Teste. English Grammar Intermediate

 

🔹 Perguntas (1–100)

1–10

  1. The system ______ automatically when a threat is detected.
    a) shut
    b) shuts
    c) shutting
    d) to shut

  2. We ______ the firewall rules yesterday.
    a) update
    b) updates
    c) updated
    d) updating

  3. The server ______ running for 24 hours without interruption.
    a) is
    b) was
    c) has been
    d) had

  4. If the system fails, we ______ an alert.
    a) receive
    b) received
    c) receiving
    d) receives

  5. The engineer ______ already fixed the vulnerability.
    a) have
    b) has
    c) had
    d) having

  6. We need ______ the logs before deploying the update.
    a) check
    b) checking
    c) to check
    d) checked

  7. The issue ______ by the monitoring system.
    a) detect
    b) detected
    c) was detected
    d) detecting

  8. They ______ working on the patch when the system crashed.
    a) are
    b) were
    c) have
    d) had

  9. You should ______ strong passwords.
    a) use
    b) using
    c) used
    d) uses

  10. The backup ______ every night.
    a) run
    b) runs
    c) running
    d) ran


11–20

  1. We ______ never experienced such an attack before.
    a) did
    b) have
    c) had
    d) do

  2. The logs ______ reviewed by the team.
    a) is
    b) are
    c) was
    d) be

  3. If we ______ earlier, we could have prevented the issue.
    a) act
    b) acted
    c) acts
    d) acting

  4. The admin ______ configuring the server right now.
    a) is
    b) are
    c) was
    d) be

  5. We ______ deploy the update tomorrow.
    a) will
    b) would
    c) did
    d) does

  6. The vulnerability ______ reported last week.
    a) is
    b) was
    c) were
    d) be

  7. He ______ in cybersecurity for five years.
    a) works
    b) worked
    c) has worked
    d) working

  8. The system must ______ immediately.
    a) fix
    b) fixed
    c) be fixed
    d) fixing

  9. We ______ checking the servers when the alert appeared.
    a) are
    b) were
    c) have
    d) had

  10. She ______ the report before the meeting.
    a) finish
    b) finished
    c) finishing
    d) finishes


21–30

  1. The data ______ encrypted for security reasons.
    a) is
    b) are
    c) be
    d) been

  2. We ______ already informed the client.
    a) have
    b) has
    c) had
    d) having

  3. If the user ______ the password, access is denied.
    a) forget
    b) forgets
    c) forgot
    d) forgetting

  4. The system ______ down when we arrived.
    a) is
    b) was
    c) were
    d) be

  5. We are responsible ______ maintaining the servers.
    a) of
    b) for
    c) to
    d) at

  6. He is good ______ detecting threats.
    a) at
    b) in
    c) on
    d) for

  7. The issue depends ______ the configuration.
    a) of
    b) in
    c) on
    d) at

  8. We need to protect the system ______ attacks.
    a) from
    b) of
    c) at
    d) in

  9. The server is connected ______ the network.
    a) at
    b) in
    c) to
    d) on

  10. We are working ______ a new security policy.
    a) in
    b) on
    c) at
    d) for


31–40

  1. The system is ______ than the previous version.
    a) secure
    b) more secure
    c) most secure
    d) securely

  2. This is the ______ solution we have.
    a) good
    b) better
    c) best
    d) well

  3. The update was ______ than expected.
    a) fast
    b) faster
    c) fastest
    d) more fast

  4. The logs are ______ detailed than before.
    a) more
    b) most
    c) many
    d) much

  5. This is ______ critical issue of the week.
    a) more
    b) the most
    c) most
    d) many

  6. He works ______ than his colleagues.
    a) efficient
    b) more efficient
    c) efficiently
    d) more efficiently

  7. The system runs ______ after optimization.
    a) smooth
    b) smoother
    c) smoothly
    d) more smooth

  8. The response time is ______ now.
    a) quick
    b) quicker
    c) quickest
    d) more quick

  9. This tool is ______ useful for monitoring.
    a) very
    b) too
    c) enough
    d) so

  10. The problem is ______ complex to solve quickly.
    a) too
    b) very
    c) enough
    d) so


41–50

  1. We didn’t ______ the error in time.
    a) see
    b) saw
    c) seen
    d) seeing

  2. He has ______ the issue already.
    a) fix
    b) fixed
    c) fixing
    d) fixes

  3. The system keeps ______ unexpectedly.
    a) crash
    b) crashed
    c) crashing
    d) crashes

  4. We stopped ______ the service due to risks.
    a) use
    b) using
    c) used
    d) uses

  5. They decided ______ the system.
    a) upgrade
    b) upgrading
    c) to upgrade
    d) upgraded

  6. The engineer suggested ______ the logs.
    a) review
    b) reviewing
    c) to review
    d) reviewed

  7. We avoid ______ sensitive data.
    a) expose
    b) exposing
    c) to expose
    d) exposed

  8. He managed ______ the attack.
    a) stop
    b) stopping
    c) to stop
    d) stopped

  9. The team plans ______ a new tool.
    a) implement
    b) implementing
    c) to implement
    d) implemented

  10. She finished ______ the report.
    a) write
    b) writing
    c) to write
    d) wrote


51–60

  1. If we update the system, it ______ more secure.
    a) becomes
    b) became
    c) becoming
    d) become

  2. If the server crashed, we ______ restart it.
    a) will
    b) would
    c) can
    d) must

  3. If we had monitored better, we ______ the attack.
    a) prevent
    b) prevented
    c) would have prevented
    d) preventing

  4. If users follow the rules, they ______ safe.
    a) stay
    b) stayed
    c) staying
    d) stays

  5. If I were you, I ______ change the password.
    a) will
    b) would
    c) can
    d) do

  6. If the system fails, we ______ notify the team.
    a) must
    b) musts
    c) musted
    d) musting

  7. If the logs were clearer, we ______ understand better.
    a) will
    b) would
    c) can
    d) do

  8. If the update had worked, we ______ no issues.
    a) have
    b) had
    c) would have had
    d) having

  9. If they call, we ______ respond immediately.
    a) will
    b) would
    c) did
    d) doing

  10. If the firewall blocks traffic, users ______ complain.
    a) will
    b) would
    c) did
    d) doing


61–70

  1. The report ______ by the manager.
    a) wrote
    b) was written
    c) is write
    d) writing

  2. The system ______ monitored 24/7.
    a) is
    b) are
    c) be
    d) been

  3. The servers ______ maintained regularly.
    a) is
    b) are
    c) was
    d) be

  4. The issue ______ fixed yesterday.
    a) is
    b) was
    c) were
    d) be

  5. The data ______ stored securely.
    a) is
    b) are
    c) be
    d) been

  6. The logs ______ analyzed daily.
    a) is
    b) are
    c) was
    d) be

  7. The update ______ deployed last night.
    a) is
    b) was
    c) were
    d) be

  8. The system ______ tested before release.
    a) is
    b) are
    c) be
    d) been

  9. The access ______ restricted.
    a) is
    b) are
    c) be
    d) been

  10. The policy ______ followed by all users.
    a) is
    b) are
    c) be
    d) been


71–80

  1. We ______ to monitor the system continuously.
    a) need
    b) needs
    c) needing
    d) needed

  2. He ______ check the logs every hour.
    a) must
    b) musts
    c) musted
    d) musting

  3. They ______ improve security measures.
    a) should
    b) shoulds
    c) shoulded
    d) shoulding

  4. You ______ share your password.
    a) must not
    b) must
    c) should
    d) can

  5. We ______ deploy the patch immediately.
    a) can
    b) cans
    c) canned
    d) canning

  6. He ______ be working now.
    a) must
    b) musts
    c) musted
    d) musting

  7. They ______ have missed the alert.
    a) must
    b) musts
    c) musted
    d) musting

  8. We ______ consider upgrading the system.
    a) should
    b) shoulds
    c) shoulded
    d) shoulding

  9. You ______ not ignore warnings.
    a) should
    b) shoulds
    c) shoulded
    d) shoulding

  10. He ______ solve the issue quickly.
    a) can
    b) cans
    c) canned
    d) canning


81–90

  1. The engineer who ______ the system is very experienced.
    a) manage
    b) manages
    c) managing
    d) managed

  2. The server that ______ down was critical.
    a) go
    b) goes
    c) went
    d) going

  3. The team ______ handles security is very skilled.
    a) who
    b) which
    c) where
    d) when

  4. The tool ______ we use is very effective.
    a) who
    b) which
    c) where
    d) when

  5. The place ______ the servers are located is secure.
    a) who
    b) which
    c) where
    d) when

  6. The time ______ the issue happened was midnight.
    a) who
    b) which
    c) where
    d) when

  7. The engineer ______ fixed the issue is here.
    a) who
    b) which
    c) where
    d) when

  8. The data ______ was lost is critical.
    a) who
    b) which
    c) where
    d) when

  9. The company ______ we work for is global.
    a) who
    b) which
    c) where
    d) when

  10. The system ______ failed was outdated.
    a) who
    b) which
    c) where
    d) when


91–100

  1. We have ______ information to solve the issue.
    a) enough
    b) too
    c) many
    d) much

  2. There are ______ errors in the system.
    a) much
    b) many
    c) little
    d) less

  3. We don’t have ______ time.
    a) many
    b) much
    c) few
    d) several

  4. There is ______ traffic on the network.
    a) many
    b) much
    c) few
    d) several

  5. We need ______ more data.
    a) a
    b) an
    c) some
    d) any

  6. Do you have ______ questions?
    a) some
    b) any
    c) much
    d) many

  7. There is ______ problem with the server.
    a) a
    b) an
    c) some
    d) any

  8. We saw ______ unusual activity.
    a) a
    b) an
    c) some
    d) any

  9. He didn’t find ______ issues.
    a) some
    b) any
    c) much
    d) many

  10. We need ______ solution quickly.
    a) a
    b) an
    c) some
    d) any


✅ Gabarito

1-b, 2-c, 3-c, 4-a, 5-b, 6-c, 7-c, 8-b, 9-a, 10-b
11-b, 12-b, 13-b, 14-a, 15-a, 16-b, 17-c, 18-c, 19-b, 20-b
21-a, 22-a, 23-b, 24-b, 25-b, 26-a, 27-c, 28-a, 29-c, 30-b
31-b, 32-c, 33-b, 34-a, 35-b, 36-d, 37-c, 38-b, 39-a, 40-a
41-a, 42-b, 43-c, 44-b, 45-c, 46-b, 47-b, 48-c, 49-c, 50-b
51-a, 52-b, 53-c, 54-a, 55-b, 56-a, 57-b, 58-c, 59-a, 60-a
61-b, 62-a, 63-b, 64-b, 65-a, 66-b, 67-b, 68-a, 69-a, 70-a
71-a, 72-a, 73-a, 74-a, 75-a, 76-a, 77-a, 78-a, 79-a, 80-a
81-b, 82-c, 83-a, 84-b, 85-c, 86-d, 87-a, 88-b, 89-b, 90-b
91-a, 92-b, 93-b, 94-b, 95-c, 96-b, 97-a, 98-c, 99-b, 100-a

Nenhum comentário:

Postar um comentário