[{"id":153,"title":"Intrusion detection","votes":2,"type":"x","order":2,"pct":13.33,"resources":[]},{"id":154,"title":"Penetration testing","votes":4,"type":"x","order":3,"pct":26.67,"resources":[]},{"id":155,"title":"Reverse engineering ","votes":2,"type":"x","order":4,"pct":13.33,"resources":[]},{"id":157,"title":"More than one of these options","votes":7,"type":"x","order":4,"pct":46.67,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350