Questões Concurso TCE-SC

Pesquise questões de concurso nos filtros abaixo

Listagem de Questões Concurso TCE-SC

#Questão 1023027 - Inglês, Interpretação de texto | Reading comprehension, CESPE / CEBRASPE, 2022, TCE-SC, Auditor Fiscal de Controle Externo - Ciência da Computação

Judge the following items according to the text above. 


The author of the text claims that the solution to ransomware is to stop paying ransoms. 

#Questão 1023028 - Inglês, Interpretação de texto | Reading comprehension, CESPE / CEBRASPE, 2022, TCE-SC, Auditor Fiscal de Controle Externo - Ciência da Computação


    During a ransomware hack, attackers infiltrate a target’s computer system and encrypt its data. They then demand a payment before they will release the decryption key to free the system. This type of extortion has existed for decades, but in the 2010s it exploded in popularity, with online gangs holding local governments, infrastructure and even hospitals hostage. Ransomware is a collective problem—and solving it will require collaborative action from companies, the government and international partners.

     As long as victims keep paying, hackers will keep profiting from this type of attack. But cybersecurity experts are divided on whether the government should prohibit the paying of ransoms. Such a ban would disincentivize hackers, but it would also place some organizations in a moral quandary. For, say, a hospital, unlocking the computer systems as quickly as possible could be a matter of life or death for patients, and the fastest option may be to pay up.

     Collective action can help. If all organizations that fall victim to ransomware report their attacks, they will contribute to a trove of valuable data, which can be used to strike back against attackers. For example, certain ransomware gangs may use the exact same type of encryption in all their attacks. “White hat” hackers can and do study these trends, which allows them to retrieve and publish the decryption keys for specific types of ransomware. Many companies, however, remain reluctant to admit they have experienced a breach, wishing to avoid potential bad press. Overcoming that reluctance may require legislation, such as a bill introduced in the Senate last year that would require companies to report having paid a ransom within 24 hours of the transaction.

Internet:<www.scientificamerican.com>(adapted). 



Judge the following items according to the text above. 


The text says that, in order to avoid bad press, companies should be required by law to report having paid ransom.

#Questão 1023029 - Inglês, Interpretação de texto | Reading comprehension, CESPE / CEBRASPE, 2022, TCE-SC, Auditor Fiscal de Controle Externo - Ciência da Computação


    During a ransomware hack, attackers infiltrate a target’s computer system and encrypt its data. They then demand a payment before they will release the decryption key to free the system. This type of extortion has existed for decades, but in the 2010s it exploded in popularity, with online gangs holding local governments, infrastructure and even hospitals hostage. Ransomware is a collective problem—and solving it will require collaborative action from companies, the government and international partners.

     As long as victims keep paying, hackers will keep profiting from this type of attack. But cybersecurity experts are divided on whether the government should prohibit the paying of ransoms. Such a ban would disincentivize hackers, but it would also place some organizations in a moral quandary. For, say, a hospital, unlocking the computer systems as quickly as possible could be a matter of life or death for patients, and the fastest option may be to pay up.

     Collective action can help. If all organizations that fall victim to ransomware report their attacks, they will contribute to a trove of valuable data, which can be used to strike back against attackers. For example, certain ransomware gangs may use the exact same type of encryption in all their attacks. “White hat” hackers can and do study these trends, which allows them to retrieve and publish the decryption keys for specific types of ransomware. Many companies, however, remain reluctant to admit they have experienced a breach, wishing to avoid potential bad press. Overcoming that reluctance may require legislation, such as a bill introduced in the Senate last year that would require companies to report having paid a ransom within 24 hours of the transaction.

Internet:<www.scientificamerican.com>(adapted). 



Judge the following items according to the text above. 


It can be inferred from the text that ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid. 

#Questão 1023030 - Governança de TI, Instrução Normativa N° 4, CESPE / CEBRASPE, 2022, TCE-SC, Auditor Fiscal de Controle Externo - Ciência da Computação

Com relação à gestão de contratação de soluções de TI e aos atos normativos do ME/SLTI Instrução Normativa n.º 1/2019, julgue o item a seguir.  


A análise de riscos se inicia na fase de gestão do contrato, na qual a equipe de fiscalização do contrato, sob coordenação do gestor do contrato, realiza a análise dos principais riscos e acompanha as ações de tratamento desses riscos. 

#Questão 1023031 - Governança de TI, Instrução Normativa N° 4, CESPE / CEBRASPE, 2022, TCE-SC, Auditor Fiscal de Controle Externo - Ciência da Computação

Com relação à gestão de contratação de soluções de TI e aos atos normativos do ME/SLTI Instrução Normativa n.º 1/2019, julgue o item a seguir.  


Na gestão e fiscalização do contrato de fornecimento da solução de TI, devem-se estipular os critérios de aceitação dos serviços prestados, abrangendo, entre outros aspectos, os níveis mínimos de serviços com os valores adequados aos elementos que compõem essa solução. 

Navegue em mais matérias e assuntos

{TITLE}

{CONTENT}

{TITLE}

{CONTENT}
Estude Grátis