icoa-cli 2.16.16 → 2.16.17
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/lib/demo-exam.js +15 -15
- package/package.json +1 -1
package/dist/lib/demo-exam.js
CHANGED
|
@@ -12,40 +12,40 @@ export const DEMO_SESSION = {
|
|
|
12
12
|
country: 'ALL',
|
|
13
13
|
};
|
|
14
14
|
export const DEMO_ANSWERS = {
|
|
15
|
-
1: '
|
|
16
|
-
9: '
|
|
15
|
+
1: 'C', 2: 'A', 3: 'D', 4: 'B', 5: 'A', 6: 'D', 7: 'C', 8: 'B',
|
|
16
|
+
9: 'A', 10: 'D', 11: 'C', 12: 'B', 13: 'A', 14: 'C', 15: 'D',
|
|
17
17
|
};
|
|
18
18
|
export const DEMO_QUESTIONS = [
|
|
19
19
|
{ number: 1, text: 'Which algorithm is NOT a symmetric cipher?', category: 'Cryptography',
|
|
20
|
-
options: { A: 'AES', B: '
|
|
20
|
+
options: { A: 'AES', B: 'DES', C: 'RSA', D: 'Blowfish' } },
|
|
21
21
|
{ number: 2, text: 'What does SQL injection exploit?', category: 'Web Security',
|
|
22
|
-
options: { A: '
|
|
22
|
+
options: { A: 'Unsanitized user input in database queries', B: 'Buffer overflow in web server', C: 'Misconfigured firewall rules', D: 'Weak encryption algorithms' } },
|
|
23
23
|
{ number: 3, text: 'Which HTTP status code indicates "Forbidden"?', category: 'Web Security',
|
|
24
|
-
options: { A: '401', B: '404', C: '
|
|
24
|
+
options: { A: '401', B: '404', C: '500', D: '403' } },
|
|
25
25
|
{ number: 4, text: 'Which tool is commonly used for network packet capture?', category: 'Network',
|
|
26
|
-
options: { A: 'Burp Suite', B: '
|
|
26
|
+
options: { A: 'Burp Suite', B: 'Wireshark', C: 'John the Ripper', D: 'Ghidra' } },
|
|
27
27
|
{ number: 5, text: 'What does XSS stand for in cybersecurity?', category: 'Web Security',
|
|
28
|
-
options: { A: '
|
|
28
|
+
options: { A: 'Cross-Site Scripting', B: 'Extended Security System', C: 'XML Secure Socket', D: 'Cross-Server Sharing' } },
|
|
29
29
|
{ number: 6, text: 'Which type of malware disguises itself as legitimate software?', category: 'Malware',
|
|
30
|
-
options: { A: 'Worm', B: 'Ransomware', C: '
|
|
30
|
+
options: { A: 'Worm', B: 'Ransomware', C: 'Adware', D: 'Trojan' } },
|
|
31
31
|
{ number: 7, text: 'What is the standard port for SSH?', category: 'Network',
|
|
32
|
-
options: { A: '21', B: '
|
|
32
|
+
options: { A: '21', B: '80', C: '22', D: '443' } },
|
|
33
33
|
{ number: 8, text: 'What is a cryptographic hash?', category: 'Cryptography',
|
|
34
34
|
options: { A: 'A reversible encryption key', B: 'A one-way function producing a fixed-size digest', C: 'An authentication protocol', D: 'A type of digital signature' } },
|
|
35
35
|
{ number: 9, text: 'What is two-factor authentication (2FA)?', category: 'Authentication',
|
|
36
|
-
options: { A: '
|
|
36
|
+
options: { A: 'Verifying identity with two distinct types of credentials', B: 'Using two different passwords', C: 'Encrypting data twice', D: 'Connecting through two networks' } },
|
|
37
37
|
{ number: 10, text: 'Which Linux command shows open ports on a system?', category: 'Linux',
|
|
38
|
-
options: { A: 'ls -la', B: '
|
|
38
|
+
options: { A: 'ls -la', B: 'chmod 777', C: 'cat /etc/passwd', D: 'netstat -tulpn' } },
|
|
39
39
|
{ number: 11, text: 'What is a Man-in-the-Middle (MitM) attack?', category: 'Network',
|
|
40
|
-
options: { A: 'Accessing a server without authorization', B: 'Intercepting and modifying communications between two parties',
|
|
40
|
+
options: { A: 'Accessing a server without authorization', B: 'Guessing passwords by brute force', C: 'Intercepting and modifying communications between two parties', D: 'Sending multiple requests to overload a server' } },
|
|
41
41
|
{ number: 12, text: 'What is the principle of least privilege?', category: 'Security',
|
|
42
42
|
options: { A: 'Give root access to all users', B: 'Grant only the permissions necessary to perform a task', C: 'Use the shortest password possible', D: 'Disable all firewalls' } },
|
|
43
43
|
{ number: 13, text: 'Which of the following is a social engineering attack?', category: 'Security',
|
|
44
|
-
options: { A: '
|
|
44
|
+
options: { A: 'Phishing', B: 'Buffer overflow', C: 'SQL Injection', D: 'Port scanning' } },
|
|
45
45
|
{ number: 14, text: 'What is a VPN?', category: 'Network',
|
|
46
|
-
options: { A: 'A type of virus', B: 'A virtual private network that encrypts internet traffic',
|
|
46
|
+
options: { A: 'A type of virus', B: 'A file transfer protocol', C: 'A virtual private network that encrypts internet traffic', D: 'A vulnerability scanner' } },
|
|
47
47
|
{ number: 15, text: 'What is the best practice for storing passwords in a database?', category: 'Security',
|
|
48
|
-
options: { A: 'Plain text', B: 'Encrypted with AES', C: '
|
|
48
|
+
options: { A: 'Plain text', B: 'Encrypted with AES', C: 'Encoded in Base64', D: 'Hashed with salt' } },
|
|
49
49
|
];
|
|
50
50
|
/**
|
|
51
51
|
* Get demo questions translated to user's language.
|