{"id":1613072,"date":"2025-07-27T23:14:01","date_gmt":"2025-07-28T02:14:01","guid":{"rendered":"https:\/\/www.estrategiaconcursos.com.br\/blog\/?p=1613072"},"modified":"2025-07-27T23:21:01","modified_gmt":"2025-07-28T02:21:01","slug":"gabarito-extraoficial-pf-perito-criminal-federal-informatica-forense","status":"publish","type":"post","link":"https:\/\/www.estrategiaconcursos.com.br\/blog\/gabarito-extraoficial-pf-perito-criminal-federal-informatica-forense\/","title":{"rendered":"Gabarito Extraoficial PF &#8211; Perito Criminal Federal: Inform\u00e1tica Forense"},"content":{"rendered":"\n<p>As <strong>provas do concurso da Pol\u00edcia Federal para o cargo de Perito Criminal Federal &#8211; \u00c1rea 3: Inform\u00e1tica Forense foram aplicadas neste domingo, 27 de julho<\/strong>.<\/p>\n\n\n\n<p>Os<strong> aprovados far\u00e3o jus a uma remunera\u00e7\u00e3o inicial de&nbsp;R$ 26.800,00, sob regime de trabalho de 40 horas semanais.<\/strong><\/p>\n\n\n\n<p>Para ajudar a reduzir a sua ansiedade e possibilitar uma pr\u00e9via do seu desempenho na avalia\u00e7\u00e3o, <strong>nossos professores realizaram a corre\u00e7\u00e3o extraoficial por meio do YouTube<\/strong>. Abaixo, acompanhe a an\u00e1lise completa.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-gabarito-extraoficial-policia-federal-perito-criminal-federal-informatica-forense-ao-vivo\">Gabarito Extraoficial Pol\u00edcia Federal (Perito Criminal Federal &#8211; Inform\u00e1tica Forense) AO VIVO:<\/h2>\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"lyte-wrapper\" style=\"width:853px;max-width:100%;margin:5px;\"><div class=\"lyMe\" id=\"WYL_jjusQHrqUHg\"><div id=\"lyte_jjusQHrqUHg\" data-src=\"\/\/i.ytimg.com\/vi\/jjusQHrqUHg\/hqdefault.jpg\" class=\"pL\"><div class=\"tC\"><div class=\"tT\"><\/div><\/div><div class=\"play\"><\/div><div class=\"ctrl\"><div class=\"Lctrl\"><\/div><div class=\"Rctrl\"><\/div><\/div><\/div><noscript><a href=\"https:\/\/youtu.be\/jjusQHrqUHg\" rel=\"nofollow\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i.ytimg.com\/vi\/jjusQHrqUHg\/0.jpg\" alt=\"YouTube video thumbnail\" width=\"853\" height=\"460\" \/><br \/>Assista a este v\u00eddeo no YouTube<\/a><\/noscript><\/div><\/div><div class=\"lL\" style=\"max-width:100%;width:853px;margin:5px;\"><\/div><figcaption><\/figcaption><\/figure>\n\n\n<h3 class=\"wp-block-heading has-text-align-center\" id=\"h-veja-abaixo-os-professores-responsaveis-pela-correcao-de-cada-disciplina\">Veja abaixo os professores respons\u00e1veis pela corre\u00e7\u00e3o de cada disciplina:<\/h3>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table class=\"has-pale-ocean-gradient-background has-background\"><thead><tr><th class=\"has-text-align-center\" data-align=\"center\"><strong>Descri\u00e7\u00e3o<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Disciplina<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Professor<\/strong><\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><\/td><td class=\"has-text-align-center\" data-align=\"center\">L\u00edngua Portuguesa<\/td><td class=\"has-text-align-center\" data-align=\"center\">Felipe Luccas<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><\/td><td class=\"has-text-align-center\" data-align=\"center\">Inform\u00e1tica<\/td><td class=\"has-text-align-center\" data-align=\"center\">Renato da Costa<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><\/td><td class=\"has-text-align-center\" data-align=\"center\">Inform\u00e1tica<\/td><td class=\"has-text-align-center\" data-align=\"center\">Emannuelle Gouveia<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><\/td><td class=\"has-text-align-center\" data-align=\"center\">No\u00e7\u00f5es de Direito Constitucional<\/td><td class=\"has-text-align-center\" data-align=\"center\">Adriane Fauth<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><\/td><td class=\"has-text-align-center\" data-align=\"center\">No\u00e7\u00f5es de Direito Administrativo<\/td><td class=\"has-text-align-center\" data-align=\"center\">Herbert Almeida<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><\/td><td class=\"has-text-align-center\" data-align=\"center\">Direitos Humanos<\/td><td class=\"has-text-align-center\" data-align=\"center\">Ricardo Torques<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><\/td><td class=\"has-text-align-center\" data-align=\"center\">No\u00e7\u00f5es de Direito Penal<\/td><td class=\"has-text-align-center\" data-align=\"center\">Renan Ara\u00fajo<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><\/td><td class=\"has-text-align-center\" data-align=\"center\">No\u00e7\u00f5es de Direito Processual Penal<\/td><td class=\"has-text-align-center\" data-align=\"center\">Priscila Silveira<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><\/td><td class=\"has-text-align-center\" data-align=\"center\">Racioc\u00ednio L\u00f3gico<\/td><td class=\"has-text-align-center\" data-align=\"center\">Carlos Henrique<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>Cargo: Perito Criminal \u2013 \u00c1rea 3: Inform\u00e1tica Forense<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">No\u00e7\u00f5es de Criminal\u00edstica<\/td><td class=\"has-text-align-center\" data-align=\"center\">Alexandre Herculano<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><\/td><td class=\"has-text-align-center\" data-align=\"center\">Redes de Computadores<\/td><td class=\"has-text-align-center\" data-align=\"center\">Andr\u00e9 Castro<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><\/td><td class=\"has-text-align-center\" data-align=\"center\">Seguran\u00e7a da Informa\u00e7\u00e3o<\/td><td class=\"has-text-align-center\" data-align=\"center\">Andr\u00e9 Castro<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><\/td><td class=\"has-text-align-center\" data-align=\"center\">Banco de Dados<\/td><td class=\"has-text-align-center\" data-align=\"center\">Emannuelle Gouveia<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><\/td><td class=\"has-text-align-center\" data-align=\"center\">Desenvolvimento de Software<\/td><td class=\"has-text-align-center\" data-align=\"center\">Raphael Lacerda<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><\/td><td class=\"has-text-align-center\" data-align=\"center\">Governan\u00e7a de TI e Legisla\u00e7\u00e3o aplicada. Instru\u00e7\u00e3o Normativa SGD\/ME n\u00ba 94\/2022.<\/td><td class=\"has-text-align-center\" data-align=\"center\">Fernando Pedrosa<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><\/td><td class=\"has-text-align-center\" data-align=\"center\">Arquitetura de Computadores<\/td><td class=\"has-text-align-center\" data-align=\"center\">Evandro Vecchia<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><\/td><td class=\"has-text-align-center\" data-align=\"center\">Lei 14.133\/2021 e Marco Civil da Internet (Lei n\u00ba 12.965\/2014)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Ant\u00f4nio Daud<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-gabarito-extraoficial\">Gabarito Extraoficial<\/h2>\n\n\n\n<p><em><strong>Frase do caderno de prova usado como refer\u00eancia:<\/strong><\/em> Curiosidade \u00e9 a chave para a criatividade.<\/p>\n\n\n\n<p><strong><mark class=\"has-inline-color has-vivid-red-color\">Aten\u00e7\u00e3o<\/mark>!<\/strong>  A defini\u00e7\u00e3o da resposta &#8211; correta ou errada &#8211; pode ser eventualmente alterada. Por isso, atualize esta p\u00e1gina.<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table class=\"has-pale-ocean-gradient-background has-background\"><thead><tr><th>Resposta<\/th><th class=\"has-text-align-center\" data-align=\"center\">Correta ou errada<\/th><th class=\"has-text-align-center\" data-align=\"center\">Coment\u00e1rios<\/th><\/tr><\/thead><tbody><tr><td>1 &#8211; Para seu prop\u00f3sito comunicativo&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>2 &#8211; De acordo com o texto, a lA surgiu&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>3 &#8211; No texto, os autores argumentam&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>4 &#8211; No primeiro per\u00edodo do \u00faltimo&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>5 &#8211; No primeiro per\u00edodo do \u00faltimo par\u00e1grafo, a flex\u00e3o&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>6 &#8211; A corre\u00e7\u00e3o do texto seria preservada&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>7 &#8211; As express\u00f5es &#8220;Esses programas&#8221;&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>8 &#8211; A substitui\u00e7\u00e3o da express\u00e3o &#8220;foi&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>9 &#8211; Em expedientes oficiais que tenham&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>10 &#8211; Exposi\u00e7\u00e3o de motivos \u00e9 o expediente&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>11 &#8211; Com vistas a garantir o car\u00e1ter&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>12 &#8211; Respeitosamente e Atenciosamente s\u00e3o&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>13 &#8211; No Windows, um arquivo pode estar&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>14 &#8211; O MS Excel permite a identifica\u00e7\u00e3o&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>15 &#8211; Firewalls e antiv\u00edrus s\u00e3o ferramentas<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>16 &#8211; Em geral Em geral, projetos de Big Data<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>17 &#8211; Cardinalidades s\u00e3o restri\u00e7\u00f5es<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>18 &#8211; A otimiza\u00e7\u00e3o de desempenho e a garantia&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>19 &#8211; A t\u00e9cnica de clustering&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>20 &#8211; Ataques do tipo zero-day&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>21 &#8211; Autarquias s\u00e3o entidades&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>22 &#8211; Ocorre descentraliza\u00e7\u00e3o&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>23 &#8211; O sistema de registro de pre\u00e7os&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>24 &#8211; Nos casos de contrata\u00e7\u00e3o&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>25 &#8211; Os partidos pol\u00edticos s\u00e3o&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>26 &#8211; Os corpos de bombeiros&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>27 &#8211; O direito \u00e0 vida \u00e9 protegido&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>28 &#8211; No sistema presidencialista&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>29 &#8211; Nos termos da teoria da ubiquidade&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>30 &#8211; Conforme a teoria da atividade&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>31 &#8211; A autoridade policial est\u00e1&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C ou E*<\/td><td class=\"has-text-align-center\" data-align=\"center\">O gabarito correto \u00e9 C (184 CPP), mas pode ser que a banca d\u00ea a E* (art. 14 CPP)<\/td><\/tr><tr><td>32 &#8211; A cadeia de cust\u00f3dia do crime&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\">(158-A, par\u00e1grafo 1\u00ba, CPP)<\/td><\/tr><tr><td>33 &#8211; No caso, a busca&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>34 &#8211; A requisi\u00e7\u00e3o formulada&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\">(159, par\u00e1grafo&nbsp;6\u00ba,&nbsp;CPP)<\/td><\/tr><tr><td>35 &#8211; Os vest\u00edgios morfol\u00f3gicos&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>36 &#8211; De acordo com o princ\u00edpio&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>37 &#8211; Quando ampliada, a imagem&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C*<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>38 &#8211; Os sinais de Hofmann&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>39 &#8211; O isolamento e a preserva\u00e7\u00e3o&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>40 &#8211; O STF consolidou o entendimento&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>41 &#8211; Devido ao princ\u00edpio da&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\">(a mora configura esgotamento, 46, 2, CADH)<\/td><\/tr><tr><td>42 &#8211; Os Estados-partes da Conven\u00e7\u00e3o Relativa&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\">(19, 1, Conven\u00e7\u00e3o Refugiados)<\/td><\/tr><tr><td>43 &#8211; Os Estados-partes da Conven\u00e7\u00e3o sobre&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\">(9, 1, CEDAW)<\/td><\/tr><tr><td>44 &#8211; As regras m\u00ednimas da ONU&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\">(5, 1, Regras de Mandela)<\/td><\/tr><tr><td>45 &#8211; O duplo grau de jurisdi\u00e7\u00e3o&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\">(25,&nbsp;CADH)<\/td><\/tr><tr><td>46 &#8211; Se existirem 3 c\u00e2meras e se&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>47 &#8211; A proposi\u00e7\u00e3o Q -&gt; (P&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>48 &#8211; Se o sensor de presen\u00e7a&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>49 &#8211; A possibilidade de o alarme&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>50 &#8211; Se o alarme de movimenta\u00e7\u00e3o&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>51 &#8211; A mem\u00f3ria flash&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>52 &#8211; Quando se usa a paravisualiza\u00e7\u00e3o&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>53 &#8211; No modelo de pagina\u00e7\u00e3o&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>54 &#8211; Em sistemas de arquivos com&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>55 &#8211; Diferentemente do XFS&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>56 &#8211; RAID 0 (striping) distribui&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>57 &#8211; A t\u00e9cnica de agrega\u00e7\u00e3o&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>58 &#8211; Nos sistemas de gerenciamento&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>59 &#8211; O SQLite exige configura\u00e7\u00e3o&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>60 &#8211; Durante uma recupera\u00e7\u00e3o ap\u00f3s falha&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>61 &#8211; Em SQL, as jun\u00e7\u00f5es externas&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>62 &#8211; Os bancos de dados NoSQL&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>63 &#8211; A escalabilidade horizontal&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>64 &#8211; Sistemas NoSQL de grafos&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>65 &#8211; O control flow flattening&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>66 &#8211; A utiliza\u00e7\u00e3o de uma ISA&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>67 &#8211; Uma sandbox \u00e9 um ambiente&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>68 &#8211; A an\u00e1lise est\u00e1tica de um v\u00edrus&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>69 &#8211; Inteiro (int) e caractere (char) s\u00e3o&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>70 &#8211; Em linguagens de programa\u00e7\u00e3o&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>71 &#8211; Em linguagens linguagens procedurais&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>72 &#8211; Devido \u00e0 compila\u00e7\u00e3o do c\u00f3digo-fonte&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>73 &#8211; A linguagem JavaScript \u00e9 executada&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>74 &#8211; A principal desvantagem da GraphQL&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>75 &#8211; Uma caracter\u00edstica fundamental de uma API&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>76 &#8211; No SonarQube, um QualityGate representa um&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>77 &#8211; Para gerenciar a ordem de execu\u00e7\u00e3o de chamadas&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>78 &#8211; Para grandes volumes de dados&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>79 &#8211; De acordo com o modelo TCP\u0410\u0420&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>80 &#8211; O SSHv2 n\u00e3o limita o n\u00famero de sess\u00f5es&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>81 &#8211; Na URL a seguir, o uso de &#8212; indica&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>82 &#8211; Considere que um atacante tenha acesso&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>83 &#8211; O OIDC \u00e9 uma camada de autoriza\u00e7\u00e3o constru\u00edda&#8230;.<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>84 &#8211; OAuth 2.0 permite que servi\u00e7os de terceiros&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>85 &#8211; Na \u00e1rea de inform\u00e1tica forense digital&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>86 &#8211; A t\u00e9cnica do LSB (least significant bit) altera&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>87 &#8211; O dispositivo respons\u00e1vel por fazer o NAT importa&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>88 &#8211; Se o computador em quest\u00e3o enviar uma&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>89 &#8211; A key signing key \u00e9 usada para assinar&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>90 &#8211; A zone signing key \u00e9 usada para&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>91 &#8211; A t\u00e9cnica denominada simultaneous authentication<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>92 &#8211; A t\u00e9cnica denominada opportunistic wireless<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>93 &#8211; Considerando-se que a figura a seguir descreve<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>94 &#8211; Twofish \u00e9 uma cifra sim\u00e9trica com um tamanho de<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>95 &#8211; No Windows Server 2022, quando o DoH&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>96 &#8211; No Windows Server 2022, o servidor secured-core&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>97 &#8211; No Linux, os arquivos de log do sistema&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>98 &#8211; Considere que a sequ\u00eancia de comandos&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>99 &#8211; No Linux, systemd \u00e9 um sistema&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>100 &#8211; No Android, a UID (user identifier)&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>101 &#8211; No iOS, a aleatoriza\u00e7\u00e3o de espa\u00e7o de endere\u00e7o&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>102 &#8211; Considere que o comando da Pol\u00edcia Federal&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>103 &#8211; De acordo com o Marco Civil da Internet&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>104 &#8211; Deepfakes s\u00e3o v\u00eddeos gerados por IA para produzir&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>105 &#8211; LLM (Large Language Models) s\u00e3o modelos&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>106 &#8211; A criptografia ponta a ponta inviabiliza&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>107 &#8211; A mera visualiza\u00e7\u00e3o de arquivos realizada&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>108 &#8211; Na an\u00e1lise do incidente, o perito deve&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>109 &#8211; A coleta de vest\u00edgios digitais deve ser&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>110 &#8211; A coleta de vest\u00edgios em ambiente&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>111 &#8211; Em ambientes de nuvem, a coleta de evid\u00eancias&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>112 &#8211; Se documentos tiverem sido impressos&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>113 &#8211; Arquivos de configura\u00e7\u00e3o s\u00e3o irrelevantes&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>114 &#8211; A an\u00e1lise de arquivos tempor\u00e1rios&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>115 &#8211; A correta identifica\u00e7\u00e3o da vers\u00e3o&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>116 &#8211; Metadados EXIF s\u00e3o encontrados em&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>117 &#8211; A aplica\u00e7\u00e3o do princ\u00edpio da proporcionalidade&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>118 &#8211; A identifica\u00e7\u00e3o de vest\u00edgios cibern\u00e9ticos&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>119 &#8211; A an\u00e1lise forense em ambientes&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">C<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td>120 &#8211; A duplica\u00e7\u00e3o forense de um disco virtual&#8230;<\/td><td class=\"has-text-align-center\" data-align=\"center\">E<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p class=\"has-text-align-center\"><em>Para saber mais sobre as vagas de Perito e todos os detalhes do concurso PF 2025, acesse nosso artigo na \u00edntegra:<\/em><\/p>\n\n\n\n<p class=\"has-text-align-center has-blush-light-purple-gradient-background has-background\"><strong><a href=\"https:\/\/www.estrategiaconcursos.com.br\/blog\/concurso-policia-federal\/\" target=\"_blank\" rel=\"noreferrer noopener\">Concurso Pol\u00edcia Federal 2025<\/a><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\" id=\"h-quer-saber-tudo-sobre-concursos-previstos-confira-nossos-artigos\">Quer saber tudo sobre concursos previstos?<br \/>Confira nossos artigos!<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.estrategiaconcursos.com.br\/blog\/concurso-pf-edital-publicado-2025\/\" target=\"_blank\" rel=\"noreferrer noopener\">Edital Pol\u00edcia Federal<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.estrategiaconcursos.com.br\/blog\/concurso-pf-administrativo\/\" target=\"_blank\" rel=\"noreferrer noopener\">Concurso PF Administrativo<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.estrategiaconcursos.com.br\/blog\/concurso-prf\/\" target=\"_blank\" rel=\"noreferrer noopener\">Concurso PRF<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.estrategiaconcursos.com.br\/blog\/concursos-2025\" target=\"_blank\" rel=\"noreferrer noopener\">Concursos 2025<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.estrategiaconcursos.com.br\/blog\/concursos-2026\/\" target=\"_blank\" rel=\"noreferrer noopener\">Concursos 2026<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.estrategiaconcursos.com.br\/blog\/concursos-de-policia\/\" target=\"_blank\" rel=\"noreferrer noopener\">Concursos policiais<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>As provas do concurso da Pol\u00edcia Federal para o cargo de Perito Criminal Federal &#8211; \u00c1rea 3: Inform\u00e1tica Forense foram aplicadas neste domingo, 27 de julho. Os aprovados far\u00e3o jus a uma remunera\u00e7\u00e3o inicial de&nbsp;R$ 26.800,00, sob regime de trabalho de 40 horas semanais. Para ajudar a reduzir a sua ansiedade e possibilitar uma pr\u00e9via [&hellip;]<\/p>\n","protected":false},"author":3079,"featured_media":1418953,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"post_tipo":"news","footnotes":""},"categories":[220190],"tags":[],"tax_estado":[219963],"class_list":["post-1613072","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-policial-peritos","tax_estado-concursos-federais"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Gabarito Extraoficial PF - Perito Criminal Federal: Inform\u00e1tica Forense<\/title>\n<meta name=\"description\" content=\"Confira o gabarito extraoficial PF - Perito Criminal Federal: Inform\u00e1tica Forense e analise seu desempenho na prova!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.estrategiaconcursos.com.br\/blog\/gabarito-extraoficial-pf-perito-criminal-federal-informatica-forense\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gabarito Extraoficial PF - Perito Criminal Federal: Inform\u00e1tica Forense\" \/>\n<meta property=\"og:description\" content=\"Confira o gabarito extraoficial PF - Perito Criminal Federal: Inform\u00e1tica Forense e analise seu desempenho na prova!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.estrategiaconcursos.com.br\/blog\/gabarito-extraoficial-pf-perito-criminal-federal-informatica-forense\/\" \/>\n<meta property=\"og:site_name\" content=\"Estrat\u00e9gia Concursos\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-28T02:14:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-28T02:21:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dhg1h5j42swfq.cloudfront.net\/2024\/06\/21170337\/policia-federal-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"768\" \/>\n\t<meta property=\"og:image:height\" content=\"432\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jos\u00e9 Ferreira\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@EstratConcursos\" \/>\n<meta name=\"twitter:site\" content=\"@EstratConcursos\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jos\u00e9 Ferreira\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/gabarito-extraoficial-pf-perito-criminal-federal-informatica-forense\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/gabarito-extraoficial-pf-perito-criminal-federal-informatica-forense\/\"},\"author\":{\"name\":\"Jos\u00e9 Ferreira\",\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/#\/schema\/person\/c6c0e1eadd39622c9352ddfc08a634b8\"},\"headline\":\"Gabarito Extraoficial PF &#8211; Perito Criminal Federal: Inform\u00e1tica Forense\",\"datePublished\":\"2025-07-28T02:14:01+00:00\",\"dateModified\":\"2025-07-28T02:21:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/gabarito-extraoficial-pf-perito-criminal-federal-informatica-forense\/\"},\"wordCount\":1362,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/gabarito-extraoficial-pf-perito-criminal-federal-informatica-forense\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dhg1h5j42swfq.cloudfront.net\/2024\/06\/21170337\/policia-federal-1.png\",\"articleSection\":[\"Policial (Peritos, Papiloscopistas)\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.estrategiaconcursos.com.br\/blog\/gabarito-extraoficial-pf-perito-criminal-federal-informatica-forense\/#respond\"]}],\"copyrightYear\":\"2025\",\"copyrightHolder\":{\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/gabarito-extraoficial-pf-perito-criminal-federal-informatica-forense\/\",\"url\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/gabarito-extraoficial-pf-perito-criminal-federal-informatica-forense\/\",\"name\":\"Gabarito Extraoficial PF - Perito Criminal Federal: Inform\u00e1tica Forense\",\"isPartOf\":{\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/gabarito-extraoficial-pf-perito-criminal-federal-informatica-forense\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/gabarito-extraoficial-pf-perito-criminal-federal-informatica-forense\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dhg1h5j42swfq.cloudfront.net\/2024\/06\/21170337\/policia-federal-1.png\",\"datePublished\":\"2025-07-28T02:14:01+00:00\",\"dateModified\":\"2025-07-28T02:21:01+00:00\",\"description\":\"Confira o gabarito extraoficial PF - Perito Criminal Federal: Inform\u00e1tica Forense e analise seu desempenho na prova!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/gabarito-extraoficial-pf-perito-criminal-federal-informatica-forense\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.estrategiaconcursos.com.br\/blog\/gabarito-extraoficial-pf-perito-criminal-federal-informatica-forense\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/gabarito-extraoficial-pf-perito-criminal-federal-informatica-forense\/#primaryimage\",\"url\":\"https:\/\/dhg1h5j42swfq.cloudfront.net\/2024\/06\/21170337\/policia-federal-1.png\",\"contentUrl\":\"https:\/\/dhg1h5j42swfq.cloudfront.net\/2024\/06\/21170337\/policia-federal-1.png\",\"width\":768,\"height\":432,\"caption\":\"Concurso PF\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/gabarito-extraoficial-pf-perito-criminal-federal-informatica-forense\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gabarito Extraoficial PF &#8211; Perito Criminal Federal: Inform\u00e1tica Forense\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/#website\",\"url\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/\",\"name\":\"Estrat\u00e9gia Concursos\",\"description\":\"O blog da Estrat\u00e9gia Concursos traz not\u00edcias sobre concursos e artigos de professores oferecendo cursos para concursos (pdf + videaulas) no site.\",\"publisher\":{\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/#organization\",\"name\":\"Estrat\u00e9gia Concursos\",\"url\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/dhg1h5j42swfq.cloudfront.net\/2025\/06\/03203428\/logo_concursos-1.jpg\",\"contentUrl\":\"https:\/\/dhg1h5j42swfq.cloudfront.net\/2025\/06\/03203428\/logo_concursos-1.jpg\",\"width\":230,\"height\":60,\"caption\":\"Estrat\u00e9gia Concursos\"},\"image\":{\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/EstratConcursos\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/#\/schema\/person\/c6c0e1eadd39622c9352ddfc08a634b8\",\"name\":\"Jos\u00e9 Ferreira\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/4905709ae29b7da88ab39fb7f37bdaaf136d2b021cc441fdccfd11728a0dcf4f?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4905709ae29b7da88ab39fb7f37bdaaf136d2b021cc441fdccfd11728a0dcf4f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4905709ae29b7da88ab39fb7f37bdaaf136d2b021cc441fdccfd11728a0dcf4f?s=96&d=mm&r=g\",\"caption\":\"Jos\u00e9 Ferreira\"},\"url\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/author\/jose-ferreira\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Gabarito Extraoficial PF - Perito Criminal Federal: Inform\u00e1tica Forense","description":"Confira o gabarito extraoficial PF - Perito Criminal Federal: Inform\u00e1tica Forense e analise seu desempenho na prova!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.estrategiaconcursos.com.br\/blog\/gabarito-extraoficial-pf-perito-criminal-federal-informatica-forense\/","og_locale":"pt_BR","og_type":"article","og_title":"Gabarito Extraoficial PF - Perito Criminal Federal: Inform\u00e1tica Forense","og_description":"Confira o gabarito extraoficial PF - Perito Criminal Federal: Inform\u00e1tica Forense e analise seu desempenho na prova!","og_url":"https:\/\/www.estrategiaconcursos.com.br\/blog\/gabarito-extraoficial-pf-perito-criminal-federal-informatica-forense\/","og_site_name":"Estrat\u00e9gia Concursos","article_published_time":"2025-07-28T02:14:01+00:00","article_modified_time":"2025-07-28T02:21:01+00:00","og_image":[{"width":768,"height":432,"url":"https:\/\/dhg1h5j42swfq.cloudfront.net\/2024\/06\/21170337\/policia-federal-1.png","type":"image\/png"}],"author":"Jos\u00e9 Ferreira","twitter_card":"summary_large_image","twitter_creator":"@EstratConcursos","twitter_site":"@EstratConcursos","twitter_misc":{"Escrito por":"Jos\u00e9 Ferreira","Est. tempo de leitura":"7 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/gabarito-extraoficial-pf-perito-criminal-federal-informatica-forense\/#article","isPartOf":{"@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/gabarito-extraoficial-pf-perito-criminal-federal-informatica-forense\/"},"author":{"name":"Jos\u00e9 Ferreira","@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/#\/schema\/person\/c6c0e1eadd39622c9352ddfc08a634b8"},"headline":"Gabarito Extraoficial PF &#8211; Perito Criminal Federal: Inform\u00e1tica Forense","datePublished":"2025-07-28T02:14:01+00:00","dateModified":"2025-07-28T02:21:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/gabarito-extraoficial-pf-perito-criminal-federal-informatica-forense\/"},"wordCount":1362,"commentCount":0,"publisher":{"@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/#organization"},"image":{"@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/gabarito-extraoficial-pf-perito-criminal-federal-informatica-forense\/#primaryimage"},"thumbnailUrl":"https:\/\/dhg1h5j42swfq.cloudfront.net\/2024\/06\/21170337\/policia-federal-1.png","articleSection":["Policial (Peritos, Papiloscopistas)"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.estrategiaconcursos.com.br\/blog\/gabarito-extraoficial-pf-perito-criminal-federal-informatica-forense\/#respond"]}],"copyrightYear":"2025","copyrightHolder":{"@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/gabarito-extraoficial-pf-perito-criminal-federal-informatica-forense\/","url":"https:\/\/www.estrategiaconcursos.com.br\/blog\/gabarito-extraoficial-pf-perito-criminal-federal-informatica-forense\/","name":"Gabarito Extraoficial PF - Perito Criminal Federal: Inform\u00e1tica Forense","isPartOf":{"@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/gabarito-extraoficial-pf-perito-criminal-federal-informatica-forense\/#primaryimage"},"image":{"@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/gabarito-extraoficial-pf-perito-criminal-federal-informatica-forense\/#primaryimage"},"thumbnailUrl":"https:\/\/dhg1h5j42swfq.cloudfront.net\/2024\/06\/21170337\/policia-federal-1.png","datePublished":"2025-07-28T02:14:01+00:00","dateModified":"2025-07-28T02:21:01+00:00","description":"Confira o gabarito extraoficial PF - Perito Criminal Federal: Inform\u00e1tica Forense e analise seu desempenho na prova!","breadcrumb":{"@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/gabarito-extraoficial-pf-perito-criminal-federal-informatica-forense\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.estrategiaconcursos.com.br\/blog\/gabarito-extraoficial-pf-perito-criminal-federal-informatica-forense\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/gabarito-extraoficial-pf-perito-criminal-federal-informatica-forense\/#primaryimage","url":"https:\/\/dhg1h5j42swfq.cloudfront.net\/2024\/06\/21170337\/policia-federal-1.png","contentUrl":"https:\/\/dhg1h5j42swfq.cloudfront.net\/2024\/06\/21170337\/policia-federal-1.png","width":768,"height":432,"caption":"Concurso PF"},{"@type":"BreadcrumbList","@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/gabarito-extraoficial-pf-perito-criminal-federal-informatica-forense\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/www.estrategiaconcursos.com.br\/blog\/"},{"@type":"ListItem","position":2,"name":"Gabarito Extraoficial PF &#8211; Perito Criminal Federal: Inform\u00e1tica Forense"}]},{"@type":"WebSite","@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/#website","url":"https:\/\/www.estrategiaconcursos.com.br\/blog\/","name":"Estrat\u00e9gia Concursos","description":"O blog da Estrat\u00e9gia Concursos traz not\u00edcias sobre concursos e artigos de professores oferecendo cursos para concursos (pdf + videaulas) no site.","publisher":{"@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.estrategiaconcursos.com.br\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/#organization","name":"Estrat\u00e9gia Concursos","url":"https:\/\/www.estrategiaconcursos.com.br\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/dhg1h5j42swfq.cloudfront.net\/2025\/06\/03203428\/logo_concursos-1.jpg","contentUrl":"https:\/\/dhg1h5j42swfq.cloudfront.net\/2025\/06\/03203428\/logo_concursos-1.jpg","width":230,"height":60,"caption":"Estrat\u00e9gia Concursos"},"image":{"@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/EstratConcursos"]},{"@type":"Person","@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/#\/schema\/person\/c6c0e1eadd39622c9352ddfc08a634b8","name":"Jos\u00e9 Ferreira","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/4905709ae29b7da88ab39fb7f37bdaaf136d2b021cc441fdccfd11728a0dcf4f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4905709ae29b7da88ab39fb7f37bdaaf136d2b021cc441fdccfd11728a0dcf4f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4905709ae29b7da88ab39fb7f37bdaaf136d2b021cc441fdccfd11728a0dcf4f?s=96&d=mm&r=g","caption":"Jos\u00e9 Ferreira"},"url":"https:\/\/www.estrategiaconcursos.com.br\/blog\/author\/jose-ferreira\/"}]}},"_links":{"self":[{"href":"https:\/\/www.estrategiaconcursos.com.br\/blog\/wp-json\/wp\/v2\/posts\/1613072","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.estrategiaconcursos.com.br\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.estrategiaconcursos.com.br\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.estrategiaconcursos.com.br\/blog\/wp-json\/wp\/v2\/users\/3079"}],"replies":[{"embeddable":true,"href":"https:\/\/www.estrategiaconcursos.com.br\/blog\/wp-json\/wp\/v2\/comments?post=1613072"}],"version-history":[{"count":17,"href":"https:\/\/www.estrategiaconcursos.com.br\/blog\/wp-json\/wp\/v2\/posts\/1613072\/revisions"}],"predecessor-version":[{"id":1613687,"href":"https:\/\/www.estrategiaconcursos.com.br\/blog\/wp-json\/wp\/v2\/posts\/1613072\/revisions\/1613687"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.estrategiaconcursos.com.br\/blog\/wp-json\/wp\/v2\/media\/1418953"}],"wp:attachment":[{"href":"https:\/\/www.estrategiaconcursos.com.br\/blog\/wp-json\/wp\/v2\/media?parent=1613072"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.estrategiaconcursos.com.br\/blog\/wp-json\/wp\/v2\/categories?post=1613072"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.estrategiaconcursos.com.br\/blog\/wp-json\/wp\/v2\/tags?post=1613072"},{"taxonomy":"tax_estado","embeddable":true,"href":"https:\/\/www.estrategiaconcursos.com.br\/blog\/wp-json\/wp\/v2\/tax_estado?post=1613072"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}