Računarske Mreže - Ispit (Prvi Deo)

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Shonez
S
Shonez
Community Contributor
Quizzes Created: 3 | Total Attempts: 5,051
Questions: 132 | Attempts: 1,103

SettingsSettingsSettings
Računarske Mreže - Ispit (Prvi Deo) - Quiz

.


Questions and Answers
  • 1. 

    Osnovna jedinica za prenos podataka na mrežnom sloju je:

    • A.

      Okvir

    • B.

      Segment

    • C.

      Paket

    • D.

      Frejm

    Correct Answer
    C. Paket
    Explanation
    The correct answer is "Paket". On the network layer, data is divided into packets for transmission. A packet is a unit of data that contains the necessary information for routing and delivery across the network. It includes the source and destination IP addresses, as well as the actual data being transmitted. Packets are used to efficiently transmit data over the network, allowing for reliable and optimized communication between devices.

    Rate this question:

  • 2. 

    Mrežni sloj je odgovoran za:

    • A.

      Prosleđivanje paketa od jednog do drugog kraja žice

    • B.

      Prosleđivanje paketa sa jednog do drugog kraja mreže

    • C.

      Detekciju i korekciju greški na prenosnom putu

    • D.

      Obezbeđivanje pouzdanog prenosa između krajnjih računara

    Correct Answer
    B. Prosleđivanje paketa sa jednog do drugog kraja mreže
    Explanation
    The correct answer states that the network layer is responsible for forwarding packets from one end of the network to the other. This means that the network layer handles the routing of packets, ensuring that they are delivered to the correct destination within the network. It is responsible for determining the optimal path for packet transmission and managing the addressing and routing protocols required for this task.

    Rate this question:

  • 3. 

    Uređaj koji radi u mrežnom sloju je:

    • A.

      Switch

    • B.

      Hub

    • C.

      Router

    • D.

      Repeater

    Correct Answer
    C. Router
    Explanation
    A router is a device that operates in the network layer of the OSI model. It is responsible for forwarding data packets between different networks, making decisions based on the destination IP address. Routers are used to connect multiple networks together and facilitate the flow of data between them. Unlike switches and hubs, routers can determine the best path for data transmission and perform network address translation (NAT) to allow multiple devices to share a single public IP address. Therefore, a router is the correct answer as it operates at the network layer.

    Rate this question:

  • 4. 

    Tabele rutiranja određuju:

    • A.

      Najbolji sledeći skok na osnovu IP adrese odredišta u paketu

    • B.

      Broj skokova od izvorišta do odredišta da bi paketi bili isporučeni

    • C.

      Pravila za potpuno sigurnu isporuku paketa odredištu

    • D.

      Postupke za konverziju formata podataka u raznorodnim okruženjima

    Correct Answer
    A. Najbolji sledeći skok na osnovu IP adrese odredišta u paketu
    Explanation
    Tabele rutiranja određuju najbolji sledeći skok na osnovu IP adrese odredišta u paketu. This means that routing tables determine the next hop for a packet based on the destination IP address. Routing tables are used by routers to make decisions on how to forward packets to their intended destinations. By examining the destination IP address in the packet header, the router consults its routing table to determine the best path for the packet to reach its destination. The routing table contains information about network prefixes and the corresponding next hop or interface to forward the packet.

    Rate this question:

  • 5. 

    Mrežni sloj je odgovoran za:

    • A.

      Prosleđivanje paketa od jednog do drugog kraja žice

    • B.

      Detekciju i korekciju greški na prenosnom putu

    • C.

      Obezbeđivanje pouzdanog prenosa između krajnjih računara

    • D.

      Prosleđivanje paketa sa jednog do drugog kraja mreže

    Correct Answer
    D. Prosleđivanje paketa sa jednog do drugog kraja mreže
    Explanation
    The correct answer is "Prosleđivanje paketa sa jednog do drugog kraja mreže" (Forwarding packets from one end of the network to the other). The network layer is responsible for routing and forwarding data packets across different networks or subnetworks. It determines the best path for data transmission and ensures that packets reach their intended destination. This layer also handles addressing and logical network topology.

    Rate this question:

  • 6. 

    Karakteristike decentralizovanog rutiranja su:

    • A.

      Koriste se u mainframe-based mrežama

    • B.

      Odluke o rutiranju se donose u svakom ruteru nezavisno od drugih

    • C.

      Ruteri razmenjuju informacije kako bi formirali tabele rutiranja

    • D.

      Odluke o rutiranju, kao i tabele rutiranja se donose autonomno, bez dogovaranja između rutera.

    Correct Answer(s)
    B. Odluke o rutiranju se donose u svakom ruteru nezavisno od drugih
    C. Ruteri razmenjuju informacije kako bi formirali tabele rutiranja
    Explanation
    Decentralized routing refers to the process where routing decisions are made independently by each router without any coordination or agreement with other routers. In this type of routing, routers exchange information to form routing tables, which help them determine the best path for forwarding packets. This approach is commonly used in networks that are based on mainframes.

    Rate this question:

  • 7. 

    Vrste decentralizovanog rutiranja su:

    • A.

      Ekspres rutiranje

    • B.

      Statičko rutiranje

    • C.

      Stohastičko rutiranje

    • D.

      Pouzdano rutiranje

    • E.

      Dinamičko rutiranje

    Correct Answer(s)
    B. Statičko rutiranje
    E. Dinamičko rutiranje
    Explanation
    The correct answer is static routing and dynamic routing. Static routing refers to the process of manually configuring the routes in a network, where the network administrator defines the paths that the data packets should take. Dynamic routing, on the other hand, is a more automated approach where routers exchange information with each other to determine the best path for data packets to reach their destination.

    Rate this question:

  • 8. 

    Kod statičkog rutiranja karakteristično je sledeće:

    • A.

      Koriste se fiksne tabele rutiranja koje definiše administrator

    • B.

      Prate sve promene u topologiji mreže i trenutnom saobraćaju

    • C.

      Svaki čvor ima sopstvenu tabelu rutiranja

    • D.

      Koristi se kod jednostavnih mreža

    Correct Answer(s)
    A. Koriste se fiksne tabele rutiranja koje definiše administrator
    C. Svaki čvor ima sopstvenu tabelu rutiranja
    D. Koristi se kod jednostavnih mreža
    Explanation
    Static routing is characterized by the use of fixed routing tables defined by the administrator. Each node has its own routing table. It is commonly used in simple networks. Static routing does not dynamically adjust to changes in network topology or current traffic.

    Rate this question:

  • 9. 

    Kod dinamičkog rutiranja karakteristično je sledeće:

    • A.

      Zasniva se na automatskom kreiranju i ažuriranju ruting tabela

    • B.

      Prate sve promene u topologiji mreže i trenutnom saobraćaju

    • C.

      Koriste se fiksne tabele rutiranja koje definiše administrator

    • D.

      Svaki čvor ima sopstvenu tabelu rutiranja

    • E.

      Koristi se kod jednostavnih mreža

    Correct Answer(s)
    A. Zasniva se na automatskom kreiranju i ažuriranju ruting tabela
    B. Prate sve promene u topologiji mreže i trenutnom saobraćaju
    D. Svaki čvor ima sopstvenu tabelu rutiranja
    Explanation
    Kod dinamičkog rutiranja, svaki čvor ima sopstvenu tabelu rutiranja koja se automatski kreira i ažurira. Tabele rutiranja prate sve promene u topologiji mreže i trenutnom saobraćaju, omogućavajući efikasno usmeravanje podataka. Za razliku od fiksnih tabela rutiranja koje definiše administrator, dinamičko rutiranje se koristi u složenijim mrežama gde je neophodno prilagođavanje usmeravanja u realnom vremenu.

    Rate this question:

  • 10. 

    „Link state routing“ algoritam ima sledeće karakteristike:

    • A.

      Koristi se najsvežija informacija o stanju veze

    • B.

      Sporo se postiže uravnoteženost mreže

    • C.

      Dobijena putanja nikada nije optimalna

    • D.

      Vrši se periodična razmena stanja veze između čvorova kako bi informacije bile aktuelne

    • E.

      Mogu se rutirati samo kratki paketi

    • F.

      Koristi različite informacije (broj skokova, opterećenost, brzina,...)

    Correct Answer(s)
    A. Koristi se najsvežija informacija o stanju veze
    D. Vrši se periodična razmena stanja veze između čvorova kako bi informacije bile aktuelne
    F. Koristi različite informacije (broj skokova, opterećenost, brzina,...)
    Explanation
    The given answer states that the "Link state routing" algorithm uses different information such as the number of hops, congestion, and speed. It also mentions that there is periodic exchange of link state information between nodes to keep the information up to date. The algorithm uses the freshest information about the state of the links. However, it is slow in achieving network balance and the obtained path is not always optimal. It can only route short packets.

    Rate this question:

  • 11. 

    Zagušenje na ruterima može da nastane iz sledećih razloga:

    • A.

      Pojava velikog broja paketa sa zahtevom za istom izlaznom linijom

    • B.

      Pristigli paket sadrži broadcast MAC adresu odredišta

    • C.

      Pojedine linije mogu biti sa malim propusnim opsegom

    • D.

      Spori mikroprocesori

    Correct Answer(s)
    A. Pojava velikog broja paketa sa zahtevom za istom izlaznom linijom
    C. Pojedine linije mogu biti sa malim propusnim opsegom
    D. Spori mikroprocesori
    Explanation
    Router congestion can occur due to several reasons mentioned in the given options. One reason is the occurrence of a large number of packets requesting the same output line, which can overwhelm the router's capacity. Another reason is that certain lines may have a small bandwidth, causing congestion when multiple packets try to use them simultaneously. Additionally, slow microprocessors in the router can also contribute to congestion as they might not be able to handle the incoming traffic efficiently.

    Rate this question:

  • 12. 

    Odbacivanje paketa na ruterima kao posledica velikog opterećenja, radi se na sledeći način:

    • A.

      U prenosu datoteka vredniji su stariji paketi

    • B.

      Za multimedijalne aplikacije vredniji su noviji paketi

    • C.

      U prenosu datoteka vredniji su noviji paketi

    • D.

      Za multimedijalne aplikacije vredniji su stariji paketi

    Correct Answer(s)
    A. U prenosu datoteka vredniji su stariji paketi
    B. Za multimedijalne aplikacije vredniji su noviji paketi
    Explanation
    In the context of packet rejection on routers due to high load, the statement "U prenosu datoteka vredniji su stariji paketi" means that in file transfer, older packets are considered more valuable. On the other hand, the statement "Za multimedijalne aplikacije vredniji su noviji paketi" states that for multimedia applications, newer packets are considered more valuable. These statements explain the prioritization of packets based on their age in different scenarios, highlighting the importance of older packets in file transfer and newer packets in multimedia applications.

    Rate this question:

  • 13. 

    Prekomerni gubitak paketa (npr. 10 do 20%) na prenosnom putu za pošiljaoca znači:

    • A.

      U žičnim sistemima, nastupili su problemi i treba ubrzati predaju da bi paketi što pre stigli na odredište

    • B.

      U bežičnim sistemima, to je normalno i treba nastaviti sa predajom

    • C.

      U žičnim sistemima, nastupili su problemi i treba usporiti predaju

    • D.

      U bežičnim sistemima, nastupili su problemi i treba usporiti predaju

    Correct Answer(s)
    B. U bežičnim sistemima, to je normalno i treba nastaviti sa predajom
    C. U žičnim sistemima, nastupili su problemi i treba usporiti predaju
  • 14. 

    IPv4 je protokol (OSI i TCP/IP):

    • A.

      Fizičkog sloja

    • B.

      Mrežnog sloja

    • C.

      Sloja veze

    • D.

      Transportnog sloja

    • E.

      Aplikativnog sloja

    Correct Answer
    B. Mrežnog sloja
    Explanation
    IPv4 is a protocol that operates at the network layer of the OSI and TCP/IP models. The network layer is responsible for routing packets across different networks and establishing logical connections between devices. IPv4 provides the addressing scheme used to identify devices on a network and enables the delivery of packets from the source to the destination. Therefore, it is correct to say that IPv4 operates at the network layer.

    Rate this question:

  • 15. 

    IP adresa u IPv4 ima dužinu od:

    • A.

      16 bajtova

    • B.

      16 bita

    • C.

      32 bita

    • D.

      32 bajta

    Correct Answer
    C. 32 bita
    Explanation
    The correct answer is 32 bita. In IPv4, an IP address is represented by a 32-bit binary number. This 32-bit number is divided into four octets, with each octet represented by 8 bits. Each octet is then converted to decimal form to create the familiar IPv4 address format, consisting of four numbers separated by periods. Therefore, an IPv4 address has a length of 32 bits.

    Rate this question:

  • 16. 

    IPv4 adrese se najčešće predstavljaju:

    • A.

      Binarno

    • B.

      Decimalno

    • C.

      Heksadecimalno

    Correct Answer
    B. Decimalno
    Explanation
    IPv4 adrese se najčešće predstavljaju decimalno jer se sastoje od četiri broja odvojena tačkama, pri čemu svaki broj može imati vrednost od 0 do 255. Ova notacija je lakša za čitanje i razumevanje od binarne ili heksadecimalne notacije. U decimalnoj notaciji, svaki broj predstavlja jedan oktet, dok se u binarnoj notaciji koriste nule i jedinice, a u heksadecimalnoj koriste cifre od 0 do 9 i slova od A do F.

    Rate this question:

  • 17. 

    Maksimalna moguća dužina IP paketa je:

    • A.

      16 KB

    • B.

      64 KB

    • C.

      32 KB

    • D.

      128 KB

    Correct Answer
    B. 64 KB
    Explanation
    The maximum possible length of an IP packet is 64 KB. This means that the packet can contain up to 64 kilobytes of data. IP packets are used to transfer data over the internet, and they have a maximum size limit to ensure efficient transmission and prevent network congestion. A larger packet size would require more resources and could potentially cause delays or errors in the transmission. Therefore, 64 KB is the correct answer as it represents the maximum allowable size for an IP packet.

    Rate this question:

  • 18. 

    Fragmentacija paketa označava:

    • A.

      Dopunjavanje paketa do njegove maksimalne moguće dužine

    • B.

      Prosleđivanje paketa do sloja veze podataka i smeštanje u koristan deo okvira

    • C.

      Deljenje paketa na veći broj paketa sa manjom dužinom

    • D.

      Izračunavanje kontrolne sume u cilju pouzdanog prenosa

    Correct Answer
    D. Izračunavanje kontrolne sume u cilju pouzdanog prenosa
    Explanation
    Fragmentacija paketa označava deljenje paketa na veći broj paketa sa manjom dužinom. Ova tehnika se koristi kada se paket prenosi preko mreže koja podržava manju maksimalnu dužinu paketa od izvornog paketa. Svaki fragment sadrži deo podataka iz izvornog paketa, kao i dodatne informacije koje omogućavaju rekonstrukciju izvornog paketa na odredištu. Izračunavanje kontrolne sume je postupak koji se koristi za proveru integriteta paketa tokom prenosa. Kontrolna suma se izračunava na osnovu podataka u paketu i koristi se za proveru da li je paket stigao bez grešaka.

    Rate this question:

  • 19. 

    1. Krakteristično za fragment nekog paketa je da:

    • A.

      1. Svaki fragment uvek sadrži kompletno zaglavlje originalnog paketa

    • B.

      2. Samo prvi fragment sadrži kompletno zaglavlje originalnog paketa

    • C.

      3. Svaki fragment ima svoje posebno zaglavlje (umesto IP adresa postavlja se obeležje fragmenta)

    • D.

      4. Samo prvi i zadnji fragment sadrže kompletno zaglavlje originalnog paketa

    Correct Answer
    A. 1. Svaki fragment uvek sadrži kompletno zaglavlje originalnog paketa
    Explanation
    The correct answer is option 1 because it states that every fragment always contains the complete header of the original packet. This means that even if a packet is fragmented into multiple smaller fragments during transmission, each fragment will still retain the complete header information of the original packet. This is important because the header contains crucial information such as source and destination IP addresses, protocol information, and other control fields that are necessary for proper routing and reassembly of the fragmented packets at the receiving end.

    Rate this question:

  • 20. 

    IP adresa po standardu IPv4 sadrži:

    • A.

      Identifikaciju računara u datoj mreži

    • B.

      Identifikaciju proizvođača Ethernet kartice i njen serijski broj

    • C.

      Identifikaciju korisnika i njegov password

    • D.

      Identifikaciju države i identifikaciju mreže u toj državi

    Correct Answer
    A. Identifikaciju računara u datoj mreži
    Explanation
    An IP address in the standard IPv4 is used to identify a computer within a network. It is a unique numerical label assigned to each device connected to a network. This allows for the proper routing of data packets between devices and enables communication between them. The IP address does not contain information about the manufacturer of the Ethernet card, its serial number, the user's identification or password, or the country or network identification.

    Rate this question:

  • 21. 

    Osim IPv4 adrese za uspešno adresiranje je neophodno imati i:

    • A.

      Masku podmreže (subnet mask)

    • B.

      Default gateway

    • C.

      IP adrese DNS servera

    Correct Answer
    A. Masku podmreže (subnet mask)
    Explanation
    In addition to IPv4 addresses, it is necessary to have a subnet mask for successful addressing. The subnet mask is used to determine the network portion of an IP address and the host portion. It helps in identifying which part of the IP address belongs to the network and which part belongs to the host. Without a subnet mask, it would not be possible to properly allocate IP addresses and establish communication within a network.

    Rate this question:

  • 22. 

    Ukoliko su prva dva bita mrežne adrese fiksirana na “01” u pitanju je:

    • A.

      Mreža klase B

    • B.

      Mreža klase C

    • C.

      Mreža klase A

    Correct Answer
    C. Mreža klase A
    Explanation
    The given information states that the first two bits of the network address are fixed at "01". In classful addressing, the first two bits of a class A network address are always "0 0". Therefore, if the first two bits are "01", it indicates that the network is a class A network.

    Rate this question:

  • 23. 

    Ukoliko su prva dva bita mrežne adrese fiksirana na “10” u pitanju je:

    • A.

      Mreža klase A

    • B.

      Mreža klase B

    • C.

      Mreža klase C

    Correct Answer
    B. Mreža klase B
    Explanation
    If the first two bits of the network address are fixed at "10", then it indicates that it is a network of class B. In classful addressing, the first bit of the network address determines the class, and for class B networks, the first two bits are always "10". Class B networks have a larger range of IP addresses compared to class A networks but smaller than class C networks.

    Rate this question:

  • 24. 

    Ukoliko su prva tri bita mrežne adrese fiksirana na “110” u pitanju je:

    • A.

      Mreža klase C

    • B.

      Mreža klase B

    • C.

      Mreža klase A

    Correct Answer
    A. Mreža klase C
    Explanation
    If the first three bits of the network address are fixed at "110", it indicates that it is a class C network. In classful addressing, the first octet of a class C network starts with binary "110". This means that the network can have a maximum of 2^21 (2,097,152) host addresses.

    Rate this question:

  • 25. 

    Rezervacija 8 bitova za mrežu i 14 bita za čvor je karakteristika:

    • A.

      Mreže klase B

    • B.

      Mreže klase C

    • C.

      Mreže klase A

    Correct Answer
    C. Mreže klase A
    Explanation
    The given answer, "mreže klase A" (Class A network), is correct because it mentions the allocation of 8 bits for the network and 14 bits for the host. In Class A networks, the first octet is reserved for the network, allowing for a large number of networks (2^7) and a smaller number of hosts per network (2^14). This allocation scheme is consistent with the given information of 8 bits for the network and 14 bits for the host.

    Rate this question:

  • 26. 

    Rezervacija 16 bitova za mrežu i 16 bitova za čvor je karakteristika:

    • A.

      Mreže klase A

    • B.

      Mreže klase C

    • C.

      Mreže klase B

    Correct Answer
    C. Mreže klase B
    Explanation
    The given answer suggests that the reservation of 16 bits for the network and 16 bits for the host is a characteristic of class B networks. In class B networks, the first 16 bits are reserved for the network address, allowing for a large number of networks with a moderate number of hosts in each network. This allocation of bits allows for a larger number of hosts compared to class C networks, which only reserve 8 bits for the host. Class A networks, on the other hand, reserve the first 8 bits for the network, allowing for a smaller number of networks with a large number of hosts in each network.

    Rate this question:

  • 27. 

    Rezervacija 24 bita za mrežu i 8 bitova za čvor je karakteristika:

    • A.

      Mreže klase A

    • B.

      Mreže klase B

    • C.

      Mreže klase C

    Correct Answer
    C. Mreže klase C
    Explanation
    The given answer, "mreže klase C" (class C network), is correct because a class C network has 24 bits reserved for the network portion and 8 bits reserved for the host portion. This allows for a larger number of individual networks to be created, but with a smaller number of hosts per network compared to class A and B networks. Class C networks are typically used for smaller organizations or networks that do not require a large number of hosts.

    Rate this question:

  • 28. 

    Opseg IPv4 adresa 0.0.0.0-127.255.255.255 je karakteristika:

    • A.

      A klase mreža

    • B.

      C klase mreža

    • C.

      B klase mreža

    Correct Answer
    A. A klase mreža
    Explanation
    The given range of IPv4 addresses, 0.0.0.0-127.255.255.255, falls within the range of Class A network addresses. Class A networks have the first octet in the range of 0-127, which matches the given range. Class A networks have a large number of available IP addresses, as they use only the first octet to identify the network, allowing for a maximum of 16,777,214 hosts per network. Therefore, the correct answer is A klase mreža.

    Rate this question:

  • 29. 

    Opseg IPv4 adresa 128.0.0.0-191.255.255.255 je karakteristika:

    • A.

      B klase mreža

    • B.

      A klase mreža

    • C.

      C klase mreža

    Correct Answer
    A. B klase mreža
    Explanation
    The given range of IPv4 addresses, 128.0.0.0-191.255.255.255, falls within the range of Class B network addresses. Class B networks have a range of 128.0.0.0 to 191.255.255.255 and are typically used for medium-sized networks. They allow for a larger number of hosts compared to Class C networks, but not as many as Class A networks. Therefore, the correct answer is B klase mreža.

    Rate this question:

  • 30. 

    Opseg IPv4 adresa 192.0.0.0-223.255.255.255 je karakteristika:

    • A.

      A klase mreža

    • B.

      B klase mreža

    • C.

      C klase mreža

    Correct Answer
    C. C klase mreža
    Explanation
    The given IPv4 address range, 192.0.0.0-223.255.255.255, falls within the range of Class C networks. In IPv4, IP addresses are divided into different classes based on their range. Class C networks have the first three octets reserved for network identification, while the last octet is used for host identification. The given address range starts with 192, which falls within the range of Class C networks. Therefore, the correct answer is C klase mreža.

    Rate this question:

  • 31. 

    Za adresiranje članova privatne mreže koja ima pristup Internetu mogu se koristiti sledeći opsezi IPv4 adresa:

    • A.

      0.0.0.0-0.255.255.255

    • B.

      10.0.0.0-10.255.255.255

    • C.

      127.0.0.0-127.255.255.255

    • D.

      172.16.0.0-172.31.255.255

    • E.

      192.0.2.0-192.0.2.255

    • F.

      198.18.0.0-198.19.255.255

    • G.

      192.168.0.0-192.168.255.255

    Correct Answer(s)
    B. 10.0.0.0-10.255.255.255
    D. 172.16.0.0-172.31.255.255
    G. 192.168.0.0-192.168.255.255
    Explanation
    The given answer lists the valid ranges of IPv4 addresses that can be used for addressing members of a private network with internet access. These ranges include 10.0.0.0-10.255.255.255, 172.16.0.0-172.31.255.255, and 192.168.0.0-192.168.255.255. These ranges are reserved for private networks and are not routable on the public internet. Therefore, devices within these ranges can communicate with each other within the private network but require network address translation (NAT) to communicate with the internet.

    Rate this question:

  • 32. 

    Preciznost kod CIDR podele mreža je:

    • A.

      Bit

    • B.

      Bajt

    • C.

      32 bita

    • D.

      4 bajta

    Correct Answer
    A. Bit
    Explanation
    The correct answer is "bit" because CIDR (Classless Inter-Domain Routing) is a method used to allocate IP addresses and divide networks. It involves specifying the number of bits used for the network prefix in the IP address. Therefore, the precision in CIDR division is measured in bits, as it determines the size of the network.

    Rate this question:

  • 33. 

    Regularne mrežne maske su:

    • A.

      128.0.0.0

    • B.

      128.128.0.0

    • C.

      255.128.0.0

    • D.

      255.255.64.0

    • E.

      255.255.128.0

    • F.

      255.255.255.64

    • G.

      255.255.255.248

    Correct Answer(s)
    C. 255.128.0.0
    D. 255.255.64.0
    E. 255.255.128.0
    F. 255.255.255.64
    G. 255.255.255.248
  • 34. 

    CIDR zapis mrežne maske “255.255.255.0” je:

    • A.

      /16

    • B.

      /24

    • C.

      /32

    Correct Answer
    A. /16
    Explanation
    The CIDR notation is used to represent the subnet mask of a network. In this case, the subnet mask "255.255.255.0" is represented as "/16" in CIDR notation. This means that the first 16 bits of the IP address are used to identify the network, while the remaining 8 bits are used for host addresses.

    Rate this question:

  • 35. 

    CIDR zapis mrežne maske “255.255.255.224” je:

    • A.

      /16

    • B.

      /27

    • C.

      /31

    Correct Answer
    B. /27
    Explanation
    The CIDR notation "/27" represents the network mask "255.255.255.224". This notation indicates that the first 27 bits in the IP address are used to represent the network portion, while the remaining 5 bits are used for host addressing. This means that there are 32 IP addresses in total, with 30 usable for hosts in the network.

    Rate this question:

  • 36. 

    CIDR zapis mrežne maske “255.255.248.0” je:

    • A.

      /12

    • B.

      /21

    • C.

      /30

    Correct Answer
    B. /21
    Explanation
    The CIDR notation for the given subnet mask "255.255.248.0" is "/21". CIDR notation is used to represent the network prefix length, which indicates the number of network bits in the subnet mask. In this case, the subnet mask has 21 network bits and 11 host bits, resulting in a subnet with a total of 2,048 IP addresses.

    Rate this question:

  • 37. 

    Radeći sa mrežnom maskom 255.255.255.240 sledeći računari mogu da komuniciraju bez posredstva gateway-a:

    • A.

      192.168.1.97 i 192.168.1.110

    • B.

      192.168.1.158 i 192.168.1.161

    • C.

      192.168.1.162 i 192.168.1.173

    • D.

      192.168.1.190 i 192.168.1.201

    • E.

      192.168.1.225 i 192.168.1.235

    • F.

      192.168.1.239 i 192.168.1.250

    Correct Answer(s)
    A. 192.168.1.97 i 192.168.1.110
    C. 192.168.1.162 i 192.168.1.173
    E. 192.168.1.225 i 192.168.1.235
    Explanation
    The given answer is correct because the IP addresses listed are within the same subnet when using the subnet mask 255.255.255.240. This subnet mask allows for a total of 16 IP addresses, with 14 usable addresses for hosts. The IP addresses provided in the answer fall within this range and can communicate directly with each other without the need for a gateway.

    Rate this question:

  • 38. 

    IPv6 je protokol (OSI i TCP/IP):

    • A.

      Fizičkog sloja

    • B.

      Sloja veze

    • C.

      Mrežnog sloja

    • D.

      Transportnog sloja

    • E.

      Aplikativnog sloja

    Correct Answer
    C. Mrežnog sloja
    Explanation
    IPv6 is a protocol that operates at the network layer of the OSI and TCP/IP models. The network layer is responsible for routing packets across different networks and establishing end-to-end connections. IPv6, as a network layer protocol, provides unique IP addresses to devices and enables them to communicate with each other over the internet. It also supports features such as improved security, larger address space, and better performance compared to its predecessor, IPv4. Therefore, the correct answer is "mrežnog sloja" which translates to "network layer" in English.

    Rate this question:

  • 39. 

    Glavni problem koji rešava IPv6 u odnosu na IPv4 je:

    • A.

      Veći adresni prostor

    • B.

      Veće performanse

    • C.

      Veća pouzdanost prenosa

    Correct Answer
    A. Veći adresni prostor
    Explanation
    IPv6 solves the main problem of address exhaustion that exists in IPv4. With IPv6, the address space is significantly larger, allowing for a much larger number of unique IP addresses to be assigned. This is important as the number of devices connected to the internet continues to grow. By providing a larger address space, IPv6 ensures that there are enough addresses available for all devices, both now and in the future.

    Rate this question:

  • 40. 

    IPv6 adrese se najčešće predstavljaju:

    • A.

      Binarno

    • B.

      Decimalno

    • C.

      Heksadecimalno

    Correct Answer
    C. Heksadecimalno
    Explanation
    IPv6 adrese se najčešće predstavljaju heksadecimalno jer IPv6 adrese koriste 128-bitni format, što znači da se sastoje od 8 blokova po 16 bitova. Svaki blok se može predstaviti sa 4 heksadecimalne cifre, što omogućava lakšu čitljivost i upotrebu adresa. Heksadecimalni sistem ima bazu 16, što znači da se koriste cifre od 0 do 9 i slova od A do F. Ova notacija omogućava kompaktnije prikazivanje IPv6 adresa u odnosu na binarnu ili decimalnu notaciju.

    Rate this question:

  • 41. 

    Parametar “Hop Limit” IPv6 paketa može se porediti sa IPv4 parametrom:

    • A.

      Time to Live

    • B.

      Total length

    • C.

      Type Of Service - TOS

    Correct Answer
    A. Time to Live
    Explanation
    The "Hop Limit" parameter in IPv6 packets is comparable to the "Time to Live" parameter in IPv4. Both parameters serve the same purpose of limiting the lifespan of a packet and preventing it from circulating indefinitely in the network. The value of the Hop Limit parameter is decremented by each router the packet passes through, and once it reaches zero, the packet is discarded. Similarly, the Time to Live parameter in IPv4 serves to limit the number of hops a packet can take before being discarded.

    Rate this question:

  • 42. 

    Adrese IPv6 protokola imaju bitsku dužinu od:

    • A.

      32 bita

    • B.

      48 bitova

    • C.

      128 bitova

    Correct Answer
    C. 128 bitova
    Explanation
    IPv6 addresses have a bit length of 128 bits. This is significantly longer than the previous version, IPv4, which had a bit length of 32 bits. The increase in bit length allows for a much larger number of unique addresses to be created, which is necessary due to the increasing number of devices connected to the internet. The longer bit length also provides better security and more efficient routing of network traffic.

    Rate this question:

  • 43. 

    Prenos IPv6 paketa putem IPv4 mreže je moguć:

    • A.

      Bez posebnih dodataka

    • B.

      Putem tunelovanja

    • C.

      Nije moguć

    Correct Answer
    B. Putem tunelovanja
    Explanation
    IPv6 paketi se mogu prenositi putem IPv4 mreže putem tunelovanja. Tunelovanje omogućava da se IPv6 paketi umota u IPv4 pakete kako bi se preneli preko IPv4 mreže. Na odredišnoj strani, IPv6 paketi se odmotavaju iz IPv4 paketa i dalje se rutiraju kao IPv6 paketi. Ovo omogućava komunikaciju između IPv6 mreža preko postojećih IPv4 mreža.

    Rate this question:

  • 44. 

    Aktivna mrežna oprema sa podrškom za 3. sloj (Layer 3) projektovana za IPv4 može se koristiti i za IPv6:

    • A.

      Da

    • B.

      Ne

    Correct Answer
    A. Da
    Explanation
    Active network equipment with support for Layer 3 is designed to handle IP routing. IPv4 and IPv6 are both network layer protocols, so if the equipment is capable of handling IPv4, it can also handle IPv6. Therefore, the answer is "Da" (Yes).

    Rate this question:

  • 45. 

    ICMP je protokol (OSI i TCP/IP):

    • A.

      Fizičkog sloja

    • B.

      Sloja veze

    • C.

      Mrežnog sloja

    • D.

      Transportnog sloja

    • E.

      Aplikativnog sloja

    Correct Answer
    C. Mrežnog sloja
    Explanation
    ICMP stands for Internet Control Message Protocol, which is a protocol used in the network layer of the OSI and TCP/IP models. It is responsible for sending error messages and operational information about network conditions. ICMP operates directly on top of IP (Internet Protocol), which is a network layer protocol. Therefore, the correct answer is "mrežnog sloja" (network layer).

    Rate this question:

  • 46. 

    ICMP je skraćenica od:

    • A.

      Internet Central Monitoring Protocol

    • B.

      Internet Centralized Management Protocol

    • C.

      Internet Control Message Protocol

    Correct Answer
    C. Internet Control Message Protocol
    Explanation
    ICMP stands for Internet Control Message Protocol. ICMP is a network protocol used by network devices, such as routers, to send error messages and operational information about network conditions. It is primarily used for diagnostic and control purposes, such as reporting errors, testing network connectivity, and troubleshooting network issues. ICMP is an integral part of the Internet Protocol Suite and plays a crucial role in ensuring the smooth operation of network communications.

    Rate this question:

  • 47. 

    ICMP poruke:

    • A.

      Imaju nezavisno zaglavlje

    • B.

      Enkalsuliraju se u IP datagram

    • C.

      Koriste sistem višestrukih zaglavlja

    Correct Answer
    B. Enkalsuliraju se u IP datagram
    Explanation
    ICMP (Internet Control Message Protocol) messages are encapsulated within IP (Internet Protocol) datagrams. This means that ICMP messages are embedded or enclosed within IP packets and are transmitted over IP networks. ICMP messages are used for various network management purposes, such as error reporting and diagnostic functions. They are encapsulated within IP datagrams to ensure that they can be routed across the network and reach their intended destination. This encapsulation allows ICMP messages to be transmitted over IP networks effectively.

    Rate this question:

  • 48. 

    ICMP poruke se sastoje od:

    • A.

      Izvorišne adrese

    • B.

      Tipa poruke

    • C.

      Odredišne adrese

    • D.

      Koda

    • E.

      Kontrolne sume

    • F.

      Sadržaja

    • G.

      TTL parametra

    Correct Answer(s)
    B. Tipa poruke
    D. Koda
    E. Kontrolne sume
    Explanation
    ICMP poruke se sastoje od tipa poruke, koda i kontrolne sume. Tip poruke određuje vrstu ICMP poruke, kao što su echo request ili time exceeded. Kod je dodatna informacija koja se koristi za dodatno specificiranje poruke. Kontrolna suma se koristi za provjeru integriteta poruke kako bi se osiguralo da nije došlo do oštećenja podataka tijekom prijenosa.

    Rate this question:

  • 49. 

    Primer alata koji koristi ICMP protokol je:

    • A.

      TCP

    • B.

      Telnet

    • C.

      Ping

    Correct Answer
    C. Ping
    Explanation
    The correct answer is "Ping" because Ping is a tool that uses the ICMP (Internet Control Message Protocol) protocol. ICMP is used to send control messages and error reporting between network devices. Ping is commonly used to test the reachability of a host on an IP network and measure the round-trip time for messages sent from the originating host to a destination computer. TCP and Telnet are not tools that use the ICMP protocol.

    Rate this question:

  • 50. 

    TTL parametar IPv4 protokola može prouzrokovati sledeću poruku u okviru ICMP protokola: 

    • A.

      Destination Unreachable

    • B.

      Parameter Problem

    • C.

      Time Exceeded

    Correct Answer
    C. Time Exceeded
    Explanation
    The TTL (Time to Live) parameter in the IPv4 protocol determines the maximum number of hops (routers) that a packet can traverse before being discarded. If the TTL value reaches zero, the router will discard the packet and send an ICMP message back to the source. This message is known as "Time Exceeded" and indicates that the packet has exceeded its allotted time to reach the destination.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 08, 2015
    Quiz Created by
    Shonez
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.