Questões de Inglês do ano 2022

Pesquise questões de concurso nos filtros abaixo

Listagem de Questões de Inglês do ano 2022

    Information technology (IT) serves a critical role in state operations. State agencies and higher education institutions are increasingly reliant on the automated processing of information. It is important that the IT applications that process information have controls to ensure and protect the accuracy, integrity, reliability, and confidentiality of the State’s information.
     Due to the increased reliance on IT applications, a significant portion of the audits the State Auditor’s Office (SAO) performs include an IT component. Auditors select IT controls for testing during an audit based on a risk assessment. The risk assessment considers, among other factors, the objectives and scope of the audit. Therefore, the SAO does not test all IT controls in every audit, with the high-risk and high-impact IT controls being tested more frequently. In addition, to minimize security risks, the SAO does not publicly report sensitive IT audit issues, in accordance with the Texas Government Code, Section 552.139.

Texas state auditor’s office report. Internet: <sao.texas.gov>  (adapted).


Judge the following item considering the text above and the vocabulary used in it.


The word “reliant” (in the second sentence of the first paragraph) could be correctly replaced by dependent without any change in the meaning of the text.

    Information technology (IT) serves a critical role in state operations. State agencies and higher education institutions are increasingly reliant on the automated processing of information. It is important that the IT applications that process information have controls to ensure and protect the accuracy, integrity, reliability, and confidentiality of the State’s information.
     Due to the increased reliance on IT applications, a significant portion of the audits the State Auditor’s Office (SAO) performs include an IT component. Auditors select IT controls for testing during an audit based on a risk assessment. The risk assessment considers, among other factors, the objectives and scope of the audit. Therefore, the SAO does not test all IT controls in every audit, with the high-risk and high-impact IT controls being tested more frequently. In addition, to minimize security risks, the SAO does not publicly report sensitive IT audit issues, in accordance with the Texas Government Code, Section 552.139.

Texas state auditor’s office report. Internet: <sao.texas.gov>  (adapted).


Judge the following item considering the text above and the vocabulary used in it.


The word state has the same meaning in the first and in the second sentences of the first paragraph.

    Information technology (IT) serves a critical role in state operations. State agencies and higher education institutions are increasingly reliant on the automated processing of information. It is important that the IT applications that process information have controls to ensure and protect the accuracy, integrity, reliability, and confidentiality of the State’s information.
     Due to the increased reliance on IT applications, a significant portion of the audits the State Auditor’s Office (SAO) performs include an IT component. Auditors select IT controls for testing during an audit based on a risk assessment. The risk assessment considers, among other factors, the objectives and scope of the audit. Therefore, the SAO does not test all IT controls in every audit, with the high-risk and high-impact IT controls being tested more frequently. In addition, to minimize security risks, the SAO does not publicly report sensitive IT audit issues, in accordance with the Texas Government Code, Section 552.139.

Texas state auditor’s office report. Internet: <sao.texas.gov>  (adapted).


Judge the following item considering the text above and the vocabulary used in it.


It can be inferred from the text that the SAO keeps certain issues secret to avoid endangering security. 

#Questão 1023024 - Inglês, Vocabulário | Vocabulary, CESPE / CEBRASPE, 2022, TCE-SC, Auditor Fiscal de Controle Externo - Ciência da Computação

In the second paragraph of the text, 


the word “disincentivize” could be correctly replaced by deter without any change in the meaning of the sentence.  

#Questão 1023025 - Inglês, Vocabulário | Vocabulary, CESPE / CEBRASPE, 2022, TCE-SC, Auditor Fiscal de Controle Externo - Ciência da Computação


    During a ransomware hack, attackers infiltrate a target’s computer system and encrypt its data. They then demand a payment before they will release the decryption key to free the system. This type of extortion has existed for decades, but in the 2010s it exploded in popularity, with online gangs holding local governments, infrastructure and even hospitals hostage. Ransomware is a collective problem—and solving it will require collaborative action from companies, the government and international partners.

     As long as victims keep paying, hackers will keep profiting from this type of attack. But cybersecurity experts are divided on whether the government should prohibit the paying of ransoms. Such a ban would disincentivize hackers, but it would also place some organizations in a moral quandary. For, say, a hospital, unlocking the computer systems as quickly as possible could be a matter of life or death for patients, and the fastest option may be to pay up.

     Collective action can help. If all organizations that fall victim to ransomware report their attacks, they will contribute to a trove of valuable data, which can be used to strike back against attackers. For example, certain ransomware gangs may use the exact same type of encryption in all their attacks. “White hat” hackers can and do study these trends, which allows them to retrieve and publish the decryption keys for specific types of ransomware. Many companies, however, remain reluctant to admit they have experienced a breach, wishing to avoid potential bad press. Overcoming that reluctance may require legislation, such as a bill introduced in the Senate last year that would require companies to report having paid a ransom within 24 hours of the transaction.

Internet:<www.scientificamerican.com>(adapted). 



In the second paragraph of the text, 


the word “quandary” could be correctly replaced by dilemma without any change in the meaning of the sentence. 

Navegue em mais matérias e assuntos

{TITLE}

{CONTENT}

{TITLE}

{CONTENT}
Estude Grátis