MENU
Instalar nosso app
Estudos
Flashcards
novo
Planos de Estudos
Questões
Simulados
Concursos
Rankings Pós-Prova
Concursos Passados
Ordenar Resultados
Informações
Organizadoras
Órgãos
Cargos
Disciplinas
Estatísticas
Nosso Desempenho
Estatísticas das Organizadoras
Estatísticas de Cursos
Planos e preços
Ajuda
Modo Escuro
Ativar notificações
Questões de concursos
Resolva quantas desejar, é ilimitado!
Filtros Inteligentes
A lista de dados de cada filtro é atualizada de acordo com os filtros previamente inseridos.
Somente são apresentados na lista de cada um, dados existentes na combinação de filtros já escolhida.
Concursos
OAB
ENEM
Vestibular
Incluir
Excluir
Matéria:
Inglês
Somente anuladas
Excluir anuladas
Somente desatualizadas
Excluir desatualizadas
Com anotações
Sem anotações
Respondidas
Não respondidas
Acertadas
Erradas
Limpar
Filtrar
Meus filtros
Meus cadernos
Minhas estatísticas
9276 questões
F
P
1
2
3
4
5
6
7
8
9
10
N
E
Rows Per Page
5
15
30
#1536310
•
prova:
99948
•
questão 13
prova
•
edital
•
ranking
Inglês
•
Interpretação de Texto (reading Comprehension)
2022
•
FEPESE
•
IGP-SC
•
Auxiliar Médico Legal
Exibir texto associado
Phishing
Imagine that you get an email one morning. It appears to be from your bank. The email warns that someone broke into your account. It says that you need to sign in to check some things. You click the link in the email. It takes you to a site that looks very much like your bank’s. You enter your username and password. You submit the form. You’ve just been phished!
Phishing is a type of attack that happens over the Internet. Users receive an email or text message that seems like it came from a trusted source. These users are being deceived. They are interacting with dangerous hackers. The attackers copy trusted companies. They send users to web pages that look like the ones we use everyday. When users login or provide
sensitive information
, the attackers steal this data.
Attackers want your data for many reasons. They may use your data to commit identity fraud. This is when they use your identity to buy something with your credit. Then they receive the goods and you receive the bill. Or they may want your password to take over a computer network. They may want access to private emails. They may want customer records. They gain access by tricking people into giving them their login info.
Some phishing attacks are targeted. A targeted phishing attack is called a spear phishing attack. These attacks are dangerous because they are convincing. The attacker may know the target’s name, address, or job title. They may have gathered info from social networks, like the names of friends or family. The attackers may use this personal information to craft a believable email. The target will be tricked into clicking a link. The link will send them to a phony website. This site will look familiar, but it will be a
spoofed
site built to steal data. Any data that the target submits will go to the hacker.
Phishing attacks are dangerous, but you can spot them if you pay attention. One thing to watch is your address bar in your browser. Attackers use domains that look like the ones that we trust, but they are not the same. For example, in 2016 staffers from Hillary Clinton’s campaign were spear phished. The attackers used the domain accounts-google.com. That domain looks like google.com, but it isn’t the same. When logging into google, you should always do it from google.com. Likewise, when logging into any account, make sure the address matches what you expect. If you are unsure, search for the site and login from the root domain.
An even better way to secure your account against phishing attacks is to use 2FA: two factor authentication. 2FA means that your account is secured with two keys. The first is your password. The second key is a random code that changes every few minutes. This code may be generated by a 2FA app, like Authy. Or it can be sent to your cell phone on request. If you activate 2FA on your accounts, an attacker will not be able to get in even with your password.
Phishing attacks are scary and common. The reason why they are common is that they are effective. Many people accept appearances without suspicion. Browsing the Internet safely requires a healthy amount of suspicion. Not everything is what it appears. Nobody is trying to give you free money. Don’t trust; verify.
Which alternative best describes the main idea of the third paragraph?
A)
To steal private communication or records
B)
To describe the reasons for phishing attacks
C)
To explain how phishing attacks are executed
D)
To teach readers how to defend against phishing attacks
E)
To compare and contrast phishing and spear phishing
necessário selecionar uma resposta
muito bom! resposta correta!
resposta errada :(
Verificar resposta correta
Dificuldade em lembrar o conteúdo? Surpreenda-se com os Flashcards Inteligentes!
Responder
Comentários
Estatísticas
Anotações
Caderno
Notificar erro
#1536311
•
prova:
99948
•
questão 14
prova
•
edital
•
ranking
Inglês
•
Interpretação de Texto (reading Comprehension)
2022
•
FEPESE
•
IGP-SC
•
Auxiliar Médico Legal
Exibir texto associado
Phishing
Imagine that you get an email one morning. It appears to be from your bank. The email warns that someone broke into your account. It says that you need to sign in to check some things. You click the link in the email. It takes you to a site that looks very much like your bank’s. You enter your username and password. You submit the form. You’ve just been phished!
Phishing is a type of attack that happens over the Internet. Users receive an email or text message that seems like it came from a trusted source. These users are being deceived. They are interacting with dangerous hackers. The attackers copy trusted companies. They send users to web pages that look like the ones we use everyday. When users login or provide
sensitive information
, the attackers steal this data.
Attackers want your data for many reasons. They may use your data to commit identity fraud. This is when they use your identity to buy something with your credit. Then they receive the goods and you receive the bill. Or they may want your password to take over a computer network. They may want access to private emails. They may want customer records. They gain access by tricking people into giving them their login info.
Some phishing attacks are targeted. A targeted phishing attack is called a spear phishing attack. These attacks are dangerous because they are convincing. The attacker may know the target’s name, address, or job title. They may have gathered info from social networks, like the names of friends or family. The attackers may use this personal information to craft a believable email. The target will be tricked into clicking a link. The link will send them to a phony website. This site will look familiar, but it will be a
spoofed
site built to steal data. Any data that the target submits will go to the hacker.
Phishing attacks are dangerous, but you can spot them if you pay attention. One thing to watch is your address bar in your browser. Attackers use domains that look like the ones that we trust, but they are not the same. For example, in 2016 staffers from Hillary Clinton’s campaign were spear phished. The attackers used the domain accounts-google.com. That domain looks like google.com, but it isn’t the same. When logging into google, you should always do it from google.com. Likewise, when logging into any account, make sure the address matches what you expect. If you are unsure, search for the site and login from the root domain.
An even better way to secure your account against phishing attacks is to use 2FA: two factor authentication. 2FA means that your account is secured with two keys. The first is your password. The second key is a random code that changes every few minutes. This code may be generated by a 2FA app, like Authy. Or it can be sent to your cell phone on request. If you activate 2FA on your accounts, an attacker will not be able to get in even with your password.
Phishing attacks are scary and common. The reason why they are common is that they are effective. Many people accept appearances without suspicion. Browsing the Internet safely requires a healthy amount of suspicion. Not everything is what it appears. Nobody is trying to give you free money. Don’t trust; verify.
What is the difference between a phishing and spear phishing attack?
A)
A spare phishing attack is scary and unusual.
B)
A spear phishing attack involves theft or identity fraud and phishing does not.
C)
A spear phishing attack is targeted while phishing is random.
D)
A phishing attack is illegal while spear phishing is legal.
E)
A phishing attack is more convincing than a spear phishing attack.
necessário selecionar uma resposta
muito bom! resposta correta!
resposta errada :(
Verificar resposta correta
Dificuldade em lembrar o conteúdo? Surpreenda-se com os Flashcards Inteligentes!
Responder
Comentários
Estatísticas
Anotações
Caderno
Notificar erro
#1536312
•
prova:
99948
•
questão 15
prova
•
edital
•
ranking
Inglês
•
Interpretação de Texto (reading Comprehension)
2022
•
FEPESE
•
IGP-SC
•
Auxiliar Médico Legal
Exibir texto associado
Phishing
Imagine that you get an email one morning. It appears to be from your bank. The email warns that someone broke into your account. It says that you need to sign in to check some things. You click the link in the email. It takes you to a site that looks very much like your bank’s. You enter your username and password. You submit the form. You’ve just been phished!
Phishing is a type of attack that happens over the Internet. Users receive an email or text message that seems like it came from a trusted source. These users are being deceived. They are interacting with dangerous hackers. The attackers copy trusted companies. They send users to web pages that look like the ones we use everyday. When users login or provide
sensitive information
, the attackers steal this data.
Attackers want your data for many reasons. They may use your data to commit identity fraud. This is when they use your identity to buy something with your credit. Then they receive the goods and you receive the bill. Or they may want your password to take over a computer network. They may want access to private emails. They may want customer records. They gain access by tricking people into giving them their login info.
Some phishing attacks are targeted. A targeted phishing attack is called a spear phishing attack. These attacks are dangerous because they are convincing. The attacker may know the target’s name, address, or job title. They may have gathered info from social networks, like the names of friends or family. The attackers may use this personal information to craft a believable email. The target will be tricked into clicking a link. The link will send them to a phony website. This site will look familiar, but it will be a
spoofed
site built to steal data. Any data that the target submits will go to the hacker.
Phishing attacks are dangerous, but you can spot them if you pay attention. One thing to watch is your address bar in your browser. Attackers use domains that look like the ones that we trust, but they are not the same. For example, in 2016 staffers from Hillary Clinton’s campaign were spear phished. The attackers used the domain accounts-google.com. That domain looks like google.com, but it isn’t the same. When logging into google, you should always do it from google.com. Likewise, when logging into any account, make sure the address matches what you expect. If you are unsure, search for the site and login from the root domain.
An even better way to secure your account against phishing attacks is to use 2FA: two factor authentication. 2FA means that your account is secured with two keys. The first is your password. The second key is a random code that changes every few minutes. This code may be generated by a 2FA app, like Authy. Or it can be sent to your cell phone on request. If you activate 2FA on your accounts, an attacker will not be able to get in even with your password.
Phishing attacks are scary and common. The reason why they are common is that they are effective. Many people accept appearances without suspicion. Browsing the Internet safely requires a healthy amount of suspicion. Not everything is what it appears. Nobody is trying to give you free money. Don’t trust; verify.
Read the article and decide if the statements below are true ( T ) or false ( F ).
( ) A phishing attack is to trick someone into giving away sensitive data.
( ) To commit identity fraud is a motive for phishing and it is mentioned in the text.
( ) 2FA can protect users from phishing attacks by having two keys to login.
( ) The domain accounts-google.com is used by attackers to phish.
Choose the alternative which presents the
correct
sequence, from top to bottom.
A)
T • T • F • T
B)
T • F • T • T
C)
T • F • F • T
D)
F • T • T • F
E)
F • T • F • T
necessário selecionar uma resposta
muito bom! resposta correta!
resposta errada :(
Verificar resposta correta
Dificuldade em lembrar o conteúdo? Surpreenda-se com os Flashcards Inteligentes!
Responder
Comentários
Estatísticas
Anotações
Caderno
Notificar erro
#1536313
•
prova:
99948
•
questão 16
prova
•
edital
•
ranking
Inglês
•
Vocabulário (vocabulary)
|
Sinônimos | Synonyms
2022
•
FEPESE
•
IGP-SC
•
Auxiliar Médico Legal
Exibir texto associado
Phishing
Imagine that you get an email one morning. It appears to be from your bank. The email warns that someone broke into your account. It says that you need to sign in to check some things. You click the link in the email. It takes you to a site that looks very much like your bank’s. You enter your username and password. You submit the form. You’ve just been phished!
Phishing is a type of attack that happens over the Internet. Users receive an email or text message that seems like it came from a trusted source. These users are being deceived. They are interacting with dangerous hackers. The attackers copy trusted companies. They send users to web pages that look like the ones we use everyday. When users login or provide
sensitive information
, the attackers steal this data.
Attackers want your data for many reasons. They may use your data to commit identity fraud. This is when they use your identity to buy something with your credit. Then they receive the goods and you receive the bill. Or they may want your password to take over a computer network. They may want access to private emails. They may want customer records. They gain access by tricking people into giving them their login info.
Some phishing attacks are targeted. A targeted phishing attack is called a spear phishing attack. These attacks are dangerous because they are convincing. The attacker may know the target’s name, address, or job title. They may have gathered info from social networks, like the names of friends or family. The attackers may use this personal information to craft a believable email. The target will be tricked into clicking a link. The link will send them to a phony website. This site will look familiar, but it will be a
spoofed
site built to steal data. Any data that the target submits will go to the hacker.
Phishing attacks are dangerous, but you can spot them if you pay attention. One thing to watch is your address bar in your browser. Attackers use domains that look like the ones that we trust, but they are not the same. For example, in 2016 staffers from Hillary Clinton’s campaign were spear phished. The attackers used the domain accounts-google.com. That domain looks like google.com, but it isn’t the same. When logging into google, you should always do it from google.com. Likewise, when logging into any account, make sure the address matches what you expect. If you are unsure, search for the site and login from the root domain.
An even better way to secure your account against phishing attacks is to use 2FA: two factor authentication. 2FA means that your account is secured with two keys. The first is your password. The second key is a random code that changes every few minutes. This code may be generated by a 2FA app, like Authy. Or it can be sent to your cell phone on request. If you activate 2FA on your accounts, an attacker will not be able to get in even with your password.
Phishing attacks are scary and common. The reason why they are common is that they are effective. Many people accept appearances without suspicion. Browsing the Internet safely requires a healthy amount of suspicion. Not everything is what it appears. Nobody is trying to give you free money. Don’t trust; verify.
The words
sensitive information
in the second paragraph, is closest in meaning to:
A)
protected data.
B)
unprotected data.
C)
public information.
D)
authorized information.
E)
unprotected information.
necessário selecionar uma resposta
muito bom! resposta correta!
resposta errada :(
Verificar resposta correta
Dificuldade em lembrar o conteúdo? Surpreenda-se com os Flashcards Inteligentes!
Responder
Comentários
Estatísticas
Anotações
Caderno
Notificar erro
#1536314
•
prova:
99948
•
questão 17
prova
•
edital
•
ranking
Inglês
•
Interpretação de Texto (reading Comprehension)
|
Vocabulário (vocabulary)
2022
•
FEPESE
•
IGP-SC
•
Auxiliar Médico Legal
Exibir texto associado
Phishing
Imagine that you get an email one morning. It appears to be from your bank. The email warns that someone broke into your account. It says that you need to sign in to check some things. You click the link in the email. It takes you to a site that looks very much like your bank’s. You enter your username and password. You submit the form. You’ve just been phished!
Phishing is a type of attack that happens over the Internet. Users receive an email or text message that seems like it came from a trusted source. These users are being deceived. They are interacting with dangerous hackers. The attackers copy trusted companies. They send users to web pages that look like the ones we use everyday. When users login or provide
sensitive information
, the attackers steal this data.
Attackers want your data for many reasons. They may use your data to commit identity fraud. This is when they use your identity to buy something with your credit. Then they receive the goods and you receive the bill. Or they may want your password to take over a computer network. They may want access to private emails. They may want customer records. They gain access by tricking people into giving them their login info.
Some phishing attacks are targeted. A targeted phishing attack is called a spear phishing attack. These attacks are dangerous because they are convincing. The attacker may know the target’s name, address, or job title. They may have gathered info from social networks, like the names of friends or family. The attackers may use this personal information to craft a believable email. The target will be tricked into clicking a link. The link will send them to a phony website. This site will look familiar, but it will be a
spoofed
site built to steal data. Any data that the target submits will go to the hacker.
Phishing attacks are dangerous, but you can spot them if you pay attention. One thing to watch is your address bar in your browser. Attackers use domains that look like the ones that we trust, but they are not the same. For example, in 2016 staffers from Hillary Clinton’s campaign were spear phished. The attackers used the domain accounts-google.com. That domain looks like google.com, but it isn’t the same. When logging into google, you should always do it from google.com. Likewise, when logging into any account, make sure the address matches what you expect. If you are unsure, search for the site and login from the root domain.
An even better way to secure your account against phishing attacks is to use 2FA: two factor authentication. 2FA means that your account is secured with two keys. The first is your password. The second key is a random code that changes every few minutes. This code may be generated by a 2FA app, like Authy. Or it can be sent to your cell phone on request. If you activate 2FA on your accounts, an attacker will not be able to get in even with your password.
Phishing attacks are scary and common. The reason why they are common is that they are effective. Many people accept appearances without suspicion. Browsing the Internet safely requires a healthy amount of suspicion. Not everything is what it appears. Nobody is trying to give you free money. Don’t trust; verify.
In the sentence “This site will look familiar, but it will be a spoofed site built to steal data.”, the
correct
definition for the word
spoofed
is in which alternative?
A)
to play a trick on.
B)
to fool by a hoax.
C)
to make a parody.
D)
to mock an imitation of someone or something.
E)
to trick by interrupting or otherwise corrupting data in order to avoid detection.
necessário selecionar uma resposta
muito bom! resposta correta!
resposta errada :(
Verificar resposta correta
Dificuldade em lembrar o conteúdo? Surpreenda-se com os Flashcards Inteligentes!
Responder
Comentários
Estatísticas
Anotações
Caderno
Notificar erro
9276 questões
F
P
1
2
3
4
5
6
7
8
9
10
N
E
Rows Per Page
5
15
30
Compartilhe esse conteúdo!
https://olhonavaga.com.br/questoes/questoes?tc=1&ma=531
Minhas anotações para a questão #
Apagar
Data
Anotação
Nenhuma anotação inserida
Nova anotação:
Salvar
Suas respostas para a questão #
Data
Alternativa
Acertou?
Nenhuma anotação inserida
Meus filtros
Salvar novo filtro com as configurações atuais:
Salvar
Carregar filtros salvos:
Apagar
Filtro
Nenhum filtro salvo
Inserir a questão # em um caderno
Novo caderno:
Salvar e inserir
Escolha um caderno para filtrar as questões
Apagar
Nome
Nenhum caderno foi criado
Solicitar alteração de dados na questão #
As respostas apresentadas nas questões estão de acordo com o gabarito divulgado pela banca examinadora.
Não cabe aqui julgar se a banca examinadora está correta ou não
, para isso
utilize os comentários
dessa questão.
Gabarito Errado
Cancelar
Enviar
Outro problema
Para julgamento da elaboração da questão ou das respostas, utilize a seção de comentários da questão
Detalhes das correções necessárias (erro referente ao cadastro da questão no site):
Cancelar
Enviar
Estudos
Flashcards
Planos de Estudos
Questões
Simulados
Concursos
Rankings Pós-Prova
Concursos Passados
Ordenar Resultados
Informações
Organizadoras
Órgãos
Cargos
Disciplinas
Estatísticas
Nosso Desempenho
Estatísticas das Organizadoras
Estatísticas de Cursos
Mais
Planos e preços
Sobre Nós
Ajuda
Siga
Estudantes
3.912.287
Flashcards
361.404
Planos de Estudos
15.918
Questões
1.003.517
Simulados
20.738
Rankings Pós-Prova
43.673
Termos de Uso e Política de Privacidade
© copyright - todos os direitos reservados | olhonavaga.com.br
Ative nossas notificações para receber atualizações sobre seus pagamentos, estatísticas das suas ferramentas de estudo e promoções!
Fique ligado em cada atualização!
Ativar
Como o seu navegador já bloqueou as notificações do nosso portal, você deverá acessar nosso site utilizando seu navegador, clicar no ícone de cadeado ao lado do nosso endereço URL e habilitar manualmente o envio de notificações.
Instale nosso APP para receber atualizações sobre seus pagamentos, estatísticas das suas ferramentas de estudo e promoções!
Fique ligado em cada atualização!
Instalar APP