Questões de Concurso Comentadas para stf

Foram encontradas 990 questões

Resolva questões gratuitamente!

Junte-se a mais de 4 milhões de concurseiros!

Q351852 Segurança da Informação
Acerca das políticas de segurança da informação, julgue os itens a seguir.

A política de segurança da informação deve ser divulgada na organização, tomando-se os devidos cuidados de não serem reveladas informações sensíveis, especialmente para fora da organização.
Alternativas
Q351851 Segurança da Informação
Acerca das políticas de segurança da informação, julgue os itens a seguir.

É conveniente que exista uma declaração de comprometimento da direção apoiando as metas e princípios da segurança da informação, alinhada com os objetivos e estratégias do negócio.
Alternativas
Q351850 Segurança da Informação
Acerca das políticas de segurança da informação, julgue os itens a seguir.

O objetivo de uma política de segurança da informação é fornecer à alta administração um conjunto rígido de metodologias e procedimentos para a segurança da informação, de acordo com as regulamentações existentes na organização.
Alternativas
Q351849 Segurança da Informação
Acerca das políticas de segurança da informação, julgue os itens a seguir.

Sempre que ocorrerem mudanças significativas na organização, a política de segurança da informação deverá sofrer uma análise criteriosa e, se necessário, uma revisão.
Alternativas
Q351848 Segurança da Informação
Com base nas normas da família ISO 27000, julgue os próximos itens.

Incidente de segurança da informação é um evento simples ou uma série de eventos indesejados ou inesperados, que tenham uma grande probabilidade de comprometer as operações do negócio e ameaçar a segurança da informação.
Alternativas
Q351847 Segurança da Informação
Com base nas normas da família ISO 27000, julgue os próximos itens.

Disponibilidade da informação, integridade, autenticidade e confiabilidade são algumas das propriedades obrigatórias na definição da segurança da informação de uma organização.
Alternativas
Q351846 Engenharia de Software
Acerca de DevOps e da gestão ágil de projetos com Scrum, julgue os itens subsequentes.

Uma nova sprint inicia imediatamente após a conclusão da sprint anterior. Uma sprint pode ser cancelada antes do seu time-box terminar, porém, a autoridade para cancelar é exclusiva do product owner.
Alternativas
Q351845 Engenharia de Software
Acerca de DevOps e da gestão ágil de projetos com Scrum, julgue os itens subsequentes.

Teste contínuo é uma prática do DevOps que, além de permitir a diminuição dos custos finais do teste, ajuda as equipes de desenvolvimento a balancear qualidade e velocidade.
Alternativas
Q351844 Governança de TI
Julgue os itens que se seguem a respeito da IN n.º 4 MPOG/SLTI e do guia de boas práticas em contratação de TI TCU.

É possível que uma determinada organização realize planejamento da contratação de serviços de TI contendo aferição de esforço por meio da métrica homens-hora, de acordo com o prescrito na IN n.º 4 MPOG/SLTI.
Alternativas
Q351843 Governança de TI
Julgue os itens que se seguem a respeito da IN n.º 4 MPOG/SLTI e do guia de boas práticas em contratação de TI TCU.

Estudos técnicos preliminares, plano de trabalho, no caso da contratação de serviços, e o termo de referência ou projeto básico são requisitos mínimos exigidos no processo de planejamento da contratação de soluções em TI.
Alternativas
Q351842 Governança de TI
A respeito da ITIL V3, julgue os itens subsecutivos.

O sistema de gerenciamento de conhecimento de serviço, que inclui o sistema de gerenciamento de configuração, consiste em um conjunto de ferramentas e bancos de dados usados para gerenciar conhecimento, informações e dados. Sua arquitetura é disposta em quatro camadas, de modo que o portfólio de serviços encontra-se na camada de dados.
Alternativas
Q351841 Governança de TI
A respeito da ITIL V3, julgue os itens subsecutivos.

O service design package (SDP) é encaminhado pela estratégia para o estágio de desenho que, a seguir, o envia para a transição. A partir dele, são realizadas as atividades de transição de serviços de construção, testes, operação e posterior suporte do serviço.
Alternativas
Q351840 Governança de TI
A respeito da ITIL V3, julgue os itens subsecutivos.

O desenho do serviço é influenciado por alterações nas necessidades de negócio e melhorias de serviços. O ITIL preconiza que deve ser adotada uma abordagem estruturada e holística para o desenho dos serviços, com vistas a garantir a consistência e a integração com o negócio.
Alternativas
Q351839 Governança de TI
Com relação à ISO 38500 e ao COBIT 5, julgue os itens seguintes.

O COBIT possui como princípio e enfoque exclusivo as funções inerentes a TI. Na versão 5, o COBIT integra, em um framework único, o BSC, o VAL IT e o COSO, devido ao fato de o cenário atual recomendar que a TI seja parte estratégica das organizações e de reconhecer a importância do alinhamento entre a TI e o negócio.
Alternativas
Q351838 Governança de TI
Com relação à ISO 38500 e ao COBIT 5, julgue os itens seguintes.

A ISO 38500 visa promover o uso eficaz, eficiente e aceitável da tecnologia da informação (TI) e possui, como princípios da boa governança corporativa de TI, a responsabilidade, a estratégia e a aquisição.
Alternativas
Q351837 Governança de TI
Com relação à ISO 38500 e ao COBIT 5, julgue os itens seguintes.

O COBIT 5 possui cinco domínios, sendo um deles o domínio Avaliar, Direcionar e Monitorar (EDM – Evaluate, Direct and Monitor), afeto diretamente à governança e relacionado a ISO 38500.
Alternativas
Q351836 Inglês
Repeaters and hubs

A repeater is an electronic device that receives a network signal, cleans it of unnecessary noise, and regenerates it. The signal is retransmitted at a higher power level, or to the other side of an obstruction, so that the signal can cover longer distances without degradation. In most twisted pair Ethernet configurations, repeaters are required for cable that runs longer than 100 meters. A repeater with multiple ports is known as a hub. Repeaters work on the physical layer of the OSI model. Repeaters require a small amount of time to regenerate the signal. This can cause a propagation delay which can affect network performance. As a result, many network architectures limit the number of repeaters that can be used in a row, e.g., the Ethernet 5-4-3 rule.
Hubs have been mostly obsoleted by modern switches; but repeaters are used for long distance links, notably undersea cabling.


Bridges

A network bridge connects multiple network segments at the data link layer (layer 2) of the OSI model to form a single network. Bridges broadcast to all ports except the port on which the broadcast was received. However, bridges do not promiscuously copy traffic to all ports, as hubs do. Instead, bridges learn which MAC addresses are reachable through specific ports. Once the bridge associates a port with an address, it will send traffic for that address to that port only.
Bridges learn the association of ports and addresses by examining the source address of frames that it sees on various ports. Once a frame arrives through a port, the bridge assumes that the MAC address is associated with that port and stores its source address.
The first time a bridge sees a previously unknown destination address, the bridge will forward the frame to all ports other than the one on which the frame arrived.

Bridges come in three basic types:

Local bridges: Directly connect LANs

Remote bridges: Can be used to create a wide area network (WAN) link between LANs. Remote bridges, where the connecting link is slower than the end networks, largely have been replaced with routers. Wireless bridges: Can be used to join LANs or connect remote devices to LANs.

Internet: http://en.wikipedia.org (adapted).
According to the text above, judge the following items.

Remote devices can be connected to LANs with the use of wireless bridges.
Alternativas
Q351835 Inglês
Repeaters and hubs

A repeater is an electronic device that receives a network signal, cleans it of unnecessary noise, and regenerates it. The signal is retransmitted at a higher power level, or to the other side of an obstruction, so that the signal can cover longer distances without degradation. In most twisted pair Ethernet configurations, repeaters are required for cable that runs longer than 100 meters. A repeater with multiple ports is known as a hub. Repeaters work on the physical layer of the OSI model. Repeaters require a small amount of time to regenerate the signal. This can cause a propagation delay which can affect network performance. As a result, many network architectures limit the number of repeaters that can be used in a row, e.g., the Ethernet 5-4-3 rule.
Hubs have been mostly obsoleted by modern switches; but repeaters are used for long distance links, notably undersea cabling.


Bridges

A network bridge connects multiple network segments at the data link layer (layer 2) of the OSI model to form a single network. Bridges broadcast to all ports except the port on which the broadcast was received. However, bridges do not promiscuously copy traffic to all ports, as hubs do. Instead, bridges learn which MAC addresses are reachable through specific ports. Once the bridge associates a port with an address, it will send traffic for that address to that port only.
Bridges learn the association of ports and addresses by examining the source address of frames that it sees on various ports. Once a frame arrives through a port, the bridge assumes that the MAC address is associated with that port and stores its source address.
The first time a bridge sees a previously unknown destination address, the bridge will forward the frame to all ports other than the one on which the frame arrived.

Bridges come in three basic types:

Local bridges: Directly connect LANs

Remote bridges: Can be used to create a wide area network (WAN) link between LANs. Remote bridges, where the connecting link is slower than the end networks, largely have been replaced with routers. Wireless bridges: Can be used to join LANs or connect remote devices to LANs.

Internet: http://en.wikipedia.org (adapted).
According to the text above, judge the following items.

The signal regeneration that is performed by repeaters can cause small propagation delays that can affect the performance of a computer network.
Alternativas
Q351834 Inglês
Repeaters and hubs

A repeater is an electronic device that receives a network signal, cleans it of unnecessary noise, and regenerates it. The signal is retransmitted at a higher power level, or to the other side of an obstruction, so that the signal can cover longer distances without degradation. In most twisted pair Ethernet configurations, repeaters are required for cable that runs longer than 100 meters. A repeater with multiple ports is known as a hub. Repeaters work on the physical layer of the OSI model. Repeaters require a small amount of time to regenerate the signal. This can cause a propagation delay which can affect network performance. As a result, many network architectures limit the number of repeaters that can be used in a row, e.g., the Ethernet 5-4-3 rule.
Hubs have been mostly obsoleted by modern switches; but repeaters are used for long distance links, notably undersea cabling.


Bridges

A network bridge connects multiple network segments at the data link layer (layer 2) of the OSI model to form a single network. Bridges broadcast to all ports except the port on which the broadcast was received. However, bridges do not promiscuously copy traffic to all ports, as hubs do. Instead, bridges learn which MAC addresses are reachable through specific ports. Once the bridge associates a port with an address, it will send traffic for that address to that port only.
Bridges learn the association of ports and addresses by examining the source address of frames that it sees on various ports. Once a frame arrives through a port, the bridge assumes that the MAC address is associated with that port and stores its source address.
The first time a bridge sees a previously unknown destination address, the bridge will forward the frame to all ports other than the one on which the frame arrived.

Bridges come in three basic types:

Local bridges: Directly connect LANs

Remote bridges: Can be used to create a wide area network (WAN) link between LANs. Remote bridges, where the connecting link is slower than the end networks, largely have been replaced with routers. Wireless bridges: Can be used to join LANs or connect remote devices to LANs.

Internet: http://en.wikipedia.org (adapted).
According to the text above, judge the following items.

Multiple network segments at the layer 2 of the OSI model can be connected by a network bridge, in order to form a single network.
Alternativas
Q351833 Inglês
Repeaters and hubs

A repeater is an electronic device that receives a network signal, cleans it of unnecessary noise, and regenerates it. The signal is retransmitted at a higher power level, or to the other side of an obstruction, so that the signal can cover longer distances without degradation. In most twisted pair Ethernet configurations, repeaters are required for cable that runs longer than 100 meters. A repeater with multiple ports is known as a hub. Repeaters work on the physical layer of the OSI model. Repeaters require a small amount of time to regenerate the signal. This can cause a propagation delay which can affect network performance. As a result, many network architectures limit the number of repeaters that can be used in a row, e.g., the Ethernet 5-4-3 rule.
Hubs have been mostly obsoleted by modern switches; but repeaters are used for long distance links, notably undersea cabling.


Bridges

A network bridge connects multiple network segments at the data link layer (layer 2) of the OSI model to form a single network. Bridges broadcast to all ports except the port on which the broadcast was received. However, bridges do not promiscuously copy traffic to all ports, as hubs do. Instead, bridges learn which MAC addresses are reachable through specific ports. Once the bridge associates a port with an address, it will send traffic for that address to that port only.
Bridges learn the association of ports and addresses by examining the source address of frames that it sees on various ports. Once a frame arrives through a port, the bridge assumes that the MAC address is associated with that port and stores its source address.
The first time a bridge sees a previously unknown destination address, the bridge will forward the frame to all ports other than the one on which the frame arrived.

Bridges come in three basic types:

Local bridges: Directly connect LANs

Remote bridges: Can be used to create a wide area network (WAN) link between LANs. Remote bridges, where the connecting link is slower than the end networks, largely have been replaced with routers. Wireless bridges: Can be used to join LANs or connect remote devices to LANs.

Internet: http://en.wikipedia.org (adapted).
According to the text above, judge the following items.

Since the invention of the hubs, the switches became obsolete.
Alternativas
Respostas
481: C
482: C
483: E
484: C
485: C
486: E
487: C
488: C
489: C
490: C
491: C
492: E
493: C
494: E
495: C
496: C
497: C
498: C
499: C
500: E