Sis - Drugi Kolokvijum

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Mladjalug96
M
Mladjalug96
Community Contributor
Quizzes Created: 2 | Total Attempts: 15,161
| Attempts: 7,583
SettingsSettings
Please wait...
  • 1/185 Pitanja

    Prilikom instaliranja antivirus programa preporuka je da se instalira:

    • Dva do četiri anti virus programa
    • što više antivirus programa kako bi se pokrila što veća baza virusa
    • Najmanje dva antivirus programa
    • Samo jedan pouzdan antivirus program
Please wait...


Quiz Preview

  • 2. 

    Koji programski jezik je osetljiv na prekoračenje bafera?

    • C#

    • C/C++

    • Java

    • Nijedan od navedenih

    Correct Answer
    A. C/C++
    Explanation
    C/C++ je programski jezik koji je osetljiv na prekoračenje bafera. Prekoračenje bafera je situacija u kojoj se podaci upisuju izvan granica određenog bafera, što može dovesti do rušenja programa ili izvršavanja zlonamernog koda. C/C++ jezici omogućavaju direktno upravljanje memorijom, što znači da programer ima veću odgovornost za upravljanje baferima i sprečavanje prekoračenja.

    Rate this question:

  • 3. 

    # u konfiguracijskoj datoteci aide.conf znači:

    • Da se naredba posle nje proverava

    • Da se naredba posle nje ne proverava

    • Ništa od navedenog

    • Komentar

    Correct Answer
    A. Komentar
    Explanation
    The given answer "komentar" suggests that in the configuration file aide.conf, the line is a comment and does not have any effect on the execution of commands. It is not a command to be checked or skipped.

    Rate this question:

  • 4. 

    Najbolja preventivna zaštita od zlonamernog koda je:

    • Zaštita u realnom vremenu (real time protection)

    • Skeniranje računara na zahtev (on demand scan)

    • Redovna defragmentacija diska

    • Blokiranje Internet veze

    Correct Answer
    A. Zaštita u realnom vremenu (real time protection)
    Explanation
    The best preventive protection against malicious code is real-time protection. Real-time protection refers to the continuous monitoring and scanning of a computer system for any potential threats or malicious activities. It actively detects and blocks any suspicious files or programs in real-time, preventing them from causing harm to the system. This is considered the most effective method of protection as it provides immediate defense against emerging threats. Scanning the computer on demand, regular disk defragmentation, and blocking internet connections are not specifically focused on preventing malicious code and may not be as effective in providing comprehensive protection.

    Rate this question:

  • 5. 

    Mrežna barijera (firewall) posle filtriranja paketa, paket koji ne zadovoljava ni jedno od definisanih pravila za kontrolu pristupa:

    • Vraća pošiljaocu

    • Odbacuje

    • čuva u posebno za to definisanoj memoriji

    • Oporavlja a zatim propušta

    Correct Answer
    A. Odbacuje
    Explanation
    After filtering the packets, if a packet does not meet any of the defined access control rules, the firewall will discard or reject it.

    Rate this question:

  • 6. 

    Salami Attack predstavlja:

    • Kod koji se integriše u više različitih delova računara

    • Serija malih beznačajnih napada koji se mnogo puta ponavljaju

    • Napad koji otvara zadnja vrata (backdoor) na računaru za druge zlonamerne programe

    • Napad koji dugo ostaje neotkriven

    Correct Answer
    A. Serija malih beznačajnih napada koji se mnogo puta ponavljaju
    Explanation
    Salami Attack predstavlja seriju malih beznačajnih napada koji se mnogo puta ponavljaju. Ovaj tip napada se koristi za krađu ili prevaru putem malih, neprimetnih transakcija koje pojedinačno ne izazivaju sumnju, ali kada se svi ti mali delovi slože, mogu prouzrokovati značajnu štetu. Napadači koriste ovu taktiku kako bi izbegli otkrivanje i prouzrokovali finansijsku ili druge vrste štete.

    Rate this question:

  • 7. 

    Segmentacija i straničenje su metode koje se koriste za zaštitu:

    • Baze računarskog sistema

    • Memorije

    • Procesa

    • Operativnog sistema

    Correct Answer
    A. Memorije
    Explanation
    Segmentacija i straničenje su metode koje se koriste za zaštitu memorije. Segmentacija podrazumeva podelu memorije na segmente kako bi se omogućila zaštita i izolacija različitih delova memorije. Straničenje, s druge strane, podrazumeva podelu memorije na stranice radi efikasnijeg upravljanja memorijom. Obe metode pomažu u sprečavanju neovlašćenog pristupa ili oštećenja memorije, čime se poboljšava sigurnost i stabilnost sistema.

    Rate this question:

  • 8. 

    Autentifikacija lozinkom je odluka na osnovu nečega:

    • što korisnik zna

    • što korisnik zna da ima

    • što korisnik jeste

    • što korisnik ima

    Correct Answer
    A. što korisnik zna
    Explanation
    The correct answer is "što korisnik zna." This is because password authentication is based on something that the user knows, in this case, the password. It is a common method used to verify the identity of a user by requiring them to enter a secret password that only they should know.

    Rate this question:

  • 9. 

    Autentifikacija (samo) smart karticom je odluka na osnovu nečega:

    • što korisnik zna

    • što korisnik ima

    • što korisnik jeste

    • što korisnik zna da ima

    Correct Answer
    A. što korisnik ima
    Explanation
    The correct answer is "što korisnik ima" because authentication with a smart card is based on something that the user possesses, in this case, the smart card itself.

    Rate this question:

  • 10. 

    U praksi, u kodovima se pojavljuje bar jedna greška na svakih:

    • 2000 linija koda

    • 1500 linija koda

    • 2500 linija koda

    • 1000 linija koda

    Correct Answer
    A. 2000 linija koda
    Explanation
    In practice, it is common to encounter at least one error in every 2000 lines of code. This suggests that errors are expected to occur relatively frequently in code, and developers should be prepared to debug and fix them. The other options (1500, 2500, and 1000 lines of code) imply either a higher or lower error rate, which is not consistent with the given statement.

    Rate this question:

  • 11. 

    Uobičajeno, zlonamerni programi se dele na osnovu:

    • štete koju čine u sistemu

    • Težine detektovanja

    • Principa širenja i delovanja

    • Načina neutralisanja

    Correct Answer
    A. Principa širenja i delovanja
    Explanation
    Zlonamerni programi se obično klasifikuju prema principu širenja i delovanja, što znači da se razlikuju na osnovu načina na koji se šire i kako utiču na sistem. Ova klasifikacija omogućava razumevanje različitih strategija i taktika koje zlonamerni programi koriste, kao i njihovih karakteristika i sposobnosti. Na osnovu principa širenja i delovanja, moguće je razviti odgovarajuće mere zaštite i neutralisanja ovih programa.

    Rate this question:

  • 12. 

    Koja distribucija Linuxa nema root nalog?

    • OpenSUSE

    • Ubuntu

    • Sve distribucije imaju root nalog

    • Red Hat

    Correct Answer
    A. Sve distribucije imaju root nalog
    Explanation
    The correct answer is "sve distribucije imaju root nalog" which translates to "all distributions have a root account" in English. This means that all Linux distributions have a root account, which is the superuser account that has complete control over the system.

    Rate this question:

  • 13. 

    Izabrati tačan iskaz:

    • SSL nudi šifrovanje, integritet ali ne i autentifikaciju

    • SSL nudi šifrovanje i autentifikaciju ali ne i integritet

    • SSL nudi šifrovanje, integritet i autentifikaciju

    • SSL nudi integritet i autentifikaciju ali ne i šifrovanje

    Correct Answer
    A. SSL nudi šifrovanje, integritet i autentifikaciju
    Explanation
    SSL (Secure Socket Layer) is a cryptographic protocol that provides encryption, integrity, and authentication. Encryption ensures that the communication between the client and the server is secure and cannot be intercepted by unauthorized parties. Integrity ensures that the data transmitted remains unchanged and has not been tampered with during transmission. Authentication verifies the identity of the server, ensuring that the client is communicating with the intended and trusted server. Therefore, the correct statement is that SSL offers encryption, integrity, and authentication.

    Rate this question:

  • 14. 

    Izbaciti uljeza:

    • OllyDbg

    • IDA Pro

    • Komodo

    • Soft ICE

    Correct Answer
    A. Komodo
    Explanation
    The given list consists of various software tools used for debugging and reverse engineering. OllyDbg, IDA Pro, and Soft ICE are well-known and widely used tools in the field. However, "Komodo" is not typically associated with debugging or reverse engineering. It is primarily a multi-language integrated development environment (IDE) used for software development. Therefore, it can be considered an outlier or "uljez" in this context, making it the correct answer to be eliminated from the list.

    Rate this question:

  • 15. 

    Potpuno automatizovan javni Tjuringov test za razlikovanje čoveka od računara tj. test koji čovek može da prođe sa lakoćom dok računar ne može da ga prođe sa verovatnoćom većom od one koja bi se postigla nasumičnim pogađanjem naziva se

    Correct Answer
    CAPTCHA
    Explanation
    The given correct answer is "CAPTCHA." CAPTCHA is a completely automated public Turing test used to distinguish between humans and computers. It is a test that humans can easily pass while computers cannot pass it with a probability greater than random guessing. CAPTCHA is commonly used to prevent automated bots from accessing certain websites or performing certain actions, as it requires users to complete a challenge that is difficult for computers to solve but relatively easy for humans.

    Rate this question:

  • 16. 

    Koliko osnovnih tipova mrežnih barijera postoji:

    • 4

    • 2

    • 3

    • 1

    Correct Answer
    A. 3
    Explanation
    There are three basic types of network barriers.

    Rate this question:

  • 17. 

    Dvo faktorska autentifikacija zahteva:

    • Tačno 2 od 3 stavke - nešto što znate i imate

    • Bilo koje 2 od 3 stavke (nešto što znate/imate/jeste)

    • Tačno 2 od 3 stavke - nešto što jeste i imate

    • Tačno 2 od 3 stavke - nešto što znate i jeste

    Correct Answer
    A. Bilo koje 2 od 3 stavke (nešto što znate/imate/jeste)
    Explanation
    The correct answer is "bilo koje 2 od 3 stavke (nešto što znate/imate/jeste)". This means that any combination of two out of the three factors (something you know, something you have, something you are) can be used for two-factor authentication. It allows flexibility in choosing the most convenient and secure combination of factors for authentication purposes.

    Rate this question:

  • 18. 

    Za prikupljanje naizgled nebitnih podataka sa više različitih izvora koji objedinjeni daju konkretnu informaciju koristi se:

    • Vremenske bombe

    • Napad linearizacijom

    • Salami attack

    • Trojanski konj

    Correct Answer
    A. Salami attack
    Explanation
    The correct answer is "salami attack". A salami attack is a type of cyber attack where small, seemingly insignificant pieces of data are stolen or manipulated over a period of time. These small pieces of data are often not noticeable, but when combined, they can provide valuable information or resources to the attacker. This method is used to avoid detection and raise minimal suspicion.

    Rate this question:

  • 19. 

    Autentifikacija pomoću smart kartice gde se dodatno zahteva i ukucavanje PIN koda je autentifikacija na osnovu nečega što:

    • Korisnik ima, zna i jeste

    • Korisnik ima i zna

    • Korisnik ima i jeste

    • Korisnik zna i jeste

    Correct Answer
    A. Korisnik ima i zna
    Explanation
    The correct answer is "korisnik ima i zna" because authentication using a smart card requires the user to possess (ima) the physical card and know (zna) the associated PIN code. This combination of something the user possesses and something the user knows provides an additional layer of security for authentication.

    Rate this question:

  • 20. 

    Keylogger je:

    • Uređaj za siguran prenos od tastature do PCa

    • Hakerska komponenta za presretanje lozinki

    • Uređaj za autorizaciju

    • Komponenta za autentifikaciju

    Correct Answer
    A. Hakerska komponenta za presretanje lozinki
    Explanation
    A keylogger is a type of malicious software or hardware that is used by hackers to intercept and record keystrokes on a computer. It is designed to capture sensitive information such as passwords, credit card numbers, and other personal data. This information can then be used by the hacker for unauthorized access or identity theft. Therefore, the correct answer is "hakerska komponenta za presretanje lozinki" which translates to "hacker component for intercepting passwords".

    Rate this question:

  • 21. 

    Izabrati tačan iskaz:

    • IPSec nudi šifrovanje, integritet ali ne i autentifikaciju

    • IPSec nudi integritet i autentifikaciju ali ne i šifrovanje

    • IPSec nudi šifrovanje, integritet i autentifikaciju

    • IPSec nudi integritet i autentifikaciju ali ne i šifrovanje

    Correct Answer
    A. IPSec nudi šifrovanje, integritet i autentifikaciju
    Explanation
    IPSec is a network protocol suite that provides security services for IP (Internet Protocol) communications. It offers encryption to protect the confidentiality of data, integrity to ensure that the data has not been tampered with during transmission, and authentication to verify the identity of the communicating parties. Therefore, the correct statement is "IPSec nudi šifrovanje, integritet i autentifikaciju" which translates to "IPSec offers encryption, integrity, and authentication."

    Rate this question:

  • 22. 

    Windows Defender je:

    • Program koji omogućava pravljenje zaštićenih particija na disku

    • Antivirus program

    • Program koji obezbeđuje uslugu autentifikacije

    • Drugi naziv za Windowsovu zaštitnu barijeru (firewall)

    Correct Answer
    A. Antivirus program
    Explanation
    Windows Defender is an antivirus program. It is a built-in security feature in Windows operating systems that helps protect against viruses, malware, and other malicious software. It scans for and removes threats, provides real-time protection, and regularly updates its virus definitions to stay up-to-date with the latest threats.

    Rate this question:

  • 23. 

    Zlonamerni program koji ima osobinu da može da se širi kroz mrežu bez potrebe za asistencijom korisnika naziva se:

    Correct Answer
    crv
    Explanation
    The correct answer is "crv" because it refers to a malicious program that can spread through a network without the need for user assistance. The word "crv" is derived from the term "worm" in Serbian, which is commonly used to describe this type of program.

    Rate this question:

  • 24. 

    Skup metoda za ograničavanje korišćenja digitalnih sadržaja u cilju zaštite autorskih prava skraćeno se zapisuje:

    Correct Answer
    DRM
    Explanation
    The correct answer is DRM. DRM stands for Digital Rights Management, which is a method used to restrict the use of digital content in order to protect copyright. It involves technologies and techniques that control the access, copying, distribution, and usage of digital content such as music, movies, ebooks, and software. DRM is commonly used by content creators and distributors to prevent unauthorized copying and sharing of their intellectual property, ensuring that they can monetize their work and protect their rights.

    Rate this question:

  • 25. 

    Ukoliko se poseduje samo exe fajl a postoji namera (potreba) da se analizira i izmeni kod neophodan alat je:

    • Samo disasembler i hex editor

    • Samo dibager i hex editor

    • Samo disasembler

    • I disasembler i dibager

    Correct Answer
    A. I disasembler i dibager
    Explanation
    If one only has an exe file and there is a need to analyze and modify the code, the necessary tools are a disassembler and a debugger. A disassembler is used to convert the machine code into assembly language, allowing for a better understanding of the code structure and logic. A debugger, on the other hand, is used to execute the code step by step, allowing for the identification of bugs and the ability to modify the code during runtime. Using both tools together provides a comprehensive approach to analyzing and modifying the code in the given scenario.

    Rate this question:

  • 26. 

    Koji program ovde ne pripada:

    • Code red

    • Morris Warm

    • Brain

    • SQL Slammer

    Correct Answer
    A. Brain
    Explanation
    The given options are all names of computer programs or viruses, except for "Brain." Brain does not belong in this list because it is not a program or virus; it is a term commonly used to refer to the human brain or intelligence. The other options, Code red, Morris Warm, and SQL Slammer, are all well-known computer programs or viruses.

    Rate this question:

  • 27. 

    Prilikom slanja podataka iz html forme, može se reći da:

    • Zavisi koji je podrazumevani metod

    • Metod GET otkriva podatke

    • Zavisi od web čitača

    • Metod POST otkriva podatke

    Correct Answer
    A. Metod GET otkriva podatke
    Explanation
    When sending data from an HTML form, it can be said that the method GET reveals the data. This means that when using the GET method, the data entered in the form will be visible in the URL of the webpage. This can be seen in the browser's address bar, making it less secure for sending sensitive or confidential information. On the other hand, the method POST does not reveal the data in the URL, providing a more secure way of sending data. However, the answer does not mention that it depends on the web browser, as different browsers may have different default methods for form submission.

    Rate this question:

  • 28. 

    Granične adrese koje koristi jedan korisnik/proces kod istoimene metode mogu da budu:

    • Samo obe dinamičke

    • Obe istovremeno statičke ili obe istovremeno dinamičke

    • Početna statička a krajnja dinamička

    • Samo obe statičke

    Correct Answer
    A. Obe istovremeno statičke ili obe istovremeno dinamičke
    Explanation
    The possible boundary addresses that can be used by a user/process for the same method can either be both static or both dynamic at the same time. This means that either both the starting and ending addresses are static or both are dynamic.

    Rate this question:

  • 29. 

    Sigurnost operativnog sistema opšte namene se najefikasnije realizuje kroz:

    • Sigurnost fizičkog pristupa sistemu

    • Sigurnost na nivou korisničkih aplikacija

    • Sigurnost mrežnog pristupa sistemu

    • Sigurno jezgro (kernel)

    Correct Answer
    A. Sigurno jezgro (kernel)
    Explanation
    The most effective way to ensure the security of a general-purpose operating system is through a secure kernel. The kernel is the core component of the operating system that manages the system's resources and provides essential services to other parts of the system. By securing the kernel, it becomes more difficult for malicious actors to exploit vulnerabilities and gain unauthorized access to the system. This is because the kernel acts as a gatekeeper, controlling access to system resources and enforcing security policies.

    Rate this question:

  • 30. 

    Očitavanje SMART kartice je moguće prisluškivati:

    • Postavljanjem prisluškivača elektromagnetnog zračenja u blizini uređaja za očitavanje

    • Postavljanjem prisluškivača zvučnih zapisa

    • Samo neposrednim kontaktom ili modifikacijom uređaja za očitavanje

    • Postavljanjem skrivene video kamere

    Correct Answer
    A. Postavljanjem prisluškivača elektromagnetnog zračenja u blizini uređaja za očitavanje
    Explanation
    The correct answer states that it is possible to eavesdrop on the reading of a SMART card by placing an electromagnetic radiation eavesdropper near the card reader. This implies that the data being transmitted between the card and the reader can be intercepted and accessed by unauthorized individuals using this method.

    Rate this question:

  • 31. 

    U koliko u listi za kontrolu pristupa ne postoji ni jedno pravilo koje odgovara pristiglom paketu:

    • Paket će biti prosleđen

    • Paket će biti poslat administratoru

    • Paket će biti odbačen

    • Od izvorišta će biti zatražena dodatna informacija

    Correct Answer
    A. Paket će biti odbačen
    Explanation
    If there is no rule in the access control list that matches the incoming packet, the packet will be discarded.

    Rate this question:

  • 32. 

    Salt je:

    • Oblik u kome se lozinka čuva u računaru

    • šifrovana lozinka

    • Oblik u koji se lozinka konvertuje pre nego što se računa njen heš

    • Slučajna vrednost koja se dodaje na lozinku

    Correct Answer
    A. Slučajna vrednost koja se dodaje na lozinku
    Explanation
    Salt je slučajna vrednost koja se dodaje na lozinku radi povećanja sigurnosti. Kada se korisnikova lozinka unese, dodaje se salt vrednost na lozinku pre nego što se izračuna njen heš. Ovo sprečava napadače da koriste prethodno izračunate heš vrednosti ili tabele heševa za dešifrovanje lozinke. Salt se čuva zajedno sa heš vrednošću u bazi podataka kako bi se mogao koristiti prilikom provere unete lozinke.

    Rate this question:

  • 33. 

    Mrežna barijera se realizuje

    • Isključivo kao hardver

    • Može biti i softver i hardver

    • Kao deo operativnog sistema

    • Isključivo kao softver

    Correct Answer
    A. Može biti i softver i hardver
    Explanation
    The correct answer is "može biti i softver i hardver". This means that a network barrier can be implemented using both hardware and software. This suggests that there are different ways to create a network barrier, and it can be achieved through a combination of hardware and software components.

    Rate this question:

  • 34. 

    Napad zlonamernim programima koji koriste ljudske slabosti naziva se:

    • Društveni inženjering

    • Ubacivanje logičke bombe

    • Odbijanje usluge

    • Društvena mreža

    Correct Answer
    A. Društveni inženjering
    Explanation
    The correct answer is "društveni inženjering" which translates to "social engineering" in English. Social engineering refers to the tactics used by malicious programs to exploit human vulnerabilities in order to gain unauthorized access to systems or sensitive information. This can include techniques such as phishing, impersonation, or manipulation to deceive individuals into revealing confidential information or performing actions that compromise security.

    Rate this question:

  • 35. 

    Na kraju svih pravila liste za kontrolu pristupa postoji implicitna (nevidljiva) stavka:

    • Deny all (odbaci sve)

    • Ignore all (zanemari sve)

    • Allow all (prosledi sve)

    • Stavka koju adminstrator podešava

    Correct Answer
    A. Deny all (odbaci sve)
    Explanation
    At the end of all access control lists, there is an implicit (invisible) item called "Deny all". This means that any access requests that have not been explicitly allowed will be denied. This is a default setting to ensure that only authorized access is granted and any unauthorized access attempts are rejected.

    Rate this question:

  • 36. 

    Који модел PKI (Public Key Infrastructure) се користи код савремених Интернет претраживача:

    • претраживачи у свом раду немају потребу да користе PKI

    • олигархијски модел

    • монополски модел

    • зависи од претраживача

    Correct Answer
    A. олигархијски модел
    Explanation
    The given answer, "олигархијски модел" (oligarchic model), suggests that modern internet browsers use an oligarchic model for PKI (Public Key Infrastructure). This means that a small group of powerful entities control the issuance and management of digital certificates, which are used to verify the authenticity of websites and establish secure connections. In this model, the trust and security of the PKI system are concentrated in the hands of a few major players, rather than being distributed among a larger network of entities.

    Rate this question:

  • 37. 

    Zlonamerni programi koji se šire tako što navedu korisnike da pokrenu (najčešće) besplatne aplikacije za koje se kasnije pokaže da imaju funkciju različitu od očekivane nazivaju se:

    • Trojanski konj

    • Backdoor (zadnja vrata)

    • Rabbit

    • Logička bomba

    Correct Answer
    A. Trojanski konj
    Explanation
    The correct answer is "trojanski konj" because it refers to malicious programs that are disguised as legitimate software or files. These programs trick users into downloading and running them, often by masquerading as free applications. Once installed, trojans can perform unauthorized actions on the user's device, such as stealing personal information or granting remote access to hackers. The term "trojanski konj" is derived from the story of the Trojan Horse, where Greek soldiers hid inside a wooden horse to gain access to the city of Troy.

    Rate this question:

  • 38. 

    Zlonamerni softver koji nenamenski troši sistemske resurse naziva se:

    • Trapdoor

    • Trojanski konj

    • Rabbit

    • Crv

    Correct Answer
    A. Rabbit
    Explanation
    The correct answer is "rabbit" because it refers to malicious software that consumes system resources unnecessarily. This type of software is often used to slow down or disrupt computer systems. Unlike trapdoors, trojans, and worms, rabbits do not typically have a specific malicious purpose but rather cause harm by consuming resources.

    Rate this question:

  • 39. 

    Operativni sistem od poverenja ne mora da obezbedi:

    • DAC kontrolu pristupa

    • Autentifikaciju/autorizaciju

    • MAC kontrolu pristupa

    • Grafičko okruženje

    Correct Answer
    A. Grafičko okruženje
    Explanation
    An operating system of trust does not necessarily need to provide a graphical interface. While a graphical interface can enhance user experience and make it easier to interact with the system, it is not a fundamental requirement for an operating system to be considered trustworthy. The other options listed, such as DAC access control, authentication/authorization, and MAC access control, are all important security features that an operating system of trust should provide.

    Rate this question:

  • 40. 

    Zlonamerni računarski kod koji može da se integriše na postojeći program ili fajl i da se na taj način prenosi sa računara na računar naziva se:

    Correct Answer
    virus
    Explanation
    The correct answer is "virus." A virus is a malicious computer code that can be integrated into an existing program or file and spread from one computer to another. It is designed to cause harm, such as corrupting or deleting files, stealing personal information, or disrupting system operations. Viruses can be transmitted through various means, such as email attachments, infected websites, or shared files. Once a computer is infected, the virus can replicate itself and spread to other computers, potentially causing widespread damage.

    Rate this question:

  • 41. 

    Izabrati tačan iskaz:

    • Ni ACL lista ni C lista nisu izvedene iz Lampsonove kontrolne matrice

    • I ACL lista i C lista su izvedene iz Lampsonove kontrolne matrice

    • ACL lista jeste a C lista nije izvedena iz Lampsonove kontrolne matrice

    • C lista jeste a ACL lista nije izvedena iz Lampsonove kontrolne matrice

    Correct Answer
    A. I ACL lista i C lista su izvedene iz Lampsonove kontrolne matrice
    Explanation
    The correct answer is "i ACL lista i C lista su izvedene iz Lampsonove kontrolne matrice" which translates to "both ACL list and C list are derived from Lampson's access control matrix." This statement indicates that both ACL list and C list are derived from Lampson's control matrix, implying that they are both related to the access control mechanism proposed by Lampson.

    Rate this question:

  • 42. 

    Šta ne spada u osnovne zadatke NGSCB (Next Generation Secure Computing Base):

    • Jaka izolacija procesa

    • Atest

    • DRM

    • Bezbedno skladištenej podataka i siguran prenos podataka

    Correct Answer
    A. DRM
    Explanation
    DRM (Digital Rights Management) does not fall under the basic tasks of NGSCB (Next Generation Secure Computing Base). NGSCB focuses on strong process isolation, testing, secure data storage, and secure data transmission. DRM, on the other hand, is a technology used to protect digital content and enforce copyright restrictions. While DRM can contribute to secure computing, it is not a fundamental aspect of NGSCB.

    Rate this question:

  • 43. 

    Single sign on je postupak kojim se obezbeđuje:

    • Zaštita sistema takva da korisnik ima samo jedan pokušaj za prijavu sistemu

    • Da sistemu može da se pristupa samo preko jedinstvene lozinke/biometrije/uređaja...

    • Da sistemu može da pristupa samo jedna određena osoba

    • Da se korisnik prijavljuje samo jedanput a sve ostale naknadne prijave se obavljaju automatski

    Correct Answer
    A. Da se korisnik prijavljuje samo jedanput a sve ostale naknadne prijave se obavljaju automatski
    Explanation
    Single sign on (SSO) je postupak koji omogućava korisniku da se prijavi samo jednom, a sve ostale naknadne prijave se automatski obavljaju. Ovo omogućava korisniku da pristupa različitim sistemima i aplikacijama bez potrebe za ponovnim unošenjem korisničkog imena i lozinke. SSO poboljšava korisničko iskustvo, povećava produktivnost i smanjuje rizik od zaboravljanja lozinki ili njihovog kompromitovanja.

    Rate this question:

  • 44. 

    AIDE naredba inicijalizacije sistema je:

    • $cp /var/lib/aide/aide.db.new /var/lib/aide/aide.db

    • $aide -c /etc/aide/aide.conf.autogenerated -i

    • Ništa od navedenog

    • $aide -c /etc/aide/aide.conf.autogenerated -C

    Correct Answer
    A. $aide -c /etc/aide/aide.conf.autogenerated -i
    Explanation
    The correct answer is "$aide -c /etc/aide/aide.conf.autogenerated -i". This is the correct command for initializing the AIDE system. It specifies the configuration file to use (-c /etc/aide/aide.conf.autogenerated) and the option to initialize the database (-i).

    Rate this question:

  • 45. 

    Nakon izvršenja koda: @echo off :a ping localhost>>a.txt goto :a dešava se:

    • Napad prekoračenja bafera

    • SQL injection napad

    • DOS napad

    • XSS napad

    Correct Answer
    A. DOS napad
    Explanation
    The given code is an infinite loop that continuously pings the localhost and appends the output to the "a.txt" file. This creates a Denial of Service (DOS) attack as it overwhelms the system with excessive network traffic and consumes its resources, causing it to become unresponsive or crash.

    Rate this question:

  • 46. 

    U Linux OS pravo 654 odgovara:

    • Rw---wxr-x

    • R-x-wxrw-

    • Rw-r-xr--

    • R-xrw-r--

    Correct Answer
    A. Rw-r-xr--
    Explanation
    The given answer "rw-r-xr--" represents the file permissions for the Linux OS. Each group of three characters (r, w, x) represents the permissions for the owner, group, and others respectively. In this case, the owner has read and write permissions, the group has read and execute permissions, and others have only read permissions.

    Rate this question:

  • 47. 

    Autentifikacija pomoću otiska prsta je odluka na osnovu nečega:

    • što korisnik jeste

    • što korisnik zna

    • što korisnik ima

    • što korisnik zna da ima

    Correct Answer
    A. što korisnik jeste
    Explanation
    The correct answer is "što korisnik jeste" which translates to "what the user is" in English. This refers to the authentication method using fingerprint, where the user's identity is verified based on their unique fingerprint pattern. Unlike the other options which involve knowledge or possession, this method relies on the inherent physical characteristic of the user.

    Rate this question:

  • 48. 

    Ukoliko je neprivilegovani korisnik Windows sistema George kome je dato pravo upisa u direktorijum C:\1 član grupe CannibalCorpse kojoj je dato pravo Read and Execute za taj direktorijum, da li korisnik može da upiše fajl u taj direktorijum?

    • Ne može se odrediti na osnovu navedenog

    • Zavisi od članstva u ostalim grupama

    • Može

    • Ne može

    Correct Answer
    A. Ne može
    Explanation
    Based on the given information, the non-privileged user George, who has been given write permission to the directory C:\1, is a member of the CannibalCorpse group that has been given only Read and Execute permission for that directory. Therefore, George cannot write a file in that directory because he does not have the necessary write permission.

    Rate this question:

  • 49. 

    Ispravke, zakrpe i nove verzije softvera:

    • Predstavljaju nepotrebno opterećivanje sistema zato što proizvođači ubacuju suvišne opcije da bi korisnicima prodali nove verzije programa

    • Ispravljaju poznate probleme, ali mogu da donesu neke nove propuste

    • Obezbeđuju da softver na kraju bude potpuno bez propusta, ako je proizvođač ažuran i izbacuje redovno dopune

    • Omogućavaju da proizvođač bude korak

    Correct Answer
    A. Ispravljaju poznate probleme, ali mogu da donesu neke nove propuste
    Explanation
    The given answer states that software updates and patches fix known issues but may introduce new vulnerabilities. This means that while they address existing problems, they also have the potential to create new ones. This highlights the trade-off between fixing current issues and the risk of unintentionally introducing new flaws in the software.

    Rate this question:

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 16, 2018
    Quiz Created by
    Mladjalug96
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.