Questões de Concurso Comentadas para igp-sc

Foram encontradas 298 questões

Resolva questões gratuitamente!

Junte-se a mais de 4 milhões de concurseiros!

Q1873885 Raciocínio Lógico
Assinale a alternativa que representa corretamente uma tautologia.
Alternativas
Q1873880 Direito Penal
Assinale a alternativa correta de acordo com o Código Penal.
Alternativas
Q1873878 Legislação Federal
Assinale a alternativa que indica corretamente a definição de informação de acordo com a Lei de Acesso à Informação.
Alternativas
Q1873877 Direito Administrativo
Assinale a alternativa correta sobre os servidores públicos civis.
Alternativas
Q1873876 Direito Administrativo
Assinale a alternativa correta acerca da invalidação do ato administrativo.
Alternativas
Q1873872 Direito Constitucional
Assinale a alternativa correta de acordo com a Constituição Federal.
Alternativas
Q1873871 Inglês
Phishing

Imagine that you get an email one morning. It appears to be from your bank. The email warns that someone broke into your account. It says that you need to sign in to check some things. You click the link in the email. It takes you to a site that looks very much like your bank’s. You enter your username and password. You submit the form. You’ve just been phished!

Phishing is a type of attack that happens over the Internet. Users receive an email or text message that seems like it came from a trusted source. These users are being deceived. They are interacting with dangerous hackers. The attackers copy trusted companies. They send users to web pages that look like the ones we use everyday. When users login or provide sensitive information, the attackers steal this data.

Attackers want your data for many reasons. They may use your data to commit identity fraud. This is when they use your identity to buy something with your credit. Then they receive the goods and you receive the bill. Or they may want your password to take over a computer network. They may want access to private emails. They may want customer records. They gain access by tricking people into giving them their login info.

Some phishing attacks are targeted. A targeted phishing attack is called a spear phishing attack. These attacks are dangerous because they are convincing. The attacker may know the target’s name, address, or job title. They may have gathered info from social networks, like the names of friends or family. The attackers may use this personal information to craft a believable email. The target will be tricked into clicking a link. The link will send them to a phony website. This site will look familiar, but it will be a spoofed site built to steal data. Any data that the target submits will go to the hacker.

Phishing attacks are dangerous, but you can spot them if you pay attention. One thing to watch is your address bar in your browser. Attackers use domains that look like the ones that we trust, but they are not the same. For example, in 2016 staffers from Hillary Clinton’s campaign were spear phished. The attackers used the domain accounts-google.com. That domain looks like google.com, but it isn’t the same. When logging into google, you should always do it from google.com. Likewise, when logging into any account, make sure the address matches what you expect. If you are unsure, search for the site and login from the root domain.

An even better way to secure your account against phishing attacks is to use 2FA: two factor authentication. 2FA means that your account is secured with two keys. The first is your password. The second key is a random code that changes every few minutes. This code may be generated by a 2FA app, like Authy. Or it can be sent to your cell phone on request. If you activate 2FA on your accounts, an attacker will not be able to get in even with your password.

Phishing attacks are scary and common. The reason why they are common is that they are effective. Many people accept appearances without suspicion. Browsing the Internet safely requires a healthy amount of suspicion. Not everything is what it appears. Nobody is trying to give you free money. Don’t trust; verify.
In the sentence “This site will look familiar, but it will be a spoofed site built to steal data.”, the correct definition for the word spoofed is in which alternative?
Alternativas
Q1873870 Inglês
Phishing

Imagine that you get an email one morning. It appears to be from your bank. The email warns that someone broke into your account. It says that you need to sign in to check some things. You click the link in the email. It takes you to a site that looks very much like your bank’s. You enter your username and password. You submit the form. You’ve just been phished!

Phishing is a type of attack that happens over the Internet. Users receive an email or text message that seems like it came from a trusted source. These users are being deceived. They are interacting with dangerous hackers. The attackers copy trusted companies. They send users to web pages that look like the ones we use everyday. When users login or provide sensitive information, the attackers steal this data.

Attackers want your data for many reasons. They may use your data to commit identity fraud. This is when they use your identity to buy something with your credit. Then they receive the goods and you receive the bill. Or they may want your password to take over a computer network. They may want access to private emails. They may want customer records. They gain access by tricking people into giving them their login info.

Some phishing attacks are targeted. A targeted phishing attack is called a spear phishing attack. These attacks are dangerous because they are convincing. The attacker may know the target’s name, address, or job title. They may have gathered info from social networks, like the names of friends or family. The attackers may use this personal information to craft a believable email. The target will be tricked into clicking a link. The link will send them to a phony website. This site will look familiar, but it will be a spoofed site built to steal data. Any data that the target submits will go to the hacker.

Phishing attacks are dangerous, but you can spot them if you pay attention. One thing to watch is your address bar in your browser. Attackers use domains that look like the ones that we trust, but they are not the same. For example, in 2016 staffers from Hillary Clinton’s campaign were spear phished. The attackers used the domain accounts-google.com. That domain looks like google.com, but it isn’t the same. When logging into google, you should always do it from google.com. Likewise, when logging into any account, make sure the address matches what you expect. If you are unsure, search for the site and login from the root domain.

An even better way to secure your account against phishing attacks is to use 2FA: two factor authentication. 2FA means that your account is secured with two keys. The first is your password. The second key is a random code that changes every few minutes. This code may be generated by a 2FA app, like Authy. Or it can be sent to your cell phone on request. If you activate 2FA on your accounts, an attacker will not be able to get in even with your password.

Phishing attacks are scary and common. The reason why they are common is that they are effective. Many people accept appearances without suspicion. Browsing the Internet safely requires a healthy amount of suspicion. Not everything is what it appears. Nobody is trying to give you free money. Don’t trust; verify.
The words sensitive information in the second paragraph, is closest in meaning to:
Alternativas
Q1873869 Inglês
Phishing

Imagine that you get an email one morning. It appears to be from your bank. The email warns that someone broke into your account. It says that you need to sign in to check some things. You click the link in the email. It takes you to a site that looks very much like your bank’s. You enter your username and password. You submit the form. You’ve just been phished!

Phishing is a type of attack that happens over the Internet. Users receive an email or text message that seems like it came from a trusted source. These users are being deceived. They are interacting with dangerous hackers. The attackers copy trusted companies. They send users to web pages that look like the ones we use everyday. When users login or provide sensitive information, the attackers steal this data.

Attackers want your data for many reasons. They may use your data to commit identity fraud. This is when they use your identity to buy something with your credit. Then they receive the goods and you receive the bill. Or they may want your password to take over a computer network. They may want access to private emails. They may want customer records. They gain access by tricking people into giving them their login info.

Some phishing attacks are targeted. A targeted phishing attack is called a spear phishing attack. These attacks are dangerous because they are convincing. The attacker may know the target’s name, address, or job title. They may have gathered info from social networks, like the names of friends or family. The attackers may use this personal information to craft a believable email. The target will be tricked into clicking a link. The link will send them to a phony website. This site will look familiar, but it will be a spoofed site built to steal data. Any data that the target submits will go to the hacker.

Phishing attacks are dangerous, but you can spot them if you pay attention. One thing to watch is your address bar in your browser. Attackers use domains that look like the ones that we trust, but they are not the same. For example, in 2016 staffers from Hillary Clinton’s campaign were spear phished. The attackers used the domain accounts-google.com. That domain looks like google.com, but it isn’t the same. When logging into google, you should always do it from google.com. Likewise, when logging into any account, make sure the address matches what you expect. If you are unsure, search for the site and login from the root domain.

An even better way to secure your account against phishing attacks is to use 2FA: two factor authentication. 2FA means that your account is secured with two keys. The first is your password. The second key is a random code that changes every few minutes. This code may be generated by a 2FA app, like Authy. Or it can be sent to your cell phone on request. If you activate 2FA on your accounts, an attacker will not be able to get in even with your password.

Phishing attacks are scary and common. The reason why they are common is that they are effective. Many people accept appearances without suspicion. Browsing the Internet safely requires a healthy amount of suspicion. Not everything is what it appears. Nobody is trying to give you free money. Don’t trust; verify.
Read the article and decide if the statements below are true ( T ) or false ( F ).

( ) A phishing attack is to trick someone into giving away sensitive data.
( ) To commit identity fraud is a motive for phishing and it is mentioned in the text.
( ) 2FA can protect users from phishing attacks by having two keys to login.
( ) The domain accounts-google.com is used by attackers to phish.

Choose the alternative which presents the correct sequence, from top to bottom.
Alternativas
Q1873868 Inglês
Phishing

Imagine that you get an email one morning. It appears to be from your bank. The email warns that someone broke into your account. It says that you need to sign in to check some things. You click the link in the email. It takes you to a site that looks very much like your bank’s. You enter your username and password. You submit the form. You’ve just been phished!

Phishing is a type of attack that happens over the Internet. Users receive an email or text message that seems like it came from a trusted source. These users are being deceived. They are interacting with dangerous hackers. The attackers copy trusted companies. They send users to web pages that look like the ones we use everyday. When users login or provide sensitive information, the attackers steal this data.

Attackers want your data for many reasons. They may use your data to commit identity fraud. This is when they use your identity to buy something with your credit. Then they receive the goods and you receive the bill. Or they may want your password to take over a computer network. They may want access to private emails. They may want customer records. They gain access by tricking people into giving them their login info.

Some phishing attacks are targeted. A targeted phishing attack is called a spear phishing attack. These attacks are dangerous because they are convincing. The attacker may know the target’s name, address, or job title. They may have gathered info from social networks, like the names of friends or family. The attackers may use this personal information to craft a believable email. The target will be tricked into clicking a link. The link will send them to a phony website. This site will look familiar, but it will be a spoofed site built to steal data. Any data that the target submits will go to the hacker.

Phishing attacks are dangerous, but you can spot them if you pay attention. One thing to watch is your address bar in your browser. Attackers use domains that look like the ones that we trust, but they are not the same. For example, in 2016 staffers from Hillary Clinton’s campaign were spear phished. The attackers used the domain accounts-google.com. That domain looks like google.com, but it isn’t the same. When logging into google, you should always do it from google.com. Likewise, when logging into any account, make sure the address matches what you expect. If you are unsure, search for the site and login from the root domain.

An even better way to secure your account against phishing attacks is to use 2FA: two factor authentication. 2FA means that your account is secured with two keys. The first is your password. The second key is a random code that changes every few minutes. This code may be generated by a 2FA app, like Authy. Or it can be sent to your cell phone on request. If you activate 2FA on your accounts, an attacker will not be able to get in even with your password.

Phishing attacks are scary and common. The reason why they are common is that they are effective. Many people accept appearances without suspicion. Browsing the Internet safely requires a healthy amount of suspicion. Not everything is what it appears. Nobody is trying to give you free money. Don’t trust; verify.
What is the difference between a phishing and spear phishing attack?
Alternativas
Q1873867 Inglês
Phishing

Imagine that you get an email one morning. It appears to be from your bank. The email warns that someone broke into your account. It says that you need to sign in to check some things. You click the link in the email. It takes you to a site that looks very much like your bank’s. You enter your username and password. You submit the form. You’ve just been phished!

Phishing is a type of attack that happens over the Internet. Users receive an email or text message that seems like it came from a trusted source. These users are being deceived. They are interacting with dangerous hackers. The attackers copy trusted companies. They send users to web pages that look like the ones we use everyday. When users login or provide sensitive information, the attackers steal this data.

Attackers want your data for many reasons. They may use your data to commit identity fraud. This is when they use your identity to buy something with your credit. Then they receive the goods and you receive the bill. Or they may want your password to take over a computer network. They may want access to private emails. They may want customer records. They gain access by tricking people into giving them their login info.

Some phishing attacks are targeted. A targeted phishing attack is called a spear phishing attack. These attacks are dangerous because they are convincing. The attacker may know the target’s name, address, or job title. They may have gathered info from social networks, like the names of friends or family. The attackers may use this personal information to craft a believable email. The target will be tricked into clicking a link. The link will send them to a phony website. This site will look familiar, but it will be a spoofed site built to steal data. Any data that the target submits will go to the hacker.

Phishing attacks are dangerous, but you can spot them if you pay attention. One thing to watch is your address bar in your browser. Attackers use domains that look like the ones that we trust, but they are not the same. For example, in 2016 staffers from Hillary Clinton’s campaign were spear phished. The attackers used the domain accounts-google.com. That domain looks like google.com, but it isn’t the same. When logging into google, you should always do it from google.com. Likewise, when logging into any account, make sure the address matches what you expect. If you are unsure, search for the site and login from the root domain.

An even better way to secure your account against phishing attacks is to use 2FA: two factor authentication. 2FA means that your account is secured with two keys. The first is your password. The second key is a random code that changes every few minutes. This code may be generated by a 2FA app, like Authy. Or it can be sent to your cell phone on request. If you activate 2FA on your accounts, an attacker will not be able to get in even with your password.

Phishing attacks are scary and common. The reason why they are common is that they are effective. Many people accept appearances without suspicion. Browsing the Internet safely requires a healthy amount of suspicion. Not everything is what it appears. Nobody is trying to give you free money. Don’t trust; verify.
Which alternative best describes the main idea of the third paragraph?
Alternativas
Q1873864 Português
Assinale a alternativa correta.
Alternativas
Q1873863 Português
Em que alternativa é correta a indicação da figura de linguagem?
Alternativas
Q1873861 Português
Assinale a frase correta quando ao emprego dos verbos.
Alternativas
Q1873856 Português
Segurança: 62% das cidades catarinenses não registraram nenhum homicídio em 2021


Santa Catarina nunca alcançou uma queda tão expressiva no registro de homicídios, em comparação com a série histórica: nestes últimos seis meses, de acordo com dados divulgados pela Diretoria de Informação e Inteligência da Secretaria de Segurança Pública, mais da metade das cidades catarinenses (62%) não tiveram nenhum registro de assassinato. Isso significa que, em 189 municípios, não houve um crime sequer deste tipo. Além disso, segundo a última pesquisa divulgada pelo Atlas da Violência do IPEA, Santa Catarina tem hoje a segunda menor taxa de homicídios do país, nos três grupos pesquisados: gerais, jovens e mulheres.

Diversos fatores contribuem para a diminuição deste tipo de crime em Santa Catarina, que vem registrando queda desde 2018. Uma das primeiras mudanças na área da segurança pública que pode explicar este cenário é a criação, em 2019, do Colegiado Superior de Segurança Pública e Perícia Oficial, que repassou às instituições de segurança total autonomia gerencial e financeira, dando mais agilidade para obtenção de recursos e equipamentos, e também no fluxo de trabalho de cada uma.

As forças policiais receberam recursos e reforços de pessoal. O último, e maior já realizado na história de SC, foi R$ 343 milhões, destinados à melhoria de viaturas, armamentos e sistemas de tecnologia. Somente nos últimos dois anos, a segurança também teve o efetivo reforçado com mais 1.000 soldados e 70 oficiais para a Polícia Militar, 299 policiais civis, 94 novos peritos, além de 292 soldados para o Corpo de Bombeiros Militar de SC.

Nas ruas, o trabalho é intensificado no combate à criminalidade. Só a Polícia Civil realizou 687 operações policiais neste primeiro semestre do ano, sendo 32% para combate ao tráfico de drogas, 15% no enfrentamento dos crimes de roubo e furto e 11% para homicídio doloso.

A Polícia Militar tem trabalhado 24 horas operacionalmente, e, através dos seus sistemas de inteligência, identificando e apreendendo grandes quantidades de drogas diariamente, tanto pela Operação Narcos quanto pela Operação Barriga Verde. O objetivo é tirar Santa Catarina da rota do tráfico, diminuindo assim as mortes decorrentes da guerra entre facções e dos delitos provenientes do consumo e do comércio de drogas.

Disponível em: https://www.sc.gov.br/noticias/temas/segurancapublica/seguranca-62-das-cidades-catarinenses-nao-registraram-nenhum-homicidio-em-2021. Publicado: 06 jul 2021. Acesso em: 06 nov 2021. [Adaptado].
Assinale a pergunta que pode ser respondida com base no texto.
Alternativas
Q1873855 Português
Segurança: 62% das cidades catarinenses não registraram nenhum homicídio em 2021


Santa Catarina nunca alcançou uma queda tão expressiva no registro de homicídios, em comparação com a série histórica: nestes últimos seis meses, de acordo com dados divulgados pela Diretoria de Informação e Inteligência da Secretaria de Segurança Pública, mais da metade das cidades catarinenses (62%) não tiveram nenhum registro de assassinato. Isso significa que, em 189 municípios, não houve um crime sequer deste tipo. Além disso, segundo a última pesquisa divulgada pelo Atlas da Violência do IPEA, Santa Catarina tem hoje a segunda menor taxa de homicídios do país, nos três grupos pesquisados: gerais, jovens e mulheres.

Diversos fatores contribuem para a diminuição deste tipo de crime em Santa Catarina, que vem registrando queda desde 2018. Uma das primeiras mudanças na área da segurança pública que pode explicar este cenário é a criação, em 2019, do Colegiado Superior de Segurança Pública e Perícia Oficial, que repassou às instituições de segurança total autonomia gerencial e financeira, dando mais agilidade para obtenção de recursos e equipamentos, e também no fluxo de trabalho de cada uma.

As forças policiais receberam recursos e reforços de pessoal. O último, e maior já realizado na história de SC, foi R$ 343 milhões, destinados à melhoria de viaturas, armamentos e sistemas de tecnologia. Somente nos últimos dois anos, a segurança também teve o efetivo reforçado com mais 1.000 soldados e 70 oficiais para a Polícia Militar, 299 policiais civis, 94 novos peritos, além de 292 soldados para o Corpo de Bombeiros Militar de SC.

Nas ruas, o trabalho é intensificado no combate à criminalidade. Só a Polícia Civil realizou 687 operações policiais neste primeiro semestre do ano, sendo 32% para combate ao tráfico de drogas, 15% no enfrentamento dos crimes de roubo e furto e 11% para homicídio doloso.

A Polícia Militar tem trabalhado 24 horas operacionalmente, e, através dos seus sistemas de inteligência, identificando e apreendendo grandes quantidades de drogas diariamente, tanto pela Operação Narcos quanto pela Operação Barriga Verde. O objetivo é tirar Santa Catarina da rota do tráfico, diminuindo assim as mortes decorrentes da guerra entre facções e dos delitos provenientes do consumo e do comércio de drogas.

Disponível em: https://www.sc.gov.br/noticias/temas/segurancapublica/seguranca-62-das-cidades-catarinenses-nao-registraram-nenhum-homicidio-em-2021. Publicado: 06 jul 2021. Acesso em: 06 nov 2021. [Adaptado].
Em relação ao texto, é correto o que se afirma em:
Alternativas
Ano: 2017 Banca: IESES Órgão: IGP-SC Prova: IESES - 2017 - IGP-SC - Perito Odontolegista |
Q1701594 Medicina Legal
As lesões produzidas em decorrência dos tratamentos odontológicos, quando ocorrem, estão relacionadas a imprudência, negligência ou imperícia. Se durante um tratamento odontológico, por erro profissional, o paciente perde um elemento dental, o crime pode ser enquadrado como:
Alternativas
Ano: 2017 Banca: IESES Órgão: IGP-SC Prova: IESES - 2017 - IGP-SC - Perito Odontolegista |
Q1701593 Medicina Legal

Em um laudo pericial de exame de corpo de delito, alguns quesitos abordam a classificação das lesões corporais quanto à quantidade e à qualidade do dano. Sobre as lesões classificadas em leves, graves ou gravíssimas, analise as seguintes afirmações:


I. Lesões leves são aquelas representadas por danos de pouquíssima repercussão orgânica ou perdas superficiais, de fácil recuperação. São vistas como de menor importância jurídica.

II. A incapacidade para as ocupações habituais por mais de 30 dias se restringe apenas às situações em que a vítima fique impossibilitada de exercer seu trabalho, de forma genérica (qualquer trabalho) e não específica (para determinado trabalho).

III. Na debilidade permanente de membro, sentido ou função é importante avaliar a diminuição evidente da função dos membros, dos sentidos e das funções.

IV. Para que exista deformidade permanente são exigidos requisitos como aparência, permanência ou irreparabilidade pelos meios comuns. São exemplos de deformidade permanente: paralisia facial, ablação do olho, perda parcial ou total do nariz e perda de um ou mais dentes anterossuperiores.


Assinale a alternativa correta:

Alternativas
Ano: 2017 Banca: IESES Órgão: IGP-SC Prova: IESES - 2017 - IGP-SC - Perito Odontolegista |
Q1701592 Medicina Legal
Sobre as lesões do aparelho estomatognático e sua perícia, é correto afirmar que:
Alternativas
Ano: 2017 Banca: IESES Órgão: IGP-SC Prova: IESES - 2017 - IGP-SC - Perito Odontolegista |
Q1701591 Medicina Legal
Sobre a obtenção, coleta, armazenamento e preservação de material biológico para fins de análise de DNA, é correto afirmar que:
Alternativas
Respostas
41: C
42: C
43: E
44: B
45: E
46: A
47: E
48: A
49: B
50: C
51: B
52: A
53: C
54: D
55: C
56: E
57: D
58: D
59: A
60: B