Računarske Mreže - Ispit (Prvi Deo)

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Shonez
S
Shonez
Community Contributor
Quizzes Created: 3 | Total Attempts: 6,649
| Attempts: 1,159 | Pitanja: 132
Please wait...

Question 1 / 132
0 %
0/100
Score 0/100
1. Opseg IPv4 adresa 192.0.0.0-223.255.255.255 je karakteristika:

Explanation

The given IPv4 address range, 192.0.0.0-223.255.255.255, falls within the range of Class C networks. In IPv4, IP addresses are divided into different classes based on their range. Class C networks have the first three octets reserved for network identification, while the last octet is used for host identification. The given address range starts with 192, which falls within the range of Class C networks. Therefore, the correct answer is C klase mreža.

Submit
Please wait...
About This Quiz
Računarske Mreže - Ispit (Prvi Deo) - Quiz

Personalize your quiz and earn a certificate with your name on it!
2. Ukoliko su prva tri bita mrežne adrese fiksirana na "110" u pitanju je:

Explanation

If the first three bits of the network address are fixed at "110", it indicates that it is a class C network. In classful addressing, the first octet of a class C network starts with binary "110". This means that the network can have a maximum of 2^21 (2,097,152) host addresses.

Submit
3. Rezervacija 24 bita za mrežu i 8 bitova za čvor je karakteristika:

Explanation

The given answer, "mreže klase C" (class C network), is correct because a class C network has 24 bits reserved for the network portion and 8 bits reserved for the host portion. This allows for a larger number of individual networks to be created, but with a smaller number of hosts per network compared to class A and B networks. Class C networks are typically used for smaller organizations or networks that do not require a large number of hosts.

Submit
4. Opseg IPv4 adresa 128.0.0.0-191.255.255.255 je karakteristika:

Explanation

The given range of IPv4 addresses, 128.0.0.0-191.255.255.255, falls within the range of Class B network addresses. Class B networks have a range of 128.0.0.0 to 191.255.255.255 and are typically used for medium-sized networks. They allow for a larger number of hosts compared to Class C networks, but not as many as Class A networks. Therefore, the correct answer is B klase mreža.

Submit
5. Opseg dinamičkih portova transportnog sloja je:

Explanation

The dynamic port range for the transport layer is 49152-65535. This range is reserved for dynamically allocated ports by applications and services. Ports within this range are used for establishing connections and transferring data between different devices on a network. The lower range of ports (0-1023) is reserved for well-known ports, while the range 1024-49151 is allocated for registered ports.

Submit
6. Opseg IPv4 adresa 0.0.0.0-127.255.255.255 je karakteristika:

Explanation

The given range of IPv4 addresses, 0.0.0.0-127.255.255.255, falls within the range of Class A network addresses. Class A networks have the first octet in the range of 0-127, which matches the given range. Class A networks have a large number of available IP addresses, as they use only the first octet to identify the network, allowing for a maximum of 16,777,214 hosts per network. Therefore, the correct answer is A klase mreža.

Submit
7. Ukoliko su prva dva bita mrežne adrese fiksirana na "10" u pitanju je:

Explanation

If the first two bits of the network address are fixed at "10", then it indicates that it is a network of class B. In classful addressing, the first bit of the network address determines the class, and for class B networks, the first two bits are always "10". Class B networks have a larger range of IP addresses compared to class A networks but smaller than class C networks.

Submit
8. Rezervacija 16 bitova za mrežu i 16 bitova za čvor je karakteristika:

Explanation

The given answer suggests that the reservation of 16 bits for the network and 16 bits for the host is a characteristic of class B networks. In class B networks, the first 16 bits are reserved for the network address, allowing for a large number of networks with a moderate number of hosts in each network. This allocation of bits allows for a larger number of hosts compared to class C networks, which only reserve 8 bits for the host. Class A networks, on the other hand, reserve the first 8 bits for the network, allowing for a smaller number of networks with a large number of hosts in each network.

Submit
9. IGMP je protokol (OSI i TCP/IP):

Explanation

IGMP (Internet Group Management Protocol) is a protocol used in TCP/IP networks to manage multicast group memberships. It operates at the network layer (also known as the internet layer) of the OSI and TCP/IP models. This layer is responsible for addressing, routing, and forwarding data packets across different networks. IGMP enables hosts to join and leave multicast groups, allowing them to receive multicast traffic. Therefore, the correct answer is "mrežnog sloja" which translates to "network layer" in English.

Submit
10. IPX je protokol (OSI i TCP/IP):

Explanation

IPX je protokol koji pripada mrežnom sloju. Mrežni sloj je odgovoran za uspostavljanje, održavanje i prekid veza između različitih mreža. IPX protokol se koristi za rutiranje podataka između računara u mreži i omogućava im da komuniciraju međusobno. Ovo ga svrstava u mrežni sloj OSI modela i TCP/IP protokola.

Submit
11. IPsec je protokol (OSI i TCP/IP):

Explanation

IPsec (Internet Protocol Security) is a protocol that operates at the network layer of the OSI and TCP/IP models. It provides security services such as authentication, integrity, and confidentiality for IP packets. By operating at the network layer, IPsec can protect all traffic that is sent over an IP network, regardless of the transport layer protocol being used. This makes it suitable for securing network-to-network or host-to-network communications. Therefore, the correct answer is mrežnog sloja (network layer).

Submit
12. Osnovna jedinica za prenos podataka na mrežnom sloju je:

Explanation

The correct answer is "Paket". On the network layer, data is divided into packets for transmission. A packet is a unit of data that contains the necessary information for routing and delivery across the network. It includes the source and destination IP addresses, as well as the actual data being transmitted. Packets are used to efficiently transmit data over the network, allowing for reliable and optimized communication between devices.

Submit
13. Uređaj koji radi u mrežnom sloju je:

Explanation

A router is a device that operates in the network layer of the OSI model. It is responsible for forwarding data packets between different networks, making decisions based on the destination IP address. Routers are used to connect multiple networks together and facilitate the flow of data between them. Unlike switches and hubs, routers can determine the best path for data transmission and perform network address translation (NAT) to allow multiple devices to share a single public IP address. Therefore, a router is the correct answer as it operates at the network layer.

Submit
14. Mrežni sloj je odgovoran za:

Explanation

The correct answer is "Prosleđivanje paketa sa jednog do drugog kraja mreže" (Forwarding packets from one end of the network to the other). The network layer is responsible for routing and forwarding data packets across different networks or subnetworks. It determines the best path for data transmission and ensures that packets reach their intended destination. This layer also handles addressing and logical network topology.

Submit
15. Parametar "Hop Limit" IPv6 paketa može se porediti sa IPv4 parametrom:

Explanation

The "Hop Limit" parameter in IPv6 packets is comparable to the "Time to Live" parameter in IPv4. Both parameters serve the same purpose of limiting the lifespan of a packet and preventing it from circulating indefinitely in the network. The value of the Hop Limit parameter is decremented by each router the packet passes through, and once it reaches zero, the packet is discarded. Similarly, the Time to Live parameter in IPv4 serves to limit the number of hops a packet can take before being discarded.

Submit
16. SCTP protokol je protokol:

Explanation

The correct answer is "transportnog sloja" because SCTP (Stream Control Transmission Protocol) is a transport layer protocol. The transport layer is responsible for the reliable and efficient delivery of data between network hosts. SCTP is designed to provide features such as multi-homing, message-oriented communication, and support for both reliable and unordered delivery of data.

Submit
17. Mrežni sloj je odgovoran za:

Explanation

The correct answer states that the network layer is responsible for forwarding packets from one end of the network to the other. This means that the network layer handles the routing of packets, ensuring that they are delivered to the correct destination within the network. It is responsible for determining the optimal path for packet transmission and managing the addressing and routing protocols required for this task.

Submit
18. Prenos podataka kod TCP protokola je:

Explanation

The correct answer is full-duplex because in TCP protocol, data transmission can occur simultaneously in both directions. This means that the sender can send data while the receiver is also sending data at the same time. This allows for more efficient and faster communication compared to half-duplex or simplex transmission where data can only flow in one direction at a time.

Submit
19. Glavni problem koji rešava IPv6 u odnosu na IPv4 je:

Explanation

IPv6 solves the main problem of address exhaustion that exists in IPv4. With IPv6, the address space is significantly larger, allowing for a much larger number of unique IP addresses to be assigned. This is important as the number of devices connected to the internet continues to grow. By providing a larger address space, IPv6 ensures that there are enough addresses available for all devices, both now and in the future.

Submit
20. Aktivna mrežna oprema sa podrškom za 3. sloj (Layer 3) projektovana za IPv4 može se koristiti i za IPv6:

Explanation

Active network equipment with support for Layer 3 is designed to handle IP routing. IPv4 and IPv6 are both network layer protocols, so if the equipment is capable of handling IPv4, it can also handle IPv6. Therefore, the answer is "Da" (Yes).

Submit
21. TCP protokol zahteva potvrdu o isporuci svakog poslatog segmenta.

Explanation

The statement is true because the TCP protocol does require an acknowledgment of delivery for every sent segment. This acknowledgment ensures that the data sent by the sender is received correctly by the receiver. Without this acknowledgment, the sender would not know if the data reached its intended destination, leading to potential data loss or errors in transmission. Therefore, the statement is correct.

Submit
22. UDP protokol je protokol:

Explanation

UDP (User Datagram Protocol) is a transport layer protocol. It is one of the core protocols in the Internet protocol suite and is responsible for the transportation of data packets between applications on devices connected to a network. Unlike TCP (Transmission Control Protocol), UDP is a connectionless protocol that does not provide error checking or reliable delivery of data. It is commonly used for applications that require fast transmission of data, such as streaming media or online gaming. Therefore, the correct answer is transportnog sloja.

Submit
23. iSCSI protokol je protokol:

Explanation

The iSCSI protocol is a protocol that operates at the transport layer. This layer is responsible for the reliable delivery of data between network devices. iSCSI allows for the transmission of SCSI commands and data over IP networks, enabling the use of storage devices over a network. It uses TCP/IP as the underlying transport protocol, ensuring reliable and ordered delivery of data packets. Therefore, the correct answer is transportnog sloja.

Submit
24. Ukoliko ruter dobije multicast poruku, određivanje lokalnih primalaca se određuje pomoću:

Explanation

IGMP (Internet Group Management Protocol) is used to manage multicast group memberships on an IP network. When a router receives a multicast message, it uses IGMP to determine which local hosts are interested in receiving the message. IGMP allows hosts to join or leave multicast groups, and routers use this information to forward multicast traffic only to the interested hosts. Therefore, the correct answer is IGMP protocol.

Submit
25. Ukoliko su prva dva bita mrežne adrese fiksirana na "01" u pitanju je:

Explanation

The given information states that the first two bits of the network address are fixed at "01". In classful addressing, the first two bits of a class A network address are always "0 0". Therefore, if the first two bits are "01", it indicates that the network is a class A network.

Submit
26. TCP protokol poseduje mehanizam za eliminisanje istih segmenata koji su isporučeni više puta.

Explanation

The statement is correct. The TCP protocol has a mechanism for eliminating duplicate segments that have been delivered multiple times. This mechanism is called the duplicate acknowledgment mechanism. When a duplicate segment is received, the receiver sends an acknowledgment indicating that it has already received that segment. The sender then knows that the segment has been successfully delivered and does not need to be sent again. This helps to ensure the reliable delivery of data over the TCP connection.

Submit
27. Osim IPv4 adrese za uspešno adresiranje je neophodno imati i:

Explanation

In addition to IPv4 addresses, it is necessary to have a subnet mask for successful addressing. The subnet mask is used to determine the network portion of an IP address and the host portion. It helps in identifying which part of the IP address belongs to the network and which part belongs to the host. Without a subnet mask, it would not be possible to properly allocate IP addresses and establish communication within a network.

Submit
28. CIDR zapis mrežne maske "255.255.255.224" je:

Explanation

The CIDR notation "/27" represents the network mask "255.255.255.224". This notation indicates that the first 27 bits in the IP address are used to represent the network portion, while the remaining 5 bits are used for host addressing. This means that there are 32 IP addresses in total, with 30 usable for hosts in the network.

Submit
29. TCP protokol poseduje mehanizam za usklađivanje brzine slanja sa prihvatnom moći primaoca.

Explanation

TCP protokol poseduje mehanizam za usklađivanje brzine slanja sa prihvatnom moći primaoca. This statement is correct. TCP (Transmission Control Protocol) has a mechanism called "congestion control" that allows it to adjust the transmission rate based on the receiver's ability to handle the data. This helps prevent network congestion and ensures that the receiver can receive and process the data efficiently.

Submit
30. ICMP je protokol (OSI i TCP/IP):

Explanation

ICMP stands for Internet Control Message Protocol, which is a protocol used in the network layer of the OSI and TCP/IP models. It is responsible for sending error messages and operational information about network conditions. ICMP operates directly on top of IP (Internet Protocol), which is a network layer protocol. Therefore, the correct answer is "mrežnog sloja" (network layer).

Submit
31. iSCSI protokol se uglavnom koristi na:

Explanation

iSCSI protokol se uglavnom koristi na gigabit mrežama jer je gigabit mreža brža od 100Mb i 10Mb mreža. iSCSI je protokol za prenos blokova podataka preko IP mreže, koji se često koristi za povezivanje udaljenih skladišta podataka (storage) sa serverima. Gigabit mreže omogućavaju veću propusnost i brži prenos podataka, što je posebno važno za prenos velikih blokova podataka koji se koriste u skladištima podataka.

Submit
32. Skraćenica TCP označava:

Explanation

TCP stands for Transmission Control Protocol. It is a standard protocol used for transmitting data over networks. TCP ensures reliable and ordered delivery of data packets from one device to another. It provides error checking, flow control, and congestion control mechanisms to ensure that data is transmitted accurately and efficiently. TCP is a fundamental protocol in the TCP/IP suite, which is the basis of the internet.

Submit
33. IPv4 je protokol (OSI i TCP/IP):

Explanation

IPv4 is a protocol that operates at the network layer of the OSI and TCP/IP models. The network layer is responsible for routing packets across different networks and establishing logical connections between devices. IPv4 provides the addressing scheme used to identify devices on a network and enables the delivery of packets from the source to the destination. Therefore, it is correct to say that IPv4 operates at the network layer.

Submit
34. IP adresa po standardu IPv4 sadrži:

Explanation

An IP address in the standard IPv4 is used to identify a computer within a network. It is a unique numerical label assigned to each device connected to a network. This allows for the proper routing of data packets between devices and enables communication between them. The IP address does not contain information about the manufacturer of the Ethernet card, its serial number, the user's identification or password, or the country or network identification.

Submit
35. IPv6 je protokol (OSI i TCP/IP):

Explanation

IPv6 is a protocol that operates at the network layer of the OSI and TCP/IP models. The network layer is responsible for routing packets across different networks and establishing end-to-end connections. IPv6, as a network layer protocol, provides unique IP addresses to devices and enables them to communicate with each other over the internet. It also supports features such as improved security, larger address space, and better performance compared to its predecessor, IPv4. Therefore, the correct answer is "mrežnog sloja" which translates to "network layer" in English.

Submit
36. SPX protokol se najčešće koristi u kombinaciji sa:

Explanation

SPX (Sequenced Packet Exchange) protocol is most commonly used in combination with the IPX (Internetwork Packet Exchange) protocol. The IPX protocol is a network layer protocol that is used in Novell NetWare networks. It provides routing and addressing capabilities for communication between network devices. SPX, on the other hand, is a transport layer protocol that operates on top of IPX. It provides reliable and sequenced delivery of data packets between applications running on different devices in the network. Therefore, the correct answer is IPX protokolom.

Submit
37. Organizacija zadužena za standardizaciju portova transportnog protokola je:

Explanation

The correct answer is IANA. IANA (Internet Assigned Numbers Authority) is responsible for standardizing transport protocol ports. They allocate and maintain unique port numbers for various protocols to ensure smooth communication between different devices and networks. IETF (Internet Engineering Task Force) is responsible for developing and promoting internet standards, while IEEE (Institute of Electrical and Electronics Engineers) is an organization that focuses on the advancement of technology in various fields, including networking and communications.

Submit
38. Vrste decentralizovanog rutiranja su:

Explanation

The correct answer is static routing and dynamic routing. Static routing refers to the process of manually configuring the routes in a network, where the network administrator defines the paths that the data packets should take. Dynamic routing, on the other hand, is a more automated approach where routers exchange information with each other to determine the best path for data packets to reach their destination.

Submit
39. Rezervacija 8 bitova za mrežu i 14 bita za čvor je karakteristika:

Explanation

The given answer, "mreže klase A" (Class A network), is correct because it mentions the allocation of 8 bits for the network and 14 bits for the host. In Class A networks, the first octet is reserved for the network, allowing for a large number of networks (2^7) and a smaller number of hosts per network (2^14). This allocation scheme is consistent with the given information of 8 bits for the network and 14 bits for the host.

Submit
40. SACK opcija TCP protokola služi za povećanje performansi.

Explanation

The SACK (Selective Acknowledgment) option in TCP protocol is used to improve performance by allowing the receiver to inform the sender about the specific segments that have been received successfully. This helps in reducing the number of retransmissions and allows for faster data transmission. Therefore, the statement "SACK opcija TCP protokola služi za povećanje performansi" (SACK option of the TCP protocol is used to increase performance) is correct.

Submit
41. Opseg registrovanih portova transportnog sloja je:

Explanation

The correct answer is 1024-49151. This range represents the registered ports of the transport layer. Registered ports are used by applications and services that have been officially registered with the Internet Assigned Numbers Authority (IANA). These ports are commonly used for protocols such as FTP, SSH, and HTTP. The range of 1024-49151 allows for a large number of ports to be allocated to different applications while still leaving room for dynamic or ephemeral ports (49152-65535) and well-known ports (0-1023).

Submit
42. SPX protokol je protokol:

Explanation

The correct answer is "transportnog sloja" because the SPX protocol is a transport layer protocol. The transport layer is responsible for the reliable delivery of data between end systems, providing services such as segmentation, flow control, and error recovery.

Submit
43. ICMP je skraćenica od:

Explanation

ICMP stands for Internet Control Message Protocol. ICMP is a network protocol used by network devices, such as routers, to send error messages and operational information about network conditions. It is primarily used for diagnostic and control purposes, such as reporting errors, testing network connectivity, and troubleshooting network issues. ICMP is an integral part of the Internet Protocol Suite and plays a crucial role in ensuring the smooth operation of network communications.

Submit
44. ICMP protokol ima mogućnost da utvrdi koliko je vremena utrošeno za ostvarivanje komunikacije:

Explanation

ICMP protokol ima mogućnost da utvrdi koliko je vremena utrošeno za ostvarivanje komunikacije. ICMP (Internet Control Message Protocol) je protokol koji se koristi za slanje poruka o greškama i upravljanje mrežnim uslugama. Jedna od funkcija ICMP protokola je slanje Echo Request i primanje Echo Reply poruka, koje se koriste za testiranje dostupnosti i latencije mrežnih veza. Na osnovu vremena između slanja zahteva i primanja odgovora, može se utvrditi koliko je vremena utrošeno za komunikaciju.

Submit
45. Tabele rutiranja određuju:

Explanation

Tabele rutiranja određuju najbolji sledeći skok na osnovu IP adrese odredišta u paketu. This means that routing tables determine the next hop for a packet based on the destination IP address. Routing tables are used by routers to make decisions on how to forward packets to their intended destinations. By examining the destination IP address in the packet header, the router consults its routing table to determine the best path for the packet to reach its destination. The routing table contains information about network prefixes and the corresponding next hop or interface to forward the packet.

Submit
46. Opseg privilegovanih portova transportnog sloja je:

Explanation

The privileged port range for the transport layer is from 0 to 1023. These ports are reserved for well-known services and protocols, such as HTTP (port 80) and HTTPS (port 443), which require elevated privileges to operate. By restricting these ports to privileged applications, it helps ensure that only authorized processes can use them, enhancing security and preventing unauthorized access to critical services.

Submit
47. Aktivan prekid veze (eng. active close) kod TCP protokola predstavlja:

Explanation

Aktivan prekid veze (eng. active close) kod TCP protokola predstavlja proces iniciranja prekida veze od strane jedne od komunikacionih strana. Ova strana aktivno šalje zahtev za prekid veze drugoj strani. Ovaj proces se obično koristi kada jedna strana završava komunikaciju i želi da prekine vezu. Nakon iniciranja prekida veze, druga strana može prihvatiti prekid i zatvoriti vezu, ili može odbiti prekid i nastaviti sa komunikacijom.

Submit
48. IKE skraćenica kod IPsec protokola označava:

Explanation

The correct answer is "Internet Key Exchange." IKE is an abbreviation used in IPsec (Internet Protocol Security) protocol, which is a set of cryptographic protocols used for securing internet communications. IKE is responsible for establishing a secure and authenticated communication channel by negotiating and exchanging encryption keys between two parties. It ensures the confidentiality, integrity, and authenticity of the data transmitted over the network.

Submit
49. Osnovna uloga IKE-a kod IPsec-a je:

Explanation

The correct answer for this question is "obezbeđivanje upravljanja ključevima". This means that the primary role of IKE (Internet Key Exchange) in IPsec (Internet Protocol Security) is to provide key management. IKE is responsible for establishing and negotiating the security associations and cryptographic keys used for secure communication between two entities. It ensures that both parties have the necessary keys to encrypt and decrypt the data, thus ensuring the confidentiality and integrity of the communication.

Submit
50. Skraćenica UDP označava:

Explanation

The correct answer is User Datagram Protocol. UDP is a transport layer protocol that provides a connectionless and unreliable communication service. It is used for sending datagrams in IP networks and is suitable for applications that require low overhead and real-time data transmission, such as streaming media or online gaming. Unlike TCP, UDP does not provide error checking or reliable delivery of data, making it faster but less reliable.

Submit
51. Prednost UDP protokola u odnosu na TCP je:

Explanation

UDP protocol has the advantage of supporting broadcasting. Broadcasting allows a single message to be sent to multiple recipients at once. This can be useful in scenarios where a message needs to be delivered to multiple devices or clients simultaneously. TCP, on the other hand, does not natively support broadcasting. Therefore, UDP is preferred in situations where broadcasting is required.

Submit
52. Neodvojivo adresiranje vezano za IGMP protokol je:

Explanation

The correct answer is multicast. In the context of the IGMP protocol, neodvojivo adresiranje refers to the addressing mode used for communication. Multicast addressing allows for the transmission of data packets to a group of devices that have joined a specific multicast group. This is different from unicast addressing, which is used for one-to-one communication, and anycast addressing, which is used for delivering a packet to the closest device among a group of potential receivers. Therefore, multicast is the appropriate addressing mode for IGMP protocol.

Submit
53. Osnovna prednost realizacije sistema za zaštitu podataka na mrežnom nivou (umesto na transportnom ili aplikativnom):

Explanation

The correct answer is "obuhvatanje svih protokola viših nivoa" which means "coverage of all higher-level protocols" in English. This means that implementing a data protection system at the network level would cover all protocols at higher levels, providing comprehensive protection for data. This is advantageous as it ensures that all types of data transmitted over the network are secured, regardless of the specific protocol being used.

Submit
54. Prenos IPv6 paketa putem IPv4 mreže je moguć:

Explanation

IPv6 paketi se mogu prenositi putem IPv4 mreže putem tunelovanja. Tunelovanje omogućava da se IPv6 paketi umota u IPv4 pakete kako bi se preneli preko IPv4 mreže. Na odredišnoj strani, IPv6 paketi se odmotavaju iz IPv4 paketa i dalje se rutiraju kao IPv6 paketi. Ovo omogućava komunikaciju između IPv6 mreža preko postojećih IPv4 mreža.

Submit
55. SPX protokol se uglavnom koristi kod: 

Explanation

SPX protocol is mainly used in Novell operating systems.

Submit
56. ICMP poruke:

Explanation

ICMP (Internet Control Message Protocol) messages are encapsulated within IP (Internet Protocol) datagrams. This means that ICMP messages are embedded or enclosed within IP packets and are transmitted over IP networks. ICMP messages are used for various network management purposes, such as error reporting and diagnostic functions. They are encapsulated within IP datagrams to ensure that they can be routed across the network and reach their intended destination. This encapsulation allows ICMP messages to be transmitted over IP networks effectively.

Submit
57. IPv4 adrese se najčešće predstavljaju:

Explanation

IPv4 adrese se najčešće predstavljaju decimalno jer se sastoje od četiri broja odvojena tačkama, pri čemu svaki broj može imati vrednost od 0 do 255. Ova notacija je lakša za čitanje i razumevanje od binarne ili heksadecimalne notacije. U decimalnoj notaciji, svaki broj predstavlja jedan oktet, dok se u binarnoj notaciji koriste nule i jedinice, a u heksadecimalnoj koriste cifre od 0 do 9 i slova od A do F.

Submit
58. Transmission Control Protocol (TCP) definiše da prekid veze može inicirati:

Explanation

Either side can initiate the termination of a Transmission Control Protocol (TCP) connection. This means that both the side that initiated the connection and the side that accepted the connection have the ability to end the connection.

Submit
59. Primer alata koji koristi ICMP protokol je:

Explanation

The correct answer is "Ping" because Ping is a tool that uses the ICMP (Internet Control Message Protocol) protocol. ICMP is used to send control messages and error reporting between network devices. Ping is commonly used to test the reachability of a host on an IP network and measure the round-trip time for messages sent from the originating host to a destination computer. TCP and Telnet are not tools that use the ICMP protocol.

Submit
60. Aktivno uspostavljanje veze (eng. active open) kod TCP protokola predstavlja:

Explanation

Aktivno uspostavljanje veze (eng. active open) kod TCP protokola se odnosi na proces iniciranja uspostavljanja veze. To znači da je početna strana, tj. klijent, ta koja pokreće postupak uspostavljanja veze sa drugom stranom, tj. serverom. Klijent šalje zahtev za uspostavljanje veze serveru, a server prihvata ovaj zahtev i odgovara na njega. Aktivno uspostavljanje veze omogućava klijentu da kontroliše proces uspostavljanja veze i da bude inicijator komunikacije.

Submit
61. Transmission Control Protocol (TCP) za uspostavljanje veze zahteva:

Explanation

TCP za uspostavljanje veze zahteva tri segmenta. Prvi segment je SYN (synchronize) segment koji se koristi za inicijalizaciju veze. Drugi segment je SYN-ACK (synchronize-acknowledgment) segment koji potvrđuje prijem SYN segmenta i šalje svoj SYN segment nazad. Treći segment je ACK (acknowledgment) segment koji potvrđuje prijem SYN-ACK segmenta i uspostavlja konačnu vezu. Ova trostepena razmena segmenata omogućava sigurno uspostavljanje veze između dva TCP čvora.

Submit
62. MSS skraćenica kod TCP protokola označava:

Explanation

The correct answer is "Maximum Segment Size." In TCP protocol, MSS stands for Maximum Segment Size. It refers to the largest amount of data that can be sent in a single TCP segment. This value is negotiated between the sender and receiver during the TCP handshake process and helps determine the optimal size for data transmission, taking into account factors such as network conditions and the maximum segment size supported by the receiving device.

Submit
63. UDP protokol se uglavnom koristi kod:

Explanation

UDP protokol se uglavnom koristi kod video konferencija. UDP (User Datagram Protocol) je protokol koji se koristi za brzu i efikasnu prenos podataka u mreži. Za razliku od TCP-a, UDP ne pruža pouzdanost i kontrolu nad isporukom podataka, ali je zbog toga brži i efikasniji. Video konferencije zahtevaju brz prenos podataka kako bi omogućile glatku i kvalitetnu komunikaciju između učesnika. UDP je idealan za ove svrhe jer omogućava brz prenos video podataka bez potrebe za kontrolom isporuke.

Submit
64. TCP protokol je protokol:

Explanation

The correct answer is transportnog sloja because TCP (Transmission Control Protocol) is a transport layer protocol. The transport layer is responsible for ensuring reliable and ordered delivery of data between hosts on a network. TCP provides reliable, connection-oriented communication by establishing a connection, breaking data into packets, and reassembling them at the destination. It also handles flow control and congestion control to optimize the transmission of data.

Submit
65. Which one do you like?

Explanation

The given question asks for a personal preference among the options provided. As there is no additional information given, the answer to this question is subjective and can vary from person to person. Therefore, the correct answer cannot be determined objectively.

Submit
66. Odbacivanje paketa na ruterima kao posledica velikog opterećenja, radi se na sledeći način:

Explanation

In the context of packet rejection on routers due to high load, the statement "U prenosu datoteka vredniji su stariji paketi" means that in file transfer, older packets are considered more valuable. On the other hand, the statement "Za multimedijalne aplikacije vredniji su noviji paketi" states that for multimedia applications, newer packets are considered more valuable. These statements explain the prioritization of packets based on their age in different scenarios, highlighting the importance of older packets in file transfer and newer packets in multimedia applications.

Submit
67. IP adresa u IPv4 ima dužinu od:

Explanation

The correct answer is 32 bita. In IPv4, an IP address is represented by a 32-bit binary number. This 32-bit number is divided into four octets, with each octet represented by 8 bits. Each octet is then converted to decimal form to create the familiar IPv4 address format, consisting of four numbers separated by periods. Therefore, an IPv4 address has a length of 32 bits.

Submit
68. Maksimalna moguća dužina IP paketa je:

Explanation

The maximum possible length of an IP packet is 64 KB. This means that the packet can contain up to 64 kilobytes of data. IP packets are used to transfer data over the internet, and they have a maximum size limit to ensure efficient transmission and prevent network congestion. A larger packet size would require more resources and could potentially cause delays or errors in the transmission. Therefore, 64 KB is the correct answer as it represents the maximum allowable size for an IP packet.

Submit
69. Skraćenica ISN kod TCP protokola predstavlja:

Explanation

The correct answer is Initial Sequence Number. The ISN code in TCP protocol represents the Initial Sequence Number. This number is used to identify the first byte of data in a TCP segment. It is randomly generated by the sender and helps in ensuring the reliable and ordered delivery of data packets in a TCP connection.

Submit
70. IPv6 adrese se najčešće predstavljaju:

Explanation

IPv6 adrese se najčešće predstavljaju heksadecimalno jer IPv6 adrese koriste 128-bitni format, što znači da se sastoje od 8 blokova po 16 bitova. Svaki blok se može predstaviti sa 4 heksadecimalne cifre, što omogućava lakšu čitljivost i upotrebu adresa. Heksadecimalni sistem ima bazu 16, što znači da se koriste cifre od 0 do 9 i slova od A do F. Ova notacija omogućava kompaktnije prikazivanje IPv6 adresa u odnosu na binarnu ili decimalnu notaciju.

Submit
71. Osnovna uloga IPsec protokola je:

Explanation

The correct answer is "povećanje bezbednosti prenosa podataka." IPsec protocol is primarily used to enhance the security of data transmission. It provides authentication, encryption, and integrity checks to ensure that the data being transmitted over the network remains secure and protected from unauthorized access or tampering. By implementing IPsec, organizations can establish secure communication channels and protect sensitive information from potential threats. This protocol plays a crucial role in safeguarding the confidentiality and integrity of data during transmission.

Submit
72. TTL parametar IPv4 protokola može prouzrokovati sledeću poruku u okviru ICMP protokola: 

Explanation

The TTL (Time to Live) parameter in the IPv4 protocol determines the maximum number of hops (routers) that a packet can traverse before being discarded. If the TTL value reaches zero, the router will discard the packet and send an ICMP message back to the source. This message is known as "Time Exceeded" and indicates that the packet has exceeded its allotted time to reach the destination.

Submit
73. IPX protokol se uglavnom koristi u kombinaciji sa: 

Explanation

The correct answer is SPX protocol. IPX (Internet Packet Exchange) protocol is commonly used in combination with SPX (Sequenced Packet Exchange) protocol. SPX is a transport layer protocol that provides reliable and sequenced delivery of packets. It is often used in Novell NetWare networks for communication between network devices. TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are other transport layer protocols that are used in combination with IP (Internet Protocol), but they are not specifically associated with IPX protocol.

Submit
74. CIDR zapis mrežne maske "255.255.248.0" je:

Explanation

The CIDR notation for the given subnet mask "255.255.248.0" is "/21". CIDR notation is used to represent the network prefix length, which indicates the number of network bits in the subnet mask. In this case, the subnet mask has 21 network bits and 11 host bits, resulting in a subnet with a total of 2,048 IP addresses.

Submit
75. Adrese IPv6 protokola imaju bitsku dužinu od:

Explanation

IPv6 addresses have a bit length of 128 bits. This is significantly longer than the previous version, IPv4, which had a bit length of 32 bits. The increase in bit length allows for a much larger number of unique addresses to be created, which is necessary due to the increasing number of devices connected to the internet. The longer bit length also provides better security and more efficient routing of network traffic.

Submit
76. UDP datagram u odnosu na TCP segment ima:

Explanation

UDP datagram ima jednostavniju strukturu u odnosu na TCP segment. UDP je protokol na nižem nivou u TCP/IP modelu i pruža osnovnu komunikaciju bez garancija isporuke, potvrda ili kontrole toka. UDP datagram je jednostavna poruka koja se sastoji od zaglavlja sa izvorom i odredištem, dužine i kontrolne sume, te korisničkih podataka. S druge strane, TCP segment pruža pouzdanu isporuku podataka, kontrolu toka, kontrolu grešaka i druge napredne funkcionalnosti, što rezultira kompleksnijom strukturom.

Submit
77. Dogovaranje veze (handshake) kod TCP prenosa realizuje se:

Explanation

The correct answer is "trostepeno" because TCP handshake involves a three-step process. The client sends a SYN (synchronize) packet to the server to initiate the connection. The server then responds with a SYN-ACK (synchronize-acknowledgment) packet to acknowledge the request and inform the client that it is ready to establish a connection. Finally, the client sends an ACK (acknowledgment) packet to confirm the connection. This three-step process ensures that both the client and server are synchronized and ready to exchange data.

Submit
78. Osnovna uloga ESP-a kod IPsec-a je: 

Explanation

The correct answer is "obezbeđivanje poverljivosti, obezbeđivanje autentičnosti i integriteta." This means that the primary role of ESP (Encapsulating Security Payload) in IPsec (Internet Protocol Security) is to provide confidentiality, authenticity, and integrity. ESP ensures that the data being transmitted is kept confidential, meaning it cannot be accessed or understood by unauthorized parties. It also verifies the authenticity of the sender and ensures that the data has not been tampered with during transmission, maintaining its integrity.

Submit
79. Jedinica za prenos podataka kod UDP protokola je:

Explanation

The correct answer is "datagram" because in UDP (User Datagram Protocol), data is divided into small units called datagrams before being transmitted over the network. Each datagram contains the necessary information for routing and delivery, such as the source and destination IP addresses. Unlike TCP, UDP does not guarantee the delivery or ordering of datagrams, making it a faster but less reliable protocol for data transmission.

Submit
80. IGMP poruke:

Explanation

The correct answer is "enkalsuliraju se u IP datagram". This means that IGMP messages are encapsulated within IP datagrams. This encapsulation allows IGMP messages to be sent over an IP network, ensuring that they can be properly routed and delivered to the intended recipients. By encapsulating IGMP messages within IP datagrams, they can be transmitted across different networks and devices that support IP communication. This helps in facilitating the communication between hosts and multicast routers in an IP multicast network.

Submit
81. IPX je skraćenica od:

Explanation

IPX is a networking protocol that was developed by Novell in the 1980s. It was primarily used in Novell NetWare networks for communication between computers. IPX stands for Internetwork Packet Exchange, which accurately describes its function of exchanging packets of data between different networks or internetworks. This protocol allowed for the routing of data packets across multiple networks, enabling communication between computers in different locations.

Submit
82.
  1. Krakteristično za fragment nekog paketa je da:

Explanation

The correct answer is option 1 because it states that every fragment always contains the complete header of the original packet. This means that even if a packet is fragmented into multiple smaller fragments during transmission, each fragment will still retain the complete header information of the original packet. This is important because the header contains crucial information such as source and destination IP addresses, protocol information, and other control fields that are necessary for proper routing and reassembly of the fragmented packets at the receiving end.

Submit
83. Preciznost kod CIDR podele mreža je:

Explanation

The correct answer is "bit" because CIDR (Classless Inter-Domain Routing) is a method used to allocate IP addresses and divide networks. It involves specifying the number of bits used for the network prefix in the IP address. Therefore, the precision in CIDR division is measured in bits, as it determines the size of the network.

Submit
84. Pri uspostavljanju veze kod TCP protokola se koriste segmenti sa:

Explanation

During the establishment of a TCP connection, the SYN (synchronize) and ACK (acknowledge) indicators are used. The SYN flag is set by the initiating device to request a connection, and the ACK flag is set by the responding device to acknowledge the request and establish the connection. These indicators are essential in the TCP three-way handshake process, where the initiating device sends a SYN packet, the responding device sends a SYN-ACK packet, and finally, the initiating device sends an ACK packet to complete the connection establishment.

Submit
85. Skraćenica SCTP označava:

Explanation

The correct answer is Stream Control Transmission Protocol. SCTP is a transport layer protocol that provides reliable and ordered delivery of data between two endpoints in a network. It is designed to be a reliable alternative to TCP, offering features like multi-homing and multi-streaming. SCTP is commonly used in applications that require high reliability and fault tolerance, such as telecommunication networks and Voice over IP (VoIP) systems.

Submit
86. Prekomerni gubitak paketa (npr. 10 do 20%) na prenosnom putu za pošiljaoca znači:

Explanation

not-available-via-ai

Submit
87. Polu-zatvorena veza (eng. half-close) je veza na kojoj je izvršen:

Explanation

The correct answer is "samo aktivan prekid veze" which translates to "only active termination of the connection". This means that in a half-close connection, only the active party initiates the termination of the connection while the passive party remains connected.

Submit
88. MSS parametar TCP protokola kod veza sa velikom verovatnoćom greške treba postaviti:

Explanation

The correct answer is "na što nižu vrednost" which translates to "to the lowest value" in English. In TCP protocol, the MSS (Maximum Segment Size) parameter determines the maximum amount of data that can be sent in a single TCP segment. Setting it to a lower value is beneficial when there is a high probability of errors during the connection. This is because a lower MSS value reduces the chances of data corruption or loss during transmission, ensuring better reliability and error handling in the TCP connection.

Submit
89. Skraćenica SPX označava:

Explanation

The correct answer is "Sequenced Packed Exchange". The abbreviation SPX stands for Sequenced Packed Exchange. This term refers to a protocol used in Novell NetWare networks for reliable communication between network devices. SPX ensures that data packets are sent and received in the correct order, providing a reliable and efficient data exchange between devices on the network.

Submit
90. IPX protokol se najčešće koristi kod: 

Explanation

IPX protocol is most commonly used in Novel Netware computer networks.

Submit
91. Raskidanje veze kod TCP prenosa realizuje se:

Explanation

The correct answer is "asimetrično, simetrično." This means that the termination of a TCP connection can be done both asymmetrically and symmetrically. Asymmetric termination refers to one side of the connection initiating the termination process, while the other side acknowledges and completes the termination. On the other hand, symmetric termination means that both sides of the connection agree to terminate the connection simultaneously.

Submit
92. Osnovna uloga AH-a kod IPsec-a je:

Explanation

The basic role of AH (Authentication Header) in IPsec is to provide authentication and integrity. AH ensures that the data being transmitted is not tampered with and that the sender's identity is verified. It does this by adding a header to the IP packet that includes a cryptographic checksum, which can be used to verify the integrity of the data, and a digital signature, which can be used to authenticate the sender. This helps to prevent unauthorized access and ensures the reliability of the transmitted data.

Submit
93. AH skraćenica kod IPsec protokola označava:

Explanation

The correct answer is "Authentication Header." In the IPsec protocol, AH (Authentication Header) is used to provide data integrity, authentication, and anti-replay protection for IP packets. It ensures that the data has not been tampered with during transmission and verifies the identity of the sender. AH adds an authentication field and a sequence number to the IP packet, allowing the recipient to validate the integrity and authenticity of the data.

Submit
94. Potpuni prekid veze kod TCP protokola zahteva prenos:

Explanation

The correct answer is "četiri segmenta." When a TCP connection is terminated, it goes through a process called the TCP connection termination handshake. During this process, both the client and the server exchange several segments to ensure that all data has been successfully transmitted and received. The four segments exchanged include the client's FIN segment to initiate the termination, the server's ACK segment to acknowledge the client's FIN, the server's FIN segment to initiate termination from its side, and the client's ACK segment to acknowledge the server's FIN. Therefore, four segments are required for a complete TCP connection termination.

Submit
95. Osnovni režimi rada IPsec protokola su:

Explanation

The correct answer is transportni, tunelski. IPsec protocol operates in two basic modes, which are transport mode and tunnel mode. In transport mode, only the payload of the IP packet is encrypted, while the header remains intact. This mode is typically used for end-to-end communication between two hosts. In tunnel mode, the entire IP packet, including both the header and payload, is encrypted and encapsulated within a new IP packet. This mode is commonly used for secure communication between two networks.

Submit
96. Deljenje podataka u segmente kod TCP protokola u slučaju greške:

Explanation

The given answer states that segmenting data in TCP protocol in case of an error reduces the cost of retransmission. This means that dividing the data into smaller segments helps in minimizing the amount of data that needs to be retransmitted in case of errors, thus reducing the overall cost of retransmission.

Submit
97. Prednost SCTP protokola u odnosu na TCP je:

Explanation

SCTP protocol has support for broadcasting, which means that it allows sending data packets to multiple recipients simultaneously. This feature is not available in TCP protocol, where data is typically sent to a single recipient. Broadcasting can be useful in scenarios where the same information needs to be sent to multiple recipients at once, such as in multimedia streaming or real-time communication applications.

Submit
98. Zagušenje na ruterima može da nastane iz sledećih razloga:

Explanation

Router congestion can occur due to several reasons mentioned in the given options. One reason is the occurrence of a large number of packets requesting the same output line, which can overwhelm the router's capacity. Another reason is that certain lines may have a small bandwidth, causing congestion when multiple packets try to use them simultaneously. Additionally, slow microprocessors in the router can also contribute to congestion as they might not be able to handle the incoming traffic efficiently.

Submit
99. Osnovna jedinica za prenos podataka kod TCP-a je:

Explanation

The correct answer is "segment." In TCP (Transmission Control Protocol), data is divided into smaller units called segments before being transmitted over the network. Each segment contains a header with control information and a portion of the data being sent. These segments are then reassembled at the receiving end to reconstruct the original data. Therefore, the segment is the basic unit for data transmission in TCP.

Submit
100. Pri prekidu veze kod TCP protokola se koriste segmenti sa:

Explanation

When a TCP connection is terminated, the FIN (Finish) flag is used to indicate that one side of the connection is done sending data. The ACK (Acknowledgment) flag is used to acknowledge the receipt of a packet or to indicate that the sender is ready to receive data. Therefore, the correct answer is FIN and ACK indicators, as they are used during the termination of a TCP connection.

Submit
101. Pokretanje Web klijenta (IE, Firefox...) i otvaranje sajta će na lokalnom računaru otvoriti port iz opsega:

Explanation

When a web client (such as IE or Firefox) is launched and a website is opened, it will open a port on the local computer within the range of 1024-49151. This range is commonly used for dynamic or private ports that are assigned by the operating system for various applications and services. Ports within this range are not well-known ports and are typically used for client-side connections. The range 0-1023 is reserved for well-known ports that are used by specific services, while the range 49152-65535 is used for ephemeral ports that are dynamically assigned by the operating system.

Submit
102. IGMP je skraćenica od:

Explanation

IGMP stands for Internet Group Management Protocol. This protocol is used by hosts and adjacent routers on an Internet Protocol (IP) network to report their multicast group memberships to any neighboring multicast routers. IGMP enables hosts to join and leave multicast groups dynamically. It is an essential protocol for managing multicast group memberships in IP networks and ensuring efficient delivery of multicast traffic.

Submit
103. Dodavanje opcije TCP segmentu će povećati njegovu veličinu za:

Explanation

By adding an option to the TCP segment, its size will increase by 32 bits. This means that the additional option will occupy an extra 32 bits of space within the TCP segment.

Submit
104. Bitska dužina porta transportnog protokola je:

Explanation

The correct answer is 16. The length of a transport protocol port is typically 16 bits. This means that it can have a maximum of 2^16 (65536) possible port numbers. The port number is used to identify different applications or services running on a device, allowing for proper routing of network traffic.

Submit
105. Karakteristike decentralizovanog rutiranja su:

Explanation

Decentralized routing refers to the process where routing decisions are made independently by each router without any coordination or agreement with other routers. In this type of routing, routers exchange information to form routing tables, which help them determine the best path for forwarding packets. This approach is commonly used in networks that are based on mainframes.

Submit
106. Regularne mrežne maske su:

Explanation

not-available-via-ai

Submit
107. Naknadna sinhronizacija vezana za članove multicast grupa putem IGMP protokola se vrši na zahtev:

Explanation

The correct answer is "članova lokalne mreže." Naknadna sinhronizacija vezana za članove multicast grupa putem IGMP protokola se vrši na zahtev članova lokalne mreže. This means that the synchronization process for multicast group members using the IGMP protocol is done upon the request of the local network members.

Submit
108. CIDR zapis mrežne maske "255.255.255.0" je:

Explanation

The CIDR notation is used to represent the subnet mask of a network. In this case, the subnet mask "255.255.255.0" is represented as "/16" in CIDR notation. This means that the first 16 bits of the IP address are used to identify the network, while the remaining 8 bits are used for host addresses.

Submit
109. Portovi se dele na:

Explanation

The ports are divided into different categories based on their privileges and characteristics. Privileged ports are reserved for system services and require administrative privileges to be accessed. Registered ports are assigned by IANA (Internet Assigned Numbers Authority) and are commonly used by applications. Dynamic ports are temporary ports assigned by the operating system to facilitate communication between client and server.

Submit
110. U najpopularnije protokole transportnog sloja spadaju:

Explanation

TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are both popular transport layer protocols in computer networking. TCP is a reliable, connection-oriented protocol that ensures the delivery of data packets in the correct order and without loss or duplication. It provides error checking, flow control, and congestion control mechanisms. UDP, on the other hand, is a connectionless, unreliable protocol that does not guarantee the delivery of data packets. It is commonly used for applications that prioritize speed over reliability, such as real-time video streaming or online gaming. Both TCP and UDP are essential for different types of network communication and are widely used in various applications.

Submit
111. UDP protokol omogućava pouzdan prenos podataka.

Explanation

UDP (User Datagram Protocol) is a connectionless protocol that does not provide reliable data transmission. Unlike TCP (Transmission Control Protocol), UDP does not guarantee that the data packets will be delivered in the correct order or even delivered at all. Therefore, the statement that "UDP protocol enables reliable data transmission" is incorrect.

Submit
112. Aplikacije koje komuniciraju putem transportnog protokola moraju na sopstvenim računarima otvoriti iste portove.

Explanation

The statement is incorrect. Applications that communicate over a transport protocol do not necessarily have to open the same ports on their own computers. Each application can use different ports for communication.

Submit
113. Protokoli transportnog sloja su karakteristični za:

Explanation

Transport layer protocols are specific to end devices, such as computers. These protocols are responsible for ensuring reliable delivery of data between the source and destination devices. Routers, switches, and network bridges operate at the network layer and data link layer, and they use different protocols for their communication. Therefore, the correct answer is end devices or krajnje računare.

Submit
114. TCP protokol u poređenju sa UPD protokolom nudi:

Explanation

TCP protokol u poređenju sa UDP protokolom nudi lošije performanse. TCP je pouzdan protokol koji osigurava da se podaci isporučuju tačno i u pravilnom redosledu, ali to zahteva dodatnu komunikaciju između klijenta i servera, što može usporiti protok podataka. S druge strane, UDP je brži protokol jer ne pruža garanciju isporuke podataka, što znači da se podaci mogu izgubiti ili stići u pogrešnom redosledu. Dakle, u poređenju sa UDP-om, TCP protokol nudi lošije performanse zbog dodatne pouzdanosti koju pruža.

Submit
115. U slučaju NAT-ovanja nije moguće koristiti sledeći režim rada IPsec-a:

Explanation

In the case of NAT (Network Address Translation), it is not possible to use the transport mode of IPsec. NAT modifies the IP addresses and ports of the packets, which can cause issues with the integrity and authenticity checks performed by IPsec in transport mode. Therefore, the transport mode of IPsec is not compatible with NAT.

Submit
116. Multicasting i broadcasting su podržani u TCP protokolu. 

Explanation

The correct answer is "Netačno" because multicasting and broadcasting are not supported in TCP protocol. Multicasting is a method of sending data to a group of hosts simultaneously, while broadcasting is a method of sending data to all hosts on a network. These methods are supported in UDP (User Datagram Protocol) rather than TCP (Transmission Control Protocol). TCP is a connection-oriented protocol that is used for reliable and ordered delivery of data between two hosts.

Submit
117. IPX protokol za adresiranje članova mreže koristi:

Explanation

IPX protocol uses 48-bit addresses to address network members.

Submit
118. MAC adresa izvorišta Adresna jedinica transportnog sloja – port ima dužinu od: 

Explanation

The source MAC address in the transport layer address unit - port has a length of 16 bits.

Submit
119. Fragmentacija paketa označava:

Explanation

Fragmentacija paketa označava deljenje paketa na veći broj paketa sa manjom dužinom. Ova tehnika se koristi kada se paket prenosi preko mreže koja podržava manju maksimalnu dužinu paketa od izvornog paketa. Svaki fragment sadrži deo podataka iz izvornog paketa, kao i dodatne informacije koje omogućavaju rekonstrukciju izvornog paketa na odredištu. Izračunavanje kontrolne sume je postupak koji se koristi za proveru integriteta paketa tokom prenosa. Kontrolna suma se izračunava na osnovu podataka u paketu i koristi se za proveru da li je paket stigao bez grešaka.

Submit
120. Osnovne komunikacione operacije mrežnog sloja su:

Explanation

The basic communication operations of the network layer are LISTEN, CONNECT, SEND, RECEIVE, and DISCONNECT. These operations allow devices to establish connections, send and receive data, and terminate connections. LISTEN is used to wait for incoming connections, CONNECT is used to establish a connection with another device, SEND is used to transmit data, RECEIVE is used to receive data, and DISCONNECT is used to terminate a connection. Together, these operations enable communication between devices at the network layer.

Submit
121. Osnovna karakteristika iSCSI protokola je:

Explanation

The basic characteristic of the iSCSI protocol is the use of external memory over a network.

Submit
122. Kod statičkog rutiranja karakteristično je sledeće:

Explanation

Static routing is characterized by the use of fixed routing tables defined by the administrator. Each node has its own routing table. It is commonly used in simple networks. Static routing does not dynamically adjust to changes in network topology or current traffic.

Submit
123. „Link state routing" algoritam ima sledeće karakteristike:

Explanation

The given answer states that the "Link state routing" algorithm uses different information such as the number of hops, congestion, and speed. It also mentions that there is periodic exchange of link state information between nodes to keep the information up to date. The algorithm uses the freshest information about the state of the links. However, it is slow in achieving network balance and the obtained path is not always optimal. It can only route short packets.

Submit
124. Kod dinamičkog rutiranja karakteristično je sledeće:

Explanation

Kod dinamičkog rutiranja, svaki čvor ima sopstvenu tabelu rutiranja koja se automatski kreira i ažurira. Tabele rutiranja prate sve promene u topologiji mreže i trenutnom saobraćaju, omogućavajući efikasno usmeravanje podataka. Za razliku od fiksnih tabela rutiranja koje definiše administrator, dinamičko rutiranje se koristi u složenijim mrežama gde je neophodno prilagođavanje usmeravanja u realnom vremenu.

Submit
125. Za adresiranje članova privatne mreže koja ima pristup Internetu mogu se koristiti sledeći opsezi IPv4 adresa:

Explanation

The given answer lists the valid ranges of IPv4 addresses that can be used for addressing members of a private network with internet access. These ranges include 10.0.0.0-10.255.255.255, 172.16.0.0-172.31.255.255, and 192.168.0.0-192.168.255.255. These ranges are reserved for private networks and are not routable on the public internet. Therefore, devices within these ranges can communicate with each other within the private network but require network address translation (NAT) to communicate with the internet.

Submit
126. Obeležiti servise i podrazumevane portove:

Explanation

The given answer correctly identifies the services and their corresponding default port numbers. Port 80 is associated with the HTTP (Hypertext Transfer Protocol) service, which is used for web browsing. Port 53 is used for DNS (Domain Name System), which translates domain names into IP addresses. Port 25 is used for SMTP (Simple Mail Transfer Protocol), the standard protocol for sending emails. Port 110 is used for POP3 (Post Office Protocol version 3), which is used for retrieving emails from a mail server.

Submit
127. Zadaci transportnog sloja su:

Explanation

The tasks of the transport layer are to ensure efficient, reliable, and cost-effective data transmission from the source to the destination, and to achieve independence from the physical network or the network currently located between the source and the destination. This involves forming data frames, selecting suitable coding and signaling systems for reliable data transmission.

Submit
128. ICMP poruke se sastoje od:

Explanation

ICMP poruke se sastoje od tipa poruke, koda i kontrolne sume. Tip poruke određuje vrstu ICMP poruke, kao što su echo request ili time exceeded. Kod je dodatna informacija koja se koristi za dodatno specificiranje poruke. Kontrolna suma se koristi za provjeru integriteta poruke kako bi se osiguralo da nije došlo do oštećenja podataka tijekom prijenosa.

Submit
129. Kompozitna adresna jedinica transportnog i mrežnog sloja – socket - sastavljen je od sledećih komponenti:

Explanation

The correct answer includes the components that make up a composite address unit in the transport and network layers. These components are the source IP address, source port, transport layer protocol, destination port, and destination IP address. These components are essential for identifying the source and destination of a network communication and for determining the appropriate protocol and port to use for the communication.

Submit
130. Prednost SCTP protokola u odnosu na UDP je:

Explanation

SCTP (Stream Control Transmission Protocol) provides reliable data transmission, which means it ensures that data packets are delivered without loss, duplication, or corruption. This is in contrast to UDP (User Datagram Protocol), which is a connectionless protocol and does not guarantee reliable delivery of data. Therefore, the advantage of SCTP over UDP is its ability to provide a reliable transmission of data.

Submit
131. Radeći sa mrežnom maskom 255.255.255.240 sledeći računari mogu da komuniciraju bez posredstva gateway-a:

Explanation

The given answer is correct because the IP addresses listed are within the same subnet when using the subnet mask 255.255.255.240. This subnet mask allows for a total of 16 IP addresses, with 14 usable addresses for hosts. The IP addresses provided in the answer fall within this range and can communicate directly with each other without the need for a gateway.

Submit
132. Osnovne funkcije transportnog sloja su:

Explanation

The basic functions of the transport layer are managing the connection (handshaking), translating data into a suitable format for transmission, segmenting data, and controlling the flow. These functions ensure that data is properly transmitted and received between the source and destination. Handshaking establishes a connection between the sender and receiver, data translation ensures compatibility between different systems, segmentation breaks data into smaller units for efficient transmission, and flow control regulates the rate of data transfer to prevent congestion.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 08, 2015
    Quiz Created by
    Shonez
Cancel
  • All
    All (132)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Opseg IPv4 adresa 192.0.0.0-223.255.255.255 je karakteristika:
Ukoliko su prva tri bita mrežne adrese fiksirana na "110" u pitanju...
Rezervacija 24 bita za mrežu i 8 bitova za čvor je karakteristika:
Opseg IPv4 adresa 128.0.0.0-191.255.255.255 je karakteristika:
Opseg dinamičkih portova transportnog sloja je:
Opseg IPv4 adresa 0.0.0.0-127.255.255.255 je karakteristika:
Ukoliko su prva dva bita mrežne adrese fiksirana na "10" u pitanju...
Rezervacija 16 bitova za mrežu i 16 bitova za čvor je...
IGMP je protokol (OSI i TCP/IP):
IPX je protokol (OSI i TCP/IP):
IPsec je protokol (OSI i TCP/IP):
Osnovna jedinica za prenos podataka na mrežnom sloju je:
Uređaj koji radi u mrežnom sloju je:
Mrežni sloj je odgovoran za:
Parametar "Hop Limit" IPv6 paketa može se porediti sa IPv4...
SCTP protokol je protokol:
Mrežni sloj je odgovoran za:
Prenos podataka kod TCP protokola je:
Glavni problem koji rešava IPv6 u odnosu na IPv4 je:
Aktivna mrežna oprema sa podrškom za 3. sloj (Layer 3)...
TCP protokol zahteva potvrdu o isporuci svakog poslatog segmenta.
UDP protokol je protokol:
ISCSI protokol je protokol:
Ukoliko ruter dobije multicast poruku, određivanje lokalnih primalaca...
Ukoliko su prva dva bita mrežne adrese fiksirana na "01" u pitanju...
TCP protokol poseduje mehanizam za eliminisanje istih segmenata koji...
Osim IPv4 adrese za uspešno adresiranje je neophodno imati i:
CIDR zapis mrežne maske "255.255.255.224" je:
TCP protokol poseduje mehanizam za usklađivanje brzine slanja sa...
ICMP je protokol (OSI i TCP/IP):
ISCSI protokol se uglavnom koristi na:
Skraćenica TCP označava:
IPv4 je protokol (OSI i TCP/IP):
IP adresa po standardu IPv4 sadrži:
IPv6 je protokol (OSI i TCP/IP):
SPX protokol se najčešće koristi u kombinaciji sa:
Organizacija zadužena za standardizaciju portova transportnog...
Vrste decentralizovanog rutiranja su:
Rezervacija 8 bitova za mrežu i 14 bita za čvor je karakteristika:
SACK opcija TCP protokola služi za povećanje performansi.
Opseg registrovanih portova transportnog sloja je:
SPX protokol je protokol:
ICMP je skraćenica od:
ICMP protokol ima mogućnost da utvrdi koliko je vremena...
Tabele rutiranja određuju:
Opseg privilegovanih portova transportnog sloja je:
Aktivan prekid veze (eng. active close) kod TCP protokola predstavlja:
IKE skraćenica kod IPsec protokola označava:
Osnovna uloga IKE-a kod IPsec-a je:
Skraćenica UDP označava:
Prednost UDP protokola u odnosu na TCP je:
Neodvojivo adresiranje vezano za IGMP protokol je:
Osnovna prednost realizacije sistema za zaštitu podataka na...
Prenos IPv6 paketa putem IPv4 mreže je moguć:
SPX protokol se uglavnom koristi kod: 
ICMP poruke:
IPv4 adrese se najčešće predstavljaju:
Transmission Control Protocol (TCP) definiše da prekid veze...
Primer alata koji koristi ICMP protokol je:
Aktivno uspostavljanje veze (eng. active open) kod TCP protokola...
Transmission Control Protocol (TCP) za uspostavljanje veze zahteva:
MSS skraćenica kod TCP protokola označava:
UDP protokol se uglavnom koristi kod:
TCP protokol je protokol:
Which one do you like?
Odbacivanje paketa na ruterima kao posledica velikog opterećenja,...
IP adresa u IPv4 ima dužinu od:
Maksimalna moguća dužina IP paketa je:
Skraćenica ISN kod TCP protokola predstavlja:
IPv6 adrese se najčešće predstavljaju:
Osnovna uloga IPsec protokola je:
TTL parametar IPv4 protokola može prouzrokovati sledeću poruku u...
IPX protokol se uglavnom koristi u kombinaciji sa: 
CIDR zapis mrežne maske "255.255.248.0" je:
Adrese IPv6 protokola imaju bitsku dužinu od:
UDP datagram u odnosu na TCP segment ima:
Dogovaranje veze (handshake) kod TCP prenosa realizuje se:
Osnovna uloga ESP-a kod IPsec-a je: 
Jedinica za prenos podataka kod UDP protokola je:
IGMP poruke:
IPX je skraćenica od:
Krakteristično za fragment nekog paketa je da:
Preciznost kod CIDR podele mreža je:
Pri uspostavljanju veze kod TCP protokola se koriste segmenti sa:
Skraćenica SCTP označava:
Prekomerni gubitak paketa (npr. 10 do 20%) na prenosnom putu za...
Polu-zatvorena veza (eng. half-close) je veza na kojoj je...
MSS parametar TCP protokola kod veza sa velikom verovatnoćom...
Skraćenica SPX označava:
IPX protokol se najčešće koristi kod: 
Raskidanje veze kod TCP prenosa realizuje se:
Osnovna uloga AH-a kod IPsec-a je:
AH skraćenica kod IPsec protokola označava:
Potpuni prekid veze kod TCP protokola zahteva prenos:
Osnovni režimi rada IPsec protokola su:
Deljenje podataka u segmente kod TCP protokola u slučaju...
Prednost SCTP protokola u odnosu na TCP je:
Zagušenje na ruterima može da nastane iz sledećih razloga:
Osnovna jedinica za prenos podataka kod TCP-a je:
Pri prekidu veze kod TCP protokola se koriste segmenti sa:
Pokretanje Web klijenta (IE, Firefox...) i otvaranje sajta će na...
IGMP je skraćenica od:
Dodavanje opcije TCP segmentu će povećati njegovu veličinu za:
Bitska dužina porta transportnog protokola je:
Karakteristike decentralizovanog rutiranja su:
Regularne mrežne maske su:
Naknadna sinhronizacija vezana za članove multicast grupa putem IGMP...
CIDR zapis mrežne maske "255.255.255.0" je:
Portovi se dele na:
U najpopularnije protokole transportnog sloja spadaju:
UDP protokol omogućava pouzdan prenos podataka.
Aplikacije koje komuniciraju putem transportnog protokola moraju na...
Protokoli transportnog sloja su karakteristični za:
TCP protokol u poređenju sa UPD protokolom nudi:
U slučaju NAT-ovanja nije moguće koristiti sledeći režim rada...
Multicasting i broadcasting su podržani u TCP protokolu. 
IPX protokol za adresiranje članova mreže koristi:
MAC adresa izvorišta Adresna jedinica transportnog sloja...
Fragmentacija paketa označava:
Osnovne komunikacione operacije mrežnog sloja su:
Osnovna karakteristika iSCSI protokola je:
Kod statičkog rutiranja karakteristično je sledeće:
„Link state routing" algoritam ima sledeće karakteristike:
Kod dinamičkog rutiranja karakteristično je sledeće:
Za adresiranje članova privatne mreže koja ima pristup Internetu...
Obeležiti servise i podrazumevane portove:
Zadaci transportnog sloja su:
ICMP poruke se sastoje od:
Kompozitna adresna jedinica transportnog i mrežnog sloja –...
Prednost SCTP protokola u odnosu na UDP je:
Radeći sa mrežnom maskom 255.255.255.240 sledeći računari mogu da...
Osnovne funkcije transportnog sloja su:
Alert!

Advertisement