Sunteți pe pagina 1din 1

www.ricodomingues.com.br / www.youtube.

com/cursoricodomingues
Simulad
HOW DO COMPUTER HACKERS GET INSIDE A
COMPUTER?
Julie J. C. H. Ryan
Essentially, hackers get inside a computer system by
taking advantage of software or hardware weaknesses that eist
in every system. !he term "hacker# is fairly controversial$ some
use this word to describe those whose intrusions into computer
systems push the boundaries of knowledge without causing
intentional harm, whereas "crackers# want to damage. % prefer
"unauthori&ed user# '(() for anyone who engages in unsanctioned
computer access.
*o how does a (( get inside a computer+ !he easiest
weakness to eploit is a poorly conceived password. ,assword
cracking programs can identify dictionary words, names and even
common phrases within a matter of minutes. -any of these
programs perform a "dictionary attack#$ they take the encryption
code used by the password system and encrypt every word in the
dictionary. !hen the (( plugs in the encrypted words until the
encrypted match is found. %f a system has a comple password,
the (( could try a "technical eploit,# which means using technical
knowledge to break into a computer system. !his is more
challenging because the (( must first learn what kind of system
the target is and what the system can do. . proficient (( can do
this remotely by utili&ing a hypertet transfer protocol 'http) that
gains /orld /ide /eb access. !he (( then writes a program
that circumvents the protection in place in the system.
.lthough you cannot eliminate
you can take steps to protect against unauthori&ed access. -ake
sure you have the latest patches for your operating system and
applications. Create a comple password with letters, numbers
and symbolic characters. Consider install
which blocks unwanted %nternet traffic. -ake sure your antivirus
software is up0to0date and check fre1uently for new virus
definitions. 2inally, back up your data, so you can recover
important material if anything does happen.
'.pud *C%E3!%2%C .-ER%C.3. January 4556).
01. .ccording to the tet hackers 7
because$
%. some computer systems have weaknesses.
%%. they want to cause intentional harm.
%%%. it is a challenge for them.
a) ! 8 2 8 !
b) 2 8 2 8 2
c) ! 8 ! 8 2
d) 2 8 ! 8 2
e) ! 8 ! 8 !

02. .ccording to the tet it is NOT
a) there are programs specifically designed for cracking
passwords.
b) the 7dictionary attack9 encrypts every word in the dictionary
and looks for the match.
c) comple passwords are not unbreakable.
d) the 7technical eploit9 depends less on the (( than the
"dictionary attack#.
e) the password cracking can be done remotely.
INGL
Professor A
www.youtube.com/cursoricodomingues
: 45;4 0 !odos os direitos reservados
Simuladi!"

HOW DO COMPUTER HACKERS GET INSIDE A
COMPUTER?
Julie J. C. H. Ryan
Essentially, hackers get inside a computer system by
taking advantage of software or hardware weaknesses that eist
in every system. !he term "hacker# is fairly controversial$ some
use this word to describe those whose intrusions into computer
systems push the boundaries of knowledge without causing
intentional harm, whereas "crackers# want to damage. % prefer
i&ed user# '(() for anyone who engages in unsanctioned
*o how does a (( get inside a computer+ !he easiest
weakness to eploit is a poorly conceived password. ,assword
cracking programs can identify dictionary words, names and even
phrases within a matter of minutes. -any of these
programs perform a "dictionary attack#$ they take the encryption
code used by the password system and encrypt every word in the
dictionary. !hen the (( plugs in the encrypted words until the
is found. %f a system has a comple password,
the (( could try a "technical eploit,# which means using technical
knowledge to break into a computer system. !his is more
challenging because the (( must first learn what kind of system
t the system can do. . proficient (( can do
this remotely by utili&ing a hypertet transfer protocol 'http) that
gains /orld /ide /eb access. !he (( then writes a program
that circumvents the protection in place in the system.
.lthough you cannot eliminate all possible weaknesses,
you can take steps to protect against unauthori&ed access. -ake
sure you have the latest patches for your operating system and
applications. Create a comple password with letters, numbers
and symbolic characters. Consider installing a firewall program,
which blocks unwanted %nternet traffic. -ake sure your antivirus
date and check fre1uently for new virus
definitions. 2inally, back up your data, so you can recover
important material if anything does happen.
*C%E3!%2%C .-ER%C.3. January 4556).
. .ccording to the tet hackers 7get inside9 a computer
%. some computer systems have weaknesses.
%%. they want to cause intentional harm.
NOT correct to say that$
) there are programs specifically designed for cracking
) the 7dictionary attack9 encrypts every word in the dictionary
comple passwords are not unbreakable.
) the 7technical eploit9 depends less on the (( than the
) the password cracking can be done remotely.
INGLS
Angelo Braz
RICO DOMINGUES
'<=) >>?<0?@>< / '<=) >>><0>64@
reservados por Rico Aomingues Concursos Btda.
0#. !he author prefers the term 7unauthori&ed user9
becauseCCCCC..
a) hackers push the boundaries of knowledge without causing
intentional harm
b) they get inside a computer system by taking advantage of
weaknesses
c) no user is authori&ed to get inside a computer system
d) crackers want to damage the systems
e) it is a broader term

0$. Batest in 7-ake sure you have the latest patchesC9 means$
a) after the usual time
b) furthest on in a period of time
c) most recent
d) oldest
e) outdated

0%. .bout the protection against unauthori&ed access the tet
says that$
%. %t is possible to eliminate all computer weaknesses.
%%. . comple password should use letters, numbers and symbolic
characters.
%%%. Dour antivirus software should not be outdated.
%E. %f you follow the protection steps your computer will be
completely safe.
a) %% and %%%.
b) %% and %E.
c) %, %% and %%%.
d) %, %% and %E.
e) %, %%, %%% and %E.

RICO DOMINGUES


>64@
1
. !he author prefers the term 7unauthori&ed user9
boundaries of knowledge without causing
) they get inside a computer system by taking advantage of
) no user is authori&ed to get inside a computer system
) crackers want to damage the systems
st in 7-ake sure you have the latest patchesC9 means$
. .bout the protection against unauthori&ed access the tet
all computer weaknesses.
%%. . comple password should use letters, numbers and symbolic
%%%. Dour antivirus software should not be outdated.
%E. %f you follow the protection steps your computer will be

S-ar putea să vă placă și