Magna Concursos

Foram encontradas 150 questões.

2300170 Ano: 2018
Disciplina: TI - Desenvolvimento de Sistemas
Banca: CESPE / CEBRASPE
Orgão: ABIN
Acerca de testes de penetração, julgue o item seguinte.
Situação hipotética: O acesso a uma aplicação web com permissão de administrador é realizado por meio do valor informado em uma variável, conforme a seguir.
http://www.site.com.br/aplicacacao?profile=ascs23f8g7por04
Assertiva: Nesse caso, de acordo com a OWASP (Open Web Application Security Project), o teste de penetração black-box automatizado é efetivo para encontrar uma vulnerabilidade, dados o valor fixo para a variável e a forma de passagem: pedido via GET.
 

Provas

Questão presente nas seguintes provas
2300169 Ano: 2018
Disciplina: TI - Segurança da Informação
Banca: CESPE / CEBRASPE
Orgão: ABIN
Julgue o item seguinte, a respeito da análise de artefatos maliciosos.
Situação hipotética: Na realização de um monitoramento com a utilização do Internet Explorer, observou-se que:
I ao iniciar uma sessão em determinado sítio, um processo no sistema operacional foi iniciado, faltando uma DLL para a aplicação X;
II o processo ligado à sessão foi iniciado na pasta c:\xyz\;
III ainda com a sessão ativa, observou-se que a DLL foicarregada a partir da pasta c:\xyz\ e a sessão foi interrompida;
IV no reinício do sistema operacional, a aplicação X foi carregada com a DLL em %SystemRoot%/System32, a mesma que se encontrava na pasta c:\xyz\.
Assertiva: A situação hipotética descreve um ataque DLL hijacking de acordo com III e IV, principalmente pela interrupção, entretanto, é descaracterizado, pois vai de encontro ao que foi descrito em I e II, porque a DLL precisa estar presente antes do início da sessão e, se foi carregada em %SystemRoot%/System32, é confiável e imune a ataques desse tipo.
 

Provas

Questão presente nas seguintes provas

Julgue o item a seguir, a respeito de lógica proposicional.

A proposição “Os Poderes Executivo, Legislativo e Judiciário devem estar em constante estado de alerta sobre as ações das agências de inteligência.” pode ser corretamente representada pela expressão lógica !$ P\wedge Q \wedge R !$, em que P, Q e R são proposições simples adequadamente escolhidas.

 

Provas

Questão presente nas seguintes provas

A sequência infinita !$ a_0 !$, !$ a_1 !$, !$ a_2 !$, !$ a_3 !$, !$ \cdots !$ é definida por !$ a_0=1 !$, !$ a_1=3 !$ e, para cada número inteiro !$ n \ge 1 !$, !$ a_{2n} =a_{2n-1}+a_{2n-2} !$, e !$ a_{2n+1} = a_{2n} - a_{2n-1} !$

Com relação a essa sequência, julgue o item seguinte.

A soma a10 + a9 é superior a 20.

 

Provas

Questão presente nas seguintes provas

A sequência infinita !$ a_0 !$, !$ a_1 !$, !$ a_2 !$, !$ a_3 !$, !$ \cdots !$ é definida por !$ a_0=1 !$, !$ a_1=3 !$ e, para cada número inteiro !$ n \ge 1 !$, !$ a_{2n} =a_{2n-1}+a_{2n-2} !$, e !$ a_{2n+1} = a_{2n} - a_{2n-1} !$

Com relação a essa sequência, julgue o item seguinte.

Existem infinitos valores inteiros de p e q tais que ap = aq.

 

Provas

Questão presente nas seguintes provas
Text
Western intelligence agencies used to inhabit a parallel world where spy battled spy. Their trade was stealing or guarding secrets. Their masters were the men and women in government. Today the intelligence services are part of everyone’s world. Their main task has been to protect society from terrorists and criminals. They are increasingly held to account in the press, parliaments and courts.
The intelligence revolution is partly the result of new technology. As recently as 1999, on becoming director of the American National Security Agency (NSA), Michael Hayden asked to send an e-mail to all staff. He was told: “We can’t actually do that.” The organization used computers to break codes rather than to surf the web as everyone else did. The NSA’s new facility in Utah, the first of several, now stores exabytes of data drawn from everyday communications. At Britain’s GCHQ, most code-breaking was done on paper until well into the 1980s.
The revolution has brought spying closer to ordinary people. After the attacks on America on September 11th 2001, counter-terrorism and counter-insurgency became the focus for the American intelligence agencies. Almost two-thirds of today’s intelligence personnel have been hired since 9/11. As the world has moved online, so the spooks have become involved in monitoring organized crime and paedophiles as well as terrorists.
In a not very remote past, spies sent coded messages using short-wave radios and dead letter boxes. Now the communications of the spooks’ new targets are mixed in with everyone else’s, shuttling between computers and smartphones that are identical to those on your desk and in your pocket. Counter-terrorism, in particular, is pre-emptive. Hence the security services have had to act as hunters of conspiracies rather than gatherers of evidence.
Western intelligence — Shaken and stirred.
In: The Economist, 12/11/2016 (adapted).
Based on text, judge the following item.
In line 14, the connector “Hence” introduces a logical conclusion.
 

Provas

Questão presente nas seguintes provas
Text
Western intelligence agencies used to inhabit a parallel world where spy battled spy. Their trade was stealing or guarding secrets. Their masters were the men and women in government. Today the intelligence services are part of everyone’s world. Their main task has been to protect society from terrorists and criminals. They are increasingly held to account in the press, parliaments and courts.
The intelligence revolution is partly the result of new technology. As recently as 1999, on becoming director of the American National Security Agency (NSA), Michael Hayden asked to send an e-mail to all staff. He was told: “We can’t actually do that.” The organization used computers to break codes rather than to surf the web as everyone else did. The NSA’s new facility in Utah, the first of several, now stores exabytes of data drawn from everyday communications. At Britain’s GCHQ, most code-breaking was done on paper until well into the 1980s.
The revolution has brought spying closer to ordinary people. After the attacks on America on September 11th 2001, counter-terrorism and counter-insurgency became the focus for the American intelligence agencies. Almost two-thirds of today’s intelligence personnel have been hired since 9/11. As the world has moved online, so the spooks have become involved in monitoring organized crime and paedophiles as well as terrorists.
In a not very remote past, spies sent coded messages using short-wave radios and dead letter boxes. Now the communications of the spooks’ new targets are mixed in with everyone else’s, shuttling between computers and smartphones that are identical to those on your desk and in your pocket. Counter-terrorism, in particular, is pre-emptive. Hence the security services have had to act as hunters of conspiracies rather than gatherers of evidence.
Western intelligence — Shaken and stirred.
In: The Economist, 12/11/2016 (adapted).
Based on text, judge the following item.
GCHQ experts decided to stop producing academic papers about code-breaking techniques only in the two last decades of the last century.
 

Provas

Questão presente nas seguintes provas
Text
Western intelligence agencies used to inhabit a parallel world where spy battled spy. Their trade was stealing or guarding secrets. Their masters were the men and women in government. Today the intelligence services are part of everyone’s world. Their main task has been to protect society from terrorists and criminals. They are increasingly held to account in the press, parliaments and courts.
The intelligence revolution is partly the result of new technology. As recently as 1999, on becoming director of the American National Security Agency (NSA), Michael Hayden asked to send an e-mail to all staff. He was told: “We can’t actually do that.” The organization used computers to break codes rather than to surf the web as everyone else did. The NSA’s new facility in Utah, the first of several, now stores exabytes of data drawn from everyday communications. At Britain’s GCHQ, most code-breaking was done on paper until well into the 1980s.
The revolution has brought spying closer to ordinary people. After the attacks on America on September 11th 2001, counter-terrorism and counter-insurgency became the focus for the American intelligence agencies. Almost two-thirds of today’s intelligence personnel have been hired since 9/11. As the world has moved online, so the spooks have become involved in monitoring organized crime and paedophiles as well as terrorists.
In a not very remote past, spies sent coded messages using short-wave radios and dead letter boxes. Now the communications of the spooks’ new targets are mixed in with everyone else’s, shuttling between computers and smartphones that are identical to those on your desk and in your pocket. Counter-terrorism, in particular, is pre-emptive. Hence the security services have had to act as hunters of conspiracies rather than gatherers of evidence.
Western intelligence — Shaken and stirred.
In: The Economist, 12/11/2016 (adapted).
Based on text, judge the following item.
The sentence “Michael Hayden asked to send an e-mail to all staff” can be correctly paraphrased in the following terms: Michael Hayden enquired all his employees if he could send an electronic message.
 

Provas

Questão presente nas seguintes provas
Text
Western intelligence agencies used to inhabit a parallel world where spy battled spy. Their trade was stealing or guarding secrets. Their masters were the men and women in government. Today the intelligence services are part of everyone’s world. Their main task has been to protect society from terrorists and criminals. They are increasingly held to account in the press, parliaments and courts.
The intelligence revolution is partly the result of new technology. As recently as 1999, on becoming director of the American National Security Agency (NSA), Michael Hayden asked to send an e-mail to all staff. He was told: “We can’t actually do that.” The organization used computers to break codes rather than to surf the web as everyone else did. The NSA’s new facility in Utah, the first of several, now stores exabytes of data drawn from everyday communications. At Britain’s GCHQ, most code-breaking was done on paper until well into the 1980s.
The revolution has brought spying closer to ordinary people. After the attacks on America on September 11th 2001, counter-terrorism and counter-insurgency became the focus for the American intelligence agencies. Almost two-thirds of today’s intelligence personnel have been hired since 9/11. As the world has moved online, so the spooks have become involved in monitoring organized crime and paedophiles as well as terrorists.
In a not very remote past, spies sent coded messages using short-wave radios and dead letter boxes. Now the communications of the spooks’ new targets are mixed in with everyone else’s, shuttling between computers and smartphones that are identical to those on your desk and in your pocket. Counter-terrorism, in particular, is pre-emptive. Hence the security services have had to act as hunters of conspiracies rather than gatherers of evidence.
Western intelligence — Shaken and stirred.
In: The Economist, 12/11/2016 (adapted).
Based on text, judge the following item.
The idea expressed in “Counter-terrorism (…) is pre-emptive” can be also found in the following proverb: It is better to prevent than to cure.
 

Provas

Questão presente nas seguintes provas
Text
Western intelligence agencies used to inhabit a parallel world where spy battled spy. Their trade was stealing or guarding secrets. Their masters were the men and women in government. Today the intelligence services are part of everyone’s world. Their main task has been to protect society from terrorists and criminals. They are increasingly held to account in the press, parliaments and courts.
The intelligence revolution is partly the result of new technology. As recently as 1999, on becoming director of the American National Security Agency (NSA), Michael Hayden asked to send an e-mail to all staff. He was told: “We can’t actually do that.” The organization used computers to break codes rather than to surf the web as everyone else did. The NSA’s new facility in Utah, the first of several, now stores exabytes of data drawn from everyday communications. At Britain’s GCHQ, most code-breaking was done on paper until well into the 1980s.
The revolution has brought spying closer to ordinary people. After the attacks on America on September 11th 2001, counter-terrorism and counter-insurgency became the focus for the American intelligence agencies. Almost two-thirds of today’s intelligence personnel have been hired since 9/11. As the world has moved online, so the spooks have become involved in monitoring organized crime and paedophiles as well as terrorists.
In a not very remote past, spies sent coded messages using short-wave radios and dead letter boxes. Now the communications of the spooks’ new targets are mixed in with everyone else’s, shuttling between computers and smartphones that are identical to those on your desk and in your pocket. Counter-terrorism, in particular, is pre-emptive. Hence the security services have had to act as hunters of conspiracies rather than gatherers of evidence.
Western intelligence — Shaken and stirred.
In: The Economist, 12/11/2016 (adapted).
Based on text, judge the following item.
The author defends the idea that the fight against organized and sexual crimes has diverted invaluable but scarce resources from what should be America’s secret services’ main goal: the combat against terrorism.
 

Provas

Questão presente nas seguintes provas