0
[{"id":35072,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:19:52","updated_at":"2016-02-20 15:47:03","questionName":"Standard addresses the specification of minimum security requirements for federal information and information systems.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":3,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35082,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:31:45","updated_at":"2016-02-20 15:47:03","questionName":"This standard specifies algorithms for applications requiring digital signature, rather than written signature.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":7,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35086,"quiz_id":"3187","answer_id":null,"answerType_id":"2","created_at":"2016-02-20 15:46:46","updated_at":"2016-02-20 15:47:03","questionName":"In FIPS PUB 140-2 there are four levels of security. Match the level with the appropriate definition.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":10,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35077,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:26:20","updated_at":"2016-02-20 15:47:03","questionName":"Standard specifying an algorithm for applications requiring message authentication via construction of a message authentication code (MAC)","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":5,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35067,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:15:20","updated_at":"2016-02-20 15:47:03","questionName":"The standard is applicable to identification issued by Federal departments and agencies to Federal employees and contractors for gaining physical access to Federally controlled facilities and logical access to Federally controlled information systems, except for \"national security systems\".","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":2,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35084,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:34:53","updated_at":"2016-02-20 15:47:03","questionName":"This standard specifies secure hash algorithms for computing a condensed representation of electronic data (message).","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":8,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35063,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:06:18","updated_at":"2016-02-20 15:47:03","questionName":"Hash functions are components for many important security applications. Which is not one of the components below?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":0,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35085,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:38:31","updated_at":"2016-02-20 15:47:03","questionName":"This standard specifies the security requirements within a security system protecting sensitive but unclassified information.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":9,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35075,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:23:22","updated_at":"2016-02-20 15:47:03","questionName":"Develops standards for categorizing information and information systems.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":4,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35065,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:10:11","updated_at":"2016-02-20 15:47:03","questionName":"Is based on an instance of the KECCAK algorithm, two cryptographic hash functions and two extendable-output functions (XOF)","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":1,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35080,"quiz_id":"3187","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 15:29:20","updated_at":"2016-02-20 15:47:03","questionName":"Specifies the FIPS approved cryptographic algorithm that can be used to protect electronic data.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":6,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null}]