protocol) is used for transferring files, SMTP (Simple Mail Transfer Protocol) is used for sending emails, and WWW (World Wide Web) is not a protocol but refers to the collection of web pages accessible through the internet.

Submit
33. Zastita podataka koji se prenose koriscenjem HTTP protokola podrazumevano se ostvaruje:

Explanation

The correct answer is "koriscenjem SSL/TLS protokola." The protection of data transmitted using the HTTP protocol is achieved by using the SSL/TLS protocol. SSL (Secure Sockets Layer) and its successor TLS (Transport Layer Security) are cryptographic protocols that provide secure communication over a network. They encrypt the data being transmitted, ensuring its confidentiality and integrity. This encryption prevents unauthorized access and protects the data from being intercepted or tampered with during transmission. Therefore, using the SSL/TLS protocol is the default method for securing data transmitted via HTTP.

Submit
34. Na slici je prikazan proces koji nosi naziv:

Explanation

The correct answer is "Raskid veze kod TCP protokola" because the image represents the process of terminating a connection in the TCP protocol. TCP (Transmission Control Protocol) is a widely used protocol for transmitting data over the internet, and when a connection needs to be ended, a termination process is initiated. This process involves sending a series of packets between the communicating devices to ensure that all data has been transmitted and received before the connection is closed. Therefore, "Raskid veze kod TCP protokola" accurately describes the depicted process.

Submit
35. Jedan od danas najpopularnijih prisputa kod distribuirane obrade podataka je:

Explanation

The correct answer is "klijent—server". This is because the client-server model is widely used in distributed data processing. In this model, the client sends requests to the server, which processes those requests and sends back the results to the client. This model allows for efficient and scalable data processing by distributing the workload between the client and server.

Submit
36. Termin Message User Agent, MUA oznacava deo servisa elektronske poste vezan za:

Explanation

The term "Message User Agent, MUA" refers to the part of an email service that is associated with the client. This means that it is responsible for handling the email client's tasks, such as composing, sending, receiving, and organizing emails. The MUA interacts directly with the user, allowing them to access and manage their email account.

Submit
37. Varijanta upotrebe protokola za prenos fajlova  -- FTP --  koja za zastitu podataka koristi SSL/TLS protokol oznacava se skracenicom:

Explanation

The correct answer is FTPS. FTPS is a variation of the FTP protocol that uses SSL/TLS for data protection. SSL/TLS provides encryption and authentication, ensuring that data transmitted between the client and server is secure. FTP/TLS is not a valid abbreviation for this variation, and SFTP is a different protocol that uses SSH for secure file transfer. Therefore, the correct abbreviation for this variation of the FTP protocol is FTPS.

Submit
38. Na primeru adrese elektronske poste: primalac @ domen.srb lokalni deo adrese cini:

Explanation

The correct answer is "primalac." In the given example of an email address, the local part of the address is everything before the "@" symbol. In this case, "primalac" is the local part of the email address.

Submit
39. U situaciji prikazanoj na slici, koja koristi RIP protokol, ruter R1 ce pakete adresovane na clanove mreze M1 prosledjivati:

Explanation

In the given situation, where RIP protocol is being used, router R1 will forward packets addressed to the members of network M1 to router R3.

Submit
40. Protokol koji omogucava realizaciju servisno orijentisane arhitekture na HTTP protokolu je:

Explanation

SOAP (Simple Object Access Protocol) is a protocol that allows for the implementation of service-oriented architecture (SOA) on the HTTP protocol. SOAP is a messaging protocol that allows programs running on different operating systems to communicate with each other over the internet. It uses XML for message format and can be used with various transport protocols, including HTTP. SOAP provides a standardized way for applications to exchange structured information and invoke web services. Therefore, SOAP is the correct answer for the given question.

Submit
41. Za koriscenje medjunarodnih simbola u porukama elektronske poste, kao i za dodavanje fajlova porukama, potrebno je koristiti:

Explanation

To use international symbols in email messages and to attach files to messages, it is necessary to use MIME and IMAP. MIME stands for Multipurpose Internet Mail Extensions and is a standard that allows email clients to exchange different types of data such as text, images, audio, and video. IMAP stands for Internet Message Access Protocol and is a protocol used for retrieving email messages from a mail server. Both MIME and IMAP are essential for enabling the use of international symbols and file attachments in email communication.

Submit
42. U privilegovane portove spada opseg:

Explanation

The correct answer is 0 — 1.023. This range is considered privileged ports, which are reserved for specific network services and protocols. Privileged ports are typically used by system processes and require special privileges to access. The range of 0 to 1.023 falls within the range of privileged ports, making it the correct answer.

Submit
43. U situaciji prikazanoj na slici, koja koristi RIP protokol, ruter R1 ce pakete adresovane na clanove mreze M2 prosledjivati:

Explanation

In the given situation, the router R1 will forward packets addressed to members of network M2 to routers R2 and R3 alternately. This means that the packets will be sent to R2, then to R3, and then back to R2 in a cyclic manner. This is because the RIP protocol uses equal-cost load balancing, where it distributes the traffic evenly across multiple paths.

Submit
44. Pri koriscenju POP3 protokola za pristup elektronskom postanskom sanducetu zadavanjem naredbe DELE izvrsice se:

Explanation

When using the POP3 protocol to access an email mailbox, executing the DELE command will mark the message for deletion at the end of the session. This means that the message will not be immediately removed from the mailbox, but rather flagged for deletion. It will only be deleted when the session ends, allowing the user to review and potentially undo the deletion before it is permanently removed.

Submit
45. U slucaju da klijent sa Veb serverom komunicira na portu 443, podrazumeva se koriscenje:

Explanation

When a client communicates with a web server on port 443, it implies the use of modern web browsers. Port 443 is specifically designated for the HTTPS protocol, which provides secure communication over the internet. On the other hand, port 80 is used for the HTTP protocol, which is the standard protocol for web browsing. Therefore, if a client is accessing a web server on port 443, it indicates that they are using a modern web browser capable of handling secure connections.

Submit
46. U slucaju da ruter u tabeli rutiranja nema zapis o mrezi kojoj pripada odredisna adresa primljenog paketa, kao ni zapis o podrazumevanoj ruti, ruter ce paket:

Explanation

If the router does not have any entry in its routing table for the network to which the destination address of the received packet belongs, nor does it have a default route entry, the router will discard the packet.

Submit
47. Korisnik je koriscenjem Telnet protokola zadao sledecu naredbu: bash-4.1# rm –rf / Naredba je serveru prosledjena na sledeci nacin:

Explanation

The user entered the command in parts, after each new character, and finally pressed the Enter key to execute the command.

Submit
48. U situacijama kod kojih nema potrebe za zakljucavanjem resursa, vec je moguce paralelno koriscenje, bolje performanse se mogu ostvariti primenom:

Explanation

In situations where there is no need to lock resources and parallel usage is possible, better performance can be achieved by using concurrent processing of requests. This means that multiple requests can be processed simultaneously, allowing for faster execution and improved efficiency.

Submit
49. Primer protokola koji koriste vektore udaljenosti su:

Explanation

The correct answer is RIP and EIGRP. These two protocols, RIP (Routing Information Protocol) and EIGRP (Enhanced Interior Gateway Routing Protocol), both use distance vector algorithms to determine the best path for routing packets in a network. RIP is a simple and widely used protocol that employs hop count as a metric to determine the distance to a destination. EIGRP, on the other hand, is a Cisco proprietary protocol that takes into account factors like bandwidth, delay, reliability, and load to calculate the best path. Both protocols periodically exchange routing tables with neighboring routers to update their routing information.

Submit
50. Osnovna uloga telnet servisa jeste da omoguci:

Explanation

The correct answer is "rad na udaljenim računarima" which translates to "working on remote computers" in English. This means that the main purpose of the Telnet service is to allow users to access and work on computers that are located remotely. Telnet is a network protocol used to establish a remote connection and access a command-line interface of a remote computer. It enables users to execute commands, manage files, and perform various tasks on remote systems.

Submit
51. Jedinica za adresovanje na nivou transportnog sloja je:

Explanation

The correct answer is "port." In networking, a port is a logical construct that identifies a specific process or service on a networked device. It is used to direct network traffic to the appropriate application or service running on a device. Ports are commonly associated with the transport layer of the TCP/IP protocol suite and are represented by numbers. Each network communication requires a source and destination port number to establish a connection. Therefore, a transport layer address is represented by a port number, making it the correct answer in this context.

Submit
52. Za odredjivanje rute paketa najvazniji parametar zaglavlja je odredisna adresa koja se uporedjuje sa zapisima iz:

Explanation

The most important parameter in the header for determining the route of a packet is the destination address, which is compared with the records in the routing table.

Submit
53. Paketi TCP protokola se uglavnom inkapsuliraju direktno u:

Explanation

TCP packets are primarily encapsulated directly into IP datagrams. TCP is a transport layer protocol, while IP is a network layer protocol. Therefore, TCP packets are encapsulated within IP datagrams for transmission over an IP network. The IP datagrams provide the necessary addressing and routing information for the TCP packets to reach their intended destination.

Submit
54. Pojam "visestruko udomljavanje" (engl. multihoming) oznacava:

Explanation

The term "visestruko udomljavanje" (multihoming) refers to the belonging of a computer to multiple computer networks.

Submit
55. U slucaju da je u tabeli rutiranja definisano vise mreza kojim aodredisna adresa prijema paketa pripada (na primer, odredisna adresa je 192. 168.12.34 a zapisi za mreze 192.168.0.0/16 i 192. 168.12.0/24) iskoristice se:

Explanation

When there are multiple networks defined in the routing table and the destination address of the packet belongs to one of those networks, the route with the larger number of network mask bits will be used. This means that the more specific route will be chosen over the less specific route. In this case, the destination address 192.168.12.34 falls under both networks 192.168.0.0/16 and 192.168.12.0/24. Since the latter has a larger number of network mask bits (24 compared to 16), it will be chosen as the route to forward the packet.

Submit
56. Slanjem podataka putem formulara (korisnik:petar; lozinka:******;  [prijavljivanje]) korisnikov Veb brauzer je otisao na adresu: https://adresa.servera/prijava.php?korisnik=petar&lozinka=abc123 Moze se zakljuciti da je koriscen metod HTTP protokola:

Explanation

The correct answer is "GET" because in the given scenario, the user is sending data through a form using the GET method. This can be inferred from the URL structure where the form data (username and password) are appended as query parameters in the URL after the "?" symbol. The GET method is commonly used to retrieve data from a server by appending parameters in the URL.

Submit
57. Ukoliko nakon podizanja operativnog sistema racunara njegov mrezni interfejs ima adresu iz opsega 169.254.0.0/16 to obicno ukazuje na:

Explanation

This answer suggests that if a computer's network interface has an address from the range 169.254.0.0/16 after booting up the operating system, it usually indicates problems with the addressing service. This could mean that the computer is unable to obtain a valid IP address from a DHCP server, which is responsible for assigning IP addresses to devices on a network. Without a valid IP address, the computer may not be able to connect to the network or access the internet.

Submit
58. Prioritet jedne rute u odnosu na ostale odredjuje se:

Explanation

The priority of a route is determined by the metric of the route. The metric represents the cost or quality of the route, such as the distance, bandwidth, or delay. Routes with lower metrics are preferred over routes with higher metrics because they are considered to be more efficient or reliable. Therefore, the metric of a route plays a crucial role in determining its priority compared to other routes.

Submit
59. Pre uvodjenja servisa domenskih imena (DNS) u tu svrhu je koriscen:

Explanation

Before the introduction of Domain Name System (DNS) services, the hosts file was used for this purpose. The hosts file is a local text file that maps hostnames to IP addresses. It was manually maintained on each computer and acted as a simple lookup table for resolving hostnames to their corresponding IP addresses. However, as networks grew larger and more complex, the hosts file became difficult to manage and update. DNS was then introduced as a more scalable and efficient solution for resolving domain names to IP addresses.

Submit
60. Na slici je prikazan algoritam:

Explanation

The image depicts an algorithm for concurrent processing of requests. This means that multiple requests can be processed simultaneously, improving efficiency and reducing waiting time. This approach is commonly used in systems with high demand and limited resources.

Submit
61. Dinamicko rutiranje se aktivira i ostvaruje koriscenjem:

Explanation

Dinamičko rutiranje se aktivira i ostvaruje korišćenjem protokola za rutiranje. Protokoli za rutiranje su odgovorni za razmenu informacija o mrežama i odabir najboljeg puta za slanje podataka. Oni omogućavaju mrežnim uređajima da automatski prilagođavaju svoje rutiranje u skladu sa promenama u mreži, kao što su promene u dostupnosti ili opterećenju veza. Ovi protokoli obezbeđuju efikasno i pouzdano rutiranje podataka u dinamičkim mrežama.

Submit
62. Uvodjenje klasa mreza (1981. godina) dovelo je do:

Explanation

The introduction of network classes in 1981 led to determining the size of the network based on the first bits of the address. This means that the network class determines the range of IP addresses that can be assigned to a network, based on the number of bits used for the network portion of the address. This allowed for more efficient allocation of IP addresses and better organization of networks.

Submit
63. Mrezni administrator zeli da zabrani korisnicima koriscenje torent aplikacija. U tom cilju na Fajervol sistemu pokusava da zabrani koriscenje portova iz opsega 64.000 do 128.000. Fajervol sistem odbija da prihvati zadato pravilo za filtriranje saobracaja. Najverovatniji izvor problema je:

Explanation

The most likely source of the problem is that the specified range of ports (64,000 to 128,000) is not valid. Firewalls typically only allow port numbers up to 65,535, so any range beyond that would be considered invalid. Therefore, the firewall system is rejecting the given filtering rule.

Submit
64. Adrese Internet protokola cetvrte verzije imaju bitsku duzinu od:

Explanation

Internet Protocol version 4 (IPv4) addresses have a bit length of 32 bits. IPv4 is the fourth version of the Internet Protocol and is widely used for addressing devices connected to the internet. The 32-bit address space allows for approximately 4.3 billion unique addresses, which are represented in decimal format separated by periods (e.g., 192.168.0.1). However, due to the rapid growth of the internet, the available IPv4 addresses are becoming scarce, leading to the development and adoption of IPv6, which has a bit length of 128 bits.

Submit
65. U slucaju potrebe za slanjem podataka visestrukim primaocima moze se koristiti:

Explanation

IGMP (Internet Group Management Protocol) is used for sending data to multiple recipients. It is a network-layer protocol that enables hosts to report their multicast group memberships to any neighboring multicast routers. By using IGMP, a host can join or leave a multicast group, allowing it to receive or stop receiving multicast traffic. Therefore, in the case of needing to send data to multiple recipients, IGMP protocol can be used.

Submit
66. Nakon pokusaja osvezavanja stranice na koju je usmerio formular u okviru veb stranice, korisnik je dobio sledeci dijalog. Moze se zakljuciti da je za slanje podataka formulara koriscen metod:

Explanation

The user received a dialog after attempting to refresh the page, indicating that the form data was being submitted. This suggests that the form data was sent using the POST method, which is commonly used for submitting data to a server.

Submit
67. Protokol za dinamicko podesavanje domacina (engl. Dynamic Host Configuration Protocol, DHCP) koristi se ulokalnim racunarskim mrezama za:

Explanation

The DHCP protocol is used to automate the assignment of IP addresses in local computer networks. It dynamically assigns IP addresses to devices, allowing them to connect to the network without manual configuration. This helps in efficient management of IP addresses and simplifies network administration.

Submit
68. Klijentska komponenta DNS servisa nosi naziv:

Explanation

The correct answer is "resolver". The resolver is the client component of the DNS (Domain Name System) service. It is responsible for sending DNS queries to the DNS server and receiving the corresponding IP address for a given domain name. The resolver plays a crucial role in translating domain names into IP addresses, allowing users to access websites and other online services using human-readable names.

Submit
69. Ukoliko odredisna adresa primljenog paketa ne pripada ni jednoj od pojedinacno definisanih mreza u tabeli rutiranja, ruter ce paket:

Explanation

If the destination address of the received packet does not belong to any individually defined network in the routing table, the router will forward the packet using the default route.

Submit
70. Mrezna arhitektura u kojoj se terminali koriste za korisnicki interfejs a sva obrada se odvija na jednom, centralnom racunaru je:

Explanation

The correct answer is "mejn-frejm." In this type of network architecture, the terminals are used for the user interface, while all processing occurs on a central computer. This means that the terminals are not responsible for any processing tasks and rely on the central computer for all computing needs.

Submit
71. Prevodjenje mreznih adresa putem portova (engl. Network Address Port Translation, NAPT) neophodno u situacijama kada postoji:

Explanation

NAPT, or Network Address Port Translation, is necessary when there are multiple members in a private network and only one public address available. This allows multiple devices within the private network to share the same public IP address by translating the network address and port numbers. This is commonly used in situations where there is a shortage of public IP addresses, as it allows for efficient utilization of available addresses.

Submit
72. Telnet servis je izgradjen na kojoj softverskoj arhitekturi?

Explanation

The correct answer is klijent-server. Telnet service is built on a client-server architecture. In this architecture, the client sends requests to the server, and the server responds to those requests by providing the requested services or data. In the case of Telnet, the client is the user's computer or device, and the server is the remote host or computer that the user wants to connect to and access. The client sends commands and requests to the server, which executes them and sends the results back to the client.

Submit
73. Protokol za kontrolu prenosa (engl. Transmission Control Protocol, TCP) funkcionise na :

Explanation

The correct answer is transportnom sloju (transport layer). TCP is a protocol that operates at the transport layer of the OSI model. It provides reliable and ordered delivery of data packets between applications running on different devices. TCP ensures that data packets are delivered without errors, in the correct order, and with congestion control mechanisms. It is responsible for establishing and terminating connections, as well as for flow control and error recovery.

Submit
74. Podrska za transportni sloj OSI i TCP/IP komunikacionih modela najcesce je realizovana na nivou:

Explanation

The support for the transport layer of OSI and TCP/IP communication models is most commonly implemented at the level of the operating system. This means that the operating system provides the necessary protocols and services for establishing and maintaining connections, ensuring reliable data transfer, and managing network resources. The operating system acts as an intermediary between the applications and the network hardware, handling the communication process and ensuring that data is properly transmitted and received.

Submit
75. U slucaju utvrdjivanja ostecenja primljenog datagrama, protokol korisnickih datagrama (engl. User Datagram Protocol, UDP) podrazumeva sledecu akciju:

Explanation

When a received datagram is found to be damaged, the User Datagram Protocol (UDP) protocol discards the segment.

Submit
76. U osnovne tipove sadrzaja Veb sajtova spadaju (check box):

Explanation

The correct answer includes "Veb prezentacije" and "Veb aplikacije". These are two of the basic types of content found on websites. "Veb prezentacije" refers to websites that are designed to provide information or showcase a product or service. "Veb aplikacije" refers to websites that have interactive features and allow users to perform specific tasks or functions.

Submit
77. Za prevodjenje logickih adresa u fizicke zaduzen je:

Explanation

ARP (Address Resolution Protocol) je protokol koji se koristi za prevodjenje logičkih adresa (IP adresa) u fizičke adrese (MAC adresa) na lokalnoj mreži. Kada se podaci šalju preko mreže, koristi se IP adresa za rutiranje podataka na internetu, ali da bi se podaci isporučili do tačne destinacije, potrebno je prevoditi tu IP adresu u odgovarajuću MAC adresu. ARP protokol je odgovoran za ovu funkcionalnost i omogućava komunikaciju između logičkih i fizičkih adresa na mreži.

Submit
78. Sadrzaj fajlova koji se prenose putem FTP protokola kroz komunikacioni kanal putuje:

Explanation

The correct answer is "u otvorenom obliku" which means "in an open form" in English. This suggests that the content of the files that are transmitted via FTP protocol travels in an unencrypted format, meaning it is not encrypted or secured during the transfer process.

Submit
79. Telnet je zbog bezbednosnih razloga u osetljivim sistemima zamenjen:

Explanation

Telnet je zamenjen SSH protokolom zbog bezbednosnih razloga. Telnet je protokol za udaljeni pristup koji prenosi podatke u tekstualnom obliku, što znači da su korisničko ime, lozinka i svi drugi podaci koji se šalju preko Telnet konekcije vidljivi u otvorenom obliku. To čini Telnet veoma ranjivim na napade i krađu podataka. Sa druge strane, SSH (Secure Shell) protokol koristi enkripciju kako bi obezbedio sigurnu komunikaciju između klijenta i servera. Ovo čini SSH mnogo sigurnijim izborom za udaljeni pristup osetljivim sistemima.

Submit
80. U korisnicke (kratkotrajne) portove spada opseg:

Explanation

The correct answer is 49.152 – 65.535. This range represents the short-term user ports. Short-term user ports are used for temporary connections and are typically assigned dynamically by the operating system. The range from 49.152 to 65.535 provides a total of 16,384 ports for this purpose.

Submit
81. Obratite paznju na sledecu sliku (user name:korisnik; password: *****;)::Pojavljivanje ovakvog dijaloga pri koriscenju Veb servisa podrazumeva prenos pristupnih parametara:

Explanation

The correct answer is "u sifrovanom obliku (zasticeno),u izvornom obliku (nezasticeno)". This is because the dialogue mentioned in the question is about the transmission of access parameters when using a web service. The options provided are different ways in which these parameters can be transmitted. "u sifrovanom obliku (zasticeno)" means in encrypted form, which ensures security during transmission. "u izvornom obliku (nezasticeno)" means in plain text form, which is not secure and can be easily intercepted. Therefore, both options are correct as they represent different levels of security in transmitting the access parameters.

Submit
82. Adresa Internet protokola i mrezna maska se dodeljuju:

Explanation

The correct answer is "mreznom interfejsu" (to the network interface). Internet Protocol address and network mask are assigned to the network interface, which is responsible for connecting a device to a network. The network interface acts as a bridge between the device and the network, allowing the device to send and receive data. The IP address and network mask are essential for identifying and routing data packets within a network.

Submit
83. Adrese dobijene putem protokola za dinamicko podesavanje domacina (DHCP) vaze:

Explanation

The addresses obtained through the Dynamic Host Configuration Protocol (DHCP) are valid for a negotiated period of time. This means that the IP addresses assigned to devices on a network using DHCP will remain valid for a specific duration as agreed upon during the DHCP lease negotiation process. After this negotiated time period, the IP addresses may be released and assigned to other devices on the network.

Submit
84. Za uspostavljanje veze kod TCP protokola potrebno je koriscenje:

Explanation

In order to establish a connection in the TCP protocol, it is necessary to use three segments without user data. This refers to the three-way handshake process used by TCP to establish a reliable connection between a client and a server. The three segments involved are the SYN segment, the SYN-ACK segment, and the ACK segment. These segments are used to synchronize sequence numbers and confirm the connection establishment. The absence of user data in these segments ensures that the focus is solely on establishing the connection before any data transmission occurs.

Submit
85. Za isporuku paketa u lokalnoj mrezi koriste se:

Explanation

For delivery of packages in a local network, physical addresses are used. Physical addresses, also known as MAC addresses, are unique identifiers assigned to network devices. They are used to identify the specific hardware device within the network and facilitate the delivery of data packets to the intended recipient. Logical addresses, on the other hand, are used for communication between different networks. Symbolic addresses are not commonly used in network communication.

Submit
86. Bitska duzina zaglavlja Internet protokola je:

Explanation

The correct answer is 32 bita, fiksno. This means that the header length of the Internet Protocol is always fixed at 32 bits. The header is a crucial part of the IP packet as it contains important information such as the source and destination IP addresses, version number, and other control flags. Regardless of the specific data being transmitted, the header length remains constant.

Submit
87. Skup mreha koje koriste javne adrese Internet protokola, a cije je administriranje povereno jednoj organizaciji naziva se:

Explanation

An autonomous system refers to a collection of IP networks that are under the control of a single organization or entity. These networks are interconnected and operate based on a common routing policy. The administration and management of these networks are handled by the organization that owns them. Therefore, an autonomous system is the correct term for a network that uses public IP addresses and is administered by a single organization.

Submit
88. U registrovane portove spada opseg:

Explanation

The correct answer is 1.024 — 49.151. This range includes numbers starting from 1.024 up to 49.151. It does not include the lower values such as 0 and 65.536, nor the higher values such as 127.000 and 65.535. This range is commonly used for registered ports, which are assigned by the Internet Assigned Numbers Authority (IANA) for specific services or protocols.

Submit
89. Vrednost porta ima bitsku duzinu:

Explanation

The given correct answer is 16. This suggests that the value of the port has a bit length of 16. In computer networking, a port is a communication endpoint for sending and receiving data. The bit length of a port refers to the number of bits used to represent the port number. In this case, the port value is represented using 16 bits, allowing for a range of 2^16 possible port numbers.

Submit
90. Proces podele podataka sa sloja aplikacije na delove pogodne za transport putem TCP protokola naziva se:

Explanation

Segmentacija je proces podele podataka sa sloja aplikacije na delove pogodne za transport putem TCP protokola. Ovaj proces omogućava da se veliki skup podataka podeli na manje delove, koji se zatim šalju preko mreže koristeći TCP protokol. Segmentacija je važna jer omogućava efikasniji i pouzdan prenos podataka preko mreže, smanjujući rizik od gubitka ili oštećenja podataka.

Submit
91. Termin Message Transfer Agent, MTA  oznacava deo servisa elektronske poste vezan za:

Explanation

The correct answer is server. In the context of electronic mail services, Termin Message Transfer Agent (MTA) refers to a component that operates on the server side. It is responsible for routing and transferring email messages between different mail servers. MTA ensures reliable delivery of emails by following the appropriate protocols and handling any errors or failures that may occur during the transfer process. Therefore, MTA is directly associated with the server functionality rather than the client or the protocol.

Submit
92. U osnovne softverske realizacije na sloju aplikacije spadaju:

Explanation

In the basic software implementation at the application layer, applications and services are included. This means that the correct answer is "aplikacije,servisi". The other options, "mrezni protokoli" (network protocols) and "operativni sistemi" (operating systems), do not fall under the application layer but are part of other layers in the software architecture.

Submit
93. Transportni sloj OSI i TCP/IP komunikacionih modela zaduzen je za ostvarivanje komunikacije izmedju:

Explanation

The transport layer in the OSI and TCP/IP communication models is responsible for establishing communication between nodes in a local network. It ensures reliable delivery of data packets between these nodes, handling issues such as packet loss, reordering, and congestion control. This layer is not involved in communication between remote computers or neighboring and non-neighboring computer networks, as stated in the other options.

Submit
94. Postojanje visestrukih mreznih prolaza ka istoj odredisnoj mrezi i sa istom metrikom najcesce ukazuje na:

Explanation

The existence of multiple network gateways to the same destination network with the same metric usually indicates load balancing. Load balancing is a technique used to distribute network traffic evenly across multiple gateways, ensuring efficient utilization of resources and preventing congestion on a single gateway. This helps to improve network performance and reliability by spreading the workload across multiple paths.

Submit
95. Which one do you like?

Explanation

The correct answer is "Prevodjenje mreznih adresa". This suggests that the question is asking for a preference among the three options provided. Since "Prevodjenje mreznih adresa" is the only option that makes sense as a preference, it can be inferred that this is the correct answer. However, without further context or information, it is difficult to provide a more specific explanation.

Submit
96. Primeri protokola za prijem elektronske poste je:

Explanation

IMAP and POP3 are both examples of protocols used for receiving electronic mail. IMAP (Internet Message Access Protocol) allows users to access their emails from multiple devices and keeps the emails stored on the mail server. POP3 (Post Office Protocol version 3) allows users to download their emails to their local device and deletes them from the server. Both protocols are widely used in email clients and provide different options for managing and accessing emails. FTP (File Transfer Protocol) is used for transferring files, while SMTP (Simple Mail Transfer Protocol) is used for sending emails. HTTP (Hypertext Transfer Protocol) is used for accessing websites.

Submit
97. Najvaznija funkcionalnost DNS-a je:

Explanation

The correct answer is "prevodjenje simbolickih imena u adrese Internet protokola" which translates to "translation of symbolic names into Internet protocol addresses." This refers to the main functionality of DNS (Domain Name System) which is to convert human-readable domain names (such as www.example.com) into IP addresses (such as 192.168.0.1) that computers use to identify each other on the internet. This translation is essential for establishing connections and enabling communication between devices on the internet.

Submit
98. .

Explanation

NTP stands for Network Time Protocol, which is used to synchronize the clocks of computers on a network. It allows devices to obtain accurate time information from a reference time source, such as an atomic clock. NTP is crucial for various applications that require precise timekeeping, such as financial transactions, network logging, and distributed systems. Unlike FTP (File Transfer Protocol), SMTP (Simple Mail Transfer Protocol), and HTTP (Hypertext Transfer Protocol), NTP specifically focuses on time synchronization rather than file transfer, email communication, or web browsing.

Submit
99. Iskljuciva disjunkcija je jedna od logickih operacija koje se koriste u radu sa Internet protokolom. Njenim koriscenjem se prvenstveno omogucava utvrdjivanje:

Explanation

The correct answer is "pozicija na kojoj se bitovi dva niza razlikuju" because exclusive disjunction, also known as XOR operation, is used to determine the position at which the bits of two arrays differ. This operation compares the corresponding bits of the two arrays and returns a new array where each bit is set to 1 if the corresponding bits in the original arrays are different, and 0 if they are the same. Therefore, it helps identify the differing positions between two arrays.

Submit
100. Protokol na ciji naziv ukazuje skracenica SNMP koristi se za :

Explanation

SNMP (Simple Network Management Protocol) is a protocol used for network administration. It allows network administrators to manage and monitor network devices such as routers, switches, and servers. SNMP provides a standardized way to collect and organize information about network devices, and it allows administrators to remotely manage and configure these devices. Therefore, the correct answer is "administriranje mreze" which means "network administration" in English.

Submit
101. Opseg adresa Internet protokol 127.0.0.0/8 namenjen je za:

Explanation

The given correct answer states that the Internet Protocol address range 127.0.0.0/8 is intended for use within a local computer. This range is commonly known as the loopback address, and it is used to test network connectivity on the local machine. When a network application sends data to the loopback address, it is immediately received by the same machine without being transmitted over the network. This allows for testing and troubleshooting network applications without the need for external communication.

Submit
102. Polje TTL u zaglavlju paketa Internet protokola oznacava: (I klk)

Explanation

The correct answer is "preostali broj dozvoljenih skokova paketa". The TTL field in the IP packet header is used to indicate the remaining number of hops or routers that the packet can pass through before it is discarded. Each time the packet passes through a router, the TTL value is decremented by one. If the TTL value reaches zero, the packet is dropped and an error message may be sent back to the source. This mechanism helps prevent packets from circulating indefinitely in the network.

Submit
103. Bitska duzina zaglavlja segmenata TCP protokola je:

Explanation

The correct answer is "promenljiva." The header length of TCP segments can vary depending on the options and extensions being used. Unlike the other options that specify a fixed length (32 bits or 160 bits), a variable header length allows for flexibility and adaptability in the TCP protocol.

Submit
104. Sledeci servisi Interneta (VoIP, video—konferencije) podrazumevaju koriscenje:

Explanation

The correct answer is "protokola korisnickih datagrama, UDP." This is because VoIP (Voice over Internet Protocol) and video conferences require real-time communication, and UDP (User Datagram Protocol) is a connectionless protocol that is suitable for such applications. UDP provides faster transmission with lower latency compared to TCP (Transmission Control Protocol), which is a connection-oriented protocol. FTP (File Transfer Protocol) is used for transferring files, but it is not specifically designed for real-time communication like VoIP and video conferences.

Submit
105. Prednost JSON sistema za kodovanje podataka u odnosu na XML je:

Explanation

The correct answer is "otvorenost standarda" and "pripadnost jezicima za oznacavanje". JSON has an advantage over XML in terms of open standards, meaning that it is not tied to any specific vendor or platform. It is a widely accepted and adopted standard for data interchange. Additionally, JSON has better support for programming languages, making it easier to work with and manipulate data in various programming environments.

Submit
106. Proces podele datagrama od strane Internet protokola  na delove u cilju zadovoljenja MTU ogranicenja u posrednoj mrezi je:

Explanation

The process of breaking down datagrams into smaller fragments to meet the Maximum Transmission Unit (MTU) limitations in the intermediate network is called fragmentation. This allows the datagrams to be transmitted over the network without exceeding the maximum size allowed by the network.

Submit
107. Ukoliko zelimo da izvrsimo asinhroni prenos fajla izmedju udaljenih racunara, u tu svrhu mozemo iskoristiti sledeci protokol:

Explanation

FTP (File Transfer Protocol) is a commonly used protocol for transferring files between remote computers. It allows for asynchronous file transfer, meaning that the sender and receiver do not need to be actively engaged in the transfer at the same time. FTP is designed specifically for file transfer and includes features such as file compression, directory listing, and file permissions. Therefore, it is a suitable protocol for performing asynchronous file transfers between remote computers.

Submit
108. Sledeci servisi Interneta (Veb, elektronska posta) podrazumevaju koriscenje:

Explanation

The correct answer is "protokola za prenos fajlova, FTP" because the question is asking about the services of the Internet that involve the use of a protocol for file transfer. FTP (File Transfer Protocol) is a standard network protocol used for transferring files from one host to another over a TCP-based network, making it the appropriate choice in this context. The other options mentioned, TCP and UDP, are protocols for controlling and transmitting data over the internet, but they are not specifically designed for file transfer.

Submit
109. Protokoli za rutiranje koji ne formiraju topologiju celokupne mreze, vec samo imaju informaciju o susednim ruterima, nazivaju se:

Explanation

Protokoli zasnovani na vektorima udaljenosti su protokoli za rutiranje koji ne formiraju topologiju celokupne mreže, već samo imaju informaciju o susednim ruterima. Oni koriste vektor udaljenosti koji sadrži informaciju o udaljenosti do odredišta i sledeće susedne ruterima. Ovi protokoli ne razmenjuju informacije o celokupnoj mreži kao što to rade protokoli koji koriste stanje veza. Eksterni protokoli za rutiranje se koriste za rutiranje između različitih autonomnih sistema, dok interni protokoli za rutiranje se koriste unutar istog autonomnog sistema.

Submit
110. Za prevodjenje simbolickih adresa u logicke zaduzen je:

Explanation

The correct answer is "sistem domenskih imena" (domain name system). The domain name system is responsible for translating symbolic addresses, such as domain names, into logical IP addresses. It acts as a directory service, allowing users to access websites and other resources using human-readable names instead of numerical IP addresses. The domain name system maintains a distributed database that maps domain names to IP addresses, facilitating the routing of internet traffic.

Submit
111. Osnovni zadatak mreznog sloja OSI i TCP/IP komunikacionih modela je:

Explanation

The basic task of the network layer in the OSI and TCP/IP communication models is addressing in local computer networks. This means that the network layer is responsible for assigning unique addresses to devices within a local network, allowing them to communicate with each other. This addressing is essential for routing data packets within the network and ensuring that they reach the intended destination.

Submit
112. Ukoliko se uporedjivanjem lokalne i odredisne adrese utvrdi postojanje razlike na jednom bitu poslednjeg okteta, a lokalna mrezna maska pripada klasi C, slanje paketa ce se:

Explanation

If there is a difference in one bit of the last octet between the local and destination addresses, and the local network mask belongs to class C, the packet will be sent through a network gateway.

Submit
113. Tokom prenosa paketa kroz visestruke racunarske mreze (bez koriscenja prevodjenja adresa-NAT), od posiljaoca do primaoca, menjace se:

Explanation

During the transmission of packets through multiple computer networks (without using address translation-NAT), the logical addresses will be changing.

Submit
114. Poruke ICMP protokola se inkapsuliraju u poruke:

Explanation

ICMP messages are encapsulated within Internet Protocol (IP) packets. ICMP is a network protocol used for diagnostic and troubleshooting purposes in IP networks. It is not encapsulated within protocols such as FTP or TCP, as mentioned in the other options. Therefore, the correct answer is "Internet protokola".

Submit
115. Za normalno funkcionisanje servisa elektronske poste na Internetu neophodno je koriscenje:

Explanation

For the normal functioning of an electronic mail service on the Internet, the use of a domain name system is necessary. The domain name system is responsible for translating domain names into IP addresses, allowing email servers to locate and communicate with each other. Without a domain name system, email servers would not be able to find the correct destination for delivering emails. Therefore, the correct answer is the system of domain names.

Submit
116. U neke od mehanizama za sprecavanje petlji rutiranja kod RIP protokola spadaju:

Explanation

The correct answer is "podela horizonta" and "podela horizonta sa zatrovanim povratnim rutama." These mechanisms are used to prevent routing loops in the RIP protocol. The "podela horizonta" technique involves not advertising a route back to the router it was learned from, thus preventing loops. The "podela horizonta sa zatrovanim povratnim rutama" technique adds an additional step of advertising a poisoned reverse route, which is a route with an infinite metric, to further prevent loops.

Submit
117. Protokol ciji naziv se skraceno oznacava sa NTP koristi se za:

Explanation

The correct answer is "sinhronizaciju vremena clanova mreze" which translates to "synchronizing the time of network members" in English. The NTP protocol, which stands for Network Time Protocol, is used to synchronize the clocks of computers and other devices in a network. It ensures that all devices have the same accurate time, which is crucial for various network operations and applications that rely on synchronized time.

Submit
118. Neka od polja u zaglavlju segmenta TCP protokola su (check box):

Explanation

The fields in the TCP protocol segment header include the sender's port, checksum, window size, and the remaining number of hops (TTL). The sender's port is necessary to identify the application or process sending the data. The checksum is used for error detection in the data transmission. The window size indicates the amount of data that the receiver can accept at a time. The TTL field represents the remaining number of hops that a packet can pass through before being discarded. The IP address of the receiver is not a field in the TCP segment header.

Submit
119. U validne decimalne reprezentacije binarnih okteta mreznih maski spadaju(check box):

Explanation

The valid decimal representations of binary octets for network masks are those that consist of combinations of the numbers 0 and 255. In this case, the decimal numbers 255, 128, 0, 224, and 252 are all valid decimal representations of binary octets for network masks.

Submit
120. Podrazumevani transportni protokol koga koristi SMTP protokol je:

Explanation

SMTP (Simple Mail Transfer Protocol) is a protocol used for sending email messages between servers. The default transport protocol used by SMTP is TCP (Transmission Control Protocol). TCP ensures reliable and ordered delivery of data packets, making it suitable for transmitting email messages. UDP (User Datagram Protocol) is a connectionless protocol that does not guarantee reliable delivery, making it unsuitable for SMTP. HTTP (Hypertext Transfer Protocol) is used for web communication, while POP3 (Post Office Protocol version 3) and IMAP (Internet Message Access Protocol) are used for email retrieval, not for the transport of email messages.

Submit
121. Najcesce korisceni protokol na mreznom sloju je:

Explanation

The most commonly used protocol at the network layer is the Transmission Control Protocol (TCP). TCP is responsible for ensuring reliable and ordered delivery of data packets over a network. It establishes a connection between two devices, breaks data into packets, sends them, and verifies their successful delivery. TCP also handles congestion control and flow control to optimize network performance. This protocol is widely used in applications that require guaranteed delivery of data, such as web browsing, email, and file transfer.

Submit
122. U osnovne seme uniformnih lokatora resursa Veb servisa spadaju:

Explanation

The given answer includes the basic seed of uniform resource locators (URLs) for web services. These include "www" for World Wide Web, "http" for Hypertext Transfer Protocol, and "mailto" for email addresses. These are commonly used prefixes in URLs to specify the type of resource and how it should be accessed. Other options like "ftp", "web", "https", and "ftps" are not part of the basic seed for web service locators.

Submit
123. Koriscenje prevodjenja mreznih adresa (engl. Network Address Translation, NAT) mora se koristiti za povezivanje clanova sledecih mreza sa Internetom:

Explanation

The given answer includes the IP address ranges 192.168.0.0/16, 172.16.0.0/12, and 10.0.0.0/8. These IP address ranges are private IP addresses that are commonly used within local networks. In order for devices with these private IP addresses to access the internet, Network Address Translation (NAT) must be used. NAT allows multiple devices within a local network to share a single public IP address when communicating with the internet. This helps conserve public IP addresses and provides a layer of security by hiding the internal IP addresses from external networks.

Submit
124. U osnovne nacine za dodavanje ruta u tabelu rutiranja spadaju:

Explanation

The basic methods for adding routes to the routing table include using routing protocols, manually entering routes by the administrator, and automatic discovery through the Internet. These methods allow the router to learn and maintain a list of available routes to forward network traffic efficiently.

Submit
125. Portovi na transportnom sloju OSI i TCP/ah komunikacionih modela sluze za:

Explanation

Ports on the transport layer of the OSI and TCP/IP communication models are used to determine the process for delivering data. Each process or application running on a device is assigned a unique port number, and when data is sent, the port number is used to determine which process should receive the data. This allows for the proper delivery of data to the intended recipient.

Submit
126. Protokoli za rutiranje koji formiraju topologiju celokupne mreze nazivaju se:

Explanation

not-available-via-ai

Submit
127. U delove adrese Internet protokola cetvrte verzije spadaju:

Explanation

The correct answer is deo koji odredjuje clana mreze, deo koji odredjuje mrezu, deo koji odredjuje preostalo vreme postojanja paketa. This is because in the Internet Protocol version 4 (IPv4), the address is divided into three parts: the network portion, which determines the network to which the device belongs, the host portion, which determines the specific device within the network, and the time-to-live (TTL) field, which determines the remaining time for the packet to exist before it is discarded.

Submit
128. U osnovne zadatke transportnog sloja OSI i TCP/IP komunikacionih modela spadaju:

Explanation

The tasks of segmenting data and delivering it to the application are part of the transport layer in both the OSI and TCP/IP communication models. The transport layer is responsible for breaking data into smaller segments and ensuring that they are correctly delivered to the receiving application. This involves adding necessary headers and sequencing information to the segments, as well as providing error checking and flow control mechanisms. Once the data segments reach the destination, the transport layer reassembles them and delivers the complete data to the application layer.

Submit
129. Pouzdanost se kod TCP protokola ostvaruje postovanjem sledecih pravila:

Explanation

The given answer correctly identifies the rules that ensure reliability in the TCP protocol. These rules include the ability to change the order of received segments, discarding duplicate segments, requiring acknowledgment of received segments, and the ability to correct damaged segments if possible. These rules help ensure that data is transmitted accurately and reliably over the network.

Submit
130. U parametre koji se dodeljuju clanovima mreze putem protokola za dinamicko podesavanje domacina (engl. Dynamic Host Configuration Protocol, DHCP) spadaju:

Explanation

The parameters that are assigned to network members through the Dynamic Host Configuration Protocol (DHCP) include the default gateway address, network mask, and the addresses of active members in the network. These parameters are essential for network communication and connectivity. The default gateway address is the IP address of the router that connects the local network to other networks. The network mask is used to determine the network portion of an IP address. The addresses of active members in the network are assigned by the DHCP server to ensure that each member has a unique IP address within the network.

Submit
131. Adrese Internet protokola cetvrte verzije iz opsega 224.0.0.0/4 namenjene su za :

Explanation

The fourth version of the Internet Protocol (IPv4) address range 224.0.0.0/4 is used for addressing multiple recipients, using routing protocols, manually entering routes by administrators, and for automatic discovery through the Internet Protocol.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 09, 2018
    Quiz Created by
    Salesale
Cancel
  • All
    All (131)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Uniformni lokator resursa (URL) koji podrazumeva autentifikaciju...
Uredjaj sa podrskom za rad na mreznom sloju je:
U domenskom imenu www.singidunum.ac.rs domen najviseg nivoa je
Administrator mreze zeli da korisnicima omoguci sinhronizovanu...
Istrazivanja pokazuju da od ukupnog broja poslatih pisama za...
Mrezni prolaz (engl. gateway) ima osnovnu funkciju:
Za izradu i odrzavanje Veb sajtova danas se cesto koriste:
Staticko rutiranje je efikasno kod:
Danas je na raspolaganju:
Danas je na raspolaganju:
Najpopularnija softverska realizacija serverske strane Veb servisa...
Veb servis Internet mreze je nastao:
Obratite paznju na sledecu ilustraciju (slika cmd-a):: Sa velikom...
Rucni unos zapisa tabele rutiranja od strane administratora mreze...
Elektronska posta je u upotrevi vec: 
Jedan od tipova jednosmerne asinhrone video—konferencije putem...
Klase mreznih adresa su zamenljive besklasnim adresovanjem:
U dokumentu kojim se opisuje uvodjenje novog servisa u racunarsku...
Dva najcesce koriscena metoda HTTP protokola su:
Automatizovani unos zapisa u tabelu rutiranja naziva se:
Koriscenjem alata za snimanje mreznog saobracaja uhvacen je paket ICMP...
Podrazumevano vreme vazenja informacija koje pruza DNS server je:
Protokoli SMB i CIFS najcesce se koriste na operativnim sistemima:
Protokol za kontrolu prenosa (engl. Transmission Control Protocol,...
Hosts fajlovi danas su:
Ukoliko zelimo da odredjenu racunarsku mrezu podelimo na dve manje...
U genericke domene najviseg nivoa spadaju (check box):
Vreme potrebno za uskladjivanje informacija izmedju svih rutera u...
Sistem domenskih imena (engl. Domain Name System, DNS) realizovan je u...
Osnovna jedinica podataka protokola na mreznom sloju je:
Paketi Internet protokola se nazivaju:
Podrazumevani protokol za koriscenje Veb servisa je:
Zastita podataka koji se prenose koriscenjem HTTP protokola...
Na slici je prikazan proces koji nosi naziv:
Jedan od danas najpopularnijih prisputa kod distribuirane obrade...
Termin Message User Agent, MUA oznacava deo servisa elektronske poste...
Varijanta upotrebe protokola za prenos fajlova  -- FTP -- ...
Na primeru adrese elektronske poste: primalac @ domen.srb ...
U situaciji prikazanoj na slici, koja koristi RIP protokol, ruter R1...
Protokol koji omogucava realizaciju servisno orijentisane arhitekture...
Za koriscenje medjunarodnih simbola u porukama elektronske poste, kao...
U privilegovane portove spada opseg:
U situaciji prikazanoj na slici, koja koristi RIP protokol, ruter R1...
Pri koriscenju POP3 protokola za pristup elektronskom postanskom...
U slucaju da klijent sa Veb serverom komunicira na portu 443,...
U slucaju da ruter u tabeli rutiranja nema zapis o mrezi kojoj pripada...
Korisnik je koriscenjem Telnet protokola zadao sledecu naredbu:...
U situacijama kod kojih nema potrebe za zakljucavanjem resursa, vec je...
Primer protokola koji koriste vektore udaljenosti su:
Osnovna uloga telnet servisa jeste da omoguci:
Jedinica za adresovanje na nivou transportnog sloja je:
Za odredjivanje rute paketa najvazniji parametar zaglavlja je...
Paketi TCP protokola se uglavnom inkapsuliraju direktno u:
Pojam "visestruko udomljavanje" (engl. multihoming) oznacava:
U slucaju da je u tabeli rutiranja definisano vise mreza kojim...
Slanjem podataka putem formulara (korisnik:petar;...
Ukoliko nakon podizanja operativnog sistema racunara njegov mrezni...
Prioritet jedne rute u odnosu na ostale odredjuje se:
Pre uvodjenja servisa domenskih imena (DNS) u tu svrhu je koriscen:
Na slici je prikazan algoritam:
Dinamicko rutiranje se aktivira i ostvaruje koriscenjem:
Uvodjenje klasa mreza (1981. godina) dovelo je do:
Mrezni administrator zeli da zabrani korisnicima koriscenje torent...
Adrese Internet protokola cetvrte verzije imaju bitsku duzinu od:
U slucaju potrebe za slanjem podataka visestrukim primaocima moze se...
Nakon pokusaja osvezavanja stranice na koju je usmerio formular u...
Protokol za dinamicko podesavanje domacina (engl. Dynamic Host...
Klijentska komponenta DNS servisa nosi naziv:
Ukoliko odredisna adresa primljenog paketa ne pripada ni jednoj od...
Mrezna arhitektura u kojoj se terminali koriste za korisnicki...
Prevodjenje mreznih adresa putem portova (engl. Network Address Port...
Telnet servis je izgradjen na kojoj softverskoj arhitekturi?
Protokol za kontrolu prenosa (engl. Transmission Control Protocol,...
Podrska za transportni sloj OSI i TCP/IP komunikacionih modela...
U slucaju utvrdjivanja ostecenja primljenog datagrama, protokol...
U osnovne tipove sadrzaja Veb sajtova spadaju (check box):
Za prevodjenje logickih adresa u fizicke zaduzen je:
Sadrzaj fajlova koji se prenose putem FTP protokola kroz komunikacioni...
Telnet je zbog bezbednosnih razloga u osetljivim sistemima zamenjen:
U korisnicke (kratkotrajne) portove spada opseg:
Obratite paznju na sledecu sliku (user name:korisnik; password:...
Adresa Internet protokola i mrezna maska se dodeljuju:
Adrese dobijene putem protokola za dinamicko podesavanje domacina...
Za uspostavljanje veze kod TCP protokola potrebno je koriscenje:
Za isporuku paketa u lokalnoj mrezi koriste se:
Bitska duzina zaglavlja Internet protokola je:
Skup mreha koje koriste javne adrese Internet protokola, a cije je...
U registrovane portove spada opseg:
Vrednost porta ima bitsku duzinu:
Proces podele podataka sa sloja aplikacije na delove pogodne za...
Termin Message Transfer Agent, MTA  oznacava deo servisa...
U osnovne softverske realizacije na sloju aplikacije spadaju:
Transportni sloj OSI i TCP/IP komunikacionih modela zaduzen je za...
Postojanje visestrukih mreznih prolaza ka istoj odredisnoj mrezi i sa...
Which one do you like?
Primeri protokola za prijem elektronske poste je:
Najvaznija funkcionalnost DNS-a je:
.
Iskljuciva disjunkcija je jedna od logickih operacija koje se koriste...
Protokol na ciji naziv ukazuje skracenica SNMP koristi se za :
Opseg adresa Internet protokol 127.0.0.0/8 namenjen je za:
Polje TTL u zaglavlju paketa Internet protokola oznacava: (I klk)
Bitska duzina zaglavlja segmenata TCP protokola je:
Sledeci servisi Interneta (VoIP, video—konferencije)...
Prednost JSON sistema za kodovanje podataka u odnosu na XML je:
Proces podele datagrama od strane Internet protokola  na delove u...
Ukoliko zelimo da izvrsimo asinhroni prenos fajla izmedju udaljenih...
Sledeci servisi Interneta (Veb, elektronska posta) podrazumevaju...
Protokoli za rutiranje koji ne formiraju topologiju celokupne mreze,...
Za prevodjenje simbolickih adresa u logicke zaduzen je:
Osnovni zadatak mreznog sloja OSI i TCP/IP komunikacionih modela je:
Ukoliko se uporedjivanjem lokalne i odredisne adrese utvrdi postojanje...
Tokom prenosa paketa kroz visestruke racunarske mreze (bez koriscenja...
Poruke ICMP protokola se inkapsuliraju u poruke:
Za normalno funkcionisanje servisa elektronske poste na Internetu...
U neke od mehanizama za sprecavanje petlji rutiranja kod RIP protokola...
Protokol ciji naziv se skraceno oznacava sa NTP koristi se za:
Neka od polja u zaglavlju segmenta TCP protokola su (check box):
U validne decimalne reprezentacije binarnih okteta mreznih maski...
Podrazumevani transportni protokol koga koristi SMTP protokol je:
Najcesce korisceni protokol na mreznom sloju je:
U osnovne seme uniformnih lokatora resursa Veb servisa spadaju:
Koriscenje prevodjenja mreznih adresa (engl. Network Address...
U osnovne nacine za dodavanje ruta u tabelu rutiranja spadaju:
Portovi na transportnom sloju OSI i TCP/ah komunikacionih modela sluze...
Protokoli za rutiranje koji formiraju topologiju celokupne mreze...
U delove adrese Internet protokola cetvrte verzije spadaju:
U osnovne zadatke transportnog sloja OSI i TCP/IP komunikacionih...
Pouzdanost se kod TCP protokola ostvaruje postovanjem sledecih...
U parametre koji se dodeljuju clanovima mreze putem protokola za...
Adrese Internet protokola cetvrte verzije iz opsega 224.0.0.0/4...
Alert!

Advertisement