0
[{"id":417250,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"A cloud computing infrastructure type where applications are hosted over a network (typically Internet) eliminating the need to install and run the software on the customer's own computers is known as ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":24,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417254,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:03:40","questionName":"Which of the following occurs when the security of a web application relies on JavaScript for input validation?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":29,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417242,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-05-09 13:37:11","questionName":"Which of the terms listed below refers to a mobile device's capability to share its Internet connection with other devices? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":19,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417244,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"What is the name of a technology that allows for storing passwords, certificates, or encryption keys in a hardware chip? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":18,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417238,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-05-09 13:37:11","questionName":"As part of SDLC, a third party is hired to perform a penetration test. The third party will have access to the source code, integration tests, and network diagrams. Which of the following BEST describes the assessment being performed? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":15,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417247,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"Which of the answers listed below refers to a control system providing the capability for realtime monitoring and gathering information related to industrial equipment?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":21,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417253,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"Which of the following types of cloud infrastructure would allow several organizations with similar structures and interests to realize the benefits of shared storage and resources? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":27,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417252,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:03:40","questionName":"Which of the following cloud services would provide the best solution for a web developer intending to create a web app? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":28,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417246,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"The term trusted OS refers to an operating system ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":20,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417240,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-05-09 13:37:11","questionName":"A workstation puts out a network request to locate another system. Joe, a hacker on the network, responds before the real system does, and he tricks the workstation into communicating with him. Which of the following BEST describes what occurred? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":16,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417251,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"In which of the cloud computing infrastructure types, clients, instead of buying all the hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":25,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417248,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"The practice of finding vulnerabilities in an application by feeding it incorrect input is referred to as ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":22,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417241,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-05-09 13:37:11","questionName":"An operating system security feature that ensures safe memory usage by applications is known as ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":17,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417249,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"A software application used to manage multiple guest operating systems on a single host system is called ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":23,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417255,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:03:40","questionName":"When considering a third-party cloud service provider, which of the following criteria would be the BEST to include in the security assessment process? (Select TWO). ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":26,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null}]