Difference between revisions of "AY Honors/Cybersecurity (SSD) - Advanced/Requirements"

From Pathfinder Wiki
< AY Honors‎ | Cybersecurity (SSD) - AdvancedAY Honors/Cybersecurity (SSD) - Advanced/Requirements
(+ Reqs. for Cybersecurity - Advanced AY Honor, from the SSD)
 
(Marked this version for translation)
 
Line 4: Line 4:
  
 
<section begin=challenge />
 
<section begin=challenge />
<b>1. <section begin=req1 /><noinclude><translate></noinclude>Have the Internet - Advanced Honor.
+
<b>1. <section begin=req1 /><noinclude><translate><!--T:1-->
 +
</noinclude>Have the Internet - Advanced Honor.
 
<noinclude></translate></noinclude><section end=req1 /></b>
 
<noinclude></translate></noinclude><section end=req1 /></b>
  
<b>2. <section begin=req2 /><noinclude><translate></noinclude>Have the Cybersecurity Honor.
+
<b>2. <section begin=req2 /><noinclude><translate><!--T:2-->
 +
</noinclude>Have the Cybersecurity Honor.
 
<noinclude></translate></noinclude><section end=req2 /></b>
 
<noinclude></translate></noinclude><section end=req2 /></b>
 
<section end=challenge />
 
<section end=challenge />
  
<b>3. <section begin=req3 /><noinclude><translate></noinclude>Explain what is CIA.
+
<b>3. <section begin=req3 /><noinclude><translate><!--T:3-->
 +
</noinclude>Explain what is CIA.
 
<noinclude></translate></noinclude><section end=req3 /></b>
 
<noinclude></translate></noinclude><section end=req3 /></b>
  
<b>4. <section begin=req4 /><noinclude><translate></noinclude>Explain what is the difference between Symmetric and Asymmetric encryptions.
+
<b>4. <section begin=req4 /><noinclude><translate><!--T:4-->
 +
</noinclude>Explain what is the difference between Symmetric and Asymmetric encryptions.
 
<noinclude></translate></noinclude><section end=req4 /></b>
 
<noinclude></translate></noinclude><section end=req4 /></b>
  
<b>5. <section begin=req5 /><noinclude><translate></noinclude>Explain what is the difference between IDS and IPS.
+
<b>5. <section begin=req5 /><noinclude><translate><!--T:5-->
 +
</noinclude>Explain what is the difference between IDS and IPS.
 
<noinclude></translate></noinclude><section end=req5 /></b>
 
<noinclude></translate></noinclude><section end=req5 /></b>
  
<b>6. <section begin=req6 /><noinclude><translate></noinclude>Explain how is encryption different from hashing.
+
<b>6. <section begin=req6 /><noinclude><translate><!--T:6-->
 +
</noinclude>Explain how is encryption different from hashing.
 
<noinclude></translate></noinclude><section end=req6 /></b>
 
<noinclude></translate></noinclude><section end=req6 /></b>
  
<b>7. <section begin=req7 /><noinclude><translate></noinclude>Explain what is the difference between VA (Vulnerability Assessment) and PT (Penetration Testing).
+
<b>7. <section begin=req7 /><noinclude><translate><!--T:7-->
 +
</noinclude>Explain what is the difference between VA (Vulnerability Assessment) and PT (Penetration Testing).
 
<noinclude></translate></noinclude><section end=req7 /></b>
 
<noinclude></translate></noinclude><section end=req7 /></b>
  
<b>8. <section begin=req8 /><noinclude><translate></noinclude>Explain what is the difference between HIDS and NIDS.
+
<b>8. <section begin=req8 /><noinclude><translate><!--T:8-->
 +
</noinclude>Explain what is the difference between HIDS and NIDS.
 
<noinclude></translate></noinclude><section end=req8 /></b>
 
<noinclude></translate></noinclude><section end=req8 /></b>
  
<b>9. <section begin=req9 /><noinclude><translate></noinclude>Explain what are the steps to set up a server.
+
<b>9. <section begin=req9 /><noinclude><translate><!--T:9-->
 +
</noinclude>Explain what are the steps to set up a server.
 
<noinclude></translate></noinclude><section end=req9 /></b>
 
<noinclude></translate></noinclude><section end=req9 /></b>
  
<b>10. <section begin=req10 /><noinclude><translate></noinclude>Explain what is SSL encryption.
+
<b>10. <section begin=req10 /><noinclude><translate><!--T:10-->
 +
</noinclude>Explain what is SSL encryption.
 
<noinclude></translate></noinclude><section end=req10 /></b>
 
<noinclude></translate></noinclude><section end=req10 /></b>
  
<b>11. <section begin=req11 /><noinclude><translate></noinclude>Explain what are the steps to secure a server.
+
<b>11. <section begin=req11 /><noinclude><translate><!--T:11-->
 +
</noinclude>Explain what are the steps to secure a server.
 
<noinclude></translate></noinclude><section end=req11 /></b>
 
<noinclude></translate></noinclude><section end=req11 /></b>
  
<b>12. <section begin=req12 /><noinclude><translate></noinclude>Explain what is port scanning.
+
<b>12. <section begin=req12 /><noinclude><translate><!--T:12-->
 +
</noinclude>Explain what is port scanning.
 
<noinclude></translate></noinclude><section end=req12 /></b>
 
<noinclude></translate></noinclude><section end=req12 /></b>
  
<b>13. <section begin=req13 /><noinclude><translate></noinclude>Explain what are the different layers of the OSI model.
+
<b>13. <section begin=req13 /><noinclude><translate><!--T:13-->
 +
</noinclude>Explain what are the different layers of the OSI model.
 
<noinclude></translate></noinclude><section end=req13 /></b>
 
<noinclude></translate></noinclude><section end=req13 /></b>
  
<b>14. <section begin=req14 /><noinclude><translate></noinclude>Explain what is black hat, white hat, and grey hat hackers.
+
<b>14. <section begin=req14 /><noinclude><translate><!--T:14-->
 +
</noinclude>Explain what is black hat, white hat, and grey hat hackers.
 
<noinclude></translate></noinclude><section end=req14 /></b>
 
<noinclude></translate></noinclude><section end=req14 /></b>
  
<b>15. <section begin=req15 /><noinclude><translate></noinclude>Explain what is a Brute Force Attack and how to prevent it.
+
<b>15. <section begin=req15 /><noinclude><translate><!--T:15-->
 +
</noinclude>Explain what is a Brute Force Attack and how to prevent it.
 
<noinclude></translate></noinclude><section end=req15 /></b>
 
<noinclude></translate></noinclude><section end=req15 /></b>
  
<b>16. <section begin=req16 /><noinclude><translate></noinclude>Explain how to prevent a MITM attack.
+
<b>16. <section begin=req16 /><noinclude><translate><!--T:16-->
 +
</noinclude>Explain how to prevent a MITM attack.
 
<noinclude></translate></noinclude><section end=req16 /></b>
 
<noinclude></translate></noinclude><section end=req16 /></b>
  
<b>17. <section begin=req17 /><noinclude><translate></noinclude>Explain how to prevent a DDOS attack.
+
<b>17. <section begin=req17 /><noinclude><translate><!--T:17-->
 +
</noinclude>Explain how to prevent a DDOS attack.
 
<noinclude></translate></noinclude><section end=req17 /></b>
 
<noinclude></translate></noinclude><section end=req17 /></b>
  
<b>18. <section begin=req18 /><noinclude><translate></noinclude>Explain how to prevent a XSS attack.
+
<b>18. <section begin=req18 /><noinclude><translate><!--T:18-->
 +
</noinclude>Explain how to prevent a XSS attack.
 
<noinclude></translate></noinclude><section end=req18 /></b>
 
<noinclude></translate></noinclude><section end=req18 /></b>
  
<b>19. <section begin=req19 /><noinclude><translate></noinclude>Explain how to prevent phishing.
+
<b>19. <section begin=req19 /><noinclude><translate><!--T:19-->
 +
</noinclude>Explain how to prevent phishing.
 
<noinclude></translate></noinclude><section end=req19 /></b>
 
<noinclude></translate></noinclude><section end=req19 /></b>
  
<b>20. <section begin=req20 /><noinclude><translate></noinclude>Explain how to prevent a SQL injection.
+
<b>20. <section begin=req20 /><noinclude><translate><!--T:20-->
 +
</noinclude>Explain how to prevent a SQL injection.
 
<noinclude></translate></noinclude><section end=req20 /></b>
 
<noinclude></translate></noinclude><section end=req20 /></b>
  
<b>21. <section begin=req21 /><noinclude><translate></noinclude>Explain what are the common methods of authentication for network security.
+
<b>21. <section begin=req21 /><noinclude><translate><!--T:21-->
 +
</noinclude>Explain what are the common methods of authentication for network security.
 
<noinclude></translate></noinclude><section end=req21 /></b>
 
<noinclude></translate></noinclude><section end=req21 /></b>
  
<b>22. <section begin=req22 /><noinclude><translate></noinclude>Explain what is the difference between Diffie Hellman and RSA.
+
<b>22. <section begin=req22 /><noinclude><translate><!--T:22-->
 +
</noinclude>Explain what is the difference between Diffie Hellman and RSA.
 
<noinclude></translate></noinclude><section end=req22 /></b>
 
<noinclude></translate></noinclude><section end=req22 /></b>
  
<b>23. <section begin=req23 /><noinclude><translate></noinclude>Explain what is ARP poisoning and how to avoid it.
+
<b>23. <section begin=req23 /><noinclude><translate><!--T:23-->
 +
</noinclude>Explain what is ARP poisoning and how to avoid it.
 
<noinclude></translate></noinclude><section end=req23 /></b>
 
<noinclude></translate></noinclude><section end=req23 /></b>
  
 
<section end=Body />
 
<section end=Body />

Latest revision as of 19:57, 11 February 2025

Other languages:
English
Cybersecurity - Advanced

Skill Level

3

Year

2024

Version

25.04.2025

Approval authority

Southern Asia-Pacific Division

Cybersecurity Advanced AY Honor (SSD).png
Cybersecurity - Advanced
Vocational
Skill Level
123
Approval authority
Southern Asia-Pacific Division
Year of Introduction
2024



1. Have the Internet - Advanced Honor.

2. Have the Cybersecurity Honor.


3. Explain what is CIA.

4. Explain what is the difference between Symmetric and Asymmetric encryptions.

5. Explain what is the difference between IDS and IPS.

6. Explain how is encryption different from hashing.

7. Explain what is the difference between VA (Vulnerability Assessment) and PT (Penetration Testing).

8. Explain what is the difference between HIDS and NIDS.

9. Explain what are the steps to set up a server.

10. Explain what is SSL encryption.

11. Explain what are the steps to secure a server.

12. Explain what is port scanning.

13. Explain what are the different layers of the OSI model.

14. Explain what is black hat, white hat, and grey hat hackers.

15. Explain what is a Brute Force Attack and how to prevent it.

16. Explain how to prevent a MITM attack.

17. Explain how to prevent a DDOS attack.

18. Explain how to prevent a XSS attack.

19. Explain how to prevent phishing.

20. Explain how to prevent a SQL injection.

21. Explain what are the common methods of authentication for network security.

22. Explain what is the difference between Diffie Hellman and RSA.

23. Explain what is ARP poisoning and how to avoid it.