Kripto 2, Ispit

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Catherine Halcomb
Catherine Halcomb
Community Contributor
Quizzes Created: 1442 | Total Attempts: 6,630,300
| Attempts: 1,795
SettingsSettings
Please wait...
  • 1/159 Pitanja

    Na slici je prikazana: 

    • Biometrija koze
    • Otisak prsta
    • Biometrija lica
    • Iris
    • Nista od ponudjenog
Please wait...
Kripto 2, Ispit - Quiz


Quiz Preview

  • 2. 

    Na slici je prikazana biometrija: 

    • Dlana

    • Lica

    • Otiska prsta

    • Irisa

    Correct Answer
    A. Irisa
    Explanation
    The correct answer is "irisa" because the image is showing a biometric feature that is unique to each individual, which is the iris. The iris is the colored part of the eye and it contains patterns that can be used for identification purposes. This biometric feature is commonly used in security systems for authentication and access control.

    Rate this question:

  • 3. 

    "Daugman's Rubber Sheet Model" koristi se za:

    • Mapiranje svih tacaka izvan iris regiona na par polarnih kordinata (r, θ), gde je r na intervalu od [0, 1] i θ je ugao [0, 2π]

    • Mapiranje svih tacaka unutar iris regiona na par polarnih kordinata (r, θ), gde je r na intervalu od [0, 1] i θ je ugao [0, 2π]

    Correct Answer
    A. Mapiranje svih tacaka unutar iris regiona na par polarnih kordinata (r, θ), gde je r na intervalu od [0, 1] i θ je ugao [0, 2π]
    Explanation
    Daugman's Rubber Sheet Model is used for mapping all points within the iris region to a pair of polar coordinates (r, θ), where r is on the interval [0, 1] and θ is an angle on the interval [0, 2π].

    Rate this question:

  • 4. 

    Vremenski pecat je najcesce koriscen u:

    • Kerberosu

    • IPSec

    • SSL

    Correct Answer
    A. Kerberosu
    Explanation
    The correct answer is Kerberosu because the question is asking about the most commonly used in "Vremenski pecat" (timestamp in English), and Kerberos is a widely used network authentication protocol that includes a timestamp in its authentication process. IPSec and SSL are also commonly used protocols, but they do not specifically include a timestamp in their operations.

    Rate this question:

  • 5. 

    Protokoli za uzajamnu autentifikaciju su simetricnim kljucevima:

    • Potpuno su bezbedni ako koristimo javne kljuceve

    • Nisu nikad bezbedni

    • Potpuno su bezbedni ako koristimo privatne kljuceve

    • Nisu uvek bezbedni, ponekad je moguc napad

    Correct Answer
    A. Nisu uvek bezbedni, ponekad je moguc napad
    Explanation
    Protocols for mutual authentication are not always secure because there is a possibility of an attack. This means that even if symmetric keys are used, there are still potential vulnerabilities that can be exploited by attackers. Therefore, the statement "Nisu uvek bezbedni, ponekad je moguc napad" (They are not always secure, sometimes an attack is possible) is the correct answer.

    Rate this question:

  • 6. 

    Emitovanje sa drugih uredjaja i sa drugih pozicija uvek

    • Ne daje razlicite impulsne odzive kanala

    • Nista od ponudjenog

    • Daje razlicite implusne odzive kanala

    Correct Answer
    A. Daje razlicite implusne odzive kanala
    Explanation
    This statement suggests that broadcasting from different devices and positions always results in different impulse responses of the channel. This means that the channel's response to a sudden change or impulse in the input signal will vary depending on the device and position from which it is broadcasted.

    Rate this question:

  • 7. 

    Na slici je prikazan:

    • Protokol za sifrovanje

    • Senonov perfektni kanal za siforvanje

    • Vajnerov Wire-Tap kanal

    • Sema za generisanje slucajnih kljuceva

    Correct Answer
    A. Vajnerov Wire-Tap kanal
    Explanation
    The correct answer is Vajnerov Wire-Tap kanal. The given options are all related to encryption protocols and channels. The Vajnerov Wire-Tap kanal is a specific type of channel that is used in cryptography. It is designed to provide secure communication between two parties, while also allowing a third party to eavesdrop on the communication without being able to decipher the encrypted messages. This channel is often used in scenarios where a government or other authorized entity needs to monitor communication for security purposes.

    Rate this question:

  • 8. 

    Najzastupljeniji format digitalnih sertifikata je:

    • X. 507

    • X. 508

    • X. 509

    • X. 590

    • X.506

    Correct Answer
    A. X. 509
    Explanation
    The correct answer is X. 509. X.509 is the most widely used format for digital certificates. It is an ITU-T standard that defines the structure and content of these certificates, which are used for authentication and secure communication over networks. X.509 certificates are commonly used in technologies such as SSL/TLS for securing websites, VPNs for secure remote access, and digital signatures for verifying the authenticity of digital documents.

    Rate this question:

  • 9. 

    Ukoliko se u autentifikaciji koristi simetricni kljuc za autentifikaciju, tada je moguc;

    • DOS napad

    • Nijedno od ponudjenog

    • MiM napad

    • IP spoofing napad

    Correct Answer
    A. MiM napad
    Explanation
    If a symmetric key is used for authentication, it is vulnerable to a MiM (Man-in-the-Middle) attack. In this type of attack, an attacker intercepts the communication between the two parties and impersonates each party to the other, making it appear as though they are communicating directly. By doing so, the attacker can gain unauthorized access, manipulate the communication, or steal sensitive information. This vulnerability arises because the symmetric key used for authentication is shared between the two parties and can be intercepted and used by the attacker to impersonate one or both parties.

    Rate this question:

  • 10. 

    Ocekivano rastojanje za dva slucajno generisana binarna niza je:

    • 1,5

    • 0,08

    • 1

    • 0,5

    Correct Answer
    A. 0,5
    Explanation
    The expected distance for two randomly generated binary sequences is 0.5. This means that on average, the two sequences will differ in exactly half of their positions.

    Rate this question:

  • 11. 

    Jedini uslov za bezbedan rad Wajnerovog Wire-Tap kanala je: 

    • Da napadac prociscenu verziju signala legitimnog prijemnika

    • Da napadac snima signale od oba korisnika

    • Da napadac prima zasumljenu verziju signala legitimnog prijemnika

    Correct Answer
    A. Da napadac prima zasumljenu verziju signala legitimnog prijemnika
    Explanation
    The only condition for the secure operation of the Wajner Wire-Tap channel is that the attacker receives a noisy version of the legitimate receiver's signal.

    Rate this question:

  • 12. 

    U protokolu za autentifikaciju sa javnim kljucem:

    • Trudi ne moze da natera Alisu da desifruje bilo sta!

    • Trudi moze da natera Alisu da desifruje bilo sta!

    Correct Answer
    A. Trudi moze da natera Alisu da desifruje bilo sta!
  • 13. 

    Satelitski scenario je protokol koji se sastoji iz:

    • 5 faza

    • 4 faze

    • 3 faze

    • Zavisi od broja ucesnika u scenariju

    • 6 faza

    Correct Answer
    A. 3 faze
    Explanation
    The correct answer is 3 faze. The satellite scenario protocol consists of three phases.

    Rate this question:

  • 14. 

    Protokol za autentifikaciju moze zahtevati uspostavu:

    • Sesijskog kljuca

    • Asimetricnog kljuca

    • Javnog kljuca

    Correct Answer
    A. Sesijskog kljuca
    Explanation
    The correct answer is "Sesijskog kljuca" (Session key). The explanation for this answer is that a session key is often used in authentication protocols to establish a secure communication channel between two entities. It is a temporary key that is generated for the duration of a session and is used to encrypt and decrypt the data exchanged between the entities. Using a session key ensures confidentiality and integrity of the communication. Asimetricni kljuc (Asymmetric key) and Javni kljuc (Public key) are also cryptographic tools, but they are not specifically mentioned in the context of authentication protocols in the given question.

    Rate this question:

  • 15. 

    Koliko faza protkola je prikazano na slici? 

    • 2

    • 5

    • 4

    • 3

    Correct Answer
    A. 3
    Explanation
    The correct answer is 3 because there are three distinct phases shown in the image.

    Rate this question:

  • 16. 

    U Kerberos protkolu pomocni tiket koji se koristi za pristup mreznim resursima sadrzi: 

    • Privatni kljuc koji se koristi za tajnu komunikaciju izmedju osobe koja je trazila pomocni tiket i resursa sa kojim zeli da uspostavi komunikaciju

    • Asimetricni kljuc koji se koristi za tajnu komunikaciju izmedju osobe koja je trazila pomocni tiket i resursa sa kojim zeli da uspostavi komunikaciju

    • Sesijski kljuc koji se koristi za tajnu komunikaciju izmedju osobe koja je trazila pomocni tiket i resursa sa kojim zeli da uspostavi komunikaciju

    Correct Answer
    A. Sesijski kljuc koji se koristi za tajnu komunikaciju izmedju osobe koja je trazila pomocni tiket i resursa sa kojim zeli da uspostavi komunikaciju
    Explanation
    The correct answer is the session key that is used for secure communication between the person requesting the ticket and the resource they want to communicate with.

    Rate this question:

  • 17. 

    Tiketi u Kerberos protkolu su:

    • Nema nikakvih ogranicenja

    • Vremenski ogranicen

    • Vremenski neogranicen

    • Kljucem ogranicen

    Correct Answer
    A. Vremenski ogranicen
    Explanation
    The correct answer is "vremenski ogranicen" which means "time-limited" in English. This means that the tickets in the Kerberos protocol have a specific time limit and will expire after a certain period. This is an important security measure to ensure that the tickets are not valid indefinitely and reduce the risk of unauthorized access.

    Rate this question:

  • 18. 

    Alisa se autentifikovala pred Bobom preko digitalnog potpisa, ako Bob zeli takodje da se autentifikuje, koristice:

    • Nijedan od ponudjenih

    • Alisin sertifikat

    • Alisin privatni kljuc i svoj javni za verifikovanje

    • Svoj sertifikat

    Correct Answer
    A. Svoj sertifikat
    Explanation
    Bob će koristiti svoj sertifikat kako bi se autentifikovao.

    Rate this question:

  • 19. 

    Razlog zbog cega server od klijenta trazi sertifikat u SSL protkolu je:

    • Autentifikacija protokola

    • Autorizacija servera

    • Autentifikacija servera

    • Autentifikacija klijenta

    Correct Answer
    A. Autentifikacija klijenta
    Explanation
    The reason why the server requests a certificate from the client in the SSL protocol is for the authentication of the client.

    Rate this question:

  • 20. 

    Autentifikacija moze biti zasnovana na necemu sto:

    • Damo

    • Jesmo

    • Predamo

    • Imamo 

    • Znate

    Correct Answer(s)
    A. Jesmo
    A. Imamo 
    A. Znate
    Explanation
    Authentication can be based on something we are (biometric characteristics like fingerprints or facial recognition), something we have (like a physical token or a smart card), or something we know (like a password or PIN). In this case, "jesmo" (we are) and "imamo" (we have) are both valid options for authentication methods. "Znate" (you know) is not a valid option for authentication as it refers to someone else knowing something about us, rather than a personal characteristic or possession.

    Rate this question:

  • 21. 

    PFS podrazumeva:

    • Privatni kljuc koji se koristi jednokratno, a zatim trajno unistava

    • Simetricni kljuc koji se koristi jednokratno ali se cuva u arhivu na bezbedan nacin

    • Sesijski kljuc koji se koristi jednokratno, a zatim trajno unistava

    • Sesijski kljuc, i moze da se koristi vise puta

    Correct Answer
    A. Sesijski kljuc koji se koristi jednokratno, a zatim trajno unistava
    Explanation
    PFS (Perfect Forward Secrecy) refers to the use of a session key that is used only once and then permanently destroyed. This ensures that even if the session key is compromised in the future, it cannot be used to decrypt past communications. By using a session key that is destroyed after use, PFS provides an additional layer of security and protection against potential attacks on encrypted communications.

    Rate this question:

  • 22. 

    Koji napadi su moguci na protkol sa slike: 

    • Mogucnost ponovnog slanja

    • Mogucnost za kompromitovanje baze podataka sa lozinkama

    • Mogucnost za otkrivanje lozinke

    Correct Answer
    A. Mogucnost ponovnog slanja
    Explanation
    The correct answer is "mogucnost ponovnog slanja" (possibility of replay attacks). This refers to the vulnerability of the protocol where an attacker can intercept and replay previously captured data, such as login credentials or sensitive information, to gain unauthorized access or perform malicious actions. This can compromise the security and integrity of the system.

    Rate this question:

  • 23. 

    Formulom na slici predstavljena je: 

    • Nista od ponudjenog

    • Jaka tajnost u wiretap kanalu

    • Slaba tajnost u wiretap kanalu

    Correct Answer
    A. Jaka tajnost u wiretap kanalu
    Explanation
    The formula in the picture represents "Jaka tajnost u wiretap kanalu" which translates to "Strong secrecy in the wiretap channel". This suggests that the formula represents a method or system that ensures a high level of secrecy or security in a wiretap channel, which is a channel through which unauthorized individuals may attempt to intercept or access sensitive information.

    Rate this question:

  • 24. 

    Glavni problem u WEP protokolu je;

    • Ne ponavlja se IV u jednoj sesiji komunikacije za siforvanje vise hiljada paketa saobracaja

    • Ponavlja se IV u jednoj sesiji komunikacije za siforvanje vise hiljada paketa saobracaja

    • Ponavlja se otvoreni tekst u jednoj sesiji komunikacije za siforvanje vise hiljada paketa saobracaja

    Correct Answer
    A. Ponavlja se IV u jednoj sesiji komunikacije za siforvanje vise hiljada paketa saobracaja
    Explanation
    The main problem in the WEP protocol is that the IV (Initialization Vector) is repeated in one communication session for encrypting thousands of traffic packets. This repetition of the IV makes it easier for attackers to crack the encryption and gain unauthorized access to the communication.

    Rate this question:

  • 25. 

    U protkolu za autentifikaciju sa simetricnim kljucem:

    • Alisa i Bob ne moraju da dele iste kljuceve

    • Alisa i Bob unapred razmenjuju hes vrednosti kljuca

    • Alisa i Bob unapred razmenjuju simetricni kljuc

    Correct Answer
    A. Alisa i Bob unapred razmenjuju simetricni kljuc
    Explanation
    In the protocol for symmetric key authentication, Alisa and Bob exchange the symmetric key in advance. This means that they share the same key before the authentication process begins. This allows them to use the same key for encryption and decryption, ensuring secure communication between them. Sharing the symmetric key in advance eliminates the need for Alisa and Bob to share the same keys or exchange hash values of the key.

    Rate this question:

  • 26. 

    Autentifikacija preko Kerberos protokola zasnovana je na:

    • Asimetricnom kljucu

    • Javnom kljucu

    • Privatnom kljucu

    • Simetricnom kljucu

    Correct Answer
    A. Simetricnom kljucu
    Explanation
    The correct answer is "simetricnom kljucu" which translates to "symmetric key" in English. This means that authentication through the Kerberos protocol is based on the use of a symmetric key. In symmetric key cryptography, the same key is used for both encryption and decryption. This key is shared between the client and the server, allowing them to securely authenticate each other.

    Rate this question:

  • 27. 

    Kerberos protokol za N broj korisnika generise:

    • N x N kljuceva

    • N x N / 2 kljuceva

    • N kljuceva

    Correct Answer
    A. N kljuceva
    Explanation
    The Kerberos protocol generates N keys for N number of users. This means that for each user, there is a unique key generated, resulting in a total of N keys.

    Rate this question:

  • 28. 

    Ukoliko je lozinka smislena i sastavljena na osnovu 256 ASCII karaktera:

    • Najlakse je pretraziti sve moguce kljuceve

    • Nije moguce razbiti lozinku

    • Napad je moguce izvesti preko recnika

    • Najlakse je napad izvesti preko RAM memorije

    Correct Answer
    A. Napad je moguce izvesti preko recnika
    Explanation
    The correct answer is "Napad je moguce izvesti preko recnika" which translates to "It is possible to perform an attack using a dictionary." This means that if the password is meaningful and composed of 256 ASCII characters, it can potentially be cracked by using a dictionary attack, where an attacker tries various words from a dictionary as possible passwords.

    Rate this question:

  • 29. 

    Tehnika koja se koristi za proces segmentacije je:

    • Hafov algoritam

    • Senonov algoritam

    • Hafmanov algoritam

    Correct Answer
    A. Hafov algoritam
    Explanation
    The correct answer is Hafov algoritam. Hafov algoritam, also known as the Hough transform, is a technique used for image segmentation. It is particularly useful for detecting and extracting simple geometric shapes, such as lines and circles, from an image. The algorithm works by converting the image data into a parameter space, where the presence of a particular shape is represented by a peak. This allows for the identification and extraction of specific objects or regions of interest within an image.

    Rate this question:

  • 30. 

    Izabrati fizicke fenomene koje mogu da monitorisu uredjaj u sezonskim mrezama:

    • Pristisak

    • Temperatura

    • Duzina kljuca

    • Radijus

    Correct Answer(s)
    A. Pristisak
    A. Temperatura
    Explanation
    The physical phenomena that can be monitored in seasonal networks are pressure and temperature. These variables are commonly measured and monitored in various systems and devices to ensure their proper functioning and to prevent any potential issues or failures. The other options, such as key length and radius, do not relate to physical phenomena that can be monitored in this context.

    Rate this question:

  • 31. 

    Postupak kreiranja digitalnog potpisa se sastoji iz dve faze. U drugoj fazi: 

    • Primenjuje se odgovarajuci algoritam (RSA) da bi se dobijeni otisak iz prve faze sifrovao privatnim kljucem

    • Primenjuje se odgovarajuci algoritam (MD5) da bi se dobijeni otisak iz prve faze sifrovao tajnim kljucem

    • Primenjuje se odgovarajuci algoritam (SHA-1) da bi se dobijeni otisak iz prve faze sifrovao privatnim kljucem

    • U drugoj fazi dobijeni otisak (iz prve faze) se ne sifruje, vec sam po sebi predstavlja digitalni potpis

    Correct Answer
    A. Primenjuje se odgovarajuci algoritam (RSA) da bi se dobijeni otisak iz prve faze sifrovao privatnim kljucem
    Explanation
    In the second phase of creating a digital signature, the correct answer states that the obtained fingerprint from the first phase is encrypted with the private key using the appropriate algorithm (RSA). This step ensures the security and authenticity of the digital signature by encrypting it with the private key, making it difficult for anyone without the corresponding public key to tamper with or forge the signature.

    Rate this question:

  • 32. 

    Sta je podrazumevano pod fazom za normalizaciju irisa?

    • Transformaciju iris regiona u fiksne dimenzije koje su unapred poznate

    • Transformaciju iris regiona u cesto razlicite dimenzije koje nisu unapred poznate zbog distance

    Correct Answer
    A. Transformaciju iris regiona u fiksne dimenzije koje su unapred poznate
    Explanation
    The default phase for iris normalization refers to transforming the iris region into fixed dimensions that are predetermined. This means that regardless of the distance or variation in dimensions of the iris region, it will be transformed into a consistent size that is already known in advance.

    Rate this question:

  • 33. 

    Dizajn kog protokola je prikazan na slici?

    • Za uzajamnu autentifikaciju sa simetricnim kljucem

    • Za uzajamnu autentifikaciju sa javnim kljucem

    • Za jednostranu autentifikaciju sa simetricnim kljucem

    Correct Answer
    A. Za uzajamnu autentifikaciju sa simetricnim kljucem
    Explanation
    The correct answer is "for mutual authentication with symmetric key". The design of the protocol shown in the image is intended for both parties to authenticate each other using a shared symmetric key.

    Rate this question:

  • 34. 

    U primeru kod VEB stranice www.amazon.com:

    • Autentifikacija klijenta je zahtevana

    • Samo ukoliko klijent to zeli

    • Autentifikacija klijenta nije zahtevana

    Correct Answer
    A. Autentifikacija klijenta nije zahtevana
    Explanation
    The correct answer is "autentifikacija klijenta nije zahtevana" which means "client authentication is not required" in English. This implies that when accessing the webpage www.amazon.com, the client does not need to provide any authentication or login credentials to gain access to the content.

    Rate this question:

  • 35. 

    U protokolu za autentifikaciju sa vremenskim pecatom prvo:

    • Desifrujemo, zatim racunamo T vremenski pecat i sifrujemo

    • Sifrujemo, zatim racunamo T vremenski pecat i potpisujemo

    • Potpisujemo, zatim racunamo T vremenski pecat i sfirujemo

    Correct Answer
    A. Potpisujemo, zatim racunamo T vremenski pecat i sfirujemo
    Explanation
    In the given authentication protocol with a timestamp, the correct order of operations is to first sign the message, then calculate the timestamp, and finally encrypt the message. This ensures that the message is securely signed before the timestamp is added, and then the entire message is encrypted for further security.

    Rate this question:

  • 36. 

    Gde je primena WEP protkola?

    • Kerberos

    • TLS

    • SSL

    • WiFi

    Correct Answer
    A. WiFi
    Explanation
    WEP (Wired Equivalent Privacy) protocol is primarily used in WiFi networks. It is a security protocol that was designed to provide encryption and authentication for wireless networks. WEP is used to protect the confidentiality and integrity of data transmitted over WiFi networks, preventing unauthorized access and eavesdropping. It has been largely replaced by more secure protocols like WPA (Wi-Fi Protected Access) and WPA2, but some older devices and networks still use WEP.

    Rate this question:

  • 37. 

    Na slici Wynerovog wiretap kanala, R predstavlja: 

    • Zajednicku sucajnost u cilju randomizacije

    • Globalnu slucajnost u cilju randomizacije

    • Lokalnu slucajnost u cilju randomizacije

    Correct Answer
    A. Lokalnu slucajnost u cilju randomizacije
    Explanation
    In the Wyner's wiretap channel, R represents local randomness for the purpose of randomization. This means that R is used to introduce randomness in the encoding process in order to provide security against eavesdroppers. The local randomness ensures that the transmitted information is randomized and cannot be easily deciphered by unauthorized parties.

    Rate this question:

  • 38. 

    Izabrati sloj kom pripada bezbednost na fizickom sloju:

    • Link podataka

    • Transportni

    • Mrezni

    • Aplikativni

    • Fizicki

    Correct Answer
    A. Fizicki
    Explanation
    The correct answer is "Fizicki." The physical layer is responsible for the transmission of raw data bits over a physical medium, such as cables or wireless signals. It deals with the electrical, mechanical, and functional aspects of the physical connection between devices. This layer ensures that the data is transmitted reliably and accurately, without any errors or interference. It is the lowest layer in the OSI model and is primarily concerned with the physical characteristics of the network.

    Rate this question:

  • 39. 

    Na slici je prikazana integracija sistema na: 

    • Mreznom sloju u aplikativnu arhitekturu

    • Aplikativnom sloju u transportnu arhitekturu

    • Fizickom sloju u mreznu arhitekturu

    • Transportnom sloju u mreznu arhitekturu

    Correct Answer
    A. Fizickom sloju u mreznu arhitekturu
    Explanation
    The correct answer is "Fizickom sloju u mreznu arhitekturu" which translates to "Physical layer in the network architecture". This means that the integration of the system is happening at the physical layer of the network architecture.

    Rate this question:

  • 40. 

    U fazi kodovanja biometrije irisa koristi se transformacija: 

    • 2D Gabor vejvlet

    • 1D Gabor vejvlet

    • Hafmanov algoritam

    • Hafova transformacija

    Correct Answer(s)
    A. 2D Gabor vejvlet
    A. 1D Gabor vejvlet
    Explanation
    The correct answer is 2D Gabor vejvlet and 1D Gabor vejvlet. In the coding phase of iris biometrics, a transformation called Gabor wavelet is used. Gabor wavelets are mathematical functions that are applied to images to extract features. In the case of iris biometrics, both 2D and 1D Gabor wavelets are utilized to transform the iris image and extract relevant information for identification and authentication purposes.

    Rate this question:

  • 41. 

    Satelitski scenario nije moguc kada je: 

    • Greska predajne strane veca od greske prijemne strane

    • Greska prijemne strane manja od greske napadaca

    • Greska prijemne strane veca od greske predajne strane

    • Greska napadaca 0

    Correct Answer
    A. Greska napadaca 0
    Explanation
    In a satellite scenario, it is not possible for the error of the attacker to be zero. This is because in a satellite communication system, there is always a possibility of errors or interference introduced by various factors such as atmospheric conditions, equipment limitations, or intentional attacks. Therefore, the statement "greska napadaca 0" contradicts the nature of satellite communication systems and is not a possible scenario.

    Rate this question:

  • 42. 

    Koja faza protokola je prikazana na slici? 

    • Generisanje kljuca

    • Pojacavanje privatnosti

    • Pojacavanje prisustva

    • Destilacija prednosti

    • Usaglasavanje informacija

    Correct Answer
    A. Pojacavanje privatnosti
    Explanation
    The correct answer is "Pojacavanje privatnosti." This is because the image is depicting a phase in the protocol where privacy is being enhanced or strengthened.

    Rate this question:

  • 43. 

    Izabrati sloj kom pripada IPSec (Virtuelne privatne mreze):

    • Mrezni

    • Aplikativni

    • Fizicki

    • Transportni

    • Link podataka

    Correct Answer
    A. Mrezni
    Explanation
    The correct answer is "Mrezni" because IPSec operates at the network layer of the OSI model. IPSec provides secure communication over IP networks by encrypting and authenticating IP packets. It ensures the confidentiality, integrity, and authenticity of data transmitted over the network.

    Rate this question:

  • 44. 

    Za implementaciju PFS u zastitni protkol, koristi se:

    • Digitalni potpis

    • TTP

    • Kerberos

    • Difi-Helman

    • Forteza

    Correct Answer
    A. Difi-Helman
    Explanation
    The correct answer is Difi-Helman. Difi-Helman is used for implementing Perfect Forward Secrecy (PFS) in a secure protocol. PFS ensures that even if the long-term private key of a party is compromised, the past session keys and communication cannot be decrypted. Difi-Helman allows two parties to establish a shared secret key over an insecure channel, without actually transmitting the key. This key can then be used for secure communication and encryption. Therefore, Difi-Helman is the appropriate choice for implementing PFS in a secure protocol.

    Rate this question:

  • 45. 

    U protokolu za autentifikaciju sa javnim kljucem:

    • Uvek se koriste dva para kljuceva za sifrovanje

    • Koristi se jedan par kljuceva za digitalno potpisivanje

    • Koristi se dva para kljuceva za siforvanje i potpisivanje

    Correct Answer
    A. Koristi se dva para kljuceva za siforvanje i potpisivanje
    Explanation
    In the protocol for public key authentication, two pairs of keys are used for encryption and signing. This means that one pair of keys is used for encrypting the data and another pair of keys is used for digitally signing the data. By using two pairs of keys, the protocol ensures both confidentiality and authenticity of the data being transmitted.

    Rate this question:

  • 46. 

    Satelitski scenario sluzi za razmenu:

    • Sifrata javnim kanalom

    • Javnog kljuca preko tajnog kanala

    • Tajnog kljuca preko javnog kanala

    • Binarnih sekvenci

    Correct Answer
    A. Tajnog kljuca preko javnog kanala
    Explanation
    The correct answer is "tajnog kljuca preko javnog kanala" which translates to "secret key over a public channel" in English. This means that the satellite scenario is used for exchanging secret keys through a public channel.

    Rate this question:

  • 47. 

    Kriticna tacka Kerberos protkola je:

    • KDS

    • KDC

    • KDT

    • TGT

    • TGTS

    • STGT

    Correct Answer
    A. KDC
    Explanation
    The correct answer is KDC. In the Kerberos protocol, KDC (Key Distribution Center) is the critical point. It is responsible for issuing and distributing tickets to clients and granting access to requested resources. KDC authenticates users and provides them with TGTs (Ticket Granting Tickets) which they can use to request service tickets for specific resources. Without a functioning KDC, the authentication and authorization process in the Kerberos protocol would be compromised, hindering the secure access to network resources.

    Rate this question:

  • 48. 

    Nakon razmenjene specifikacije, u prvoj fazi SSL protkola:

    • Server odlucuje o algoritmima koji ce se koristiti u protokolu

    • Klijent i server zajedno donose odluku

    • Klijent odlucuje o algoritmima koji ce se koristiti u protokolu

    Correct Answer
    A. Server odlucuje o algoritmima koji ce se koristiti u protokolu
    Explanation
    In the first phase of the SSL protocol, the server decides on the algorithms that will be used in the protocol. This means that the server has the authority to choose the encryption and authentication algorithms that will be employed during the SSL handshake. The client does not have the power to make this decision on its own, nor do the client and server jointly make the decision. The server's decision is crucial in determining the security measures that will be implemented during the SSL communication.

    Rate this question:

  • 49. 

    Kod protokola za generisanje i distribuciju kljuceva na fizickom naviou, ako kapacitet tajnosti padne na nulu, tada:

    • Alisa obustavlja prenos

    • Bob obustavlja prenos

    • Alisa podize brzinu

    • Eva smanjuje brzinu prenosa

    • Eva obustavlja prenos

    Correct Answer
    A. Alisa obustavlja prenos
    Explanation
    If the secrecy capacity drops to zero in the protocol for generating and distributing keys at the physical level, Alisa will stop the transmission.

    Rate this question:

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 10, 2019
    Quiz Created by
    Catherine Halcomb
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.