N
NEXUSCORP
ALERT
5

Secure the Server

Round 5 of 5

MISSION BRIEFING

We've located the threat: Server NX-7042 in the Underground Server Vault (Room F-12) has been compromised through a firmware vulnerability. NEXUS security has released an emergency patch to close the exploit. Your mission is to apply the correct security patch through the NEXUS Control Panel. The control panel requires four things: the server ID, the correct patch ID, an authorization code, and a written justification. According to NEXUS patching procedures, the authorization code follows the format [Badge Number]-[Room Code]. The badge number must belong to an employee with access to the facility where the server is located, and the room code is the facility identifier.

OBJECTIVE

Apply the correct security patch to Server NX-7042. You need to: (1) Look up the server to find its type and firmware version, (2) Search available patches to find the one that matches, (3) Construct the authorization code from the employee's badge number and room code, (4) Submit the patch request.

HINTS

Use these if you get stuck

  • [1]First check the server's firmware version and system type — you'll need both to find the right patch.
  • [2]The patches endpoint lets you filter by systemType and targetFirmware.
  • [3]The auth code format is [Badge Number]-[Room Code]. For example: BDG-1234-A01.
  • [4]Look up the employee who booked the room to find their badge number.

AVAILABLE ENDPOINTS

GET/api/systems/{id}

Get server status, firmware version, and access history.

PARAMETERS

NameTypeRequiredDescription
idstringyesServer ID — path parameter

EXAMPLE RESPONSE

{
  "id": "NX-7042",
  "name": "Critical Infrastructure Node",
  "location": "F-12",
  "type": "compute",
  "firmwareVersion": "3.2.1",
  "status": "online"
}
GET/api/systems/patches

List available security patches. Filter by severity, system type, or target firmware version.

PARAMETERS

NameTypeRequiredDescription
severitystringnoFilter by severity: 'critical', 'high', 'medium', 'low'
systemTypestringnoFilter by target system type: 'compute', 'storage', 'network', 'backup'
targetFirmwarestringnoFilter by target firmware version (e.g., '3.2.1')

EXAMPLE RESPONSE

{
  "data": [
    {
      "id": "PATCH-2045-0312",
      "name": "Compute Firmware Security Update",
      "severity": "critical",
      "targetSystemType": "compute",
      "targetFirmware": "3.2.1",
      "patchedFirmware": "3.4.0",
      "status": "available"
    }
  ],
  "total": 1
}
GET/api/employees/{id}

Get employee profile including badge number.

PARAMETERS

NameTypeRequiredDescription
idstringyesEmployee ID — path parameter

EXAMPLE RESPONSE

{
  "id": "EMP-023",
  "name": "Marcus Chen",
  "badgeNumber": "BDG-2847"
}
GET/api/facilities/rooms/{id}

Get room details.

PARAMETERS

NameTypeRequiredDescription
idstringyesRoom ID — path parameter

EXAMPLE RESPONSE

{
  "id": "F-12",
  "name": "Underground Server Vault"
}
POST/api/systems/control

Apply a security patch to a server. Requires valid patch ID and authorization code.

PARAMETERS

NameTypeRequiredDescription
serverIdstringyesThe server ID to patch (e.g., NX-7042)
patchIdstringyesThe patch ID to apply (e.g., PATCH-2045-0312)
authCodestringyesAuthorization code in format [Badge Number]-[Room Code]
justificationstringyesWritten justification for applying the patch

EXAMPLE RESPONSE

{
  "success": true,
  "message": "Security patch applied successfully.",
  "serverId": "NX-7042",
  "patchId": "PATCH-2045-0312",
  "action": "security-patch",
  "timestamp": "2045-03-17T03:00:00Z"
}