(201) What is a formal set of rules and conventions that govern how...
(203) Which network protocol has the Department of Defense chosen as...
(207) The ability to move about without being tethered by wires...
(212) What do routing algorithms initialize and maintain to aid the...
(215) The path between the operating system and virtually all hardware...
(215) What are two anti-virus programs that the Air Force uses?
(217) What was the first disk operating system developed to operate on...
(217) What directory is always identified by the slash symbol (/) and...
(223) What concerns slowed the military's adoption of wireless...
(225) While you are using the Red Switch, what feature lets you know...
(228) Which of the following security programs is defined as a process...
(001) Which 3D Air Force Speciality (AFS) responsibility includes...
(002) What is the main goal of the utilization and training...
(012) Which Air Force Portal feature enables authorized users to enter...
(012) Which Air Force Portal feature provides...
(013) When corresponding to an e-mail, which would...
(014) Records that are considered to be in draft format
(018) A comprehensive term that specifies the destruction, salvage,...
(019) The proper way we destroy records to prevent compromise is...
(023) A remotely piloted or self-piloted aircraft that can carry...
(039) What function provides the Department of Defense (DOD) with the...
(202) What topology defines the layout of a network's devices and...
(202) What topology consists of cable segments from each computer...
(202) What topology combines two or more different physical topologies...
(207) Which of the following is not one of the three...
(212) What layer of the open system interconnection model do routers...
(230) Which form is used as a visitor register log to record visitors...
(005) Offensive operations support United States cyberspace objectives...
(007) Which center is typically aligned under the base...
(010) In what year did the Air Force finalized and published its...
(011) What provides us with the transmission of analog or digital bits...
(014) Which document is not considered an official...
(018) What authorization generates a file disposition control label...
(025) Which system asset can be tasked to provide liaison, control...
(036) Which system capitalizes on the popular commercial direct...
(213) The classification of a fill device is
(019) For which exception will federal records centers...
(025) Which system provides the capability to identify, sequence, and...
(037) Which system is a USAF program supporting Global, Defense...
(207) Which of the following is not one of the four security threats...
(210) This type of bridge is used to convert one Data Link layer...
(024) Which component of theater deployable communications (TDC) is a...
(202) What topology consists of devices connected to a common, shared...
(205) Instead of using binary, how are IPv4 addresses expressed to be...
(205) Using a range of 1-136 in the first octet of an IPv4 address,...
(204) What type of network makes use of tunneling and security...
(207) Which landline transmission medium is the primary carrier of...
(210) What rule establishes the percent of data that should be local...
(211) What is the method called when the entire frame is received and...
(215) Which one is not a category of the operating...
(231) Final reports of a communication security incident are due
(232) Which applied discipline applies measures and controls to...
(001) Which 3D Air Force Speciality (AFS) responsibilities include the...
(009) Which document is used as the basis for drafting and enforcing...
(009) Which document serves as the basis for holding military members...
(011) What tool provides essential online resources for the Air...
(011) What tool is considered a key enabler for the...
(017) Marking the records for filing is considered which step of file...
(024) Which theater deployable communications (TDC) equipment...
(203) What Transmission Control Protocol/Internet Protocol transport...
(205) What is the default classful subnet mask on class B networks?
(207) Who is an authorized client that may unknowingly or maliciously...
(217) What is the name of the standard all-purpose shell most commonly...
(227) The Global Positioning System program is responsible for...
(233) What best describes an unintended signals or noise...
(001) Which 3D Air Force Specialty (AFS) focuses its attention on the...
(003) From which of the following can a person absorb selectively...
(004) Which occupational risk management (ORM) principle requests you...
(014) Records that are considered to be in final format have...
(017) The primary purpose for maintaining records is to ensure
(033) Which system was originally designed as...
(007) Which center has the overall authoritative source for...
(021) Which function is a state-of-the-art ground-to-ground...
(024) Which theater deployable communications (TDC) equipment...
(038) Which system provides the ability to rapidly detect and identify...
(201) At what Open System Interconnect layer do routers operate?
(202) What topology defines the way in which devices communicate, and...
(205) What IPv4 reserved address is used for loop back?
(234) Which condition exists when there is no apparent terrorist...
(216) One of the Windows Server Editions operating systems provides...
(235) At which NETOPS level is responsibility for the worldwide...
(004) Which occupational risk management (ORM) principle has risk...
(009) Which document authorizes the creation of the Department of...
(020) What places air and space expeditionary force (AEF) forces in a...
(023) As of September 2004, how many total flight hours have coalition...
(207) What is the type of memory that retains data after power is...
(209) What do you apply across Liquid Crystal Display material to...
(215) The core operating-system function is the management of the...
(001) Which 3D Air Force Speciality (AFS) responsibilities include the...
(013) Which document would you reference for guidance on "Web...
(027) Under what program does the Department of Defense (DOD)...
(204) Which is a common port that contains Hyper Text Transfer...
(206) What Unicast address scope is publicly accessible with the...
(215) Applications are software programs designed to perform what type...
(222) What provides conduit for Joint Worldwide Intelligence...
(223) What is the first step in merging voice, data and video networks...
(225) What is the maximum asynchronous data rate for the...
(231) An uninvestigated or unevaluated occurrence that potentially...
(235) An accreditation decision which allows a system to operate in an...
(001) Which enlisted training element is defined as integrated bundle...
(016) An organized collection of data or data structures is know as...
(019) Which document is used for accountability purposes when...
(021) Who has the primary mission of providing the joint...
(029) Which system primarily deals with logistics planning...
(036) Which system is a service that broadcasts via communication...
(203) What Transmission Control Protocol/Internet Protocol network...
(205) How many bits are in an IPv4 address?
(207) What organization developed several wireless standards to meet...
(216) Windows operating systems traditionally function in one of two...
(221) How are non-internet protocols sent across the Secret Internet...
(224) Which organization is responsible for the design, acquisition,...
(226) What is the purpose of the standardized tactical entry point...
(001) Which 3D Air Force Specialty (AFS) responsibilities include the...
(002) Who is the advisor for all matters affecting the career...
(015) Who has the authority to appoint record custodians within an...
(201) What layer of the Open System Interconnect model defines the...
(201) At what Open System Interconnect layer do network switches and...
(203) What application within Transmission Control Protocol/Internet...
(204) What type of network connects networks that are typically...
(205) What is a mechanism that allows a network device to divide an IP...
(230) What is the COMSEC program designed to do?
(018) What determines the cutoff for active records?
(037) Which system provides high-quality voice/data HF and ultra-high...
(214) Analog modems are used over the voice band range of
(215) Software is generally divided into
(229) Disclosure of information that would result in the loss, misuse,...
(218) This component of the Global Information Grid consists of those...
(010) In what year did the Joint Staff and Armed Services consolidated...
(012) Which Air Force Portal feature is considered a major...
(026) The 85th Engineering and Installation Squadron is assigned to...
(205) What IPv4 class address is used for networks with about 250...
(213) What encryption device may you rarely see due to its lower...
(223) Besides limiting connections to the Global Information Grid,...
(228) Which security program is covered under AFI 10-701?
(235) At what level do regional operation centers perform Network...
(006) Which option refers to centralized systems which monitor and...
(008) Which function or organization was established to operate with...
(020) AFPD 10-4, Operations Planning: Air and Space Expeditionary...
(201) The Institute of Electrical and Electronics Engineers divide the...
(206) What Unicast address scope is designed to be private, internally...
(207) What two main components make up the central processing unit?
(208) How many peripherals can a Universal Serial Bus handle at once?
(216) Which system provides support for features such as Windows...
(001) Which enlisted training element is assigned by the supervisor...
(008) Which function or organization has the goal to manage AF core...
(203) What Transmission Control Protocol/Internet Protocol network...
(207) The computing part of the computer is the central processing...
(210) What is a Data Link layer network device that logically...
(229) Guidance for posting information on Air Force web sites is...
(010) Which publication type are directive policy statements of Office...
(035) Which system is a radar tracker and correlator software program...
(201) What Open System Interconnect layer is closest to the end user?
(208) How many devices can connect to a FireWire bus?
(213) What encryption device is capable of loading up to 500 keys?
(217) Which pathnames begin at the current working directory?
(219) Who bears the responsibility for maintenance of the sustaining...
(233) An unclassified term referring to technical investigations for...
(016) A logical group of record is called a/an
(020) Which organization is responsible for air and space...
(205) What iPv4 class address is used for multicast addressing?
(207) An optical communications system is comprised of a
(212) Dynamic routing automatically calculates the best path between...
(232) The Air Force Information Assurance Program is detailed in
(230) Which form is used with a transfer report to accompany a COMSEC...
(224) What type of Defense Switched Network precedence...
(010) Which publication type are informational publications which are...
(021) Which document is the basic building block used in...
(211) What forwarding method is also known as runtless switching?
(220) What is the difference between a hub router and a premise...
(022) Which function has the primary purpose of providing...
(032) Which command and control structure has network node whose...
(212) Which of these is an example of an Exterior Gateway Protocol?
(229) Official guidance on individual security clearances and...
(221) Which is an internet protocol encryption device that can be...
(015) Who is appointed at each base-level unit, principal staff office...
(022) Defense Support of Civil Authorities (DSCA), Humanitarian Relief...
(206) Instead of using binary, how are IPv6 addresses expressed to be...
(236) Which form would you use to properly label removable storage...
(016) A logical group of organized data fields containing some type of...
(213) What encryption device is certified to secure all classification...
(214) The main function of the Data Service Unit is to
(218) This characteristic of the Global Information Grid ensures...
(002) Who is the final authority to waive career field...
(015) Whose duties include providing assistance, managing staging...
(229) Providing a list of where and why the information will be...
(003) Which Air Force Occupational Safety and Health (AFOSH) standard...
(023) Which system focuses on providing exploitable digital imagery to...
(236) Which resources designated priority is provided when the level...
(029) Which system of interconnected computer networks is used by the...
(205) What method borrows bits from the host field of an IP address to...
(206) What notation is expressed in zero compression for IPv6?
(003) The Air Force Occupational Safety and Health (AFOSH) standard...
(203) What Transmission Control Protocol/Internet Protocol network...
(231) Which organization assigns communication security incident...
(004) Which occupational risk management (ORM) principle states...
(206) What notation is expressed in leading zero compression for IPv6?
(229) What form is used as a cover sheet to protect Privacy...
(002) Who assists with the identification of qualified subject matter...
(003) Which Air Force Occupational Safety and Health (AFOSH) standard...
(016) Who is responsible for creating unique password for...