Magna Concursos

Foram encontradas 477 questões.

100754 Ano: 2013
Disciplina: Inglês (Língua Inglesa)
Banca: VUNESP
Orgão: COREN-SP

Considere o texto a seguir:

We should point out here that the focal point of any operating system is its ‘kernel’. Without going into great detail, the kernel is what tells the big chip that controls your computer to do what you want the program that you’re using to do. To use a metaphor, if you go to your favorite Italian restaurant and order ‘Spaghetti alla Bolognese’, this dish is like your operating system. There are a lot of things that go into making that dish like pasta, tomato sauce, meatballs and cheese. Well, the kernel is like the pasta. Without pasta, that dish doesn’t exist. You might as well find some bread and make a sandwich. A plate of just pasta is fairly unappetizing.

Without a kernel, an operating system doesn’t exist. Without programs, a kernel is useless.

(Extraído de: Beginners Level Course: What is Linux? linux.org.

http://www.linux.org/threads/what-is-linux.4076/)

Segundo o texto, pode-se interpretar que

 

Provas

Questão presente nas seguintes provas
100733 Ano: 2013
Disciplina: Inglês (Língua Inglesa)
Banca: VUNESP
Orgão: COREN-SP

O texto a seguir deve ser utilizado para responder às questões de números 21 a 23.


Historically, information security has been called a number of different things such as:

• Data security;

• IT Security;

• Computer security.

But these terms (except possibly data security) ignore the fact that the information that is held on the computers is almost always and most certainly worth many times more than the computers that it runs on. The correct term is ‘information security’ and typically information security comprises three component parts:

• Confidentiality. Assurance that information is shared only among authorised persons or organisations. Breaches of confidentiality can occur when data is not handled in a manner appropriate to safeguard the confidentiality of the information concerned. Such disclosure can take place by word of mouth, by printing, copying, e-mailing or creating documents and other data etc.;

• Integrity. Assurance that the information is authentic and complete. Ensuring that information can be relied upon to be sufficiently accurate for its purpose. The term ‘integrity’ is used frequently when considering information security as it represents one of the primary indicators of information security (or lack of it). The integrity of data is not only whether the data is ‘correct’, but whether it can be trusted and relied upon;

• Availability. Assurance that the systems responsible for delivering, storing and processing information are accessible when needed, by those who need them.


(Extraído de: “An Introduction to Information, Network and Internet Security.

What is ‘Information Security’?” The Security Practitioner

http://security.practitioner.com/introduction/infosec_2.htm)

Os sinônimos para o termo “assurance”, dentro do contexto, são:

 

Provas

Questão presente nas seguintes provas
100730 Ano: 2013
Disciplina: Inglês (Língua Inglesa)
Banca: VUNESP
Orgão: COREN-SP

O texto a seguir deve ser utilizado para responder às questões de números 21 a 23.


Historically, information security has been called a number of different things such as:

• Data security;

• IT Security;

• Computer security.

But these terms (except possibly data security) ignore the fact that the information that is held on the computers is almost always and most certainly worth many times more than the computers that it runs on. The correct term is ‘information security’ and typically information security comprises three component parts:

• Confidentiality. Assurance that information is shared only among authorised persons or organisations. Breaches of confidentiality can occur when data is not handled in a manner appropriate to safeguard the confidentiality of the information concerned. Such disclosure can take place by word of mouth, by printing, copying, e-mailing or creating documents and other data etc.;

• Integrity. Assurance that the information is authentic and complete. Ensuring that information can be relied upon to be sufficiently accurate for its purpose. The term ‘integrity’ is used frequently when considering information security as it represents one of the primary indicators of information security (or lack of it). The integrity of data is not only whether the data is ‘correct’, but whether it can be trusted and relied upon;

• Availability. Assurance that the systems responsible for delivering, storing and processing information are accessible when needed, by those who need them.


(Extraído de: “An Introduction to Information, Network and Internet Security.

What is ‘Information Security’?” The Security Practitioner

http://security.practitioner.com/introduction/infosec_2.htm)

Segundo o texto, quando os dados não são tratados de forma adequada para salvaguardar a confidencialidade da informação de interesse, pode ocorrer

 

Provas

Questão presente nas seguintes provas
100729 Ano: 2013
Disciplina: Inglês (Língua Inglesa)
Banca: VUNESP
Orgão: COREN-SP

O texto a seguir deve ser utilizado para responder às questões de números 21 a 23.


Historically, information security has been called a number of different things such as:

• Data security;

• IT Security;

• Computer security.

But these terms (except possibly data security) ignore the fact that the information that is held on the computers is almost always and most certainly worth many times more than the computers that it runs on. The correct term is ‘information security’ and typically information security comprises three component parts:

• Confidentiality. Assurance that information is shared only among authorised persons or organisations. Breaches of confidentiality can occur when data is not handled in a manner appropriate to safeguard the confidentiality of the information concerned. Such disclosure can take place by word of mouth, by printing, copying, e-mailing or creating documents and other data etc.;

• Integrity. Assurance that the information is authentic and complete. Ensuring that information can be relied upon to be sufficiently accurate for its purpose. The term ‘integrity’ is used frequently when considering information security as it represents one of the primary indicators of information security (or lack of it). The integrity of data is not only whether the data is ‘correct’, but whether it can be trusted and relied upon;

• Availability. Assurance that the systems responsible for delivering, storing and processing information are accessible when needed, by those who need them.


(Extraído de: “An Introduction to Information, Network and Internet Security.

What is ‘Information Security’?” The Security Practitioner

http://security.practitioner.com/introduction/infosec_2.htm)

A melhor tradução, dentro do contexto, para “information security comprises three component parts” é:

 

Provas

Questão presente nas seguintes provas
100724 Ano: 2013
Disciplina: Estatística
Banca: VUNESP
Orgão: COREN-SP
Provas:

De acordo com o Diagrama de Pareto, efeitos e causas estão relacionados na seguinte paridade:

 

Provas

Questão presente nas seguintes provas
100723 Ano: 2013
Disciplina: Auditoria
Banca: VUNESP
Orgão: COREN-SP
Provas:

Segundo a metodologia COSO II (Committee of Sponsoring Organizations of the Treadway Commission), os objetivos que deverão ser tratados como objetos de gerenciamento de risco, conforme modelo (framework) apresentado por aquela entidade são:

 

Provas

Questão presente nas seguintes provas
100720 Ano: 2013
Disciplina: Auditoria
Banca: VUNESP
Orgão: COREN-SP
Provas:

Um dos objetivos dos controles internos numa organização é o relativo à salvaguarda dos interesses, que por sua vez refere-se à proteção do patrimônio contra quaisquer perdas e riscos devidos a erros ou irregularidades. Nesse sentido, um dos meios que pode dar suporte necessário à salvaguarda dos interesses da organização e que estabelece a independência para as funções de execução operacional, custódia física e contabilização, e que cada uma dessas fases da operação deve ser executada por pessoal diferente e independente entre si, é a(o)

 

Provas

Questão presente nas seguintes provas
100192 Ano: 2013
Disciplina: Auditoria
Banca: VUNESP
Orgão: COREN-SP
Provas:

Os princípios básicos da Governança Corporativa são:

 

Provas

Questão presente nas seguintes provas
100153 Ano: 2013
Disciplina: Auditoria
Banca: VUNESP
Orgão: COREN-SP
Provas:

De acordo com as normas internacionais da profissão de auditor interno, especificamente sobre a proficiência da profissão, nos casos em que a equipe de auditoria interna não disponha de conhecimentos, habilidades ou outras competências necessárias à execução de todo ou de parte do trabalho de auditoria, o diretor executivo de auditoria, ou o profissional que estiver encarregado pela auditoria deverá

 

Provas

Questão presente nas seguintes provas
100151 Ano: 2013
Disciplina: Auditoria
Banca: VUNESP
Orgão: COREN-SP
Provas:

Risco de auditoria é

 

Provas

Questão presente nas seguintes provas