Difference between revisions of "AY Honors/Cybersecurity (SSD) - Advanced/Answer Key"
From Pathfinder Wiki
< AY Honors | Cybersecurity (SSD) - AdvancedAY Honors/Cybersecurity (SSD) - Advanced/Answer Key
(+ Answer Key for Cybersecurity - Advanced AY Honor, from the SSD) |
(Marked this version for translation) |
||
Line 2: | Line 2: | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1}} | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1}} | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:1--> |
+ | </noinclude> | ||
<!-- 1. Have the Internet - Advanced Honor. --> | <!-- 1. Have the Internet - Advanced Honor. --> | ||
{{honor prerequisite|honor=Internet - Advanced}} | {{honor prerequisite|honor=Internet - Advanced}} | ||
+ | <!--T:2--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 1 --> | {{CloseReq}} <!-- 1 --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2}} | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2}} | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:3--> |
+ | </noinclude> | ||
<!-- 2. Have the Cybersecurity Honor. --> | <!-- 2. Have the Cybersecurity Honor. --> | ||
{{honor prerequisite|honor=Cybersecurity_(SSD)|displayname=Cybersecurity}} | {{honor prerequisite|honor=Cybersecurity_(SSD)|displayname=Cybersecurity}} | ||
+ | <!--T:4--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 2 --> | {{CloseReq}} <!-- 2 --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3}} | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3}} | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:5--> |
+ | </noinclude> | ||
<!-- 3. Explain what is CIA. --> | <!-- 3. Explain what is CIA. --> | ||
+ | <!--T:6--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 3 --> | {{CloseReq}} <!-- 3 --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4}} | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4}} | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:7--> |
+ | </noinclude> | ||
<!-- 4. Explain what is the difference between Symmetric and Asymmetric encryptions. --> | <!-- 4. Explain what is the difference between Symmetric and Asymmetric encryptions. --> | ||
+ | <!--T:8--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 4 --> | {{CloseReq}} <!-- 4 --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5}} | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5}} | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:9--> |
+ | </noinclude> | ||
<!-- 5. Explain what is the difference between IDS and IPS. --> | <!-- 5. Explain what is the difference between IDS and IPS. --> | ||
+ | <!--T:10--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 5 --> | {{CloseReq}} <!-- 5 --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6}} | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6}} | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:11--> |
+ | </noinclude> | ||
<!-- 6. Explain how is encryption different from hashing. --> | <!-- 6. Explain how is encryption different from hashing. --> | ||
+ | <!--T:12--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 6 --> | {{CloseReq}} <!-- 6 --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7}} | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7}} | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:13--> |
+ | </noinclude> | ||
<!-- 7. xplain what is the difference between VA (Vulnerability Assessment) and PT (Penetration Testing). --> | <!-- 7. xplain what is the difference between VA (Vulnerability Assessment) and PT (Penetration Testing). --> | ||
+ | <!--T:14--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 7 --> | {{CloseReq}} <!-- 7 --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8}} | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8}} | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:15--> |
+ | </noinclude> | ||
<!-- 8. Explain what is the difference between HIDS and NIDS. --> | <!-- 8. Explain what is the difference between HIDS and NIDS. --> | ||
+ | <!--T:16--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 8 --> | {{CloseReq}} <!-- 8 --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=9}} | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=9}} | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:17--> |
+ | </noinclude> | ||
<!-- 9. Explain what are the steps to set up a server. --> | <!-- 9. Explain what are the steps to set up a server. --> | ||
+ | <!--T:18--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 9 --> | {{CloseReq}} <!-- 9 --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=10}} | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=10}} | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:19--> |
+ | </noinclude> | ||
<!-- 10. Explain what is SSL encryption. --> | <!-- 10. Explain what is SSL encryption. --> | ||
+ | <!--T:20--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 10 --> | {{CloseReq}} <!-- 10 --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=11}} | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=11}} | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:21--> |
+ | </noinclude> | ||
<!-- 11. Explain what are the steps to secure a server. --> | <!-- 11. Explain what are the steps to secure a server. --> | ||
+ | <!--T:22--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 11 --> | {{CloseReq}} <!-- 11 --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=12}} | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=12}} | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:23--> |
+ | </noinclude> | ||
<!-- 12. Explain what is port scanning. --> | <!-- 12. Explain what is port scanning. --> | ||
+ | <!--T:24--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 12 --> | {{CloseReq}} <!-- 12 --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=13}} | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=13}} | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:25--> |
+ | </noinclude> | ||
<!-- 13. Explain what are the different layers of the OSI model. --> | <!-- 13. Explain what are the different layers of the OSI model. --> | ||
+ | <!--T:26--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 13 --> | {{CloseReq}} <!-- 13 --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=14}} | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=14}} | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:27--> |
+ | </noinclude> | ||
<!-- 14. Explain what is black hat, white hat, and grey hat hackers. --> | <!-- 14. Explain what is black hat, white hat, and grey hat hackers. --> | ||
+ | <!--T:28--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 14 --> | {{CloseReq}} <!-- 14 --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=15}} | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=15}} | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:29--> |
+ | </noinclude> | ||
<!-- 15. Explain what is a Brute Force Attack and how to prevent it. --> | <!-- 15. Explain what is a Brute Force Attack and how to prevent it. --> | ||
+ | <!--T:30--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 15 --> | {{CloseReq}} <!-- 15 --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=16}} | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=16}} | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:31--> |
+ | </noinclude> | ||
<!-- 16. Explain how to prevent a MITM attack. --> | <!-- 16. Explain how to prevent a MITM attack. --> | ||
+ | <!--T:32--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 16 --> | {{CloseReq}} <!-- 16 --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=17}} | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=17}} | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:33--> |
+ | </noinclude> | ||
<!-- 17. Explain how to prevent a DDOS attack. --> | <!-- 17. Explain how to prevent a DDOS attack. --> | ||
+ | <!--T:34--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 17 --> | {{CloseReq}} <!-- 17 --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=18}} | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=18}} | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:35--> |
+ | </noinclude> | ||
<!-- 18. Explain how to prevent a XSS attack. --> | <!-- 18. Explain how to prevent a XSS attack. --> | ||
+ | <!--T:36--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 18 --> | {{CloseReq}} <!-- 18 --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=19}} | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=19}} | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:37--> |
+ | </noinclude> | ||
<!-- 19. Explain how to prevent phishing. --> | <!-- 19. Explain how to prevent phishing. --> | ||
+ | <!--T:38--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 19 --> | {{CloseReq}} <!-- 19 --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=20}} | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=20}} | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:39--> |
+ | </noinclude> | ||
<!-- 20. Explain how to prevent a SQL injection. --> | <!-- 20. Explain how to prevent a SQL injection. --> | ||
+ | <!--T:40--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 20 --> | {{CloseReq}} <!-- 20 --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=21}} | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=21}} | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:41--> |
+ | </noinclude> | ||
<!-- 21. Explain what are the common methods of authentication for network security. --> | <!-- 21. Explain what are the common methods of authentication for network security. --> | ||
+ | <!--T:42--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 21 --> | {{CloseReq}} <!-- 21 --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=22}} | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=22}} | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:43--> |
+ | </noinclude> | ||
<!-- 22. Explain what is the difference between Diffie Hellman and RSA. --> | <!-- 22. Explain what is the difference between Diffie Hellman and RSA. --> | ||
+ | <!--T:44--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 22 --> | {{CloseReq}} <!-- 22 --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=23}} | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=23}} | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:45--> |
+ | </noinclude> | ||
<!-- 23. Explain what is ARP poisoning and how to avoid it. --> | <!-- 23. Explain what is ARP poisoning and how to avoid it. --> | ||
+ | <!--T:46--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 23 --> | {{CloseReq}} <!-- 23 --> | ||
<noinclude><translate></noinclude> | <noinclude><translate></noinclude> | ||
− | ==References== | + | ==References== <!--T:47--> |
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
Latest revision as of 23:09, 11 February 2025
Cybersecurity - Advanced
Skill Level
3
Year
2024
Version
31.03.2025
Approval authority
Southern Asia-Pacific Division
For tips and instruction see Internet - Advanced.
For tips and instruction see Cybersecurity.
References
Categories:
- Pages using DynamicPageList3 parser function
- AY Honors/Prerequisite/Internet - Advanced
- AY Honors/See Also/Internet - Advanced
- AY Honors/Prerequisite/Cybersecurity (SSD)
- AY Honors/See Also/Cybersecurity (SSD)
- Missing Localization/All/Cybersecurity Advanced AY Honor (SSD).png/en
- Missing Localization/All/SSD/en