0
[{"id":417250,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"A cloud computing infrastructure type where applications are hosted over a network (typically Internet) eliminating the need to install and run the software on the customer's own computers is known as ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":24,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417238,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-05-09 13:37:11","questionName":"As part of SDLC, a third party is hired to perform a penetration test. The third party will have access to the source code, integration tests, and network diagrams. Which of the following BEST describes the assessment being performed? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":15,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417246,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"The term trusted OS refers to an operating system ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":20,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417254,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:03:40","questionName":"Which of the following occurs when the security of a web application relies on JavaScript for input validation?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":29,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417248,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"The practice of finding vulnerabilities in an application by feeding it incorrect input is referred to as ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":22,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417247,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"Which of the answers listed below refers to a control system providing the capability for realtime monitoring and gathering information related to industrial equipment?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":21,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417240,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-05-09 13:37:11","questionName":"A workstation puts out a network request to locate another system. Joe, a hacker on the network, responds before the real system does, and he tricks the workstation into communicating with him. Which of the following BEST describes what occurred? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":16,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417253,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"Which of the following types of cloud infrastructure would allow several organizations with similar structures and interests to realize the benefits of shared storage and resources? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":27,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417252,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:03:40","questionName":"Which of the following cloud services would provide the best solution for a web developer intending to create a web app? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":28,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417251,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"In which of the cloud computing infrastructure types, clients, instead of buying all the hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":25,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417255,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:03:40","questionName":"When considering a third-party cloud service provider, which of the following criteria would be the BEST to include in the security assessment process? (Select TWO). ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":26,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417244,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"What is the name of a technology that allows for storing passwords, certificates, or encryption keys in a hardware chip? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":18,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417242,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-05-09 13:37:11","questionName":"Which of the terms listed below refers to a mobile device's capability to share its Internet connection with other devices? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":19,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417249,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"A software application used to manage multiple guest operating systems on a single host system is called ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":23,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417241,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-05-09 13:37:11","questionName":"An operating system security feature that ensures safe memory usage by applications is known as ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":17,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null}]