1nx51 Vre Questions

100 Questions | Attempts: 1458
Share

SettingsSettingsSettings
1nx51 Vre Questions - Quiz

Questions and Answers
  • 1. 

    (001) Word gets back to the operations center that a coalition aircraft was seen plummeting to earth without a smoke trail.  Someone in the centers says, "Guess the bad guys got those new SAMs."  Without any proof of this, what type of statement is this?

    • A.

      Hypothesis

    • B.

      Mindset

    • C.

      Logic

    • D.

      Bias

    Correct Answer
    A. Hypothesis
  • 2. 

    (002) Which bias is an unconscious belief which influences the act of knowing or making a judgment call?

    • A.

      Cultural bias

    • B.

      Personal bias

    • C.

      Cognitive bias

    • D.

      Organizational bias

    Correct Answer
    C. Cognitive bias
  • 3. 

    (002) Which of the following is a form of patterning by perceiving a similarity between events or things because of superficial features?

    • A.

      Cause and effect

    • B.

      Explanations

    • C.

      Stereotyping

    • D.

      Cultural

    Correct Answer
    C. Stereotyping
  • 4. 

    (003) Observing and building an argument to arrive at a conclusion is using

    • A.

      Reason

    • B.

      Inference

    • C.

      Implication

    • D.

      Common sense

    Correct Answer
    A. Reason
  • 5. 

    (004) If Sheila is Jack's mother and Sylvia is jack's grandmother then Sheila is Sylvia's daughter is what element of reasoning?

    • A.

      Perspective

    • B.

      Perception

    • C.

      Inference

    • D.

      Purpose

    Correct Answer
    C. Inference
  • 6. 

    (004) What type of question requires little to no reasoning?

    • A.

      Fact

    • B.

      Judgment

    • C.

      Suggested

    • D.

      Preference

    Correct Answer
    A. Fact
  • 7. 

    (005) Which intellectual standard is how broad or narrow of a perspective the analyst may have when solving a problem?

    • A.

      Clarity

    • B.

      Breadth

    • C.

      Precision

    • D.

      Relevance

    Correct Answer
    B. Breadth
  • 8. 

    (006) What agency is responsible to the President through the DNI?

    • A.

      CIA

    • B.

      DIA

    • C.

      FBI

    • D.

      NSA

    Correct Answer
    A. CIA
  • 9. 

    (006) Who maintains operational control of all US military forces conducting SIGINT?

    • A.

      CJS

    • B.

      DIRNSA

    • C.

      President

    • D.

      Secretary of Defense

    Correct Answer
    B. DIRNSA
  • 10. 

    (006) The Air Force's service cryptologic element is known as?

    • A.

      AFIC

    • B.

      AFESC

    • C.

      AFISRA

    • D.

      INSCOM

    Correct Answer
    C. AFISRA
  • 11. 

    (006) What extension of NSOC enables commanders to deal with the SIGINT system on a rapid reliable basis?

    • A.

      SCE

    • B.

      CSS

    • C.

      CSG

    • D.

      CSE

    Correct Answer
    C. CSG
  • 12. 

    (006) Who enables US global information superiority in peacetime as well as during hostilities?

    • A.

      NCO

    • B.

      NGA

    • C.

      NRO

    • D.

      NSA

    Correct Answer
    C. NRO
  • 13. 

    (006) A captured enemy ground forces weapon system would likely be exploited by whom?

    • A.

      National Ground Intelligence Center

    • B.

      Army Ground Intelligence Command

    • C.

      United States Ground Defense Agency

    • D.

      Marine Ground-based Intelligence Center

    Correct Answer
    A. National Ground Intelligence Center
  • 14. 

    (006) The lead producer of global maritime intelligence is

    • A.

      CGCG

    • B.

      MCIA

    • C.

      NIWA

    • D.

      ONI

    Correct Answer
    D. ONI
  • 15. 

    (006) The mission of the MCSB is to

    • A.

      Lead maritime homeland security issues

    • B.

      Conduct research into insurgent infiltration

    • C.

      Provide trained and deployable SIGINT Marines

    • D.

      Instruct sailors on undersea acoustic weapons systems

    Correct Answer
    C. Provide trained and deployable SIGINT Marines
  • 16. 

    (007) During an internation incident, a smaller skirmish has flared up.  Which of the following will be created to handle this situation?

    • A.

      Joint Command

    • B.

      Joint Task Force

    • C.

      Coalition Alliance

    • D.

      Unified Command

    Correct Answer
    B. Joint Task Force
  • 17. 

    (007) JTF's may be established on a geographic or functional basis when the mission has a 

    • A.

      Broad range of military operations

    • B.

      Potential for crisis requiring a centralized control

    • C.

      Specific limited objective not requiring centralized control

    • D.

      Requirement for intelligence that is greater than in a Unified Command

    Correct Answer
    C. Specific limited objective not requiring centralized control
  • 18. 

    (007) How many MAJCOMS are there in the USAF?

    • A.

      25

    • B.

      20

    • C.

      15

    • D.

      10

    Correct Answer
    D. 10
  • 19. 

    (007) Which of the following are the most predominant forces within a coalition force?

    • A.

      UN forces

    • B.

      US forces

    • C.

      Host nation forces

    • D.

      Intelligence forces

    Correct Answer
    B. US forces
  • 20. 

    (008) Which discipline exploits the adversary's communications, revealing their intentions?

    • A.

      IMINT

    • B.

      ELINT

    • C.

      MASINT

    • D.

      COMINT

    Correct Answer
    D. COMINT
  • 21. 

    (008) SrA Snuffy is searching the internet for publicly available information that would fall under which of the following intelligence discipline?

    • A.

      COMINT

    • B.

      FISINT

    • C.

      OSINT

    • D.

      ELINT

    Correct Answer
    C. OSINT
  • 22. 

    (008) Which intelligence discipline provides a valuable source of information for automated planning systems and precision guided munitions?

    • A.

      FISINT

    • B.

      OSINT

    • C.

      GEOINT

    • D.

      HUMINT

    Correct Answer
    C. GEOINT
  • 23. 

    (008) What can be used to monitor potential adversary technical developments and deployments, as well as emerging weapons of mass destruction (WMD) threats?

    • A.

      TECHELINT

    • B.

      HUMINT

    • C.

      COMINT

    • D.

      MASINT

    Correct Answer
    D. MASINT
  • 24. 

    (008) Which intelligence discipline's collections methods would include gathering documents and other information from closed arms proliferation talks?

    • A.

      ELINT

    • B.

      COMINT

    • C.

      HUMINT

    • D.

      Open source

    Correct Answer
    C. HUMINT
  • 25. 

    (008) The 1N3X1 specialty deals with what?

    • A.

      Imagery

    • B.

      Electronic signals

    • C.

      Foreign languages

    • D.

      Communications structures

    Correct Answer
    C. Foreign languages
  • 26. 

    (009) Which security program seeks to prevent adversaries from taking advantage of unclassified information?

    • A.

      Oversight program

    • B.

      Personal security

    • C.

      COMSEC

    • D.

      OPSEC

    Correct Answer
    D. OPSEC
  • 27. 

    (009) Information concerning or derived from intelligence sources, methods, or analytical processes which is required to be handled exclusively within formal access control systems is called?

    • A.

      Special Connections Intelligence

    • B.

      Susceptible Classified Information

    • C.

      Unique Communications Information

    • D.

      Sensitive Compartmented Information

    Correct Answer
    D. Sensitive Compartmented Information
  • 28. 

    (009) The act of classifying a specific item of information on the basis that an original classification decision has already been made by an authorized OCA is known as what?

    • A.

      Derivative classification

    • B.

      Imitative classification

    • C.

      Reduxed classification

    • D.

      Copied classification

    Correct Answer
    A. Derivative classification
  • 29. 

    (009) Which of the following documents is the standard for classifying information in the IC?

    • A.

      TITLE 32

    • B.

      EO 12333

    • C.

      EO 12958

    • D.

      AFMAN 14-304

    Correct Answer
    C. EO 12958
  • 30. 

    (009) There is a new safe in the work center.  When should the combination be changed?

    • A.

      Immediately

    • B.

      After 6 months

    • C.

      After 24 months

    • D.

      When material normally stored within the safe or container is accounted for

    Correct Answer
    A. Immediately
  • 31. 

    (009) A temporary working area will not be used to store SCI and will not be used in excess of

    • A.

      40 hours per week

    • B.

      50 hours per week

    • C.

      40 hours per month

    • D.

      50 hours per month

    Correct Answer
    C. 40 hours per month
  • 32. 

    (009) In regards to recording the destruction of classified material, how many witnesses must sign the paperwork?

    • A.

      2 for Secret, 3 for Top Secret

    • B.

      2 for Secret, 2 for Top Secret

    • C.

      1 for Secret, 2 for Top Secret

    • D.

      1 for Secret, 1 for Top Secret

    Correct Answer
    C. 1 for Secret, 2 for Top Secret
  • 33. 

    (010) Good physical health and what can prevent muscle strain and increase movement?

    • A.

      Jogging

    • B.

      Nutrition

    • C.

      Stretching

    • D.

      Relaxation

    Correct Answer
    C. Stretching
  • 34. 

    (010) For proper lifting technique where should you bend your body?

    • A.

      At your knees

    • B.

      At your waist

    • C.

      At your neck

    • D.

      At your back

    Correct Answer
    A. At your knees
  • 35. 

    (010) At a properly configured work station, the top of the monitor should be

    • A.

      Even with eye level

    • B.

      Slightly above eye level

    • C.

      Slightly below eye level

    • D.

      Within 12 inches of the eye

    Correct Answer
    C. Slightly below eye level
  • 36. 

    (010) To avoid eye fatigue, every _______ minutes you should take your eyes off the monitor and focus them on another object at least ______ feet away.

    • A.

      20; 25

    • B.

      20; 30

    • C.

      30; 20

    • D.

      30; 25

    Correct Answer
    A. 20; 25
  • 37. 

    (011) Which term is one of the three integrated employment capabilities of IO?

    • A.

      Impact operations

    • B.

      Sustainable operations

    • C.

      Network warfare operations

    • D.

      Offensive warfare operations

    Correct Answer
    C. Network warfare operations
  • 38. 

    (012) This capability is designed to affect behaviors, protect operations, communicate commander's intent and project accurate information to achieve desired effects across the cognitive domain.

    • A.

      Information Operations

    • B.

      Information Superiority

    • C.

      Influence Operations

    • D.

      Influence Superiority

    Correct Answer
    C. Influence Operations
  • 39. 

    (012) Which domain is considered the area of human action which pertains to mental processes such as intellectual, learning, and problem solving?

    • A.

      Affective

    • B.

      Cognitive

    • C.

      Intelligent

    • D.

      Psychomotor

    Correct Answer
    B. Cognitive
  • 40. 

    (012) This operation is information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted by or on behalf of foreign governments or elements thereof, foreign organizations, or foreign persons or international terrorist activies?

    • A.

      Counterintelligence

    • B.

      Counterpropaganda

    • C.

      Military deception

    • D.

      Psychological

    Correct Answer
    A. Counterintelligence
  • 41. 

    (012) Which AF organization supports influence operations through CI that is designed to detect, destroy, neutralize, exploit or prevent espionage activities through identification, manipulation, deception, or repression of the adversary?

    • A.

      Anti-terrorism Force Protection Office

    • B.

      Office of Special Investigations

    • C.

      Security Forces

    • D.

      Public Affairs

    Correct Answer
    B. Office of Special Investigations
  • 42. 

    (013) This is the collecting of electromagnetic data for immediate tactical applications.

    • A.

      Electronic attack

    • B.

      Electronic denial

    • C.

      Electronic protection

    • D.

      Electronic warfare support

    Correct Answer
    D. Electronic warfare support
  • 43. 

    (014) Airmen on computer networks have determined and reported to their commander the apparent intrusion of the AF networks by a known hacker and appropriate countermeasures are taken.  This is an example of

    • A.

      Net A

    • B.

      Net D

    • C.

      NS

    • D.

      NW

    Correct Answer
    B. Net D
  • 44. 

    Which NW Ops activity requires close coordination with signals intelligence collection, processing, exploitation, and dissemination?

    • A.

      Net A

    • B.

      Net D

    • C.

      NS

    • D.

      NW

    Correct Answer
    C. NS
  • 45. 

    (015) This is a critical function that helps provide the commander the situational and battle space awareness necessary to successfully plan and conduct operations.

    • A.

      IA

    • B.

      ICE

    • C.

      ISR

    • D.

      PNT

    Correct Answer
    C. ISR
  • 46. 

    (015) What encompasses information assurance, system and network management, and information dissemination management?

    • A.

      ICE

    • B.

      ISR

    • C.

      Net A

    • D.

      Net Ops

    Correct Answer
    D. Net Ops
  • 47. 

    (016) What type of operation may be employed during the pre-conflict phase of information operations?

    • A.

      Broadcasting deceiving information into the enemy's territory

    • B.

      Deploying Special Forces to disable their electricity grid

    • C.

      Kinetic strikes against their infrastructure

    • D.

      Assassinating their lower level leaders

    Correct Answer
    A. Broadcasting deceiving information into the enemy's territory
  • 48. 

    (017) There are _________ phases of the intelligence cycle.

    • A.

      Four

    • B.

      Five

    • C.

      Nine

    • D.

      Six

    Correct Answer
    D. Six
  • 49. 

    (017) Embedded at the air component command level, an Airman working here would provide a supported commander critical interaction with NSA.

    • A.

      AFISRA

    • B.

      AFNTI

    • C.

      AFMC

    • D.

      AFGSC

    Correct Answer
    B. AFNTI
  • 50. 

    (018) An aircraft performing surveillance against a target while in international airspace is employing what technique to gather information?

    • A.

      Using spies

    • B.

      The internet

    • C.

      Standoff techniques

    • D.

      Penetration of hostile airspace

    Correct Answer
    C. Standoff techniques

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 31, 2013
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 20, 2011
    Quiz Created by
    Slim82x
Back to Top Back to top
Advertisement