🔹 Perguntas (1–100)
1–10
-
The system ______ automatically when a threat is detected.
a) shut
b) shuts
c) shutting
d) to shut -
We ______ the firewall rules yesterday.
a) update
b) updates
c) updated
d) updating -
The server ______ running for 24 hours without interruption.
a) is
b) was
c) has been
d) had -
If the system fails, we ______ an alert.
a) receive
b) received
c) receiving
d) receives -
The engineer ______ already fixed the vulnerability.
a) have
b) has
c) had
d) having -
We need ______ the logs before deploying the update.
a) check
b) checking
c) to check
d) checked -
The issue ______ by the monitoring system.
a) detect
b) detected
c) was detected
d) detecting -
They ______ working on the patch when the system crashed.
a) are
b) were
c) have
d) had -
You should ______ strong passwords.
a) use
b) using
c) used
d) uses -
The backup ______ every night.
a) run
b) runs
c) running
d) ran
11–20
-
We ______ never experienced such an attack before.
a) did
b) have
c) had
d) do -
The logs ______ reviewed by the team.
a) is
b) are
c) was
d) be -
If we ______ earlier, we could have prevented the issue.
a) act
b) acted
c) acts
d) acting -
The admin ______ configuring the server right now.
a) is
b) are
c) was
d) be -
We ______ deploy the update tomorrow.
a) will
b) would
c) did
d) does -
The vulnerability ______ reported last week.
a) is
b) was
c) were
d) be -
He ______ in cybersecurity for five years.
a) works
b) worked
c) has worked
d) working -
The system must ______ immediately.
a) fix
b) fixed
c) be fixed
d) fixing -
We ______ checking the servers when the alert appeared.
a) are
b) were
c) have
d) had -
She ______ the report before the meeting.
a) finish
b) finished
c) finishing
d) finishes
21–30
-
The data ______ encrypted for security reasons.
a) is
b) are
c) be
d) been -
We ______ already informed the client.
a) have
b) has
c) had
d) having -
If the user ______ the password, access is denied.
a) forget
b) forgets
c) forgot
d) forgetting -
The system ______ down when we arrived.
a) is
b) was
c) were
d) be -
We are responsible ______ maintaining the servers.
a) of
b) for
c) to
d) at -
He is good ______ detecting threats.
a) at
b) in
c) on
d) for -
The issue depends ______ the configuration.
a) of
b) in
c) on
d) at -
We need to protect the system ______ attacks.
a) from
b) of
c) at
d) in -
The server is connected ______ the network.
a) at
b) in
c) to
d) on -
We are working ______ a new security policy.
a) in
b) on
c) at
d) for
31–40
-
The system is ______ than the previous version.
a) secure
b) more secure
c) most secure
d) securely -
This is the ______ solution we have.
a) good
b) better
c) best
d) well -
The update was ______ than expected.
a) fast
b) faster
c) fastest
d) more fast -
The logs are ______ detailed than before.
a) more
b) most
c) many
d) much -
This is ______ critical issue of the week.
a) more
b) the most
c) most
d) many -
He works ______ than his colleagues.
a) efficient
b) more efficient
c) efficiently
d) more efficiently -
The system runs ______ after optimization.
a) smooth
b) smoother
c) smoothly
d) more smooth -
The response time is ______ now.
a) quick
b) quicker
c) quickest
d) more quick -
This tool is ______ useful for monitoring.
a) very
b) too
c) enough
d) so -
The problem is ______ complex to solve quickly.
a) too
b) very
c) enough
d) so
41–50
-
We didn’t ______ the error in time.
a) see
b) saw
c) seen
d) seeing -
He has ______ the issue already.
a) fix
b) fixed
c) fixing
d) fixes -
The system keeps ______ unexpectedly.
a) crash
b) crashed
c) crashing
d) crashes -
We stopped ______ the service due to risks.
a) use
b) using
c) used
d) uses -
They decided ______ the system.
a) upgrade
b) upgrading
c) to upgrade
d) upgraded -
The engineer suggested ______ the logs.
a) review
b) reviewing
c) to review
d) reviewed -
We avoid ______ sensitive data.
a) expose
b) exposing
c) to expose
d) exposed -
He managed ______ the attack.
a) stop
b) stopping
c) to stop
d) stopped -
The team plans ______ a new tool.
a) implement
b) implementing
c) to implement
d) implemented -
She finished ______ the report.
a) write
b) writing
c) to write
d) wrote
51–60
-
If we update the system, it ______ more secure.
a) becomes
b) became
c) becoming
d) become -
If the server crashed, we ______ restart it.
a) will
b) would
c) can
d) must -
If we had monitored better, we ______ the attack.
a) prevent
b) prevented
c) would have prevented
d) preventing -
If users follow the rules, they ______ safe.
a) stay
b) stayed
c) staying
d) stays -
If I were you, I ______ change the password.
a) will
b) would
c) can
d) do -
If the system fails, we ______ notify the team.
a) must
b) musts
c) musted
d) musting -
If the logs were clearer, we ______ understand better.
a) will
b) would
c) can
d) do -
If the update had worked, we ______ no issues.
a) have
b) had
c) would have had
d) having -
If they call, we ______ respond immediately.
a) will
b) would
c) did
d) doing -
If the firewall blocks traffic, users ______ complain.
a) will
b) would
c) did
d) doing
61–70
-
The report ______ by the manager.
a) wrote
b) was written
c) is write
d) writing -
The system ______ monitored 24/7.
a) is
b) are
c) be
d) been -
The servers ______ maintained regularly.
a) is
b) are
c) was
d) be -
The issue ______ fixed yesterday.
a) is
b) was
c) were
d) be -
The data ______ stored securely.
a) is
b) are
c) be
d) been -
The logs ______ analyzed daily.
a) is
b) are
c) was
d) be -
The update ______ deployed last night.
a) is
b) was
c) were
d) be -
The system ______ tested before release.
a) is
b) are
c) be
d) been -
The access ______ restricted.
a) is
b) are
c) be
d) been -
The policy ______ followed by all users.
a) is
b) are
c) be
d) been
71–80
-
We ______ to monitor the system continuously.
a) need
b) needs
c) needing
d) needed -
He ______ check the logs every hour.
a) must
b) musts
c) musted
d) musting -
They ______ improve security measures.
a) should
b) shoulds
c) shoulded
d) shoulding -
You ______ share your password.
a) must not
b) must
c) should
d) can -
We ______ deploy the patch immediately.
a) can
b) cans
c) canned
d) canning -
He ______ be working now.
a) must
b) musts
c) musted
d) musting -
They ______ have missed the alert.
a) must
b) musts
c) musted
d) musting -
We ______ consider upgrading the system.
a) should
b) shoulds
c) shoulded
d) shoulding -
You ______ not ignore warnings.
a) should
b) shoulds
c) shoulded
d) shoulding -
He ______ solve the issue quickly.
a) can
b) cans
c) canned
d) canning
81–90
-
The engineer who ______ the system is very experienced.
a) manage
b) manages
c) managing
d) managed -
The server that ______ down was critical.
a) go
b) goes
c) went
d) going -
The team ______ handles security is very skilled.
a) who
b) which
c) where
d) when -
The tool ______ we use is very effective.
a) who
b) which
c) where
d) when -
The place ______ the servers are located is secure.
a) who
b) which
c) where
d) when -
The time ______ the issue happened was midnight.
a) who
b) which
c) where
d) when -
The engineer ______ fixed the issue is here.
a) who
b) which
c) where
d) when -
The data ______ was lost is critical.
a) who
b) which
c) where
d) when -
The company ______ we work for is global.
a) who
b) which
c) where
d) when -
The system ______ failed was outdated.
a) who
b) which
c) where
d) when
91–100
-
We have ______ information to solve the issue.
a) enough
b) too
c) many
d) much -
There are ______ errors in the system.
a) much
b) many
c) little
d) less -
We don’t have ______ time.
a) many
b) much
c) few
d) several -
There is ______ traffic on the network.
a) many
b) much
c) few
d) several -
We need ______ more data.
a) a
b) an
c) some
d) any -
Do you have ______ questions?
a) some
b) any
c) much
d) many -
There is ______ problem with the server.
a) a
b) an
c) some
d) any -
We saw ______ unusual activity.
a) a
b) an
c) some
d) any -
He didn’t find ______ issues.
a) some
b) any
c) much
d) many -
We need ______ solution quickly.
a) a
b) an
c) some
d) any
✅ Gabarito
1-b, 2-c, 3-c, 4-a, 5-b, 6-c, 7-c, 8-b, 9-a, 10-b
11-b, 12-b, 13-b, 14-a, 15-a, 16-b, 17-c, 18-c, 19-b, 20-b
21-a, 22-a, 23-b, 24-b, 25-b, 26-a, 27-c, 28-a, 29-c, 30-b
31-b, 32-c, 33-b, 34-a, 35-b, 36-d, 37-c, 38-b, 39-a, 40-a
41-a, 42-b, 43-c, 44-b, 45-c, 46-b, 47-b, 48-c, 49-c, 50-b
51-a, 52-b, 53-c, 54-a, 55-b, 56-a, 57-b, 58-c, 59-a, 60-a
61-b, 62-a, 63-b, 64-b, 65-a, 66-b, 67-b, 68-a, 69-a, 70-a
71-a, 72-a, 73-a, 74-a, 75-a, 76-a, 77-a, 78-a, 79-a, 80-a
81-b, 82-c, 83-a, 84-b, 85-c, 86-d, 87-a, 88-b, 89-b, 90-b
91-a, 92-b, 93-b, 94-b, 95-c, 96-b, 97-a, 98-c, 99-b, 100-a
Nenhum comentário:
Postar um comentário