Magna Concursos

Foram encontradas 80 questões.

Enunciado 1087145-1

(Source: http://www.information-age.com/approach-cloud-computingcyber-security-2017-123466624/ Retrieved on January 26th, 2018)

How to approach cloud computing and cyber security in 2017

The adoption of cloud computing has been on the up since as far back as 2008, when a survey conducted by the Pew Research Institute found that cloud services were used by nearly 69% of Americans. Since then, the industry has experienced hypergrowth and exceeded the already vast predictions of how big it would become.

IDC predicts that the cloud computing market in 2017 will be worth $107 billion and, according to Gartner, by 2020 a corporate ‘no-cloud’ policy will be as unusual as a ‘no-internet’ policy would be today. Indeed, it would be difficult to imagine an organisation in 2017 that did not use webmail, file sharing and storage, and data backup.

As the use of cloud computing spreads so does awareness of the associated risks. At the time of writing, there have been 456 data breaches worldwide this year according to the Identity Theft Resource Center (ITRC). The ITRC also noted a 40% increase in data breaches in 2016 compared to the previous year. Yet, despite the well-documented cases of data breaches, organisations continue to invest in and adopt cloud computing services because the benefits usually outweigh the risks.

To understand why the growth of cloud computing has continued in the face of high-profile data breaches, look first to what it can offer an organisation.

Cheaper, bigger, better

Cloud computing is a virtual environment that can adapt to meet user needs. It is not constrained by physical limits, and is easily scalable – making it an obvious choice for start-ups. Cloud computing makes state-of-the-art capability available to anyone with an internet connection and a browser, reducing hardware and IT personnel costs.

Cloud services and software applications are managed and upgraded off-site by the provider, meaning organisations can access technology they would not have been able to afford to install and manage on their own. The popularity of the cloud essentially comes down to its provision of advanced, nextgeneration IT resources in an environment that is cheaper and more scalable than local networks.

The risks involved with cloud computing are mostly securitybased. Clouds are often made up of multiple entities, which means that no configuration can be more secure than its weakest link. The link between separate entities means that attacks to multiple sites can occur simultaneously. When cloud providers do not employ adequate cyber security measures, those clouds become a target for cybercriminals.

Yet, it’s not all bad news. A user survey conducted by one cloud service provider found that concerns about security fell to 25% compared to 29% last year. And as more becomes known about security risks so too does our knowledge around what organisations can do to protect themselves.

(Source: http://www.information-age.com/approach-cloud-computingcyber-security-2017-123466624/. Retrieved on January 25th, 2018)

The word “policy” in “corporate ‘no-cloud’ policy” (second paragraph) refers to a(n)
 

Provas

Questão presente nas seguintes provas

Considere todas as senhas formadas por três vogais maiúsculas. São exemplos dessas senhas: EEE, OIA e UAU.

Dentre todas as senhas desse tipo, escolhendo ao acaso uma delas, a probabilidade de que ela tenha duas letras iguais e uma diferente é de

 

Provas

Questão presente nas seguintes provas
Um casal pesou suas quatro malas no aeroporto para o embarque. As três primeiras malas pesaram 8 kg, 12 kg e 9 kg. Sabe-se que a média dos pesos das quatro malas foi de 11 kg. O peso da quarta mala é
 

Provas

Questão presente nas seguintes provas

Uma fatura de cartão de crédito foi paga com dois meses de atraso, e o valor pago, incluindo os 25% de juros correspondentes ao bimestre, foi de R$ 1100,00.

O valor da fatura sem os juros era de

 

Provas

Questão presente nas seguintes provas

Em um saco há 10 fichas iguais na forma e no tamanho, porém de 4 cores diferentes: 4 são brancas, 3 são pretas, 2 são azuis e 1 é vermelha.

É correto afirmar que, retirando do saco, ao acaso,

 

Provas

Questão presente nas seguintes provas

Enunciado 1087094-1

A primeira frase do texto nega
 

Provas

Questão presente nas seguintes provas

Enunciado 1087090-1

“As fontes em questão são outras, estão atualmente em debate nos meios jornalísticos e legais: o direito de proteger o sigilo das ‘fontes’.”

O mesmo sentido da palavra sublinhada aparece em:

 

Provas

Questão presente nas seguintes provas

Enunciado 1087084-1

O texto 1 é visto como uma crônica jornalística. Levando em consideração o texto lido, assinale a característica mais adequada a esse tipo de escrita.
 

Provas

Questão presente nas seguintes provas

Enunciado 1087081-1

Evidente que fui mais furado do que um ralador de coco.

Nesse segmento do texto, o autor nos informa que

 

Provas

Questão presente nas seguintes provas

Enunciado 1087072-1

Depreende-se do texto que, segundo a crônica, a maioria absoluta dos jornalistas defende o sigilo das fontes de informação, para
 

Provas

Questão presente nas seguintes provas