icoa-cli 2.16.16 → 2.16.17

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -12,40 +12,40 @@ export const DEMO_SESSION = {
12
12
  country: 'ALL',
13
13
  };
14
14
  export const DEMO_ANSWERS = {
15
- 1: 'B', 2: 'B', 3: 'C', 4: 'C', 5: 'B', 6: 'C', 7: 'B', 8: 'B',
16
- 9: 'B', 10: 'B', 11: 'B', 12: 'B', 13: 'B', 14: 'B', 15: 'C',
15
+ 1: 'C', 2: 'A', 3: 'D', 4: 'B', 5: 'A', 6: 'D', 7: 'C', 8: 'B',
16
+ 9: 'A', 10: 'D', 11: 'C', 12: 'B', 13: 'A', 14: 'C', 15: 'D',
17
17
  };
18
18
  export const DEMO_QUESTIONS = [
19
19
  { number: 1, text: 'Which algorithm is NOT a symmetric cipher?', category: 'Cryptography',
20
- options: { A: 'AES', B: 'RSA', C: 'DES', D: 'Blowfish' } },
20
+ options: { A: 'AES', B: 'DES', C: 'RSA', D: 'Blowfish' } },
21
21
  { number: 2, text: 'What does SQL injection exploit?', category: 'Web Security',
22
- options: { A: 'Buffer overflow in web server', B: 'Unsanitized user input in database queries', C: 'Weak encryption algorithms', D: 'Misconfigured firewall rules' } },
22
+ options: { A: 'Unsanitized user input in database queries', B: 'Buffer overflow in web server', C: 'Misconfigured firewall rules', D: 'Weak encryption algorithms' } },
23
23
  { number: 3, text: 'Which HTTP status code indicates "Forbidden"?', category: 'Web Security',
24
- options: { A: '401', B: '404', C: '403', D: '500' } },
24
+ options: { A: '401', B: '404', C: '500', D: '403' } },
25
25
  { number: 4, text: 'Which tool is commonly used for network packet capture?', category: 'Network',
26
- options: { A: 'Burp Suite', B: 'Ghidra', C: 'Wireshark', D: 'John the Ripper' } },
26
+ options: { A: 'Burp Suite', B: 'Wireshark', C: 'John the Ripper', D: 'Ghidra' } },
27
27
  { number: 5, text: 'What does XSS stand for in cybersecurity?', category: 'Web Security',
28
- options: { A: 'Extended Security System', B: 'Cross-Site Scripting', C: 'XML Secure Socket', D: 'Cross-Server Sharing' } },
28
+ options: { A: 'Cross-Site Scripting', B: 'Extended Security System', C: 'XML Secure Socket', D: 'Cross-Server Sharing' } },
29
29
  { number: 6, text: 'Which type of malware disguises itself as legitimate software?', category: 'Malware',
30
- options: { A: 'Worm', B: 'Ransomware', C: 'Trojan', D: 'Adware' } },
30
+ options: { A: 'Worm', B: 'Ransomware', C: 'Adware', D: 'Trojan' } },
31
31
  { number: 7, text: 'What is the standard port for SSH?', category: 'Network',
32
- options: { A: '21', B: '22', C: '80', D: '443' } },
32
+ options: { A: '21', B: '80', C: '22', D: '443' } },
33
33
  { number: 8, text: 'What is a cryptographic hash?', category: 'Cryptography',
34
34
  options: { A: 'A reversible encryption key', B: 'A one-way function producing a fixed-size digest', C: 'An authentication protocol', D: 'A type of digital signature' } },
35
35
  { number: 9, text: 'What is two-factor authentication (2FA)?', category: 'Authentication',
36
- options: { A: 'Using two different passwords', B: 'Verifying identity with two distinct types of credentials', C: 'Encrypting data twice', D: 'Connecting through two networks' } },
36
+ options: { A: 'Verifying identity with two distinct types of credentials', B: 'Using two different passwords', C: 'Encrypting data twice', D: 'Connecting through two networks' } },
37
37
  { number: 10, text: 'Which Linux command shows open ports on a system?', category: 'Linux',
38
- options: { A: 'ls -la', B: 'netstat -tulpn', C: 'chmod 777', D: 'cat /etc/passwd' } },
38
+ options: { A: 'ls -la', B: 'chmod 777', C: 'cat /etc/passwd', D: 'netstat -tulpn' } },
39
39
  { number: 11, text: 'What is a Man-in-the-Middle (MitM) attack?', category: 'Network',
40
- options: { A: 'Accessing a server without authorization', B: 'Intercepting and modifying communications between two parties', C: 'Sending multiple requests to overload a server', D: 'Guessing passwords by brute force' } },
40
+ options: { A: 'Accessing a server without authorization', B: 'Guessing passwords by brute force', C: 'Intercepting and modifying communications between two parties', D: 'Sending multiple requests to overload a server' } },
41
41
  { number: 12, text: 'What is the principle of least privilege?', category: 'Security',
42
42
  options: { A: 'Give root access to all users', B: 'Grant only the permissions necessary to perform a task', C: 'Use the shortest password possible', D: 'Disable all firewalls' } },
43
43
  { number: 13, text: 'Which of the following is a social engineering attack?', category: 'Security',
44
- options: { A: 'Buffer overflow', B: 'Phishing', C: 'SQL Injection', D: 'Port scanning' } },
44
+ options: { A: 'Phishing', B: 'Buffer overflow', C: 'SQL Injection', D: 'Port scanning' } },
45
45
  { number: 14, text: 'What is a VPN?', category: 'Network',
46
- options: { A: 'A type of virus', B: 'A virtual private network that encrypts internet traffic', C: 'A file transfer protocol', D: 'A vulnerability scanner' } },
46
+ options: { A: 'A type of virus', B: 'A file transfer protocol', C: 'A virtual private network that encrypts internet traffic', D: 'A vulnerability scanner' } },
47
47
  { number: 15, text: 'What is the best practice for storing passwords in a database?', category: 'Security',
48
- options: { A: 'Plain text', B: 'Encrypted with AES', C: 'Hashed with salt', D: 'Encoded in Base64' } },
48
+ options: { A: 'Plain text', B: 'Encrypted with AES', C: 'Encoded in Base64', D: 'Hashed with salt' } },
49
49
  ];
50
50
  /**
51
51
  * Get demo questions translated to user's language.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "icoa-cli",
3
- "version": "2.16.16",
3
+ "version": "2.16.17",
4
4
  "description": "ICOA CLI — The world's first CLI-native CTF competition terminal",
5
5
  "type": "module",
6
6
  "bin": {