1.
The Cyber T hec The Cyber Surety journeyman monitors all of the following programs except
A. 
Emission security (EMSEC)
B. 
Information security (INFOSEC)
C. 
Computer security (COMPUSEC)
D. 
Communications security (COMSEC)
2.
What is the fourth step in the operational risk management (ORM) process?
A. 
B. 
Develop and apply implementation strategies.
C. 
Make decisions based on overall cost versus benefit.
D. 
Analyze control and implement strategies to reduce or eliminate risk.
3.
What minimum milli-ampere current can be lethal?
A. 
B. 
C. 
D. 
4.
Which type of network typically provides wireless broadband data services?
A. 
Wireless metropolitan area network (WMAN)
B. 
Wireless wide area network (WWAN)
C. 
Wireless local area network (WLAN)
D. 
5.
To use VPN products, obtain interim approval from?
A. 
AFNIC Network Infrastructure Flight (ECN)
B. 
AFNIC Architecture and Analysis Flight (EAC)
C. 
Air Force Virtual Privet Network (AF VPN)
D. 
Services and Integration Division (SAF/XC)
6.
Which bound media has a core surrounded by cladding and a second layer surrounded by glass or plastic?
A. 
B. 
C. 
D. 
7.
In which network does every device have exactly two neighbors?
A. 
B. 
C. 
D. 
8.
Which network integrates multiple topologies?
A. 
B. 
C. 
D. 
9.
Which class of internet protocols addresses in used for very large networks?
A. 
B. 
C. 
D. 
10.
Which protocol has the job of verifiying the correct delivery of data from client to server?
A. 
Dynamic host configuration protocol (DHCP)
B. 
Transmission control protocol (TCP)
C. 
Hypertext transfer protocol (HTTP)
D. 
11.
Which protocol is an Internet Engineering Task Force (IETF) standard designed to reduce the administration burden and complexity of configuring hosts on a TCP/IP-base network?
A. 
B. 
Hypertext transfer protocol (HTTP)
C. 
Transmission control protocol (TCP)
D. 
Dynamic host configuration protocol (DHCP)
12.
As the migration to internet protocol (IP) V6 continues, many organizations rely upon what to compensate for the lack of usable IP addresses?
A. 
B. 
C. 
D. 
Classless Inter-Domain Routing
13.
The sequences of leading bits in an internet protocol used to identify the network portion of an an IP address is called?
A. 
B. 
C. 
D. 
14.
Breaking down the packets' addresses to act as a gateway to allow traffic to pass between networks involves which transition technology?
A. 
B. 
C. 
D. 
15.
Setting up a secure point-to-point communication is called
A. 
B. 
C. 
D. 
16.
Networked resources must be consistently monitored and controlled to ensure access to the network while
A. 
Keeping complete and accurate documentation for all configuration changes.
B. 
Minimizing risks posed by various cyberspace threats.
C. 
Creating continuity throughout the network.
D. 
Installing all applicable security patches.
17.
To make it possible for replacement administrators to accomplish the same tasks as their predecessor, administrators must be in the habit of
A. 
Keeping complete and accurate documentation for all configuration changes.
B. 
Minimizing risks posed by various cyberspace threats.
C. 
Creating continuity throughout the network.
D. 
Installing all applicable security patches.
18.
When coupled with standardized network policy, the standard desktop configuration (SDC) substantially
A. 
Reduces the number of network users with administrative privileges.
B. 
Achieves near end-to-end command and control capability.
C. 
Guards against the insider threat.
D. 
Improves network security.
19.
With the consolidation of the several Network Operations and Security Centers (NOSC), the Air Force
A. 
Reduce the number of network users with administrative privileges.
B. 
Achieves near end-to-end command and control capability.
C. 
Guard against the insider threat.
D. 
Improves network security.
20.
Which WiFi standard is the slowest yet least expensive?
A. 
B. 
C. 
D. 
21.
Which wireless standard originally intended to create a wireless security platform that would perform as securely as a traditional wired network by providing data encryption?
A. 
WiFi protected access (WPA)
B. 
Wireless local area network (WLAN)
C. 
Wireless wide area network (WWAN)
D. 
Wired equivalency privacy (WEP)
22.
What shall be assigned to all Department of Defense information systems that is directly associated with the importance of the information contained relative to achieving DOD goals and objectives?
A. 
Mission assurance category.
B. 
C. 
D. 
23.
Requirements for availability and integrity are associated with
A. 
Information classification
B. 
C. 
D. 
24.
Who is responsible for verifying proper security clearances and background investigation checks prior to granting a network user access to the Air Force Provisioned Portion of the Global Information Grid (AF GIG)?
A. 
Information assurance officer (IAO) only
B. 
IAO and security manager.
C. 
Have met investigative requirements
D. 
Have satisfied network access requirements.
25.
Initial information assurance (IA) awareness training for all network users ensures all of the following except the users
A. 
Are aware of their role in IA.
B. 
Are trained on network security.
C. 
Have met investigative requirements.
D. 
Have satisfied network access requirements.