Zast 1.Kol

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Catherine Halcomb
Catherine Halcomb
Community Contributor
Quizzes Created: 1443 | Total Attempts: 6,668,640
| Attempts: 989
SettingsSettings
Please wait...
  • 1/84 питања

    Uopsteno gledano, kontrola pristupa resursima u racunarskim mrezama moze se posmatati kao pitanje:

    • Ko sme, sta, i sa cim da radi
    • Koja su vlasnistva i dozvole podesene na sistemu fajlova
    • Kako su podeseni filteri paketa
Please wait...


Quiz Preview

  • 2. 

    Prvu fazu napada u racunarskim mrezama obicno cini:

    • Uklanjanje tragova

    • Planiranje i simulacija napada

    • Ostvarivanje ciljeva napada

    • Izvidjanje

    • Izvrsavanje napada

    Correct Answer
    A. Izvidjanje
    Explanation
    The correct answer is "Izvidjanje". In the first phase of a cyber attack, known as reconnaissance, the attacker gathers information about the target system or network. This includes identifying potential vulnerabilities, mapping the network, and collecting data on the target's infrastructure, systems, and users. This information is crucial for the attacker to plan and execute a successful attack.

    Rate this question:

  • 3. 

    U sustini, gotovo sve sifarske algoritme koji se danas koriste u racunarskim telekomunikacijama:

    • Jednostavno je razbiti u roku od nekoliko sati pokusavanja

    • Moguce je razbiti, ali za neracionalno mnogo vremena

    • Apsolutno nije moguce razbiti

    Correct Answer
    A. Moguce je razbiti, ali za neracionalno mnogo vremena
    Explanation
    The correct answer suggests that it is possible to break the cipher algorithms used in computer telecommunications, but it would take an irrational amount of time. This implies that the algorithms are secure and resistant to attacks, but not completely invulnerable. Breaking them would require an impractical amount of time and resources.

    Rate this question:

  • 4. 

    Softverskim filterima paketa moze se ograniciti:

    • Samo koje pakete racunar moze da prima

    • Koje pakete racunar moze i da prima i da salje

    • Samo koje pakete racunar moze da salje

    Correct Answer
    A. Koje pakete racunar moze i da prima i da salje
    Explanation
    Softverski filteri paketa omogućavaju ograničavanje paketa koje računar može i primati i slati. To znači da se kroz ove filtere može kontrolisati protok podataka tako da se određeni paketi mogu blokirati ili dozvoliti, kako za dolazne tako i za odlazne pakete. Ova funkcionalnost omogućava korisnicima da kontrolišu i upravljaju mrežnim saobraćajem na svom računaru.

    Rate this question:

  • 5. 

    Osnovna uloga napada izvidjanja je:

    • Da se izvidi da li postoje aktivni napadi na sistem koji se stiti

    • Da se oslabe odbrambeni mehanizmi sistema koji se napada

    • Da napadacu pruze informacije o sistemu koji napada

    Correct Answer
    A. Da napadacu pruze informacije o sistemu koji napada
    Explanation
    The correct answer is "Da napadacu pruze informacije o sistemu koji napada." The role of reconnaissance attacks is to provide the attacker with information about the system they are targeting. This information can include details about vulnerabilities, weak points in the system's defenses, and potential entry points for an attack. By gathering this information, the attacker can better plan and execute their attack, increasing their chances of success.

    Rate this question:

  • 6. 

    Ukoliko zelimo da korisniku omogucimo da samo jednom pristupi odredjenom resursu, to najjednostavnije mozemo uciniti koristeci:

    • Visefaktorsku autentifikaciju

    • CAPTCHA sistem

    • Sistem tiketa

    Correct Answer
    A. Sistem tiketa
    Explanation
    The ticket system is a method that allows users to access a specific resource only once. When a user requests access to the resource, they are issued a unique ticket. This ticket grants them access to the resource but can only be used once. Once the ticket is used, it becomes invalid, preventing the user from accessing the resource again. This ensures that only one-time access is granted to the user.

    Rate this question:

  • 7. 

    Prilikom autentifikacije korisnika moguce je koristiti i vise podataka razlicitih kategorija u cilju potvrdjivanja identiteta. Na primer, od korisnika se moze trazi davanje tokena ili biometrijskih podataka, uz dodatnu vrifikaciju unosom tajne lozinke. Ovakav nacin autentifikacije se naziva:

    • Multikriterijumska autentifikacija

    • Autorizacija

    • Visefaktorska autentifikacija

    Correct Answer
    A. Visefaktorska autentifikacija
    Explanation
    The given correct answer is "Visefaktorska autentifikacija" which translates to "Multifactor authentication" in English. This type of authentication involves using multiple categories of data, such as tokens or biometric information, along with an additional verification step like entering a secret password. It enhances the security of the authentication process by requiring multiple factors to confirm the user's identity.

    Rate this question:

  • 8. 

    U savremenim racunarskim mrezama kriptografija:

    • Koristi se iskljucivo za proveru ostecenja transporta tokom prenosa

    • Cini vaznu bezbednosnu osnovu

    • Nije prakticno primenljiva zbog visokih procesorskih zahteva

    Correct Answer
    A. Cini vaznu bezbednosnu osnovu
    Explanation
    The given correct answer states that cryptography forms an important security foundation in modern computer networks. This means that cryptography plays a crucial role in ensuring the security and protection of data during transmission over networks. It is used to encrypt and decrypt data, authenticate users, and ensure the confidentiality, integrity, and authenticity of information. Cryptography is essential in preventing unauthorized access, data breaches, and other security threats in computer networks.

    Rate this question:

  • 9. 

    Sledeci sadrzaj: Aug 29 09:45:04 sshd[26154]: pam_unix(sshd:auth):authentication failure; Aug 29 09:45:06 sshd[26154]: Failed password for cp6 from 82.117.206.61 Aug 29 09:45:11 sshd[26154]: Failed password for cp6 from 82.117.206.61 bi mogao da predstavlja:

    • Skup naredbi korisnika na UNIX sistemu

    • Izvod iz 'log' fajla

    • Snimak komunikacije putem WireShark alata

    Correct Answer
    A. Izvod iz 'log' fajla
    Explanation
    The given content appears to be a log file entry from an SSH server. It includes information about failed authentication attempts from a user named "cp6" with the IP address 82.117.206.61. This suggests that the content represents an excerpt from a log file, which is commonly used to record system events and activities. Therefore, the correct answer is "Izvod iz 'log' fajla."

    Rate this question:

  • 10. 

    Napadi izvidjanja se:

    • Iskljucivo odnose na vise sistema

    • Iskljucivo odnose na jedan sistem

    • Mogu koristiti i za jedan i za vise sistema

    Correct Answer
    A. Mogu koristiti i za jedan i za vise sistema
    Explanation
    The correct answer is "Mogu koristiti i za jedan i za vise sistema." This means that napadi izvidjanja can be used for both one system and multiple systems.

    Rate this question:

  • 11. 

    Filterima paketa se mogu stiti:

    • Samo mrezni segmenti

    • I mrezni segmenti i pojedinacni racunari

    • Samo pojedinacni racunari

    Correct Answer
    A. I mrezni segmenti i pojedinacni racunari
    Explanation
    The correct answer is "I mrezni segmenti i pojedinacni racunari" which means "Both network segments and individual computers can be protected". This suggests that both the network as a whole and individual computers within the network can be safeguarded using filtering techniques.

    Rate this question:

  • 12. 

    Filter paketa u Linuks operativnom sistemu ima mogucnost da radi:

    • Samo u stateless rezimu rada

    • I u statefull i u stateless rezimu rada

    • Samo u statefull rezimu rada

    Correct Answer
    A. I u statefull i u stateless rezimu rada
    Explanation
    The filter packet in the Linux operating system has the ability to work in both stateful and stateless modes. This means that it can keep track of the state of network connections and make decisions based on that information, as well as filter packets based on predefined rules without considering the state of the connection.

    Rate this question:

  • 13. 

    Osoba koja poseduje vrhunsko poznavanje informacionih tehnologija, ali cije ponasanje podrazumevano nije zlonamerno, naziva se:

    • Insajder

    • Kreker

    • Haker

    • Lejmer

    Correct Answer
    A. Haker
    Explanation
    A person who has advanced knowledge of information technology and whose behavior is not inherently malicious is called a hacker.

    Rate this question:

  • 14. 

    Primer autentifikacije koriscenjem tajnog znanja je:

    • Uporedjivanje otisaka prstiju

    • Koriscenje personalizovane smart-kartice

    • Unos lozinke

    Correct Answer
    A. Unos lozinke
    Explanation
    The correct answer is "Unos lozinke." This is because the question is asking for the first step in authentication using secret knowledge, and entering a password is a common method of authentication that relies on secret knowledge. Comparing fingerprints and using personalized smart cards are alternative methods of authentication, but they are not mentioned as the first step in the question. Therefore, entering a password is the most appropriate answer.

    Rate this question:

  • 15. 

    Utvrdjivanje prava korisnika za izvodjenje zahtevanih akcija nad odredjenim objektima naziva se:

    • Autentifikacija

    • Logovanje

    • Autorizacija

    • Prijavljivanje na sistem

    Correct Answer
    A. Autorizacija
    Explanation
    Autorizacija je proces utvrđivanja prava korisnika za izvođenje zahtevanih akcija nad određenim objektima. To znači da se tokom autorizacije proverava da li korisnik ima odgovarajuće privilegije i dozvole za pristup određenim resursima ili obavljanje određenih akcija. Autentifikacija se odnosi na proveru identiteta korisnika, logovanje se odnosi na prijavljivanje na sistem, dok autorizacija određuje šta korisnik može da radi nakon prijavljivanja.

    Rate this question:

  • 16. 

    Situacija u kojoj se napadac umetne kao posrednik u komunikaciji tako da saobracaj prolazi kroz njegov racunar najcesce ima za cilj:

    • Napad na krajnje korisnike

    • Izvodjenje DoS napada

    • Prisluskivanje, odnosno snimanje saobracaja

    Correct Answer
    A. Prisluskivanje, odnosno snimanje saobracaja
    Explanation
    The correct answer is "Prisluskivanje, odnosno snimanje saobracaja" which translates to "Eavesdropping, or recording traffic." In this situation, the attacker acts as a mediator in communication, intercepting and recording the traffic that passes through their computer. This allows them to listen in on conversations or gather sensitive information without the knowledge of the parties involved.

    Rate this question:

  • 17. 

    Napadac koji nije u stanju da sam pronadje propuste u racunarskim sistemima vec koristi rezultate ozbiljnih pojedinaca i grupa koji se bave racunarskom bezbednoscu naziva se:

    • Lejmer

    • Insajder

    • Haker

    • Kreker

    Correct Answer
    A. Lejmer
    Explanation
    A napadac koji nije u stanju da sam pronadje propuste u racunarskim sistemima vec koristi rezultate ozbiljnih pojedinaca i grupa koji se bave racunarskom bezbednoscu naziva se "Lejmer".

    Rate this question:

  • 18. 

    U jezgru Linuks operativnog sistema filter paketa:

    • Ne postoji

    • Postoji vec preko jedne decenije

    • Postoji kao eksperimentalna mogucnost u verziji 3+

    Correct Answer
    A. Postoji vec preko jedne decenije
    Explanation
    The correct answer is "Postoji vec preko jedne decenije" (It has been existing for over a decade). This suggests that the packet filter feature has been a part of the Linux operating system for more than ten years.

    Rate this question:

  • 19. 

    Sve popularniji CAPTCHA sistemi se koriste za:

    • Odbranu od DoS napada

    • Visefaktorsku autentifikaciju

    • Zastitu poverljivosti

    • Prepoznavanje robota

    Correct Answer
    A. Prepoznavanje robota
    Explanation
    The popular CAPTCHA systems are used for recognizing robots. CAPTCHA stands for Completely Automated Public Turing test to tell Computers and Humans Apart. It is a security measure designed to distinguish between human users and automated bots. By presenting users with a challenge that is easy for humans to solve but difficult for bots, CAPTCHA helps prevent automated attacks and ensures the security and integrity of online systems.

    Rate this question:

  • 20. 

    Napadac salje mejlove u kojima se predstavlja kao administrator. Najverovatnije je u pitanju:

    • Napad na komunikacione kanale

    • Napad na mrezne uredjaje

    • Napad na krajnje korisnike

    Correct Answer
    A. Napad na krajnje korisnike
    Explanation
    The correct answer is "Napad na krajnje korisnike" (Attack on end users). This is because the attacker is sending emails pretending to be an administrator, which indicates that the attack is targeting the end users of the system. The goal of such an attack could be to deceive the users into providing sensitive information or performing certain actions that could compromise their security.

    Rate this question:

  • 21. 

    Osoba koja poseduje visoka znanja informacionih tehnologija ali ih koristi za ostvarivanje sopstvene koristi, najcesce materijalne, kroz nanosenje stete drugima, naziva se:

    • Lejmer

    • Haker

    • Kreker

    • Insajder

    Correct Answer
    A. Kreker
    Explanation
    A person who possesses high knowledge of information technology but uses it for their own benefit, usually material, by causing harm to others is called a "kreker".

    Rate this question:

  • 22. 

    Napadi na racunarske sisteme  i mreze poznati pod skracenicom DoS su napadi na:

    • Verodostojnost

    • Dostupnost

    • Poverljivost

    Correct Answer
    A. Dostupnost
    Explanation
    The correct answer is "Dostupnost". This is because Denial of Service (DoS) attacks target the availability of computer systems and networks. These attacks aim to overwhelm the resources of a system or network, making it inaccessible to legitimate users. The goal is to disrupt the normal functioning of the targeted system or network by flooding it with excessive traffic or exploiting vulnerabilities. Therefore, the correct answer is "Dostupnost" which translates to "Availability" in English.

    Rate this question:

  • 23. 

    Utvrdjivanje i postovanje prava i ogranicenja koje korisnik ima u radu sa odredjenim objektima racunarskog sistema ili mreze naziva se:

    • Autentifikacija

    • Autorizacija

    • Prijavljivanje na sistem

    • Logovanje

    Correct Answer
    A. Autorizacija
    Explanation
    Autorizacija se odnosi na proces utvrđivanja i postovanja prava i ograničenja koje korisnik ima u radu sa određenim objektima računarskog sistema ili mreže. Ova funkcionalnost omogućava kontrolu pristupa i određivanje dozvola korisnika na osnovu njihovih identiteta i uloga. Autentifikacija se odnosi na proces potvrđivanja identiteta korisnika, dok prijavljivanje na sistem i logovanje se odnose na aktivnosti koje korisnik obavlja kako bi pristupio računarskom sistemu ili mreži.

    Rate this question:

  • 24. 

    Provera identiteta je akcija kojom se, najsire gledano:

    • Utvrdjuju prava za izvodjenje zahtevanih akcija nad odredjenim objektima

    • Potvrdjuje ili osporava istovetnost izjavljenog i stvarnog identiteta pristupaoca

    • Uporedjuje skladistena hes vrednost lozinke sa unetom

    Correct Answer
    A. Potvrdjuje ili osporava istovetnost izjavljenog i stvarnog identiteta pristupaoca
    Explanation
    The action of verifying identity confirms or challenges the claimed and actual identity of the person accessing a system or object. This process ensures that the person is who they say they are, preventing unauthorized access and potential security breaches.

    Rate this question:

  • 25. 

    U oblasti serverskih operativnih sistema kompanija Microsoft nudi funkciju filtritanja paketa pocev od:

    • Windows 2003

    • Windows 2012 R2

    • Windows 2008

    • Windows 2000

    • Windows NT 4

    Correct Answer
    A. Windows 2003
    Explanation
    Microsoft has been offering packet filtering functionality in their server operating systems starting from Windows 2003. This means that users can use this feature to filter and control the flow of network packets based on specific criteria such as source IP address, destination IP address, port number, etc. It is important to note that this feature may not be available in earlier versions of Windows, such as Windows 2000 or Windows NT 4.

    Rate this question:

  • 26. 

    Bezbednosni mrezni koncept kod koga se odredjeni deo privatne mreze istura ka javnoj mrezi da bi mu se iz nje moglo pristupati, naziva se:

    • 'statefull' filter paketa

    • SYN+ACK uspostavljanje veze

    • Demilitarizovana zona

    Correct Answer
    A. Demilitarizovana zona
    Explanation
    A demilitarized zone (DMZ) is a security networking concept where a specific part of a private network is extended or exposed to a public network in order to provide access to it. In a DMZ, the exposed network is typically isolated from the internal network and serves as a buffer zone between the public and private networks. This allows for controlled access to a specific part of the private network from the public network while maintaining security.

    Rate this question:

  • 27. 

    Napadac koristi automatizovane agente koji na Vebu pronalaze sajtove zasnovane na softveru (Joomla, WordPress i slicno). Ovakve aktivnosti se mogu svrstati u:

    • DoS napade

    • Napade izvidjanja

    • CIA bezbednosni model

    Correct Answer
    A. Napade izvidjanja
    Explanation
    The given statement describes the attacker using automated agents to search for websites based on software such as Joomla or WordPress. This activity is known as "Napade izvidjanja" or reconnaissance attacks. In these attacks, the attacker gathers information about the target system or network, such as identifying vulnerabilities or weaknesses, which can be used for further exploitation.

    Rate this question:

  • 28. 

    Razlika izmedju 'drop' i 'reject' akcija u filteru paketa Linuks OS-a je u tome sto: 

    • Obe akcije odbacuju paket, ali akcija 'reject' o tome ne salje obavestenje posiljaocu

    • Obe akcije odbacuju paket, ali akcija 'drop' o tome ne salje obavestenje posiljaocu

    • Akcija 'drop' dozvoljava prolazak paketa, ali nakon toga prekida vezu

    Correct Answer
    A. Obe akcije odbacuju paket, ali akcija 'drop' o tome ne salje obavestenje posiljaocu
    Explanation
    The correct answer states that both the "drop" and "reject" actions in the packet filter of a Linux OS discard the packet. However, the difference is that the "reject" action does not send a notification to the sender, while the "drop" action simply discards the packet without any notification.

    Rate this question:

  • 29. 

    Koncept pod nazivom 'hranjenje na kasicicu' (engl. spoon feeding) se koristi za:

    • Rasterecivanje aplikacionog servera kod sporih klijenata

    • Izbegavanje koriscenja virtualne memorije na serverima 

    • Zastitu klijenata od DoS napada

    Correct Answer
    A. Rasterecivanje aplikacionog servera kod sporih klijenata
    Explanation
    The concept of "spoon feeding" is used to relieve the application server from the burden of handling slow clients. This means that instead of the server waiting for the slow client to process the data it receives, it sends the data in smaller chunks, allowing the server to handle other requests more efficiently. By doing so, the application server is able to distribute its resources more effectively and avoid being overwhelmed by slow clients.

    Rate this question:

  • 30. 

    Koriscenje filtera paketa:

    • Zahteva pravilno podesavanje za podizanje nivoa bezbednosti

    • Podrazumevano nudi visok nivo bezbednosti

    • Nema nikakvog smisla bez dodavanja i IDS/IPS sistema

    Correct Answer
    A. Zahteva pravilno podesavanje za podizanje nivoa bezbednosti
    Explanation
    The correct answer states that the use of packet filters requires proper configuration to enhance security. This implies that simply enabling packet filters is not enough to ensure a high level of security. It suggests that additional security measures, such as IDS/IPS systems, should be added to complement the packet filters. Without proper configuration and additional security systems, the use of packet filters may not make much sense in terms of enhancing security.

    Rate this question:

  • 31. 

    U demilitarizovanu zonu se najcesce smestaju:

    • Racunarski sistemi sa bezbednosno osetljivim i poverljivim sadrzajem i servisima

    • Serveri sa servisima kojima je potrebno omoguciti pristup iz spoljasnje mreze

    • Filteri paketa koji rade na 7. sloju OSI modela

    Correct Answer
    A. Serveri sa servisima kojima je potrebno omoguciti pristup iz spoljasnje mreze
    Explanation
    In demilitarized zones, servers with services that require access from an external network are typically placed. Demilitarized zones are network segments that are isolated from the internal network and the external network, providing an additional layer of security. By placing servers with services that need external access in the demilitarized zone, organizations can control and monitor the traffic to and from these servers, ensuring that only authorized access is allowed and minimizing the risk of unauthorized access to sensitive information.

    Rate this question:

  • 32. 

    Proces kojim se otkrivaju detalji softvera (OS, serverski softver) na odredjenom sistemu, naziva se:

    • Horizontalno izvidjanje

    • Vertikalno izvidjanje

    • Dubinsko izvidjanje

    Correct Answer
    A. Dubinsko izvidjanje
    Explanation
    Dubinsko izviđanje je proces otkrivanja detalja softvera (OS, serverski softver) na određenom sistemu. Ova metoda istražuje i analizira softver do najmanjih detalja, pružajući dublje uvide u njegovu strukturu, funkcionalnost i performanse. Horizontalno izviđanje se odnosi na istraživanje različitih aspekata softvera na istom nivou, dok vertikalno izviđanje se odnosi na istraživanje različitih nivoa softvera (npr. aplikacijski, operativni sistem, hardver).

    Rate this question:

  • 33. 

    Filter paketa koji svoje odluke zasniva na izvorisnoj i odredisnoj IP adresi radi na: 

    • 4. sloju OSI modela

    • 3. sloju OSI modela

    • 7. sloju OSI modela

    Correct Answer
    A. 3. sloju OSI modela
    Explanation
    This question is asking about the layer of the OSI model on which a packet filter that makes decisions based on source and destination IP addresses operates. The correct answer is the 3rd layer of the OSI model, which is the network layer. This layer is responsible for routing and forwarding IP packets, and it is where IP addresses are used to determine the source and destination of the packets.

    Rate this question:

  • 34. 

    Redosled pravila filtera paketa moze imati uticaj na njegove performanse: 

    • Da

    • Da, alli samo ukoliko je filter paketa realizovan u jezgru OS

    • Da, ali samo kod softverskih filtera paketa

    • Ne

    • Da, ali samo ukoliko je filter paketa realizovan u korisnickom prostoru

    • Da, ali samo kod hardverskih filtera paketa

    Correct Answer
    A. Da
    Explanation
    The order of packet filter rules can indeed have an impact on its performance. However, this is true only for software packet filters, not hardware ones. Additionally, the performance is affected only if the packet filter is implemented in the OS kernel, not in the user space.

    Rate this question:

  • 35. 

    U osnovne mete napada u racunarskim mrezama spadaju:

    • Mrezni uredjaji (krajnji i posredni)

    • Krajnji korisnici

    • Komunikacioni kanali

    • Hardverska infrastruktura

    • Sifarski algoritmi

    Correct Answer(s)
    A. Mrezni uredjaji (krajnji i posredni)
    A. Krajnji korisnici
    A. Komunikacioni kanali
    Explanation
    The correct answer includes network devices (end and intermediate), end users, and communication channels. These are the primary targets for attacks in computer networks. Network devices, such as routers and switches, can be targeted to gain unauthorized access or control over the network. End users are targeted through social engineering or phishing attacks to gain access to their credentials or sensitive information. Communication channels, such as wired or wireless connections, can be exploited to intercept or manipulate data. By targeting these components, attackers can compromise the security and integrity of the network.

    Rate this question:

  • 36. 

    Ukoliko u filteru paketa izmedju unutrasnje i spoljasnje mreze zabranimo TCP pakete koji poticu iz spoljasnje mreze, a imaju ukljucenu samo SYN zastavicu, odbranicemo se od: 

    • Uspostavljanja veza iz spoljne mreze

    • Trojanaca u lokalnoj mrezi

    • DoS napada

    Correct Answer
    A. Uspostavljanja veza iz spoljne mreze
    Explanation
    By blocking TCP packets originating from the external network that only have the SYN flag enabled, we are defending ourselves against the establishment of connections from the external network. This means that any attempts to initiate a connection from outside will be blocked, providing a measure of protection against unauthorized access or potential security threats.

    Rate this question:

  • 37. 

    Mogucnost za napada na zasticene mrezne komunikacije nudi:

    • Steganografija

    • Kriptoanaliza

    • Kriptografija

    Correct Answer
    A. Kriptoanaliza
    Explanation
    Kriptoanaliza je mogućnost napada na zaštićene mrežne komunikacije. Kriptoanaliza se odnosi na proučavanje i analizu kriptografskih algoritama i sistema kako bi se otkrile slabosti i pronašli načini za dešifrovanje ili narušavanje sigurnosti komunikacije. Kriptoanalitičari koriste različite tehnike, kao što su brute force napadi, analiza frekvencije ili diferencijalna kriptoanaliza, kako bi probili zaštitu i pristupili tajnim informacijama. Steganografija se odnosi na skrivanje poruka unutar drugih medija, dok kriptografija se odnosi na šifrovanje poruka kako bi se osigurala njihova povjerljivost.

    Rate this question:

  • 38. 

    Sistemi koji omogucavaju da se zadavanjem odredjenih kriterijuma neke mrezne komunikacije dozvole, a neke zabrane najopstije se nazivaju:

    • Filteri paketa

    • Sistemi za visefaktorsku autentifikaciju

    • Proksi serveri

    Correct Answer
    A. Filteri paketa
    Explanation
    Filteri paketa su sistemi koji omogućavaju kontrolu mrežne komunikacije na osnovu određenih kriterijuma. Oni omogućavaju da se određene vrste komunikacije dozvole, dok se druge zabrane. Na taj način, filteri paketa štite mrežu od neželjenog sadržaja ili napada, omogućavajući samo odobrenu komunikaciju da prođe kroz njih.

    Rate this question:

  • 39. 

    Primer autentifikacije koriscenjem iskljucivih karakteristika za postojanje je:

    • Koriscenje personalizovane smart-kartice

    • Uporedjivanje otiska prstiju

    • Unos lozinke

    Correct Answer
    A. Uporedjivanje otiska prstiju
    Explanation
    The correct answer is "Uporedjivanje otiska prstiju" (Comparing fingerprints). This method of authentication is considered to be a reliable and secure way to verify a person's identity. Fingerprints are unique to each individual, making it difficult for someone else to impersonate them. By comparing the fingerprint provided with the one stored in the system, the authentication process can determine if the person is who they claim to be. This method is commonly used in various applications, including access control systems and mobile devices.

    Rate this question:

  • 40. 

    Ukoliko zelimo da sakrijemo pravi izvor mrezne komunikacije koristicemo:

    • Hardverski filter paketa 

    • Demilitarizovane hostove

    • Proksi server

    Correct Answer
    A. Proksi server
    Explanation
    A proxy server is used to hide the true source of network communication. It acts as an intermediary between the client and the destination server, forwarding requests from the client to the server and returning the server's responses to the client. By doing so, the proxy server masks the client's IP address and other identifying information, making it difficult for the destination server to determine the true source of the communication. This can be useful for maintaining privacy, bypassing censorship, or accessing restricted content.

    Rate this question:

  • 41. 

    Napadac ima mogucnost da onesposobi komunikacioni kanal. U pitanju je napad na:

    • Dostupnost

    • Verodostojnost

    • Poverljivost

    Correct Answer
    A. Dostupnost
    Explanation
    The given question is asking about the type of attack that involves disabling the communication channel. This type of attack is known as a "Denial of Service" (DoS) attack, which aims to disrupt or disable the availability of a system or network. It does not directly impact the integrity or confidentiality of the data, but rather makes the system or network inaccessible to legitimate users. Therefore, the correct answer is "Dostupnost" (Availability).

    Rate this question:

  • 42. 

    U uslovima idealnih komunikacionih kanala, periodicna resinhronizacija se obavlja iz kojih razloga: ???

    • Razloga performansi

    • Funkcionalnih razloga

    • Bezbednosnih razloga

    Correct Answer
    A. Bezbednosnih razloga
    Explanation
    In ideal communication channels, periodic resynchronization is done for security reasons. This means that regular resynchronization is necessary to ensure the security and integrity of the communication. By periodically resynchronizing, any potential security breaches or unauthorized access can be detected and prevented. This helps to maintain the confidentiality and privacy of the communication, ensuring that only authorized parties have access to the transmitted information.

    Rate this question:

  • 43. 

    Porast rizika u racunarskim mrezama direktna je posledica:

    • Osamostaljenog razvoja vestacke inteligencije

    • Porasta znanja prosecnog korisnika racunara

    • Migracije vrednosti iz stvarnog sveta u digitalni

    • Razvoja tehnologija za vreme II svetskog rata

    Correct Answer
    A. Migracije vrednosti iz stvarnog sveta u digitalni
    Explanation
    The increase in risk in computer networks is a direct result of the migration of values from the real world to the digital world. This means that as more and more aspects of our lives become digital, such as financial transactions, personal information, and communication, the potential risks and vulnerabilities in computer networks also increase. This can include threats such as hacking, data breaches, identity theft, and cyber attacks.

    Rate this question:

  • 44. 

    Sistem zastite kod koga se jednim uredjajem stite svi dolazeci podaci, koji su najcesce multipleksirani i dolaze od razlicitih izvora informacija, naziva se:

    • Point-to-point

    • End-to-end

    • Peer-to-peer

    Correct Answer
    A. Point-to-point
    Explanation
    The correct answer is "point-to-point". Point-to-point is a system of protection where all incoming data, which is usually multiplexed and comes from different sources of information, is protected by a single device. In this system, data is transmitted directly between two endpoints without any intermediate devices or nodes. This ensures a dedicated and secure connection between the sender and receiver, making it an effective method for protecting data.

    Rate this question:

  • 45. 

    Log fajlove je bezbednosno gledano potrebno cuvati na: 

    • Racunaru na kome se izvrsavaju servisi

    • Racunaru ali na zasebnoj particiji

    • Namenskom racunaru

    Correct Answer
    A. Namenskom racunaru
    Explanation
    Log files contain important information about system activities and events, including potential security breaches. Storing log files on a dedicated or specialized computer, known as a "namenskom racunaru," ensures that they are kept separate from other services and processes. This segregation helps to protect the integrity and confidentiality of the log files, reducing the risk of unauthorized access or tampering.

    Rate this question:

  • 46. 

    Mrezni uredjaji, hardverski ili softverski, koji omogucavaju posredan pristup ostalim racunarima ili resursima u mrezi, nazivaju se:

    • Proksi serveri

    • Demilitarizovani hostovi

    • Aplikacioni serveri

    Correct Answer
    A. Proksi serveri
    Explanation
    Proksi serveri su mrežni uređaji, bilo hardverski ili softverski, koji omogućavaju posredan pristup ostalim računarima ili resursima u mreži. Oni rade kao posrednici između korisnika i ciljnih servera, čuvajući privatnost korisnika i poboljšavajući performanse pristupa resursima. Koriste se za filtriranje, keširanje i optimizaciju mrežnog saobraćaja, kao i za zaštitu mreže od potencijalnih napada. Demilitarizovani hostovi i aplikacioni serveri su takođe mrežni uređaji, ali nemaju istu funkcionalnost kao proksi serveri.

    Rate this question:

  • 47. 

    Napadac ima mogucnost da pasivno analizira signale koji prolaze kroz komunikacioni kanal. U pitanju je napad na:

    • Verodostojnost

    • Poverljivost

    • Dostupnost

    Correct Answer
    A. Poverljivost
    Explanation
    The correct answer is "Poverljivost." The explanation for this is that the attacker has the ability to passively analyze signals passing through the communication channel. This indicates a potential breach of confidentiality, as the attacker can intercept and access sensitive information without the knowledge or consent of the intended recipients.

    Rate this question:

  • 48. 

    Za horizontalno skeniranje racunarskih mreza najcesce se koristi sledeci protokol:

    • IPSec

    • ICMP

    • UDP

    • IGMP

    • IP

    • TCP

    Correct Answer
    A. ICMP
    Explanation
    ICMP (Internet Control Message Protocol) is commonly used for horizontal scanning of computer networks. ICMP is a network protocol that allows devices to send error messages and operational information to indicate network problems. It is often used for network diagnostics and troubleshooting, making it a suitable choice for scanning networks horizontally. Other protocols listed, such as IPSec, UDP, IGMP, IP, and TCP, are not typically used for network scanning purposes.

    Rate this question:

  • 49. 

    Filter paketa koji ima mogucnost da prihvata HTTP zahteve sa GET metodom, ali ne i sa POST, funksionise na:

    • 3. sloju OSI modela

    • 7. sloju OSI modela

    • 4. sloju OSI modela

    Correct Answer
    A. 7. sloju OSI modela
    Explanation
    This filter operates at the 7th layer of the OSI model, which is the application layer. The application layer is responsible for providing network services to applications and is where protocols like HTTP operate. By filtering at this layer, the filter can specifically target and block or allow HTTP requests with the GET method, while ignoring requests with the POST method.

    Rate this question:

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 25, 2019
    Quiz Created by
    Catherine Halcomb
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.