Skuska Kt 2 (Otazky Z Testov Zo Semestra)

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Lenka
L
Lenka
Community Contributor
Quizzes Created: 1 | Total Attempts: 446
| Attempts: 446 | Questions: 84
Please wait...
Question 1 / 84
0 %
0/100
Score 0/100
1. Socket je pouzitelny len v pripade programovacieho jazyka C formou dostupnych aplikacnych kniznic.

Explanation

This statement is false. A socket is not limited to the programming language C. Sockets are a programming interface that allows communication between two computers over a network. They are supported by various programming languages, including C, C++, Java, Python, and many others. Therefore, the statement that sockets are only usable in the C programming language is incorrect.

Submit
Please wait...
About This Quiz
Skuska Kt 2 (Otazky Z Testov Zo Semestra) - Quiz

.

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. Socket mozeme pouzivat vyhradne v OS Linux.

Explanation

The statement "Socket mozeme pouzivat vyhradne v OS Linux" is not true. Sockets can be used in various operating systems, not just Linux. Sockets are a communication mechanism that allows processes to communicate with each other, both on the same machine and across different machines. They are widely supported in different operating systems, including Windows, macOS, and various Unix-based systems, not just Linux.

Submit
3. Socket je pouzitelny len v pripade programovacieho jazyka C formou dostupnych aplikacnych kniznic.

Explanation

The statement is false. A socket is not limited to the C programming language. It is a programming concept that is available in various programming languages, including C, C++, Java, Python, and more. Sockets allow communication between different processes or machines over a network.

Submit
4. Trend IoT prinasa so sebou nove bezpecnostne hrozby

Explanation

The statement "Trend IoT prinasa so sebou nove bezpecnostne hrozby" translates to "The IoT trend brings new security threats." The correct answer is "Pravda," which means "True" in English. This suggests that the statement is accurate, implying that the IoT trend does indeed bring new security threats.

Submit
5. Ktore aplikacne modely (architektury) z pohladu vzajomnej komunikacie entit pozname? (Vyberte 2)

Explanation

Client-server and peer-to-peer are two well-known application models/architectures in terms of mutual communication between entities. In a client-server model, there is a central server that provides services to multiple clients. The clients send requests to the server, and the server responds with the requested data or performs the requested actions. In a peer-to-peer model, all entities (peers) have equal capabilities and can act as both clients and servers. Peers can communicate directly with each other without the need for a central server.

Submit
6. Funkcia senzora v IoT :

Explanation

The correct answer is "Zistovanie udajov z prostredia" which translates to "Collecting data from the environment" in English. In the context of IoT (Internet of Things), sensors play a crucial role in gathering data from the surrounding environment. These sensors can detect and measure various parameters such as temperature, humidity, light, motion, etc. This collected data is then utilized for further analysis, decision-making, and automation processes.

Submit
7. Broadcastova poziadavka protokolu ARP (ARP Query) sa posiela s cielovou adresou:

Explanation

The correct answer is FF-FF-FF-FF-FF-FF. This is the broadcast address in Ethernet, which means that the ARP query is sent to all devices on the network. When a device receives this broadcast, it will check if the target IP address in the ARP query matches its own IP address. If it does, the device will respond with its MAC address. By using the broadcast address, the ARP query ensures that all devices on the network receive the request and have the opportunity to respond.

Submit
8. Protokol TCP je

Explanation

The correct answer is "Spolahlivy" which means "Reliable" in English. The question is asking about the TCP protocol, and TCP (Transmission Control Protocol) is indeed a reliable protocol. It ensures that data packets are delivered in the correct order and without errors by using acknowledgments, retransmissions, and flow control mechanisms. Unlike UDP (User Datagram Protocol), TCP provides a guaranteed and error-free delivery of data, making it suitable for applications that require reliable transmission, such as web browsing, email, and file transfer.

Submit
9. Trend IoT prinasa so sebou nove bezpecnostne hrozby.

Explanation

The statement "Trend IoT prinasa so sebou nove bezpecnostne hrozby" translates to "The IoT trend brings new security threats." The correct answer, "Pravda," means "True" in Slovak. This suggests that the statement is indeed true, implying that the IoT trend does bring new security threats.

Submit
10. Funkcia senzora v IoT je 

Explanation

The correct answer is "Zistovanie udajov z prostredia" which translates to "Collecting data from the environment." In the context of IoT (Internet of Things), a sensor's function is to gather data from its surroundings. This data can include information about temperature, humidity, light intensity, motion, etc. The sensor detects and measures these environmental variables, which can then be used for analysis, decision-making, or triggering certain actions in the IoT system. Cloud computing and generating random data are not directly related to the primary function of a sensor in IoT.

Submit
11. Jedno z rieseni pre velko-objemove streamovanie ulozeneho videa je CDN (Content delivery network).

Explanation

One of the solutions for high-volume streaming of stored video is CDN (Content delivery network). A CDN is a network of servers distributed geographically to deliver content to users more efficiently. By storing copies of the video in multiple servers across different locations, CDN reduces the distance between the user and the content, resulting in faster and more reliable streaming. This improves the user experience by minimizing buffering and latency issues. Therefore, the statement "Pravda" (True) is correct.

Submit
12. Startovaci riadok hlavicky SIP dotazu je tvoreny: meno metody + tzv. "Request URI" (SIP adresa pouzivatela alebo sluzby) + cislo verzie SIP protokolu

Explanation

The starting line of the SIP request header consists of the method name, the "Request URI" (SIP address of the user or service), and the version number of the SIP protocol. This statement is true because the SIP request header follows a specific format which includes these elements.

Submit
13. Protokol TCP je (vyberte 2):

Explanation

The correct answer is "spojovany, spolahlivy". TCP (Transmission Control Protocol) is a connection-oriented and reliable protocol. It establishes a connection between the sender and receiver before data transmission and ensures that all data packets are delivered in the correct order without loss or duplication.

Submit
14. Ktore protokoly transportnej vrstvy mozeme pouzit pri vytvoreni a pouzivani socketu?

Explanation

UDP and TCP are the protocols that can be used for creating and using a socket. UDP (User Datagram Protocol) is a connectionless protocol that provides a simple and lightweight way to send datagrams over the network. It is commonly used for applications that require low latency and can tolerate some data loss, such as real-time streaming or online gaming. TCP (Transmission Control Protocol) is a connection-oriented protocol that provides reliable and ordered delivery of data. It establishes a connection between the sender and receiver and ensures that all data is received correctly. TCP is commonly used for applications that require reliable data transmission, such as web browsing or file transfer.

Submit
15. Protokol SIP umoznuje aby si sami koncovi pouzivatelia programovali funkcie danej sluzby bez potreby zasahu zo strany operatora.

Explanation

The given statement is true. The SIP protocol allows end users to program the functions of a service without the need for intervention from the operator. This means that users have the flexibility to customize and control the features of the service according to their specific needs and preferences.

Submit
16. Startovaci riadok hlavicky SIP dotazu je tvoreny : meno metody + tzv. "Request URI" (SIP adresa pouzivatela alebo sluzby) + cislo verzie SIP protokolu

Explanation

The starting line of a SIP request header consists of the method name, the "Request URI" (SIP address of the user or service), and the version number of the SIP protocol. This statement is true because the SIP request header follows a specific format that includes these elements.

Submit
17. Transportny port cislo 22 patri do kategorie portov:

Explanation

Well-known ports are those ports that are assigned by the Internet Assigned Numbers Authority (IANA) and are commonly used for specific services. These ports range from 0 to 1023 and are well-known and widely used by various applications and protocols. Therefore, transportny port cislo 22 belongs to the category of well-known ports.

Submit
18. Protokol SIP umoznuje, aby si sami koncovi pouzivatelia programovali funkcie danej sluzby bez potreby zasahu zo strany operatora.

Explanation

The statement is true because the SIP protocol allows end users to program the functions of a service themselves, without needing any intervention from the operator. This means that users have the flexibility to customize and personalize their experience with the service according to their own preferences and needs.

Submit
19. Ktore prvky musia mat aplikacie rovnake, aby mohli navzajom uspesne komunikovat cez sockety?

Explanation

To enable successful communication through sockets, applications must have the same transport protocol and application protocol. The transport protocol determines how data is transmitted over the network, while the application protocol defines the rules and formats for exchanging data between applications. The programming language and operating system are not relevant in this context as long as the applications can use the same transport and application protocols.

Submit
20. Ktora z nasledujucich vlastnosti je nevyhoda standardu IEEE 802.1X

Explanation

The correct answer is "Chrani ken pristup k sieti" (Protects access to the network). This is a disadvantage of the IEEE 802.1X standard because it adds an extra layer of security to the network, which can be time-consuming and complex to implement. It requires authentication of devices before granting access to the network, which can cause delays and inconvenience for users. Additionally, if the authentication process fails, legitimate users may be denied access to the network.

Submit
21. Ktore prvky musia mat aplikacie rovnake, aby mohli navzajom uspesne komunikovat cez sockety?

Explanation

In order for applications to communicate successfully through sockets, they must have the same transport protocol and application protocol. The transport protocol determines how data is transmitted over the network, while the application protocol defines the rules and formats for communication between applications. The operating system and programming language used by the applications do not necessarily need to be the same for successful communication.

Submit
22. Aky je rozdiel medzi Fog computing a Cloud computing?

Explanation

The correct answer is "Pri Fog computingu je cast vypoctov realizovana aj u samotneho klienta" which translates to "In Fog computing, a part of the computation is also done at the client side." This means that in Fog computing, the processing and analysis of data is not only done in the cloud but also at the edge devices or client devices. This allows for faster processing and real-time decision-making, making it suitable for applications that require low latency and immediate response. Cloud computing, on the other hand, primarily focuses on offloading computation and storage to remote servers or the cloud.

Submit
23. Ktore protokoly transportnej vrstvy mozeme pouzit pri vytvoreni a pouzivani socketu?

Explanation

TCP and UDP are both transport layer protocols that can be used for creating and using sockets. TCP (Transmission Control Protocol) provides reliable and ordered delivery of data with error checking and flow control mechanisms. UDP (User Datagram Protocol) is a lightweight protocol that offers faster but unreliable delivery of data without error checking or flow control. HTTP (Hypertext Transfer Protocol) and XML (eXtensible Markup Language) are not transport layer protocols, but application layer protocols used for communication over the internet. IP (Internet Protocol) is a network layer protocol responsible for addressing and routing packets.

Submit
24. Sifrovanie asymetrickou sifrou - pre overenie verejneho kluca sa pouziva CRL (Certificate Revocation List)

Explanation

The given statement states that for verifying the public key, CRL (Certificate Revocation List) is used in asymmetric encryption. This means that CRL is used to check if the certificate associated with the public key has been revoked or not. This helps ensure the security and validity of the encryption process.

Submit
25. Protokol TCP vnima udaje z aplikacnej vrstvy len ako prud bajtov bez vnutornej struktury

Explanation

The given statement is true. TCP (Transmission Control Protocol) is a transport layer protocol that is responsible for establishing a reliable and error-free connection between two devices on a network. It treats data from the application layer as a stream of bytes without any internal structure. TCP breaks this stream into smaller segments and adds necessary information, such as sequence numbers and checksums, to ensure the reliable delivery of data. Therefore, TCP does not concern itself with the internal structure or format of the data being transmitted.

Submit
26. Protokol SIP je signalizacny protokol. 

Explanation

The statement "Protokol SIP je signalizacny protokol" translates to "SIP protocol is a signaling protocol" in English. This statement is true because SIP (Session Initiation Protocol) is indeed a signaling protocol used for initiating, modifying, and terminating communication sessions in IP networks. It is commonly used for voice and video calls over the internet.

Submit
27. Konvergencia IP sieti znamena:

Explanation

The correct answer suggests that convergence of IP networks means that all services should be integrated into one network. This means that different services, such as voice, video, and data, can be transmitted over a single IP-based network, eliminating the need for separate networks for each service. This allows for more efficient and cost-effective communication and management of services.

Submit
28. Protokoly sietovej vrstvy modelu OSI su? (vyberte dve)

Explanation

The correct answer is IPv6 and IPv4. These protocols belong to the network layer of the OSI model. IPv6 is the latest version of the Internet Protocol, which provides an expanded address space and improved security features compared to IPv4. IPv4 is the most widely used version of the Internet Protocol, which uses 32-bit addresses and is responsible for the routing and addressing of packets within a network. ISL, DNS, and HTTP are protocols that operate at different layers of the OSI model, not specifically at the network layer.

Submit
29. S/MIME ponuka jednoznacne urcenie povodu

Explanation

S/MIME (Secure/Multipurpose Internet Mail Extensions) is a cryptographic protocol that provides a way to digitally sign and encrypt email messages. It ensures the authenticity and integrity of the message by allowing the recipient to verify the origin of the message and confirm that it has not been tampered with during transmission. Therefore, it can be concluded that S/MIME offers a clear determination of the origin of the message, making the statement "Pravda" (True) correct.

Submit
30. Multipurpose Internet Mail Extension (MIME) - telo spravy pozostava len z jednej casti

Explanation

The given statement is false. Multipurpose Internet Mail Extension (MIME) is a standard that allows email messages to contain multiple parts. These parts can include text, images, audio, video, or any other type of data. Each part is identified by a unique content type and can be encoded and decoded separately. Therefore, the statement that the message consists of only one part is incorrect.

Submit
31. Ktora z nasledujucich vlastnosti je nevyhoda standardu IEEE 802.1X

Explanation

The disadvantage of the IEEE 802.1X standard is that it only protects network access. This means that while it may prevent unauthorized individuals from accessing the network, it does not provide any additional security measures once a user is granted access. This can leave the network vulnerable to attacks or unauthorized activity once a user is authenticated.

Submit
32. Sifrovanie asymetrickou sifrou - pre overenie verejneho kluca sa pouziva CRL (Certificate Revocation List)

Explanation

Asymmetric encryption involves the use of a public key for verification. To ensure the validity of the public key, a Certificate Revocation List (CRL) is used. The CRL contains a list of revoked certificates, allowing entities to verify the authenticity and trustworthiness of the public key. Therefore, the statement "Sifrovanie asymetrickou sifrou - pre overenie verejneho kluca sa pouziva CRL (Certificate Revocation List)" is true.

Submit
33. SIP komponenty nekomunikuju navzajom vymenou sprav (signalizacia)

Explanation

This statement is false. SIP (Session Initiation Protocol) components do communicate with each other through the exchange of messages or signaling. SIP is a protocol used for initiating, modifying, and terminating real-time sessions involving video, voice, messaging, and other communications applications and services. The signaling messages are used to establish and control the sessions between the SIP components, allowing them to communicate with each other. Therefore, the correct answer is false.

Submit
34. Ktory protokol pouziva internetove DNS-based adresovanie - URL?

Explanation

The correct answer is SIP URI. SIP (Session Initiation Protocol) is a communication protocol used for initiating, modifying, and terminating interactive user sessions involving multimedia elements such as video, voice, instant messaging, and virtual reality. URI (Uniform Resource Identifier) is a string of characters that identifies a resource on the internet. In the context of DNS-based addressing, SIP URI is used to address and locate resources such as users, services, or devices in a SIP-based communication system.

Submit
35. RADIUS server sa pouziva na autentifikaciu pouzivatelov.

Explanation

A RADIUS server is used for authenticating users. It acts as a central authentication server that receives authentication requests from network devices, such as routers or switches, and validates the credentials provided by the users. It ensures that only authorized users can access the network resources by verifying their identity through various authentication methods, such as username and password, digital certificates, or token-based authentication. Therefore, the statement "RADIUS server sa pouziva na autentifikaciu pouzivatelov" is true.

Submit
36. RADIUS server sa pouziva na autentifikaciu pouzivatelov.

Explanation

The given statement is true. A RADIUS server is used for authentication of users. RADIUS (Remote Authentication Dial-In User Service) is a networking protocol that provides centralized authentication, authorization, and accounting management for users who connect and use a network service. It is commonly used in networks such as Wi-Fi, Virtual Private Networks (VPNs), and dial-up connections to authenticate users and grant them access based on their credentials.

Submit
37. Konvergencia IP sieti je integracia dat, hlasu, videa a pod.

Explanation

The statement is true because convergence of IP networks refers to the integration of various types of data, voice, video, and other forms of communication over a single network infrastructure. This integration allows for more efficient and cost-effective communication and sharing of resources.

Submit
38. Ktora z nasledujucich vlastnosti je nevyhoda standardu IEE 802.1X

Explanation

The correct answer is "Chrani len pristup k sieti" which means "It only protects network access" in English. This means that the disadvantage of the IEE 802.1X standard is that it only focuses on protecting network access and does not provide other security measures for the network. It does not provide protection for data transmission, network traffic, or other aspects of network security.

Submit
39. Protokol UDP je (vyberte 2) :

Explanation

The correct answer is "nespojovany, nespolahlivy" because UDP (User Datagram Protocol) is an unreliable and connectionless transport protocol. It does not provide any guarantees for the delivery or ordering of packets, making it suitable for applications that prioritize speed over reliability, such as real-time streaming or online gaming.

Submit
40. Polozka TTL v hlavicke IPv4 paketu znamena:

Explanation

The TTL (Time to Live) field in the IPv4 packet header represents the remaining time that a packet is allowed to exist in the network. It is decremented by each router that forwards the packet, and if it reaches zero, the packet is discarded. This mechanism prevents packets from circulating indefinitely in the network. Therefore, the correct answer is "Zivotnost paketu" which means "Packet lifetime" in English.

Submit
41. Standard protokolu SIP bol navrhnuty pre minimalnu skalovatelnost.

Explanation

The given statement is false. The SIP (Session Initiation Protocol) standard was designed specifically for its scalability. It allows for the establishment, modification, and termination of multimedia sessions, such as voice and video calls, over IP networks. SIP is highly scalable and can support a large number of users and devices, making it suitable for both small and large-scale deployments. Therefore, the correct answer is false.

Submit
42. Ako moze TCP server efektivne spracovat poziadavky viacerych klientov sucasne?

Explanation

The TCP server can effectively process requests from multiple clients simultaneously by either creating child processes for each client or by using multiple threads. By creating child processes for each client, the server can handle each client's request independently without interfering with other clients. Similarly, by using multiple threads, the server can allocate separate threads to handle each client's request concurrently, allowing for efficient processing of multiple clients at the same time.

Submit
43. SIP komponenty nekomunikuju navzajom vymenou sprav (signalizacia)

Explanation

This statement is false. SIP (Session Initiation Protocol) components do communicate with each other by exchanging messages or signaling. SIP is a protocol used for initiating, modifying, and terminating communication sessions between two or more participants. These sessions can include voice, video, messaging, and other communication applications. The signaling messages exchanged between SIP components allow them to establish and manage these sessions. Therefore, the correct answer is false.

Submit
44. Protokol TCP vnima udaje z aplikacnej vrstvy len ako prud bajtov bez vnutornej struktury

Explanation

The statement is true because the Transmission Control Protocol (TCP) is a transport layer protocol that treats data from the application layer as a stream of bytes without any internal structure. TCP is responsible for breaking down the stream of bytes into packets, ensuring reliable delivery, and reassembling them at the receiving end. It does not interpret or manipulate the data based on its internal structure, such as headers or formatting. TCP's main focus is on the efficient and reliable transmission of the byte stream between the sender and receiver.

Submit
45. Pri asymetrickom sifrovani vlastnik sukromneho kluca nedesifruje spravu

Explanation

In asymmetric encryption, the owner of the private key is actually able to decrypt the message. This is because asymmetric encryption uses a pair of keys - a public key for encryption and a private key for decryption. The public key is used by anyone who wants to send an encrypted message to the owner of the private key. Therefore, the statement "the owner of the private key does not decrypt the message" is false.

Submit
46. Standard protokolu SIP bol navrhnuty pre minimalnu skalovatelnost.

Explanation

The statement is false. The SIP protocol was designed specifically for its scalability. It allows for easy addition of new users and devices without causing disruptions or performance issues. Therefore, the correct answer is false.

Submit
47. Adresu siete v protokole IP je:

Explanation

The correct answer is "Najnizsia adresa s danym predcislim." This means that the network address in the IP protocol is the lowest address with a given prefix. In IP addressing, the network address is used to identify the network to which a device belongs. It is obtained by setting all host bits to 0 in the IP address. The lowest address with a given prefix is the one where all host bits are set to 0, indicating the network address.

Submit
48. Pri prenose hlasu v IP sieti sa uprednostnuje transportny protokol TCP pred UDP.

Explanation

Pri prenose hlasu v IP sieti sa uprednostňuje transportný protokol UDP pred TCP. UDP je vhodnejší pre prenos hlasu, pretože je rýchlejší a menej spoľahlivý. Pri prenose hlasu je dôležité, aby pakety dorazili v čo najkratšom čase, a nie je tak dôležité, či všetky pakety dorazili v správnom poradí. TCP je spoľahlivejší protokol, ktorý kontroluje doručenie paketov a ich poradie, čo môže spôsobiť oneskorenie a zvýšiť oneskorenie pri prenose hlasu.

Submit
49. Viacbajtove hodnoty (napr. IP adresa a port v prislusnych hlavickach) prenesene cez siet a precitane zo socketu na lokalnej stanici pouzivaju poradie bajtov zname ako:

Explanation

The correct answer is Big-endian. Big-endian is a byte order in which the most significant byte is stored first and the least significant byte is stored last. In this byte order, the higher-order bytes are stored at lower memory addresses. This is commonly used in network protocols such as TCP/IP.

Submit
50. Pri asymetrickom sifrovani vlastnik sukromneho kluca nedesifruje spravu

Explanation

In asymmetric encryption, the owner of the private key is able to decrypt the message. This means that the statement "Pri asymetrickom sifrovani vlastnik sukromneho kluca nedesifruje spravu" (In asymmetric encryption, the owner of the private key does not decrypt the message) is false. The correct answer is "Nepravda" (False).

Submit
51. Multipurpose Internet Mail Extension (MIME) - telo spravy pozostava len z jednej casti

Explanation

The given statement "Multipurpose Internet Mail Extension (MIME) - telo spravy pozostava len z jednej casti" is false. MIME allows for the transmission of multiple parts within a single message. It enables the inclusion of various types of content, such as text, images, audio, and video, within an email or other internet communication. This feature allows for more versatile and interactive communication by supporting multimedia elements in messages.

Submit
52. Pri prenose hlasu v IP sieti sa uprednostnuje transportny protokol TCP pred UDP.

Explanation

The statement is false. When it comes to voice transmission in an IP network, the UDP (User Datagram Protocol) is preferred over TCP (Transmission Control Protocol). This is because UDP is a connectionless protocol that provides faster transmission with lower latency, which is crucial for real-time applications like voice communication. TCP, on the other hand, is a reliable protocol that ensures data delivery but introduces more overhead and potential delays, making it less suitable for time-sensitive applications like voice transmission.

Submit
53. Takzvane "Actuators" v IoT spracovavaju udaje z prostredia

Explanation

Actuators in IoT do not process data from the environment. They are devices that are responsible for taking action based on the instructions received from the IoT system. They are used to control or manipulate physical objects or systems in the environment. Therefore, the statement "Actuators in IoT process data from the environment" is false.

Submit
54. Ktory protokol sa pouziva pri zakladani interaktivnej RTC relacie?

Explanation

The correct answer is Session Initiation Protocol (SIP). SIP is a signaling protocol used for initiating, modifying, and terminating real-time sessions that involve video, voice, messaging, and other communication applications and services. It is widely used for establishing interactive RTC (Real-Time Communication) sessions, such as voice and video calls, instant messaging, and online meetings. SIP allows users to connect and communicate with each other over the internet or other IP networks, enabling real-time communication and collaboration.

Submit
55. Takzvane "Actuators" v IoT spracovavaju udaje z prostredia:

Explanation

The given statement is false. Actuators in IoT do not process data from the environment. Instead, they are devices that convert electrical signals into physical actions or movements, such as opening or closing a valve, turning on or off a motor, or adjusting the position of a robotic arm. Actuators are controlled by data or commands received from sensors or other devices in the IoT system, but they do not process data themselves.

Submit
56. S/MIME ponuka (vyberte 2):

Explanation

The correct answer is "Nepopieratelnost povodu" and "Autentifikaciu". These two options refer to the features of S/MIME (Secure/Multipurpose Internet Mail Extensions). "Nepopieratelnost povodu" means non-repudiation, which ensures that the sender cannot deny sending a message. "Autentifikaciu" refers to authentication, which verifies the identity of the sender and ensures that the message has not been tampered with. These two features are important for secure and trustworthy email communication.

Submit
57. Standardna velkost IPv4 hlavicky je:

Explanation

The standard size of an IPv4 header is 20 bytes. The IPv4 header contains important information such as the source and destination IP addresses, protocol version, type of service, and other control flags. This header is added to the data packet to facilitate routing and delivery of the packet across the internet. The 20-byte size is fixed and does not include any additional options or extensions that may be present in some packets.

Submit
58. Socket umoznuje komunikaciu len v jednom smere, t. j. pre obojsmernu komunikaciu potrebujeme na kazdej koncovej stanici vytvorit az dva sockety.

Explanation

Socket umožňuje komunikáciu v oboch smeroch, teda obojsmernú komunikáciu. Pre obojsmernú komunikáciu je potrebný iba jeden socket na každej koncovej stanici.

Submit
59. S/MIME ponuka (vyberte 2):

Explanation

The correct answer is "Nepopieratelnost povodu" and "Autentifikaciu". These options refer to two important features of S/MIME (Secure/Multipurpose Internet Mail Extensions) - non-repudiation of origin and authentication. "Nepopieratelnost povodu" ensures that the sender cannot deny sending a message, as it provides proof of the message's origin. "Autentifikaciu" refers to the process of verifying the identity of the sender, ensuring that the message comes from the claimed source. These two features are crucial for maintaining the integrity and security of email communication.

Submit
60. Protokol TCP poskytuje techniku posuvneho okna.

Explanation

The statement is true because the TCP protocol does indeed provide a technique called sliding window. This technique allows for efficient and reliable data transmission by allowing the sender to transmit multiple packets without waiting for an acknowledgment for each packet. The receiver can then acknowledge multiple packets at once, reducing the overhead and improving the overall throughput of the communication.

Submit
61. Protokol TCP nadvazuje spojenie prostrednictvom:

Explanation

The correct answer is 3-Way Handshake (SYN, SYN-ACK, ACK). The 3-Way Handshake is a method used by TCP (Transmission Control Protocol) to establish a connection between a client and a server. It involves three steps: the client sends a SYN (synchronize) packet to the server, the server responds with a SYN-ACK (synchronize-acknowledge) packet, and finally, the client sends an ACK (acknowledge) packet to confirm the connection. This process ensures that both the client and server are ready to exchange data and establishes a reliable connection.

Submit
62. Koniec prenosu protokolu TCP je realizovany prostrednictvom:

Explanation

The correct answer is 2-Way Handshake. In a 2-Way Handshake, the client sends a SYN (synchronize) packet to the server, and the server responds with a SYN-ACK (synchronize-acknowledgment) packet. This establishes a connection between the client and server. In contrast, a 3-Way Handshake involves an additional ACK (acknowledgment) packet from the client to the server, confirming the receipt of the SYN-ACK packet. However, in TCP, the end of the transmission does not require this additional step, making the 2-Way Handshake sufficient.

Submit
63. Informacie poskytovane v SDP (Session Description Protocol) su (vyberte 2)

Explanation

The correct answer is "Popis a poziadavky spojenia" and "Smerovacie informacie". The Session Description Protocol (SDP) provides information about the description and requirements of a session, including the media type, codec, and network addresses. It also includes routing information, such as the IP addresses and ports to establish the connection. Therefore, SDP provides both the description and connection requirements as well as routing information for the session.

Submit
64. Ktore su zakladne vlastnosti socketu? (vyberte 2)

Explanation

The two basic properties of a socket are that it is local (only for the specific station where it was created) and it is created at the request of the end application.

Submit
65. Ktore su zakladne vlastnosti socketu? (Vyberte dve)

Explanation

The basic properties of a socket are that it is created at the request of the end application and it is local, meaning it is only available on the specific station where it was created. Sockets are not shared between stations and are not created by the operating system.

Submit
66. Ktore typy cloud serverov vyzaduje IoE?

Explanation

The IoE (Internet of Everything) refers to the network of connected devices, sensors, and systems that enables data exchange and communication. To support IoE, different types of cloud servers are required. Private, public, community, and hybrid cloud servers are all necessary for IoE as they provide different levels of access, security, and collaboration options. Private cloud servers are dedicated to a single organization, public cloud servers are accessible to the general public, community cloud servers are shared among a specific group of organizations, and hybrid cloud servers combine both private and public cloud infrastructure.

Submit
67. HTTP Digest autentifikacia obsahuje plaintext heslo

Explanation

The statement in the question is in Slovak language and it translates to "HTTP Digest authentication contains plaintext password." The correct answer is "Nepravda" which means "False" in English. This means that the statement is incorrect. In HTTP Digest authentication, the password is not transmitted in plaintext. Instead, it is hashed or encrypted before being sent over the network, providing a higher level of security compared to plaintext passwords.

Submit
68. Session Initiaion Protocol (SIP) pracuje na transportnej vrstve

Explanation

SIP (Session Initiation Protocol) does not work at the transport layer. It is an application layer protocol used for initiating, modifying, and terminating real-time sessions involving video, voice, messaging, and other communications applications and services. The transport layer is responsible for the reliable delivery of data between hosts, while SIP operates at a higher layer to establish and manage communication sessions. Therefore, the statement "SIP pracuje na transportnej vrstve" (SIP works at the transport layer) is incorrect.

Submit
69. Vyberte 4 zakladne elementy IoE (Internet of Everything)

Explanation

The correct answer includes the elements "Veci" (Things), "Ludia" (People), "Data" (Data), and "Procesy" (Processes). These four elements are considered the basic components of the Internet of Everything (IoE) concept. IoE involves connecting not only devices and machines but also people and processes to create a network of interconnected systems that can exchange data and information. These elements form the foundation of IoE and enable the seamless integration and communication between various entities in the network.

Submit
70. Informacie poskytovane v SDP (Session Description Protocol) su (vyberte 2):

Explanation

The correct answer is "Popis a poziadavky spojenia" and "Smerovacie informacie". SDP (Session Description Protocol) provides information about the description and requirements of a communication session, such as the media type, codecs, and network addresses. It also includes routing information for the session, such as the IP addresses and ports to be used. Therefore, "Popis a poziadavky spojenia" and "Smerovacie informacie" are the correct options as they accurately describe the information provided by SDP.

Submit
71. Ktore z nasledujucich zariadeni su urcene pre vyvoj v IoT (vyberte 3):

Explanation

The Beaglebone, Arduino, and Raspberry Pi are all devices that are designed for development in the Internet of Things (IoT) field. These devices provide the necessary hardware and software capabilities for prototyping and building IoT applications. The Intel Celeron, Actuators, and Kickstarter are not specifically designed for IoT development.

Submit
72. Nevyhody S/MIME su (vyberte 2):

Explanation

The correct answer is "Niektore protokoly musia pouzit 'workaround'" and "Ziskanie certifikatu". This means that some protocols require a workaround to be used with S/MIME, and obtaining a certificate can be a disadvantage of using S/MIME.

Submit
73. Dlzka prefixu v protokole IP je:

Explanation

The correct answer is "Skrateny tvar zapisu sietovej masky" which translates to "Shortened form of network mask notation." In IP networking, the network mask is used to determine the network portion of an IP address. The shortened form of network mask notation is commonly used, where the network mask is represented by a series of consecutive 1s followed by consecutive 0s. This notation helps to simplify and condense the representation of the network mask, making it easier to read and understand.

Submit
74. Typicka SIP architektura obsahuje komponenty (vyberte 2):

Explanation

The typical SIP architecture includes two components: User Agent (UA) and SIP Servers. User Agent (UA) is responsible for initiating and receiving SIP requests and can be either a softphone or a hardware device. SIP Servers, on the other hand, handle call routing, registration, and other SIP-related functionalities. They can be further categorized into different types such as Proxy Servers, Registrar Servers, and Redirect Servers. The other options mentioned, SIP HTML, Localization Database, and SIP Firewall, are not typically considered as components of a SIP architecture.

Submit
75. Session Initiation Protocol (SIP) pracuje na transportnej vrstve

Explanation

The statement "Session Initiation Protocol (SIP) pracuje na transportnej vrstve" is incorrect. SIP works at the application layer of the OSI model, not the transport layer. The transport layer is responsible for the reliable delivery of data between hosts, while SIP is a signaling protocol used for initiating, modifying, and terminating real-time sessions between participants over IP networks.

Submit
76. Ktore kroky musi vykonat len TCP server pre zabezpecenie uspesnej komunikacie? (vyberte 2 )

Explanation

To ensure successful communication, a TCP server must perform the following steps: listening on a port and accepting incoming connections. These steps are necessary for the server to be able to receive and accept incoming communication requests from clients. By listening on a specific port, the server can receive incoming connection requests, and by accepting those requests, it can establish a successful communication channel with the client.

Submit
77. Nevyhody S/MIME su (vyberte2) :

Explanation

The disadvantages of S/MIME are the need to obtain a certificate and the requirement to use "workarounds" for certain protocols. Obtaining a certificate can be a time-consuming process that involves verifying the identity of the sender. Additionally, some protocols may not fully support S/MIME, requiring the use of workarounds to ensure compatibility.

Submit
78. Vyhodou IoT je jednoducha aktualizacia Firmwaru zariadenia

Explanation

The statement says "Vyhodou IoT je jednoducha aktualizacia Firmwaru zariadenia" which translates to "An advantage of IoT is the easy firmware update of the device." The correct answer is "Nepravda" which means "False." Therefore, the correct explanation is that it is not true that an advantage of IoT is the easy firmware update of the device.

Submit
79. Ktory sifrovaci mechanizmus je znazorneny na obrazku?

Explanation

The correct answer is TLS. TLS (Transport Layer Security) is a cryptographic protocol that provides secure communication over a network. It is commonly used to secure web traffic and ensure the confidentiality and integrity of data transmitted between clients and servers. The other options, S/MIME, Elektricky podpis, and PKI, are also related to encryption and digital signatures, but they are not specifically depicted in the image.

Submit
80. Ake su typy SIP URI (SIP Unified Resource Identifier) (vyberte 3):

Explanation

The correct answer is Globally Routable UA URIs (GRUU), Address of Record (AOR), and Fully Qualified Domain Name (FQDN). These three types of SIP URIs are commonly used in SIP communication. GRUU is used to identify a specific User Agent (UA) and allows for routing of SIP messages globally. AOR represents the address of a specific user or device within a domain. FQDN is a domain name that is completely specified and can be resolved to an IP address.

Submit
81. Vyberte zakladne SIP metody (vyberte 2) :

Explanation

The correct answer is INVITE and REGISTER. These are the two basic SIP methods used in VoIP communication. INVITE is used to initiate a session between two parties, while REGISTER is used to register a user's location and contact information with a SIP server. The other options, DEFAULT, REQUEST, and DENY, are not valid SIP methods.

Submit
82. Adresny system protokolu SIP je postaveny na (vyberte 2):

Explanation

The correct answers for this question are DNS protokole and Zazname, ktory je podobny email adrese. The SIP protocol's addressing system is built on DNS (Domain Name System) protocol, which is used to translate domain names into IP addresses. Additionally, a SIP address is similar to an email address, as it consists of a username and a domain name. Therefore, the second correct answer is Zazname, ktory je podobny email adrese.

Submit
83. TCP protokol definuje jasne hranice medzi susednymi spravami, takze aplikacia nemusi riesit znacky pre odlisenie hranic medzi spravami.

Explanation

The given statement is false. The TCP protocol does not define clear boundaries between adjacent messages, so the application needs to handle delimiters or markers to differentiate between messages.

Submit
84. HTTP Digest autentifikacia pouziva spravy (vyberte 3):

Explanation

HTTP Digest authentication uses three types of messages: Forbidden, Proxy Authentication Required, and Unauthorized. The Forbidden message is sent when the server denies access to the requested resource. The Proxy Authentication Required message is sent when the client needs to authenticate itself to a proxy server. The Unauthorized message is sent when the client needs to provide valid credentials for authentication.

Submit
View My Results

Quiz Review Timeline (Updated): Jul 22, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jul 22, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 17, 2017
    Quiz Created by
    Lenka
Cancel
  • All
    All (84)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Socket je pouzitelny len v pripade programovacieho jazyka C formou...
Socket mozeme pouzivat vyhradne v OS Linux.
Socket je pouzitelny len v pripade programovacieho jazyka C formou...
Trend IoT prinasa so sebou nove bezpecnostne hrozby
Ktore aplikacne modely (architektury) z pohladu vzajomnej komunikacie...
Funkcia senzora v IoT :
Broadcastova poziadavka protokolu ARP (ARP Query) sa posiela s...
Protokol TCP je
Trend IoT prinasa so sebou nove bezpecnostne hrozby.
Funkcia senzora v IoT je 
Jedno z rieseni pre velko-objemove streamovanie ulozeneho videa je CDN...
Startovaci riadok hlavicky SIP dotazu je tvoreny: meno metody + tzv....
Protokol TCP je (vyberte 2):
Ktore protokoly transportnej vrstvy mozeme pouzit pri vytvoreni a...
Protokol SIP umoznuje aby si sami koncovi pouzivatelia programovali...
Startovaci riadok hlavicky SIP dotazu je tvoreny : meno metody + tzv....
Transportny port cislo 22 patri do kategorie portov:
Protokol SIP umoznuje, aby si sami koncovi pouzivatelia programovali...
Ktore prvky musia mat aplikacie rovnake, aby mohli navzajom uspesne...
Ktora z nasledujucich vlastnosti je nevyhoda standardu IEEE 802.1X
Ktore prvky musia mat aplikacie rovnake, aby mohli navzajom uspesne...
Aky je rozdiel medzi Fog computing a Cloud computing?
Ktore protokoly transportnej vrstvy mozeme pouzit pri vytvoreni a...
Sifrovanie asymetrickou sifrou - pre overenie verejneho kluca sa...
Protokol TCP vnima udaje z aplikacnej vrstvy len ako prud bajtov bez...
Protokol SIP je signalizacny protokol. 
Konvergencia IP sieti znamena:
Protokoly sietovej vrstvy modelu OSI su? (vyberte dve)
S/MIME ponuka jednoznacne urcenie povodu
Multipurpose Internet Mail Extension (MIME) - telo spravy pozostava...
Ktora z nasledujucich vlastnosti je nevyhoda standardu IEEE 802.1X
Sifrovanie asymetrickou sifrou - pre overenie verejneho kluca sa...
SIP komponenty nekomunikuju navzajom vymenou sprav (signalizacia)
Ktory protokol pouziva internetove DNS-based adresovanie - URL?
RADIUS server sa pouziva na autentifikaciu pouzivatelov.
RADIUS server sa pouziva na autentifikaciu pouzivatelov.
Konvergencia IP sieti je integracia dat, hlasu, videa a pod.
Ktora z nasledujucich vlastnosti je nevyhoda standardu IEE 802.1X
Protokol UDP je (vyberte 2) :
Polozka TTL v hlavicke IPv4 paketu znamena:
Standard protokolu SIP bol navrhnuty pre minimalnu skalovatelnost.
Ako moze TCP server efektivne spracovat poziadavky viacerych klientov...
SIP komponenty nekomunikuju navzajom vymenou sprav (signalizacia)
Protokol TCP vnima udaje z aplikacnej vrstvy len ako prud bajtov bez...
Pri asymetrickom sifrovani vlastnik sukromneho kluca nedesifruje...
Standard protokolu SIP bol navrhnuty pre minimalnu skalovatelnost.
Adresu siete v protokole IP je:
Pri prenose hlasu v IP sieti sa uprednostnuje transportny protokol TCP...
Viacbajtove hodnoty (napr. IP adresa a port v prislusnych hlavickach)...
Pri asymetrickom sifrovani vlastnik sukromneho kluca nedesifruje...
Multipurpose Internet Mail Extension (MIME) - telo spravy pozostava...
Pri prenose hlasu v IP sieti sa uprednostnuje transportny protokol TCP...
Takzvane "Actuators" v IoT spracovavaju udaje z prostredia
Ktory protokol sa pouziva pri zakladani interaktivnej RTC relacie?
Takzvane "Actuators" v IoT spracovavaju udaje z prostredia:
S/MIME ponuka (vyberte 2):
Standardna velkost IPv4 hlavicky je:
Socket umoznuje komunikaciu len v jednom smere, t. j. pre obojsmernu...
S/MIME ponuka (vyberte 2):
Protokol TCP poskytuje techniku posuvneho okna.
Protokol TCP nadvazuje spojenie prostrednictvom:
Koniec prenosu protokolu TCP je realizovany prostrednictvom:
Informacie poskytovane v SDP (Session Description Protocol) su...
Ktore su zakladne vlastnosti socketu? (vyberte 2)
Ktore su zakladne vlastnosti socketu? (Vyberte dve)
Ktore typy cloud serverov vyzaduje IoE?
HTTP Digest autentifikacia obsahuje plaintext heslo
Session Initiaion Protocol (SIP) pracuje na transportnej vrstve
Vyberte 4 zakladne elementy IoE (Internet of Everything)
Informacie poskytovane v SDP (Session Description Protocol) su...
Ktore z nasledujucich zariadeni su urcene pre vyvoj v IoT (vyberte 3):
Nevyhody S/MIME su (vyberte 2):
Dlzka prefixu v protokole IP je:
Typicka SIP architektura obsahuje komponenty (vyberte 2):
Session Initiation Protocol (SIP) pracuje na transportnej vrstve
Ktore kroky musi vykonat len TCP server pre zabezpecenie uspesnej...
Nevyhody S/MIME su (vyberte2) :
Vyhodou IoT je jednoducha aktualizacia Firmwaru zariadenia
Ktory sifrovaci mechanizmus je znazorneny na obrazku?
Ake su typy SIP URI (SIP Unified Resource Identifier) (vyberte 3):
Vyberte zakladne SIP metody (vyberte 2) :
Adresny system protokolu SIP je postaveny na (vyberte 2):
TCP protokol definuje jasne hranice medzi susednymi spravami, takze...
HTTP Digest autentifikacia pouziva spravy (vyberte 3):
Alert!

Advertisement