<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.pathfindersonline.org/index.php?action=history&amp;feed=atom&amp;title=AY_Honors%2FCybersecurity_%28SSD%29_-_Advanced%2FAnswer_Key</id>
	<title>AY Honors/Cybersecurity (SSD) - Advanced/Answer Key - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.pathfindersonline.org/index.php?action=history&amp;feed=atom&amp;title=AY_Honors%2FCybersecurity_%28SSD%29_-_Advanced%2FAnswer_Key"/>
	<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cybersecurity_(SSD)_-_Advanced/Answer_Key&amp;action=history"/>
	<updated>2026-04-05T22:18:09Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.5</generator>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cybersecurity_(SSD)_-_Advanced/Answer_Key&amp;diff=614642&amp;oldid=prev</id>
		<title>W126jep: Marked this version for translation</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cybersecurity_(SSD)_-_Advanced/Answer_Key&amp;diff=614642&amp;oldid=prev"/>
		<updated>2025-02-11T23:09:39Z</updated>

		<summary type="html">&lt;p&gt;Marked this version for translation&lt;/p&gt;
&lt;a href=&quot;https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cybersecurity_(SSD)_-_Advanced/Answer_Key&amp;amp;diff=614642&amp;amp;oldid=614641&quot;&gt;Show changes&lt;/a&gt;</summary>
		<author><name>W126jep</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cybersecurity_(SSD)_-_Advanced/Answer_Key&amp;diff=614641&amp;oldid=prev</id>
		<title>W126jep: + Answer Key for Cybersecurity - Advanced AY Honor, from the SSD</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cybersecurity_(SSD)_-_Advanced/Answer_Key&amp;diff=614641&amp;oldid=prev"/>
		<updated>2025-02-11T23:09:10Z</updated>

		<summary type="html">&lt;p&gt;+ Answer Key for Cybersecurity - Advanced AY Honor, from the SSD&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{HonorSubpage}}&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1}} &lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 1. Have the Internet - Advanced Honor. --&amp;gt;&lt;br /&gt;
{{honor prerequisite|honor=Internet - Advanced}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 1 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 2. Have the Cybersecurity Honor. --&amp;gt;&lt;br /&gt;
{{honor prerequisite|honor=Cybersecurity_(SSD)|displayname=Cybersecurity}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 3. Explain what is CIA. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 4. Explain what is the difference between Symmetric and Asymmetric encryptions. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 4 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 5. Explain what is the difference between IDS and IPS. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 5 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 6. Explain how is encryption different from hashing. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 6 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 7. xplain what is the difference between VA (Vulnerability Assessment) and PT (Penetration Testing). --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 7 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 8. Explain what is the difference between HIDS and NIDS. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 8 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=9}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 9. Explain what are the steps to set up a server. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 9 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=10}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 10. Explain what is SSL encryption. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 10 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=11}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 11. Explain what are the steps to secure a server. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 11 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=12}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 12. Explain what is port scanning. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 12 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=13}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 13. Explain what are the different layers of the OSI model. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 13 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=14}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 14. Explain what is black hat, white hat, and grey hat hackers. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 14 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=15}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 15. Explain what is a Brute Force Attack and how to prevent it. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 15 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=16}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 16. Explain how to prevent a MITM attack. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 16 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=17}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 17. Explain how to prevent a DDOS attack. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 17 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=18}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 18. Explain how to prevent a XSS attack. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 18 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=19}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 19. Explain how to prevent phishing. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 19 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=20}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 20. Explain how to prevent a SQL injection. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 20 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=21}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 21. Explain what are the common methods of authentication for network security. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 21 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=22}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 22. Explain what is the difference between Diffie Hellman and RSA. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 22 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=23}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 23. Explain what is ARP poisoning and how to avoid it. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 23 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:AY Honors/noindex{{GetLangSuffix}}|{{SUBPAGENAME}}]]&lt;br /&gt;
&lt;br /&gt;
{{CloseHonorPage}}&lt;/div&gt;</summary>
		<author><name>W126jep</name></author>
	</entry>
</feed>