Magna Concursos

Foram encontradas 80 questões.

2161112 Ano: 2022
Disciplina: Biologia
Banca: FEPESE
Orgão: Polícia Científica-SC
Assinale a alternativa que cita corretamente o sentido do impulso nervoso em um neurônio.
 

Provas

Questão presente nas seguintes provas
2160821 Ano: 2022
Disciplina: Direito Sanitário
Banca: FEPESE
Orgão: Polícia Científica-SC
A putrefação ou o processo de decomposição da matéria orgânica inicia a partir da autólise e ocorre em períodos ou fases.

O primeiro desses períodos, que se manifesta, em geral, de 18 a 24 horas após o óbito, é o período:
 

Provas

Questão presente nas seguintes provas
2160776 Ano: 2022
Disciplina: Raciocínio Lógico
Banca: FEPESE
Orgão: Polícia Científica-SC
Assinale a alternativa que representa corretamente uma tautologia.
 

Provas

Questão presente nas seguintes provas
2160775 Ano: 2022
Disciplina: Raciocínio Lógico
Banca: FEPESE
Orgão: Polícia Científica-SC
Se A é um conjunto com 5n elementos, B é um conjunto com 2n – 1 elementos em comum com o conjunto A, e existem 22 elementos em A que não estão em B, então o número de elementos que estão no conjunto A e no conjunto B é:
 

Provas

Questão presente nas seguintes provas
2160774 Ano: 2022
Disciplina: Raciocínio Lógico
Banca: FEPESE
Orgão: Polícia Científica-SC
Assinale a alternativa que representa uma sentença logicamente equivalente a “Joaquim não é otimista ou Ana é rude.
 

Provas

Questão presente nas seguintes provas
2160773 Ano: 2022
Disciplina: Raciocínio Lógico
Banca: FEPESE
Orgão: Polícia Científica-SC
Se Janaína pesca, então Luís não viaja. Portanto:
 

Provas

Questão presente nas seguintes provas
2160692 Ano: 2022
Disciplina: Direito Administrativo
Banca: FEPESE
Orgão: Polícia Científica-SC
Assinale a alternativa correta acerca da invalidação do ato administrativo.
 

Provas

Questão presente nas seguintes provas
2160637 Ano: 2022
Disciplina: Direito Constitucional
Banca: FEPESE
Orgão: Polícia Científica-SC
Assinale a alternativa correta de acordo com a Constituição Federal.
 

Provas

Questão presente nas seguintes provas
2160612 Ano: 2022
Disciplina: Inglês (Língua Inglesa)
Banca: FEPESE
Orgão: Polícia Científica-SC
Phishing

Imagine that you get an email one morning. It appears to be from your bank. The email warns that someone broke into your account. It says that you need to sign in to check some things. You click the link in the email. It takes you to a site that looks very much like your bank’s. You enter your username and password. You submit the form. You’ve just been phished!

Phishing is a type of attack that happens over the Internet. Users receive an email or text message that seems like it came from a trusted source. These users are being deceived. They are interacting with dangerous hackers. The attackers copy trusted companies. They send users to web pages that look like the ones we use everyday. When users login or provide sensitive information, the attackers steal this data.

Attackers want your data for many reasons. They may use your data to commit identity fraud. This is when they use your identity to buy something with your credit. Then they receive the goods and you receive the bill. Or they may want your password to take over a computer network. They may want access to private emails. They may want customer records. They gain access by tricking people into giving them their login info.

Some phishing attacks are targeted. A targeted phishing attack is called a spear phishing attack. These attacks are dangerous because they are convincing. The attacker may know the target’s name, address, or job title. They may have gathered info from social networks, like the names of friends or family. The attackers may use this personal information to craft a believable email. The target will be tricked into clicking a link. The link will send them to a phony website. This site will look familiar, but it will be a spoofed site built to steal data. Any data that the target submits will go to the hacker.

Phishing attacks are dangerous, but you can spot them if you pay attention. One thing to watch is your address bar in your browser. Attackers use domains that look like the ones that we trust, but they are not the same. For example, in 2016 staffers from Hillary Clinton’s campaign were spear phished. The attackers used the domain accounts-google.com. That domain looks like google.com, but it isn’t the same. When logging into google, you should always do it from google.com. Likewise, when logging into any account, make sure the address matches what you expect. If you are unsure, search for the site and login from the root domain.

An even better way to secure your account against phishing attacks is to use 2FA: two factor authentication. 2FA means that your account is secured with two keys. The first is your password. The second key is a random code that changes every few minutes. This code may be generated by a 2FA app, like Authy. Or it can be sent to your cell phone on request. If you activate 2FA on your accounts, an attacker will not be able to get in even with your password.

Phishing attacks are scary and common. The reason why they are common is that they are effective. Many people accept appearances without suspicion. Browsing the Internet safely requires a healthy amount of suspicion. Not everything is what it appears. Nobody is trying to give you free money. Don’t trust; verify.
Read the article and decide if the statements below are true ( T ) or false ( F ).

( ) A phishing attack is to trick someone into giving away sensitive data.
( ) To commit identity fraud is a motive for phishing and it is mentioned in the text.
( ) 2FA can protect users from phishing attacks by having two keys to login.
( ) The domain accounts-google.com is used by attackers to phish.

Choose the alternative which presents the correct sequence, from top to bottom.
 

Provas

Questão presente nas seguintes provas
2160611 Ano: 2022
Disciplina: Inglês (Língua Inglesa)
Banca: FEPESE
Orgão: Polícia Científica-SC
Phishing

Imagine that you get an email one morning. It appears to be from your bank. The email warns that someone broke into your account. It says that you need to sign in to check some things. You click the link in the email. It takes you to a site that looks very much like your bank’s. You enter your username and password. You submit the form. You’ve just been phished!

Phishing is a type of attack that happens over the Internet. Users receive an email or text message that seems like it came from a trusted source. These users are being deceived. They are interacting with dangerous hackers. The attackers copy trusted companies. They send users to web pages that look like the ones we use everyday. When users login or provide sensitive information, the attackers steal this data.

Attackers want your data for many reasons. They may use your data to commit identity fraud. This is when they use your identity to buy something with your credit. Then they receive the goods and you receive the bill. Or they may want your password to take over a computer network. They may want access to private emails. They may want customer records. They gain access by tricking people into giving them their login info.

Some phishing attacks are targeted. A targeted phishing attack is called a spear phishing attack. These attacks are dangerous because they are convincing. The attacker may know the target’s name, address, or job title. They may have gathered info from social networks, like the names of friends or family. The attackers may use this personal information to craft a believable email. The target will be tricked into clicking a link. The link will send them to a phony website. This site will look familiar, but it will be a spoofed site built to steal data. Any data that the target submits will go to the hacker.

Phishing attacks are dangerous, but you can spot them if you pay attention. One thing to watch is your address bar in your browser. Attackers use domains that look like the ones that we trust, but they are not the same. For example, in 2016 staffers from Hillary Clinton’s campaign were spear phished. The attackers used the domain accounts-google.com. That domain looks like google.com, but it isn’t the same. When logging into google, you should always do it from google.com. Likewise, when logging into any account, make sure the address matches what you expect. If you are unsure, search for the site and login from the root domain.

An even better way to secure your account against phishing attacks is to use 2FA: two factor authentication. 2FA means that your account is secured with two keys. The first is your password. The second key is a random code that changes every few minutes. This code may be generated by a 2FA app, like Authy. Or it can be sent to your cell phone on request. If you activate 2FA on your accounts, an attacker will not be able to get in even with your password.

Phishing attacks are scary and common. The reason why they are common is that they are effective. Many people accept appearances without suspicion. Browsing the Internet safely requires a healthy amount of suspicion. Not everything is what it appears. Nobody is trying to give you free money. Don’t trust; verify.
The words sensitive information in the second paragraph, is closest in meaning to:
 

Provas

Questão presente nas seguintes provas