Magna Concursos

Foram encontradas 80 questões.

Dentre as formas de notação utilizadas para modelar o BPM (Business Process Management ou Gerenciamento de Processos de Negócio) estão as opções
 

Provas

Questão presente nas seguintes provas
A área de conhecimento do PMBOK 5a edição, Gerenciamento dos Recursos Humanos do Projeto, tem seus processos inseridos nos grupos de processos
 

Provas

Questão presente nas seguintes provas
No PMBOK 5a edição, há um grupo de processos composto por processos que visam definir um novo projeto ou uma nova fase de um projeto, tendo ainda como função obter autorização para esse projeto ou fase. Tal grupo de processos é
 

Provas

Questão presente nas seguintes provas
Uma equivalente para a afirmação “Se Carlos foi aprovado no concurso, então ele estudou” está contida na alternativa:
 

Provas

Questão presente nas seguintes provas
Sabe-se que Débora é 5 centímetros mais baixa que Antonio e 4 centímetros mais alta que Mirian. Sabe-se, também, que Eduardo é 3 centímetros mais alto que Antonio e 12 centímetros mais alto que Carlos. Se for verdadeiro que Carlos é 10 centímetros mais alto que Wilson, que mede 1,65 metro, então é correto afirmar que a altura de Antonio, em metro, será
 

Provas

Questão presente nas seguintes provas
Se Reginaldo é agente da fiscalização ou Sérgio é professor, então Márcia é psicóloga. André é administrador se, e somente se, Carmem é dentista. Constatado que Márcia não é psicóloga e André não é administrador, conclui-se corretamente que
 

Provas

Questão presente nas seguintes provas
Sabe-se que todos os primos de Vanderlei são funcionários públicos e que todos os primos de Marcelo não são funcionários públicos. Dessa forma, deduz-se corretamente que
 

Provas

Questão presente nas seguintes provas
Leia o texto para responder a questão.

E-mail Spoofing

E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations. Spoofing can be used legitimately. However, spoofing anyone other than yourself is illegal in some jurisdictions.
E-mail spoofing is possible because Simple Mail Transfer Protocol (SMTP), the main protocol used in sending e-mail, does not include an authentication mechanism. Although an SMTP service extension (specified in IETF RFC 2554) allows an SMTP client to negotiate a security level with a mail
server, this precaution is not often taken. If the precaution is not taken, anyone with the requisite knowledge can connect to the server and use it to send messages. To send spoofed e-mail, senders insert commands in headers that will alter message information. It is possible to send a message that
appears to be from anyone, anywhere, saying whatever the sender wants it to say. Thus, someone could send spoofed e-mail that appears to be from you with a message that you didn't write.
Although most spoofed e-mail falls into the “nuisance" category and requires little action other than deletion, the more malicious varieties can cause serious problems and security risks. For example, spoofed e-mail may purport to be from someone in a position of authority, asking for sensitive data, such as passwords, credit card numbers, or other personal information – any of which can be used for a variety of criminal purposes. One type of e-mail spoofing, self- sending spam, involves messages that appear to be both to and from the recipient.

(http://searchsecurity.techtarget.com/definition/em.... Adaptado)
E-mail spoofing is frequently used by
 

Provas

Questão presente nas seguintes provas
Leia o texto para responder a questão.

E-mail Spoofing

E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations. Spoofing can be used legitimately. However, spoofing anyone other than yourself is illegal in some jurisdictions.
E-mail spoofing is possible because Simple Mail Transfer Protocol (SMTP), the main protocol used in sending e-mail, does not include an authentication mechanism. Although an SMTP service extension (specified in IETF RFC 2554) allows an SMTP client to negotiate a security level with a mail
server, this precaution is not often taken. If the precaution is not taken, anyone with the requisite knowledge can connect to the server and use it to send messages. To send spoofed e-mail, senders insert commands in headers that will alter message information. It is possible to send a message that
appears to be from anyone, anywhere, saying whatever the sender wants it to say. Thus, someone could send spoofed e-mail that appears to be from you with a message that you didn't write.
Although most spoofed e-mail falls into the “nuisance" category and requires little action other than deletion, the more malicious varieties can cause serious problems and security risks. For example, spoofed e-mail may purport to be from someone in a position of authority, asking for sensitive data, such as passwords, credit card numbers, or other personal information – any of which can be used for a variety of criminal purposes. One type of e-mail spoofing, self- sending spam, involves messages that appear to be both to and from the recipient.

(http://searchsecurity.techtarget.com/definition/em.... Adaptado)
An example of sensitive data mentioned in the last paragraph is
 

Provas

Questão presente nas seguintes provas
Leia o texto para responder a questão.

E-mail Spoofing

E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations. Spoofing can be used legitimately. However, spoofing anyone other than yourself is illegal in some jurisdictions.
E-mail spoofing is possible because Simple Mail Transfer Protocol (SMTP), the main protocol used in sending e-mail, does not include an authentication mechanism. Although an SMTP service extension (specified in IETF RFC 2554) allows an SMTP client to negotiate a security level with a mail
server, this precaution is not often taken. If the precaution is not taken, anyone with the requisite knowledge can connect to the server and use it to send messages. To send spoofed e-mail, senders insert commands in headers that will alter message information. It is possible to send a message that
appears to be from anyone, anywhere, saying whatever the sender wants it to say. Thus, someone could send spoofed e-mail that appears to be from you with a message that you didn't write.
Although most spoofed e-mail falls into the “nuisance" category and requires little action other than deletion, the more malicious varieties can cause serious problems and security risks. For example, spoofed e-mail may purport to be from someone in a position of authority, asking for sensitive data, such as passwords, credit card numbers, or other personal information – any of which can be used for a variety of criminal purposes. One type of e-mail spoofing, self- sending spam, involves messages that appear to be both to and from the recipient.

(http://searchsecurity.techtarget.com/definition/em.... Adaptado)
In the last sentence of the second paragraph – Thus, someone could send spoofed e-mail that appears to be from you with a message that you didn’t write. – the word “thus” introduces a
 

Provas

Questão presente nas seguintes provas