The bare requirements/basic capabilities your computer or device needs for a software or game to function
They are enough to run the progrsm/game but will not offer the best or most comfortable experience
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Recommended specs
A
The suggested system requirements that will get the best experience out of the software/game
Meeting the recommended specs means your computer will have the necessary capabilities to run and have impressive features like good graphics
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
EULA
A
A contract agreement between the application/software provider and the user that stipulates the conditions that the software is to be used
Dictates how it will be used, shared/modified, and installed
Stipulate user rights, limitations, intellectual property, warranty disclaimers, and consequences for violations
Installing the software means you accept the agreement
End User Licence Agreement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
AUP
A
Broad-ranging guidelines and rules that monitor the responsible use of a platform or service
Will deal with issues such as harrassment, spam, and content restrictions
Consequences for violations could be content removal, account suspension, and sometimes legal action
Can be used by social media platforms, Internet Service Providers(ISP), webistes, or online communities
Acceptable User Policy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Social Engineering techniques
A
Pretexting- Creating a fabricating a scenario(pretending to be coworker) to gain trust in order to steal info
Baiting- Attacker offers something enticing(like free downlowad) in exchange for info or action that could benefit hacker
Tailgating- Physical social engineering when attacker follows authorised person to secure are and relying on their distraction or courtesy to access area
Quid Pro Quo- Attackers offer something in return for info
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Purposes of Malware
A
Data Theft- Stealing senistive info like passwords, credit card details, and personal files
System Disruption- Can cause disruptions, slowing down, or crashes in a computer
Remote Control- Can allow hacker unauthorised access where they can control infected device remotely
Financial gain- Ransomware for ie, encrypts a victim’s data then demands a ransom for them to decrypt it
Botnet- Hackers can infect a network of computers and control them like zombies for things like coordinated attacks on websites
Malware can spread through email attachments, websites, and downloads