0
[{"id":301886,"quiz_id":"15433","answer_id":null,"answerType_id":"0","created_at":"2017-10-16 12:40:33","updated_at":"2017-10-16 12:40:33","questionName":"A disaster hasjust occurred that will change the way a business operates for years to come. Which plan will likely be most useful at this point?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":301897,"quiz_id":"15433","answer_id":null,"answerType_id":"0","created_at":"2017-10-16 12:40:34","updated_at":"2017-10-16 12:40:34","questionName":"In operations security. what type of process would you use to mask or hide the presence of a true signal or drown out meaningful information?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":301891,"quiz_id":"15433","answer_id":null,"answerType_id":"0","created_at":"2017-10-16 12:40:33","updated_at":"2017-10-16 12:40:33","questionName":"DNS spoofing can be used to do which of the following?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":301883,"quiz_id":"15433","answer_id":null,"answerType_id":"0","created_at":"2017-10-16 12:40:33","updated_at":"2017-10-16 12:40:33","questionName":"A BCP is generally broken down into how many phases?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":301892,"quiz_id":"15433","answer_id":null,"answerType_id":"0","created_at":"2017-10-16 12:40:33","updated_at":"2017-10-16 12:40:33","questionName":"During business impact analysis the business continuity program committee must identify threats to the company. All of these are included as threats in risk analysis except which one? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":301896,"quiz_id":"15433","answer_id":null,"answerType_id":"0","created_at":"2017-10-16 12:40:34","updated_at":"2017-10-16 12:40:34","questionName":"In a multiprocessing system, the memory space that is insulated from other concurrently running processes is referred to as what kind of domain?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":301885,"quiz_id":"15433","answer_id":null,"answerType_id":"0","created_at":"2017-10-16 12:40:33","updated_at":"2017-10-16 12:40:33","questionName":"A CISSP must understand memory storage and memory mapping including processes and applications. which type of memory is non-volatile storage?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":301895,"quiz_id":"15433","answer_id":null,"answerType_id":"0","created_at":"2017-10-16 12:40:34","updated_at":"2017-10-16 12:40:34","questionName":"Identify the weakest hardware component in a system for unauthorized data access.","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":301888,"quiz_id":"15433","answer_id":null,"answerType_id":"0","created_at":"2017-10-16 12:40:33","updated_at":"2017-10-16 12:40:33","questionName":"A one-way session is referred to as what type of communication?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":301890,"quiz_id":"15433","answer_id":null,"answerType_id":"0","created_at":"2017-10-16 12:40:33","updated_at":"2017-10-16 12:40:33","questionName":"Data diddling describes which of the following?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":301894,"quiz_id":"15433","answer_id":null,"answerType_id":"0","created_at":"2017-10-16 12:40:33","updated_at":"2017-10-16 12:40:33","questionName":"Fire requires oxygen, heat, and fuel to produce flame. Fire has how many stages?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":301889,"quiz_id":"15433","answer_id":null,"answerType_id":"0","created_at":"2017-10-16 12:40:33","updated_at":"2017-10-16 12:40:33","questionName":"Baseband has how many channels?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":301884,"quiz_id":"15433","answer_id":null,"answerType_id":"0","created_at":"2017-10-16 12:40:33","updated_at":"2017-10-16 12:40:33","questionName":"A chosen plaintext message attack is performed during which application?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":301887,"quiz_id":"15433","answer_id":null,"answerType_id":"0","created_at":"2017-10-16 12:40:33","updated_at":"2017-10-16 12:40:33","questionName":"A one-way hashing algorithm produces a hashing value that cannot be reversed. What does this mean?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":301893,"quiz_id":"15433","answer_id":null,"answerType_id":"0","created_at":"2017-10-16 12:40:33","updated_at":"2017-10-16 12:40:33","questionName":"Financial damages are classified into how many categories? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null}]