Kripto 2, Drugi Kol

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Catherine Halcomb
Catherine Halcomb
Community Contributor
Quizzes Created: 1443 | Total Attempts: 6,714,021
| Attempts: 1,598 | : 102
Please wait...

Question 1 / 102
0 %
0/100
Score 0/100
1. Izabrati tacnu tvrdnju?

Explanation

The correct answer is "Problem autentifikacije je moguce resiti sa digitalnim potpisom" (The problem of authentication can be solved with a digital signature). A digital signature is a cryptographic technique that provides authentication and integrity to digital documents or messages. It ensures that the sender of the message is verified and that the message has not been tampered with during transmission. Therefore, using a digital signature can effectively solve the problem of authentication.

Submit
Please wait...
About This Quiz
Kripto 2, Drugi Kol - Quiz

2. Autentifikacija je servis bezbednosti kojim se osigurava da je:

Explanation

Authentication is a security service that ensures that the message is sent by an authorized person. It verifies the identity of the sender and ensures that the message has not been tampered with during transmission. This helps in preventing unauthorized access and ensures the integrity of the communication.

Submit
3. Izaberite tacnu tvrdnju:

Explanation

The correct answer is "Problem autentifikacije je moguce resiti sa digitalnim potpisom." The explanation is that a digital signature is a cryptographic mechanism that provides authentication and integrity of digital documents. It ensures the identity of the sender and verifies that the document has not been tampered with during transmission. Therefore, it is possible to solve the problem of authentication using a digital signature.

Submit
4. Autentifikacija podrazumeva:

Explanation

Authentication refers to the process of verifying the identity of the sender or the source of a message. In this context, the correct answer states that authentication involves checking whether the received cryptogram (encrypted message) is sent from an authorized person. This means that the authentication process is focused on ensuring that the sender of the message is indeed authorized to send it, thus confirming the authenticity and integrity of the message.

Submit
5. Pozivom verify() nad instancom klase Signature:

Explanation

The correct answer is "Verifikovan je digitalni potpis" because the sentence translates to "The digital signature has been verified." This suggests that the verify() method called on the Signature class instance successfully confirmed the authenticity and integrity of the digital signature.

Submit
6. Kod scenarija za deljenje tajni:

Explanation

The scenario for secret sharing states that it is not possible to reconstruct the key without one part of the key. This means that each part of the key is essential for reconstructing the original key. Therefore, if one part of the key is missing, it is not possible to reconstruct the complete key.

Submit
7. Ako je sifrat One-time pad-a C=1000, a kljuc K=1111. sta je P?

Explanation

The question states that the ciphertext (C) is 1000 and the key (K) is 1111. The correct answer, P=0111, can be obtained by performing a bitwise XOR operation between C and K. XORing 1 with 1 gives 0, XORing 0 with 1 gives 1, and XORing 0 with 0 gives 0. Therefore, XORing 1 with 0 gives 1. By applying this operation to each corresponding bit of C and K, we get the result P=0111.

Submit
8. Protokol za autentifikaciju može zahtevati uspostavu

Explanation

The correct answer is "sesijskog ključa". The explanation for this answer is that a protocol for authentication may require the establishment of a session key. A session key is a temporary encryption key that is generated for a specific session or communication session between two entities. It is used to encrypt and decrypt the data exchanged during that session, ensuring the confidentiality and integrity of the communication. By using a session key, the security of the communication is increased as it is unique to that session and not used for any other session or communication.

Submit
9. Satelitski scenario je protokol koji se sastoji iz:

Explanation

The correct answer is 3 faze. The explanation for this is that the satellite scenario protocol consists of three phases. This means that there are three distinct stages or steps involved in the protocol. The question does not provide any additional information or context to suggest that the number of phases depends on the number of participants in the scenario. Therefore, the answer "3 faze" is the most accurate and logical choice.

Submit
10. Na sledecem fragmentu java koda prikazan je proces:

Explanation

The given answer suggests that the process being described in the Java code fragment is the initialization of an initialization vector. An initialization vector is commonly used in encryption algorithms, such as AES, to add randomness and enhance the security of the encryption process. It is used to initialize the state of the encryption algorithm before encrypting or decrypting data.

Submit
11. Pozivom metoda getPrivate() nad instancom KeyPair, metod ce vratiti:

Explanation

By calling the getPrivate() method on an instance of KeyPair, the method will return the private key. This means that the getPrivate() method is specifically designed to retrieve and return the private key associated with the KeyPair instance.

Submit
12. Vremenski pecat je najcesce koriscen u:

Explanation

The correct answer is Kerberosu. Kerberos is a network authentication protocol that uses timestamps as part of its authentication process. It is commonly used in computer networks to provide secure authentication for users and services. The use of timestamps, or "vremenski pecat" in Serbian, helps to prevent replay attacks by ensuring that authentication requests are only valid for a certain period of time.

Submit
13. Naredba: keytool -export -alias RSAsertifikat -keystore /c:\Users\sadamovic\Desktop\skladiste.keystore -file /c:\Users\sadamovic\Desktop\RSAsertifikat.der

Explanation

The given command "keytool -export -alias RSAsertifikat -keystore /c:\Users\sadamovic\Desktop\skladiste.keystore -file /c:\Users\sadamovic\Desktop\RSAsertifikat.der" is used to export an RSA certificate in DER format. The command specifies the alias of the certificate as "RSAsertifikat" and the keystore file location as "/c:\Users\sadamovic\Desktop\skladiste.keystore". It exports the certificate to a file named "RSAsertifikat.der" at the specified location "/c:\Users\sadamovic\Desktop\".

Submit
14. U protokolu za autentifikaciju sa javnim kljucem:

Explanation

not-available-via-ai

Submit
15. Dizajn kog protokola je prikazan na slici?

Explanation

The correct answer is "za uzajamnu autentifikaciju sa simetricnim kljucem" which translates to "for mutual authentication with symmetric key" in English. This suggests that the protocol design shown in the picture is for a communication process where both parties authenticate each other using a shared symmetric key.

Submit
16. Na slici je prikazan:

Explanation

The correct answer is Vajnerov Wire-Tap kanal. The image represents Vajner's Wire-Tap channel, which is a type of communication channel that allows a third party to eavesdrop on the communication between two parties without their knowledge. This channel is often used in cryptography to simulate real-world scenarios and test the security of encryption algorithms.

Submit
17. Koliko faza protokola je prikazano na slici:

Explanation

The correct answer is 3 because the question asks how many phases of the protocol are shown in the picture. Since the answer provided is 3, it implies that there are three distinct phases of the protocol depicted in the image. However, without the image or a more detailed description, it is difficult to provide a comprehensive explanation.

Submit
18. U protokolu za autentifikaciju sa simetricnim kljucem:

Explanation

In the authentication protocol with a symmetric key, Alisa and Bob exchange a symmetric key in advance. This means that they both have the same key, which they can use for encryption and decryption. This allows them to securely communicate by encrypting and decrypting messages using the shared key. Sharing the same symmetric key ensures that only Alisa and Bob can access and understand the encrypted messages.

Submit
19. Sifarski sistem je bezuslovno bezbedan ako:

Explanation

The correct answer is that the system cannot be broken even with unlimited computer resources. This means that no matter how much computational power is available, the encryption algorithm used in the system is so strong that it cannot be cracked or decrypted. This level of security ensures that the system is completely safe and cannot be compromised, making it unconditionally secure.

Submit
20. Primer iz prakse za otvaranje sefa sa dva kljuca, lansiranje rakete zahteva tri autorizacije  i sl, je primer za scenario:

Explanation

The given scenario of opening a safe with two keys and launching a rocket requiring three authorizations indicates the concept of "Deljenje tajni" or "Sharing secrets." In this scenario, multiple individuals hold different pieces of information or keys, and their collaboration is necessary to achieve the desired outcome. This concept emphasizes the need for sharing classified information or access to restricted resources among trusted parties to accomplish a specific task or goal.

Submit
21. Šta podrazumeva bezuslovna ili teorijska bezbednost?

Explanation

This answer suggests that the term "bezbednost" refers to security against an adversary who has unlimited time and computational resources. This means that the level of security being discussed is focused on protecting against attacks from an adversary who has the ability to dedicate unlimited resources to breaking the security measures in place.

Submit
22. Jedini uslov za bezbedan rad Vajnerovog Wire-Tap kanala je:

Explanation

The correct answer is "Da napadac prima zasumljenu verziju signala legitimnog prijemnika". This means that the only condition for the safe operation of the Vajner Wire-Tap channel is that the attacker receives a noisy version of the legitimate receiver's signal.

Submit
23. Sta na grafiku oznacava plava horizonatalna isprekidana linija? 

Explanation

The blue dashed horizontal line on the graph represents the boundary of the attacker. This means that any data or actions that lie beyond this boundary are considered to be outside of the attacker's control or influence. It signifies the limit or extent to which the attacker can potentially cause harm or compromise the system's security.

Submit
24. Koje dve vrste bezbednosti razlikuje Senon?

Explanation

Senon razlikuje dve vrste bezbednosti: računarsku i bezuslovnu.

Submit
25. Izaberite tacnu definiciju perfektne sifre?

Explanation

The correct answer is "Postoji kljuc koji preslikava svaku poruku u bilo koji sifrat sa jednakom verovatnocom." This means that there is a key that can map any message to any cipher with equal probability. In other words, each message has an equal chance of being encrypted into any possible cipher. This ensures that the encryption process is unbiased and random, making it difficult for an attacker to determine the original message based on the cipher.

Submit
26. Karakteristike koje sifre su prikazane na slici?

Explanation

The question is asking about the characteristics of the codes shown in the picture. The correct answer is "Perfektni sifarski algoritam" which translates to "Perfect cipher algorithm" in English. This suggests that the codes in the picture are an example of a perfect cipher algorithm, which is a type of encryption algorithm that provides perfect secrecy and is unbreakable even with infinite computational power.

Submit
27. Na sledecem fragmentu java koda instance klase KeyPair sadrzi:

Explanation

The correct answer is "privatni i javni kljuc." This is because the class KeyPair in Java typically represents a pair of cryptographic keys, which consists of both a private key and a public key. These keys are used for various encryption and decryption operations in cryptography.

Submit
28. Koji scenario je prikazan na slici?

Explanation

The correct answer is "Bob autentifikuje Alisu sa simetricnim kljucem". This means that Bob is authenticating Alice using a symmetric key. This implies that Bob and Alice share the same key, and Bob is verifying Alice's identity using this key.

Submit
29. Protokoli za uzajamnu autentifikaciju sa simetričnim ključevima

Explanation

The correct answer states that protocols for mutual authentication with symmetric keys are not always safe and that there is a possibility of an attack. This implies that while these protocols may provide security in some cases, they are not foolproof and can still be vulnerable to certain attacks.

Submit
30. Koji napadi su moguci na protkol sa slike:

Explanation

The correct answer is "mogucnost ponovnog slanja" (possibility of replay attacks). A replay attack occurs when an attacker intercepts and maliciously retransmits data that was previously valid. In the context of the given question, it refers to the possibility of an attacker intercepting and resending data, potentially compromising the security of the system. This could lead to unauthorized access or other malicious actions.

Submit
31. Koji kriptografski protokol je prikazan na slici?

Explanation

The correct answer is "Protokol za obostranu autentifikaciju koji implementira PFS." This means that the cryptographic protocol shown in the picture is a protocol for mutual authentication that implements Perfect Forward Secrecy (PFS). PFS ensures that even if the long-term secret key is compromised, past sessions remain secure.

Submit
32. Koji protkol je prikazan na slici?

Explanation

The correct answer is "Autentifikacija sa simetricnim kljucem" (Authentication with symmetric key). This is indicated by the image, which suggests that a symmetric key is being used for authentication. Symmetric key authentication involves using the same key for both encrypting and decrypting data, ensuring that the sender and receiver have the same key to authenticate each other.

Submit
33. Ako su autentifikacija i tajnost dva nezavisna servisa, u tom slucaju kriptografski sistemi za apsolutnu tajnost:

Explanation

Cryptographic systems for absolute secrecy cannot provide authentication because authentication involves verifying the identity of the sender or recipient of a message. While cryptographic systems can ensure confidentiality by encrypting the message, they do not have the capability to verify the authenticity of the sender or recipient. Authentication requires additional mechanisms such as digital signatures or certificates to ensure the integrity and authenticity of the communication.

Submit
34. Naredba: keytool - export -alias DSAsertifikat -keystore /c:\Users\sadamovic\Desktop\skladiste.keystore -rfc -file /c:\Users\sadamovic\Desktop\DSAsertifikat.b64

Explanation

The given command "keytool - export -alias DSAsertifikat -keystore /c:\Users\sadamovic\Desktop\skladiste.keystore -rfc -file /c:\Users\sadamovic\Desktop\DSAsertifikat.b64" exports the DSA certificate in BASE64 format. This means that the DSA certificate will be encoded using the BASE64 encoding scheme, which represents binary data in ASCII format. The exported certificate will be saved in the file named "DSAsertifikat.b64" on the desktop of the user "sadamovic".

Submit
35. Da bismo garantovali autentifikaciju, verovatnoca PI mora biti mala, a to znaci da uzajamna informacija izmedju sifrata i kljuca mora biti velika. S druge strane znamo da bismo obezbedili apsolutnu tajnost mora vaziti I(C;M)=0, sto je oprecno zahtevu autentifikacije:

Explanation

The given statement is discussing the requirements for authentication and confidentiality in a cryptographic system. It states that in order to guarantee authentication, the probability of incorrect decryption (PI) must be low, which means that the mutual information between the ciphertext (C) and the key (K) must be high. On the other hand, to ensure absolute confidentiality, it must hold that I(C;M) = 0, which contradicts the requirement for authentication. Therefore, the statement is true because the requirements for authentication and absolute confidentiality are contradictory.

Submit
36. Autentifikacija i tajnost su:

Explanation

Authentication and confidentiality are theoretically incompatible. This means that in theory, it is difficult to achieve both authentication and confidentiality simultaneously. Authentication ensures that the user or entity is who they claim to be, while confidentiality ensures that the information is kept private and secure. In practice, implementing strong authentication measures can sometimes compromise confidentiality, and vice versa. However, this answer suggests that in theory, it is not possible to achieve both authentication and confidentiality without some trade-offs or challenges.

Submit
37. U protokolu za autentifikaciju sa vremenskim pecatom prvo:

Explanation

In the given protocol for authentication with a timestamp, the correct sequence of steps is to first sign the message, then calculate the timestamp, and finally encrypt the message. This order ensures that the message is securely signed before the timestamp is added and the entire message is encrypted. If the steps were performed in a different order, the security and integrity of the authentication process could be compromised.

Submit
38. Brzina tajnog kljuca je:

Explanation

The correct answer is "Maksimalna brzina pri kojoj se A I B dogovore o tajnom kljucu S." This means that the maximum speed at which A and B can agree on a secret key S is the correct answer. This suggests that there is a certain speed limit or threshold that A and B need to meet in order to establish a secure secret key. It implies that if their speed is below this maximum limit, they will not be able to successfully agree on the secret key.

Submit
39. PFS podrazumeva:

Explanation

PFS (Perfect Forward Secrecy) podrazumeva korišćenje sesijskog ključa koji se koristi samo jednom, a zatim trajno uništava. Ovo je važno za obezbeđivanje sigurnosti komunikacije, jer se svaki put kada se uspostavi nova sesija generiše novi ključ koji se ne može rekonstruisati iz prethodnih sesija. Na taj način, čak i ako se jedan ključ kompromituje, prethodne sesije ostaju sigurne. Uništavanje ključeva nakon korišćenja sprečava njihovo eventualno otkrivanje i zloupotrebu.

Submit
40. izaberi algoritam koji se moze koristit za autentifikaciju simetricnim kriptografskim funkcijama?

Explanation

DES (Data Encryption Standard) and AES (Advanced Encryption Standard) are both symmetric cryptographic algorithms that can be used for authentication. Symmetric cryptographic functions use the same key for both encryption and decryption, making them suitable for verifying the authenticity of data. DES and AES are widely used and trusted encryption standards, with AES being the more secure and commonly used algorithm in modern cryptographic systems.

Submit
41. Izraz I(M;C)=0, garantuje da sifrat ne otkriva informaciju o:

Explanation

The expression I(M;C)=0 guarantees that the ciphertext does not reveal any information about the plaintext.

Submit
42. Satelitski scenario nije moguc kada je:

Explanation

In a satellite scenario, the transmission error refers to the error that occurs during the transmission of data from the sender to the receiver, while the attacker's error refers to any error introduced by an attacker trying to disrupt the communication. The correct answer states that the attacker's error is 0, meaning that there is no error introduced by the attacker. This implies that the communication is not compromised by any malicious activity, making the satellite scenario possible.

Submit
43. Satelitski scenatio sluzi za razmenu:

Explanation

Satelitski scenarij se koristi za razmenu tajnog ključa preko javnog kanala. Tajni ključ je ključ koji se koristi za enkripciju i dekripciju podataka. Javni kanal je komunikacijski kanal koji je otvoren za sve korisnike i na kojem se mogu razmenjivati podaci. Tajni ključ se šalje preko javnog kanala kako bi se obezbedila sigurna komunikacija između dve strane.

Submit
44. TCP protokol

Explanation

The correct answer is "nije namenjen za autentifikaciju na mreži." This is because TCP protocol is not designed specifically for network authentication purposes. TCP (Transmission Control Protocol) is a reliable transport protocol that ensures the delivery of data packets in a network. It handles the segmentation, reassembly, and flow control of data. However, authentication in a network typically requires protocols like RADIUS or LDAP, which are specifically designed for authentication purposes. TCP does not provide built-in authentication mechanisms.

Submit
45. Na slici je prikazan:

Explanation

not-available-via-ai

Submit
46. Sta podrazumeva  Senonov ideal tajnog komuniciranja?

Explanation

Senonov ideal tajnog komuniciranja podrazumeva da pošiljalac koristi True Random Number Generator (TRNG) za generisanje nasumičnih ključeva ili brojeva koje koristi za enkripciju poruke. Ovi nasumični ključevi su potpuno nepredvidivi i neponovljivi. Primalac takođe koristi isti TRNG za generisanje istih ključeva kako bi dešifrovao poruku. Ovaj pristup osigurava visok nivo tajnosti i sigurnosti u komunikaciji između pošiljaoca i primaoca.

Submit
47. Cesto kaze da je dokaziva racunarska bezbednost:

Explanation

The correct answer is "nemoguca ili mit" which translates to "impossible or myth" in English. This suggests that the statement is claiming that proving computer security is either impossible or just a myth. It implies that achieving complete and foolproof security in the realm of computers is extremely challenging, if not unattainable.

Submit
48. U protokolu na slici:  

Explanation

In the given protocol, both Alisa and Bob are required to know the password. This is indicated by the statements "Alisa mora da zna lozinku" (Alisa must know the password) and "Bob mora da zna lozinku" (Bob must know the password). Therefore, the correct answer is that both Alisa and Bob must know the password.

Submit
49. Za implementaciju PFS u zastitni protokol, koristi se:

Explanation

Difi-Helman se koristi za implementaciju PFS (Perfect Forward Secrecy) u zastitni protokol. PFS je sigurnosna karakteristika koja osigurava da, čak i ako se privatni ključ kompromituje u budućnosti, prethodne komunikacije ostanu sigurne. Difi-Helman protokol omogućava razmenu tajnih ključeva između dvije strane koje komuniciraju, bez da te ključeve razmjenjuju preko mreže. Na taj način, čak i ako napadač presretne komunikaciju i dobije trenutne ključeve, neće biti u mogućnosti dešifrovati prethodne poruke.

Submit
50. U procesu za kodovanje irisa koristi se:

Explanation

Gabor wavelets are used in the process of encoding iris. Gabor wavelets are a type of wavelet transform that are specifically designed to analyze and extract features from images. They are commonly used in image processing tasks such as image recognition and biometric identification. In the context of iris encoding, Gabor wavelets are used to extract unique features from the iris image, which can then be used for identification and verification purposes.

Submit
51. Da bismo garantovali autentifikaciju, verovatnoca PI mora biti velika, a to znaci da uzajamna informacija izmedju sifrata i kljuca mora biti velika. S druge strane znamo da bismo obezbedili apsolutnu tajnost mora vaziti I(C;M)=0, sto je oprecno zahtevu autentifikacije:

Explanation

The explanation for the given correct answer is that the statement is not true because in order to guarantee authentication, the probability PI must be high, which means that the mutual information between the cipher and the key must also be high. On the other hand, to ensure absolute secrecy, it must hold that I(C;M) = 0, which contradicts the requirement for authentication. Therefore, the statement is not true.

Submit
52. Sta podrazumeva racunarska ili prakticna bezbednost?

Explanation

The correct answer suggests that the concept of security in this context refers to protecting against an adversary who has limited time and computational resources. This implies that the focus is on preventing attacks from adversaries who are constrained in terms of time and computing power, indicating a need for efficient and effective security measures within those limitations.

Submit
53. Sta podrazumeva Senonov pseudo ideal tajnog komuniciranja?

Explanation

The Senone's pseudo-ideal secret communication implies that the sender uses a Pseudo Random Number Generator (PRNG) to encrypt the message, and the receiver uses the same PRNG to decrypt the message. Therefore, the correct sequence for Senone's pseudo-ideal secret communication is posiljalac (sender) - PRNG - primalac (receiver).

Submit
54. Sta podrazumeva  dokaziva bezuslovna bezbednost?

Explanation

The correct answer states that unconditional security implies that for a given cryptographic system, it can be rigorously proven to have nominated security against an adversary with unlimited time resources. This means that no matter how much time the adversary has, they will not be able to break the security of the system.

Submit
55. Tehnika koja se koristi za proces segmentacije je:

Explanation

The correct answer is "Hafov algoritam" (Haar's algorithm). Haar's algorithm is a technique used for image segmentation, which involves dividing an image into multiple regions or segments based on certain characteristics or features. This algorithm is commonly used for face detection and object recognition tasks. It utilizes Haar-like features, which are rectangular features that can be used to identify edges, lines, and textures in an image. By applying Haar's algorithm, an image can be effectively segmented into distinct regions, enabling further analysis and processing.

Submit
56. U dizajnu protokola sa slike:

Explanation

In the protocol design shown in the image, the key K is digitally signed. This means that a digital signature is applied to the key K, providing authentication and integrity verification. By digitally signing the key, the recipient can verify that the key has not been tampered with during transmission and that it was indeed sent by the intended sender. This ensures the security and trustworthiness of the key used in the protocol.

Submit
57. Dizajn protokola sa slike je:

Explanation

The protocol design shown in the image is considered "potpuno bezbedan" or completely secure because it ensures confidentiality, integrity, and authentication. The use of symmetric key authentication between Alice and Bob ensures that only authorized parties can access the encrypted data. There is no indication of any vulnerabilities or weaknesses in the protocol that could be exploited by an attacker. Therefore, the protocol design is considered to be completely secure.

Submit
58. Na sledecem fragmentu java koda prikazan je proces:

Explanation

The given answer suggests that the process being described in the given Java code fragment is "Sifrovanja sa RSA algoritmom" which translates to "Encryption with RSA algorithm" in English.

Submit
59. Na sledecem fragmentu java koda prikazan je proces:

Explanation

The given correct answer is "Desiforvanja sa RSA algoritmom" which translates to "Decryption with the RSA algorithm" in English. This process involves using the RSA algorithm to decrypt encrypted data. RSA is a widely used encryption algorithm in which a public key is used for encryption and a private key is used for decryption. In this process, the encrypted data is decrypted using the private key, which ensures the confidentiality and integrity of the message.

Submit
60. Osnovni uslovi koji reba da budu ispunjeni za pravilnu implementacju One-time pad sifre su:

Explanation

The correct answer is that the key must not be repeated, the key must be the same length as the message, and the entropy of the key must be 1. This means that in order for the one-time pad cipher to be implemented correctly, the key used for encryption must not have any repeated characters, it must be the exact same length as the message, and the randomness or unpredictability of the key must be maximum (entropy of 1). These conditions ensure the security and effectiveness of the one-time pad cipher.

Submit
61. Kriptosistem je perfektno tajan ako sifrat ne otkriva informaciju o:

Explanation

A perfect secret cryptographic system is one that does not reveal any information about the key or the plaintext. In this case, the correct answer is "kljucu" (key) and "otvorenom tekstu" (plaintext). The key is the secret parameter used in the encryption and decryption process, and the plaintext is the original message that is being encrypted. In a perfect secret cryptographic system, the ciphertext should not provide any information about the key or the plaintext, ensuring the confidentiality and security of the communication.

Submit
62. Cesto se kaze da je dokaziva bezuslovna bezbednost:

Explanation

The correct answer is "moguca" (possible). This means that unconditional security is achievable.

Submit
63. Pozivom metoda getPublic().getEncoded() nad instancom KeyPair, metod ce vratiti:

Explanation

The method getPublic().getEncoded() returns the public key in the form of a byte array.

Submit
64. Na sledecem fragmentu java koda prikazan je proces:

Explanation

The given answer is a correct explanation of the process. It states that the process involves storing the cipher in a byte array and performing encryption using the AES algorithm.

Submit
65. Sta podrazumeva dokaziva racunarska bezbednost?

Explanation

The correct answer states that computational security is achieved when the nominated security of a given cryptographic system can be rigorously proven against an adversary who has specific time and computational resources. This means that the cryptographic system can withstand attacks from an adversary with limited resources and still maintain its security. The answer excludes the possibility of proving security against an adversary with unlimited time and resources, as well as against specific keys and algorithms.

Submit
66. Na sledecem java fragmentu koda prikazan je proces: 

Explanation

The given answer "ucitavanja kljuca" (loading the key) is correct because it is the last step mentioned in the given Java code fragment. The code fragment describes a process that includes generating a key pair, generating a Java keystore, generating an instance for the RSA algorithm, storing the generated cryptographic key, changing the password of the Java keystore, and finally loading the key.

Submit
67. Naredba: keytool -genkey -alias DSAsertifikat -v -keystore /c:\Users\sadamovic\Desktop\skladiste.keystore

Explanation

The given command "keytool -genkey -alias DSAsertifikat -v -keystore /c:\Users\sadamovic\Desktop\skladiste.keystore" is used to generate a DSA certificate for digital signing. The "-genkey" option is used to generate a new key pair, "-alias DSAsertifikat" sets the alias for the generated key pair, "-v" enables verbose output, and "-keystore /c:\Users\sadamovic\Desktop\skladiste.keystore" specifies the location and name of the keystore file where the generated key pair will be stored. This command is specifically used for generating a DSA certificate for digital signing purposes.

Submit
68. Koja faza protokola je prikazana na slici?

Explanation

The correct answer is "Pojacavanje privatnosti." The image most likely depicts a phase of a protocol that involves enhancing or strengthening privacy measures. This phase may involve implementing encryption, authentication, or other security measures to protect sensitive information and ensure that only authorized individuals can access it.

Submit
69. Na sledecem fragmentu java koda prikazan je:

Explanation

not-available-via-ai

Submit
70. Nakon razmene serijskog kljuca preko PFS, Alisa i Bob:

Explanation

not-available-via-ai

Submit
71. Na slici je prikazana sema:

Explanation

The correct answer is "opstog simetricnog sistema tajnog komuniciranja" which translates to "general symmetric system of secret communication" in English. This answer suggests that the diagram represents a general system of secret communication that uses symmetric encryption techniques.

Submit
72. U dizajnu protokola na slici: 

Explanation

This question is about protocol design and the ability of different entities to impersonate each other. The correct answer, "Nista od pondjenog," means "None of the above" in English. Therefore, none of the given statements are true.

Submit
73. Izaberi algoritam koji se moze koristiti za autentifikaciju asimetricnim kriptografskim funkcijama?

Explanation

RSA je algoritam koji se može koristiti za autentifikaciju asimetričnim kriptografskim funkcijama. RSA je jedan od najčešće korišćenih algoritama za enkripciju i digitalno potpisivanje. Koristi se za generisanje javnog i privatnog ključa, gde se poruka enkriptuje sa javnim ključem i dekriptuje sa privatnim ključem. Ovaj proces omogućava autentifikaciju i osigurava da samo osoba koja poseduje privatni ključ može dekriptovati poruku.

Submit
74. Prikazani protkol na slici obezbedjuje:

Explanation

The protocol shown in the image provides authentication for Bob, mutual authentication, and authentication for Alice. This means that it ensures the verification of Bob's identity, allows both parties to authenticate each other, and also verifies Alice's identity.

Submit
75. Naredba: -keytool -genkey -alias -RSAsertifikat  -v - keyalg RSA -keystore /c:\Users\sadamovic\Desktop\skladiste.keystore

Explanation

The given command "Naredba: -keytool -genkey -alias -RSAsertifikat -v - keyalg RSA -keystore /c:\Users\sadamovic\Desktop\skladiste.keystore" is used to generate an RSA certificate.

Submit
76. Vajnerov Wire-Tap kanal je protocol za razmenu:

Explanation

The correct answer is "Simetricnih kljuceva" which translates to "Symmetric keys" in English. This suggests that the Vajnerov Wire-Tap channel is a protocol used for the exchange of symmetric keys.

Submit
77. Cemu je jednak kapacitet tajnosti Vajnerovog kanala?

Explanation

The capacity of the Vajner channel is equal to 0 if the attacker's channel is better than the legitimate channels. This means that if the attacker has a stronger channel than the legitimate parties, the secrecy capacity of the Vajner channel is completely compromised, resulting in a capacity of 0.

Submit
78. Naredba: keytool -list -keystore /c:\Users\sadamovic\Desktop\skladiste.keystore

Explanation

The given command "keytool -list -keystore /c:\Users\sadamovic\Desktop\skladiste.keystore" is used to list the certificates generated in the keystore located at the specified path. It allows the user to view the certificates stored in the keystore, providing an overview of the generated certificates in the keystore.

Submit
79. Satelitski scenario je:

Explanation

The correct answer is "nemoguc ako je greska napadaca manja od greske legitimnih ucesnika u protokolu." This means that the satellite scenario is not possible if the attacker's error is smaller than the legitimate participants' error in the protocol. In other words, if the attacker's error is smaller or equal to the legitimate participants' error, the satellite scenario cannot be achieved.

Submit
80. Metoda getFormat() nad klasom X509EncodedKeySpec daje:

Explanation

The getFormat() method on the X509EncodedKeySpec class returns the format of the public key. This means that when this method is called, it will provide information about the format in which the public key is encoded. It does not provide information about the format of the private key or the encryption algorithm used.

Submit
81. One-time pad sifra:

Explanation

The correct answer is "Predstavlja bezuslovno bezbedan kripto sistem, Veoma je neprakticna za upotrebu u racunarskim mrezama, Koristi se na mestima gde se zahteva visok nivo zastite." This answer is correct because it states that the one-time pad cipher is unconditionally secure, meaning it cannot be cracked even with unlimited computational power. It also mentions that it is impractical for use in computer networks and is used in places where a high level of security is required.

Submit
82. Perfektna tajnost (PFS) podrazumeva da Trudi:

Explanation

The correct answer states that Trudi cannot decrypt all the recorded ciphers with just one key K, and she cannot obtain the key if she has access to Alice's computer. This means that perfect secrecy (PFS) is achieved because even if Trudi has access to some information, she still cannot decrypt all the ciphers or obtain the key.

Submit
83. Klasu X509EncodedKeySpec koristimo za

Explanation

Klasa X509EncodedKeySpec se koristi za učitavanje javnog ključa.

Submit
84. Koje pravilo važi za bezuslovno bezbedne šifre?

Explanation

The correct answer is "Metodom pretrage svih tajnih ključeva sve dobijene poruke su jednako verovatne." This means that when searching through all the secret keys, all the obtained messages are equally likely. This suggests that the method used for searching the secret keys does not introduce any bias or preference towards certain messages, ensuring that the probability of obtaining any specific message is the same for all messages.

Submit
85. Izaberite karakteristike One-time pad sifre:

Explanation

The correct answer is "Sifrat ne govori nista o kljucu" and "Sifrat ne govori nista o poruci". This means that the ciphertext does not reveal any information about the key used for encryption, and it also does not reveal any information about the original plaintext message. This is a characteristic of the one-time pad cipher, where the key is completely random and as long as the message, providing perfect secrecy.

Submit
86. Pozivom sign() nad instancom klase Signature:

Explanation

By calling the sign() method on an instance of the Signature class, an electronic signature is generated and the data is digitally signed. This means that the data has been encrypted using the RSA encryption algorithm and a digital signature has been generated. The generated signature can be used to verify the authenticity and integrity of the data by verifying the signature.

Submit
87. Autentifikacija preko mreže je daleko kompleksnija, razlog tome je:

Explanation

The given answer correctly identifies two reasons why network authentication is complex. The first reason is that an attacker can passively observe messages, which means they can intercept and read the messages without modifying them. The second reason is that possible active attacks, such as message insertion, deletion, and modification, can occur. Additionally, the attacker can replay a message, meaning they can resend a previously captured message to deceive the system.

Submit
88. Izaberite kriptografske protokole:

Explanation

The correct answer includes the protocols Kerberos, GSM, and SSL. Kerberos is a network authentication protocol that provides secure communication over an insecure network. GSM (Global System for Mobile Communications) is a standard protocol for mobile telecommunications that includes encryption for secure communication. SSL (Secure Sockets Layer) is a cryptographic protocol that provides secure communication over the internet. These protocols are commonly used to ensure the confidentiality and integrity of data transmission.

Submit
89. Klasu PKCS8EncodedKeySpec koristimo za:

Explanation

The correct answer is "Ucitavanje privatnog kljuca" which translates to "Loading private key" in English. PKCS8EncodedKeySpec is a class in Java that is used for encoding and decoding private keys in PKCS#8 format. Therefore, it is used for loading or reading private keys.

Submit
90. Preko konstruktora klase Signature.getInstance("SHA1withRSA") mozemo:

Explanation

The correct answer is "Sifrovati sa RSA algoritmom" and "Digitalno potpisati poruku". This is because the method Signature.getInstance("SHA1withRSA") allows us to encrypt a message using the RSA algorithm and also digitally sign a message using the RSA algorithm.

Submit
91. Naredba: -keytool -certreq -v -alias parKljuceva - keystore /c:\Users\sadamovic\Desktop\skladiste.keystore -file /c:\Users\sadamovic\Desktop\zahtev.csr

Explanation

The given command "keytool -certreq -v -alias parKljuceva - keystore /c:\Users\sadamovic\Desktop\skladiste.keystore -file /c:\Users\sadamovic\Desktop\zahtev.csr" is used to create a certificate signing request (CSR) for a digital signature from a certificate authority (CA).

Submit
92. Na sledecem fragmentu java koda prikazan je proces:

Explanation

The given answer states that the process described in the given Java code fragment is the process of encrypting data using the AES algorithm. This can be inferred from the mention of "sifrovanja" which means encryption in Serbian, and "AES algoritmom" which refers to the AES algorithm. The code fragment likely includes the necessary steps to encrypt data using the AES algorithm, such as initializing the initial vector and performing the encryption process.

Submit
93. Na sledecem java fragmentu koda prikazan je proces:

Explanation

The correct answer is "ucitavanje kljuca" which translates to "loading the key" in English. This suggests that the code fragment is performing the process of loading a key.

Submit
94. Bez poznavanja kljuca perfektne sifre:

Explanation

The given statement implies that without knowledge of the perfect cipher key, any open text can equally likely correspond to any key. This means that there is no specific relationship between the open text and the key, and any key could potentially decrypt the open text. Therefore, the answer states that any open text is equally likely to correspond to any key.

Submit
95. Naredba: keytool -genkey -keyalg RSA -keysize 2048 -alias parKljuceva -keystore /c:\Users\sadamovic\Desktop\skladiste.keystore\DSAsertifikat.b64

Explanation

The given command "keytool -genkey -keyalg RSA -keysize 2048 -alias parKljuceva -keystore /c:\Users\sadamovic\Desktop\skladiste.keystore\DSAsertifikat.b64" is used to generate a key pair (private and public) for encryption and decryption purposes. This command specifies the algorithm (RSA), key size (2048 bits), alias (parKljuceva), and the location to store the generated key pair (/c:\Users\sadamovic\Desktop\skladiste.keystore\DSAsertifikat.b64).

Submit
96. Sta predstavlja protokol na slici?

Explanation

The correct answer is "Razmenu sesijskog kljuca preko javnog kljuca". This is because the protocol on the image represents the exchange of a session key using a public key.

Submit
97. Na sledecem java fragmentu prikazan je proces:

Explanation

The given correct answer suggests that the process being described in the Java fragment is the "memorization of the generated cryptographic key." This means that after generating a pair of keys using the RSA algorithm, the code is storing or saving the generated key for future use. The other steps mentioned in the fragment, such as generating an RSA instance, generating a Java keystore, loading a key, and changing the keystore password, are not relevant to the answer.

Submit
98. Izabrati pravilno koriscenu notaciju za opisani slucaj?

Explanation

The correct answer is "Desifrovati poruku sa Bobovim javnim kljucem : {C}Bob d, Potpisati poruku M sa Alisinim privatnim kljucem: [M]Alisa d". This is because "Desifrovati poruku sa Bobovim javnim kljucem" means decrypting a message with Bob's public key, and "Potpisati poruku M sa Alisinim privatnim kljucem" means signing a message M with Alice's private key. Both of these actions are described using the correct notation in the given options.

Submit
99. Efikasnost kod zastitnih protokola podrazumeva:

Explanation

The correct answer is "Radi cak i kada se promeni okruzenje" which means "Works even when the environment changes". This implies that the efficiency of protective protocols is not affected by changes in the surrounding conditions or circumstances. It remains effective and functional regardless of any modifications or variations in the environment. Additionally, the answer "Mora raditi i kada napadac pokusava da ga prekine" which means "It must work even when the attacker tries to interrupt it" emphasizes the importance of the protective protocol's ability to withstand and continue functioning in the face of attacks or attempts to disrupt it.

Submit
100. Scenario sa deljenjem tajni podrazumeva da je potrebno vise:

Explanation

The correct answer is "kljuceva za autorizaciju, osoba za rekonstrukciju kljuca." In the scenario of sharing secrets, it is necessary to have multiple keys for authorization and a person for key reconstruction. This implies that authorization requires multiple keys to ensure security, and in case of any issues, there should be a designated person responsible for reconstructing the key. The other options mentioned in the scenario, such as ciphers, plaintexts, and authentication keys, are not directly related to the concept of sharing secrets.

Submit
101. Koje operacione scenarije ukljucuje nominovana bezbednost?

Explanation

The nominated security includes scenarios that involve information known to system users, all physical assumptions regarding what system users can do, the system's resistance to certain attacks, and information known to attackers.

Submit
102. Izaberi sve faze satelitskog scenarija:

Explanation

The correct answer includes the phases "Pojacavanje privatnosti" (enhancing privacy), "Usaglasavanje informacije" (information alignment), and "Destilacija prednosti" (distilling advantages). These phases are part of a satellite scenario where privacy is strengthened, information is aligned, and advantages are distilled. The other options, "Uoblicavanje redudanse" (shaping redundancy), "Zastita integriteta poruke" (message integrity protection), and "Sinhronizacija greske" (error synchronization), are not mentioned in the given scenario.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 14, 2018
    Quiz Created by
    Catherine Halcomb
Cancel
  • All
    All (102)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Izabrati tacnu tvrdnju?
Autentifikacija je servis bezbednosti kojim se osigurava da je:
Izaberite tacnu tvrdnju:
Autentifikacija podrazumeva:
Pozivom verify() nad instancom klase Signature:
Kod scenarija za deljenje tajni:
Ako je sifrat One-time pad-a C=1000, a kljuc K=1111. sta je P?
Protokol za autentifikaciju može zahtevati uspostavu
Satelitski scenario je protokol koji se sastoji iz:
Na sledecem fragmentu java koda prikazan je proces:
Pozivom metoda getPrivate() nad instancom KeyPair, metod ce vratiti:
Vremenski pecat je najcesce koriscen u:
Naredba: keytool -export -alias RSAsertifikat -keystore...
U protokolu za autentifikaciju sa javnim kljucem:
Dizajn kog protokola je prikazan na slici?
Na slici je prikazan:
Koliko faza protokola je prikazano na slici:
U protokolu za autentifikaciju sa simetricnim kljucem:
Sifarski sistem je bezuslovno bezbedan ako:
Primer iz prakse za otvaranje sefa sa dva kljuca, lansiranje rakete...
Šta podrazumeva bezuslovna ili teorijska bezbednost?
Jedini uslov za bezbedan rad Vajnerovog Wire-Tap kanala je:
Sta na grafiku oznacava plava horizonatalna isprekidana linija? 
Koje dve vrste bezbednosti razlikuje Senon?
Izaberite tacnu definiciju perfektne sifre?
Karakteristike koje sifre su prikazane na slici?
Na sledecem fragmentu java koda instance klase KeyPair sadrzi:
Koji scenario je prikazan na slici?
Protokoli za uzajamnu autentifikaciju sa simetričnim ključevima
Koji napadi su moguci na protkol sa slike:
Koji kriptografski protokol je prikazan na slici?
Koji protkol je prikazan na slici?
Ako su autentifikacija i tajnost dva nezavisna servisa, u tom slucaju...
Naredba: keytool - export -alias DSAsertifikat -keystore...
Da bismo garantovali autentifikaciju, verovatnoca PI mora biti mala, a...
Autentifikacija i tajnost su:
U protokolu za autentifikaciju sa vremenskim pecatom prvo:
Brzina tajnog kljuca je:
PFS podrazumeva:
Izaberi algoritam koji se moze koristit za autentifikaciju simetricnim...
Izraz I(M;C)=0, garantuje da sifrat ne otkriva informaciju o:
Satelitski scenario nije moguc kada je:
Satelitski scenatio sluzi za razmenu:
TCP protokol
Na slici je prikazan:
Sta podrazumeva  Senonov ideal tajnog komuniciranja?
Cesto kaze da je dokaziva racunarska bezbednost:
U protokolu na slici:  
Za implementaciju PFS u zastitni protokol, koristi se:
U procesu za kodovanje irisa koristi se:
Da bismo garantovali autentifikaciju, verovatnoca PI mora biti velika,...
Sta podrazumeva racunarska ili prakticna bezbednost?
Sta podrazumeva Senonov pseudo ideal tajnog komuniciranja?
Sta podrazumeva  dokaziva bezuslovna bezbednost?
Tehnika koja se koristi za proces segmentacije je:
U dizajnu protokola sa slike:
Dizajn protokola sa slike je:
Na sledecem fragmentu java koda prikazan je proces:
Na sledecem fragmentu java koda prikazan je proces:
Osnovni uslovi koji reba da budu ispunjeni za pravilnu implementacju...
Kriptosistem je perfektno tajan ako sifrat ne otkriva informaciju o:
Cesto se kaze da je dokaziva bezuslovna bezbednost:
Pozivom metoda getPublic().getEncoded() nad instancom KeyPair, metod...
Na sledecem fragmentu java koda prikazan je proces:
Sta podrazumeva dokaziva racunarska bezbednost?
Na sledecem java fragmentu koda prikazan je proces: 
Naredba: keytool -genkey -alias DSAsertifikat -v -keystore...
Koja faza protokola je prikazana na slici?
Na sledecem fragmentu java koda prikazan je:
Nakon razmene serijskog kljuca preko PFS, Alisa i Bob:
Na slici je prikazana sema:
U dizajnu protokola na slici: 
Izaberi algoritam koji se moze koristiti za autentifikaciju...
Prikazani protkol na slici obezbedjuje:
Naredba: -keytool -genkey -alias -RSAsertifikat  -v - keyalg RSA...
Vajnerov Wire-Tap kanal je protocol za razmenu:
Cemu je jednak kapacitet tajnosti Vajnerovog kanala?
Naredba: keytool -list -keystore...
Satelitski scenario je:
Metoda getFormat() nad klasom X509EncodedKeySpec daje:
One-time pad sifra:
Perfektna tajnost (PFS) podrazumeva da Trudi:
Klasu X509EncodedKeySpec koristimo za
Koje pravilo važi za bezuslovno bezbedne šifre?
Izaberite karakteristike One-time pad sifre:
Pozivom sign() nad instancom klase Signature:
Autentifikacija preko mreže je daleko kompleksnija, razlog tome je:
Izaberite kriptografske protokole:
Klasu PKCS8EncodedKeySpec koristimo za:
Preko konstruktora klase...
Naredba: -keytool -certreq -v -alias parKljuceva - keystore...
Na sledecem fragmentu java koda prikazan je proces:
Na sledecem java fragmentu koda prikazan je proces:
Bez poznavanja kljuca perfektne sifre:
Naredba: keytool -genkey -keyalg RSA -keysize 2048 -alias parKljuceva...
Sta predstavlja protokol na slici?
Na sledecem java fragmentu prikazan je proces:
Izabrati pravilno koriscenu notaciju za opisani slucaj?
Efikasnost kod zastitnih protokola podrazumeva:
Scenario sa deljenjem tajni podrazumeva da je potrebno vise:
Koje operacione scenarije ukljucuje nominovana bezbednost?
Izaberi sve faze satelitskog scenarija:
Alert!

Advertisement