1.
(001) The Cyber Surety journeyman monitors all of the following programs except
A. 
Communications security (COMSEC).
B. 
Computer security (COMPUSEC).
C. 
Information security (INFOSEC).
D. 
Emissions security (EMSEC).
2.
(002) What is the fourth step in the operational risk management (ORM) process?
A. 
Analyze controls and implement strategies to reduce or eliminate risk.
B. 
Make decisions based on overall cost versus benefit.
C. 
Develop and apply implementation strategies.
D. 
3.
(002) What minimum milli-ampere current can be lethal?
A. 
B. 
C. 
D. 
4.
(003) Which type of network typically provides wireless broadband data services?
A. 
B. 
Wireless local area network (WLAN).
C. 
Wireless wide area network (WWAN).
D. 
Wireless metropolitan area network (WMAN).
5.
(003) To use VPN products, obtain interim approval from?
A. 
Services and Integration Division (SAF/XC).
B. 
Air Force Virtual Private Network (AF VPN).
C. 
AFNIC Architecture and Analysis Flight (EAC).
D. 
AFNIC Network Infrastructure Flight (ECN).
6.
(004) Which bound media has a core surrounded by cladding and a second layer surrounded by
glass or plastic?
A. 
B. 
C. 
D. 
7.
(005) In which network does every device have exactly two neighbors?
A. 
B. 
C. 
D. 
8.
(005) Which network integrates multiple topologies?
A. 
B. 
C. 
D. 
9.
(006) Which class of internet protocol addresses is used for very large networks?
A. 
B. 
C. 
D. 
10.
(007) Which protocol has the job of verifying the correct delivery of data from client to server?
A. 
Dynamic host configuration protocol (DHCP).
B. 
Transmission control protocol (TCP).
C. 
Hypertext transfer protocol (HTTP).
D. 
11.
(007) Which protocol is an Internet Engineering Task Force (IETF) standard designed to reduce
the administration burden and complexity of configuring hosts on a TCP/IP-based network?
A. 
B. 
Hypertext transfer protocol (HTTP).
C. 
Transmission control protocol (TCP).
D. 
Dynamic host configuration protocol (DHCP).
12.
(008) As the migration to internet protocol (IP) V6 continues, many organizations rely upon what
to compensate for the lack of usable IP addresses?
A. 
B. 
C. 
D. 
Classless Inter-Domain Routing.
13.
(008) The sequence of leading bits in an internet protocol used to identify the network portion of
an IP address is called?
A. 
B. 
C. 
D. 
14.
(009) Breaking down the packets’ addresses to act as a gateway to allow traffic to pass between
networks involves which transition technology?
A. 
B. 
C. 
D. 
15.
(009) Setting up a secure point-to-point communication is called
A. 
B. 
C. 
D. 
16.
(010) Networked resources must be consistently monitored and controlled to ensure access to the
network while
A. 
Keeping complete and accurate documentation for all configuration changes.
B. 
Minimizing risks posed by various cyberspace threats
C. 
Creating continuity throughout the network.
D. 
Installing all applicable security patches.
17.
(010) To make it possible for replacement administrators to accomplish the same tasks as their
predecessors, administrators must be in the habit of
A. 
Keeping complete and accurate documentation for all configuration changes.
B. 
Minimizing risks posed by various cyberspace threats.
C. 
Creating continuity throughout the network.
D. 
Installing all applicable security patches.
18.
(011) When coupled with standardized network policy, the standard desktop configuration (SDC)
substantially
A. 
Reduces the number of network users with administrative privileges.
B. 
Achieves near end-to-end command and control capability.
C. 
Guards against the insider threat.
D. 
Improves network security.
19.
(011) With the consolidation of the several Network Operations and Security Centers (NOSC),
the Air Force
A. 
Reduces the number of network users with administrative privileges.
B. 
Achieves near end-to-end command and control capability.
C. 
Guards against the insider threat.
D. 
Improves network security.
20.
(012) Which WiFi standard is the slowest yet least expensive?
A. 
B. 
C. 
D. 
21.
(012) Which wireless standard originally intended to create a wireless security platform that
would perform as securely as a traditional wired network by providing data encryption?
A. 
WiFi protected access (WPA).
B. 
Wireless local area network (WLAN).
C. 
Wireless wide area network (WWAN).
D. 
Wired equivalency privacy (WEP).
22.
(013) What shall be assigned to all Department of Defense information systems that is directly
associated with the importance of the information contained relative to achieving DOD goals and
objectives?
A. 
Mission assurance category.
B. 
C. 
D. 
23.
(013) Requirements for availability and integrity are associated with
A. 
Information classification.
B. 
C. 
D. 
24.
(014) Who is responsible for verifying proper security clearances and background investigation
checks prior to granting a network user access to the Air Force Provisioned Portion of the Global
Information Grid (AF GIG)?
A. 
Information assurance officer (IAO) only.
B. 
IAO and security manager.
C. 
Information assurance officer.
D. 
25.
(014) Initial information assurance (IA) awareness training for all network users ensures all of the
following except that users
A. 
Are aware of their role in IA.
B. 
Are trained on network security.
C. 
Have met investigative requirements.
D. 
Have satisfied network access requirements.