Questões de Concurso Sobre inglês

Foram encontradas 17.407 questões

Q1873868 Inglês
Phishing

Imagine that you get an email one morning. It appears to be from your bank. The email warns that someone broke into your account. It says that you need to sign in to check some things. You click the link in the email. It takes you to a site that looks very much like your bank’s. You enter your username and password. You submit the form. You’ve just been phished!

Phishing is a type of attack that happens over the Internet. Users receive an email or text message that seems like it came from a trusted source. These users are being deceived. They are interacting with dangerous hackers. The attackers copy trusted companies. They send users to web pages that look like the ones we use everyday. When users login or provide sensitive information, the attackers steal this data.

Attackers want your data for many reasons. They may use your data to commit identity fraud. This is when they use your identity to buy something with your credit. Then they receive the goods and you receive the bill. Or they may want your password to take over a computer network. They may want access to private emails. They may want customer records. They gain access by tricking people into giving them their login info.

Some phishing attacks are targeted. A targeted phishing attack is called a spear phishing attack. These attacks are dangerous because they are convincing. The attacker may know the target’s name, address, or job title. They may have gathered info from social networks, like the names of friends or family. The attackers may use this personal information to craft a believable email. The target will be tricked into clicking a link. The link will send them to a phony website. This site will look familiar, but it will be a spoofed site built to steal data. Any data that the target submits will go to the hacker.

Phishing attacks are dangerous, but you can spot them if you pay attention. One thing to watch is your address bar in your browser. Attackers use domains that look like the ones that we trust, but they are not the same. For example, in 2016 staffers from Hillary Clinton’s campaign were spear phished. The attackers used the domain accounts-google.com. That domain looks like google.com, but it isn’t the same. When logging into google, you should always do it from google.com. Likewise, when logging into any account, make sure the address matches what you expect. If you are unsure, search for the site and login from the root domain.

An even better way to secure your account against phishing attacks is to use 2FA: two factor authentication. 2FA means that your account is secured with two keys. The first is your password. The second key is a random code that changes every few minutes. This code may be generated by a 2FA app, like Authy. Or it can be sent to your cell phone on request. If you activate 2FA on your accounts, an attacker will not be able to get in even with your password.

Phishing attacks are scary and common. The reason why they are common is that they are effective. Many people accept appearances without suspicion. Browsing the Internet safely requires a healthy amount of suspicion. Not everything is what it appears. Nobody is trying to give you free money. Don’t trust; verify.
What is the difference between a phishing and spear phishing attack?
Alternativas
Q1873867 Inglês
Phishing

Imagine that you get an email one morning. It appears to be from your bank. The email warns that someone broke into your account. It says that you need to sign in to check some things. You click the link in the email. It takes you to a site that looks very much like your bank’s. You enter your username and password. You submit the form. You’ve just been phished!

Phishing is a type of attack that happens over the Internet. Users receive an email or text message that seems like it came from a trusted source. These users are being deceived. They are interacting with dangerous hackers. The attackers copy trusted companies. They send users to web pages that look like the ones we use everyday. When users login or provide sensitive information, the attackers steal this data.

Attackers want your data for many reasons. They may use your data to commit identity fraud. This is when they use your identity to buy something with your credit. Then they receive the goods and you receive the bill. Or they may want your password to take over a computer network. They may want access to private emails. They may want customer records. They gain access by tricking people into giving them their login info.

Some phishing attacks are targeted. A targeted phishing attack is called a spear phishing attack. These attacks are dangerous because they are convincing. The attacker may know the target’s name, address, or job title. They may have gathered info from social networks, like the names of friends or family. The attackers may use this personal information to craft a believable email. The target will be tricked into clicking a link. The link will send them to a phony website. This site will look familiar, but it will be a spoofed site built to steal data. Any data that the target submits will go to the hacker.

Phishing attacks are dangerous, but you can spot them if you pay attention. One thing to watch is your address bar in your browser. Attackers use domains that look like the ones that we trust, but they are not the same. For example, in 2016 staffers from Hillary Clinton’s campaign were spear phished. The attackers used the domain accounts-google.com. That domain looks like google.com, but it isn’t the same. When logging into google, you should always do it from google.com. Likewise, when logging into any account, make sure the address matches what you expect. If you are unsure, search for the site and login from the root domain.

An even better way to secure your account against phishing attacks is to use 2FA: two factor authentication. 2FA means that your account is secured with two keys. The first is your password. The second key is a random code that changes every few minutes. This code may be generated by a 2FA app, like Authy. Or it can be sent to your cell phone on request. If you activate 2FA on your accounts, an attacker will not be able to get in even with your password.

Phishing attacks are scary and common. The reason why they are common is that they are effective. Many people accept appearances without suspicion. Browsing the Internet safely requires a healthy amount of suspicion. Not everything is what it appears. Nobody is trying to give you free money. Don’t trust; verify.
Which alternative best describes the main idea of the third paragraph?
Alternativas
Q1869417 Inglês

Consider Text II to answer question.



“I am a bit apprehensive of the temptation of relegating to the background the lofty and creative initiative of Brazil in the sugar cane-based ethanol and other biofuel energy products, the moment the drilling of these huge oil wells in Tupi and its satellite oil wells takes off in earnest, amid challenging circumstances, though. My advice is that while Brazil is joyfully tinkering with the prospect of raking in colossal petro-dollar money, she shouldn’t, by any means, lose sight of the need to consolidate investment in the already standard setting, functional, renewable and clean energy source that is the ethanol. The government should find a perfect mix in due course.”

Enyinnaya wrote
Mar 21st 2009
http://www.economist.com/node/13348824/comments

The author of the comment above expresses concern for the forecast presented in Text II since
Alternativas
Q1869416 Inglês

Consider Text II to answer question.



President Luiz Inácio Lula da Silva is mentioned in the last paragraph because, according to the author,
Alternativas
Q1869415 Inglês

Consider Text II to answer question.



The expression in bold type and the item in brackets are semantically equivalent in
Alternativas
Q1869414 Inglês

Consider Text II to answer question.



In paragraph 7 (lines 60-76), among the possible changes to the Brazilian concession laws for the exploration of the deepwater blocks in the subsalt region, the author mentions
Alternativas
Q1869413 Inglês

Consider Text II to answer question.



In “... possible changes to the concession laws that would give Petrobras the upper hand in the development of the Tupi area.” (lines 61-63), the expression “give the upper hand” means
Alternativas
Q1869412 Inglês

Consider Text II to answer question.



The participation of the private sector in the exploration of Brazil’s new oil finds is considered
Alternativas
Q1869411 Inglês

Consider Text II to answer question.



The only fragment that DOES NOT refer to an aspect that might represent an obstacle for the progress of the exploration of Brazil’s deep water oil reservoirs is
Alternativas
Q1869410 Inglês

Consider Text II to answer question.



“While...” (line 41) and “However,” (line 48) could be correctly replaced with
Alternativas
Q1869409 Inglês

Consider Text II to answer question.



Large Brazilian companies are inclined to count on local banks for credit, as explained in paragraph 4 (lines 29-39), due to the
Alternativas
Q1869408 Inglês

Consider Text II to answer question.



According to paragraph 2 (lines 7-18), the overall reason for Petrobras to postpone disclosing its 2009-13 strategic plan was announced to be the
Alternativas
Q1869407 Inglês

Consider Text II to answer question.



The question mark in the title “The next oil giant?”, in connection with the arguments exposed in the text, suggests that the author
Alternativas
Q1869406 Inglês
Consider Text I to answer question.


According to Text I, all of the following statements are true about NYK, EXCEPT the fact that the company
Alternativas
Q1869405 Inglês
Consider Text I to answer question.


The only acronym that does NOT represent a vessel used in oil production is
Alternativas
Q1869404 Inglês
Consider Text I to answer question.


In terms of meaning,
Alternativas
Q1869403 Inglês
Consider Text I to answer question.


The explanation given corresponds to the information in Text I in
Alternativas
Q1869402 Inglês
Consider Text I to answer question.


The phrase ‘roughly down by half from a year earlier.’ (lines 53-54) indicates that
Alternativas
Q1869401 Inglês
Consider Text I to answer question.


In “These include floating production, storage and offloading vessels, …” (lines 48-49), the pronoun ‘these’ refers to
Alternativas
Q1869400 Inglês
Consider Text I to answer question.


In the fragment “We will partner with and invest in other companies if we think the project is good.” (lines 43-44), Nagasawa expresses a(n)
Alternativas
Respostas
7081: C
7082: B
7083: D
7084: A
7085: C
7086: B
7087: B
7088: E
7089: C
7090: D
7091: D
7092: C
7093: B
7094: A
7095: E
7096: B
7097: C
7098: A
7099: B
7100: D