Kripto 2, Ispit

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Catherine Halcomb
Catherine Halcomb
Community Contributor
Quizzes Created: 1443 | Total Attempts: 6,714,231
| Attempts: 1,801 | Pitanja: 159
Please wait...

Question 1 / 159
0 %
0/100
Score 0/100
1. Na slici je prikazana: 

Explanation

The correct answer is biometrija lica. The image is depicting facial biometrics, which involves the measurement and analysis of unique characteristics of a person's face for identification or authentication purposes. This can include features such as the shape of the face, the position of the eyes, nose, and mouth, and other facial landmarks. Facial biometrics are commonly used in various applications, including access control systems, surveillance, and mobile device authentication.

Submit
Please wait...
About This Quiz
Kripto 2, Ispit - Quiz

Personalize your quiz and earn a certificate with your name on it!
2. Na slici je prikazana biometrija: 

Explanation

The correct answer is "irisa" because the image is showing a biometric feature that is unique to each individual, which is the iris. The iris is the colored part of the eye and it contains patterns that can be used for identification purposes. This biometric feature is commonly used in security systems for authentication and access control.

Submit
3. Vremenski pecat je najcesce koriscen u:

Explanation

The correct answer is Kerberosu because the question is asking about the most commonly used in "Vremenski pecat" (timestamp in English), and Kerberos is a widely used network authentication protocol that includes a timestamp in its authentication process. IPSec and SSL are also commonly used protocols, but they do not specifically include a timestamp in their operations.

Submit
4. "Daugman's Rubber Sheet Model" koristi se za:

Explanation

Daugman's Rubber Sheet Model is used for mapping all points within the iris region to a pair of polar coordinates (r, θ), where r is on the interval [0, 1] and θ is an angle on the interval [0, 2π].

Submit
5. Protokoli za uzajamnu autentifikaciju su simetricnim kljucevima:

Explanation

Protocols for mutual authentication are not always secure because there is a possibility of an attack. This means that even if symmetric keys are used, there are still potential vulnerabilities that can be exploited by attackers. Therefore, the statement "Nisu uvek bezbedni, ponekad je moguc napad" (They are not always secure, sometimes an attack is possible) is the correct answer.

Submit
6. Najzastupljeniji format digitalnih sertifikata je:

Explanation

The correct answer is X. 509. X.509 is the most widely used format for digital certificates. It is an ITU-T standard that defines the structure and content of these certificates, which are used for authentication and secure communication over networks. X.509 certificates are commonly used in technologies such as SSL/TLS for securing websites, VPNs for secure remote access, and digital signatures for verifying the authenticity of digital documents.

Submit
7. Na slici je prikazan:

Explanation

The correct answer is Vajnerov Wire-Tap kanal. The given options are all related to encryption protocols and channels. The Vajnerov Wire-Tap kanal is a specific type of channel that is used in cryptography. It is designed to provide secure communication between two parties, while also allowing a third party to eavesdrop on the communication without being able to decipher the encrypted messages. This channel is often used in scenarios where a government or other authorized entity needs to monitor communication for security purposes.

Submit
8. Emitovanje sa drugih uredjaja i sa drugih pozicija uvek

Explanation

This statement suggests that broadcasting from different devices and positions always results in different impulse responses of the channel. This means that the channel's response to a sudden change or impulse in the input signal will vary depending on the device and position from which it is broadcasted.

Submit
9. U protokolu za autentifikaciju sa javnim kljucem:

Explanation

not-available-via-ai

Submit
10. Ocekivano rastojanje za dva slucajno generisana binarna niza je:

Explanation

The expected distance for two randomly generated binary sequences is 0.5. This means that on average, the two sequences will differ in exactly half of their positions.

Submit
11. Koliko faza protkola je prikazano na slici? 

Explanation

The correct answer is 3 because there are three distinct phases shown in the image.

Submit
12. Protokol za autentifikaciju moze zahtevati uspostavu:

Explanation

The correct answer is "Sesijskog kljuca" (Session key). The explanation for this answer is that a session key is often used in authentication protocols to establish a secure communication channel between two entities. It is a temporary key that is generated for the duration of a session and is used to encrypt and decrypt the data exchanged between the entities. Using a session key ensures confidentiality and integrity of the communication. Asimetricni kljuc (Asymmetric key) and Javni kljuc (Public key) are also cryptographic tools, but they are not specifically mentioned in the context of authentication protocols in the given question.

Submit
13. Ukoliko se u autentifikaciji koristi simetricni kljuc za autentifikaciju, tada je moguc;

Explanation

If a symmetric key is used for authentication, it is vulnerable to a MiM (Man-in-the-Middle) attack. In this type of attack, an attacker intercepts the communication between the two parties and impersonates each party to the other, making it appear as though they are communicating directly. By doing so, the attacker can gain unauthorized access, manipulate the communication, or steal sensitive information. This vulnerability arises because the symmetric key used for authentication is shared between the two parties and can be intercepted and used by the attacker to impersonate one or both parties.

Submit
14. Tiketi u Kerberos protkolu su:

Explanation

The correct answer is "vremenski ogranicen" which means "time-limited" in English. This means that the tickets in the Kerberos protocol have a specific time limit and will expire after a certain period. This is an important security measure to ensure that the tickets are not valid indefinitely and reduce the risk of unauthorized access.

Submit
15. Satelitski scenario je protokol koji se sastoji iz:

Explanation

The correct answer is 3 faze. The satellite scenario protocol consists of three phases.

Submit
16. U Kerberos protkolu pomocni tiket koji se koristi za pristup mreznim resursima sadrzi: 

Explanation

The correct answer is the session key that is used for secure communication between the person requesting the ticket and the resource they want to communicate with.

Submit
17. Jedini uslov za bezbedan rad Wajnerovog Wire-Tap kanala je: 

Explanation

The only condition for the secure operation of the Wajner Wire-Tap channel is that the attacker receives a noisy version of the legitimate receiver's signal.

Submit
18. Alisa se autentifikovala pred Bobom preko digitalnog potpisa, ako Bob zeli takodje da se autentifikuje, koristice:

Explanation

Bob će koristiti svoj sertifikat kako bi se autentifikovao.

Submit
19. Razlog zbog cega server od klijenta trazi sertifikat u SSL protkolu je:

Explanation

The reason why the server requests a certificate from the client in the SSL protocol is for the authentication of the client.

Submit
20. Koji napadi su moguci na protkol sa slike: 

Explanation

The correct answer is "mogucnost ponovnog slanja" (possibility of replay attacks). This refers to the vulnerability of the protocol where an attacker can intercept and replay previously captured data, such as login credentials or sensitive information, to gain unauthorized access or perform malicious actions. This can compromise the security and integrity of the system.

Submit
21. Autentifikacija moze biti zasnovana na necemu sto:

Explanation

Authentication can be based on something we are (biometric characteristics like fingerprints or facial recognition), something we have (like a physical token or a smart card), or something we know (like a password or PIN). In this case, "jesmo" (we are) and "imamo" (we have) are both valid options for authentication methods. "Znate" (you know) is not a valid option for authentication as it refers to someone else knowing something about us, rather than a personal characteristic or possession.

Submit
22. PFS podrazumeva:

Explanation

PFS (Perfect Forward Secrecy) refers to the use of a session key that is used only once and then permanently destroyed. This ensures that even if the session key is compromised in the future, it cannot be used to decrypt past communications. By using a session key that is destroyed after use, PFS provides an additional layer of security and protection against potential attacks on encrypted communications.

Submit
23. Formulom na slici predstavljena je: 

Explanation

The formula in the picture represents "Jaka tajnost u wiretap kanalu" which translates to "Strong secrecy in the wiretap channel". This suggests that the formula represents a method or system that ensures a high level of secrecy or security in a wiretap channel, which is a channel through which unauthorized individuals may attempt to intercept or access sensitive information.

Submit
24. U protkolu za autentifikaciju sa simetricnim kljucem:

Explanation

In the protocol for symmetric key authentication, Alisa and Bob exchange the symmetric key in advance. This means that they share the same key before the authentication process begins. This allows them to use the same key for encryption and decryption, ensuring secure communication between them. Sharing the symmetric key in advance eliminates the need for Alisa and Bob to share the same keys or exchange hash values of the key.

Submit
25. Glavni problem u WEP protokolu je;

Explanation

The main problem in the WEP protocol is that the IV (Initialization Vector) is repeated in one communication session for encrypting thousands of traffic packets. This repetition of the IV makes it easier for attackers to crack the encryption and gain unauthorized access to the communication.

Submit
26. Ukoliko je lozinka smislena i sastavljena na osnovu 256 ASCII karaktera:

Explanation

The correct answer is "Napad je moguce izvesti preko recnika" which translates to "It is possible to perform an attack using a dictionary." This means that if the password is meaningful and composed of 256 ASCII characters, it can potentially be cracked by using a dictionary attack, where an attacker tries various words from a dictionary as possible passwords.

Submit
27. Kerberos protokol za N broj korisnika generise:

Explanation

The Kerberos protocol generates N keys for N number of users. This means that for each user, there is a unique key generated, resulting in a total of N keys.

Submit
28. Autentifikacija preko Kerberos protokola zasnovana je na:

Explanation

The correct answer is "simetricnom kljucu" which translates to "symmetric key" in English. This means that authentication through the Kerberos protocol is based on the use of a symmetric key. In symmetric key cryptography, the same key is used for both encryption and decryption. This key is shared between the client and the server, allowing them to securely authenticate each other.

Submit
29. Tehnika koja se koristi za proces segmentacije je:

Explanation

The correct answer is Hafov algoritam. Hafov algoritam, also known as the Hough transform, is a technique used for image segmentation. It is particularly useful for detecting and extracting simple geometric shapes, such as lines and circles, from an image. The algorithm works by converting the image data into a parameter space, where the presence of a particular shape is represented by a peak. This allows for the identification and extraction of specific objects or regions of interest within an image.

Submit
30. U protokolu za autentifikaciju sa vremenskim pecatom prvo:

Explanation

In the given authentication protocol with a timestamp, the correct order of operations is to first sign the message, then calculate the timestamp, and finally encrypt the message. This ensures that the message is securely signed before the timestamp is added, and then the entire message is encrypted for further security.

Submit
31. Postupak kreiranja digitalnog potpisa se sastoji iz dve faze. U drugoj fazi: 

Explanation

In the second phase of creating a digital signature, the correct answer states that the obtained fingerprint from the first phase is encrypted with the private key using the appropriate algorithm (RSA). This step ensures the security and authenticity of the digital signature by encrypting it with the private key, making it difficult for anyone without the corresponding public key to tamper with or forge the signature.

Submit
32. U primeru kod VEB stranice www.amazon.com:

Explanation

The correct answer is "autentifikacija klijenta nije zahtevana" which means "client authentication is not required" in English. This implies that when accessing the webpage www.amazon.com, the client does not need to provide any authentication or login credentials to gain access to the content.

Submit
33. Dizajn kog protokola je prikazan na slici?

Explanation

The correct answer is "for mutual authentication with symmetric key". The design of the protocol shown in the image is intended for both parties to authenticate each other using a shared symmetric key.

Submit
34. Izabrati fizicke fenomene koje mogu da monitorisu uredjaj u sezonskim mrezama:

Explanation

The physical phenomena that can be monitored in seasonal networks are pressure and temperature. These variables are commonly measured and monitored in various systems and devices to ensure their proper functioning and to prevent any potential issues or failures. The other options, such as key length and radius, do not relate to physical phenomena that can be monitored in this context.

Submit
35. Sta je podrazumevano pod fazom za normalizaciju irisa?

Explanation

The default phase for iris normalization refers to transforming the iris region into fixed dimensions that are predetermined. This means that regardless of the distance or variation in dimensions of the iris region, it will be transformed into a consistent size that is already known in advance.

Submit
36. Gde je primena WEP protkola?

Explanation

WEP (Wired Equivalent Privacy) protocol is primarily used in WiFi networks. It is a security protocol that was designed to provide encryption and authentication for wireless networks. WEP is used to protect the confidentiality and integrity of data transmitted over WiFi networks, preventing unauthorized access and eavesdropping. It has been largely replaced by more secure protocols like WPA (Wi-Fi Protected Access) and WPA2, but some older devices and networks still use WEP.

Submit
37. Na slici je prikazana integracija sistema na: 

Explanation

The correct answer is "Fizickom sloju u mreznu arhitekturu" which translates to "Physical layer in the network architecture". This means that the integration of the system is happening at the physical layer of the network architecture.

Submit
38. Na slici Wynerovog wiretap kanala, R predstavlja: 

Explanation

In the Wyner's wiretap channel, R represents local randomness for the purpose of randomization. This means that R is used to introduce randomness in the encoding process in order to provide security against eavesdroppers. The local randomness ensures that the transmitted information is randomized and cannot be easily deciphered by unauthorized parties.

Submit
39. Izabrati sloj kom pripada bezbednost na fizickom sloju:

Explanation

The correct answer is "Fizicki." The physical layer is responsible for the transmission of raw data bits over a physical medium, such as cables or wireless signals. It deals with the electrical, mechanical, and functional aspects of the physical connection between devices. This layer ensures that the data is transmitted reliably and accurately, without any errors or interference. It is the lowest layer in the OSI model and is primarily concerned with the physical characteristics of the network.

Submit
40. U fazi kodovanja biometrije irisa koristi se transformacija: 

Explanation

The correct answer is 2D Gabor vejvlet and 1D Gabor vejvlet. In the coding phase of iris biometrics, a transformation called Gabor wavelet is used. Gabor wavelets are mathematical functions that are applied to images to extract features. In the case of iris biometrics, both 2D and 1D Gabor wavelets are utilized to transform the iris image and extract relevant information for identification and authentication purposes.

Submit
41. Koja faza protokola je prikazana na slici? 

Explanation

The correct answer is "Pojacavanje privatnosti." This is because the image is depicting a phase in the protocol where privacy is being enhanced or strengthened.

Submit
42. Izabrati sloj kom pripada IPSec (Virtuelne privatne mreze):

Explanation

The correct answer is "Mrezni" because IPSec operates at the network layer of the OSI model. IPSec provides secure communication over IP networks by encrypting and authenticating IP packets. It ensures the confidentiality, integrity, and authenticity of data transmitted over the network.

Submit
43. Za implementaciju PFS u zastitni protkol, koristi se:

Explanation

The correct answer is Difi-Helman. Difi-Helman is used for implementing Perfect Forward Secrecy (PFS) in a secure protocol. PFS ensures that even if the long-term private key of a party is compromised, the past session keys and communication cannot be decrypted. Difi-Helman allows two parties to establish a shared secret key over an insecure channel, without actually transmitting the key. This key can then be used for secure communication and encryption. Therefore, Difi-Helman is the appropriate choice for implementing PFS in a secure protocol.

Submit
44. Satelitski scenario nije moguc kada je: 

Explanation

In a satellite scenario, it is not possible for the error of the attacker to be zero. This is because in a satellite communication system, there is always a possibility of errors or interference introduced by various factors such as atmospheric conditions, equipment limitations, or intentional attacks. Therefore, the statement "greska napadaca 0" contradicts the nature of satellite communication systems and is not a possible scenario.

Submit
45. Kriticna tacka Kerberos protkola je:

Explanation

The correct answer is KDC. In the Kerberos protocol, KDC (Key Distribution Center) is the critical point. It is responsible for issuing and distributing tickets to clients and granting access to requested resources. KDC authenticates users and provides them with TGTs (Ticket Granting Tickets) which they can use to request service tickets for specific resources. Without a functioning KDC, the authentication and authorization process in the Kerberos protocol would be compromised, hindering the secure access to network resources.

Submit
46. Kod protokola za generisanje i distribuciju kljuceva na fizickom naviou, ako kapacitet tajnosti padne na nulu, tada:

Explanation

If the secrecy capacity drops to zero in the protocol for generating and distributing keys at the physical level, Alisa will stop the transmission.

Submit
47. Satelitski scenario sluzi za razmenu:

Explanation

The correct answer is "tajnog kljuca preko javnog kanala" which translates to "secret key over a public channel" in English. This means that the satellite scenario is used for exchanging secret keys through a public channel.

Submit
48. U procesu za kodovanje irisa koriste se:

Explanation

Gabor wavelets are used in the process of encoding iris. Gabor wavelets are a type of wavelet transform that are specifically designed to analyze and represent images. They are commonly used in image processing tasks such as feature extraction and pattern recognition. In the context of iris encoding, Gabor wavelets can be used to extract the unique features of the iris and encode them into a compact representation that can be used for identification and verification purposes.

Submit
49. U protokolu za autentifikaciju sa javnim kljucem:

Explanation

In the protocol for public key authentication, two pairs of keys are used for encryption and signing. This means that one pair of keys is used for encrypting the data and another pair of keys is used for digitally signing the data. By using two pairs of keys, the protocol ensures both confidentiality and authenticity of the data being transmitted.

Submit
50. Nakon razmenjene specifikacije, u prvoj fazi SSL protkola:

Explanation

In the first phase of the SSL protocol, the server decides on the algorithms that will be used in the protocol. This means that the server has the authority to choose the encryption and authentication algorithms that will be employed during the SSL handshake. The client does not have the power to make this decision on its own, nor do the client and server jointly make the decision. The server's decision is crucial in determining the security measures that will be implemented during the SSL communication.

Submit
51. Geometrija dlana je:   ???

Explanation

Geometrija dlana refers to palm geometry, which is a biometric authentication method that uses the unique features and patterns of an individual's palm to verify their identity. This means that palm geometry is suitable for authentication purposes, as it can accurately identify and authenticate individuals based on the characteristics of their palm.

Submit
52. U SSL protkolu, sertifikat koji salje server klijentu sadrzi:

Explanation

The correct answer is "samo potpis od CA koji je izdao serverski sertifikat" which means "only the signature of the CA that issued the server certificate". In the SSL protocol, the server sends a certificate to the client, which includes various information such as the server's public key, RSA or DH parameters, and the signature of the CA that issued the certificate. However, the master key or secret value of the server is not included in the certificate.

Submit
53. Na slici je prikazan: 

Explanation

not-available-via-ai

Submit
54. Izaberite biometrijske izvore?

Explanation

The correct answer includes biometric sources that can be used for identification or authentication purposes. Iris, glas (voice), lice (face), and otisak prsta (fingerprint) are all commonly used biometric sources. These sources provide unique characteristics that can be measured and compared to stored data to verify a person's identity.

Submit
55. Za ulogu kriptoloskog kljuca kod kriptografskih algoritama:

Explanation

The given answer states that the use of passwords is not recommended. This implies that passwords are not considered secure or reliable for cryptographic algorithms. The answer suggests that alternative methods or security measures should be used instead of relying solely on passwords.

Submit
56. U protokolu na slici: 

Explanation

The correct answer is that both Alisa and Bob must know the password. This can be inferred from the given options where it is stated that Alisa must know the password and Bob must know the password. Both statements are true according to the options provided.

Submit
57. Napad zasnovan na ponavljanju poruke u autentifikacionim protkolima, moguce je spreciti sa: 

Explanation

The correct answer is "izazovom". In authentication protocols, a replay attack can be prevented by using a challenge-response mechanism. By sending a unique challenge to the client, the server can verify that the response received is not a replay of a previous message. This ensures that each authentication attempt is fresh and prevents attackers from intercepting and replaying previous messages to gain unauthorized access.

Submit
58. Wajnerov Wire-Tap kanal je protokol za razmenu: 

Explanation

The correct answer is "Simetricnih kljuceva" (Symmetric keys). This suggests that the Wajnerov Wire-Tap channel is a protocol used for exchanging symmetric keys. Symmetric key encryption uses the same key for both encryption and decryption, making it faster and more efficient for data exchange.

Submit
59. U primeru sa binarnim wiretap kanalom sa brisanjem, ako Eva observira sekvencu Zn sa k brisanja:

Explanation

If Eva observes a sequence Zn with k deletions in a binary wiretap channel with deletion, the parity of the selected bits is equally likely if k=0 and if k>0 Eva perfectly knows which codeword is sent (also its parity). This means that regardless of the value of k, if it is either 0 or greater than 0, Eva can accurately determine both the codeword that was sent and its parity.

Submit
60. Sesijski kljuc je:

Explanation

The correct answer is "Simetricni tajni kljuc za jednu komunikaciju" (Symmetric secret key for one communication). This means that a symmetric secret key is used for one communication session between participants. This key is shared between the sender and receiver and is used for both encryption and decryption of the messages exchanged during the communication session.

Submit
61. Koja je velicina IV u RC4 algoritmu

Explanation

The correct answer is 24 bita, 3 bajta. In the RC4 algorithm, the IV (Initialization Vector) is a random value used to initialize the key stream generator. In this case, the IV size is 24 bits or 3 bytes.

Submit
62. U SSL protkolu, server:

Explanation

In the SSL protocol, the server has the option to request the client to send its certificate. This means that the server can choose whether or not to ask the client for its certificate. It is not mandatory for the server to request the client's certificate, but it has the flexibility to do so if needed.

Submit
63. Multimodalna biometrija je upotreba:

Explanation

The correct answer is "tri biometrije, dve biometrije". This means that multimodal biometrics involves the use of three biometrics and two biometrics. It suggests that multiple forms of biometric data are being used for identification or authentication purposes.

Submit
64. Koji scenario je prikazan na slici?

Explanation

The correct answer is "Bob autentifikuje Alisu sa simetricnim kljucem" because it states that Bob is authenticating Alice using a symmetric key. This means that Bob and Alice share the same key, and Bob can verify Alice's identity by using this key to decrypt a message or perform other authentication mechanisms.

Submit
65. Fizicki fenomeni koje mogu da monitorisu uredjaji u senzorskim mrezama:

Explanation

The correct answer states that physical phenomena in sensor networks cannot be controlled by a single student in the protocol. This implies that the monitoring and control of physical phenomena in sensor networks require the collaboration and coordination of multiple students or participants in the protocol.

Submit
66. Procena impulsnog odziva kanala vrsi se:

Explanation

The correct answer is "Slanjem trening sekvenci" which translates to "Sending training sequences" in English. This suggests that the evaluation of the impulse response of the channel is done by transmitting specific sequences of signals known as training sequences. These training sequences are used to analyze the behavior and characteristics of the channel, allowing for a better understanding of its response to different signals.

Submit
67. Svaki tiket u Kerberos protokolu je sifrovan sa:

Explanation

In Kerberos protocol, each ticket is encrypted with the symmetric key of the Key Distribution Center (KDC). The KDC is responsible for issuing tickets and authenticating clients. Using a symmetric key for encryption ensures that both the KDC and the client can decrypt and verify the ticket. This symmetric key is shared between the KDC and the client, allowing secure communication between them.

Submit
68. U bezicnim senzorskim mrezama, uredjaji mogu da monitrisu:

Explanation

In wireless sensor networks, devices can monitor physical phenomena. This means that the devices are capable of collecting data and measuring various physical parameters such as temperature, humidity, pressure, motion, and light intensity. By monitoring these physical phenomena, the devices can provide valuable information about the environment and enable applications such as environmental monitoring, healthcare monitoring, and industrial monitoring.

Submit
69. Prikazani protokol na slici obezbedjuje: 

Explanation

The protocol shown in the picture provides mutual authentication. This means that both parties, Alice and Bob, are able to authenticate each other's identities.

Submit
70. Proces kodovanja biometrijskog izvora predstavlja:

Explanation

The correct answer is "izdvajanje konzistentnih podataka" which means "extraction of consistent data" in English. This process refers to isolating or extracting the reliable and consistent information from a biometric source. It involves filtering out any inconsistent or unreliable data to ensure accurate and reliable biometric identification or authentication.

Submit
71. Na slici je prikazan kod: 

Explanation

The correct answer is C(5, 2). This is because C(5, 2) represents the combination of choosing 2 elements from a set of 5 elements. In other words, it represents the number of ways to select 2 items from a group of 5 items without regard to their order.

Submit
72. Formula na slici predstavlja kapacitet: 

Explanation

The formula in the picture represents the concept of "tajnosti" or secrecy. It could be referring to a mathematical or cryptographic formula that is used to ensure the confidentiality or privacy of information. This formula may involve encryption techniques or other methods to protect sensitive data from unauthorized access or disclosure.

Submit
73. Kod protokola za generisanje i distribuciju kljuceva na fizickom nivou, kada:

Explanation

When Alice knows the complete Signal-to-Noise Ratio (SNR) of the main and Eve's channels, she can adjust all the parameters of the protocol and calculate the secrecy capacity of the protocol. This means that having full knowledge of the SNR allows Alice to not only set the protocol parameters but also determine the level of secrecy that can be achieved.

Submit
74. Kod protokola za generisanje i distribuciju kljuceva na fizickom nivou, u slucaju da je Eva pasivni prisluskivac:

Explanation

In the given question, the protocol for generating and distributing keys at the physical level is being discussed in the presence of a passive eavesdropper, Eva. The correct answer, "Alisa i Bob nemaju informaciju o stanju njenog kanala" translates to "Alice and Bob do not have information about the state of her channel." This means that neither Alice nor Bob have any knowledge or information about the state of Eva's channel, indicating that they are unaware of any potential eavesdropping or interference by Eva.

Submit
75. Cemu je jednak kapacitet tajnosti vajnerovog kanala?

Explanation

The capacity for secrecy in the Wiretap channel is equal to 0 if the attacker's channel is better than the legitimate parties' channels. This means that the attacker has a higher ability to intercept and decode the communication than the legitimate parties, making it impossible to maintain secrecy.

Submit
76. Koje kriterijume treba zadovoljiti u Wiretap kanalu?

Explanation

The Wiretap channel should meet the criteria of reliability and security. Reliability ensures that the channel consistently delivers the intended information without any loss or distortion. Security ensures that the channel is protected from unauthorized access and prevents any interception or tampering of the transmitted data. These criteria are important to ensure the confidentiality and integrity of the communication in the Wiretap channel.

Submit
77. Bezbedne kanalske kodove je moguce implementirati u:

Explanation

Bezbedne kanalske kodove je moguće implementirati u drajverima bežičnih interfejs kartica. This statement explains that secure channel codes can be implemented in wireless interface card drivers.

Submit
78. Na slici je prikazana: 

Explanation

The image depicts the concept of Rejt-Ekvivokacija regiona.

Submit
79. Uvodjenjem Wiretap kodova smanjuje se: 

Explanation

The introduction of Wiretap codes reduces the speed of transmission and the implementation complexity. This means that using Wiretap codes slows down the rate at which data is transmitted and makes it more difficult to implement the codes. However, it does not affect the capacity of the channel or the reliability and security of the transmission.

Submit
80. Autentifikacija moze biti zasnovana na:

Explanation

Authentication can be based on biometrics, smart cards, and passwords. Biometrics refers to the use of unique physical or behavioral characteristics, such as fingerprints or facial recognition, to verify a person's identity. Smart cards are small electronic devices that store and process data, often used for authentication purposes. Passwords are secret codes or phrases that individuals use to prove their identity. Therefore, these three options can all be used for authentication purposes.

Submit
81. Promena kljuca u WEP protokolu je: 

Explanation

The correct answer is "Neautomatizovan proces" (Non-automated process). In the WEP protocol, changing the key is not done automatically but requires manual intervention. This means that the network administrator or user needs to manually update the key whenever they want to change it. It is not dependent on the network administrator or the cost of the WiFi router, but rather on the manual action of changing the key.

Submit
82. U dizajnu protokola sa slike: 

Explanation

The correct answer is "Kljuc K je digitalno potpisan" because in protocol design, the key K is digitally signed. This means that the authenticity and integrity of the key are verified using digital signatures, ensuring that the key has not been tampered with and that it comes from a trusted source.

Submit
83. Na slici je prikazana: 

Explanation

The image depicts the evolution of the information content of protocol participants during all phases of sequential secret key extraction.

Submit
84. U dizajnu protokola na slici

Explanation

Based on the given options, none of them accurately represent the information provided in the question. The question states "U dizajnu protokola na slici" which translates to "In the protocol design in the picture." However, none of the options mention anything about a protocol design or a picture. Therefore, none of the options are correct.

Submit
85. Veliki problem u WEP protokolu predstavlja: 

Explanation

The correct answer is "Kratak kljuc, Implementacija RC4 algoritma". The WEP protocol has a vulnerability in its implementation of the RC4 algorithm, which makes it susceptible to attacks. Additionally, the use of a short key in WEP encryption makes it easier for attackers to crack the encryption. These two factors contribute to the major problem with the WEP protocol.

Submit
86. Ukoliko server opciono zahteva od klijenta sertifikat, to znaci da je zahtevana: 

Explanation

If the server optionally requests a client certificate, it means that mutual authentication is required. This means that both the server and the client need to authenticate each other's identities using certificates. This helps ensure that both parties are who they claim to be before establishing a secure connection.

Submit
87. Koja faza je prikazana na slici u procesu generisanja biometrijskog templejta irisa?

Explanation

The correct answer is "Proces normalizacije". In the process of generating a biometric iris template, the normalization phase is depicted in the image. This phase involves standardizing the iris image to a fixed size and format, removing any distortions or variations in lighting, and aligning the iris pattern for accurate comparison and identification. The normalization process ensures that the iris template is consistent and can be effectively used for biometric authentication purposes.

Submit
88. LDPC kodovi:

Explanation

LDPC kodovi su pogodni za binarni kanal sa brisanjem. Ovo znači da su ovi kodovi efikasni u otkrivanju i ispravljanju grešaka koje se javljaju kada se podaci prenose preko kanala koji može izgubiti ili obrisati neke bitove. LDPC kodovi koriste matricu parnosti sa rijetkim elementima kako bi se omogućilo otkrivanje i ispravljanje grešaka. Ovo ih čini idealnim za primjenu u situacijama gdje je moguće da se podaci izgube tokom prijenosa.

Submit
89. Kapacitet tajnosti u Wiretap kanalu predstavlja: 

Explanation

The correct answer is "Maksimalnu brzinu prenosa pri kojoj su ispunjena oba kriterijuma, pouzdanost i bezbednost." This means that the capacity of secrecy in the Wiretap channel represents the maximum transmission speed at which both criteria, reliability and security, are fulfilled.

Submit
90. Na slici je prikazan princip: 

Explanation

The correct answer is "Pojacavanja privatnosti" (Enhancing privacy). This is because the image represents a concept or principle related to enhancing privacy. Without further context or information about the image, it is difficult to provide a more specific explanation.

Submit
91. Broj radijalnih vektora u procesu normalizacije predstavlja: 

Explanation

The number of radial vectors in the normalization process represents angular resolution.

Submit
92. U fazi pojacavanja privatnosti:

Explanation

In the phase of increasing privacy, Alisa and Bob generate a shorter bit sequence that Eva has no information about. This means that Alisa and Bob are able to generate a shared secret that is unknown to Eva, enhancing their privacy.

Submit
93. WEP protokol predstavlja primer klasicnog:

Explanation

The correct answer is "izazov-odgovor protokola" because WEP (Wired Equivalent Privacy) is a security protocol used to secure wireless computer networks. It operates by using a challenge-response authentication mechanism, where the access point sends a challenge to the client device, and the client device responds with the correct answer. This process helps to verify the identity of the client device and ensure secure communication between the client and the access point.

Submit
94. Provera autenticnosti u SSL protokolu nakon uspostavljene sesije podrazumeva: ?

Explanation

After establishing a session in the SSL protocol, verifying authenticity involves encrypting all exchanged messages with the public key along with the secret parameters. This ensures that the messages can only be decrypted by the intended recipient, thus providing authentication and ensuring the confidentiality of the communication.

Submit
95. U Satelitskom scenariju kod faze izdvajanja prednosti:

Explanation

In the given scenario of Satellite scenario in the phase of advantage separation, it is stated that Eva cannot influence and have control over the post-selection phase. Additionally, Eva cannot influence Alisa and Bob's selection of the bits in which she has an advantage.

Submit
96. Izaberi alate za kriptoanalizu WEP protkola: 

Explanation

The correct answer includes three tools for cryptoanalysis of the WEP protocol: AirSnot, WEP Crack, and Aircrack. These tools are commonly used for analyzing and breaking the security of WEP encrypted networks. AirSnot is a tool used for capturing and analyzing network traffic, while WEP Crack and Aircrack are both tools specifically designed for cracking WEP encryption. By using these tools, an attacker can exploit vulnerabilities in the WEP protocol and gain unauthorized access to a network.

Submit
97. Izaberite tacnu tvrdnju:

Explanation

The correct answer states that deletion is equally likely for both 1 and 0 in a binary wiretap channel with deletion. This means that when transmitting data through this channel, there is an equal chance of either a 1 or a 0 being deleted.

Submit
98. Uz pomoc Wiretap kanala:

Explanation

The correct answer is "Alisa moze preneti Bobu skvencu lokalno generisanog kriptografskog kljuca K." This means that Alisa can transmit the sequence of locally generated cryptographic key K to Bob.

Submit
99. Klijenti Kerberos protokola za pristup nekom mreznom resursu koriste: 

Explanation

Klijenti Kerberos protokola koriste master tiket koji je generisan u inicijalnoj fazi za pristup mrežnom resursu.

Submit
100. Autentifikacija preko mreze je daleko kompleksnija, razlog tome je: 

Explanation

Authentication over the network is far more complex due to several reasons. An attacker can possess the same private key, allowing them to impersonate the legitimate user. Additionally, the attacker can passively observe the message, gaining access to sensitive information. Furthermore, both passive attacks (such as message insertion, deletion, and modification) and active attacks (such as message tampering) are possible. These factors contribute to the increased complexity and vulnerability of network authentication.

Submit
101. Kod protokola za generisanja i distribuciju kljuceva na fizickom nivou: 

Explanation

The correct answer states that Eva has the ability to send a fake image of SNR (Signal-to-Noise Ratio) in her channel. This implies that Eva can manipulate the SNR protocol for generating and distributing keys at the physical level.

Submit
102. Pojacavanje privatnosti u satelitskom scenariju je:

Explanation

The correct answer is "Finalni korak u sekvencijalnom protokolu izdvajanja tajnog kljuca izmedju Alise i Boba." This means that strengthening privacy in a satellite scenario is the final step in the sequential protocol for extracting the secret key between Alice and Bob.

Submit
103. Izabrati sloj kom pripada End to End kriptografija:

Explanation

The correct answer is "Aplikativni." End-to-end encryption is a method of securing communication where the data is encrypted on the sender's device and decrypted on the receiver's device. This encryption and decryption process occurs at the application level, specifically within the application layer of the network protocol stack. Therefore, end-to-end encryption belongs to the application layer or the "Aplikativni" layer.

Submit
104. Perfektna tajnost (PFS) podrazumeva da Trudi:

Explanation

The correct answer states that Trudi cannot obtain the key if she has access to Alice's computer and she cannot decrypt all the recorded ciphers using a single key K. This implies that perfect secrecy (PFS) is achieved because even if Trudi has access to the computer or the recorded ciphers, she cannot retrieve the key or decrypt the ciphers without the specific key for each cipher. Additionally, the answer does not mention anything about Trudi being unable to learn the private key or encrypt the recorded cipher later, so those statements are not relevant to the concept of perfect secrecy.

Submit
105. Kod protokola za generisanje i distribuciju kljuceva na fizickom nivou, problem autentifikacije je moguce resiti:

Explanation

The correct answer is Javnim kljucem (PKI) and Merenjem ili pamcenjem impulsnog odziva kanala, pod uslovom da se u pocetnoj fazi kada se estimira impulsni odziv, ima poverenja u njihovu autenticnost. This means that the authentication problem in the protocol for generating and distributing keys at the physical level can be solved by using a public key infrastructure (PKI) and by measuring or storing the impulse response of the channel, under the condition that there is trust in their authenticity during the initial estimation phase.

Submit
106. Verifikovanje digitalnog potpisa obavlja se preko:

Explanation

The correct answer is "Javnog kljuca" (Public key). Verification of a digital signature is done using the public key. In a public key cryptography system, a digital signature is created using the private key of the signer and can be verified using the corresponding public key. The public key is available to anyone who wants to verify the signature, while the private key is kept secret by the signer. By using the public key, the recipient can verify the authenticity and integrity of the digital signature.

Submit
107. Pojacavanje privatnosti podrazumeva:

Explanation

Pojačavanje privatnosti podrazumeva dogovor ili sporazum koji se odnosi na determinističku funkciju. Deterministička funkcija je funkcija koja za svaki ulaz daje tačno određen izlaz, što znači da se može precizno odrediti kako će se podaci koristiti i ko će imati pristup tim podacima. Ovaj dogovor se postiže kako bi se osigurala privatnost podataka i sprečilo neovlašćeno korišćenje ili pristupanje podacima.

Submit
108. Kod protokola za generisanje i distribuciju kljuceva na fizickom nivou, poznavanje stanja kanala je preduslov za:

Explanation

In the protocol for generating and distributing keys at the physical level, knowing the channel state is a prerequisite for achieving perfect security. This means that in order to achieve perfect security in the protocol, it is necessary to have knowledge of the state of the channel.

Submit
109. Uloga Gabor vejvleta je da:

Explanation

The role of the Gabor wavelet is to eliminate noise from the signal.

Submit
110. U semi kodovanja zasnovanoj na kosetima:

Explanation

This answer suggests that in the context of semi-quantum coding based on cosets, Alisa generates a random sequence U of length K, about which both Bob and Eva have no information.

Submit
111. Jednostavan metod za razbijanje WEP protokola je: 

Explanation

Statistička analiza šifre je jednostavan metod za razbijanje WEP protokola. Ovaj metod se zasniva na analizi statističkih karakteristika šifre kako bi se otkrili uzorci i slabosti u njoj. Kroz analizu statističkih podataka, moguće je otkriti ključeve ili druge informacije koje omogućavaju dešifrovanje šifre.

Submit
112. Direktna primena klasicnih kriptoanalitickih metoda na wiretap kanal:

Explanation

The correct answer is that it is not possible to directly apply classical cryptanalytic methods on a wiretap channel, or their modification would require a significant increase in the complexity of the attack. This means that traditional methods of analyzing and breaking encryption would not be effective or would require extensive modifications to work on a wiretap channel.

Submit
113. Kod protokola za generisanje i distribuciju kljuceva na fizickom nivou, u slucaju da je Eva pasivni prisluskivac:

Explanation

In the given question, the correct answer is "Alisa i Bob mogu da se oslone samo na konzervativne procene, zasnovane na pretpostavljenoj udaljenosti Evinih antetna i njihovog kvaliteta" (Alice and Bob can rely only on conservative estimates based on the assumed distance of Eva's antennas and their quality). This means that in the protocol for generating and distributing keys at the physical level, if Eva is a passive eavesdropper, Alice and Bob can only make conservative estimations about the distance between Eva's antennas and their quality. They cannot rely on any other information or assumptions provided in the options.

Submit
114. Sta podrazumevamo pod fazom za segmentaciju irisa?

Explanation

The correct answer is "Izdvajanje irisa sa digitalne fotografije" (Extraction of iris from a digital photograph). This is because iris segmentation refers to the process of isolating the iris region from an image, specifically from a digital photograph.

Submit
115. Verifikacijom potpisa na sertifikatu istovremeno se: 

Explanation

The correct answer is "Identifikuje vlasnik privatnog kljuca preko koga je nastao potpis." This means that the verification of the signature on the certificate simultaneously identifies the owner of the private key from which the signature originated.

Submit
116. Model kanala za dogovor o tajnom kljucu podrazumeva :

Explanation

The correct answer is that Bob and Eva observe the outputs of a discrete memoryless channel whose input is under the control of Alice. This means that Alice is the one who controls the input of the channel, while Bob and Eva observe the outputs.

Submit
117. Sa aspekta implementacije WEP protokol predstavlja: 

Explanation

The correct answer is "pogresnu implementaciju pseudo One-time pad algoritma". This means that the implementation of the WEP protocol is incorrect because it uses a flawed version of the pseudo One-time pad algorithm. The One-time pad algorithm is a secure encryption method that uses a random key that is as long as the message being encrypted. However, the WEP protocol's implementation of this algorithm is flawed, making it susceptible to security vulnerabilities.

Submit
118. CRC (cyclic redudancy check): ???

Explanation

CRC (cyclic redundancy check) is used instead of a salt in a cryptographic key. A salt is a random value added to a password before it is hashed, to prevent dictionary attacks and rainbow table attacks. However, in the context of a cryptographic key, a salt may not be necessary or appropriate. Instead, a CRC can be used to verify the integrity of the key. CRC is a technique commonly used in error detection, where a checksum is calculated and appended to the data. Upon receiving the data, the checksum is recalculated and compared to the appended value to check if any errors occurred during transmission.

Submit
119. Izabrati sloj kom pripada SSL (Secure Socket Layer):

Explanation

SSL (Secure Socket Layer) je protokol koji pruža sigurnu komunikaciju između klijenta i servera. On se nalazi na transportnom sloju u mrežnom modelu OSI, što znači da se koristi za sigurnu razmjenu podataka između aplikacija koje se koriste na klijentu i serveru. Transportni sloj je odgovoran za pouzdanu isporuku podataka između krajnjih tačaka u mreži, što čini SSL pogodnim slojem za implementaciju sigurne komunikacije.

Submit
120. Na slici je predstavljen: 

Explanation

not-available-via-ai

Submit
121. Prikazani fragment koda predstavlja: 

Explanation

The given code fragment represents the algorithms for exchanging symmetric keys.

Submit
122. Kompresija pre sifrovanja u SSL protkolu je:

Explanation

The compression before encryption in the SSL protocol is not supported due to performance reasons. Compression can potentially reduce the size of the data being transmitted, making it faster to send and receive. However, compressing data before encryption can also introduce security vulnerabilities. Attackers could potentially exploit patterns in the compressed data to gain insights into the encrypted information. Therefore, to prioritize security, compression is not supported in the SSL protocol.

Submit
123. Buduci da emitovanje sa drugih uredjaja i sa drugih pozicija uvek daje razlicite impulsne odzive kanala:

Explanation

The statement suggests that the fact that broadcasting from different devices and positions always produces different channel impulse responses can be a sufficient criterion for rejecting false representation. This means that if the impulse responses vary, it indicates that the representation is not genuine.

Submit
124. Uloga wiretap kodova je: 

Explanation

The wiretap codes replace existing conventional channel codes and modulation schemes, ensuring reliability.

Submit
125. U Wynerovom wiretap kanalu, performanse pouzdanosti prenosa se mere:

Explanation

In the Wyner wiretap channel, the performance of transmission reliability is measured by the average probability of decoding error. This means that the measure of how often errors occur during the decoding process determines the reliability of the transmission. The other options, such as the degree of compression, leakage, and equivocation, are not relevant to measuring the performance of reliability in this specific context.

Submit
126. Kompletan proces za generisanje biometrijskog templejta irisa obuhvata faze:

Explanation

The complete process for generating a biometric iris template involves the following stages: coding, segmentation, and normalization. Coding refers to the process of converting the iris image into a digital representation that can be easily processed. Segmentation involves identifying and extracting the iris region from the overall image. Normalization is the step where the extracted iris region is transformed into a standardized format, ensuring consistency across different iris images. These three stages together form the complete process of generating a biometric iris template.

Submit
127. Izaberite kriptografske protkole:

Explanation

The given answer includes three cryptographic protocols: SSL, Kerberos, and GSM. SSL (Secure Sockets Layer) is a widely used protocol for securing internet connections and encrypting data. Kerberos is a network authentication protocol that provides secure communication over a non-secure network. GSM (Global System for Mobile Communications) is a standard for mobile communication that includes encryption algorithms for secure voice and data transmission. These protocols are commonly used in various applications to ensure secure and encrypted communication.

Submit
128. Izabrati sloj kom pripada WPA (Kontrola pristupa):

Explanation

The correct answer is "Link podataka." The Link podataka layer is responsible for the physical transmission of data between network nodes and includes protocols such as Ethernet. It ensures reliable and error-free communication over the physical medium, such as cables or wireless connections. The WPA (Wireless Protected Access) protocol is a security protocol that operates at the Link podataka layer to provide secure access to wireless networks.

Submit
129. Bezbednost u Wiretap kanalu oznacava:

Explanation

The correct answer states that security in the Wiretap channel means that Eve's information about the message M must approach zero as the block length increases. This means that as the size of the blocks of the message increases, Eve should have less and less information about the actual content of the message. This ensures that the message remains secure and cannot be easily intercepted or decoded by an unauthorized party.

Submit
130. Otpornost kod zastitnih protkola podrazumeva: 

Explanation

The correct answer suggests that resistance in protective protocols requires the ability to function even when the environment changes and remain stable during an attack. This means that the protocols should be able to adapt to different conditions and continue to operate effectively. Additionally, they should be able to withstand attacks without compromising their stability.

Submit
131. Uloga randomizirane kodne seme u Wiretap kanalu je:

Explanation

The correct answer is that the randomized code word X reveals very little or no information to Eve about the transmitted message M. This means that even if Eve intercepts the code word, she will not be able to gain much or any information about the original message being sent. This is an important property in secure communication systems, as it helps to protect the confidentiality of the message from unauthorized parties.

Submit
132. Koja tehnika se cesto koristi u fazi segmentacije irisa?

Explanation

The correct answer is Hafov algoritam. Hafov algoritam, also known as Hough algorithm, is commonly used in iris segmentation. This algorithm helps in detecting the circular shape of the iris and extracting it from the rest of the eye image. By using the Hough algorithm, the boundaries of the iris can be accurately identified, which is crucial for various applications such as biometric identification systems.

Submit
133. Satelitski scenario je:

Explanation

The correct answer is that the satellite scenario is impossible if the error of the attacker is smaller than the error of the legitimate participants in the protocol. This means that even if the attacker makes a smaller error, it is still not possible to achieve the satellite scenario.

Submit
134. Na slici je prikazan:

Explanation

The correct answer is "Dogovor o tajnom kljucu na osnovu modela izvora i kanala." This means that the agreement for a secret key is based on the model of the source and the channel. In other words, the secret key is generated using information about how the source data is transmitted through the channel. This method ensures that the key is secure and can be used for encryption and decryption between the sender and receiver.

Submit
135. Kod protokola za generisanje i distribuciju kljuceva na fizickom nivou, u slucaju da je Eva aktivni prisluskivac:

Explanation

In the given question, the correct answer is "Eva moze kompromitovati izlozene bezbednosne mehanizme". This means that Eva can compromise the exposed security mechanisms. The other provided options are not possible because Eva can falsely represent herself, which means that all previous scenarios are not possible.

Submit
136. Wiretap kanal Cn: 

Explanation

The correct answer is "Moze se smatrati procedurom izdvajanja zajednickog tajnog kljuca" because a wiretap channel is a method of extracting a shared secret key.

Submit
137. Efikasnost kod zastitnih protokola podrazumeva: 

Explanation

The correct answer is a combination of three options: Minimizacija propusnog opsega, Minimizacija racunarskih zahteva posebno u pogledu skupih operacija vezanih za javne kljuceve, and Minimizacija kasnjenja. This means that efficiency in protective protocols involves reducing the bandwidth usage, minimizing computational requirements, especially for expensive operations related to public keys, and minimizing delays. These measures ensure that the protocols can effectively handle attacks, adapt to changing environments, and perform efficiently in terms of resource utilization and response time.

Submit
138. Sta predstavlja prokol na slici?

Explanation

The correct answer is "Razmenu sesijskog kljuca preko javnog kljuca". This is because the question asks what the "prokol" represents in the picture. The term "razmenu sesijskog kljuca preko javnog kljuca" translates to "exchange of session key using public key", which is a cryptographic protocol used for secure communication. The other option, "Razmenu sesijskog kljuca bez uzajamne autentifikacije", translates to "exchange of session key without mutual authentication", which is not mentioned in the question. Therefore, the correct answer is the option that is mentioned in the question.

Submit
139. Na slici je prikazan: 

Explanation

The correct answer is "Binarni komunikacioni wiretap kanal sa brisanjem" and "Kanal za bezbedno komuniciranje sa sumom". This suggests that the image represents a binary communication wiretap channel with erasure and a channel for secure communication with noise.

Submit
140. Ukoliko su poslati datagrami vec zasticeni kriptografskim metodama:

Explanation

If the datagrams are already protected by cryptographic methods, secure channel codes actually prevent Eve from obtaining the cipher with errors. This means that secure channel codes ensure that Eve cannot obtain the cipher with any errors, ensuring the integrity and accuracy of the transmitted message.

Submit
141. Klijenti u Kerberos protkolu: ??

Explanation

The correct answer is that clients in the Kerberos protocol have encrypted communication in the network and share the key with the KDC (Key Distribution Center). This means that the clients use encryption to ensure that their communication cannot be intercepted or read by unauthorized parties. Additionally, they share the key with the KDC, which is responsible for issuing tickets and granting access to network resources based on authentication.

Submit
142. U modelu kanala za dogovor o tajnom kljucu brodkast kanal:

Explanation

The correct answer explains that the U channel model for secret key agreement is used not only for communication but also for generating randomness. This means that in addition to facilitating communication between parties, the U channel also plays a role in generating random values that are necessary for secure key generation.

Submit
143. Pouzdanost u Wiretap kanalu oznacava:

Explanation

The correct answer is "Da Bob treba da dekoduje Alisinu poruku poslatu po kanalu C1" which translates to "Bob needs to decode Alice's message sent through channel C1". This answer is the only option that is relevant to the concept of reliability in a wiretap channel. The other options do not mention reliability or the decoding of messages.

Submit
144. Generisanje zajednickog tajnog kljuca na fizickom nivou zahteva:

Explanation

Generating a shared secret key at the physical level requires two things: redesigning the driver for the wireless interface card and redesigning at the link layer. These two actions are necessary to ensure that the wireless interface card and the link layer are capable of generating and exchanging the shared secret key securely. The other options, such as redesigning at all layers and making modifications to the security and communication components of the operating system, are not specifically mentioned as requirements for generating the shared secret key at the physical level.

Submit
145. Izaberite tacnu tvrdnju:

Explanation

The correct answer is "Eva poznaje postupak kodovanja, kao i Bob i Alisa. Ne postoje nikakvi unapred uspostavljeni tajni kljucevi." This means that Eva, Bob, and Alisa all know the encoding process and there are no pre-established secret keys.

Submit
146. Sumovi koji postoje u iris kodu, nastali su usled:

Explanation

The correct answer is a combination of factors that contribute to the existence of noise in iris code. These factors include rotations of the eye in the eye socket, rotations of the camera, poor sensor quality, distortions of the pupil due to changes in lighting, and variations in iris size.

Submit
147. Izaberi sve faze Satelitskog scenarija:

Explanation

The correct answer is Usaglasavanje informacije, Destilacija prednosti, Pojacavanje privatnosti. These phases are all related to information management and security in a satellite scenario. Usaglasavanje informacije refers to the process of coordinating and synchronizing information between different components or systems. Destilacija prednosti involves extracting the most valuable or relevant information from a larger set of data. Pojacavanje privatnosti focuses on enhancing privacy and ensuring the confidentiality of information. These phases are important in ensuring the smooth operation and security of satellite systems.

Submit
148. Sta je rezultat vejvlet funkcije?

Explanation

The correct answer is "Biometrijski templejt, Informacija karakteristicna pojedincu." This answer suggests that the result of the wavelet function is a biometric template, which contains information that is characteristic to an individual. This indicates that the wavelet function is used in biometric systems for capturing and analyzing unique characteristics of individuals for identification or authentication purposes.

Submit
149. Tiket u Kerberos protokolu sadrzi:  

Explanation

The ticket in the Kerberos protocol contains a session key, a timestamp, and a symmetric key for communication with another client in the network. These components are essential for secure authentication and communication between clients in the Kerberos system. The session key is used to encrypt and decrypt messages between the client and the server, ensuring confidentiality. The timestamp is used to prevent replay attacks by ensuring that the ticket is valid only for a specific period of time. The symmetric key for communication with another client allows secure communication between clients within the network.

Submit
150. Izabrati dva modela u okviru kojih su razvijeni razliciti sekvencijalni postupci dogovora o tajnom kljucu:

Explanation

The correct answer is Model kanala za dogovor o tajnom ključu and Model izvora informacija za dogovor o tajnom ključu. These two models are the ones within which different sequential key agreement procedures have been developed.

Submit
151. U Satelitskom scenariju, protkol za izdvajanje prednosti:

Explanation

The correct answer is "Njegov kvalitet mozemo karakterisati sa brzinom izdvajanja prednosti" which translates to "Its quality can be characterized by the speed of prioritization." This answer suggests that in the Satellite scenario, the protocol's quality is determined by how quickly it can prioritize certain tasks or data.

Submit
152. Kod protokola za generisanje i distribuciju kljuceva na fizickom nivou, problem autentifikacije je moguce resiti: 

Explanation

In the protocol for generating and distributing keys at the physical level, the problem of authentication can be solved using public keys. Public key cryptography allows for secure communication and authentication by using a pair of keys - a public key for encryption and a private key for decryption. The use of public keys ensures that only the intended recipient can decrypt the message, providing authentication and confidentiality.

Submit
153. Kod protokola za generisanje i distribuciju kljceva na fizickom nivou, u slucaju da je Eva pasivni prisluskivac: 

Explanation

The correct answer is "Eva ne moze kompromitovati izlozene bezbednosne mehanizme". This means that Eva cannot compromise the exposed security mechanisms. The other option, "Svi prethodni scenariji su moguci, jer Eva ne moze lazno da se predstavlja", states that all previous scenarios are possible because Eva cannot falsely represent herself. However, this contradicts the first statement, as Eva's ability to compromise security mechanisms would make all previous scenarios possible. Therefore, the correct answer is that Eva cannot compromise the exposed security mechanisms.

Submit
154. Bezbedne kanalske kodove je moguce implementirati:

Explanation

Bezbedne kanalske kodove je moguće implementirati nezavisno od bezbednosne arhitekture viših slojeva. This means that the implementation of secure channel codes does not depend on the security architecture of higher layers. The use of secure channel codes can be independent of the security measures implemented in the higher layers of the system.

Submit
155. Izaberite tacnu tvrdnju:

Explanation

The statement says that codes in the wiretap channel do not require a previously exchanged secret key. This means that the codes used in the wiretap channel can be transmitted without the need for a secret key that has been exchanged beforehand.

Submit
156. Na slici je prikazano: 

Explanation

The correct answer is "Kodovanje izvora sa dodatnom informacijom pomocu sindroma linearnih kodova" because the image represents the process of encoding a source with additional information using linear code syndromes. This means that the original source is encoded with extra information using linear code techniques.

Submit
157. Transformacioni jednosmerni domen u Wiretap-u podrazumeva: ??

Explanation

The correct answer is "Nista od navedenog" which translates to "None of the above" in English. This means that the transformation of the unidirectional domain in Wiretap does not involve any of the options mentioned, such as random distribution, privacy enhancement, or equalization of information.

Submit
158. Kerberos protkol, koristi se za: 

Explanation

Kerberos protocol is used for authentication of users in a network and for exchanging keys. It provides a secure way for users to prove their identities and access network resources. By authenticating users, Kerberos ensures that only authorized individuals can access the network. Additionally, it facilitates the exchange of encryption keys between users and network services, enabling secure communication.

Submit
159. Izabrati faze za izdvjanje tajnog kljuca:

Explanation

not-available-via-ai

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 10, 2019
    Quiz Created by
    Catherine Halcomb
Cancel
  • All
    All (159)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Na slici je prikazana: 
Na slici je prikazana biometrija: 
Vremenski pecat je najcesce koriscen u:
"Daugman's Rubber Sheet Model" koristi se za:
Protokoli za uzajamnu autentifikaciju su simetricnim kljucevima:
Najzastupljeniji format digitalnih sertifikata je:
Na slici je prikazan:
Emitovanje sa drugih uredjaja i sa drugih pozicija uvek
U protokolu za autentifikaciju sa javnim kljucem:
Ocekivano rastojanje za dva slucajno generisana binarna niza je:
Koliko faza protkola je prikazano na slici? 
Protokol za autentifikaciju moze zahtevati uspostavu:
Ukoliko se u autentifikaciji koristi simetricni kljuc za...
Tiketi u Kerberos protkolu su:
Satelitski scenario je protokol koji se sastoji iz:
U Kerberos protkolu pomocni tiket koji se koristi za pristup mreznim...
Jedini uslov za bezbedan rad Wajnerovog Wire-Tap kanala je: 
Alisa se autentifikovala pred Bobom preko digitalnog potpisa, ako Bob...
Razlog zbog cega server od klijenta trazi sertifikat u SSL protkolu...
Koji napadi su moguci na protkol sa slike: 
Autentifikacija moze biti zasnovana na necemu sto:
PFS podrazumeva:
Formulom na slici predstavljena je: 
U protkolu za autentifikaciju sa simetricnim kljucem:
Glavni problem u WEP protokolu je;
Ukoliko je lozinka smislena i sastavljena na osnovu 256 ASCII...
Kerberos protokol za N broj korisnika generise:
Autentifikacija preko Kerberos protokola zasnovana je na:
Tehnika koja se koristi za proces segmentacije je:
U protokolu za autentifikaciju sa vremenskim pecatom prvo:
Postupak kreiranja digitalnog potpisa se sastoji iz dve faze. U drugoj...
U primeru kod VEB stranice www.amazon.com:
Dizajn kog protokola je prikazan na slici?
Izabrati fizicke fenomene koje mogu da monitorisu uredjaj u sezonskim...
Sta je podrazumevano pod fazom za normalizaciju irisa?
Gde je primena WEP protkola?
Na slici je prikazana integracija sistema na: 
Na slici Wynerovog wiretap kanala, R predstavlja: 
Izabrati sloj kom pripada bezbednost na fizickom sloju:
U fazi kodovanja biometrije irisa koristi se transformacija: 
Koja faza protokola je prikazana na slici? 
Izabrati sloj kom pripada IPSec (Virtuelne privatne mreze):
Za implementaciju PFS u zastitni protkol, koristi se:
Satelitski scenario nije moguc kada je: 
Kriticna tacka Kerberos protkola je:
Kod protokola za generisanje i distribuciju kljuceva na fizickom...
Satelitski scenario sluzi za razmenu:
U procesu za kodovanje irisa koriste se:
U protokolu za autentifikaciju sa javnim kljucem:
Nakon razmenjene specifikacije, u prvoj fazi SSL protkola:
Geometrija dlana je:   ???
U SSL protkolu, sertifikat koji salje server klijentu sadrzi:
Na slici je prikazan: 
Izaberite biometrijske izvore?
Za ulogu kriptoloskog kljuca kod kriptografskih algoritama:
U protokolu na slici: 
Napad zasnovan na ponavljanju poruke u autentifikacionim protkolima,...
Wajnerov Wire-Tap kanal je protokol za razmenu: 
U primeru sa binarnim wiretap kanalom sa brisanjem, ako Eva observira...
Sesijski kljuc je:
Koja je velicina IV u RC4 algoritmu
U SSL protkolu, server:
Multimodalna biometrija je upotreba:
Koji scenario je prikazan na slici?
Fizicki fenomeni koje mogu da monitorisu uredjaji u senzorskim...
Procena impulsnog odziva kanala vrsi se:
Svaki tiket u Kerberos protokolu je sifrovan sa:
U bezicnim senzorskim mrezama, uredjaji mogu da monitrisu:
Prikazani protokol na slici obezbedjuje: 
Proces kodovanja biometrijskog izvora predstavlja:
Na slici je prikazan kod: 
Formula na slici predstavlja kapacitet: 
Kod protokola za generisanje i distribuciju kljuceva na fizickom...
Kod protokola za generisanje i distribuciju kljuceva na fizickom...
Cemu je jednak kapacitet tajnosti vajnerovog kanala?
Koje kriterijume treba zadovoljiti u Wiretap kanalu?
Bezbedne kanalske kodove je moguce implementirati u:
Na slici je prikazana: 
Uvodjenjem Wiretap kodova smanjuje se: 
Autentifikacija moze biti zasnovana na:
Promena kljuca u WEP protokolu je: 
U dizajnu protokola sa slike: 
Na slici je prikazana: 
U dizajnu protokola na slici
Veliki problem u WEP protokolu predstavlja: 
Ukoliko server opciono zahteva od klijenta sertifikat, to znaci da je...
Koja faza je prikazana na slici u procesu generisanja biometrijskog...
LDPC kodovi:
Kapacitet tajnosti u Wiretap kanalu predstavlja: 
Na slici je prikazan princip: 
Broj radijalnih vektora u procesu normalizacije predstavlja: 
U fazi pojacavanja privatnosti:
WEP protokol predstavlja primer klasicnog:
Provera autenticnosti u SSL protokolu nakon uspostavljene sesije...
U Satelitskom scenariju kod faze izdvajanja prednosti:
Izaberi alate za kriptoanalizu WEP protkola: 
Izaberite tacnu tvrdnju:
Uz pomoc Wiretap kanala:
Klijenti Kerberos protokola za pristup nekom mreznom resursu...
Autentifikacija preko mreze je daleko kompleksnija, razlog tome...
Kod protokola za generisanja i distribuciju kljuceva na fizickom...
Pojacavanje privatnosti u satelitskom scenariju je:
Izabrati sloj kom pripada End to End kriptografija:
Perfektna tajnost (PFS) podrazumeva da Trudi:
Kod protokola za generisanje i distribuciju kljuceva na fizickom...
Verifikovanje digitalnog potpisa obavlja se preko:
Pojacavanje privatnosti podrazumeva:
Kod protokola za generisanje i distribuciju kljuceva na fizickom...
Uloga Gabor vejvleta je da:
U semi kodovanja zasnovanoj na kosetima:
Jednostavan metod za razbijanje WEP protokola je: 
Direktna primena klasicnih kriptoanalitickih metoda na wiretap kanal:
Kod protokola za generisanje i distribuciju kljuceva na fizickom...
Sta podrazumevamo pod fazom za segmentaciju irisa?
Verifikacijom potpisa na sertifikatu istovremeno se: 
Model kanala za dogovor o tajnom kljucu podrazumeva :
Sa aspekta implementacije WEP protokol predstavlja: 
CRC (cyclic redudancy check): ???
Izabrati sloj kom pripada SSL (Secure Socket Layer):
Na slici je predstavljen: 
Prikazani fragment koda predstavlja: 
Kompresija pre sifrovanja u SSL protkolu je:
Buduci da emitovanje sa drugih uredjaja i sa drugih pozicija uvek daje...
Uloga wiretap kodova je: 
U Wynerovom wiretap kanalu, performanse pouzdanosti prenosa se mere:
Kompletan proces za generisanje biometrijskog templejta irisa obuhvata...
Izaberite kriptografske protkole:
Izabrati sloj kom pripada WPA (Kontrola pristupa):
Bezbednost u Wiretap kanalu oznacava:
Otpornost kod zastitnih protkola podrazumeva: 
Uloga randomizirane kodne seme u Wiretap kanalu je:
Koja tehnika se cesto koristi u fazi segmentacije irisa?
Satelitski scenario je:
Na slici je prikazan:
Kod protokola za generisanje i distribuciju kljuceva na fizickom...
Wiretap kanal Cn: 
Efikasnost kod zastitnih protokola podrazumeva: 
Sta predstavlja prokol na slici?
Na slici je prikazan: 
Ukoliko su poslati datagrami vec zasticeni kriptografskim metodama:
Klijenti u Kerberos protkolu: ??
U modelu kanala za dogovor o tajnom kljucu brodkast kanal:
Pouzdanost u Wiretap kanalu oznacava:
Generisanje zajednickog tajnog kljuca na fizickom nivou zahteva:
Izaberite tacnu tvrdnju:
Sumovi koji postoje u iris kodu, nastali su usled:
Izaberi sve faze Satelitskog scenarija:
Sta je rezultat vejvlet funkcije?
Tiket u Kerberos protokolu sadrzi:  
Izabrati dva modela u okviru kojih su razvijeni razliciti...
U Satelitskom scenariju, protkol za izdvajanje prednosti:
Kod protokola za generisanje i distribuciju kljuceva na fizickom...
Kod protokola za generisanje i distribuciju kljceva na fizickom nivou,...
Bezbedne kanalske kodove je moguce implementirati:
Izaberite tacnu tvrdnju:
Na slici je prikazano: 
Transformacioni jednosmerni domen u Wiretap-u podrazumeva: ??
Kerberos protkol, koristi se za: 
Izabrati faze za izdvjanje tajnog kljuca:
Alert!

Advertisement