Questões de Concurso Comentadas para auditor federal de controle externo

Foram encontradas 577 questões

Resolva questões gratuitamente!

Junte-se a mais de 4 milhões de concurseiros!

Q1901978 Economia

Considerando uma economia com o modelo macroeconômico tradicional no qual o governo controla a quantidade de moeda, julgue o item a seguir. 


O modelo IS/LM é contracíclico, de modo que a expansão da quantidade de moeda gera redução do salário real de equilíbrio. 

Alternativas
Q1901977 Inglês


    During a ransomware hack, attackers infiltrate a target’s computer system and encrypt its data. They then demand a payment before they will release the decryption key to free the system. This type of extortion has existed for decades, but in the 2010s it exploded in popularity, with online gangs holding local governments, infrastructure and even hospitals hostage. Ransomware is a collective problem—and solving it will require collaborative action from companies, the government and international partners.

     As long as victims keep paying, hackers will keep profiting from this type of attack. But cybersecurity experts are divided on whether the government should prohibit the paying of ransoms. Such a ban would disincentivize hackers, but it would also place some organizations in a moral quandary. For, say, a hospital, unlocking the computer systems as quickly as possible could be a matter of life or death for patients, and the fastest option may be to pay up.

     Collective action can help. If all organizations that fall victim to ransomware report their attacks, they will contribute to a trove of valuable data, which can be used to strike back against attackers. For example, certain ransomware gangs may use the exact same type of encryption in all their attacks. “White hat” hackers can and do study these trends, which allows them to retrieve and publish the decryption keys for specific types of ransomware. Many companies, however, remain reluctant to admit they have experienced a breach, wishing to avoid potential bad press. Overcoming that reluctance may require legislation, such as a bill introduced in the Senate last year that would require companies to report having paid a ransom within 24 hours of the transaction.

Internet:<www.scientificamerican.com>(adapted). 

In the second paragraph of the text, 


the word “disincentivize” could be correctly replaced by deter without any change in the meaning of the sentence.  

Alternativas
Q1901976 Inglês


    During a ransomware hack, attackers infiltrate a target’s computer system and encrypt its data. They then demand a payment before they will release the decryption key to free the system. This type of extortion has existed for decades, but in the 2010s it exploded in popularity, with online gangs holding local governments, infrastructure and even hospitals hostage. Ransomware is a collective problem—and solving it will require collaborative action from companies, the government and international partners.

     As long as victims keep paying, hackers will keep profiting from this type of attack. But cybersecurity experts are divided on whether the government should prohibit the paying of ransoms. Such a ban would disincentivize hackers, but it would also place some organizations in a moral quandary. For, say, a hospital, unlocking the computer systems as quickly as possible could be a matter of life or death for patients, and the fastest option may be to pay up.

     Collective action can help. If all organizations that fall victim to ransomware report their attacks, they will contribute to a trove of valuable data, which can be used to strike back against attackers. For example, certain ransomware gangs may use the exact same type of encryption in all their attacks. “White hat” hackers can and do study these trends, which allows them to retrieve and publish the decryption keys for specific types of ransomware. Many companies, however, remain reluctant to admit they have experienced a breach, wishing to avoid potential bad press. Overcoming that reluctance may require legislation, such as a bill introduced in the Senate last year that would require companies to report having paid a ransom within 24 hours of the transaction.

Internet:<www.scientificamerican.com>(adapted). 

In the second paragraph of the text, 


the word “quandary” could be correctly replaced by dilemma without any change in the meaning of the sentence. 

Alternativas
Q1901975 Inglês


    During a ransomware hack, attackers infiltrate a target’s computer system and encrypt its data. They then demand a payment before they will release the decryption key to free the system. This type of extortion has existed for decades, but in the 2010s it exploded in popularity, with online gangs holding local governments, infrastructure and even hospitals hostage. Ransomware is a collective problem—and solving it will require collaborative action from companies, the government and international partners.

     As long as victims keep paying, hackers will keep profiting from this type of attack. But cybersecurity experts are divided on whether the government should prohibit the paying of ransoms. Such a ban would disincentivize hackers, but it would also place some organizations in a moral quandary. For, say, a hospital, unlocking the computer systems as quickly as possible could be a matter of life or death for patients, and the fastest option may be to pay up.

     Collective action can help. If all organizations that fall victim to ransomware report their attacks, they will contribute to a trove of valuable data, which can be used to strike back against attackers. For example, certain ransomware gangs may use the exact same type of encryption in all their attacks. “White hat” hackers can and do study these trends, which allows them to retrieve and publish the decryption keys for specific types of ransomware. Many companies, however, remain reluctant to admit they have experienced a breach, wishing to avoid potential bad press. Overcoming that reluctance may require legislation, such as a bill introduced in the Senate last year that would require companies to report having paid a ransom within 24 hours of the transaction.

Internet:<www.scientificamerican.com>(adapted). 

Judge the following items according to the text above. 


It can be concluded from the text that the quickest option for hospitals being under attack of ransomware would be to pay more than the amount the attackers demand. 

Alternativas
Q1901974 Inglês


    During a ransomware hack, attackers infiltrate a target’s computer system and encrypt its data. They then demand a payment before they will release the decryption key to free the system. This type of extortion has existed for decades, but in the 2010s it exploded in popularity, with online gangs holding local governments, infrastructure and even hospitals hostage. Ransomware is a collective problem—and solving it will require collaborative action from companies, the government and international partners.

     As long as victims keep paying, hackers will keep profiting from this type of attack. But cybersecurity experts are divided on whether the government should prohibit the paying of ransoms. Such a ban would disincentivize hackers, but it would also place some organizations in a moral quandary. For, say, a hospital, unlocking the computer systems as quickly as possible could be a matter of life or death for patients, and the fastest option may be to pay up.

     Collective action can help. If all organizations that fall victim to ransomware report their attacks, they will contribute to a trove of valuable data, which can be used to strike back against attackers. For example, certain ransomware gangs may use the exact same type of encryption in all their attacks. “White hat” hackers can and do study these trends, which allows them to retrieve and publish the decryption keys for specific types of ransomware. Many companies, however, remain reluctant to admit they have experienced a breach, wishing to avoid potential bad press. Overcoming that reluctance may require legislation, such as a bill introduced in the Senate last year that would require companies to report having paid a ransom within 24 hours of the transaction.

Internet:<www.scientificamerican.com>(adapted). 

Judge the following items according to the text above. 


The author of the text claims that the solution to ransomware is to stop paying ransoms. 

Alternativas
Q1901973 Inglês


    During a ransomware hack, attackers infiltrate a target’s computer system and encrypt its data. They then demand a payment before they will release the decryption key to free the system. This type of extortion has existed for decades, but in the 2010s it exploded in popularity, with online gangs holding local governments, infrastructure and even hospitals hostage. Ransomware is a collective problem—and solving it will require collaborative action from companies, the government and international partners.

     As long as victims keep paying, hackers will keep profiting from this type of attack. But cybersecurity experts are divided on whether the government should prohibit the paying of ransoms. Such a ban would disincentivize hackers, but it would also place some organizations in a moral quandary. For, say, a hospital, unlocking the computer systems as quickly as possible could be a matter of life or death for patients, and the fastest option may be to pay up.

     Collective action can help. If all organizations that fall victim to ransomware report their attacks, they will contribute to a trove of valuable data, which can be used to strike back against attackers. For example, certain ransomware gangs may use the exact same type of encryption in all their attacks. “White hat” hackers can and do study these trends, which allows them to retrieve and publish the decryption keys for specific types of ransomware. Many companies, however, remain reluctant to admit they have experienced a breach, wishing to avoid potential bad press. Overcoming that reluctance may require legislation, such as a bill introduced in the Senate last year that would require companies to report having paid a ransom within 24 hours of the transaction.

Internet:<www.scientificamerican.com>(adapted). 

Judge the following items according to the text above. 


The text says that, in order to avoid bad press, companies should be required by law to report having paid ransom.

Alternativas
Q1901972 Inglês


    During a ransomware hack, attackers infiltrate a target’s computer system and encrypt its data. They then demand a payment before they will release the decryption key to free the system. This type of extortion has existed for decades, but in the 2010s it exploded in popularity, with online gangs holding local governments, infrastructure and even hospitals hostage. Ransomware is a collective problem—and solving it will require collaborative action from companies, the government and international partners.

     As long as victims keep paying, hackers will keep profiting from this type of attack. But cybersecurity experts are divided on whether the government should prohibit the paying of ransoms. Such a ban would disincentivize hackers, but it would also place some organizations in a moral quandary. For, say, a hospital, unlocking the computer systems as quickly as possible could be a matter of life or death for patients, and the fastest option may be to pay up.

     Collective action can help. If all organizations that fall victim to ransomware report their attacks, they will contribute to a trove of valuable data, which can be used to strike back against attackers. For example, certain ransomware gangs may use the exact same type of encryption in all their attacks. “White hat” hackers can and do study these trends, which allows them to retrieve and publish the decryption keys for specific types of ransomware. Many companies, however, remain reluctant to admit they have experienced a breach, wishing to avoid potential bad press. Overcoming that reluctance may require legislation, such as a bill introduced in the Senate last year that would require companies to report having paid a ransom within 24 hours of the transaction.

Internet:<www.scientificamerican.com>(adapted). 

Judge the following items according to the text above. 


It can be inferred from the text that ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid. 

Alternativas
Q1901971 Administração Pública

Julgue o próximo item, relativo à Lei n.º 13.709/2018 (Lei Geral de Proteção de Dados atualizada).  


Competem ao controlador, e não a encarregado, as decisões referentes ao tratamento de dados pessoais.

Alternativas
Q1901970 Administração Pública

Julgue o próximo item, relativo à Lei n.º 13.709/2018 (Lei Geral de Proteção de Dados atualizada).  


Em caso de cumprimento de obrigação regulatória pelo controlador, permite-se o tratamento de dados pessoais.

Alternativas
Q1901966 Direito Administrativo

Julgue o próximo item, relativo ao que estabelecem as Leis n.º 13.303/2016 e n.º 10.520/2002.  


Se a empresa XYZ for uma empresa pública cuja maioria do capital votante seja de propriedade do Distrito Federal, será admitida, nesse caso, a participação de entidades da administração indireta dos estados no capital dessa empresa. 

Alternativas
Q1901964 Segurança da Informação

No que tange a gestão de riscos e continuidade do negócio, julgue o próximo item.


Segundo a NBR n.º 27005:2019, a abordagem da gestão de riscos de segurança da informação define que se deve adotar um método de fazer a gestão da segurança para todos os processos existentes para facilitar o treinamento dos colaboradores.  

Alternativas
Q1901963 Segurança da Informação

Com relação a segurança em recursos humanos, julgue o seguinte item. 


Na NBR n.º 27001:2013, está previsto que as responsabilidades pela segurança da informação permaneçam válidas após um encerramento ou mudança da contratação, devendo ser definidas, comunicadas aos funcionários ou partes externas e cumpridas. 

Alternativas
Q1901962 Redes de Computadores

Julgue o item a seguir, acerca de segurança para trabalho remoto. 


A rede privada virtual, ou VPN (virtual private network), é uma tecnologia de rede implementada para conectar um ou mais computadores a uma rede privada pela Internet.  

Alternativas
Q1901961 Segurança da Informação

Julgue o item subsequente, a respeito de políticas para o uso de dispositivo móvel. 


A ameaça em segurança dos dispositivos móveis da empresa denominada ataques de engenharia social é caracterizada pelo mau uso dos recursos de rede, dispositivo ou identidade, como, por exemplo, ataques de negação de serviço. 

Alternativas
Q1901960 Engenharia de Software

Julgue o próximo item, que se refere a desenvolvimento e manutenção de sistemas.


Mudanças em sistemas dentro do ciclo de vida de desenvolvimento devem ser controladas utilizando-se procedimentos formais de controle de mudanças. 

Alternativas
Q1901959 Segurança da Informação

Julgue o item seguinte, acerca de controle de acesso.  


No controle de acesso, somente os usuários que tenham sido especificamente autorizados podem usar e receber acesso às redes e aos seus serviços. 

Alternativas
Q1901958 Segurança da Informação

Julgue o item a seguir, a respeito da NBR ISO/IEC n.º 27001:2013. 


Segundo a referida norma, um incidente de segurança da informação é uma ocorrência identificada de um estado de sistema, serviço ou rede, que indica uma possível falha no sistema de gestão da informação. 

Alternativas
Q1901957 Governança de TI

Julgue o próximo item, com relação a COBIT 2019 e ITIL 4. 


O DevOps no COBIT 2019 é considerado uma área de foco (focus area), porque ele pode ser considerado uma questão de governança de TIC, sendo assim necessário realizar o gerenciamento de seus componentes.  

Alternativas
Q1901956 Governança de TI

Julgue o próximo item, com relação a COBIT 2019 e ITIL 4. 


As práticas no sistema de valores de serviço (SVS) da ITIL 4 destinam-se a atingir um objetivo; elas estão relacionadas ao gerenciamento de serviço que busca habilitar o valor, na forma de serviços, para os clientes. 

Alternativas
Q1901955 Banco de Dados

Considerando os sistemas de gerenciamento de banco de dados (SGBD) e o Comitê Gestor da Internet no Brasil (CGIbr), julgue o item seguinte.


No PostgreSQL 13 é possível obter informações das configurações correntes do SGBD por meio de consultas às suas views nativas. O comando abaixo permite obter o número máximo de conexões ativas que uma database, de nome bancodedados, pode receber.

SELECT max_connections FROM pg_stat_database WHERE datname= 'bancodedados';

Alternativas
Respostas
41: C
42: C
43: C
44: E
45: E
46: E
47: C
48: C
49: C
50: C
51: E
52: C
53: C
54: E
55: C
56: C
57: E
58: C
59: C
60: E