Motherboard
A component that connects all other components in a computer system, with different form factors and expansion buses.
Central processing unit (CPU)
Handles most calculations in a computer system, with multiple cores and cache levels.
Random Access Memory (RAM)
Memory modules with different types and channels, used for temporary storage of data.
Serial Advanced Technology Attachment (SATA)
A data connection for storage devices, with different revisions and form factors.
Hard disk drive (HDD)
Storage devices with different speeds and form factors.
Solid-state drive (SSD)
Storage devices with different communication interfaces and form factors.
Redundant Array of Independent/Inexpensive Disks (RAID)
Different RAID levels for data storage and fault tolerance.
Small Computer Systems Interface (SCSI)
Modern SCSI standards for storage devices.
IPS
In-Plane Switching, a display technology with a wider viewing angle.
TN
Twisted Nematic, a display technology.
Optical media
Different types of optical discs used for data storage.
Compact Disc (CD)
Optical discs with a capacity of 650-700 MB.
Digital video/versatile disc (DVD)
Optical discs with special formats and capacities.
Blu-ray disc (BD)
Optical discs for games and HD movies with higher capacities.
Laptop
Portable miniaturized versions of desktop computers with replaceable components.
Heat sink
A component used for cooling the CPU, with different cooling methods.
Sound card
A component for audio input and output in a computer system.
Video card
A component for video output, with different connector types and resolutions.
Image processing of laser printing
The steps involved in laser printing.
Printer configuration settings
Different settings for printer functions and quality.
BIOS/UEFI
Firmware that initializes components and boots the computer system.
Networking
Different types of networks and network security components.
Network Cables
Different types of cables used for networking.
Wiring Pattern
Different wiring patterns for network cables.
Connection Methods
Different connection methods for devices like Thunderbolt and USB.
Bluetooth
Short-range wireless technology for device connectivity.
Internet Protocol (IP)
Different versions and classes of IP addresses.
Wireless Ethernet
Different versions and data transmission rates of wireless networks.
Ports & Protocols
Common ports and protocols used in networking.
Virtualization and Cloud Computing
Different types of virtualization and cloud computing services.
Samba
File- and printer-sharing service
EOL
End-of-life
CDFS
Compact disc file system
NFS
Network file system
NTFS
New Technology File System
FAT32
File Allocation Table 32
ext3, ext4
Third and fourth extended file systems
APFS
Apple File System
ExFAT
Extensible File Allocation Table
Command Prompt
Command-line program
Control Panel
View/change settings
Registry
Store settings
Task Manager
Monitor and start/end processes
Device Manager
Monitor and (dis)connect devices
Remote Desktop software
View/control a remote computer
User State Migration Tool (USMT)
Move user data
System Restore
Revert to earlier system configuration ("restore point")
WPA
Wi-Fi Protected Access
TKIP
Temporal Key Integrity Protocol
AES
Advanced Encryption Standard
RADIUS
Remote Authentication Dial-In User Service
TACACS+
Terminal Access Controller Access-Control System
Phishing
Attack by email; single target
Vishing
Attack by telephone or voicemail
Shoulder surfing
Look over someone's shoulder, often with a recording device
Whaling
Phishing that targets high-ranking people, such as C-suite executives
Tailgating
Unauthorized entity follows authorized party into secured premises
Impersonation
Attacks using stolen credentials or personal information
Dumpster diving
Recover information from trash
Evil twin
Setting up a fake Wi-Fi access point, hoping people choose it over the genuine one
Denial of service (DoS)
Overwhelming a target using a single machine
Distributed denial of service (DDoS)
DoS using multiple machines
Zero-day attack
Vulnerability unbeknownst to developers
Spoofing
Gain unauthorized access by pretending to be authorized
On-path attack
Setting up Wi-Fi networks to trap unsuspecting users
Brute-force attack
Trying character combinations
Dictionary attack
Using lists of probable passwords
Insider threat
Potential for an insider to use their authorized access or understanding of an organization to harm that organization
SQL injection
Manipulating SQL to modify remote database (such as by using SQL map)
Cross-site scripting (XSS)
Injecting malicious scripts into normal websites
Virus
Runs on a computer without the user's knowledge
Worm
Replicates itself across a network
Trojan Horse
Performs useful functions superficially but runs malicious programs covertly
Spyware
Spies on a computer and records its activities
Rootkit
Gains administrator-level access to the system core undetected
Ransomware
Holds a computer hostage until the user pays