Zast 1.Kol

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Catherine Halcomb
Catherine Halcomb
Community Contributor
Quizzes Created: 1443 | Total Attempts: 6,714,021
| Attempts: 992 | : 84
Please wait...

Question 1 / 84
0 %
0/100
Score 0/100
1. Uopsteno gledano, kontrola pristupa resursima u racunarskim mrezama moze se posmatati kao pitanje:

Explanation

The correct answer is "Ko sme, sta, i sa cim da radi" which translates to "Who can, what, and with what to do". This answer aligns with the general concept of access control in computer networks, which involves determining the permissions and restrictions for users or entities accessing system resources. It encompasses the idea of specifying who is allowed to perform certain actions, what actions they can perform, and what resources they can access or manipulate.

Submit
Please wait...
About This Quiz
Zast 1.Kol - Quiz

2. Softverskim filterima paketa moze se ograniciti:

Explanation

Softverski filteri paketa omogućavaju ograničavanje paketa koje računar može i primati i slati. To znači da se kroz ove filtere može kontrolisati protok podataka tako da se određeni paketi mogu blokirati ili dozvoliti, kako za dolazne tako i za odlazne pakete. Ova funkcionalnost omogućava korisnicima da kontrolišu i upravljaju mrežnim saobraćajem na svom računaru.

Submit
3. U sustini, gotovo sve sifarske algoritme koji se danas koriste u racunarskim telekomunikacijama:

Explanation

The correct answer suggests that it is possible to break the cipher algorithms used in computer telecommunications, but it would take an irrational amount of time. This implies that the algorithms are secure and resistant to attacks, but not completely invulnerable. Breaking them would require an impractical amount of time and resources.

Submit
4. U savremenim racunarskim mrezama kriptografija:

Explanation

The given correct answer states that cryptography forms an important security foundation in modern computer networks. This means that cryptography plays a crucial role in ensuring the security and protection of data during transmission over networks. It is used to encrypt and decrypt data, authenticate users, and ensure the confidentiality, integrity, and authenticity of information. Cryptography is essential in preventing unauthorized access, data breaches, and other security threats in computer networks.

Submit
5. Ukoliko zelimo da korisniku omogucimo da samo jednom pristupi odredjenom resursu, to najjednostavnije mozemo uciniti koristeci:

Explanation

The ticket system is a method that allows users to access a specific resource only once. When a user requests access to the resource, they are issued a unique ticket. This ticket grants them access to the resource but can only be used once. Once the ticket is used, it becomes invalid, preventing the user from accessing the resource again. This ensures that only one-time access is granted to the user.

Submit
6. Prvu fazu napada u racunarskim mrezama obicno cini:

Explanation

The correct answer is "Izvidjanje". In the first phase of a cyber attack, known as reconnaissance, the attacker gathers information about the target system or network. This includes identifying potential vulnerabilities, mapping the network, and collecting data on the target's infrastructure, systems, and users. This information is crucial for the attacker to plan and execute a successful attack.

Submit
7. Napadi izvidjanja se:

Explanation

The correct answer is "Mogu koristiti i za jedan i za vise sistema." This means that napadi izvidjanja can be used for both one system and multiple systems.

Submit
8. Osnovna uloga napada izvidjanja je:

Explanation

The correct answer is "Da napadacu pruze informacije o sistemu koji napada." The role of reconnaissance attacks is to provide the attacker with information about the system they are targeting. This information can include details about vulnerabilities, weak points in the system's defenses, and potential entry points for an attack. By gathering this information, the attacker can better plan and execute their attack, increasing their chances of success.

Submit
9. Filterima paketa se mogu stiti:

Explanation

The correct answer is "I mrezni segmenti i pojedinacni racunari" which means "Both network segments and individual computers can be protected". This suggests that both the network as a whole and individual computers within the network can be safeguarded using filtering techniques.

Submit
10. Filter paketa u Linuks operativnom sistemu ima mogucnost da radi:

Explanation

The filter packet in the Linux operating system has the ability to work in both stateful and stateless modes. This means that it can keep track of the state of network connections and make decisions based on that information, as well as filter packets based on predefined rules without considering the state of the connection.

Submit
11. Sledeci sadrzaj: Aug 29 09:45:04 sshd[26154]: pam_unix(sshd:auth):authentication failure; Aug 29 09:45:06 sshd[26154]: Failed password for cp6 from 82.117.206.61 Aug 29 09:45:11 sshd[26154]: Failed password for cp6 from 82.117.206.61 bi mogao da predstavlja:

Explanation

The given content appears to be a log file entry from an SSH server. It includes information about failed authentication attempts from a user named "cp6" with the IP address 82.117.206.61. This suggests that the content represents an excerpt from a log file, which is commonly used to record system events and activities. Therefore, the correct answer is "Izvod iz 'log' fajla."

Submit
12. Prilikom autentifikacije korisnika moguce je koristiti i vise podataka razlicitih kategorija u cilju potvrdjivanja identiteta. Na primer, od korisnika se moze trazi davanje tokena ili biometrijskih podataka, uz dodatnu vrifikaciju unosom tajne lozinke. Ovakav nacin autentifikacije se naziva:

Explanation

The given correct answer is "Visefaktorska autentifikacija" which translates to "Multifactor authentication" in English. This type of authentication involves using multiple categories of data, such as tokens or biometric information, along with an additional verification step like entering a secret password. It enhances the security of the authentication process by requiring multiple factors to confirm the user's identity.

Submit
13. Situacija u kojoj se napadac umetne kao posrednik u komunikaciji tako da saobracaj prolazi kroz njegov racunar najcesce ima za cilj:

Explanation

The correct answer is "Prisluskivanje, odnosno snimanje saobracaja" which translates to "Eavesdropping, or recording traffic." In this situation, the attacker acts as a mediator in communication, intercepting and recording the traffic that passes through their computer. This allows them to listen in on conversations or gather sensitive information without the knowledge of the parties involved.

Submit
14. Napadac salje mejlove u kojima se predstavlja kao administrator. Najverovatnije je u pitanju:

Explanation

The correct answer is "Napad na krajnje korisnike" (Attack on end users). This is because the attacker is sending emails pretending to be an administrator, which indicates that the attack is targeting the end users of the system. The goal of such an attack could be to deceive the users into providing sensitive information or performing certain actions that could compromise their security.

Submit
15. Napadac koji nije u stanju da sam pronadje propuste u racunarskim sistemima vec koristi rezultate ozbiljnih pojedinaca i grupa koji se bave racunarskom bezbednoscu naziva se:

Explanation

A napadac koji nije u stanju da sam pronadje propuste u racunarskim sistemima vec koristi rezultate ozbiljnih pojedinaca i grupa koji se bave racunarskom bezbednoscu naziva se "Lejmer".

Submit
16. Primer autentifikacije koriscenjem tajnog znanja je:

Explanation

The correct answer is "Unos lozinke." This is because the question is asking for the first step in authentication using secret knowledge, and entering a password is a common method of authentication that relies on secret knowledge. Comparing fingerprints and using personalized smart cards are alternative methods of authentication, but they are not mentioned as the first step in the question. Therefore, entering a password is the most appropriate answer.

Submit
17. U jezgru Linuks operativnog sistema filter paketa:

Explanation

The correct answer is "Postoji vec preko jedne decenije" (It has been existing for over a decade). This suggests that the packet filter feature has been a part of the Linux operating system for more than ten years.

Submit
18. Osoba koja poseduje vrhunsko poznavanje informacionih tehnologija, ali cije ponasanje podrazumevano nije zlonamerno, naziva se:

Explanation

A person who has advanced knowledge of information technology and whose behavior is not inherently malicious is called a hacker.

Submit
19. Utvrdjivanje prava korisnika za izvodjenje zahtevanih akcija nad odredjenim objektima naziva se:

Explanation

Autorizacija je proces utvrđivanja prava korisnika za izvođenje zahtevanih akcija nad određenim objektima. To znači da se tokom autorizacije proverava da li korisnik ima odgovarajuće privilegije i dozvole za pristup određenim resursima ili obavljanje određenih akcija. Autentifikacija se odnosi na proveru identiteta korisnika, logovanje se odnosi na prijavljivanje na sistem, dok autorizacija određuje šta korisnik može da radi nakon prijavljivanja.

Submit
20. Sve popularniji CAPTCHA sistemi se koriste za:

Explanation

The popular CAPTCHA systems are used for recognizing robots. CAPTCHA stands for Completely Automated Public Turing test to tell Computers and Humans Apart. It is a security measure designed to distinguish between human users and automated bots. By presenting users with a challenge that is easy for humans to solve but difficult for bots, CAPTCHA helps prevent automated attacks and ensures the security and integrity of online systems.

Submit
21. Osoba koja poseduje visoka znanja informacionih tehnologija ali ih koristi za ostvarivanje sopstvene koristi, najcesce materijalne, kroz nanosenje stete drugima, naziva se:

Explanation

A person who possesses high knowledge of information technology but uses it for their own benefit, usually material, by causing harm to others is called a "kreker".

Submit
22. Napadi na racunarske sisteme  i mreze poznati pod skracenicom DoS su napadi na:

Explanation

The correct answer is "Dostupnost". This is because Denial of Service (DoS) attacks target the availability of computer systems and networks. These attacks aim to overwhelm the resources of a system or network, making it inaccessible to legitimate users. The goal is to disrupt the normal functioning of the targeted system or network by flooding it with excessive traffic or exploiting vulnerabilities. Therefore, the correct answer is "Dostupnost" which translates to "Availability" in English.

Submit
23. Utvrdjivanje i postovanje prava i ogranicenja koje korisnik ima u radu sa odredjenim objektima racunarskog sistema ili mreze naziva se:

Explanation

Autorizacija se odnosi na proces utvrđivanja i postovanja prava i ograničenja koje korisnik ima u radu sa određenim objektima računarskog sistema ili mreže. Ova funkcionalnost omogućava kontrolu pristupa i određivanje dozvola korisnika na osnovu njihovih identiteta i uloga. Autentifikacija se odnosi na proces potvrđivanja identiteta korisnika, dok prijavljivanje na sistem i logovanje se odnose na aktivnosti koje korisnik obavlja kako bi pristupio računarskom sistemu ili mreži.

Submit
24. Bezbednosni mrezni koncept kod koga se odredjeni deo privatne mreze istura ka javnoj mrezi da bi mu se iz nje moglo pristupati, naziva se:

Explanation

A demilitarized zone (DMZ) is a security networking concept where a specific part of a private network is extended or exposed to a public network in order to provide access to it. In a DMZ, the exposed network is typically isolated from the internal network and serves as a buffer zone between the public and private networks. This allows for controlled access to a specific part of the private network from the public network while maintaining security.

Submit
25. Napadac koristi automatizovane agente koji na Vebu pronalaze sajtove zasnovane na softveru (Joomla, WordPress i slicno). Ovakve aktivnosti se mogu svrstati u:

Explanation

The given statement describes the attacker using automated agents to search for websites based on software such as Joomla or WordPress. This activity is known as "Napade izvidjanja" or reconnaissance attacks. In these attacks, the attacker gathers information about the target system or network, such as identifying vulnerabilities or weaknesses, which can be used for further exploitation.

Submit
26. U oblasti serverskih operativnih sistema kompanija Microsoft nudi funkciju filtritanja paketa pocev od:

Explanation

Microsoft has been offering packet filtering functionality in their server operating systems starting from Windows 2003. This means that users can use this feature to filter and control the flow of network packets based on specific criteria such as source IP address, destination IP address, port number, etc. It is important to note that this feature may not be available in earlier versions of Windows, such as Windows 2000 or Windows NT 4.

Submit
27. Provera identiteta je akcija kojom se, najsire gledano:

Explanation

The action of verifying identity confirms or challenges the claimed and actual identity of the person accessing a system or object. This process ensures that the person is who they say they are, preventing unauthorized access and potential security breaches.

Submit
28. Razlika izmedju 'drop' i 'reject' akcija u filteru paketa Linuks OS-a je u tome sto: 

Explanation

The correct answer states that both the "drop" and "reject" actions in the packet filter of a Linux OS discard the packet. However, the difference is that the "reject" action does not send a notification to the sender, while the "drop" action simply discards the packet without any notification.

Submit
29. Koncept pod nazivom 'hranjenje na kasicicu' (engl. spoon feeding) se koristi za:

Explanation

The concept of "spoon feeding" is used to relieve the application server from the burden of handling slow clients. This means that instead of the server waiting for the slow client to process the data it receives, it sends the data in smaller chunks, allowing the server to handle other requests more efficiently. By doing so, the application server is able to distribute its resources more effectively and avoid being overwhelmed by slow clients.

Submit
30. Koriscenje filtera paketa:

Explanation

The correct answer states that the use of packet filters requires proper configuration to enhance security. This implies that simply enabling packet filters is not enough to ensure a high level of security. It suggests that additional security measures, such as IDS/IPS systems, should be added to complement the packet filters. Without proper configuration and additional security systems, the use of packet filters may not make much sense in terms of enhancing security.

Submit
31. U demilitarizovanu zonu se najcesce smestaju:

Explanation

In demilitarized zones, servers with services that require access from an external network are typically placed. Demilitarized zones are network segments that are isolated from the internal network and the external network, providing an additional layer of security. By placing servers with services that need external access in the demilitarized zone, organizations can control and monitor the traffic to and from these servers, ensuring that only authorized access is allowed and minimizing the risk of unauthorized access to sensitive information.

Submit
32. Proces kojim se otkrivaju detalji softvera (OS, serverski softver) na odredjenom sistemu, naziva se:

Explanation

Dubinsko izviđanje je proces otkrivanja detalja softvera (OS, serverski softver) na određenom sistemu. Ova metoda istražuje i analizira softver do najmanjih detalja, pružajući dublje uvide u njegovu strukturu, funkcionalnost i performanse. Horizontalno izviđanje se odnosi na istraživanje različitih aspekata softvera na istom nivou, dok vertikalno izviđanje se odnosi na istraživanje različitih nivoa softvera (npr. aplikacijski, operativni sistem, hardver).

Submit
33. Mogucnost za napada na zasticene mrezne komunikacije nudi:

Explanation

Kriptoanaliza je mogućnost napada na zaštićene mrežne komunikacije. Kriptoanaliza se odnosi na proučavanje i analizu kriptografskih algoritama i sistema kako bi se otkrile slabosti i pronašli načini za dešifrovanje ili narušavanje sigurnosti komunikacije. Kriptoanalitičari koriste različite tehnike, kao što su brute force napadi, analiza frekvencije ili diferencijalna kriptoanaliza, kako bi probili zaštitu i pristupili tajnim informacijama. Steganografija se odnosi na skrivanje poruka unutar drugih medija, dok kriptografija se odnosi na šifrovanje poruka kako bi se osigurala njihova povjerljivost.

Submit
34. Filter paketa koji svoje odluke zasniva na izvorisnoj i odredisnoj IP adresi radi na: 

Explanation

This question is asking about the layer of the OSI model on which a packet filter that makes decisions based on source and destination IP addresses operates. The correct answer is the 3rd layer of the OSI model, which is the network layer. This layer is responsible for routing and forwarding IP packets, and it is where IP addresses are used to determine the source and destination of the packets.

Submit
35. U osnovne mete napada u racunarskim mrezama spadaju:

Explanation

The correct answer includes network devices (end and intermediate), end users, and communication channels. These are the primary targets for attacks in computer networks. Network devices, such as routers and switches, can be targeted to gain unauthorized access or control over the network. End users are targeted through social engineering or phishing attacks to gain access to their credentials or sensitive information. Communication channels, such as wired or wireless connections, can be exploited to intercept or manipulate data. By targeting these components, attackers can compromise the security and integrity of the network.

Submit
36. Redosled pravila filtera paketa moze imati uticaj na njegove performanse: 

Explanation

The order of packet filter rules can indeed have an impact on its performance. However, this is true only for software packet filters, not hardware ones. Additionally, the performance is affected only if the packet filter is implemented in the OS kernel, not in the user space.

Submit
37. Ukoliko zelimo da sakrijemo pravi izvor mrezne komunikacije koristicemo:

Explanation

A proxy server is used to hide the true source of network communication. It acts as an intermediary between the client and the destination server, forwarding requests from the client to the server and returning the server's responses to the client. By doing so, the proxy server masks the client's IP address and other identifying information, making it difficult for the destination server to determine the true source of the communication. This can be useful for maintaining privacy, bypassing censorship, or accessing restricted content.

Submit
38. Ukoliko u filteru paketa izmedju unutrasnje i spoljasnje mreze zabranimo TCP pakete koji poticu iz spoljasnje mreze, a imaju ukljucenu samo SYN zastavicu, odbranicemo se od: 

Explanation

By blocking TCP packets originating from the external network that only have the SYN flag enabled, we are defending ourselves against the establishment of connections from the external network. This means that any attempts to initiate a connection from outside will be blocked, providing a measure of protection against unauthorized access or potential security threats.

Submit
39. U uslovima idealnih komunikacionih kanala, periodicna resinhronizacija se obavlja iz kojih razloga: ???

Explanation

In ideal communication channels, periodic resynchronization is done for security reasons. This means that regular resynchronization is necessary to ensure the security and integrity of the communication. By periodically resynchronizing, any potential security breaches or unauthorized access can be detected and prevented. This helps to maintain the confidentiality and privacy of the communication, ensuring that only authorized parties have access to the transmitted information.

Submit
40. Napadac ima mogucnost da onesposobi komunikacioni kanal. U pitanju je napad na:

Explanation

The given question is asking about the type of attack that involves disabling the communication channel. This type of attack is known as a "Denial of Service" (DoS) attack, which aims to disrupt or disable the availability of a system or network. It does not directly impact the integrity or confidentiality of the data, but rather makes the system or network inaccessible to legitimate users. Therefore, the correct answer is "Dostupnost" (Availability).

Submit
41. Log fajlove je bezbednosno gledano potrebno cuvati na: 

Explanation

Log files contain important information about system activities and events, including potential security breaches. Storing log files on a dedicated or specialized computer, known as a "namenskom racunaru," ensures that they are kept separate from other services and processes. This segregation helps to protect the integrity and confidentiality of the log files, reducing the risk of unauthorized access or tampering.

Submit
42. Sistemi koji omogucavaju da se zadavanjem odredjenih kriterijuma neke mrezne komunikacije dozvole, a neke zabrane najopstije se nazivaju:

Explanation

Filteri paketa su sistemi koji omogućavaju kontrolu mrežne komunikacije na osnovu određenih kriterijuma. Oni omogućavaju da se određene vrste komunikacije dozvole, dok se druge zabrane. Na taj način, filteri paketa štite mrežu od neželjenog sadržaja ili napada, omogućavajući samo odobrenu komunikaciju da prođe kroz njih.

Submit
43. Primer autentifikacije koriscenjem iskljucivih karakteristika za postojanje je:

Explanation

The correct answer is "Uporedjivanje otiska prstiju" (Comparing fingerprints). This method of authentication is considered to be a reliable and secure way to verify a person's identity. Fingerprints are unique to each individual, making it difficult for someone else to impersonate them. By comparing the fingerprint provided with the one stored in the system, the authentication process can determine if the person is who they claim to be. This method is commonly used in various applications, including access control systems and mobile devices.

Submit
44. Porast rizika u racunarskim mrezama direktna je posledica:

Explanation

The increase in risk in computer networks is a direct result of the migration of values from the real world to the digital world. This means that as more and more aspects of our lives become digital, such as financial transactions, personal information, and communication, the potential risks and vulnerabilities in computer networks also increase. This can include threats such as hacking, data breaches, identity theft, and cyber attacks.

Submit
45. Filter paketa koji ima mogucnost da prihvata HTTP zahteve sa GET metodom, ali ne i sa POST, funksionise na:

Explanation

This filter operates at the 7th layer of the OSI model, which is the application layer. The application layer is responsible for providing network services to applications and is where protocols like HTTP operate. By filtering at this layer, the filter can specifically target and block or allow HTTP requests with the GET method, while ignoring requests with the POST method.

Submit
46. Mrezni uredjaji, hardverski ili softverski, koji omogucavaju posredan pristup ostalim racunarima ili resursima u mrezi, nazivaju se:

Explanation

Proksi serveri su mrežni uređaji, bilo hardverski ili softverski, koji omogućavaju posredan pristup ostalim računarima ili resursima u mreži. Oni rade kao posrednici između korisnika i ciljnih servera, čuvajući privatnost korisnika i poboljšavajući performanse pristupa resursima. Koriste se za filtriranje, keširanje i optimizaciju mrežnog saobraćaja, kao i za zaštitu mreže od potencijalnih napada. Demilitarizovani hostovi i aplikacioni serveri su takođe mrežni uređaji, ali nemaju istu funkcionalnost kao proksi serveri.

Submit
47. Sistem zastite kod koga se jednim uredjajem stite svi dolazeci podaci, koji su najcesce multipleksirani i dolaze od razlicitih izvora informacija, naziva se:

Explanation

The correct answer is "point-to-point". Point-to-point is a system of protection where all incoming data, which is usually multiplexed and comes from different sources of information, is protected by a single device. In this system, data is transmitted directly between two endpoints without any intermediate devices or nodes. This ensures a dedicated and secure connection between the sender and receiver, making it an effective method for protecting data.

Submit
48. U faze napada u racunarskim mrezama spadaju:

Explanation

The correct answer includes various phases of attack in computer networks. These phases include planning and simulating the attack, removing traces, reconnaissance, achieving attack objectives, and executing the attack. These phases are essential for an attacker to successfully compromise a system or network. Additionally, the phases of evaluating the effectiveness of the chosen protective configuration, system recovery, detecting active or completed attacks, and determining and mitigating damage caused by the attack are also included in the correct answer.

Submit
49. Ukoliko u filteru paketa Linuks OS-a zadamo sledece naredbe # iptables -A INPUT -i eth0 -p tcp --ddport 80 -j DROP # iptables -A INPUT -i eth0 -p tcp -j ACCEPT rezultat ce biti:

Explanation

The given correct answer states that the result will be "Odobravanje svih komunikacija pod TCP protkolom, osim na portu 80" which translates to "Allowing all communications under the TCP protocol, except on port 80". This means that the first command in the filter is blocking any communication on port 80, while the second command is allowing all other TCP communications.

Submit
50. Filter paketa koji svoje odluke zasniva i na tome da li paket pripada vec uspostavljenoj vezi ili ne, funkcionise najmanje na:

Explanation

Filter paketa koji svoje odluke zasniva i na tome da li paket pripada već uspostavljenoj vezi ili ne, funkcioniše najmanje na 4. sloju OSI modela. Na 4. sloju OSI modela, koji je sloj transporta, vrši se segmentacija i reasembliranje podataka, kao i kontrola toka i provera grešaka. Filteri na ovom sloju mogu da proveravaju da li paket pripada već uspostavljenoj vezi, što je deo funkcionalnosti transportnog sloja.

Submit
51. Napadac ima mogucnost da pasivno analizira signale koji prolaze kroz komunikacioni kanal. U pitanju je napad na:

Explanation

The correct answer is "Poverljivost." The explanation for this is that the attacker has the ability to passively analyze signals passing through the communication channel. This indicates a potential breach of confidentiality, as the attacker can intercept and access sensitive information without the knowledge or consent of the intended recipients.

Submit
52. Za horizontalno skeniranje racunarskih mreza najcesce se koristi sledeci protokol:

Explanation

ICMP (Internet Control Message Protocol) is commonly used for horizontal scanning of computer networks. ICMP is a network protocol that allows devices to send error messages and operational information to indicate network problems. It is often used for network diagnostics and troubleshooting, making it a suitable choice for scanning networks horizontally. Other protocols listed, such as IPSec, UDP, IGMP, IP, and TCP, are not typically used for network scanning purposes.

Submit
53. Sistemi koji nadgledaju desavanja u posmatranom racunarskom sistemu  ili racunarskoj mrezi, otkrivaju sumnjive aktivnosti, beleze ih u dnevnike i o njima obavestavaju administratore, nazivaju se:

Explanation

The correct answer is "Sistemi za otkrivanje napada" because it accurately describes the systems that monitor computer systems or networks, detect suspicious activities, log them in journals, and inform administrators about them. "Filteri paketa" refers to packet filters, which are a different type of system used for network security. "Sistemi za sprecavanje napada" refers to intrusion prevention systems, which are designed to prevent attacks rather than just detect them. "Demilitarizovani hostovi" translates to demilitarized hosts, which is not relevant to the description provided.

Submit
54. Podrazumevan korisnicki alat za podesavanje filtera paketa u Linuks operativnom sistemu je:

Explanation

The correct answer is iptables. Iptables is the default user-space utility program for configuring the Linux kernel's netfilter firewall. It allows users to set up rules and filters to control incoming and outgoing network traffic. Iptables is commonly used for network address translation (NAT), packet filtering, and packet mangling. It provides a powerful and flexible way to secure and manage network connections in a Linux operating system.

Submit
55. Ukoliko u filteru paketa Linuks OS-a zadamo sledece naredbe # iptables -I INPUT 2 -i eth0 -p tcp -j ACCEPT # iptables -I INPUT 1 -i eth0 -p tcp --dport 80 -j DROP rezultat ce biti:

Explanation

The given correct answer states that the result will be "Odobravanje svih komunikacija pod TCP protkolom, osim na portu 80" which translates to "Allowing all communications under TCP protocol, except on port 80." This means that the first command allows all TCP traffic on interface eth0, while the second command drops TCP traffic specifically on port 80. Therefore, all TCP traffic will be allowed except for traffic on port 80.

Submit
56. Kompromitujuce elektromagnetno zracenje je termin koji se najcesce korsti kada se govori o: 

Explanation

The term "kompromitujuce elektromagnetno zracenje" is most commonly used when discussing safety. This suggests that the correct answer is "Bezbednosti" which translates to "safety" in English.

Submit
57. Da bismo putem filtera paketa omogucili samo komunikacije koje su putem TCP protokola inicirane iz unutrasnje mreze ka spoljnoj, dozvolicemo prolazak paketa sa sledecom kombinacijom zastavica: 

Explanation

The given answer states that to enable only TCP protocol communications initiated from the internal network to the external network through a packet filter, packets with the combination of flags "SYN from internal network, SYN+ACK from external network" should be allowed. This means that the internal network is initiating a TCP connection by sending a SYN packet, and the external network is responding with a SYN+ACK packet. Allowing this combination of flags ensures that only TCP connections initiated from the internal network are allowed to pass through the filter.

Submit
58. Koriscenje sifrovanih fajl-sistema nudi zastitu u slucaju: 

Explanation

The correct answer is "Fizicke kradje uredjaja za spolju memoriju" because using encrypted file systems provides protection against physical theft of external memory devices.

Submit
59. Elektromagnetno zracenje koje se odnosi na oticanje nezeljenih informacija kroz 'zice', kao sto su komunikacioni kablovi ili uzemljenje, naziva se:

Explanation

Kondukciono se odnosi na elektromagnetno zračenje koje se širi kroz žice, kao što su komunikacioni kablovi ili uzemljenje. Ova vrsta zračenja može biti neželjena i može rezultirati curenjem informacija. TEMPEST se odnosi na mjere i tehnike koje se koriste za sprječavanje curenja informacija putem elektromagnetnog zračenja. Emisiono se odnosi na emitovanje elektromagnetnog zračenja, ali ne u kontekstu curenja informacija kroz žice.

Submit
60. Ukoliko zelimo da ispraznimo lanac pravila (u filteru paketa Linuks OS-a) koji se odnosi na ulazne pakete, potrebno je da izvrsimo sledecu naredbu:

Explanation

The correct answer is "iptables -F INPUT". This command flushes (or clears) all the rules in the INPUT chain of the iptables firewall. This means that all the rules that were previously set for incoming packets will be removed, effectively emptying the chain.

Submit
61. Vec postojeci lanci u filteru paketa Linuks OS-a su:

Explanation

The correct answer is OUTPUT, INPUT, FORWARD because these are the existing chains in the packet filter of the Linux operating system. These chains are used to filter and control the flow of network packets. The OUTPUT chain is responsible for packets generated by the local system, the INPUT chain is for packets destined for the local system, and the FORWARD chain is for packets that are being forwarded to another network.

Submit
62. Ukoliko za zastitu odredjene  racunarske mreze izaberemo filter paketa neodgovarajuceg kapaciteta, ocekivana posledica je:  

Explanation

If we choose a packet filter with inadequate capacity to protect a specific computer network, the expected consequence is a slowdown in network communications.

Submit
63. U osnovne akcije filtera paketa Linuks OS-a spadaju:

Explanation

The given answer includes the main actions performed by a packet filter in the Linux operating system. "accept" is used to allow the packet to pass through the filter, "reject" is used to reject the packet and send an error message back to the sender, and "drop" is used to silently discard the packet without notifying the sender. These actions are essential for controlling the flow of network traffic and ensuring security.

Submit
64. Proces kojim se otkrivaju otvoreni portovi na odredjenom sistemu naziva se:

Explanation

Vertikalno izviđanje je proces otkrivanja otvorenih portova na određenom sistemu. Ovaj proces uključuje skeniranje portova jedan po jedan, sa ciljem pronalaženja onih koji su otvoreni i mogu biti iskorišćeni za komunikaciju. Ova tehnika se naziva vertikalno izviđanje jer se fokusira na vertikalno pretraživanje portova, odnosno skeniranje po jednom portu u isto vreme.

Submit
65. Fizicki uredjaji koji omogucavaju kopiranje podataka koji se prenose mreznim kanalom, bez davanja ikakvog nagovestaja o tome stranama koje komuniciraju, nazivaju se:

Explanation

A passive network tap is a physical device that allows the copying of data being transmitted over a network channel without giving any indication to the communicating parties. It is a passive device because it does not interfere with the network traffic or alter the data being transmitted. Instead, it simply copies the data and allows it to continue its normal flow. This type of device is commonly used for network monitoring, security analysis, and troubleshooting purposes.

Submit
66. Napadac izvrsava naredbu: # nmap  -O 192.168.1.122 Moze se pretpostaviti da je u pitanju:

Explanation

The given command "nmap -O 192.168.1.122" suggests that the attacker is executing a network scanning tool called nmap with the "-O" flag, which is used to perform operating system detection on the target IP address (192.168.1.122). This type of scanning is known as "fingerprinting" and helps the attacker gather information about the target's operating system. Therefore, the correct answer is "Dubinsko izvidjanje" which translates to "Deep reconnaissance" in English.

Submit
67. Najveci bezbednosni problem kod prisluskivanja cine: 

Explanation

The correct answer is the non-use of encryption systems in general and the use of outdated encryption systems. These two factors pose the greatest security risk in eavesdropping. Without encryption systems, the communication channels are vulnerable to interception and unauthorized access. Additionally, the use of outdated encryption systems can be easily exploited by attackers, as they may have known vulnerabilities or weak encryption algorithms. Therefore, not utilizing encryption systems and relying on outdated ones significantly compromises the security of eavesdropping activities.

Submit
68. Pod terminom 'kriptoloska resinhronizacija' podrazumeva se aktivnost telekomunikacionih uredjaja koja je najcesce posledica:

Explanation

The term "cryptographic resynchronization" refers to the activity of telecommunication devices that is most commonly caused by disturbances on the communication channel.

Submit
69. Performanse i opterecenje servera ce ostati nepromenjeno ukoliko:

Explanation

Using a hardware packet filter will not affect the performance and load of the server. This is because hardware filters are designed to handle packet filtering tasks efficiently and independently, offloading the processing from the server's main CPU. By using a hardware filter, the server can maintain its performance and handle the load effectively without being burdened by the packet filtering tasks.

Submit
70. Najveci broj napada na sifrovane mrezne komunikacije se u praksi odvija:

Explanation

The largest number of attacks on encrypted network communications occurs through the exploitation of errors in the implementation of cipher algorithms. This means that attackers target the vulnerabilities and weaknesses in how the encryption algorithms are implemented, rather than trying to crack the cipher itself or exploit software vulnerabilities on the communicating parties' side. By finding flaws in the implementation of encryption algorithms, attackers can potentially bypass or weaken the security measures, allowing them to gain unauthorized access to the encrypted communications.

Submit
71. Primenom kriptografskih metoda u racunarskim mrezama direktno se ostvaruju sledeci principi:

Explanation

The correct answer is a combination of the principles of confidentiality, authenticity, and availability. These principles are essential in ensuring the security and integrity of data in computer networks. Confidentiality refers to the protection of sensitive information from unauthorized access. Authenticity ensures that the information is genuine and trustworthy. Availability ensures that the information and network resources are accessible to authorized users when needed. By implementing cryptographic methods, these principles can be directly achieved, providing a secure and reliable network environment.

Submit
72. Neke od akcija koje administratori mogu preduzeti kao preventivnu odbranu od napada izvidjanja su: 

Explanation

Disabling the Apache HTTPD server signature prevents attackers from easily identifying the server software and its version, making it harder for them to exploit known vulnerabilities. Disabling the ICMP protocol can help prevent ICMP-based attacks, such as ping flooding or ICMP redirect attacks. By disabling these two features, administrators can reduce the attack surface and enhance the security of their system.

Submit
73. Resenje koje omogucava da se unutar jedne fizicke Eternet mreze definise vise virtualnih mreza ciji ce saobracaj biti medjusobno izolovan, standardizovano je pod nazivom:

Explanation

The correct answer is IEEE802.1Q. IEEE802.1Q is a standard that allows the creation of multiple virtual networks within a single physical Ethernet network. It provides a method for tagging Ethernet frames with a VLAN (Virtual Local Area Network) identifier, enabling the isolation of traffic between different virtual networks. This allows for better network management, security, and scalability by separating and controlling the flow of traffic within the network.

Submit
74. Protokol koji omogucava kontrolu pristupa privatnoj mrezi na osnovu korisnickog imena i lozinke ili digitalnog sertifikata je: 

Explanation

IEEE802.1X is the correct answer because it is a protocol that enables access control to a private network based on a username and password or a digital certificate. It provides authentication and authorization mechanisms to ensure that only authorized users can access the network. This protocol is commonly used in wired and wireless networks to enhance network security and prevent unauthorized access.

Submit
75. Dva kriticna zadatka u vezi sa kontrolom pristupa su: 

Explanation

The correct answer is "Utvrdjivanje posedovanja prava za izvodjenje zahtevane akcije, Provera identiteta pristupaoca." This is because these two tasks are critical in access control. "Utvrdjivanje posedovanja prava za izvodjenje zahtevane akcije" refers to determining whether the user has the necessary permissions to perform a requested action. "Provera identiteta pristupaoca" refers to verifying the identity of the user attempting to access the system. Both of these tasks are important in ensuring that only authorized individuals can perform specific actions and access sensitive information.

Submit
76. Dve osnovne tehnologije za kontrolu pristupa u privatnim racunarskim mrezama koje koriste Eternet tehnologiju su:

Explanation

The correct answer is IEEE802.1X protocol and Virtualne mreze na lokalnom podrucju (VLAN). These two technologies are commonly used for access control in private computer networks that utilize Ethernet technology. The IEEE802.1X protocol provides authentication and authorization for devices connecting to the network, ensuring that only authorized devices can gain access. VLANs, on the other hand, allow for the segmentation of a network into multiple virtual networks, providing enhanced security and control over network traffic.

Submit
77. Za utvrdjivanje identiteta koriste se tri osnovne kategorije:

Explanation

The correct answer includes three categories that are used to determine identity: (tajno) znanje (secret knowledge), (jedinstvene karakteristike za) postojanje (unique characteristics for existence), and (iskljucivo) posedovanje (exclusive possession). These categories are likely used in various identification processes to verify someone's identity based on their knowledge, unique characteristics, and possession of certain items or documents.

Submit
78. U sustini, potpuno bezbednim sistemom moze da se smatra sistem kod koga:

Explanation

The correct answer is "Razvijen je i odrzava se savrsen skup pravila za pristup, Pravila se uvek postuju, odnosno nije ih moguce zaobici." This answer implies that a system can be considered completely secure if it has a well-developed and maintained set of access rules, and these rules are always followed and cannot be bypassed. This ensures that unauthorized access is prevented and the system remains secure.

Submit
79. Neke od osnovnih prednosti realizacije filtera paketa u jezgru operativnog sistema, umesto u korisnickom prostoru su:

Explanation

The implementation of packet filtering in the operating system kernel instead of the user space provides higher security as it allows for more direct control and monitoring of network traffic. It also offers better performance as the filtering is done at a lower level in the system, reducing the overhead of context switching between user and kernel space.

Submit
80. Osnovni nedostaci sifrovanja podataka na nivou aplikacije su: 

Explanation

The basic disadvantages of application-level data encryption are the need to develop a separate encryption system for each application and the unavailability of source code for modification. This means that for every application, a unique encryption system needs to be created, which can be time-consuming and inefficient. Additionally, the source code of many applications is not accessible for modification, making it difficult to implement any necessary changes or updates to the encryption system.

Submit
81. Koriscenje sledecih objekata za autentifikaciju potpada pod visefaktorsku autentifikaciju: 

Explanation

The correct answer is lozinka i SMS poruka, snimak irisa i smart-kartica, snimak lica i odgovor na tajno pitanje. These combinations involve the use of multiple factors for authentication. In the first combination, a password and an SMS message are used. In the second combination, an iris scan and a smart card are used. In the third combination, a facial scan and an answer to a secret question are used. Each combination involves the use of two different types of authentication factors, making it a multi-factor authentication method.

Submit
82. Osnovne tabele u filteru paketa (Linuks OS) su:

Explanation

The basic tables in the packet filter of Linux OS are nat, mangle, raw, and filter. These tables are used for different purposes in the packet filtering process. The nat table is responsible for network address translation, the mangle table is used for packet alteration, the raw table is used for configuring exemptions from connection tracking, and the filter table is used for filtering packets based on various criteria. These tables collectively provide the necessary functionality for packet filtering and network security in the Linux operating system.

Submit
83. Ukoliko u filteru paketa Linuks OS-a zadamo sledece naredbe # iptables -A INPUT -i eth0 -p tcp -j ACCEPT # iptables -A INPUT -i eth0 -p tcp --ddport 80 -j DROP rezultat ce biti:

Explanation

The given iptables commands are used to configure the packet filter in a Linux OS. The first command "-A INPUT -i eth0 -p tcp -j ACCEPT" allows all TCP traffic coming from the eth0 interface. The second command "-A INPUT -i eth0 -p tcp --ddport 80 -j DROP" drops all TCP traffic coming from the eth0 interface on port 80. Therefore, the correct answer is "Odobravnje svih komunikacija pod TCP protokolom, osim na portu 80" which means "Allow all TCP communications, except on port 80".

Submit
84. Komutatori koji rade na trecem sloju OSI modela podrazumevano se koriste u kombinaciji sa sledecim tehnologijama: 

Explanation

Komutatori koji rade na trećem sloju OSI modela podrazumevano se koriste u kombinaciji sa tehnologijama VLAN i IEEE802.1Q. VLAN (Virtual Local Area Network) omogućava da se mreža fizički podeli na više logičkih mreža, dok IEEE802.1Q je standard koji definiše kako se VLAN informacije prenose preko mreže. Ove tehnologije omogućavaju bolju organizaciju i upravljanje mrežom, kao i efikasniju isporuku podataka.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 25, 2019
    Quiz Created by
    Catherine Halcomb
Cancel
  • All
    All (84)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Uopsteno gledano, kontrola pristupa resursima u racunarskim mrezama...
Softverskim filterima paketa moze se ograniciti:
U sustini, gotovo sve sifarske algoritme koji se danas koriste u...
U savremenim racunarskim mrezama kriptografija:
Ukoliko zelimo da korisniku omogucimo da samo jednom pristupi...
Prvu fazu napada u racunarskim mrezama obicno cini:
Napadi izvidjanja se:
Osnovna uloga napada izvidjanja je:
Filterima paketa se mogu stiti:
Filter paketa u Linuks operativnom sistemu ima mogucnost da radi:
Sledeci sadrzaj: ...
Prilikom autentifikacije korisnika moguce je koristiti i vise podataka...
Situacija u kojoj se napadac umetne kao posrednik u komunikaciji tako...
Napadac salje mejlove u kojima se predstavlja kao administrator....
Napadac koji nije u stanju da sam pronadje propuste u racunarskim...
Primer autentifikacije koriscenjem tajnog znanja je:
U jezgru Linuks operativnog sistema filter paketa:
Osoba koja poseduje vrhunsko poznavanje informacionih tehnologija, ali...
Utvrdjivanje prava korisnika za izvodjenje zahtevanih akcija nad...
Sve popularniji CAPTCHA sistemi se koriste za:
Osoba koja poseduje visoka znanja informacionih tehnologija ali ih...
Napadi na racunarske sisteme  i mreze poznati pod skracenicom DoS...
Utvrdjivanje i postovanje prava i ogranicenja koje korisnik ima u radu...
Bezbednosni mrezni koncept kod koga se odredjeni deo privatne mreze...
Napadac koristi automatizovane agente koji na Vebu pronalaze sajtove...
U oblasti serverskih operativnih sistema kompanija Microsoft nudi...
Provera identiteta je akcija kojom se, najsire gledano:
Razlika izmedju 'drop' i 'reject' akcija u filteru...
Koncept pod nazivom 'hranjenje na kasicicu' (engl. spoon...
Koriscenje filtera paketa:
U demilitarizovanu zonu se najcesce smestaju:
Proces kojim se otkrivaju detalji softvera (OS, serverski softver) na...
Mogucnost za napada na zasticene mrezne komunikacije nudi:
Filter paketa koji svoje odluke zasniva na izvorisnoj i odredisnoj IP...
U osnovne mete napada u racunarskim mrezama spadaju:
Redosled pravila filtera paketa moze imati uticaj na njegove...
Ukoliko zelimo da sakrijemo pravi izvor mrezne komunikacije...
Ukoliko u filteru paketa izmedju unutrasnje i spoljasnje mreze...
U uslovima idealnih komunikacionih kanala, periodicna resinhronizacija...
Napadac ima mogucnost da onesposobi komunikacioni kanal. U pitanju je...
Log fajlove je bezbednosno gledano potrebno cuvati na: 
Sistemi koji omogucavaju da se zadavanjem odredjenih kriterijuma neke...
Primer autentifikacije koriscenjem iskljucivih karakteristika za...
Porast rizika u racunarskim mrezama direktna je posledica:
Filter paketa koji ima mogucnost da prihvata HTTP zahteve sa GET...
Mrezni uredjaji, hardverski ili softverski, koji omogucavaju posredan...
Sistem zastite kod koga se jednim uredjajem stite svi dolazeci podaci,...
U faze napada u racunarskim mrezama spadaju:
Ukoliko u filteru paketa Linuks OS-a zadamo sledece naredbe ...
Filter paketa koji svoje odluke zasniva i na tome da li paket pripada...
Napadac ima mogucnost da pasivno analizira signale koji prolaze kroz...
Za horizontalno skeniranje racunarskih mreza najcesce se koristi...
Sistemi koji nadgledaju desavanja u posmatranom racunarskom...
Podrazumevan korisnicki alat za podesavanje filtera paketa u Linuks...
Ukoliko u filteru paketa Linuks OS-a zadamo sledece naredbe ...
Kompromitujuce elektromagnetno zracenje je termin koji se najcesce...
Da bismo putem filtera paketa omogucili samo komunikacije koje su...
Koriscenje sifrovanih fajl-sistema nudi zastitu u slucaju: 
Elektromagnetno zracenje koje se odnosi na oticanje nezeljenih...
Ukoliko zelimo da ispraznimo lanac pravila (u filteru paketa Linuks...
Vec postojeci lanci u filteru paketa Linuks OS-a su:
Ukoliko za zastitu odredjene  racunarske mreze izaberemo filter...
U osnovne akcije filtera paketa Linuks OS-a spadaju:
Proces kojim se otkrivaju otvoreni portovi na odredjenom sistemu...
Fizicki uredjaji koji omogucavaju kopiranje podataka koji se prenose...
Napadac izvrsava naredbu: ...
Najveci bezbednosni problem kod prisluskivanja cine: 
Pod terminom 'kriptoloska resinhronizacija' podrazumeva se...
Performanse i opterecenje servera ce ostati nepromenjeno ukoliko:
Najveci broj napada na sifrovane mrezne komunikacije se u praksi...
Primenom kriptografskih metoda u racunarskim mrezama direktno se...
Neke od akcija koje administratori mogu preduzeti kao preventivnu...
Resenje koje omogucava da se unutar jedne fizicke Eternet mreze...
Protokol koji omogucava kontrolu pristupa privatnoj mrezi na osnovu...
Dva kriticna zadatka u vezi sa kontrolom pristupa su: 
Dve osnovne tehnologije za kontrolu pristupa u privatnim racunarskim...
Za utvrdjivanje identiteta koriste se tri osnovne kategorije:
U sustini, potpuno bezbednim sistemom moze da se smatra sistem kod...
Neke od osnovnih prednosti realizacije filtera paketa u jezgru...
Osnovni nedostaci sifrovanja podataka na nivou aplikacije su: 
Koriscenje sledecih objekata za autentifikaciju potpada pod...
Osnovne tabele u filteru paketa (Linuks OS) su:
Ukoliko u filteru paketa Linuks OS-a zadamo sledece naredbe ...
Komutatori koji rade na trecem sloju OSI modela podrazumevano se...
Alert!

Advertisement