Difference between revisions of "AY Honors/Cybersecurity (SSD) - Advanced/Answer Key"

From Pathfinder Wiki
< AY Honors‎ | Cybersecurity (SSD) - AdvancedAY Honors/Cybersecurity (SSD) - Advanced/Answer Key
(+ Answer Key for Cybersecurity - Advanced AY Honor, from the SSD)
 
(Marked this version for translation)
 
Line 2: Line 2:
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1}}  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1}}  
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:1-->
 +
</noinclude>
 
<!-- 1. Have the Internet - Advanced Honor. -->
 
<!-- 1. Have the Internet - Advanced Honor. -->
 
{{honor prerequisite|honor=Internet - Advanced}}
 
{{honor prerequisite|honor=Internet - Advanced}}
  
 +
<!--T:2-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 1 -->
 
{{CloseReq}} <!-- 1 -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:3-->
 +
</noinclude>
 
<!-- 2. Have the Cybersecurity Honor. -->
 
<!-- 2. Have the Cybersecurity Honor. -->
 
{{honor prerequisite|honor=Cybersecurity_(SSD)|displayname=Cybersecurity}}
 
{{honor prerequisite|honor=Cybersecurity_(SSD)|displayname=Cybersecurity}}
  
 +
<!--T:4-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 2 -->
 
{{CloseReq}} <!-- 2 -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:5-->
 +
</noinclude>
 
<!-- 3. Explain what is CIA. -->
 
<!-- 3. Explain what is CIA. -->
  
 +
<!--T:6-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 3 -->
 
{{CloseReq}} <!-- 3 -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:7-->
 +
</noinclude>
 
<!-- 4. Explain what is the difference between Symmetric and Asymmetric encryptions. -->
 
<!-- 4. Explain what is the difference between Symmetric and Asymmetric encryptions. -->
  
 +
<!--T:8-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 4 -->
 
{{CloseReq}} <!-- 4 -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:9-->
 +
</noinclude>
 
<!-- 5. Explain what is the difference between IDS and IPS. -->
 
<!-- 5. Explain what is the difference between IDS and IPS. -->
  
 +
<!--T:10-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 5 -->
 
{{CloseReq}} <!-- 5 -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:11-->
 +
</noinclude>
 
<!-- 6. Explain how is encryption different from hashing. -->
 
<!-- 6. Explain how is encryption different from hashing. -->
  
 +
<!--T:12-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 6 -->
 
{{CloseReq}} <!-- 6 -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:13-->
 +
</noinclude>
 
<!-- 7. xplain what is the difference between VA (Vulnerability Assessment) and PT (Penetration Testing). -->
 
<!-- 7. xplain what is the difference between VA (Vulnerability Assessment) and PT (Penetration Testing). -->
  
 +
<!--T:14-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 7 -->
 
{{CloseReq}} <!-- 7 -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:15-->
 +
</noinclude>
 
<!-- 8. Explain what is the difference between HIDS and NIDS. -->
 
<!-- 8. Explain what is the difference between HIDS and NIDS. -->
  
 +
<!--T:16-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 8 -->
 
{{CloseReq}} <!-- 8 -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=9}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=9}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:17-->
 +
</noinclude>
 
<!-- 9. Explain what are the steps to set up a server. -->
 
<!-- 9. Explain what are the steps to set up a server. -->
  
 +
<!--T:18-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 9 -->
 
{{CloseReq}} <!-- 9 -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=10}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=10}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:19-->
 +
</noinclude>
 
<!-- 10. Explain what is SSL encryption. -->
 
<!-- 10. Explain what is SSL encryption. -->
  
 +
<!--T:20-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 10 -->
 
{{CloseReq}} <!-- 10 -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=11}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=11}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:21-->
 +
</noinclude>
 
<!-- 11. Explain what are the steps to secure a server. -->
 
<!-- 11. Explain what are the steps to secure a server. -->
  
 +
<!--T:22-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 11 -->
 
{{CloseReq}} <!-- 11 -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=12}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=12}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:23-->
 +
</noinclude>
 
<!-- 12. Explain what is port scanning. -->
 
<!-- 12. Explain what is port scanning. -->
  
 +
<!--T:24-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 12 -->
 
{{CloseReq}} <!-- 12 -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=13}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=13}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:25-->
 +
</noinclude>
 
<!-- 13. Explain what are the different layers of the OSI model. -->
 
<!-- 13. Explain what are the different layers of the OSI model. -->
  
 +
<!--T:26-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 13 -->
 
{{CloseReq}} <!-- 13 -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=14}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=14}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:27-->
 +
</noinclude>
 
<!-- 14. Explain what is black hat, white hat, and grey hat hackers. -->
 
<!-- 14. Explain what is black hat, white hat, and grey hat hackers. -->
  
 +
<!--T:28-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 14 -->
 
{{CloseReq}} <!-- 14 -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=15}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=15}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:29-->
 +
</noinclude>
 
<!-- 15. Explain what is a Brute Force Attack and how to prevent it. -->
 
<!-- 15. Explain what is a Brute Force Attack and how to prevent it. -->
  
 +
<!--T:30-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 15 -->
 
{{CloseReq}} <!-- 15 -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=16}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=16}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:31-->
 +
</noinclude>
 
<!-- 16. Explain how to prevent a MITM attack. -->
 
<!-- 16. Explain how to prevent a MITM attack. -->
  
 +
<!--T:32-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 16 -->
 
{{CloseReq}} <!-- 16 -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=17}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=17}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:33-->
 +
</noinclude>
 
<!-- 17. Explain how to prevent a DDOS attack. -->
 
<!-- 17. Explain how to prevent a DDOS attack. -->
  
 +
<!--T:34-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 17 -->
 
{{CloseReq}} <!-- 17 -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=18}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=18}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:35-->
 +
</noinclude>
 
<!-- 18. Explain how to prevent a XSS attack. -->
 
<!-- 18. Explain how to prevent a XSS attack. -->
  
 +
<!--T:36-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 18 -->
 
{{CloseReq}} <!-- 18 -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=19}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=19}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:37-->
 +
</noinclude>
 
<!-- 19. Explain how to prevent phishing. -->
 
<!-- 19. Explain how to prevent phishing. -->
  
 +
<!--T:38-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 19 -->
 
{{CloseReq}} <!-- 19 -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=20}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=20}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:39-->
 +
</noinclude>
 
<!-- 20. Explain how to prevent a SQL injection. -->
 
<!-- 20. Explain how to prevent a SQL injection. -->
  
 +
<!--T:40-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 20 -->
 
{{CloseReq}} <!-- 20 -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=21}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=21}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:41-->
 +
</noinclude>
 
<!-- 21. Explain what are the common methods of authentication for network security. -->
 
<!-- 21. Explain what are the common methods of authentication for network security. -->
  
 +
<!--T:42-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 21 -->
 
{{CloseReq}} <!-- 21 -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=22}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=22}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:43-->
 +
</noinclude>
 
<!-- 22. Explain what is the difference between Diffie Hellman and RSA. -->
 
<!-- 22. Explain what is the difference between Diffie Hellman and RSA. -->
  
 +
<!--T:44-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 22 -->
 
{{CloseReq}} <!-- 22 -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=23}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=23}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:45-->
 +
</noinclude>
 
<!-- 23. Explain what is ARP poisoning and how to avoid it. -->
 
<!-- 23. Explain what is ARP poisoning and how to avoid it. -->
  
 +
<!--T:46-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 23 -->
 
{{CloseReq}} <!-- 23 -->
  
 
<noinclude><translate></noinclude>
 
<noinclude><translate></noinclude>
==References==
+
==References== <!--T:47-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
  

Latest revision as of 23:09, 11 February 2025

Other languages:
English
Cybersecurity - Advanced

Skill Level

3

Year

2024

Version

31.03.2025

Approval authority

Southern Asia-Pacific Division

Cybersecurity Advanced AY Honor (SSD).png
Cybersecurity - Advanced
Vocational
Skill Level
123
Approval authority
Southern Asia-Pacific Division
Year of Introduction
2024


1

Have the Internet - Advanced Honor.


For tips and instruction see Internet - Advanced.



2

Have the Cybersecurity Honor.


For tips and instruction see Cybersecurity.



3

Explain what is CIA.




4

Explain what is the difference between Symmetric and Asymmetric encryptions.




5

Explain what is the difference between IDS and IPS.




6

Explain how is encryption different from hashing.




7

Explain what is the difference between VA (Vulnerability Assessment) and PT (Penetration Testing).




8

Explain what is the difference between HIDS and NIDS.




9

Explain what are the steps to set up a server.




10

Explain what is SSL encryption.




11

Explain what are the steps to secure a server.




12

Explain what is port scanning.




13

Explain what are the different layers of the OSI model.




14

Explain what is black hat, white hat, and grey hat hackers.




15

Explain what is a Brute Force Attack and how to prevent it.




16

Explain how to prevent a MITM attack.




17

Explain how to prevent a DDOS attack.




18

Explain how to prevent a XSS attack.




19

Explain how to prevent phishing.




20

Explain how to prevent a SQL injection.




21

Explain what are the common methods of authentication for network security.




22

Explain what is the difference between Diffie Hellman and RSA.




23

Explain what is ARP poisoning and how to avoid it.




References