Kripto 2, Drugi Kol

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Catherine Halcomb
Catherine Halcomb
Community Contributor
Quizzes Created: 1439 | Total Attempts: 6,571,922
| Attempts: 1,577
SettingsSettings
Please wait...
  • 1/102 питања

    Izabrati tacnu tvrdnju?

    • Problem autentifikacije je moguce resiti sa digitalnim potpisom
    • Problem autentifikacije je prakticno neresiv
    • Problem autentifikacije nije moguce resiti sa digitalnim potpisom
Please wait...
Kripto 2, Drugi Kol - Quiz


Quiz Preview

  • 2. 

    Autentifikacija je servis bezbednosti kojim se osigurava da je:

    • Sifrat nastao sa upotrebom pravog kljuca K

    • Poruka poslata od strane autorizovane osobe

    • Poruka poslata sifrovana od strane druge osobe

    • Poruka poslata od druge osobe

    Correct Answer
    A. Poruka poslata od strane autorizovane osobe
    Explanation
    Authentication is a security service that ensures that the message is sent by an authorized person. It verifies the identity of the sender and ensures that the message has not been tampered with during transmission. This helps in preventing unauthorized access and ensures the integrity of the communication.

    Rate this question:

  • 3. 

    Izaberite tacnu tvrdnju:

    • Problem autentifikacije nije moguce resiti sa digitalnim potpisom

    • Problem autentifikacije je moguce resiti sa digitalnim potpisom

    • Problem autentifikacije je prakticno neresiv

    Correct Answer
    A. Problem autentifikacije je moguce resiti sa digitalnim potpisom
    Explanation
    The correct answer is "Problem autentifikacije je moguce resiti sa digitalnim potpisom." The explanation is that a digital signature is a cryptographic mechanism that provides authentication and integrity of digital documents. It ensures the identity of the sender and verifies that the document has not been tampered with during transmission. Therefore, it is possible to solve the problem of authentication using a digital signature.

    Rate this question:

  • 4. 

    Pozivom verify() nad instancom klase Signature:

    • Verifikovan je digitalni potpis

    • Podatak je digitalno potpisan

    • Generisan je elektronski potpis

    • Podatak je sifrovan sa RSA

    • Generisan je otisak poruke

    Correct Answer
    A. Verifikovan je digitalni potpis
    Explanation
    The correct answer is "Verifikovan je digitalni potpis" because the sentence translates to "The digital signature has been verified." This suggests that the verify() method called on the Signature class instance successfully confirmed the authenticity and integrity of the digital signature.

    Rate this question:

  • 5. 

    Autentifikacija podrazumeva:

    • Proveru da je poruka poslata od druge osobe na osnovu CRC

    • Proveru da je poruka komprimovana

    • Proveru da je poruka hesovana

    • Proveru da li je primljeni kriptogram poslat od autorizovane osobe

    Correct Answer
    A. Proveru da li je primljeni kriptogram poslat od autorizovane osobe
    Explanation
    Authentication refers to the process of verifying the identity of the sender or the source of a message. In this context, the correct answer states that authentication involves checking whether the received cryptogram (encrypted message) is sent from an authorized person. This means that the authentication process is focused on ensuring that the sender of the message is indeed authorized to send it, thus confirming the authenticity and integrity of the message.

    Rate this question:

  • 6. 

    Kod scenarija za deljenje tajni:

    • Nije moguce rekonstruisati kljuc bez jednog dela kljuca

    • Moguce rekonstruisati kljuc bez jednog dela kljuca

    Correct Answer
    A. Nije moguce rekonstruisati kljuc bez jednog dela kljuca
    Explanation
    The scenario for secret sharing states that it is not possible to reconstruct the key without one part of the key. This means that each part of the key is essential for reconstructing the original key. Therefore, if one part of the key is missing, it is not possible to reconstruct the complete key.

    Rate this question:

  • 7. 

    Ako je sifrat One-time pad-a C=1000, a kljuc K=1111. sta je P?

    • P=1100

    • P=0111

    • P=01100

    • Nista od ponudjenog

    • P=0010

    • P=0110

    Correct Answer
    A. P=0111
    Explanation
    The question states that the ciphertext (C) is 1000 and the key (K) is 1111. The correct answer, P=0111, can be obtained by performing a bitwise XOR operation between C and K. XORing 1 with 1 gives 0, XORing 0 with 1 gives 1, and XORing 0 with 0 gives 0. Therefore, XORing 1 with 0 gives 1. By applying this operation to each corresponding bit of C and K, we get the result P=0111.

    Rate this question:

  • 8. 

    Protokol za autentifikaciju može zahtevati uspostavu

    • Javnog ključa

    • Asimetričnog ključa

    • Sesijskog ključa

    Correct Answer
    A. Sesijskog ključa
    Explanation
    The correct answer is "sesijskog ključa". The explanation for this answer is that a protocol for authentication may require the establishment of a session key. A session key is a temporary encryption key that is generated for a specific session or communication session between two entities. It is used to encrypt and decrypt the data exchanged during that session, ensuring the confidentiality and integrity of the communication. By using a session key, the security of the communication is increased as it is unique to that session and not used for any other session or communication.

    Rate this question:

  • 9. 

    Na sledecem fragmentu java koda prikazan je proces:

    • Cuvanja sifrata u nizu bajtova

    • Proces sifrovanja AES algoritmom

    • Inicijalizacija inicijalnog vektora

    • Proces desifrovanja AES algoritmom

    Correct Answer
    A. Inicijalizacija inicijalnog vektora
    Explanation
    The given answer suggests that the process being described in the Java code fragment is the initialization of an initialization vector. An initialization vector is commonly used in encryption algorithms, such as AES, to add randomness and enhance the security of the encryption process. It is used to initialize the state of the encryption algorithm before encrypting or decrypting data.

    Rate this question:

  • 10. 

    U protokolu za autentifikaciju sa javnim kljucem:

    • Trudi moze da natera Alisu da desifruje bilo sta!

    • Trudi ne moze da natera Alisu da desifruje bilo sta!

    Correct Answer
    A. Trudi moze da natera Alisu da desifruje bilo sta!
  • 11. 

    Pozivom metoda getPrivate() nad instancom KeyPair, metod ce vratiti:

    • Javni i privatni kljuc 

    • Simetricni kljuc

    • Privatni kljuc

    • Javni eksponent

    • Javni kljuc

    Correct Answer
    A. Privatni kljuc
    Explanation
    By calling the getPrivate() method on an instance of KeyPair, the method will return the private key. This means that the getPrivate() method is specifically designed to retrieve and return the private key associated with the KeyPair instance.

    Rate this question:

  • 12. 

    Satelitski scenario je protokol koji se sastoji iz:

    • 4 faze

    • 5 faza

    • Zavisi od broja ucesnika u scenariju

    • 3 faze

    • 6 faza

    Correct Answer
    A. 3 faze
    Explanation
    The correct answer is 3 faze. The explanation for this is that the satellite scenario protocol consists of three phases. This means that there are three distinct stages or steps involved in the protocol. The question does not provide any additional information or context to suggest that the number of phases depends on the number of participants in the scenario. Therefore, the answer "3 faze" is the most accurate and logical choice.

    Rate this question:

  • 13. 

    Naredba: keytool -export -alias RSAsertifikat -keystore /c:\Users\sadamovic\Desktop\skladiste.keystore -file /c:\Users\sadamovic\Desktop\RSAsertifikat.der

    • Izvoz DSA sertifikata u BASE64 formatu

    • Pregled generisanih sertifikata u skladistu

    • Kreiranje zahteva za digitalni potpis od strane CA

    • Izvoz RSA sertifikata u DER formatu

    • Pregled generisanih sertifikata u skladistu

    • Prikaz sadrzaja sertifikata

    • Generisanje para kljuceva (privatni i javni)

    Correct Answer
    A. Izvoz RSA sertifikata u DER formatu
    Explanation
    The given command "keytool -export -alias RSAsertifikat -keystore /c:\Users\sadamovic\Desktop\skladiste.keystore -file /c:\Users\sadamovic\Desktop\RSAsertifikat.der" is used to export an RSA certificate in DER format. The command specifies the alias of the certificate as "RSAsertifikat" and the keystore file location as "/c:\Users\sadamovic\Desktop\skladiste.keystore". It exports the certificate to a file named "RSAsertifikat.der" at the specified location "/c:\Users\sadamovic\Desktop\".

    Rate this question:

  • 14. 

    Sifarski sistem je bezuslovno bezbedan ako:

    • Je sifrat nastao na nepoznatom jeziku

    • Nista od ponudjenod

    • Ne moze da bude razbijen ni uz pomoc neogranicenih racunarskih resursa

    • Je algoritam javan a kljuc tajan

    • Je kljuc genrisan na slucajan nacin

    Correct Answer
    A. Ne moze da bude razbijen ni uz pomoc neogranicenih racunarskih resursa
    Explanation
    The correct answer is that the system cannot be broken even with unlimited computer resources. This means that no matter how much computational power is available, the encryption algorithm used in the system is so strong that it cannot be cracked or decrypted. This level of security ensures that the system is completely safe and cannot be compromised, making it unconditionally secure.

    Rate this question:

  • 15. 

    Dizajn kog protokola je prikazan na slici?

    • Za uzajamnu autentifikaciju sa javnim kljucem

    • Za uzajamnu autentifikaciju sa simetricnim kljucem

    • Za jednostavnu autentifikaciju sa simetricnim kljucem

    Correct Answer
    A. Za uzajamnu autentifikaciju sa simetricnim kljucem
    Explanation
    The correct answer is "za uzajamnu autentifikaciju sa simetricnim kljucem" which translates to "for mutual authentication with symmetric key" in English. This suggests that the protocol design shown in the picture is for a communication process where both parties authenticate each other using a shared symmetric key.

    Rate this question:

  • 16. 

    U protokolu za autentifikaciju sa simetricnim kljucem:

    • Alisa i Bob unapred razmenjuju simetricni kljuc

    • Alisa i Bob ne moraju da dele iste klljuceve

    • Alisa i Bob unapred razmenjuju hes vrednosti kljuca

    Correct Answer
    A. Alisa i Bob unapred razmenjuju simetricni kljuc
    Explanation
    In the authentication protocol with a symmetric key, Alisa and Bob exchange a symmetric key in advance. This means that they both have the same key, which they can use for encryption and decryption. This allows them to securely communicate by encrypting and decrypting messages using the shared key. Sharing the same symmetric key ensures that only Alisa and Bob can access and understand the encrypted messages.

    Rate this question:

  • 17. 

    Vremenski pecat je najcesce koriscen u:

    • SSL

    • IPSec

    • Kerberosu

    Correct Answer
    A. Kerberosu
    Explanation
    The correct answer is Kerberosu. Kerberos is a network authentication protocol that uses timestamps as part of its authentication process. It is commonly used in computer networks to provide secure authentication for users and services. The use of timestamps, or "vremenski pecat" in Serbian, helps to prevent replay attacks by ensuring that authentication requests are only valid for a certain period of time.

    Rate this question:

  • 18. 

    Na slici je prikazan:

    • Senonov perfektni kanal za sifrovanje

    • Sema za generisanje slucajnih kljuceva

    • Vajnerov Wire-Tap kanal

    • Protocol za sifrovanje

    Correct Answer
    A. Vajnerov Wire-Tap kanal
    Explanation
    The correct answer is Vajnerov Wire-Tap kanal. The image represents Vajner's Wire-Tap channel, which is a type of communication channel that allows a third party to eavesdrop on the communication between two parties without their knowledge. This channel is often used in cryptography to simulate real-world scenarios and test the security of encryption algorithms.

    Rate this question:

  • 19. 

    Koliko faza protokola je prikazano na slici:

    • 3

    • 2

    • 5

    • 4

    Correct Answer
    A. 3
    Explanation
    The correct answer is 3 because the question asks how many phases of the protocol are shown in the picture. Since the answer provided is 3, it implies that there are three distinct phases of the protocol depicted in the image. However, without the image or a more detailed description, it is difficult to provide a comprehensive explanation.

    Rate this question:

  • 20. 

    Primer iz prakse za otvaranje sefa sa dva kljuca, lansiranje rakete zahteva tri autorizacije  i sl, je primer za scenario:

    • Perfektne tajnosti

    • Tajnog komuniciranja

    • Deljenje tajni

    Correct Answer
    A. Deljenje tajni
    Explanation
    The given scenario of opening a safe with two keys and launching a rocket requiring three authorizations indicates the concept of "Deljenje tajni" or "Sharing secrets." In this scenario, multiple individuals hold different pieces of information or keys, and their collaboration is necessary to achieve the desired outcome. This concept emphasizes the need for sharing classified information or access to restricted resources among trusted parties to accomplish a specific task or goal.

    Rate this question:

  • 21. 

    Izaberite tacnu definiciju perfektne sifre?

    • Postoji kljuc koji preslikava svaku poruku u bilo koji sifrat sa jednakom verovatnocom

    • Postoji kljuc koji preslikava svaku poruku u jedan sifrat sa specificnom verovatnocom

    • Postoji kljuc koji preslikava svaku poruku u bilo koji sifrat sa razlicitom verovatnocom

    Correct Answer
    A. Postoji kljuc koji preslikava svaku poruku u bilo koji sifrat sa jednakom verovatnocom
    Explanation
    The correct answer is "Postoji kljuc koji preslikava svaku poruku u bilo koji sifrat sa jednakom verovatnocom." This means that there is a key that can map any message to any cipher with equal probability. In other words, each message has an equal chance of being encrypted into any possible cipher. This ensures that the encryption process is unbiased and random, making it difficult for an attacker to determine the original message based on the cipher.

    Rate this question:

  • 22. 

    Sta na grafiku oznacava plava horizonatalna isprekidana linija? 

    • Algoritam zastite

    • Entropiju kljuca

    • Tezak problem

    • Cilj napadaca

    • Granicu napadaca

    • Bezuslovnu sigurnost

    Correct Answer
    A. Granicu napadaca
    Explanation
    The blue dashed horizontal line on the graph represents the boundary of the attacker. This means that any data or actions that lie beyond this boundary are considered to be outside of the attacker's control or influence. It signifies the limit or extent to which the attacker can potentially cause harm or compromise the system's security.

    Rate this question:

  • 23. 

    Koje dve vrste bezbednosti razlikuje Senon?

    • Racunarsku

    • Bezuslovnu

    • Matematicku

    • Asimetricnu

    • Kriptografsku

    • Simetricnu

    Correct Answer(s)
    A. Racunarsku
    A. Bezuslovnu
    Explanation
    Senon razlikuje dve vrste bezbednosti: računarsku i bezuslovnu.

    Rate this question:

  • 24. 

    Šta podrazumeva bezuslovna ili teorijska bezbednost?

    • Bezbednost u odnosu na protivnika koji ima poznat otvoreni tekst

    • Bezbednost u odnosu na protivnika koji ima specifične ograničene vremenske i računarske resurse

    • Bezbednost u odnosu na protivnika koji ima isti otvoreni tekst

    • Bezbednost u odnosu na protivnika koji raspolaže neograničeno vreme i računarske resurse

    • Bezbednost u odnosu na protivnika koji ima šifrat

    Correct Answer
    A. Bezbednost u odnosu na protivnika koji raspolaže neograničeno vreme i računarske resurse
    Explanation
    This answer suggests that the term "bezbednost" refers to security against an adversary who has unlimited time and computational resources. This means that the level of security being discussed is focused on protecting against attacks from an adversary who has the ability to dedicate unlimited resources to breaking the security measures in place.

    Rate this question:

  • 25. 

    Protokoli za uzajamnu autentifikaciju sa simetričnim ključevima

    • Nisu uvek bezbedni, ponekad je moguć napad

    • Potpuno su bezbedni ako koristimo javne ključeve

    • Nisu nikad bezbedni

    • Potpuno su bezbedni ako koristimo privatne ključeve

    Correct Answer
    A. Nisu uvek bezbedni, ponekad je moguć napad
    Explanation
    The correct answer states that protocols for mutual authentication with symmetric keys are not always safe and that there is a possibility of an attack. This implies that while these protocols may provide security in some cases, they are not foolproof and can still be vulnerable to certain attacks.

    Rate this question:

  • 26. 

    Jedini uslov za bezbedan rad Vajnerovog Wire-Tap kanala je:

    • Da napadac prociscenu verziju signala legitimnog prijemnika?

    • Da napadac prima zasumljenu verziju signala legitimnog prijemnika

    • Da napadac snima signale od oba korisnika

    Correct Answer
    A. Da napadac prima zasumljenu verziju signala legitimnog prijemnika
    Explanation
    The correct answer is "Da napadac prima zasumljenu verziju signala legitimnog prijemnika". This means that the only condition for the safe operation of the Vajner Wire-Tap channel is that the attacker receives a noisy version of the legitimate receiver's signal.

    Rate this question:

  • 27. 

    Karakteristike koje sifre su prikazane na slici?

    • Racunarski sifarski algoritam

    • Cisto slucajni gnerator

    • Perfektni sifarski algoritam

    • Pseudo slucajni genrator

    Correct Answer
    A. Perfektni sifarski algoritam
    Explanation
    The question is asking about the characteristics of the codes shown in the picture. The correct answer is "Perfektni sifarski algoritam" which translates to "Perfect cipher algorithm" in English. This suggests that the codes in the picture are an example of a perfect cipher algorithm, which is a type of encryption algorithm that provides perfect secrecy and is unbreakable even with infinite computational power.

    Rate this question:

  • 28. 

    Na sledecem fragmentu java koda instance klase KeyPair sadrzi:

    • Samo privatni kljuc

    • Simetricni privatni i javni kljuc

    • Samo simetricni kljuc

    • Privatni i javni kljuc

    • Javni kljuc i javni eksponent

    Correct Answer
    A. Privatni i javni kljuc
    Explanation
    The correct answer is "privatni i javni kljuc." This is because the class KeyPair in Java typically represents a pair of cryptographic keys, which consists of both a private key and a public key. These keys are used for various encryption and decryption operations in cryptography.

    Rate this question:

  • 29. 

    Koji scenario je prikazan na slici?

    • Bob potpisuje poruku i salje Alisi

    • Bob autentifikuje Alisu sa simetricnim kljucem

    • Alisa autentifikuje Boba sa asimetricnim kljucem

    • Alisa potpisuje poruku i salje Bobu

    Correct Answer
    A. Bob autentifikuje Alisu sa simetricnim kljucem
    Explanation
    The correct answer is "Bob autentifikuje Alisu sa simetricnim kljucem". This means that Bob is authenticating Alice using a symmetric key. This implies that Bob and Alice share the same key, and Bob is verifying Alice's identity using this key.

    Rate this question:

  • 30. 

    Koji napadi su moguci na protkol sa slike:

    • Mogucnost za kompromitovanje baze podataka sa  lozinkama

    • Mogucnost za otkrivanje lozinke

    • Mogucnost ponovnog slanja

    Correct Answer
    A. Mogucnost ponovnog slanja
    Explanation
    The correct answer is "mogucnost ponovnog slanja" (possibility of replay attacks). A replay attack occurs when an attacker intercepts and maliciously retransmits data that was previously valid. In the context of the given question, it refers to the possibility of an attacker intercepting and resending data, potentially compromising the security of the system. This could lead to unauthorized access or other malicious actions.

    Rate this question:

  • 31. 

    Ako su autentifikacija i tajnost dva nezavisna servisa, u tom slucaju kriptografski sistemi za apsolutnu tajnost:

    • Mogu obezbediti autenticnost

    • Ne mogu obezbediti autenticnost

    Correct Answer
    A. Ne mogu obezbediti autenticnost
    Explanation
    Cryptographic systems for absolute secrecy cannot provide authentication because authentication involves verifying the identity of the sender or recipient of a message. While cryptographic systems can ensure confidentiality by encrypting the message, they do not have the capability to verify the authenticity of the sender or recipient. Authentication requires additional mechanisms such as digital signatures or certificates to ensure the integrity and authenticity of the communication.

    Rate this question:

  • 32. 

    Koji kriptografski protokol je prikazan na slici?

    • Protokol za jednostranu autentifikaciju koji ne implementira PFS

    • Protokol samo za obostranu autentifikaciju

    • Protokol za autentifikaciju sa simetricnim kljucem

    • Protokol za obostranu autentifikaciju koji implementira PFS

    Correct Answer
    A. Protokol za obostranu autentifikaciju koji implementira PFS
    Explanation
    The correct answer is "Protokol za obostranu autentifikaciju koji implementira PFS." This means that the cryptographic protocol shown in the picture is a protocol for mutual authentication that implements Perfect Forward Secrecy (PFS). PFS ensures that even if the long-term secret key is compromised, past sessions remain secure.

    Rate this question:

  • 33. 

    Koji protkol je prikazan na slici?

    • Autentifikacija sa simetricnim kljucem

    • Autentifikacija sa simetricnim i asimetricnim kljucem

    • Autentifikacija sa asimetricnim kljucem

    Correct Answer
    A. Autentifikacija sa simetricnim kljucem
    Explanation
    The correct answer is "Autentifikacija sa simetricnim kljucem" (Authentication with symmetric key). This is indicated by the image, which suggests that a symmetric key is being used for authentication. Symmetric key authentication involves using the same key for both encrypting and decrypting data, ensuring that the sender and receiver have the same key to authenticate each other.

    Rate this question:

  • 34. 

    PFS podrazumeva:

    • Simetricni kljuc koji se koristi jednokratno ali se cuva u arhivu na bezbedan nacin

    • Sesijski kljuc koji se koristi jednokratno, a zatim trajno unistava

    • Privatni kljuc koji se koristi jednokratno, a zatim trajno unistava

    • Sesijski kljuc, i moze da se koristi vise puta

    Correct Answer
    A. Sesijski kljuc koji se koristi jednokratno, a zatim trajno unistava
    Explanation
    PFS (Perfect Forward Secrecy) podrazumeva korišćenje sesijskog ključa koji se koristi samo jednom, a zatim trajno uništava. Ovo je važno za obezbeđivanje sigurnosti komunikacije, jer se svaki put kada se uspostavi nova sesija generiše novi ključ koji se ne može rekonstruisati iz prethodnih sesija. Na taj način, čak i ako se jedan ključ kompromituje, prethodne sesije ostaju sigurne. Uništavanje ključeva nakon korišćenja sprečava njihovo eventualno otkrivanje i zloupotrebu.

    Rate this question:

  • 35. 

    Brzina tajnog kljuca je:

    • Minimilna brzina pri kojoj se A I B dogovore o tajnom kljucu S

    • Maksimalna brzina pri kojoj se A I B dogovore o tajnom kljucu S

    • Maksimalna brzina pri kojoj se A I B dogovore o javnom kljucu S

    • Minimalna brzina pri kojoj se A I B dogovore o javnom kljucu S

    Correct Answer
    A. Maksimalna brzina pri kojoj se A I B dogovore o tajnom kljucu S
    Explanation
    The correct answer is "Maksimalna brzina pri kojoj se A I B dogovore o tajnom kljucu S." This means that the maximum speed at which A and B can agree on a secret key S is the correct answer. This suggests that there is a certain speed limit or threshold that A and B need to meet in order to establish a secure secret key. It implies that if their speed is below this maximum limit, they will not be able to successfully agree on the secret key.

    Rate this question:

  • 36. 

    Naredba: keytool - export -alias DSAsertifikat -keystore /c:\Users\sadamovic\Desktop\skladiste.keystore -rfc -file /c:\Users\sadamovic\Desktop\DSAsertifikat.b64

    • Pregled genrisanih sertifikata u skladistu

    • Generisanje DSA sertifikata za digitalni potpis

    • Izvoz RSA sertifikata u DER formatu

    • Prikaz sadrzaja sertifikata

    • Pregled generisanih sertifikata u skladistu

    • Izvoz DSA sertifikata u BASE64 formatu

    • Generisanje RSA sertifikata

    • Generisanje para kljuceva (privatni i javni)

    Correct Answer
    A. Izvoz DSA sertifikata u BASE64 formatu
    Explanation
    The given command "keytool - export -alias DSAsertifikat -keystore /c:\Users\sadamovic\Desktop\skladiste.keystore -rfc -file /c:\Users\sadamovic\Desktop\DSAsertifikat.b64" exports the DSA certificate in BASE64 format. This means that the DSA certificate will be encoded using the BASE64 encoding scheme, which represents binary data in ASCII format. The exported certificate will be saved in the file named "DSAsertifikat.b64" on the desktop of the user "sadamovic".

    Rate this question:

  • 37. 

    Autentifikacija i tajnost su:

    • Prakticno nekompatabilni

    • Teorijski kompatabilni

    • Prakticno kompatabilne

    • Teorijski nekompatabilni

    Correct Answer
    A. Teorijski nekompatabilni
    Explanation
    Authentication and confidentiality are theoretically incompatible. This means that in theory, it is difficult to achieve both authentication and confidentiality simultaneously. Authentication ensures that the user or entity is who they claim to be, while confidentiality ensures that the information is kept private and secure. In practice, implementing strong authentication measures can sometimes compromise confidentiality, and vice versa. However, this answer suggests that in theory, it is not possible to achieve both authentication and confidentiality without some trade-offs or challenges.

    Rate this question:

  • 38. 

    Da bismo garantovali autentifikaciju, verovatnoca PI mora biti mala, a to znaci da uzajamna informacija izmedju sifrata i kljuca mora biti velika. S druge strane znamo da bismo obezbedili apsolutnu tajnost mora vaziti I(C;M)=0, sto je oprecno zahtevu autentifikacije:

    • Tvrdnja nije tacna

    • Tvrdnja je tacna

    Correct Answer
    A. Tvrdnja je tacna
    Explanation
    The given statement is discussing the requirements for authentication and confidentiality in a cryptographic system. It states that in order to guarantee authentication, the probability of incorrect decryption (PI) must be low, which means that the mutual information between the ciphertext (C) and the key (K) must be high. On the other hand, to ensure absolute confidentiality, it must hold that I(C;M) = 0, which contradicts the requirement for authentication. Therefore, the statement is true because the requirements for authentication and absolute confidentiality are contradictory.

    Rate this question:

  • 39. 

    U protokolu za autentifikaciju sa vremenskim pecatom prvo:

    • Desifrujemo, zatim racunamo T vremenski pecat i sifrujemo

    • Potpisujemo, zatim racunamo T vremenski pecat i sifrujemo

    • Sifrujemo, zatim racunamo T vremenski pecat i potpisujemo

    Correct Answer
    A. Potpisujemo, zatim racunamo T vremenski pecat i sifrujemo
    Explanation
    In the given protocol for authentication with a timestamp, the correct sequence of steps is to first sign the message, then calculate the timestamp, and finally encrypt the message. This order ensures that the message is securely signed before the timestamp is added and the entire message is encrypted. If the steps were performed in a different order, the security and integrity of the authentication process could be compromised.

    Rate this question:

  • 40. 

    Izaberi algoritam koji se moze koristit za autentifikaciju simetricnim kriptografskim funkcijama?

    • RSA

    • DES

    • AES

    Correct Answer(s)
    A. DES
    A. AES
    Explanation
    DES (Data Encryption Standard) and AES (Advanced Encryption Standard) are both symmetric cryptographic algorithms that can be used for authentication. Symmetric cryptographic functions use the same key for both encryption and decryption, making them suitable for verifying the authenticity of data. DES and AES are widely used and trusted encryption standards, with AES being the more secure and commonly used algorithm in modern cryptographic systems.

    Rate this question:

  • 41. 

    Izraz I(M;C)=0, garantuje da sifrat ne otkriva informaciju o:

    • Duzini kljuca

    • Kriptografu

    • Otvorenom tekstu

    • Sifratu

    • Kljucu

    • Inicijalnom vektoru

    Correct Answer
    A. Otvorenom tekstu
    Explanation
    The expression I(M;C)=0 guarantees that the ciphertext does not reveal any information about the plaintext.

    Rate this question:

  • 42. 

    Sta podrazumeva  Senonov ideal tajnog komuniciranja?

    • Posiljalac - TRNG  - primalac

    • Posiljalac - PRNG  - primalac

    • Primalac - TRNG - posiljalac

    Correct Answer
    A. Posiljalac - TRNG  - primalac
    Explanation
    Senonov ideal tajnog komuniciranja podrazumeva da pošiljalac koristi True Random Number Generator (TRNG) za generisanje nasumičnih ključeva ili brojeva koje koristi za enkripciju poruke. Ovi nasumični ključevi su potpuno nepredvidivi i neponovljivi. Primalac takođe koristi isti TRNG za generisanje istih ključeva kako bi dešifrovao poruku. Ovaj pristup osigurava visok nivo tajnosti i sigurnosti u komunikaciji između pošiljaoca i primaoca.

    Rate this question:

  • 43. 

    TCP protokol

    • Samo u slučaju ako je autentifikacija u LAN okruženju (zbog manjeg broja IP adresa)

    • Je namenjen za autentifikaciju na mreži

    • Nije namenjen za autentifikaciju na mreži

    Correct Answer
    A. Nije namenjen za autentifikaciju na mreži
    Explanation
    The correct answer is "nije namenjen za autentifikaciju na mreži." This is because TCP protocol is not designed specifically for network authentication purposes. TCP (Transmission Control Protocol) is a reliable transport protocol that ensures the delivery of data packets in a network. It handles the segmentation, reassembly, and flow control of data. However, authentication in a network typically requires protocols like RADIUS or LDAP, which are specifically designed for authentication purposes. TCP does not provide built-in authentication mechanisms.

    Rate this question:

  • 44. 

    Na slici je prikazan:

    • Random generator slucajnih binarnih sekvenci

    • Dogovor o javnom kljucu preko tajne diskusije

    • Dogovor o javnom kljucu preko javne diskusije

    • Dogovor o tajnom kljucu preko javne diskusije

    Correct Answer
    A. Dogovor o tajnom kljucu preko javne diskusije
  • 45. 

    Satelitski scenario nije moguc kada je:

    • Greska predajne strane veca od greske prijemne strane

    • Greska napadaca 0

    • Greska prijemne strane manja od greske napadaca

    • Greska prijemne strane veca od greske predajne strane

    Correct Answer
    A. Greska napadaca 0
    Explanation
    In a satellite scenario, the transmission error refers to the error that occurs during the transmission of data from the sender to the receiver, while the attacker's error refers to any error introduced by an attacker trying to disrupt the communication. The correct answer states that the attacker's error is 0, meaning that there is no error introduced by the attacker. This implies that the communication is not compromised by any malicious activity, making the satellite scenario possible.

    Rate this question:

  • 46. 

    Za implementaciju PFS u zastitni protokol, koristi se:

    • Digitalni potpis

    • Difi-Helman

    • Forteza

    • Kerberos

    • TTP

    Correct Answer
    A. Difi-Helman
    Explanation
    Difi-Helman se koristi za implementaciju PFS (Perfect Forward Secrecy) u zastitni protokol. PFS je sigurnosna karakteristika koja osigurava da, čak i ako se privatni ključ kompromituje u budućnosti, prethodne komunikacije ostanu sigurne. Difi-Helman protokol omogućava razmenu tajnih ključeva između dvije strane koje komuniciraju, bez da te ključeve razmjenjuju preko mreže. Na taj način, čak i ako napadač presretne komunikaciju i dobije trenutne ključeve, neće biti u mogućnosti dešifrovati prethodne poruke.

    Rate this question:

  • 47. 

    U protokolu na slici:  

    • Bob mora da zna otisak lozinke

    • Alisa mora da zna lozinku

    • Alisa ne mora da zna lozinku

    • Bob mora da zna lozinku

    • Bob ne mora da zna lozinku

    Correct Answer(s)
    A. Alisa mora da zna lozinku
    A. Bob mora da zna lozinku
    Explanation
    In the given protocol, both Alisa and Bob are required to know the password. This is indicated by the statements "Alisa mora da zna lozinku" (Alisa must know the password) and "Bob mora da zna lozinku" (Bob must know the password). Therefore, the correct answer is that both Alisa and Bob must know the password.

    Rate this question:

  • 48. 

    Cesto kaze da je dokaziva racunarska bezbednost:

    • Nemoguca ili mit

    • Moguca

    • Relativna u odnosu na napadaca

    Correct Answer
    A. Nemoguca ili mit
    Explanation
    The correct answer is "nemoguca ili mit" which translates to "impossible or myth" in English. This suggests that the statement is claiming that proving computer security is either impossible or just a myth. It implies that achieving complete and foolproof security in the realm of computers is extremely challenging, if not unattainable.

    Rate this question:

  • 49. 

    Satelitski scenatio sluzi za razmenu:

    • Sifrata javnim kanalom

    • Tajnog kljuca preko javnog kanala

    • Javnog kljuca preko tajnog kanala

    • Binarnih sekvenci

    Correct Answer
    A. Tajnog kljuca preko javnog kanala
    Explanation
    Satelitski scenarij se koristi za razmenu tajnog ključa preko javnog kanala. Tajni ključ je ključ koji se koristi za enkripciju i dekripciju podataka. Javni kanal je komunikacijski kanal koji je otvoren za sve korisnike i na kojem se mogu razmenjivati podaci. Tajni ključ se šalje preko javnog kanala kako bi se obezbedila sigurna komunikacija između dve strane.

    Rate this question:

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 14, 2018
    Quiz Created by
    Catherine Halcomb
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.