The creation of the DOD as an executive component of the government Is...
Which threat vector is considered more of an annoyance then an attack?
Which vulnerability preventive measure is a small piece of code that...
Which identity management process uses a fingerprint to authenticate a...
What class uses a range of 1-126 in the first octet of an Internet...
What is the maximum amount for minor construction projects that...
Which of the following is the offical source of manpower information...
Which transmission medium is the primary carrier of the voice...
What is the most common wireless networking standard?
What title status must National Guard Guardsmen be in to execute cyber...
Which of the following is a subdivision of programmed cost data...
Within the information enviroment what term describes the advantage,...
What are the two classifications of transport protocols?
Which of the following functions is primarily staffed by Client...
What regulates how much information passes over a Transmission Control...
Who established the necessary controls to ensure periodic inspections...
What are the inclusive dates for Secetary of the Air Force/Chief...
When a person uses his or her position for private or personal gain it...
What device is a series of single-pole, single-throw switches mounted...
A modem is a device that
Which Air Force Specialty Code (AFSC) requires members to pass the Air...
What is the combat information technology (IT) communication support...
Which type of fund covers the cost of relocating facilities?
How many steps are there in Operational Risk Management (ORM)?
Who must provide encryption devices for connection to the Secret...
Supervisors document and maintain completed safety training on
The design of communications network is known as
What Internet Protocol version 4 (IPv4) reserved address is used for...
What kind of network interconnects users with computer resources in...
Which operations center monitors and controls Air Force network access...
Which of the following is not a responsibility of the Air Force Career...
What topology consists of cable segments from each computer connected...
Who serves as the major command (MAJCOM) voting representative during...
Dynamic routing automatically calculated the best path between how...
Who reviews the selections after the board selects the 12 Outstanding...
Which of the following is the highest level in which quarterly awards...
Which application includes tools to help recover lost files and...
The Institute of Electrical and Electronics Engineers (IEEE) divides...
Which of the following is an optional attendee for the Utilization and...
What is used as a starting point to develop the Career Field Education...
What document directs the Communications Focal point key processes?
Where is the Air Force active component manpower planning and...
What kind of network is a group of computers and associated devices...
Which Electronic Warfare capability uses jamming to reduce the...
Who appoints Air Force Portal Content Managers and Content Publishers...
In a connection-oriented protocol, such as Transmission Control...
Which identity anagement process uses a password to authenticate a...
The maximum number of devices a FireWire bus can take is up to
Virtual circuits are established, maintained, and terminated at what...
Which of these lists the fields in the User Datagram Protocol (UDP)...
Which statement is not a goal of Operational Risk Management (ORM)?
What automated Information System (AIS) is used to document actions on...
Which of the following is not an action of the Specialty Training...
Two basic routing activites are determining optimal routing paths and
Which type of cable is associated with the orignal designs of the...
What Internet Protocol version 4 (IPv4) class address is used for...
Which 802.11 standard is designed to operate at both 2.4 Ghz and 5...
Procedures and circumstances for Congress to order units into active...
What topology defines the layout of a network's devices and media?
Which common port contains Hyper Text Transfer Protocol (HTTP) servers...
A workgroup is a simple grouping of how many computers?
How many bits are in an Internet Protocol version 4 (IPv4) address?
What Internet Prototcol version 4 (IPv4) class address is used for...
What systems allow for a commonly understood, maintanable, and...
Which of the following is not a term for Job Safety Analysis?
Which of the following is information not contained in Technical Order...
Routers operate at what Open System Interconnect (OSI) layer?
What Data Link Layer network device logically seperates a single...
At the installation level which office is responsible for program...
What is critical to motigating unintended or undesirable effecs, on...
Which of the following is a true statement about Electronic Warfare...
Who provides accreditation for the Telecommunications Industry...
Special Personnel Evaluations (SPEs) are required on a sampling of Air...
Which of the following is not a mandatory requirement for the...
In-depth information for administering the Government Purchase Card...
Which 802.11 standard has a throughput of 11 Mbps and runs at the 2.4...
The range of well-known port numbers is
Which is not a type of UNIX pathname?
Over a single pair cable, Integrated Services Digital Network (ISDN)...
What system monitoring concept uses log trend analysis of network...
Which of the following is included in the Master Training Plan only if...
The technical solution for a communications and information system...
Who determines if local checklists and/or work cards are required for...
Which of the following is not a responsibility of Government Purchase...
Detailed instructions for submitting a reclama or shortfall request...
Which segment of the utilization and Training Workshop...
What type of encryption is applied to each end of a communications...
What are the three major considerations that apply to Cyberspace...
Insted of using binary, how are the Internet Protocol version 6 (IPv6)...
Which Cyberspace Defense Weapon System sub-dicipline determine the...
Which Supervisory Control and Data Acquisition (SCADA) subsystem...
Who develops standards for Interconnect, Passive and...
Who should endorse the AF Form 673 as the Certifying Offical?
Who provides the formal decelaration that an information system is...
Network switches and bridges operate at what Open System Interconnect...
Recommeneded technical order (TO) changes are required to be submitted...
Which Supervisory Control and Data Acquisition (SCADA) subsystem...
Guidance for awards specific to the Cyber community are found in Air...
Which Intranet Control Weapon System sub-discipline conducts continous...
Which of the following is not a common duty of the Maintenance Data...