Magna Concursos

Foram encontradas 50 questões.

Leia o texto para responder à questão.

Information Security (InfoSec) defined

Information security, often abbreviated InfoSec, is a set of security procedures and tools that broadly protect sensitive enterprise information from misuse, unauthorized access, disruption, or destruction. InfoSec encompasses physical and environmental security, access control, and cybersecurity. It often includes technologies like cloud access security brokers (CASB), deception tools, endpoint detection and response (EDR), and security testing for DevOps (DevSecOps), among others.

Key elements of information security

InfoSec comprises a range of security tools, solutions, and processes that keep enterprise information secure across devices and locations, helping to protect against cyberattacks or other disruptive events.

• Application security - Policies, procedures, tools, and best practices enacted to protect applications and their data.w

• Cloud security - Policies, procedures, tools, and best practices enacted to protect all aspects of the cloud, including systems, data, applications, and infrastructure.

• Cryptography - An algorithm-based method of securing communication meant to ensure only intended recipients of a specific message can view and decipher it.

• Disaster recovery - A method to reestablish functional technological systems in the wake of an event like a natural disaster, cyberattack, or another disruptive event.

• Incident response - An organization’s plan for responding to, remediating, and managing the aftermath of a cyberattack, data breach, or another disruptive event.

• Infrastructure security - Security that encompasses an organization’s entire technological infrastructure, including both hardware and software systems.

• Vulnerability management - The process an organization takes to identify, assess, and remediate vulnerabilities in its endpoints, software, and systems.

(www.microsoft.com/en-ww/security/business/security-101/

what-is-information-security-infosec#:~:text=Information%20

security%2C%20often%20abbreviated%20(InfoSec,access%2C%20

disruption%2C%20or%20destruction. Adaptado.)

Leia a parte do texto Key elements of information security para responder à questão.

No texto, os elementos chave de Segurança da Informação que mencionam explicitamente o uso de políticas são

 

Provas

Questão presente nas seguintes provas

Leia o texto para responder à questão.

Information Security (InfoSec) defined

Information security, often abbreviated InfoSec, is a set of security procedures and tools that broadly protect sensitive enterprise information from misuse, unauthorized access, disruption, or destruction. InfoSec encompasses physical and environmental security, access control, and cybersecurity. It often includes technologies like cloud access security brokers (CASB), deception tools, endpoint detection and response (EDR), and security testing for DevOps (DevSecOps), among others.

Key elements of information security

InfoSec comprises a range of security tools, solutions, and processes that keep enterprise information secure across devices and locations, helping to protect against cyberattacks or other disruptive events.

• Application security - Policies, procedures, tools, and best practices enacted to protect applications and their data.w

• Cloud security - Policies, procedures, tools, and best practices enacted to protect all aspects of the cloud, including systems, data, applications, and infrastructure.

• Cryptography - An algorithm-based method of securing communication meant to ensure only intended recipients of a specific message can view and decipher it.

• Disaster recovery - A method to reestablish functional technological systems in the wake of an event like a natural disaster, cyberattack, or another disruptive event.

• Incident response - An organization’s plan for responding to, remediating, and managing the aftermath of a cyberattack, data breach, or another disruptive event.

• Infrastructure security - Security that encompasses an organization’s entire technological infrastructure, including both hardware and software systems.

• Vulnerability management - The process an organization takes to identify, assess, and remediate vulnerabilities in its endpoints, software, and systems.

(www.microsoft.com/en-ww/security/business/security-101/

what-is-information-security-infosec#:~:text=Information%20

security%2C%20often%20abbreviated%20(InfoSec,access%2C%20

disruption%2C%20or%20destruction. Adaptado.)

In the excerpt from the first part of the text “It often includes technologies”, the word in bold refers to

 

Provas

Questão presente nas seguintes provas

Leia o texto para responder à questão.

Information Security (InfoSec) defined

Information security, often abbreviated InfoSec, is a set of security procedures and tools that broadly protect sensitive enterprise information from misuse, unauthorized access, disruption, or destruction. InfoSec encompasses physical and environmental security, access control, and cybersecurity. It often includes technologies like cloud access security brokers (CASB), deception tools, endpoint detection and response (EDR), and security testing for DevOps (DevSecOps), among others.

Key elements of information security

InfoSec comprises a range of security tools, solutions, and processes that keep enterprise information secure across devices and locations, helping to protect against cyberattacks or other disruptive events.

• Application security - Policies, procedures, tools, and best practices enacted to protect applications and their data.w

• Cloud security - Policies, procedures, tools, and best practices enacted to protect all aspects of the cloud, including systems, data, applications, and infrastructure.

• Cryptography - An algorithm-based method of securing communication meant to ensure only intended recipients of a specific message can view and decipher it.

• Disaster recovery - A method to reestablish functional technological systems in the wake of an event like a natural disaster, cyberattack, or another disruptive event.

• Incident response - An organization’s plan for responding to, remediating, and managing the aftermath of a cyberattack, data breach, or another disruptive event.

• Infrastructure security - Security that encompasses an organization’s entire technological infrastructure, including both hardware and software systems.

• Vulnerability management - The process an organization takes to identify, assess, and remediate vulnerabilities in its endpoints, software, and systems.

(www.microsoft.com/en-ww/security/business/security-101/

what-is-information-security-infosec#:~:text=Information%20

security%2C%20often%20abbreviated%20(InfoSec,access%2C%20

disruption%2C%20or%20destruction. Adaptado.)

No trecho da primeira parte do texto “It often includes technologies like cloud access security brokers (CASB), deception tools, endpoint detection and response (EDR), and security testing for DevOps (DevSecOps), among others”, o termo destacado em negrito indica

 

Provas

Questão presente nas seguintes provas

Leia o texto para responder à questão.

Information Security (InfoSec) defined

Information security, often abbreviated InfoSec, is a set of security procedures and tools that broadly protect sensitive enterprise information from misuse, unauthorized access, disruption, or destruction. InfoSec encompasses physical and environmental security, access control, and cybersecurity. It often includes technologies like cloud access security brokers (CASB), deception tools, endpoint detection and response (EDR), and security testing for DevOps (DevSecOps), among others.

Key elements of information security

InfoSec comprises a range of security tools, solutions, and processes that keep enterprise information secure across devices and locations, helping to protect against cyberattacks or other disruptive events.

• Application security - Policies, procedures, tools, and best practices enacted to protect applications and their data.w

• Cloud security - Policies, procedures, tools, and best practices enacted to protect all aspects of the cloud, including systems, data, applications, and infrastructure.

• Cryptography - An algorithm-based method of securing communication meant to ensure only intended recipients of a specific message can view and decipher it.

• Disaster recovery - A method to reestablish functional technological systems in the wake of an event like a natural disaster, cyberattack, or another disruptive event.

• Incident response - An organization’s plan for responding to, remediating, and managing the aftermath of a cyberattack, data breach, or another disruptive event.

• Infrastructure security - Security that encompasses an organization’s entire technological infrastructure, including both hardware and software systems.

• Vulnerability management - The process an organization takes to identify, assess, and remediate vulnerabilities in its endpoints, software, and systems.

(www.microsoft.com/en-ww/security/business/security-101/

what-is-information-security-infosec#:~:text=Information%20

security%2C%20often%20abbreviated%20(InfoSec,access%2C%20

disruption%2C%20or%20destruction. Adaptado.)

According to the definition of Information Security provided in the first part of the text, the aim of InfoSec is to

 

Provas

Questão presente nas seguintes provas

Uma equipe é formada por 33 ciclistas e 26 corredores, sendo que quem é corredor não é ciclista. Dessa equipe 28 pessoas usam relógio e, entre os corredores, 5 não usam relógio.

O número de ciclistas que não usam relógio é

 

Provas

Questão presente nas seguintes provas

Três avós, Alzira, Beatriz e Carlota têm, cada uma, uma neta, cujos nomes são, não necessariamente nessa ordem, Dolores, Edite e Florinda. Essas seis mulheres jogaram várias partidas de dominó entre si, cada partida entre duas mulheres e cada partida com uma vencedora. No total foram 73 partidas e Beatriz foi a grande vencedora, com 24 vitórias. Carlota venceu 3 partidas a mais do que Alzira e a avó de Florinda venceu um número de partidas igual a um terço do número de partidas que a avó de Edite venceu. Dolores e sua avó venceram um total de 18 partidas e a neta de Alzira foi a neta que mais venceu, com 14 vitórias. Uma das netas venceu a metade do número de partidas vencidas por outra neta.

O total de vitórias das netas de Beatriz e Carlota foi

 

Provas

Questão presente nas seguintes provas

Considere a sequência 0, 1, 0, 2, 0, 0, 3, 0, 0, 0, 4, 0, 0, 0, 0, 5… Nessa sequência o termo igual a 0 ocorre a primeira vez na 1a posição, a segunda vez na 3a posição e a décima vez na 14a posição.

Nessa sequência, a centésima ocorrência do termo igual a 0 é na

 

Provas

Questão presente nas seguintes provas

Os 234 entrevistados de uma pesquisa responderam à pergunta “Qual ou quais serviços de assinatura de vídeos sob demanda você possui?”. As únicas respostas foram sobre os serviços A, B ou C, sendo que cada entrevistado assina pelo menos um desses serviços. Do total de entrevistados, um terço assina o serviço A e 5 pessoas assinam os três serviços. O número de pessoas que assinam apenas o serviço B é o quádruplo do número de pessoas que assinam apenas os serviços B e C. Ninguém assina apenas os serviços A e B e 92 pessoas assinam o serviço C. São 31 pessoas que assinam apenas os serviços A e C.

O número de entrevistados que assinam apenas o serviço A excede o número de entrevistados que assinam apenas o serviço C em

 

Provas

Questão presente nas seguintes provas

José foi conhecer o novo restaurante de sua amiga Sueli. Ao chegar ao local, José viu que havia 3 restaurantes lado a lado, um de portas brancas, um de portas pretas e um de portas vermelhas e ele sabia que apenas um restaurante era o de Sueli e que cada atendente ou só mentia ou só dizia a verdade. José perguntou ao atendente de cada restaurante qual era o de Sueli, obtendo as seguintes respostas de cada atendente, identificado pela cor das portas do restaurante que trabalha:

(branca) O restaurante de portas brancas não é o de Sueli.

(preta) O restaurante de Sueli é o de portas vermelhas.

(vermelha) Eu sou o único atendente que fala a verdade.

Como José não foi capaz de identificar o restaurante com as respostas dadas, ele perguntou a cada atendente: “Você trabalha no restaurante de Sueli?”, e todos os atendentes responderam com “Não”.

A cor da porta do restaurante de Sueli e a cor da porta do restaurante que trabalha um atendente que disse a verdade são, respectivamente,

 

Provas

Questão presente nas seguintes provas

Considere as proposições:

p: Todo pescador tem alicate.

q: Se João é bom pescador, então ele tem alicate.

r: João pesca de barco ou João não usa isca artificial.

Sabendo que o valor lógico de ¬p → (q V r) é falso, então tem valor lógico verdadeiro o que se afirma em

 

Provas

Questão presente nas seguintes provas