Uro

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Periculum
P
Periculum
Community Contributor
Quizzes Created: 1 | Total Attempts: 2,955
| Attempts: 2,955 | Questions: 106
Please wait...
Question 1 / 106
0 %
0/100
Score 0/100
1. Internet je zasnovan na TCP/IP skupu protokola.

Explanation

The given statement is true. The internet is indeed based on the TCP/IP protocol suite. TCP/IP stands for Transmission Control Protocol/Internet Protocol, which is a set of communication protocols used for connecting devices on the internet. TCP/IP provides a reliable and standardized method for data transmission and ensures that data packets are delivered accurately and efficiently across networks. This protocol suite is the foundation of modern internet communication and enables various internet services such as web browsing, email, file transfer, and more.

Submit
Please wait...
About This Quiz
Uro - Quiz

.

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. Na sledećoj sliciPrikazana je interakcija korisnika korišćenjem: 

Explanation

The correct answer is "PC računara" because the picture shows a user interacting with a personal computer (PC). The PC is a standalone device that can be used for various tasks such as browsing the internet, creating documents, playing games, etc. It is different from a terminal or mainframe computer, which are typically used for accessing a centralized system, and from a networked computer or distributed system, which involve multiple computers connected together. Additionally, the picture does not specifically indicate the use of cloud computing, so the answer "Oblaka" can be ruled out.

Submit
3. Svaki računar i ruter na Internetu ima svoju jedinstvenu IP adresu:

Explanation

Every computer and router on the Internet has its own unique IP address.

Submit
4. Operativni sistem: 

Explanation

The correct answer is "Upravlja resursima računarskog sistema i obezdeđuje interfejs prema korisniku." This answer accurately describes the role of an operating system, which is to manage the resources of a computer system and provide an interface for the user to interact with the system.

Submit
5. "Shortest Job First" je ime jednog od algoritama koji se koristi za raspoređivanje procesa.

Explanation

The given statement is true. "Shortest Job First" is indeed the name of one of the algorithms used for process scheduling. This algorithm prioritizes the execution of the process with the shortest burst time, aiming to minimize the waiting time and improve overall system efficiency.

Submit
6. HAL je skraćenica koja označava: 

Explanation

The correct answer is "Sloj apstrakcije hardvera kao deo jezgra operativnog sistema koji omogućava da operativni sistem vidi različit hardver na isti način." This answer explains that HAL is an abbreviation for a hardware abstraction layer, which is a component of an operating system that allows the operating system to interact with different hardware in a uniform manner.

Submit
7. BIOS (basic input-output system) izvršava POST (Power On Self Test), koji predstavlja seriju testova hardvera.

Explanation

The given statement is correct. BIOS (basic input-output system) performs the POST (Power On Self Test), which is a series of hardware tests.

Submit
8. Bootstraping je pojam u računarstvu koji se odnosi  na: 

Explanation

Bootstraping se odnosi na proceduru koja obuhvata niz lančano vezanih koraka, čiji je cilj dovođenje računarskog sistema u operativno stanje. Ovi koraci uključuju izvršavanje programa u BIOS ROM memoriji, učitavanje i izvršavanje MBR-master boot record koda i slično. Ova procedura omogućava računaru da se pokrene i započne sa izvršavanjem operativnog sistema.

Submit
9. Resursi računarskog sistema obuhvataju: 

Explanation

The correct answer is "I hardver i softver". This means that computer resources include both hardware (processor, memory, input-output devices) and software (programs, data, files of all types). This answer acknowledges that both components are essential for the functioning of a computer system.

Submit
10. Računarska mreža predstavlja skup međusobno povezanih računara visokog stepena autonomije:

Explanation

The given statement is true. A computer network refers to a collection of interconnected computers that have a high degree of autonomy. This means that each computer in the network is capable of making independent decisions and performing tasks without requiring constant supervision or control from a central authority. The computers in a network can communicate with each other, share resources, and collaborate on various tasks, making them highly autonomous entities within the network.

Submit
11. Koliko slojeva ima OSI referentni model? 

Explanation

The OSI reference model consists of seven layers. These layers are responsible for different functions in the process of network communication. Each layer has its own set of protocols and services that enable the transmission and reception of data. The seven layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application. Each layer builds upon the previous one, creating a hierarchical structure that allows for efficient and standardized communication between network devices.

Submit
12. Za dešifrovanje poruke, neophodno je imati

Explanation

To encrypt a message, it is necessary to have both the key and the ciphertext. The key is used to transform the plaintext into the ciphertext using a specific encryption algorithm. Without the key, it would be impossible to decrypt the ciphertext and retrieve the original message. Therefore, having both the key and the ciphertext is essential for the encryption process.

Submit
13. Jedan od nabrojanih pojmova je "uljez". Koji? 

Explanation

The correct answer is the "Round Robin" algorithm. This algorithm is a scheduling algorithm that is commonly used in computer operating systems and network systems. It works by assigning a fixed time slot to each process in a system, allowing each process to execute for a certain amount of time before moving on to the next process. This helps in achieving fairness and preventing any single process from monopolizing the system's resources.

Submit
14. Namenski server je računar koji je optimizovan za brzo opsluživanje velikog broja zahteva klijenata iz mreže:

Explanation

A dedicated server is a computer that is optimized to quickly serve a large number of client requests from the network. This means that it is specifically designed and configured to handle high volumes of traffic and provide efficient and reliable performance. By dedicating its resources solely to serving client requests, a dedicated server can offer faster response times and better overall performance compared to a regular server. Therefore, the statement "Tacno" (True) is the correct answer.

Submit
15. IP adrese klase B nalaze se u opsegu:

Explanation

The given correct answer states that IP addresses of class B are in the range of 128.0.0.0 to 191.255.255.255. This is accurate because class B IP addresses have the first two bits set to 1 and 0 respectively, and the remaining 14 bits are used to identify the network and host. Therefore, the range of class B addresses starts from 128.0.0.0 (10000000.00000000.00000000.00000000 in binary) and ends at 191.255.255.255 (10111111.11111111.11111111.11111111 in binary).

Submit
16. Maska podmreže je:

Explanation

A subnet mask is a 32-bit number used in IPv4 to divide an IP address into network and host portions. It is used to determine the network address by performing a bitwise AND operation between the IP address and the subnet mask. Since the subnet mask is a 32-bit number, it is represented as a 32-bit binary or a 32-bit decimal number. Therefore, the correct answer is a 32-bit number.

Submit
17. Cloud manager pripada:

Explanation

Cloud manager pripada gornjem sloju jer je odgovoran za upravljanje i kontrolu cloud infrastrukture. Gornji sloj u cloud arhitekturi obuhvaća aplikacijske usluge i korisničko sučelje, a cloud manager je odgovoran za upravljanje resursima, nadzor i automatizaciju procesa u cloud okruženju. Ovaj sloj pruža korisnicima mogućnost upravljanja i kontrolu nad svojim cloud resursima, kao što su virtualni strojevi, mreže i pohrana podataka.

Submit
18. VI se najčešće koristi da poveća performanse onih mehanizama kod kojih se detektujuanomalije u ponašanju. 

Explanation

VI se najčešće koristi za povećanje performansi mehanizama koji detektuju anomalije u ponašanju.

Submit
19. Stek sekcija memorije jednog procesa služi za:

Explanation

The stack section of memory in a process is used for storing temporary data such as parameters for procedures, temporary addresses, and other temporary data. This section is typically used for managing the execution of functions and procedures within the process. It is separate from the sections used for storing the program code and data of the process.

Submit
20. Koje su 4 generalizovane kategorije napada? 

Explanation

The correct answer is "Presretanje, Presecanje, Izmena I Fabrikovanje". These four categories are commonly known as interception, interruption, modification, and fabrication.

Submit
21. Kernel je:

Explanation

Kernel je jezgro operativnog sistema koje služi kao veza između hardvera i ostalih slojeva operativnog sistema. On upravlja resursima računara, kao što su procesor, memorija i ulazno/izlazni uređaji, i omogućava komunikaciju između aplikacija i hardvera. Kernel je odgovoran za osnovne funkcionalnosti operativnog sistema, kao što su upravljanje procesima, memorijom, datotekama i mrežom. On pruža apstrakciju hardvera i omogućava da se aplikacije izvršavaju na različitim platformama.

Submit
22. Na sledećoj slici prikazano je: 

Explanation

The given image represents the process of generating a physical address using memory segmentation. Memory segmentation is a memory management technique where the memory is divided into different segments, each having a specific purpose. When a program needs to access a specific memory location, the segment number and offset are combined to generate a physical address. This technique allows for efficient memory allocation and management.

Submit
23. Ruter je mrežni uređaj koji pripada:

Explanation

The correct answer is "Mrežnom sloju." A router is a network device that operates at the network layer of the OSI model. It is responsible for routing data packets between different networks, making decisions based on IP addresses. The network layer is responsible for logical addressing and routing of data packets across different networks, making it the appropriate layer for routers. The physical layer deals with the physical transmission of data, while the data link layer is responsible for error detection and correction at the link level.

Submit
24. TCP/IP je:

Explanation

TCP/IP je skup protokola koji je razvila agencija DARPA. Agencija DARPA (Defense Advanced Research Projects Agency) je američka agencija za napredna istraživanja u vojne svrhe, koja je razvila TCP/IP protokol za potrebe vojnih komunikacija. TCP/IP je skup protokola koji omogućava komunikaciju između računara na internetu i predstavlja osnovu za funkcionisanje interneta.

Submit
25. Na sledećoj sliciPrikazana je interakcija korisnika korišćenjem: 

Explanation

not-available-via-ai

Submit
26. Šta označava broj porta 443?

Explanation

HTTPS protokol označava broj porta 443. HTTPS (Hypertext Transfer Protocol Secure) je sigurna verzija HTTP protokola koja koristi enkripciju za zaštitu podataka koji se prenose između web preglednika i web servera. Port 443 je standardni port koji se koristi za HTTPS komunikaciju.

Submit
27. Koncept prema kome organizacije su vlasnice nad infrastrukturom oblaka je:

Explanation

The correct answer is "Privatni oblak". In a privatni oblak (private cloud), organizations have ownership and control over the cloud infrastructure. This means that the infrastructure is dedicated solely to the organization and is not shared with other entities. This provides a higher level of security and privacy as the organization has full control over the infrastructure and can customize it according to their specific needs.

Submit
28. Platforma u vidu servisa omogućava korisniku da konfiguriše hosting okruženje:

Explanation

The given statement is true. The platform in the form of a service allows the user to configure the hosting environment. This means that the user has the ability to customize and set up their hosting environment according to their specific needs and requirements. This flexibility and control over the hosting environment can be beneficial for the user in terms of optimizing performance, security, and scalability.

Submit
29. SATA (Serial Advanced Technology Attachment) je naziv za: 

Explanation

SATA (Serial Advanced Technology Attachment) je naziv za disk kontroler koji je integrisan na matičnoj ploči.

Submit
30. Hipervizor (hypervisor) je:

Explanation

A hypervisor, also known as a virtual machine monitor, is a software or firmware that manages hardware resources and virtual machines. It allows multiple operating systems to run on a single physical machine by dividing the resources and providing isolation between the virtual machines. The hypervisor controls the allocation of CPU, memory, storage, and other hardware resources to ensure efficient and secure virtualization.

Submit
31. Koncept gde se kompanije ne bave infrastrukturom i održavanje servisa i hardvera je:

Explanation

The correct answer is "Javni oblak." In a public cloud concept, companies do not have to deal with infrastructure, service maintenance, or hardware management. Public cloud services are provided by third-party vendors over the internet, allowing organizations to access and use resources such as servers, storage, and applications without having to worry about the underlying infrastructure. This enables businesses to focus on their core operations while benefiting from the scalability, flexibility, and cost-effectiveness of public cloud services.

Submit
32. Cluster managers pripada:

Explanation

Cluster managers typically belong to the middle layer of an organization. This is because cluster managers are responsible for overseeing and coordinating the activities of multiple clusters or groups within an organization. They act as a bridge between top-level management and lower-level employees, ensuring that the goals and objectives set by upper management are effectively communicated and implemented at the cluster level. Cluster managers also play a crucial role in facilitating communication and collaboration between different clusters, promoting synergy and efficiency within the organization.

Submit
33. IaaS se realizuje:

Explanation

IaaS (Infrastructure as a Service) is a cloud computing model where virtualized resources are provided over the internet. This means that instead of having physical servers or hardware, the infrastructure is created and managed virtually. Therefore, the correct answer is "Virtuelizacijom" which refers to the process of creating virtual versions of resources such as servers, storage, and networks. This allows users to access and utilize these resources remotely without the need for physical infrastructure.

Submit
34. Izmena je aktivan napad na integritet (integrity) dok je Fabrikovanje aktivan napad na 

Explanation

Izmena je aktivan napad na integritet, što znači da se vrši namerno menjanje ili oštećenje podataka kako bi se narušila njihova celovitost. Sa druge strane, fabrikovanje je takođe aktivan napad, ali na autentičnost podataka, gde se podaci lažno stvaraju ili modifikuju kako bi se stekao neovlašćeni pristup ili manipulisalo informacijama.

Submit
35. Ispitivački napadi za cilj imaju: 

Explanation

The correct answer is "Prikupljanje informacija o sistemu ili mreži I traženje ranjivosti koje se mogu iskoristiti." This means that the goal of the attacker is to gather information about the system or network and search for vulnerabilities that can be exploited. This type of attack aims to identify weaknesses in the system or network in order to gain unauthorized access or cause harm.

Submit
36. Na sledećoj slici, Prikazana je interakcija korisnika korišćenjem: 

Explanation

The given answer suggests that the interaction depicted in the image is related to the use of terminal and mainframe computers. This means that the user is likely accessing and interacting with a mainframe computer through a terminal, which is a device used to input and output data from the mainframe. This type of setup was common in the early days of computing when mainframes were the primary form of computer technology.

Submit
37. Aplikacioni sloj TCP/IP skupa protokola:

Explanation

The application layer of the TCP/IP protocol suite allows applications or users to access services on the Internet. It acts as an interface between the application and the lower layers of the protocol stack. It provides services such as email, file transfer, remote login, and web browsing to users by utilizing the underlying network protocols. This layer is responsible for establishing communication between applications running on different hosts and ensuring that data is properly formatted for transmission over the network.

Submit
38. Opšti slojevi u arhitekturi u vidu servisa su:

Explanation

The correct answer is Cloud, Cluster, Computer managers. In the architecture of a system, different layers or components are used to manage various aspects of the system. In this case, the three layers mentioned - Cloud, Cluster, and Computer managers - represent different levels of management in the system. The Cloud manager oversees the management of resources and services in the cloud environment. The Cluster manager handles the management of clusters, which are groups of interconnected computers. The Computer manager is responsible for managing individual computers in the system. Together, these layers ensure efficient management of the system's resources and services.

Submit
39. DHCP je skraćenica za:

Explanation

DHCP stands for Dynamic Host Configuration Protocol. This protocol is used to automatically assign IP addresses to devices on a network. It allows devices to join a network and obtain the necessary network configuration information, such as IP address, subnet mask, default gateway, and DNS server addresses, without manual configuration. DHCP simplifies network administration by centrally managing and distributing IP addresses, eliminating the need for manual IP address assignment.

Submit
40. Pristup PaaS-u putem web čitača predstavlja bezbednosni rizik:

Explanation

Accessing PaaS through a web browser can pose a security risk because web browsers are susceptible to various vulnerabilities such as cross-site scripting (XSS), cross-site request forgery (CSRF), and browser-based attacks. These vulnerabilities can be exploited by malicious actors to gain unauthorized access to the PaaS platform, steal sensitive data, or manipulate the system. Therefore, it is important to implement proper security measures and precautions when accessing PaaS through a web browser to mitigate these risks.

Submit
41. U binarnom obliku IP adrese klase A počinju sa: 

Explanation

In binary form, IP addresses of class A start with a 0. This is because class A IP addresses have a range of 1.0.0.0 to 126.0.0.0, and the first octet (8 bits) of these addresses must always start with a 0 in binary form. This allows for a large number of network addresses in class A, as the first bit being 0 indicates that it is a class A address.

Submit
42. Utičnicu (socket) čine:

Explanation

The correct answer is "IP adresa računara : broj porta". This answer states that a socket consists of an IP address of the computer and a port number. In computer networking, a socket is a combination of an IP address and a port number that uniquely identifies a specific endpoint on a network. The IP address identifies the computer, while the port number specifies the specific application or service running on that computer.

Submit
43. Kao odgovor na aktivnosti unutar mreže koji mogu da ukažu na napade I potencijalno narušavanje integriteta, poverljivosti ili raspoloživosti resursa, predstavljaju sistemi za detekciju I sprečavanje upada. 

Explanation

The given statement is stating that intrusion detection and prevention systems are a response to activities within a network that can indicate attacks and potentially compromise the integrity, confidentiality, or availability of resources. This means that these systems are designed to detect and prevent unauthorized access or malicious activities within a network, thereby enhancing the security and protection of the network and its resources.

Submit
44. Proces je: 

Explanation

The correct answer is "Program ili deo programa u stanju izvršavanja." This answer states that a process is a program or a part of a program that is currently being executed. This implies that a process is an active entity in the computer system, carrying out instructions and performing tasks. The other options mentioned do not accurately describe what a process is.

Submit
45. Procesor je nedeljivi resurs.

Explanation

The statement "Procesor je nedeljivi resurs" translates to "The processor is an indivisible resource." This means that the processor cannot be divided or shared among multiple tasks or processes simultaneously. Each task or process requires exclusive access to the processor in order to execute its instructions. Therefore, the statement is correct.

Submit
46. Na sledećoj slici prikazano je:

Explanation

The given image represents the concept of using virtual memory. Virtual memory is a memory management technique where the computer's operating system uses a combination of RAM and disk space to simulate additional memory. It allows the system to run programs that require more memory than what is physically available. The image may depict the process of mapping virtual addresses to physical addresses and the utilization of disk space as an extension of the physical memory.

Submit
47. Računar gost (guest machine) je:

Explanation

A guest machine, also known as a virtual machine, is a software or firmware that manages hardware resources and virtual machines. It is a computer on which virtualization is effectively executed.

Submit
48. Koncept gde kompanije iznajmljuju servise za širi broj korisnika pored sopstvene infratrukture je:

Explanation

The concept where companies rent services to a wider range of users in addition to their own infrastructure is called a hybrid cloud. This means that the company combines their own private cloud with the public cloud services to create a hybrid cloud environment. This allows them to have more flexibility and scalability in managing their resources, as they can choose which data and applications to keep in their private cloud and which to store in the public cloud.

Submit
49. Serveri, sistemi za skladištenje podataka i umrežavanje deo su:

Explanation

The correct answer is "Infrastrukture u vidu servisa". This is because servers, data storage systems, and networking are all components of infrastructure that are provided as services. This means that they are available for use by individuals or organizations on a subscription or pay-per-use basis, rather than being owned and managed directly by the user.

Submit
50. IPSec podržava Transport mode I Tunnel mode kao režime rada I implementira sigurnosne mehanizme mrežne komunikacije na mrežnom sloju OSI referentnog modela. 

Explanation

IPSec podržava Transport mode i Tunnel mode kao režime rada. Transport mode se koristi kada samo sadržaj IP paketa treba biti zaštićen, dok se Tunnel mode koristi kada se celi IP paket šalje unutar drugog IP paketa kako bi se obezbedila veća sigurnost. IPSec implementira sigurnosne mehanizme na mrežnom sloju OSI referentnog modela kako bi obezbedio sigurnu mrežnu komunikaciju.

Submit
51. U hijerarhiji operativnog sistema:

Explanation

The correct answer is "Korisnički interfejs je na vrhu, a jezgro na dnu hijerarhije." This means that in the hierarchy of an operating system, the user interface is at the top, while the kernel is at the bottom. This arrangement suggests that the user interface is the layer that interacts directly with the user, while the kernel is responsible for managing system resources and providing essential services to other parts of the operating system.

Submit
52. Distribuirani sistemi mogu biti realizovani na dva načina: 

Explanation

Distribuirani sistemi mogu biti realizovani na dva načina: kao klijent-server ili ravnopravni sistemi. This means that distributed systems can be implemented either as client-server systems or as peer-to-peer systems. In a client-server system, there is a central server that provides services to multiple clients. In a peer-to-peer system, all nodes in the network can act as both clients and servers, sharing resources and services with each other. The other options mentioned in the question (zvezdasti ili ciklični sistemi, kao linearni ili nelinearni sistemi) are not relevant to the ways in which distributed systems can be implemented.

Submit
53. Dodeljivanje procesora procesima radi:

Explanation

The correct answer is "Dispečer sistema koji je deo jezgra operativnog sistema." This means that the allocation of the processor to processes is done by the system dispatcher, which is a part of the operating system kernel. The system dispatcher manages the scheduling and allocation of processor time to different processes, ensuring efficient and fair execution of tasks.

Submit
54. Na najnižem nivou strukture virtuelnih mašina se nalazi:

Explanation

At the lowest level of virtual machine structure is the hardware. The hardware refers to the physical components of a computer system, such as the processor, memory, and storage devices. These components provide the necessary resources for the virtual machine to run and execute its tasks. The hardware interacts directly with the virtual machine monitor (VMM) and provides the underlying infrastructure for virtualization. The VMM, also known as the hypervisor, is responsible for managing and controlling the virtual machines running on the hardware. However, the VMM is not at the lowest level, as it relies on the hardware to function properly. Therefore, the correct answer is hardware.

Submit
55. UDP (User Datagram Protocol) pripada:

Explanation

UDP (User Datagram Protocol) belongs to the Transport layer of the OSI model. The Transport layer is responsible for the end-to-end delivery of data between hosts. UDP is a connectionless protocol that provides a simple and lightweight method for sending datagrams across a network. It does not guarantee delivery or order of packets, making it suitable for applications that prioritize speed over reliability, such as streaming media or online gaming. Therefore, UDP is classified as a protocol of the Transport layer.

Submit
56. Privatne mreže su namenjene:

Explanation

Privatne mreže su namenjene mrežama koje nisu direktno povezane na Internet i ne mogu se koristiti na Internetu. This means that private networks are designed for networks that are not directly connected to the Internet and cannot be used on the Internet.

Submit
57. Computer managers pripada:

Explanation

Computer managers pripada donjem sloju. This suggests that computer managers are part of the lower layer in the hierarchy or structure of computer systems. This could refer to the lower-level management roles that oversee the technical aspects of computer systems, such as network administrators or system administrators. These individuals are responsible for the day-to-day operations, maintenance, and troubleshooting of computer systems. They work closely with the hardware and software components to ensure smooth functioning and efficient performance.

Submit
58. Koje od sledećih karakteristika nije prednost IaaS-a:

Explanation

Ažuriranje sistema nije prednost IaaS-a jer je odgovornost za ažuriranje sistema na provajderu cloud usluga, a ne na korisniku. IaaS korisnici dobijaju pristup virtuelnim mašinama koje su već konfigurisane i ažurirane od strane provajdera. Ovo omogućava korisnicima da se fokusiraju na druge zadatke, umesto da troše vreme na ažuriranje sistema.

Submit
59. Koji su protokoli unutar Secure Socket Layer-a (SSL)? (pitanje sa više mogućih odgovora)

Explanation

None of the options listed (SSL procedure, SSL request, Statefull packet filter, SSL handler) are protocols within the Secure Socket Layer (SSL). Therefore, the correct answer is "Nijedno od ponuđenog" which means "None of the above" in English.

Submit
60. Šta predstavlja protocol tipa Single-Sign-On kod kriptografskog protokola Kerberos? 

Explanation

The correct answer is "Korisnik se jednom prijavi na sistem I nakon toga u skladu sa svojim ovlašćenjima ima pristup resursima." This answer suggests that the protocol type Single-Sign-On in the Kerberos cryptographic protocol allows a user to log in once to the system and then access resources according to their permissions.

Submit
61. Različiti operativni sistemi (Windows, Linux…) ne mogu da koriste isto ili slično jezgro operativnog sistema

Explanation

Different operating systems (Windows, Linux, etc.) can use the same or similar operating system kernels. This means that it is not true that different operating systems cannot use the same or similar operating system kernels.

Submit
62. Faza napada "Uradi ono što si naumio" predstavlja odbijanje usluge, preuzimanje podataka, izmenu ili generisanje lažnih podataka 

Explanation

The statement "Faza napada 'Uradi ono što si naumio' predstavlja odbijanje usluge, preuzimanje podataka, izmenu ili generisanje lažnih podataka" is correct. It states that the attack phase "Do what you intended" involves refusing service, data retrieval, modification, or generation of false data.

Submit
63. Funkcija fizičkog sloja OSI referentnog modela je:

Explanation

The correct answer is "Prenos bitova." The physical layer of the OSI reference model is responsible for the transmission of raw bit streams over a physical medium. It deals with the physical characteristics of the transmission medium, such as electrical signals, voltages, and physical connectors. This layer ensures reliable transmission of bits between two devices, without any concern for the meaning or interpretation of the data being transmitted. It focuses solely on the physical transmission of the data at the bit level.

Submit
64. Sa kojim znakom počinju imena promenljivih u PowerShell-u? 

Explanation

In PowerShell, variable names always start with a dollar sign ($). This is a convention used to indicate that the following characters represent a variable. By using the dollar sign at the beginning of a variable name, it becomes easier to distinguish variables from other elements in the code.

Submit
65. U koju vrstu napada spade DoS/DDoS? 

Explanation

DoS/DDoS napad spada u vrstu napada pod nazivom "Presecanje". Presecanje se odnosi na napade koji imaju za cilj prekid ili ometanje normalnog funkcionisanja mreže ili sistema, često preopterećenjem resursa ili prekidom komunikacije. DoS/DDoS napad se odnosi na preplavljenje ciljanog sistema sa velikim brojem zahteva ili podataka, što dovodi do preopterećenja i onemogućavanja pristupa drugim korisnicima.

Submit
66. Osnovna funkcija jezgra operativnog sistema je: 

Explanation

The core function of an operating system is to manage processes. This involves allocating system resources, scheduling tasks, and ensuring that multiple processes can run concurrently without interfering with each other. By managing processes effectively, the operating system can optimize the utilization of hardware and ensure that tasks are executed in a timely manner. This is crucial for the overall performance and stability of the system.

Submit
67. Virtuelizacija je:

Explanation

Virtuelizacija je mogućnost pokretanja više međusobno nezavisnih operativnih sistema na jednom fizičkom računaru. Ova tehnologija omogućava da se na jednom računaru izvršava više virtuelnih mašina, koje se ponašaju kao odvojeni računari sa sopstvenim operativnim sistemima. Ovo omogućava efikasnije korišćenje resursa, jer se jedan fizički računar može koristiti za pokretanje više virtuelnih mašina, umesto da se koriste različiti fizički računari za svaku mašinu. Takođe, virtuelizacija omogućava izolaciju i bezbednost između virtuelnih mašina, jer svaka mašina radi nezavisno od ostalih.

Submit
68. Koncentrator (hub) je mrežni uređaj koji pripada:

Explanation

A koncentrator (hub) is a network device that operates at the physical layer of the OSI model. It is responsible for connecting multiple devices in a local area network (LAN) by receiving data packets from one device and broadcasting them to all other devices connected to the hub. The physical layer is responsible for the transmission and reception of raw data bits over a physical medium, such as cables. Therefore, the correct answer is the physical layer.

Submit
69. Koji od kriptografskih protokola sadrži serversku uslugu za izdavanje karte za pristup mrežnim resursima?

Explanation

Kerberos je kriptografski protokol koji sadrži serversku uslugu za izdavanje karte za pristup mrežnim resursima. Kerberos koristi sistem karata kako bi autentifikovao korisnike i omogućio im pristup resursima u mreži. Ovaj protokol se često koristi u distribuiranim sistemima i omogućava sigurno autentifikovanje i autorizaciju korisnika. SSL i IPSec su takođe kriptografski protokoli, ali nemaju serversku uslugu za izdavanje karata kao što to ima Kerberos.

Submit
70. Virtuelizacija memorije podrazumeva:

Explanation

The correct answer is "Agregaciju RAM memorije povezanih servera u zajednički memorijski pool." This means that memory virtualization involves combining the RAM memory of connected servers into a shared memory pool. This allows for more efficient utilization of memory resources and enables better scalability and flexibility in managing memory allocation for virtual machines.

Submit
71. Računar domaćin (host machine) je:

Explanation

The correct answer states that a host machine is a computer on which virtualization is effectively executed. This means that the host machine is responsible for managing the hardware resources and running virtual machines. It is the main computer that hosts and supports the virtualization process, allowing multiple virtual machines to run simultaneously on a single physical machine.

Submit
72. Funkcija mrežnog sloja OSI referentnog modela je:

Explanation

The function of the network layer in the OSI reference model is logical addressing and routing. This layer is responsible for assigning logical addresses to devices on the network and determining the best path for data packets to travel from the source to the destination. It ensures that data is properly addressed and delivered to the correct destination by using routing algorithms and maintaining routing tables.

Submit
73. Sigurnosni mehanizam (security mechanism): 

Explanation

The correct answer is "treba da detektuje I predupredi napad ili da sistem oporavi od napada." This answer accurately describes the purpose of a security mechanism, which is to detect and prevent attacks or recover the system from attacks. It emphasizes the importance of protecting the system from potential threats and vulnerabilities.

Submit
74. Distribuirani sistemi su:

Explanation

Distribuirani sistemi su skupovi računara koji ne dele zajedničku memoriju i sistemsko vreme, već su povezani mrežom. Ovo znači da svaki računar u distribuiranom sistemu ima svoju lokalnu memoriju i vreme, ali mogu komunicirati i razmenjivati podatke preko mreže. Ovakvi sistemi se često koriste za paralelno izvršavanje zadataka, povećanje pouzdanosti i skalabilnosti sistema, kao i za podršku udaljenom pristupu i radu na udaljenim lokacijama.

Submit
75. Šta od navedenog predstavlja primer sigurnosne usluge? (pitanje sa više mogućih odgovora

Explanation

The given answer options are all examples of security services. Autentifikacija USB tokenom refers to authentication using a USB token, which is a form of two-factor authentication. Autentifikacija lozinkom refers to authentication using a password, which is a common method of verifying a user's identity. Autentifikacija biometrijskim uzorkom refers to authentication using biometric data, such as fingerprints or facial recognition, which provides a high level of security. Therefore, all three options are examples of security services that help protect against unauthorized access.

Submit
76. Konkurentnost kao svojstvo operativnog sistema odnosi se na: 

Explanation

Konkurentnost kao svojstvo operativnog sistema se odnosi na postojanje više simultanih, paralelnih aktivnosti na računaru. To znači da operativni sistem može istovremeno izvršavati više zadataka ili procesa, što povećava efikasnost i produktivnost sistema. Ova karakteristika omogućava korisnicima da istovremeno obavljaju više radnji na računaru, kao što su otvaranje više programa ili izvršavanje više operacija istovremeno.

Submit
77. Kod parcijalne vrituelizacije:

Explanation

Partial virtualization is a type of virtualization where only a portion of the environment is simulated. In this case, the correct answer states that only a part of the environment is simulated. This means that not all aspects of the hardware environment are virtualized, but only specific components or functionalities are simulated. This approach allows for more efficient resource utilization and can be beneficial in certain scenarios where complete simulation of the hardware environment is not necessary or feasible.

Submit
78. SaaS korisnik može da instalira na svom računaru:

Explanation

SaaS (Software as a Service) is a cloud computing model where software applications are provided over the internet on a subscription basis. In this model, the software is hosted and managed by the service provider, and users access it through a web browser or thin client. Since the software is not installed on the user's computer, the statement "Netacno" (False) is the correct answer.

Submit
79. Za koje od sledećih tipova softvera je SaaS odgovarajući:

Explanation

SaaS (Software as a Service) is a software delivery model where software is accessed via the internet and hosted by a third-party provider. It is suitable for applications that can be accessed and used over the internet, such as productivity tools, customer relationship management (CRM) software, and collaboration platforms. None of the mentioned software types (real-time software, software that processes massive data, critical software) specifically indicate that they can be accessed and used over the internet, so SaaS would not be appropriate for any of them.

Submit
80. Kod paravirtualizacije:

Explanation

The correct answer is "Hardversko okruženje nije simulirano." This means that in paravirtualization, the hardware environment is not simulated. Paravirtualization is a virtualization technique where the guest operating system is modified to be aware that it is running in a virtualized environment. This allows for better performance compared to full virtualization because it eliminates the need for hardware emulation. Instead, the guest operating system communicates directly with the hypervisor, which provides the necessary virtualization services.

Submit
81. Nakon što više korisničkih programa pošalje sistemske pozive svojim operativnim sistemima, operativni sistemi šalju hardverske operacije:

Explanation

After multiple user programs send system calls to their operating systems, the operating systems send hardware operations to the virtual machine monitor. This means that the virtual machine monitor is responsible for managing and controlling the hardware operations requested by the user programs.

Submit
82. Funkciju filtriranja paketa imaju:

Explanation

The correct answer is "Mrežne barijere." Mrežne barijere, ili firewalli, imaju funkciju filtriranja paketa. Oni su postavljeni između mreže i interneta kako bi kontrolisali i ograničili pristup određenim mrežnim resursima. Filtriranje paketa se odnosi na proces pregledanja i analiziranja svakog paketa podataka koji prolazi kroz mrežnu barijeru, kako bi se odlučilo da li će biti dozvoljen ili blokiran.

Submit
83. Savremena virtuelizacija dozvoljava pokretanje više instanci operativnih sistema na jednomračunaru. Ovi operativni sistemi ne dele resurse zajedničkog hardvera.

Explanation

The given statement is false. Contemporary virtualization allows running multiple instances of operating systems on a single computer, and these operating systems share the hardware resources.

Submit
84. Adresa lokalne petlje (local loopback address) je: 

Explanation

The local loopback address, 127.0.0.1, is a special IP address that is used to test network connectivity on a local machine. It allows a computer to send data to itself, essentially creating a loopback within the network stack. This address is commonly used for troubleshooting and diagnosing network issues, as it bypasses any external network connections and allows the computer to communicate with itself.

Submit
85. Podoblasti Informacione Sigurnosti su relativno složene ali se ipak može izdvojiti stručnjak (praktičar) ili istraživač koji u svim oblastima postiže značajne i upečatljve rezultate. 

Explanation

The given statement states that "Podoblasti Informacione Sigurnosti su relativno složene ali se ipak može izdvojiti stručnjak (praktičar) ili istraživač koji u svim oblastima postiže značajne i upečatljve rezultate." which translates to "Subfields of Information Security are relatively complex, but it is still possible to identify an expert (practitioner) or researcher who achieves significant and impressive results in all areas." The correct answer is "Netacno" which means "False" in English. Therefore, the statement is incorrect and suggests that it is not possible to find an expert or researcher who excels in all areas of Information Security.

Submit
86. Napadi koji za posledicu imaju nedostupnost resursa su: 

Explanation

The given answer "Napadi odbijanja usluga" is correct because it translates to "Denial of Service (DoS) attacks" in English. These attacks aim to make a computer or network resource unavailable to its intended users by overwhelming it with a flood of illegitimate requests or by exploiting vulnerabilities to crash the system. This results in a denial of service for legitimate users who are unable to access the resource.

Submit
87. Koje su prednosti biometrijske provere identiteta u odnosu na ostale metode provere? (pitanje sa više mogućih odgovora)

Explanation

The given answer states that none of the options provided are advantages of biometric identity verification compared to other methods of verification. This suggests that the question is asking about the disadvantages or lack of advantages of biometric identity verification, rather than the advantages.

Submit
88. Kod infrastrukture u vidu servisa cena resursa ne zavisi od potrošnje:

Explanation

The correct answer is "Netacno" which means "False" in English. This suggests that the price of resources does depend on consumption in infrastructure services.

Submit
89. PaaS klijentu omogućava da:

Explanation

PaaS (Platform as a Service) allows the client to manage the configuration of the hosting environment. This means that the client has control over the settings and configurations of the platform where their applications or services are hosted. They can customize and adjust the environment based on their specific needs and requirements. This includes managing resources, scaling capabilities, security settings, and other configuration options.

Submit
90. Puna (nativna) virtuelizacija, parcijalna virtuelizacija i paravirtuelizacija su tipovi:

Explanation

The given correct answer is "Hardverske virtuelizacije" (Hardware virtualization). This type of virtualization involves creating virtual versions of physical hardware components, such as processors, memory, and storage devices. It allows multiple operating systems to run simultaneously on a single physical machine, each with its own virtual hardware resources. This enables better utilization of hardware resources, improved flexibility, and increased efficiency in managing and deploying virtual machines.

Submit
91. Virtuelizacija sesija omogućava:

Explanation

The correct answer is "Korisnicima da se preko mreže povežu i prijave na deljeni server simultano." This means that session virtualization allows users to connect and log in to a shared server simultaneously over a network.

Submit
92. Da bi smo napravili novi folder, koju reč moramo dodati u polje u ItemType u okviru komande New-Item? 

Explanation

To create a new folder using the New-Item command in PowerShell, the word "directory" needs to be added to the ItemType field. The ItemType field specifies the type of item to be created, and in this case, "directory" indicates that a new folder should be created.

Submit
93. Kao odgovor na aktivnosti unutar mreže koji mogu da ukažu na napade I potencijalno narušavanje integriteta, poverljivosti ili raspoloživosti resursa, predstavljaju mrežne barijere. 

Explanation

not-available-via-ai

Submit
94. Koju komandu u okviru PowerShell-a koristimo za brisanje? 

Explanation

The correct answer is "remove-item." In PowerShell, the "remove-item" command is used to delete or remove items such as files, folders, and registry keys. It allows users to remove unwanted or unnecessary items from their system.

Submit
95. Eksterna i interna virtuelizacija su tipovi:

Explanation

The correct answer is "Nijedno od ponudjenog" which means "None of the above" in English. This implies that the given options do not represent the types of external and internal virtualization. Therefore, the correct answer suggests that none of the options provided are the correct types of virtualization.

Submit
96. Načini autentifikacije mogu biti: (pitanje sa više mogućih odgovora)

Explanation

The given answer includes different methods of authentication such as password, PIN, fingerprint, signature, and speaker verification. These methods are commonly used to verify the identity of a user before granting access to a system or data. Each method has its own advantages and limitations, but they all serve the purpose of ensuring that only authorized individuals can access the protected resources.

Submit
97. Koja komanda u PowerShell-u služi za kretanje i pozicioniranje kroz direktorijume?

Explanation

The correct answer is "move-item." In PowerShell, the "move-item" command is used to move or rename a file or directory. It allows users to navigate and position themselves within directories by specifying the source and destination paths. This command is useful for managing files and directories efficiently in PowerShell.

Submit
98. Koju komandu u okviru PowerShell-a koristimo za proveru da li neka putanja postoji? 

Explanation

The correct answer is "test-path". In PowerShell, the "test-path" command is used to check whether a given path exists or not. It returns a boolean value, true if the path exists and false if it does not. This command is useful for verifying the existence of a file or directory before performing any operations on it.

Submit
99. Puna virtuelizacija podrazumeva razdvajanje operativnog sistema i hardverskih resursa kojeOS koristi

Explanation

False. Puna virtuelizacija ne podrazumeva razdvajanje operativnog sistema i hardverskih resursa koje OS koristi. Puna virtuelizacija podrazumeva kreiranje virtuelne mašine koja simulira fizički hardver i omogućava izvršavanje operativnog sistema i aplikacija unutar te virtuelne mašine. Hardverski resursi se deljeni između virtuelnih mašina, ali se ne razdvajaju od operativnog sistema.

Submit
100. PaaS obično ne sadrži web ili aplikativni server:

Explanation

PaaS (Platform as a Service) is a cloud computing model where a provider offers a platform for developing, running, and managing applications. In this model, the infrastructure and underlying hardware are managed by the provider, allowing developers to focus on building and deploying their applications. PaaS typically does not include a web or application server because it is the responsibility of the developer to choose and configure the appropriate server for their specific application needs. Therefore, the statement "PaaS obično ne sadrži web ili aplikativni server" (PaaS usually does not include a web or application server) is correct.

Submit
101. Faza napada "Održi pristup" predstavlja iskorišćavanje identifikovaanih ranjivosti I sticanje pristupa sistemu 

Explanation

The statement is incorrect. The "Održi pristup" phase of an attack refers to maintaining access to the system after gaining initial access, rather than exploiting vulnerabilities and gaining access to the system.

Submit
102. Šta nije karakteristika mreže ravnopravnih računara?

Explanation

The correct answer is "Nema namenskih servera" (There are no dedicated servers). This means that in a network of equal computers, there are no specialized servers that handle specific tasks or functions. In such a network, all computers have equal capabilities and responsibilities, and there is no central server that controls or manages the network.

Submit
103. Od čega sve zavisi efikasno izvršavanje virtuelnih mašina? (pitanje sa više mogućih odgovora)

Explanation

The efficient execution of virtual machines depends on several factors, including the number of software servers we want to run, the specific servers we want to run, the amount of RAM memory available, and the power of the CPU. These factors determine the capacity and performance of the virtual machines and their ability to handle the workload efficiently. The strength of the graphics card, size of the HDD, and data transfer speed between the HDD and CPU are not directly related to the efficient execution of virtual machines.

Submit
104. Šta od ponuđenog predstavlja algoritme za šifrovanje poruka? (pitanje sa više mogućih odgovora

Explanation

The correct answer choices for algorithms used for encrypting messages are algorithms with public key, one-way hash functions, and symmetric algorithms. These algorithms provide different methods for encrypting and decrypting messages, ensuring the security and confidentiality of the communication.

Submit
105. Šta od navedenog predstavlja kategoriju napada po Kendall-ovoj taksonomiji? (pitanje sa više mogućih odgovora

Explanation

The correct answer includes a combination of different types of attacks according to Kendall's taxonomy. The listed options include "Ispitivački napadi" (penetration testing attacks), "Napadi neovlašćenog sticanja pristupa udaljenom računaru" (unauthorized remote access attacks), "Napadi odbijanja usluga" (denial of service attacks), and "Napadi neovlašćenog povećanja privilegija" (unauthorized privilege escalation attacks). These categories cover various methods used by attackers to compromise systems and gain unauthorized access or control.

Submit
106. Koji su osnovni koraci (faze) u toku izvršenja neke vrste napada? (pitanje sa vise mogućih odgovora)

Explanation

The correct answer includes the steps involved in the execution of a type of attack. The steps are: Ispitaj I proceni (Assess and evaluate), Eksploatiši I prodri (Exploit and penetrate), Povećaj privilegije (Increase privileges), Održi pristup (Maintain access), and Uradi ono što si naumio (Do what you intended). These steps represent the typical progression of an attack, starting with assessing the target, exploiting vulnerabilities, gaining higher privileges, maintaining access, and finally carrying out the intended actions.

Submit
View My Results

Quiz Review Timeline (Updated): Jul 22, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jul 22, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 13, 2017
    Quiz Created by
    Periculum
Cancel
  • All
    All (106)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Internet je zasnovan na TCP/IP skupu protokola.
Na sledećoj sliciPrikazana je interakcija korisnika...
Svaki računar i ruter na Internetu ima svoju jedinstvenu IP adresu:
Operativni sistem: 
"Shortest Job First" je ime jednog od algoritama koji se koristi za...
HAL je skraćenica koja označava: 
BIOS (basic input-output system) izvršava POST (Power On Self...
Bootstraping je pojam u računarstvu koji se odnosi  na: 
Resursi računarskog sistema obuhvataju: 
Računarska mreža predstavlja skup međusobno povezanih računara...
Koliko slojeva ima OSI referentni model? 
Za dešifrovanje poruke, neophodno je imati
Jedan od nabrojanih pojmova je "uljez". Koji? 
Namenski server je računar koji je optimizovan za brzo opsluživanje...
IP adrese klase B nalaze se u opsegu:
Maska podmreže je:
Cloud manager pripada:
VI se najčešće koristi da poveća performanse onih mehanizama...
Stek sekcija memorije jednog procesa služi za:
Koje su 4 generalizovane kategorije napada? 
Kernel je:
Na sledećoj slici prikazano je: 
Ruter je mrežni uređaj koji pripada:
TCP/IP je:
Na sledećoj sliciPrikazana je interakcija korisnika...
Šta označava broj porta 443?
Koncept prema kome organizacije su vlasnice nad infrastrukturom oblaka...
Platforma u vidu servisa omogućava korisniku da konfiguriše...
SATA (Serial Advanced Technology Attachment) je naziv za: 
Hipervizor (hypervisor) je:
Koncept gde se kompanije ne bave infrastrukturom i održavanje servisa...
Cluster managers pripada:
IaaS se realizuje:
Izmena je aktivan napad na integritet (integrity) dok je Fabrikovanje...
Ispitivački napadi za cilj imaju: 
Na sledećoj slici, Prikazana je interakcija korisnika...
Aplikacioni sloj TCP/IP skupa protokola:
Opšti slojevi u arhitekturi u vidu servisa su:
DHCP je skraćenica za:
Pristup PaaS-u putem web čitača predstavlja bezbednosni rizik:
U binarnom obliku IP adrese klase A počinju sa: 
Utičnicu (socket) čine:
Kao odgovor na aktivnosti unutar mreže koji mogu da ukažu na napade...
Proces je: 
Procesor je nedeljivi resurs.
Na sledećoj slici prikazano je:
Računar gost (guest machine) je:
Koncept gde kompanije iznajmljuju servise za širi broj...
Serveri, sistemi za skladištenje podataka i umrežavanje deo...
IPSec podržava Transport mode I Tunnel mode kao režime rada I...
U hijerarhiji operativnog sistema:
Distribuirani sistemi mogu biti realizovani na dva načina: 
Dodeljivanje procesora procesima radi:
Na najnižem nivou strukture virtuelnih mašina se nalazi:
UDP (User Datagram Protocol) pripada:
Privatne mreže su namenjene:
Computer managers pripada:
Koje od sledećih karakteristika nije prednost IaaS-a:
Koji su protokoli unutar Secure Socket Layer-a (SSL)? (pitanje sa...
Šta predstavlja protocol tipa Single-Sign-On kod kriptografskog...
Različiti operativni sistemi (Windows, Linux…) ne mogu da...
Faza napada "Uradi ono što si naumio" predstavlja odbijanje...
Funkcija fizičkog sloja OSI referentnog modela je:
Sa kojim znakom počinju imena promenljivih u PowerShell-u? 
U koju vrstu napada spade DoS/DDoS? 
Osnovna funkcija jezgra operativnog sistema je: 
Virtuelizacija je:
Koncentrator (hub) je mrežni uređaj koji pripada:
Koji od kriptografskih protokola sadrži serversku uslugu za izdavanje...
Virtuelizacija memorije podrazumeva:
Računar domaćin (host machine) je:
Funkcija mrežnog sloja OSI referentnog modela je:
Sigurnosni mehanizam (security mechanism): 
Distribuirani sistemi su:
Šta od navedenog predstavlja primer sigurnosne usluge? (pitanje...
Konkurentnost kao svojstvo operativnog sistema odnosi se na: 
Kod parcijalne vrituelizacije:
SaaS korisnik može da instalira na svom računaru:
Za koje od sledećih tipova softvera je SaaS odgovarajući:
Kod paravirtualizacije:
Nakon što više korisničkih programa pošalje...
Funkciju filtriranja paketa imaju:
Savremena virtuelizacija dozvoljava pokretanje više instanci...
Adresa lokalne petlje (local loopback address) je: 
Podoblasti Informacione Sigurnosti su relativno složene ali se ipak...
Napadi koji za posledicu imaju nedostupnost resursa su: 
Koje su prednosti biometrijske provere identiteta u odnosu na ostale...
Kod infrastrukture u vidu servisa cena resursa ne zavisi od...
PaaS klijentu omogućava da:
Puna (nativna) virtuelizacija, parcijalna virtuelizacija i...
Virtuelizacija sesija omogućava:
Da bi smo napravili novi folder, koju reč moramo dodati u polje u...
Kao odgovor na aktivnosti unutar mreže koji mogu da ukažu na napade...
Koju komandu u okviru PowerShell-a koristimo za brisanje? 
Eksterna i interna virtuelizacija su tipovi:
Načini autentifikacije mogu biti: (pitanje sa više mogućih...
Koja komanda u PowerShell-u služi za kretanje i pozicioniranje kroz...
Koju komandu u okviru PowerShell-a koristimo za proveru da li neka...
Puna virtuelizacija podrazumeva razdvajanje operativnog sistema i...
PaaS obično ne sadrži web ili aplikativni server:
Faza napada "Održi pristup" predstavlja iskorišćavanje...
Šta nije karakteristika mreže ravnopravnih računara?
Od čega sve zavisi efikasno izvršavanje virtuelnih...
Šta od ponuđenog predstavlja algoritme za šifrovanje...
Šta od navedenog predstavlja kategoriju napada po Kendall-ovoj...
Koji su osnovni koraci (faze) u toku izvršenja neke vrste...
Alert!

Advertisement