Which Air Force Portal feature enables authorized users to enter...
The proper way we destroy records to prevent compromise is by
What topology combines two or more different physical topologies in a...
The ability to move about without being tethered by wires in wireless...
Who is an authorized client that may unknowingly or maliciously help...
The classification of a fill device is
The path between the operating system and virtually all hardware not...
What are two anti-virus programs that the Air Force uses?
What is the main goal of the Utilization and Training Workshop...
Offensive operations support United States cyberspace objectives by
When corresponding to an e-mail, which would you not use to follow...
Records that are considered to be in draft format
Which network protocol has the Department of Defense chosen as its...
What organization developed several wireless standards to meet the...
What was the first disk operating system developed to operate on a...
What directory is always identified by the slash symbol (/) and is in...
What concerns slowed the military's adoption of wireless network...
While you are using the Red Switch, what feature lets you know that...
Which 3D Air Force Specialty (AFS) responsibility includes local base...
Which 3D Air Force Specialty (AFS) responsibilities include the...
Which document serves as the basis for holding military members...
Which document is not considered an official government record?
A remotely piloted or self-piloted aircraft that can carry cameras,...
Which system provides the capability to identify, sequence, and...
What topology consists of devices connected to a common, shared cable?
What type of network connects networks that are typically separated by...
What is a type of memory that retains data after power is removed or...
Final reports of a communication security incident are due
Which 3D Air Force Specialty (AFS) responsibilities include the...
Which 3D Air Force Specialty (AFS) responsibilities include the...
Records that are considered to be in final format have which...
For which exception will federal records centers accept records having...
What function provides the Department of Defense (DOD) with the...
What is a formal set of rules and conventions that govern how...
What topology defines the way in which devices communicate, and data...
What type of network makes use of tunneling and security protocols to...
Using a range of 1-26 is the first octet of an IPv4 address, what...
What IPv4 reserved address is used for loop back?
Which landline transmission medium is the primary carrier of voice...
Which of the following is not the four security threats to Wireless...
What rule establishes the percent of data that should be local to a...
What is the method called when the entire frame is received and placed...
What do routing algorithms initialize and maintain to aid the process...
Applications are software programs designed to perform what type of...
What document is used as the basis for drafting and enforcing all...
Which document authorizes the creation of the Department of Defense...
In what year did the Air Force finalized and published its information...
What provides us with the transmission of analog or digital bits...
What authorization generates a file disposition control label for each...
What determines the cutoff for active records?
A comprehensive term that specifies the destruction, salvage, and...
Which system asset can be tasked to provide liaison, control tower,...
Which system was originally designed as a specialized system for Army,...
What topology consists of cable segments from each computer connected...
What application within Transmission Control Protocol/Internet...
Instead of using binary, how are IPv4 addresses expressed to be more...
The computing part of the computer is the central processing unit,...
Which of the following is not one of the three advantages to...
Dynamic routing automatically calculates the best path between how...
An uninvestigated or unevaluated occurrence that potentially...
What best describes an unintended signals or noise appearing...
Who is the advisor for all matters affecting the career field?
Which Air Force Portal feature provides a secure, Web-based...
What two main components make up the central processing unit?
An optical communications system is comprised of a
This type of bridge is used to convert one Data Link layer protocol to...
What type of Defense Switched Network precedence...
The Global Positioning System program is responsible for maintaining...
Which applied discipline applies measures and controls to protect data...
Which condition exists when there is no apparent terrorist activity...
From which of the following can a person absorb selectively damaging...
Which publication type are informational publications which are...
What tool provides essential online resources for the Air Force and...
The primary purpose for maintaining records is to ensure
As of September 2004, how many total flight hours have coalition...
Which component of Theater Deployable Communications (TDC) is a suite...
The Institute of Electrical and Electronics Engineers divide the Open...
What do you apply across Liquid Crystal Display material to...
Which of these is an example of an Exterior Gateway Protocol?
Which one is not a category of the operating system's...
The core operating-system function is the management of the computer...
What is the name of the standard all-purpose shell most commonly used?
What is the COMSEC program designed to do?
An accreditation decision which allows a system to operate in an...
Which 3D Air Force Specialty (AFS) focuses its attention on the...
Which Occupational Risk Management (ORM) principle has risk...
Which Air Force Portal feature is considered a major benefit of the...
Which function is a state-of-the-art ground-to-ground communications...
Which Theater Deployable Communications (TDC) equipment characteristic...
Which system provides high-quality voice/data HF and Ultra-High...
What Transmission Control Protocol/Internet Protocol network layer...
How many bits are in IPv4 address?
What is the default classful subnet mask on class B networks?
What encryption device may you rarely see due to its lower maximum...
Analog modems are used over the voice band range of
Which organization is responsible for Air and Space Expeditionary...
What topology defines the layout of a network's devices and media?
Which is a common port that contains Hyper Text Transfer Protocol...
What is a mechanism that allows a network device to divide an IP...
Instead of using binary, how are IPv6 addresses expressed to be more...
The main function of the Data Service Unit is to
Software is generally divided into
One of the Windows Server Editions operating systems provides support...
This component of the Global Information Grid consists of those items...
How are non-internet protocols sent across the Secret Internet...
What is the maximum asynchronous data rate for the Defense...
Which of the following security programs is defined as a process of...
Which Occupation Risk Management (ORM) principle requests you to weigh...
A logical group of record is called a/an
Marking the records for filing is considered which step of file...
The 85th Engineering and Installation Squadron (EIS) is assigned to...
Which system is a USAF program supporting Global, Defense...
What layer of the open system interconnection model do routers...
Windows operating system traditionally function in one two network...
What is the purpose of the standardization tactical entry point...
What title is normally assigned to the on-station ranking 3D...
Which center has overall authoritative source for the status, control,...
What places Air and Space Expeditionary Force (AEF) forces in a...
Which Theater Deployable Communications (TDC) equipment characteristic...
Which system capitalizes on the popular commercial direct broadcast...
What layer of the Open System Interconnect model defines the...
How many peripherals can Universal Serial Bus handle at once?
What encryption device is certified to secure all classification...
Which enlisted training element defined as an integrated bundle...
In what year did the Joint Staff and Armed Services consolidated their...
Which publication type are directive policy statements of Office of...
Which system focuses on providing exploitable digital imagery to the...
Which system is a service that broadcast via communication payloads on...
Which system provides the ability to rapidly detect and identify...
At what Open System Interconnect layer do routers operate?
What Transmission Control Protocol/ Internet Protocol network layer...
What Transmission Control Protocol/ Internet Protocol network layer...
What Transmission Control Protocol/Internet Protocol transport layer...
What IPv4 class address is used for networks with 250 nodes?
How many devices can connect to a FireWire Bus?
What is a Data Link layer network device that logically separates a...
What is the difference between a hub router and a premise router?
What provides conduit for Joint WorldWide Intelligence Communication...
What is the first step in merging voice, data and video network into...
Which organization is responsible for the design, acquisition, and...
Discloser of information that would result in the loss, misuse,...
Who is the finally authority to waive Career Field Education Training...
Which option refers to centralized systems which monitor and control...
Which document is used for accountability purposes when retirement...
Which document is the basic building block used in joint force...
Under what program does the Department of Defense (DOD) collects,...
What forwarding method is also known as runtless switching?
What encryption device is capable of loading up to 500 keys?
Which pathnames begin at the current working directory?
Which enlisted training element is assigned by the supervisor in...
Which center is typically aligned under the base communications...
An organized collection of data or data structures is known as a/an
What Open System Interconnect layer is closed to the end user?
What Unicast address scope is designed to be private, internally...
Which form is used as a visitor register long to record visitors into...
What Occupational Risk Management (ORM) principle states that most...
What tool is considered a key enabler for the information technology...
Who has the primary mission of providing the joint force air component...
A modem is a device that modulates
Who bears the responsibility for maintenance or of the sustaining base...
Which function has the primary purpose of providing standard force...
Which system of interconnected computer networks is used by the United...
At what Open System Interconnect layer do network switches and bridges...
What Unicast address scope is publicly accessible with the Network ID...
Which system provides support for features such as Windows System...
This characteristic or the Global Information Grid ensures seamless...
Besides limiting connections to the Global Information Grid, what...
Providing a list of where and why the information will be disclosed...
An unclassified term referring to technical investigations for...
What form is used as a cover sheet to protect Privacy Act material?
Guidance for posting information on Air Force web sites is outlined...
What IPv4 class address is used for multicast addressing?
What notation is expressed in zero compression for IPv6?
Which is an internet protocol encyption device that can be directly...
How is responsiveness provide in the Defense Switched...
AFPD-10-4, Operations Planning: Air and Space Expeditionary Force...
Which Air Force Occupational Safety and Health (AFOSH) standard...
Which function or organization was established to operate with an Air...
Which function or organization has the goal to manage AF core...
Which command and control structure has network node whose...
Which system is a radar tracker and correlator software program that...
What notation is expressed in leading zero compression for IPv6?
Which segment of the Defense Information System Network (DISN) may be...
At which NETOPS level is responsibility for the worldwide management...
Which organization assigns communication security incident report case...
Which function or organization has a mission that varies from...
Who has the authority to appoint record custodians within an office of...
At what Open System Interconnect layer are common data compression and...
Which security program is covered under AFI 10-701?
Defense Support of Civil Authorities (DSCA), Humanitarian Relief...
Which system primarily deals with logistics planning data, such as...
Which program was created in response to the FY-97-03 Defense Planning...
Which condition requires the mandate of increased monitoring of all...
Which form would you use to properly label removable storage media...
Which Air Force Occupational Safety and Health (AFOSH) standard would...
What method borrows bits from the host field of an IP address to...
At what level do regional operation centers perform Network Operations...
What Unicast address scope operates within a network segment, and will...
Official guidance on individual security clearances and permitting...
The Air Force Occupational Safety and Health (AFOSH) standard that you...