0
[{"id":35635,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:40:07","updated_at":"2016-03-12 19:02:25","questionName":"What type of cryptanalytic attack where an adversary has the least amount of information to work with?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":8,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35639,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:43:49","updated_at":"2016-03-12 19:02:25","questionName":"Which of the following characteristics is not of a good stream cipher?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":12,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35636,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:41:34","updated_at":"2016-03-12 19:02:25","questionName":"What determines the assignment of data classifications in a mandatory access control (MAC) philosophy?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":9,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":36372,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-24 00:51:02","updated_at":"2016-03-12 19:02:25","questionName":"Which key concept is Referential Integrity Constraint associated with?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":1,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35638,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:43:03","updated_at":"2016-03-12 19:02:25","questionName":"Which of the following is the primary goal of a security awareness program?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":11,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35640,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:44:41","updated_at":"2016-03-12 19:02:25","questionName":"When engaging an external contractor for a software development project, source code escrow can be used to protect against\u2026?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":13,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35641,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:45:22","updated_at":"2016-03-12 19:02:25","questionName":"Which of the followings is an example of simple substitution algorithm?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":14,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35631,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:36:20","updated_at":"2016-03-12 19:02:25","questionName":"A system security engineer is evaluation methods to store user passwords in an information system, so what may be the best method to store user passwords and meeting the confidentiality security objective?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":4,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35633,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:38:04","updated_at":"2016-03-12 19:02:25","questionName":"Company X is planning to implement rule based access control mechanism for controlling access to its information assets, what type of access control is this usually related to?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":6,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35637,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:42:07","updated_at":"2016-03-12 19:02:25","questionName":"A type cryptographic attack where it is based on the probability of two different messages using the same hash function to produce the same message digest is?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":10,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35629,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:34:04","updated_at":"2016-03-12 19:02:25","questionName":"As an information systems security professional, what is the highest amount would you recommend to a corporation to invest annually on a countermeasure for protecting their assets valued at $1 million from a potential threat that has an annualized rate of occurrence (ARO) of once every five years and an exposure factor (EF) of 10%","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":2,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35634,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:38:49","updated_at":"2016-03-12 19:02:25","questionName":"In the Common Criteria Evaluation and Validation Scheme (CCEVS), requirements for future products are defined by:","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":7,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35630,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:35:11","updated_at":"2016-03-12 19:02:25","questionName":"In a typical information security program, what is the primary responsibility of information (data) owner?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":3,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":36371,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-24 00:49:19","updated_at":"2016-03-12 19:02:25","questionName":"If a relation refers to a key attribute of a different or same relation, then that key element must exist.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":0,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35632,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:36:59","updated_at":"2016-03-12 19:02:25","questionName":"What is the inverse of confidentiality, integrity, and availability (C.I.A.) triad in risk management?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":5,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null}]