Sis - Drugi Kolokvijum

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Mladjalug96
M
Mladjalug96
Community Contributor
Quizzes Created: 2 | Total Attempts: 14,342
Questions: 185 | Attempts: 7,548

SettingsSettingsSettings
Sis - Drugi Kolokvijum - Quiz


Questions and Answers
  • 1. 

    PGP koristi:

    • A.

      Asimetrične algoritme

    • B.

      I simetrične i asimetrične algoritme

    • C.

      Simetrične algoritme

    • D.

      Simetrične algoritme, asimetrične alogiritme i kompresiju

    Correct Answer
    D. Simetrične algoritme, asimetrične alogiritme i kompresiju
    Explanation
    PGP (Pretty Good Privacy) koristi simetrične algoritme za brzu i efikasnu enkripciju podataka. Također koristi asimetrične algoritme za sigurnu razmjenu ključeva između pošiljaoca i primatelja. Kompresija se također koristi kako bi se smanjila veličina podataka i poboljšala brzina prijenosa. Kombinacija ovih tehnika pruža visoku razinu sigurnosti i učinkovitosti u zaštiti privatnosti podataka.

    Rate this question:

  • 2. 

    Izabrati tačan iskaz:

    • A.

      Ni ACL lista ni C lista nisu izvedene iz Lampsonove kontrolne matrice

    • B.

      I ACL lista i C lista su izvedene iz Lampsonove kontrolne matrice

    • C.

      ACL lista jeste a C lista nije izvedena iz Lampsonove kontrolne matrice

    • D.

      C lista jeste a ACL lista nije izvedena iz Lampsonove kontrolne matrice

    Correct Answer
    B. I ACL lista i C lista su izvedene iz Lampsonove kontrolne matrice
    Explanation
    The correct answer is "i ACL lista i C lista su izvedene iz Lampsonove kontrolne matrice" which translates to "both ACL list and C list are derived from Lampson's access control matrix." This statement indicates that both ACL list and C list are derived from Lampson's control matrix, implying that they are both related to the access control mechanism proposed by Lampson.

    Rate this question:

  • 3. 

    Koliko osnovnih tipova mrežnih barijera postoji:

    • A.

      4

    • B.

      2

    • C.

      3

    • D.

      1

    Correct Answer
    C. 3
    Explanation
    There are three basic types of network barriers.

    Rate this question:

  • 4. 

    Autentifikacija (samo) smart karticom je odluka na osnovu nečega:

    • A.

      što korisnik zna

    • B.

      što korisnik ima

    • C.

      što korisnik jeste

    • D.

      što korisnik zna da ima

    Correct Answer
    B. što korisnik ima
    Explanation
    The correct answer is "što korisnik ima" because authentication with a smart card is based on something that the user possesses, in this case, the smart card itself.

    Rate this question:

  • 5. 

    U praksi, u kodovima se pojavljuje bar jedna greška na svakih:

    • A.

      2000 linija koda

    • B.

      1500 linija koda

    • C.

      2500 linija koda

    • D.

      1000 linija koda

    Correct Answer
    A. 2000 linija koda
    Explanation
    In practice, it is common to encounter at least one error in every 2000 lines of code. This suggests that errors are expected to occur relatively frequently in code, and developers should be prepared to debug and fix them. The other options (1500, 2500, and 1000 lines of code) imply either a higher or lower error rate, which is not consistent with the given statement.

    Rate this question:

  • 6. 

    Ukoliko se poseduje samo exe fajl a postoji namera (potreba) da se analizira i izmeni kod neophodan alat je:

    • A.

      Samo disasembler i hex editor

    • B.

      Samo dibager i hex editor

    • C.

      Samo disasembler

    • D.

      I disasembler i dibager

    Correct Answer
    D. I disasembler i dibager
    Explanation
    If one only has an exe file and there is a need to analyze and modify the code, the necessary tools are a disassembler and a debugger. A disassembler is used to convert the machine code into assembly language, allowing for a better understanding of the code structure and logic. A debugger, on the other hand, is used to execute the code step by step, allowing for the identification of bugs and the ability to modify the code during runtime. Using both tools together provides a comprehensive approach to analyzing and modifying the code in the given scenario.

    Rate this question:

  • 7. 

    Nedostatak fizičke podele resursa je to što:

    • A.

      Traži pažljivo planiranje, implementaciju i kontrolu u toku rada

    • B.

      Ne rešava problem sukoba između procesa/korisnika

    • C.

      Je skupo i nepraktično

    • D.

      Može lako da dođe do zloupotrebe podataka

    Correct Answer
    C. Je skupo i nepraktično
    Explanation
    The answer "je skupo i nepraktično" suggests that the lack of physical resource partitioning is expensive and impractical. This means that implementing a system without dividing resources can be costly and not efficient in terms of resource allocation. It implies that without proper resource division, there may be wastage of resources and inefficiencies in their utilization.

    Rate this question:

  • 8. 

    Тајност комуникација је:

    • A.

      пожељно право

    • B.

      загарантовано право

    • C.

      подразумевано право

    • D.

      етичко право

    Correct Answer
    B. загарантовано право
    Explanation
    The correct answer is "загарантовано право" (guaranteed right). This means that the secrecy of communication is a right that is ensured or guaranteed.

    Rate this question:

  • 9. 

    U praksi, biometrijsku autentifikaciju je najbolje vršiti pomoću:

    • A.

      Karakteristika irisa, dlana ili otiska prsta bez razlike

    • B.

      Geometrije dlana

    • C.

      Otiska prsta

    • D.

      Karakteristika irisa

    Correct Answer
    C. Otiska prsta
    Explanation
    Biometrijska autentifikacija je najbolje vršiti pomoću otiska prsta jer otisak prsta je jedinstven za svaku osobu i teško ga je falsifikovati. Osim toga, otisak prsta je lako dostupan i jednostavan za skeniranje i upoređivanje sa bazom podataka. Karakteristike irisa takođe mogu biti korisne za biometrijsku autentifikaciju, ali skeniranje irisa zahteva posebne uređaje i može biti komplikovano za korišćenje u svakodnevnoj praksi. Geometrija dlana može biti korisna, ali nije toliko precizna kao otisak prsta.

    Rate this question:

  • 10. 

    Detekcija anomalija kao metoda za otkrivanje zlonamernih programa se zasniva na:

    • A.

      Registrovanju neuobičajenog ponašanja

    • B.

      Traženju sličnosti sa već poznatim zlonamernim programima

    • C.

      Reverznom inženjeringu

    • D.

      Praćenju promena u fajlovima

    Correct Answer
    A. Registrovanju neuobičajenog ponašanja
    Explanation
    Anomaly detection as a method for detecting malicious programs is based on the detection of unusual behavior. It involves monitoring and analyzing the actions and activities of a system or program, and identifying any deviations from normal patterns or expected behavior. By detecting these anomalies, it is possible to identify potential threats or malicious activities that may be indicative of a malicious program. This approach is effective because it does not rely solely on known patterns or signatures of malicious programs, but instead focuses on identifying any abnormal or suspicious behavior.

    Rate this question:

  • 11. 

    TCB (Trusted Computing Base) je:

    • A.

      Deo operativnog sistema zadužen za beleženje podataka o aktivnostima

    • B.

      Deo sigurnog jezgra koji je zadužen za kontrolu pristupa

    • C.

      Deo jezgra zadužen za sigurnosno kritične operacije

    • D.

      Skup zaštitnih mehanizama implementiranih u operativnom sistemu za koje se veruje da obezbeđuju zahteve sigurnosti

    Correct Answer
    D. Skup zaštitnih mehanizama implementiranih u operativnom sistemu za koje se veruje da obezbeđuju zahteve sigurnosti
    Explanation
    TCB (Trusted Computing Base) refers to a set of protective mechanisms implemented in an operating system that are believed to provide security requirements. These mechanisms are designed to ensure the security and integrity of the system, protecting it from unauthorized access and malicious activities. The TCB is responsible for maintaining the security of critical operations and is considered a trusted component within the operating system. It includes various security measures, such as access control, authentication, encryption, and auditing, that work together to provide a secure computing environment.

    Rate this question:

  • 12. 

    Koji program ovde ne pripada:

    • A.

      Code red

    • B.

      Morris Warm

    • C.

      Brain

    • D.

      SQL Slammer

    Correct Answer
    C. Brain
    Explanation
    The given options are all names of computer programs or viruses, except for "Brain." Brain does not belong in this list because it is not a program or virus; it is a term commonly used to refer to the human brain or intelligence. The other options, Code red, Morris Warm, and SQL Slammer, are all well-known computer programs or viruses.

    Rate this question:

  • 13. 

    Šta ne spada u osnovne zadatke NGSCB (Next Generation Secure Computing Base):

    • A.

      Jaka izolacija procesa

    • B.

      Atest

    • C.

      DRM

    • D.

      Bezbedno skladištenej podataka i siguran prenos podataka

    Correct Answer
    C. DRM
    Explanation
    DRM (Digital Rights Management) does not fall under the basic tasks of NGSCB (Next Generation Secure Computing Base). NGSCB focuses on strong process isolation, testing, secure data storage, and secure data transmission. DRM, on the other hand, is a technology used to protect digital content and enforce copyright restrictions. While DRM can contribute to secure computing, it is not a fundamental aspect of NGSCB.

    Rate this question:

  • 14. 

    U biometrijskim sistemima prilikom autentifikacije (verifikacije) :

    • A.

      Postoje 3 faze

    • B.

      Postoje 4 faze

    • C.

      Broj faza zavisi od tipa biometrije

    • D.

      Postoje 2 faze

    Correct Answer
    D. Postoje 2 faze
    Explanation
    In biometric systems, there are two phases of authentication (verification). This means that during the process of verifying someone's identity using biometric data, there are two distinct stages or steps involved. The question does not provide any information about the specific phases or what they entail, but it states that there are two phases in total.

    Rate this question:

  • 15. 

    Faza prepoznavanja je faza kod:

    • A.

      Autentifikacije koja se zasniva na nečemu što jeste

    • B.

      Autentifikacije koja se zasniva na nečemu što imate

    • C.

      Autentifikacije koja se zasniva na nečemu što znate

    • D.

      Dvofaktorske autentifikacije

    Correct Answer
    A. Autentifikacije koja se zasniva na nečemu što jeste
    Explanation
    The correct answer is "autentifikacije koja se zasniva na nečemu što jeste." This refers to authentication based on something you are, such as biometric data like fingerprints or facial recognition.

    Rate this question:

  • 16. 

    Prednosti metode za detekciju zlonamernih programa koja se zasniva na praćenju promena je to što:

    • A.

      Ne traži ažuriranje baze kontrolnih vrednosti

    • B.

      Je brza metoda

    • C.

      Može da detektuje i do tada nepoznate zlonamerne programe

    • D.

      što ne traži angažovanje korisnika

    Correct Answer
    C. Može da detektuje i do tada nepoznate zlonamerne programe
    Explanation
    The advantage of the method for detecting malicious programs based on monitoring changes is that it can detect previously unknown malicious programs. This means that even if a malicious program has not been identified or added to a database of known threats, this method can still identify and detect it. This is a valuable feature as it allows for proactive detection and protection against emerging threats. Additionally, this method does not require the involvement of the user, making it a convenient and efficient way to detect and mitigate the risks posed by malicious programs.

    Rate this question:

  • 17. 

    Metamorfični zlonamerni program:

    • A.

      Menja svoj oblik i delimično funkcionalnost u već zaraženom sistemu

    • B.

      Menja svoj oblik ali zadržava funkcionalnost u već zaraženom sistemu

    • C.

      Menja svoj oblik i funkcionalnost pre nego što inficira novi sistem

    • D.

      Menja svoj oblik ali zadržava funkcionalnost pre nego što inficira novi sistem

    Correct Answer
    D. Menja svoj oblik ali zadržava funkcionalnost pre nego što inficira novi sistem
    Explanation
    The correct answer is "menja svoj oblik ali zadržava funkcionalnost pre nego što inficira novi sistem". This means that a metamorphic malware changes its shape but retains its functionality before infecting a new system. This type of malware is capable of modifying its code and structure, making it difficult to detect and analyze by antivirus software. By changing its form, the malware can evade detection and continue to spread to other systems while maintaining its harmful capabilities.

    Rate this question:

  • 18. 

    Dvo faktorska autentifikacija zahteva:

    • A.

      Tačno 2 od 3 stavke - nešto što znate i imate

    • B.

      Bilo koje 2 od 3 stavke (nešto što znate/imate/jeste)

    • C.

      Tačno 2 od 3 stavke - nešto što jeste i imate

    • D.

      Tačno 2 od 3 stavke - nešto što znate i jeste

    Correct Answer
    B. Bilo koje 2 od 3 stavke (nešto što znate/imate/jeste)
    Explanation
    The correct answer is "bilo koje 2 od 3 stavke (nešto što znate/imate/jeste)". This means that any combination of two out of the three factors (something you know, something you have, something you are) can be used for two-factor authentication. It allows flexibility in choosing the most convenient and secure combination of factors for authentication purposes.

    Rate this question:

  • 19. 

    Single sign on je postupak kojim se obezbeđuje:

    • A.

      Zaštita sistema takva da korisnik ima samo jedan pokušaj za prijavu sistemu

    • B.

      Da sistemu može da se pristupa samo preko jedinstvene lozinke/biometrije/uređaja...

    • C.

      Da sistemu može da pristupa samo jedna određena osoba

    • D.

      Da se korisnik prijavljuje samo jedanput a sve ostale naknadne prijave se obavljaju automatski

    Correct Answer
    D. Da se korisnik prijavljuje samo jedanput a sve ostale naknadne prijave se obavljaju automatski
    Explanation
    Single sign on (SSO) je postupak koji omogućava korisniku da se prijavi samo jednom, a sve ostale naknadne prijave se automatski obavljaju. Ovo omogućava korisniku da pristupa različitim sistemima i aplikacijama bez potrebe za ponovnim unošenjem korisničkog imena i lozinke. SSO poboljšava korisničko iskustvo, povećava produktivnost i smanjuje rizik od zaboravljanja lozinki ili njihovog kompromitovanja.

    Rate this question:

  • 20. 

    Salami Attack predstavlja:

    • A.

      Kod koji se integriše u više različitih delova računara

    • B.

      Serija malih beznačajnih napada koji se mnogo puta ponavljaju

    • C.

      Napad koji otvara zadnja vrata (backdoor) na računaru za druge zlonamerne programe

    • D.

      Napad koji dugo ostaje neotkriven

    Correct Answer
    B. Serija malih beznačajnih napada koji se mnogo puta ponavljaju
    Explanation
    Salami Attack predstavlja seriju malih beznačajnih napada koji se mnogo puta ponavljaju. Ovaj tip napada se koristi za krađu ili prevaru putem malih, neprimetnih transakcija koje pojedinačno ne izazivaju sumnju, ali kada se svi ti mali delovi slože, mogu prouzrokovati značajnu štetu. Napadači koriste ovu taktiku kako bi izbegli otkrivanje i prouzrokovali finansijsku ili druge vrste štete.

    Rate this question:

  • 21. 

    Jedno od mogućih rešenja za single sign on je:

    • A.

      Keyboard logger

    • B.

      Smart kartica

    • C.

      Generator lozinki

    • D.

      Rečnik lozinki

    Correct Answer
    B. Smart kartica
    Explanation
    A possible solution for single sign-on is a smart card. Smart cards are a secure and convenient way to authenticate users and grant them access to multiple systems and applications with just one login. They store encrypted credentials and can be easily plugged into a device or used wirelessly for authentication. By using a smart card, users can securely access various resources without the need to remember multiple usernames and passwords.

    Rate this question:

  • 22. 

    Za prikupljanje naizgled nebitnih podataka sa više različitih izvora koji objedinjeni daju konkretnu informaciju koristi se:

    • A.

      Vremenske bombe

    • B.

      Napad linearizacijom

    • C.

      Salami attack

    • D.

      Trojanski konj

    Correct Answer
    C. Salami attack
    Explanation
    The correct answer is "salami attack". A salami attack is a type of cyber attack where small, seemingly insignificant pieces of data are stolen or manipulated over a period of time. These small pieces of data are often not noticeable, but when combined, they can provide valuable information or resources to the attacker. This method is used to avoid detection and raise minimal suspicion.

    Rate this question:

  • 23. 

    Једна од непожељних особина генератора псеудо случајних бројева је:

    • A.

      то што не могу да се користе за OTP шифру

    • B.

      то што му је за рад потребна почетна вредност

    • C.

      то што се у њиховом раду користе компликоване математичке функције

    • D.

      периодичност

    Correct Answer
    D. периодичност
    Explanation
    The correct answer is "периодичност" (periodicity). This refers to the undesirable characteristic of pseudo-random number generators where the sequence of generated numbers repeats after a certain period. This can be problematic for certain applications, such as generating one-time passwords (OTP) for encryption, as it increases the likelihood of predicting future numbers in the sequence based on previous numbers.

    Rate this question:

  • 24. 

    Autentifikacija pomoću smart kartice gde se dodatno zahteva i ukucavanje PIN koda je autentifikacija na osnovu nečega što:

    • A.

      Korisnik ima, zna i jeste

    • B.

      Korisnik ima i zna

    • C.

      Korisnik ima i jeste

    • D.

      Korisnik zna i jeste

    Correct Answer
    B. Korisnik ima i zna
    Explanation
    The correct answer is "korisnik ima i zna" because authentication using a smart card requires the user to possess (ima) the physical card and know (zna) the associated PIN code. This combination of something the user possesses and something the user knows provides an additional layer of security for authentication.

    Rate this question:

  • 25. 

    # u konfiguracijskoj datoteci aide.conf znači:

    • A.

      Da se naredba posle nje proverava

    • B.

      Da se naredba posle nje ne proverava

    • C.

      Ništa od navedenog

    • D.

      Komentar

    Correct Answer
    D. Komentar
    Explanation
    The given answer "komentar" suggests that in the configuration file aide.conf, the line is a comment and does not have any effect on the execution of commands. It is not a command to be checked or skipped.

    Rate this question:

  • 26. 

    ! u konfiguracijskoj datoteci aide.conf znači:

    • A.

      Da se naredba posle nje ne proverava

    • B.

      Da se naredba posle nje proverava

    • C.

      Komentar

    • D.

      Ništa od navedenog

    Correct Answer
    A. Da se naredba posle nje ne proverava
    Explanation
    In the configuration file aide.conf, the phrase "da se naredba posle nje ne proverava" means that the command following it will not be checked. This suggests that the configuration file has a specific rule or setting that allows certain commands to be skipped or ignored during the checking process.

    Rate this question:

  • 27. 

    Ako je u konfiguracijskoj datoteci aide.conf zadato pravilo: low=s+shal+c i ako je primenjeno na datoteku primer, i ako istoj datoteci promenimo prava:

    • A.

      AIDE će registrovati promenu bez navođenja i informacije mtime

    • B.

      AIDE će registrovati promenu navođenjem i informacije mtime

    • C.

      Ništa od navedenog

    • D.

      AIDE neće registrovati promenu

    Correct Answer
    A. AIDE će registrovati promenu bez navođenja i informacije mtime
    Explanation
    The given answer states that AIDE will register the change without specifying and providing information about mtime. This suggests that AIDE will detect and record the modification made to the file "primer" in the configuration file "aide.conf", but it will not include details about the modification time (mtime).

    Rate this question:

  • 28. 

    AIDE naredba provere sistema je:

    • A.

      Ništa od navedenog

    • B.

      $aide -c /etc/aide/aide.conf.autogenerated -C

    • C.

      $cp /var/lib/aide/aide.db.new /var/lib/aide/aide.db

    • D.

      $aide -c /etc/aide/aide.conf.autogenerated -i

    Correct Answer
    B. $aide -c /etc/aide/aide.conf.autogenerated -C
    Explanation
    The correct answer is "$aide -c /etc/aide/aide.conf.autogenerated -C" because this command is used to run the AIDE (Advanced Intrusion Detection Environment) system check. It specifies the configuration file to be used (-c /etc/aide/aide.conf.autogenerated) and performs a check of the file integrity database (-C). This command helps to ensure the security and integrity of the system by comparing the current state of files with a previously generated database.

    Rate this question:

  • 29. 

    AIDE naredba inicijalizacije sistema je:

    • A.

      $cp /var/lib/aide/aide.db.new /var/lib/aide/aide.db

    • B.

      $aide -c /etc/aide/aide.conf.autogenerated -i

    • C.

      Ništa od navedenog

    • D.

      $aide -c /etc/aide/aide.conf.autogenerated -C

    Correct Answer
    B. $aide -c /etc/aide/aide.conf.autogenerated -i
    Explanation
    The correct answer is "$aide -c /etc/aide/aide.conf.autogenerated -i". This is the correct command for initializing the AIDE system. It specifies the configuration file to use (-c /etc/aide/aide.conf.autogenerated) and the option to initialize the database (-i).

    Rate this question:

  • 30. 

    Informacije o promeni sistema AIDE skladišti:

    • A.

      Prvo u bazu aide.db.new ali se potom mora ručno iskopirati u aide.db

    • B.

      Direktno u bazu aide.db

    • C.

      Ništa od navedenog

    • D.

      U bazu aide.db.new ali se automatski kopira u aide.db

    Correct Answer
    A. Prvo u bazu aide.db.new ali se potom mora ručno iskopirati u aide.db
    Explanation
    The correct answer is "prvo u bazu aide.db.new ali se potom mora ručno iskopirati u aide.db". This means that the changes in the AIDE system storage are first made in the aide.db.new database, but then they need to be manually copied into the aide.db database. This suggests that the changes are not automatically reflected in the main database and require a manual step for them to take effect.

    Rate this question:

  • 31. 

    Nakon izvršenja koda: @echo off :a ping localhost>>a.txt goto :a dešava se:

    • A.

      Napad prekoračenja bafera

    • B.

      SQL injection napad

    • C.

      DOS napad

    • D.

      XSS napad

    Correct Answer
    C. DOS napad
    Explanation
    The given code is an infinite loop that continuously pings the localhost and appends the output to the "a.txt" file. This creates a Denial of Service (DOS) attack as it overwhelms the system with excessive network traffic and consumes its resources, causing it to become unresponsive or crash.

    Rate this question:

  • 32. 

    Pravo x nad direktorijumom u Linux OS znači:

    • A.

      čitanje sadržaja direktorijuma

    • B.

      Izmena sadržaja direktorijuma

    • C.

      Pozicioniranje, prikazivanje dugog listinga i pretraživanje

    • D.

      Samo pozicioniranje

    Correct Answer
    C. Pozicioniranje, prikazivanje dugog listinga i pretraživanje
    Explanation
    The correct answer is "pozicioniranje, prikazivanje dugog listinga i pretraživanje". This means that having "pravo x nad direktorijumom" in Linux OS allows the user to navigate to and view the contents of the directory, display a long listing of the directory's contents, and search for specific files or directories within it.

    Rate this question:

  • 33. 

    U Linux OS pravo 654 odgovara:

    • A.

      Rw---wxr-x

    • B.

      R-x-wxrw-

    • C.

      Rw-r-xr--

    • D.

      R-xrw-r--

    Correct Answer
    C. Rw-r-xr--
    Explanation
    The given answer "rw-r-xr--" represents the file permissions for the Linux OS. Each group of three characters (r, w, x) represents the permissions for the owner, group, and others respectively. In this case, the owner has read and write permissions, the group has read and execute permissions, and others have only read permissions.

    Rate this question:

  • 34. 

    Nakon izvršenja koda: @echo off :a dir>>a.txt goto :a :

    • A.

      A.txt ne menja veličinu

    • B.

      A.txt se neprekidno uvećava

    • C.

      Uvek se nanovo prepisuje isti sadržaj u a.txt

    • D.

      Matični direktorijum se puni novim datotekama

    Correct Answer
    B. A.txt se neprekidno uvećava
    Explanation
    After executing the given code, the file "a.txt" does not change in size.

    Rate this question:

  • 35. 

    Prilikom slanja podataka iz html forme, može se reći da:

    • A.

      Zavisi koji je podrazumevani metod

    • B.

      Metod GET otkriva podatke

    • C.

      Zavisi od web čitača

    • D.

      Metod POST otkriva podatke

    Correct Answer
    B. Metod GET otkriva podatke
    Explanation
    When sending data from an HTML form, it can be said that the method GET reveals the data. This means that when using the GET method, the data entered in the form will be visible in the URL of the webpage. This can be seen in the browser's address bar, making it less secure for sending sensitive or confidential information. On the other hand, the method POST does not reveal the data in the URL, providing a more secure way of sending data. However, the answer does not mention that it depends on the web browser, as different browsers may have different default methods for form submission.

    Rate this question:

  • 36. 

    Kod velikih sistema direktna primena Lampsonove matrice je:

    • A.

      Nemoguća

    • B.

      Složena i spora za izvršenje

    • C.

      Preporučljiva

    • D.

      Obavezna

    Correct Answer
    B. Složena i spora za izvršenje
    Explanation
    The correct answer is "složena i spora za izvršenje" which translates to "complex and slow to execute" in English. This suggests that the direct application of Lampson's matrix in large systems is complicated and time-consuming.

    Rate this question:

  • 37. 

    Mrežna barijera tipa packet filter:

    • A.

      Analizira kompletan paket ali ne prati stanje konekcije

    • B.

      Analizira samo zaglavlja paketa ali ne prati stanje konekcije

    • C.

      Analizira zaglavlja paketa i prati stanje konekcije

    • D.

      Analizira kompletan paket i pamti stanje konekcije

    Correct Answer
    B. Analizira samo zaglavlja paketa ali ne prati stanje konekcije
    Explanation
    A packet filter network barrier analyzes only the headers of the packets but does not keep track of the connection state. This means that it examines the source and destination IP addresses, port numbers, and other header information to make decisions about allowing or blocking the packets, but it does not maintain any information about the ongoing connection.

    Rate this question:

  • 38. 

    Bitno svojstvo IDS-a zasnovanog na potpisu je:

    • A.

      Otkrivanje i nepoznatih napada

    • B.

      Brzo i jednostavno otkrivanje već poznatih napada

    • C.

      Mogućnost otkrivanja anomalija u sistemu

    • D.

      To što ne moraju da se ažuriraju

    Correct Answer
    B. Brzo i jednostavno otkrivanje već poznatih napada
    Explanation
    The correct answer is "brzo i jednostavno otkrivanje već poznatih napada." This is because IDS (Intrusion Detection System) based on signatures is designed to quickly and easily detect known attacks. It does this by comparing network traffic or system activity against a database of known attack signatures. When a match is found, the IDS raises an alert to notify the administrator. This approach is efficient for detecting known attacks but may not be effective in detecting unknown or novel attacks.

    Rate this question:

  • 39. 

    Autentifikacija pomoću otiska prsta je odluka na osnovu nečega:

    • A.

      što korisnik jeste

    • B.

      što korisnik zna

    • C.

      što korisnik ima

    • D.

      što korisnik zna da ima

    Correct Answer
    A. što korisnik jeste
    Explanation
    The correct answer is "što korisnik jeste" which translates to "what the user is" in English. This refers to the authentication method using fingerprint, where the user's identity is verified based on their unique fingerprint pattern. Unlike the other options which involve knowledge or possession, this method relies on the inherent physical characteristic of the user.

    Rate this question:

  • 40. 

    Kod challenge-response autentifikacije, ukoliko Boban želi da autentifikuje Anu on joj šalje:

    • A.

      Slučajnu vrednost

    • B.

      Heš vrednost svoje lozinke

    • C.

      Svoju lozinku kojoj je dopisana slučajna vrednost

    • D.

      Heš slučajne vrednosti

    Correct Answer
    A. Slučajnu vrednost
    Explanation
    In the challenge-response authentication, Boban sends Ana a random value. This random value is used to verify Ana's identity. By sending a random value, Boban ensures that the authentication process is secure and cannot be easily replicated by an attacker. The random value adds an additional layer of security to the authentication process, making it more difficult for unauthorized individuals to gain access.

    Rate this question:

  • 41. 

    Primenom disasemblera od binarnog koda dobija se:

    • A.

      Precizan izvorni kod višeg programskog jezika iz koga je binarni fajl kompajliran

    • B.

      Neprecizan asemblerski kod

    • C.

      Precizan asemblerski kod

    • D.

      Neprecizan izvorni kod višeg programskog jezika iz koga je binarni fajl kompajliran

    Correct Answer
    B. Neprecizan asemblerski kod
    Explanation
    When disassembling binary code, the result obtained is an imprecise assembly code. Disassembling involves converting machine code back into assembly code, but the process is not perfect and can result in some loss of information or accuracy. Therefore, the correct answer is "neprecizan asemblerski kod" which translates to "imprecise assembly code" in English.

    Rate this question:

  • 42. 

    Granične adrese koje koristi jedan korisnik/proces kod istoimene metode mogu da budu:

    • A.

      Samo obe dinamičke

    • B.

      Obe istovremeno statičke ili obe istovremeno dinamičke

    • C.

      Početna statička a krajnja dinamička

    • D.

      Samo obe statičke

    Correct Answer
    B. Obe istovremeno statičke ili obe istovremeno dinamičke
    Explanation
    The possible boundary addresses that can be used by a user/process for the same method can either be both static or both dynamic at the same time. This means that either both the starting and ending addresses are static or both are dynamic.

    Rate this question:

  • 43. 

    Uobičajeno, zlonamerni programi se dele na osnovu:

    • A.

      štete koju čine u sistemu

    • B.

      Težine detektovanja

    • C.

      Principa širenja i delovanja

    • D.

      Načina neutralisanja

    Correct Answer
    C. Principa širenja i delovanja
    Explanation
    Zlonamerni programi se obično klasifikuju prema principu širenja i delovanja, što znači da se razlikuju na osnovu načina na koji se šire i kako utiču na sistem. Ova klasifikacija omogućava razumevanje različitih strategija i taktika koje zlonamerni programi koriste, kao i njihovih karakteristika i sposobnosti. Na osnovu principa širenja i delovanja, moguće je razviti odgovarajuće mere zaštite i neutralisanja ovih programa.

    Rate this question:

  • 44. 

    Који модел PKI (Public Key Infrastructure) се користи код савремених Интернет претраживача:

    • A.

      претраживачи у свом раду немају потребу да користе PKI

    • B.

      олигархијски модел

    • C.

      монополски модел

    • D.

      зависи од претраживача

    Correct Answer
    B. олигархијски модел
    Explanation
    The given answer, "олигархијски модел" (oligarchic model), suggests that modern internet browsers use an oligarchic model for PKI (Public Key Infrastructure). This means that a small group of powerful entities control the issuance and management of digital certificates, which are used to verify the authenticity of websites and establish secure connections. In this model, the trust and security of the PKI system are concentrated in the hands of a few major players, rather than being distributed among a larger network of entities.

    Rate this question:

  • 45. 

    Фејстелова шифра (мрежа) представља:

    • A.

      посебан секвенцијалан алгоритам

    • B.

      посебан блоковски алгоритам

    • C.

      идејно решење секвенцијалне шифре

    • D.

      једно идејно решење блоковске шифре

    Correct Answer
    D. једно идејно решење блоковске шифре
    Explanation
    The correct answer is "једно идејно решење блоковске шифре" which translates to "an conceptual solution for a block cipher". This means that the Feistel cipher (network) represents a conceptual solution for a block cipher, indicating that it is a specific approach or design for implementing a block cipher algorithm.

    Rate this question:

  • 46. 

    Modeli sigurnosti:

    • A.

      Detaljno propisuju dodatna ograničenja i određuju način njihove realizacije

    • B.

      Uvode jasno definisana ograničenja na dodatne mere

    • C.

      Daju striktna uputstva o realizaciji dodatnih mera

    • D.

      Samo daju preporuke za dodatna ograničenja

    Correct Answer
    D. Samo daju preporuke za dodatna ograničenja
    Explanation
    The correct answer is "samo daju preporuke za dodatna ograničenja". This is because the other options in the given statements describe security models that provide detailed specifications, introduce clearly defined constraints, and give strict instructions for implementing additional measures. However, the correct answer states that security models only provide recommendations for additional constraints, suggesting that they do not impose strict requirements or provide detailed specifications.

    Rate this question:

  • 47. 

    Mrežna barijera tipa stateful packet filter:

    • A.

      Analizira samo zaglavlja paketa ali ne prati stanje konekci

    • B.

      Analizira kompletan paket ali ne prati stanje konekcije

    • C.

      Analizira zaglavlja paketa i prati stanje konekcije

    • D.

      Analizira kompletan paket i pamti stanje konekcije

    Correct Answer
    C. Analizira zaglavlja paketa i prati stanje konekcije
    Explanation
    The correct answer is "analizira zaglavlja paketa i prati stanje konekcije." This means that the stateful packet filter analyzes the headers of packets and also keeps track of the connection state. It not only examines the basic information in the packet headers but also maintains information about the ongoing connections, such as the source and destination IP addresses, port numbers, and sequence numbers. This allows the stateful packet filter to make more informed decisions about allowing or blocking packets based on the connection state.

    Rate this question:

  • 48. 

    Stalno ažuriranje IDS-a zasnovanog na potpisu je:

    • A.

      Nepreporučljivo

    • B.

      Preporučljivo

    • C.

      Nebitno za rad sistema

    • D.

      Neophodno

    Correct Answer
    D. NeopHodno
    Explanation
    Updating a signature-based IDS is necessary because signatures are used to identify known patterns of malicious activity. Without regular updates, the IDS would not be able to detect new and emerging threats, leaving the system vulnerable. Regular updates ensure that the IDS has the latest signatures to effectively identify and block potential attacks, making it an essential practice for maintaining the security of the system.

    Rate this question:

  • 49. 

    Cilj savršene sigurnosti unazad (PFC) je:

    • A.

      Da se spreči da neovlašćeno lice sazna sesijski ključ

    • B.

      Da se spreči da neovlašćeno lice dešifruje poruke koje su ranije razmenjene čak i ako naknadno sazna tajni ključ

    • C.

      Da se spreči ponovljeno slanje poruke od strane neovlašćenog lica

    • D.

      Da se sazna da li je u nekoj prethodnoj komunikaciji učestvovalo neovlašćeno lice

    Correct Answer
    B. Da se spreči da neovlašćeno lice dešifruje poruke koje su ranije razmenjene čak i ako naknadno sazna tajni ključ
    Explanation
    The goal of perfect forward secrecy (PFS) is to prevent unauthorized individuals from decrypting previously exchanged messages, even if they later obtain the secret key. This means that even if an attacker gains access to the secret key, they will not be able to decrypt past communications. PFS provides an additional layer of security by ensuring that past messages remain confidential, even in the event of a compromised key.

    Rate this question:

  • 50. 

    Samomodifikujući kod:

    • A.

      Otporan je na pokušaj izmene "spolja"

    • B.

      Sam se prilagođava okruženju

    • C.

      Ima sposobnost da menja svoj izvorni kod nakon izvesnog vremena

    • D.

      Ima sposobnost da menja svoju izvršnu verziju nakon svakog izvršavanja

    Correct Answer
    D. Ima sposobnost da menja svoju izvršnu verziju nakon svakog izvršavanja
    Explanation
    The correct answer is "ima sposobnost da menja svoju izvršnu verziju nakon svakog izvršavanja". This means that self-modifying code has the ability to change its executable version after each execution. This characteristic allows the code to adapt and evolve based on its own behavior and the environment in which it is running. By modifying its executable version, the code can improve its performance, fix bugs, or add new features dynamically.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 16, 2018
    Quiz Created by
    Mladjalug96
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.