Skuska Kt 2 (Otazky Z Testov Zo Semestra)

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Lenka
L
Lenka
Community Contributor
Quizzes Created: 1 | Total Attempts: 446
Questions: 84 | Attempts: 446

SettingsSettingsSettings
Skuska Kt 2 (Otazky Z Testov Zo Semestra) - Quiz

.


Questions and Answers
  • 1. 

    Broadcastova poziadavka protokolu ARP (ARP Query) sa posiela s cielovou adresou:

    • A.

      CC-CC-CC-CC-CC

    • B.

      AA-AA-AA-AA-AA

    • C.

      FF-FF-FF-FF-FF-FF

    Correct Answer
    C. FF-FF-FF-FF-FF-FF
    Explanation
    The correct answer is FF-FF-FF-FF-FF-FF. This is the broadcast address in Ethernet, which means that the ARP query is sent to all devices on the network. When a device receives this broadcast, it will check if the target IP address in the ARP query matches its own IP address. If it does, the device will respond with its MAC address. By using the broadcast address, the ARP query ensures that all devices on the network receive the request and have the opportunity to respond.

    Rate this question:

  • 2. 

    Polozka TTL v hlavicke IPv4 paketu znamena:

    • A.

      Priorita paketu

    • B.

      Zivotnost paketu

    • C.

      Ciel paketu

    • D.

      Zdroj paketu

    Correct Answer
    B. Zivotnost paketu
    Explanation
    The TTL (Time to Live) field in the IPv4 packet header represents the remaining time that a packet is allowed to exist in the network. It is decremented by each router that forwards the packet, and if it reaches zero, the packet is discarded. This mechanism prevents packets from circulating indefinitely in the network. Therefore, the correct answer is "Zivotnost paketu" which means "Packet lifetime" in English.

    Rate this question:

  • 3. 

    Standardna velkost IPv4 hlavicky je:

    • A.

      22B

    • B.

      21B

    • C.

      40B

    • D.

      20B

    Correct Answer
    D. 20B
    Explanation
    The standard size of an IPv4 header is 20 bytes. The IPv4 header contains important information such as the source and destination IP addresses, protocol version, type of service, and other control flags. This header is added to the data packet to facilitate routing and delivery of the packet across the internet. The 20-byte size is fixed and does not include any additional options or extensions that may be present in some packets.

    Rate this question:

  • 4. 

    Adresu siete v protokole IP je:

    • A.

      Kazda ina adresa s danym predcislim

    • B.

      Najvyssia adresa s danym predcislim

    • C.

      Najnizsia adresa s danym predcislim

    Correct Answer
    C. Najnizsia adresa s danym predcislim
    Explanation
    The correct answer is "Najnizsia adresa s danym predcislim." This means that the network address in the IP protocol is the lowest address with a given prefix. In IP addressing, the network address is used to identify the network to which a device belongs. It is obtained by setting all host bits to 0 in the IP address. The lowest address with a given prefix is the one where all host bits are set to 0, indicating the network address.

    Rate this question:

  • 5. 

    Protokoly sietovej vrstvy modelu OSI su? (vyberte dve)

    • A.

      ISL

    • B.

      DNS

    • C.

      IPv6

    • D.

      HTTP

    • E.

      IPv4

    Correct Answer(s)
    C. IPv6
    E. IPv4
    Explanation
    The correct answer is IPv6 and IPv4. These protocols belong to the network layer of the OSI model. IPv6 is the latest version of the Internet Protocol, which provides an expanded address space and improved security features compared to IPv4. IPv4 is the most widely used version of the Internet Protocol, which uses 32-bit addresses and is responsible for the routing and addressing of packets within a network. ISL, DNS, and HTTP are protocols that operate at different layers of the OSI model, not specifically at the network layer.

    Rate this question:

  • 6. 

    Pri prenose hlasu v IP sieti sa uprednostnuje transportny protokol TCP pred UDP.

    • A.

      Pravda

    • B.

      Nepravda

    Correct Answer
    B. Nepravda
    Explanation
    Pri prenose hlasu v IP sieti sa uprednostňuje transportný protokol UDP pred TCP. UDP je vhodnejší pre prenos hlasu, pretože je rýchlejší a menej spoľahlivý. Pri prenose hlasu je dôležité, aby pakety dorazili v čo najkratšom čase, a nie je tak dôležité, či všetky pakety dorazili v správnom poradí. TCP je spoľahlivejší protokol, ktorý kontroluje doručenie paketov a ich poradie, čo môže spôsobiť oneskorenie a zvýšiť oneskorenie pri prenose hlasu.

    Rate this question:

  • 7. 

    RADIUS server sa pouziva na autentifikaciu pouzivatelov.

    • A.

      Pravda

    • B.

      Nepravda

    Correct Answer
    A. Pravda
    Explanation
    A RADIUS server is used for authenticating users. It acts as a central authentication server that receives authentication requests from network devices, such as routers or switches, and validates the credentials provided by the users. It ensures that only authorized users can access the network resources by verifying their identity through various authentication methods, such as username and password, digital certificates, or token-based authentication. Therefore, the statement "RADIUS server sa pouziva na autentifikaciu pouzivatelov" is true.

    Rate this question:

  • 8. 

    Protokol SIP umoznuje, aby si sami koncovi pouzivatelia programovali funkcie danej sluzby bez potreby zasahu zo strany operatora.

    • A.

      Pravda

    • B.

      Nepravda

    Correct Answer
    A. Pravda
    Explanation
    The statement is true because the SIP protocol allows end users to program the functions of a service themselves, without needing any intervention from the operator. This means that users have the flexibility to customize and personalize their experience with the service according to their own preferences and needs.

    Rate this question:

  • 9. 

    Standard protokolu SIP bol navrhnuty pre minimalnu skalovatelnost.

    • A.

      Pravda

    • B.

      Nepravda

    Correct Answer
    B. Nepravda
    Explanation
    The given statement is false. The SIP (Session Initiation Protocol) standard was designed specifically for its scalability. It allows for the establishment, modification, and termination of multimedia sessions, such as voice and video calls, over IP networks. SIP is highly scalable and can support a large number of users and devices, making it suitable for both small and large-scale deployments. Therefore, the correct answer is false.

    Rate this question:

  • 10. 

    Startovaci riadok hlavicky SIP dotazu je tvoreny: meno metody + tzv. "Request URI" (SIP adresa pouzivatela alebo sluzby) + cislo verzie SIP protokolu

    • A.

      Pravda

    • B.

      Nepravda

    Correct Answer
    A. Pravda
    Explanation
    The starting line of the SIP request header consists of the method name, the "Request URI" (SIP address of the user or service), and the version number of the SIP protocol. This statement is true because the SIP request header follows a specific format which includes these elements.

    Rate this question:

  • 11. 

    Ktory protokol sa pouziva pri zakladani interaktivnej RTC relacie?

    • A.

      Session Initiation Protocol (SIP)

    • B.

      MPEG2

    • C.

      ARP (Address Resolution Protocol)

    • D.

      H.248

    Correct Answer
    A. Session Initiation Protocol (SIP)
    Explanation
    The correct answer is Session Initiation Protocol (SIP). SIP is a signaling protocol used for initiating, modifying, and terminating real-time sessions that involve video, voice, messaging, and other communication applications and services. It is widely used for establishing interactive RTC (Real-Time Communication) sessions, such as voice and video calls, instant messaging, and online meetings. SIP allows users to connect and communicate with each other over the internet or other IP networks, enabling real-time communication and collaboration.

    Rate this question:

  • 12. 

    Informacie poskytovane v SDP (Session Description Protocol) su (vyberte 2)

    • A.

      Multimedialne data

    • B.

      Preferovana cesta

    • C.

      Ochranne informacie

    • D.

      Popis a poziadavky spojenia

    • E.

      Smerovacie informacie

    Correct Answer(s)
    D. Popis a poziadavky spojenia
    E. Smerovacie informacie
    Explanation
    The correct answer is "Popis a poziadavky spojenia" and "Smerovacie informacie". The Session Description Protocol (SDP) provides information about the description and requirements of a session, including the media type, codec, and network addresses. It also includes routing information, such as the IP addresses and ports to establish the connection. Therefore, SDP provides both the description and connection requirements as well as routing information for the session.

    Rate this question:

  • 13. 

    Adresny system protokolu SIP je postaveny na (vyberte 2):

    • A.

      SRTP protokole

    • B.

      DNS protokole

    • C.

      SIP UPI

    • D.

      DMS protokole

    • E.

      Zazname, ktory je podobny email adrese

    Correct Answer(s)
    B. DNS protokole
    E. Zazname, ktory je podobny email adrese
    Explanation
    The correct answers for this question are DNS protokole and Zazname, ktory je podobny email adrese. The SIP protocol's addressing system is built on DNS (Domain Name System) protocol, which is used to translate domain names into IP addresses. Additionally, a SIP address is similar to an email address, as it consists of a username and a domain name. Therefore, the second correct answer is Zazname, ktory je podobny email adrese.

    Rate this question:

  • 14. 

    Session Initiaion Protocol (SIP) pracuje na transportnej vrstve

    • A.

      Pravda

    • B.

      Nepravda

    Correct Answer
    B. Nepravda
    Explanation
    SIP (Session Initiation Protocol) does not work at the transport layer. It is an application layer protocol used for initiating, modifying, and terminating real-time sessions involving video, voice, messaging, and other communications applications and services. The transport layer is responsible for the reliable delivery of data between hosts, while SIP operates at a higher layer to establish and manage communication sessions. Therefore, the statement "SIP pracuje na transportnej vrstve" (SIP works at the transport layer) is incorrect.

    Rate this question:

  • 15. 

    SIP komponenty nekomunikuju navzajom vymenou sprav (signalizacia)

    • A.

      Pravda

    • B.

      Nepravda

    Correct Answer
    B. Nepravda
    Explanation
    This statement is false. SIP (Session Initiation Protocol) components do communicate with each other by exchanging messages or signaling. SIP is a protocol used for initiating, modifying, and terminating communication sessions between two or more participants. These sessions can include voice, video, messaging, and other communication applications. The signaling messages exchanged between SIP components allow them to establish and manage these sessions. Therefore, the correct answer is false.

    Rate this question:

  • 16. 

    Typicka SIP architektura obsahuje komponenty (vyberte 2):

    • A.

      User Agent (UA)

    • B.

      SIP Servery

    • C.

      SIP HTML

    • D.

      Lokalizacna databaza

    • E.

      SIP Firewall

    Correct Answer(s)
    A. User Agent (UA)
    B. SIP Servery
    Explanation
    The typical SIP architecture includes two components: User Agent (UA) and SIP Servers. User Agent (UA) is responsible for initiating and receiving SIP requests and can be either a softphone or a hardware device. SIP Servers, on the other hand, handle call routing, registration, and other SIP-related functionalities. They can be further categorized into different types such as Proxy Servers, Registrar Servers, and Redirect Servers. The other options mentioned, SIP HTML, Localization Database, and SIP Firewall, are not typically considered as components of a SIP architecture.

    Rate this question:

  • 17. 

    Vyberte zakladne SIP metody (vyberte 2) :

    • A.

      DEFAULT

    • B.

      REQUEST

    • C.

      INVITE

    • D.

      DENY

    • E.

      REGISTER

    Correct Answer(s)
    C. INVITE
    E. REGISTER
    Explanation
    The correct answer is INVITE and REGISTER. These are the two basic SIP methods used in VoIP communication. INVITE is used to initiate a session between two parties, while REGISTER is used to register a user's location and contact information with a SIP server. The other options, DEFAULT, REQUEST, and DENY, are not valid SIP methods.

    Rate this question:

  • 18. 

    Ktore prvky musia mat aplikacie rovnake, aby mohli navzajom uspesne komunikovat cez sockety?

    • A.

      Transportny protokol

    • B.

      Aplikacny protokol

    • C.

      Operacny system

    • D.

      Programovaci jazyk

    Correct Answer(s)
    A. Transportny protokol
    B. Aplikacny protokol
    Explanation
    In order for applications to communicate successfully through sockets, they must have the same transport protocol and application protocol. The transport protocol determines how data is transmitted over the network, while the application protocol defines the rules and formats for communication between applications. The operating system and programming language used by the applications do not necessarily need to be the same for successful communication.

    Rate this question:

  • 19. 

    Socket je pouzitelny len v pripade programovacieho jazyka C formou dostupnych aplikacnych kniznic.

    • A.

      Pravda

    • B.

      Nepravda

    Correct Answer
    B. Nepravda
    Explanation
    The statement is false. A socket is not limited to the C programming language. It is a programming concept that is available in various programming languages, including C, C++, Java, Python, and more. Sockets allow communication between different processes or machines over a network.

    Rate this question:

  • 20. 

    Socket umoznuje komunikaciu len v jednom smere, t. j. pre obojsmernu komunikaciu potrebujeme na kazdej koncovej stanici vytvorit az dva sockety.

    • A.

      Pravda

    • B.

      Nepravda

    Correct Answer
    B. Nepravda
    Explanation
    Socket umožňuje komunikáciu v oboch smeroch, teda obojsmernú komunikáciu. Pre obojsmernú komunikáciu je potrebný iba jeden socket na každej koncovej stanici.

    Rate this question:

  • 21. 

    Ktore su zakladne vlastnosti socketu? (Vyberte dve)

    • A.

      Vytvoreny prami na podnet OS

    • B.

      Zdielany medzi stanicami

    • C.

      Vytvoreny na podnet koncovej aplikacie

    • D.

      Lokalny (len pre danu stanicu, kde vznikol)

    Correct Answer(s)
    C. Vytvoreny na podnet koncovej aplikacie
    D. Lokalny (len pre danu stanicu, kde vznikol)
    Explanation
    The basic properties of a socket are that it is created at the request of the end application and it is local, meaning it is only available on the specific station where it was created. Sockets are not shared between stations and are not created by the operating system.

    Rate this question:

  • 22. 

    Viacbajtove hodnoty (napr. IP adresa a port v prislusnych hlavickach) prenesene cez siet a precitane zo socketu na lokalnej stanici pouzivaju poradie bajtov zname ako:

    • A.

      Little-endian

    • B.

      Direct-endian

    • C.

      Reverse-endian

    • D.

      Big-endian

    Correct Answer
    D. Big-endian
    Explanation
    The correct answer is Big-endian. Big-endian is a byte order in which the most significant byte is stored first and the least significant byte is stored last. In this byte order, the higher-order bytes are stored at lower memory addresses. This is commonly used in network protocols such as TCP/IP.

    Rate this question:

  • 23. 

    Ktore protokoly transportnej vrstvy mozeme pouzit pri vytvoreni a pouzivani socketu?

    • A.

      HTTP

    • B.

      UDP

    • C.

      TCP

    • D.

      RTP

    Correct Answer(s)
    B. UDP
    C. TCP
    Explanation
    UDP and TCP are the protocols that can be used for creating and using a socket. UDP (User Datagram Protocol) is a connectionless protocol that provides a simple and lightweight way to send datagrams over the network. It is commonly used for applications that require low latency and can tolerate some data loss, such as real-time streaming or online gaming. TCP (Transmission Control Protocol) is a connection-oriented protocol that provides reliable and ordered delivery of data. It establishes a connection between the sender and receiver and ensures that all data is received correctly. TCP is commonly used for applications that require reliable data transmission, such as web browsing or file transfer.

    Rate this question:

  • 24. 

    Sifrovanie asymetrickou sifrou - pre overenie verejneho kluca sa pouziva CRL (Certificate Revocation List)

    • A.

      Pravda

    • B.

      Nepravda

    Correct Answer
    A. Pravda
    Explanation
    The given statement states that for verifying the public key, CRL (Certificate Revocation List) is used in asymmetric encryption. This means that CRL is used to check if the certificate associated with the public key has been revoked or not. This helps ensure the security and validity of the encryption process.

    Rate this question:

  • 25. 

    Nevyhody S/MIME su (vyberte 2):

    • A.

      Sifrovanie komunikacie

    • B.

      Niektore protokoly musia pouzit "workaround"

    • C.

      Ziskanie certifikatu

    • D.

      Definicia novych hlaviciek

    • E.

      Autentifikacia odosielatela

    Correct Answer(s)
    B. Niektore protokoly musia pouzit "workaround"
    C. Ziskanie certifikatu
    Explanation
    The correct answer is "Niektore protokoly musia pouzit 'workaround'" and "Ziskanie certifikatu". This means that some protocols require a workaround to be used with S/MIME, and obtaining a certificate can be a disadvantage of using S/MIME.

    Rate this question:

  • 26. 

    S/MIME ponuka (vyberte 2):

    • A.

      Parameter qop

    • B.

      Nepopieratelnost povodu

    • C.

      Kompresia dat

    • D.

      Parameter realm

    • E.

      Autentifikaciu

    Correct Answer(s)
    B. Nepopieratelnost povodu
    E. Autentifikaciu
    Explanation
    The correct answer is "Nepopieratelnost povodu" and "Autentifikaciu". These options refer to two important features of S/MIME (Secure/Multipurpose Internet Mail Extensions) - non-repudiation of origin and authentication. "Nepopieratelnost povodu" ensures that the sender cannot deny sending a message, as it provides proof of the message's origin. "Autentifikaciu" refers to the process of verifying the identity of the sender, ensuring that the message comes from the claimed source. These two features are crucial for maintaining the integrity and security of email communication.

    Rate this question:

  • 27. 

    Pri asymetrickom sifrovani vlastnik sukromneho kluca nedesifruje spravu

    • A.

      Pravda

    • B.

      Nepravda

    Correct Answer
    B. Nepravda
    Explanation
    In asymmetric encryption, the owner of the private key is actually able to decrypt the message. This is because asymmetric encryption uses a pair of keys - a public key for encryption and a private key for decryption. The public key is used by anyone who wants to send an encrypted message to the owner of the private key. Therefore, the statement "the owner of the private key does not decrypt the message" is false.

    Rate this question:

  • 28. 

    Ktora z nasledujucich vlastnosti je nevyhoda standardu IEEE 802.1X

    • A.

      Umiestnenie zariadenia do specifickej VLAN

    • B.

      Chrani len pristup k sieti

    • C.

      Akceptuje len EAP ramce

    • D.

      Blokovanie neautorizovanych osob

    Correct Answer
    B. Chrani len pristup k sieti
    Explanation
    The disadvantage of the IEEE 802.1X standard is that it only protects network access. This means that while it may prevent unauthorized individuals from accessing the network, it does not provide any additional security measures once a user is granted access. This can leave the network vulnerable to attacks or unauthorized activity once a user is authenticated.

    Rate this question:

  • 29. 

    Ktory sifrovaci mechanizmus je znazorneny na obrazku?

    • A.

      S/MIME

    • B.

      Elektricky podpis

    • C.

      PKI

    • D.

      TLS

    Correct Answer
    D. TLS
    Explanation
    The correct answer is TLS. TLS (Transport Layer Security) is a cryptographic protocol that provides secure communication over a network. It is commonly used to secure web traffic and ensure the confidentiality and integrity of data transmitted between clients and servers. The other options, S/MIME, Elektricky podpis, and PKI, are also related to encryption and digital signatures, but they are not specifically depicted in the image.

    Rate this question:

  • 30. 

    Session Initiation Protocol (SIP) pracuje na transportnej vrstve

    • A.

      Pravda

    • B.

      Nepravda

    Correct Answer
    B. Nepravda
    Explanation
    The statement "Session Initiation Protocol (SIP) pracuje na transportnej vrstve" is incorrect. SIP works at the application layer of the OSI model, not the transport layer. The transport layer is responsible for the reliable delivery of data between hosts, while SIP is a signaling protocol used for initiating, modifying, and terminating real-time sessions between participants over IP networks.

    Rate this question:

  • 31. 

    SIP komponenty nekomunikuju navzajom vymenou sprav (signalizacia)

    • A.

      Pravda

    • B.

      Nepravda

    Correct Answer
    B. Nepravda
    Explanation
    This statement is false. SIP (Session Initiation Protocol) components do communicate with each other through the exchange of messages or signaling. SIP is a protocol used for initiating, modifying, and terminating real-time sessions involving video, voice, messaging, and other communications applications and services. The signaling messages are used to establish and control the sessions between the SIP components, allowing them to communicate with each other. Therefore, the correct answer is false.

    Rate this question:

  • 32. 

    Ake su typy SIP URI (SIP Unified Resource Identifier) (vyberte 3):

    • A.

      Globally Routable UA URIs (GRUU)

    • B.

      Address of Resriction (AOR)

    • C.

      Address of Record (AOR)

    • D.

      Globally Resricted UA UXIs (GRUU)

    • E.

      Fully Qualified Domain Name (FQDN)

    • F.

      Fully Qualifield Dynamic Name (FQDN)

    Correct Answer(s)
    A. Globally Routable UA URIs (GRUU)
    C. Address of Record (AOR)
    E. Fully Qualified Domain Name (FQDN)
    Explanation
    The correct answer is Globally Routable UA URIs (GRUU), Address of Record (AOR), and Fully Qualified Domain Name (FQDN). These three types of SIP URIs are commonly used in SIP communication. GRUU is used to identify a specific User Agent (UA) and allows for routing of SIP messages globally. AOR represents the address of a specific user or device within a domain. FQDN is a domain name that is completely specified and can be resolved to an IP address.

    Rate this question:

  • 33. 

    Takzvane "Actuators" v IoT spracovavaju udaje z prostredia

    • A.

      Pravda

    • B.

      Nepravda

    Correct Answer
    B. Nepravda
    Explanation
    Actuators in IoT do not process data from the environment. They are devices that are responsible for taking action based on the instructions received from the IoT system. They are used to control or manipulate physical objects or systems in the environment. Therefore, the statement "Actuators in IoT process data from the environment" is false.

    Rate this question:

  • 34. 

    Funkcia senzora v IoT je 

    • A.

      Zistovanie udajov z prostredia

    • B.

      Analyza ziskanych udajov

    • C.

      Cloud computing

    • D.

      Generovanie nahodnych udajov

    Correct Answer
    A. Zistovanie udajov z prostredia
    Explanation
    The correct answer is "Zistovanie udajov z prostredia" which translates to "Collecting data from the environment." In the context of IoT (Internet of Things), a sensor's function is to gather data from its surroundings. This data can include information about temperature, humidity, light intensity, motion, etc. The sensor detects and measures these environmental variables, which can then be used for analysis, decision-making, or triggering certain actions in the IoT system. Cloud computing and generating random data are not directly related to the primary function of a sensor in IoT.

    Rate this question:

  • 35. 

    Ktore typy cloud serverov vyzaduje IoE?

    • A.

      Private, public community, self-private

    • B.

      Private, public, community, extended

    • C.

      Private, public, community, hybrid

    • D.

      Private, group, community, self-private

    Correct Answer
    C. Private, public, community, hybrid
    Explanation
    The IoE (Internet of Everything) refers to the network of connected devices, sensors, and systems that enables data exchange and communication. To support IoE, different types of cloud servers are required. Private, public, community, and hybrid cloud servers are all necessary for IoE as they provide different levels of access, security, and collaboration options. Private cloud servers are dedicated to a single organization, public cloud servers are accessible to the general public, community cloud servers are shared among a specific group of organizations, and hybrid cloud servers combine both private and public cloud infrastructure.

    Rate this question:

  • 36. 

    Trend IoT prinasa so sebou nove bezpecnostne hrozby.

    • A.

      Pravda

    • B.

      Nepravda

    Correct Answer
    A. Pravda
    Explanation
    The statement "Trend IoT prinasa so sebou nove bezpecnostne hrozby" translates to "The IoT trend brings new security threats." The correct answer, "Pravda," means "True" in Slovak. This suggests that the statement is indeed true, implying that the IoT trend does bring new security threats.

    Rate this question:

  • 37. 

    Vyhodou IoT je jednoducha aktualizacia Firmwaru zariadenia

    • A.

      Pravda

    • B.

      Nepravda

    Correct Answer
    B. Nepravda
    Explanation
    The statement says "Vyhodou IoT je jednoducha aktualizacia Firmwaru zariadenia" which translates to "An advantage of IoT is the easy firmware update of the device." The correct answer is "Nepravda" which means "False." Therefore, the correct explanation is that it is not true that an advantage of IoT is the easy firmware update of the device.

    Rate this question:

  • 38. 

    Konvergencia IP sieti znamena:

    • A.

      Vsetky sluzby by mali byt integrovane do jednej siete

    • B.

      Niektore sluzby su integrovane do roznych sieti

    • C.

      Vsetky sluzby nie su integrovane do jednej siete

    • D.

      Len niektore sluzby su integrovane do jednej siete

    Correct Answer
    A. Vsetky sluzby by mali byt integrovane do jednej siete
    Explanation
    The correct answer suggests that convergence of IP networks means that all services should be integrated into one network. This means that different services, such as voice, video, and data, can be transmitted over a single IP-based network, eliminating the need for separate networks for each service. This allows for more efficient and cost-effective communication and management of services.

    Rate this question:

  • 39. 

    Protokol TCP je (vyberte 2):

    • A.

      Nespolahlivy

    • B.

      Spojovany

    • C.

      Nespojovany

    • D.

      Spolahlivy

    Correct Answer(s)
    B. Spojovany
    D. Spolahlivy
    Explanation
    The correct answer is "spojovany, spolahlivy". TCP (Transmission Control Protocol) is a connection-oriented and reliable protocol. It establishes a connection between the sender and receiver before data transmission and ensures that all data packets are delivered in the correct order without loss or duplication.

    Rate this question:

  • 40. 

    Protokol TCP vnima udaje z aplikacnej vrstvy len ako prud bajtov bez vnutornej struktury

    • A.

      Pravda

    • B.

      Nepravda

    Correct Answer
    A. Pravda
    Explanation
    The statement is true because the Transmission Control Protocol (TCP) is a transport layer protocol that treats data from the application layer as a stream of bytes without any internal structure. TCP is responsible for breaking down the stream of bytes into packets, ensuring reliable delivery, and reassembling them at the receiving end. It does not interpret or manipulate the data based on its internal structure, such as headers or formatting. TCP's main focus is on the efficient and reliable transmission of the byte stream between the sender and receiver.

    Rate this question:

  • 41. 

    Ktore su zakladne vlastnosti socketu? (vyberte 2)

    • A.

      Zdielany medzi stanicami

    • B.

      Vytvoreny priamo na podnet OS

    • C.

      Lokalny (len pre danu stanicu, kde vznikol)

    • D.

      Vytvoreny na podnet koncovej aplikacie

    Correct Answer(s)
    C. Lokalny (len pre danu stanicu, kde vznikol)
    D. Vytvoreny na podnet koncovej aplikacie
    Explanation
    The two basic properties of a socket are that it is local (only for the specific station where it was created) and it is created at the request of the end application.

    Rate this question:

  • 42. 

    Protokol UDP je (vyberte 2) :

    • A.

      Spolahlivy

    • B.

      Nespojovany

    • C.

      Nespolahlivy

    • D.

      Spojovany

    Correct Answer(s)
    B. Nespojovany
    C. Nespolahlivy
    Explanation
    The correct answer is "nespojovany, nespolahlivy" because UDP (User Datagram Protocol) is an unreliable and connectionless transport protocol. It does not provide any guarantees for the delivery or ordering of packets, making it suitable for applications that prioritize speed over reliability, such as real-time streaming or online gaming.

    Rate this question:

  • 43. 

    TCP protokol definuje jasne hranice medzi susednymi spravami, takze aplikacia nemusi riesit znacky pre odlisenie hranic medzi spravami.

    • A.

      Pravda

    • B.

      Nepravda

    Correct Answer
    B. Nepravda
    Explanation
    The given statement is false. The TCP protocol does not define clear boundaries between adjacent messages, so the application needs to handle delimiters or markers to differentiate between messages.

    Rate this question:

  • 44. 

    Ktore aplikacne modely (architektury) z pohladu vzajomnej komunikacie entit pozname? (Vyberte 2)

    • A.

      Client-server

    • B.

      Peer-server

    • C.

      Peer-to-peer

    • D.

      Peer-to-client

    Correct Answer(s)
    A. Client-server
    C. Peer-to-peer
    Explanation
    Client-server and peer-to-peer are two well-known application models/architectures in terms of mutual communication between entities. In a client-server model, there is a central server that provides services to multiple clients. The clients send requests to the server, and the server responds with the requested data or performs the requested actions. In a peer-to-peer model, all entities (peers) have equal capabilities and can act as both clients and servers. Peers can communicate directly with each other without the need for a central server.

    Rate this question:

  • 45. 

    Socket je pouzitelny len v pripade programovacieho jazyka C formou dostupnych aplikacnych kniznic.

    • A.

      Pravda

    • B.

      Nepravda

    Correct Answer
    B. Nepravda
    Explanation
    This statement is false. A socket is not limited to the programming language C. Sockets are a programming interface that allows communication between two computers over a network. They are supported by various programming languages, including C, C++, Java, Python, and many others. Therefore, the statement that sockets are only usable in the C programming language is incorrect.

    Rate this question:

  • 46. 

    Protokol TCP vnima udaje z aplikacnej vrstvy len ako prud bajtov bez vnutornej struktury

    • A.

      Pravda

    • B.

      Nepravda

    Correct Answer
    A. Pravda
    Explanation
    The given statement is true. TCP (Transmission Control Protocol) is a transport layer protocol that is responsible for establishing a reliable and error-free connection between two devices on a network. It treats data from the application layer as a stream of bytes without any internal structure. TCP breaks this stream into smaller segments and adds necessary information, such as sequence numbers and checksums, to ensure the reliable delivery of data. Therefore, TCP does not concern itself with the internal structure or format of the data being transmitted.

    Rate this question:

  • 47. 

    Socket mozeme pouzivat vyhradne v OS Linux.

    • A.

      Pravda

    • B.

      Nepravda

    Correct Answer
    B. Nepravda
    Explanation
    The statement "Socket mozeme pouzivat vyhradne v OS Linux" is not true. Sockets can be used in various operating systems, not just Linux. Sockets are a communication mechanism that allows processes to communicate with each other, both on the same machine and across different machines. They are widely supported in different operating systems, including Windows, macOS, and various Unix-based systems, not just Linux.

    Rate this question:

  • 48. 

    Ktore protokoly transportnej vrstvy mozeme pouzit pri vytvoreni a pouzivani socketu?

    • A.

      TCP

    • B.

      HTTP

    • C.

      XML

    • D.

      IP

    • E.

      UDP

    Correct Answer(s)
    A. TCP
    E. UDP
    Explanation
    TCP and UDP are both transport layer protocols that can be used for creating and using sockets. TCP (Transmission Control Protocol) provides reliable and ordered delivery of data with error checking and flow control mechanisms. UDP (User Datagram Protocol) is a lightweight protocol that offers faster but unreliable delivery of data without error checking or flow control. HTTP (Hypertext Transfer Protocol) and XML (eXtensible Markup Language) are not transport layer protocols, but application layer protocols used for communication over the internet. IP (Internet Protocol) is a network layer protocol responsible for addressing and routing packets.

    Rate this question:

  • 49. 

    Pri prenose hlasu v IP sieti sa uprednostnuje transportny protokol TCP pred UDP.

    • A.

      Pravda

    • B.

      Nepravda

    Correct Answer
    B. Nepravda
    Explanation
    The statement is false. When it comes to voice transmission in an IP network, the UDP (User Datagram Protocol) is preferred over TCP (Transmission Control Protocol). This is because UDP is a connectionless protocol that provides faster transmission with lower latency, which is crucial for real-time applications like voice communication. TCP, on the other hand, is a reliable protocol that ensures data delivery but introduces more overhead and potential delays, making it less suitable for time-sensitive applications like voice transmission.

    Rate this question:

  • 50. 

    Ktory protokol pouziva internetove DNS-based adresovanie - URL?

    • A.

      SIP OSPF

    • B.

      SIP ARP

    • C.

      SIP USI

    • D.

      SIP URI

    Correct Answer
    D. SIP URI
    Explanation
    The correct answer is SIP URI. SIP (Session Initiation Protocol) is a communication protocol used for initiating, modifying, and terminating interactive user sessions involving multimedia elements such as video, voice, instant messaging, and virtual reality. URI (Uniform Resource Identifier) is a string of characters that identifies a resource on the internet. In the context of DNS-based addressing, SIP URI is used to address and locate resources such as users, services, or devices in a SIP-based communication system.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 17, 2017
    Quiz Created by
    Lenka
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.