Records that are considered to be in draft format
Which network provides a private tunnel through the internet?
Which 3D Air Force Specialty (AFS) responsibilities include the...
The Occupational Safety and Health Administration (OSHA) is a part of...
What network topology is another name for a bus topology?
Which network is a group of computers and associated devices that...
What characteristic is not an advantage of fiber optic cable?
Which computer software is designed to collect personal information...
Which network supports unclassified e-mail service to the user?
The Uniform Code of Military Justice (UCMJ) is derived from what...
When Air National Guard personnel in Title 32 status train for cyber...
What major command and numbered Air Force (NAF) were realigned to...
What tests your understanding of the original message and your ability...
What action is the purpose of the Mishap Prevention Program?
What hazard is the greatest in the typical office?
What topology offers centralized management of a network?
What portion of the Internet Protocol (IP) Datagram (packet) allows IP...
Which device optically reads an image, printed text, or an object and...
Which wireless local area network (WLAN) security method is best...
Which 3D Air Force Specialty (AFS) responsibilities include the...
Who is the advisor for all matters affecting the career field?
Which Quality Assurance (QA) essential element collects, compiles,...
What inspection integrates elements of compliance and readiness with...
What automated information system manages the entire lifecycle of...
What United States Code (USC) title authorizes the creation of the...
What reason is the main purpose for consolidating Network Control...
What system manages the distribution and printing of paper technical...
Whose responsibility is it to advise commanders, function managers,...
What method is considered the least preferred when controlling hazards...
How are fires classified?
What action should you take first when you encounter a fire?
What step is the fourth in the fire fighting procedure?
Which ladder practice is not prohibited?
What three parts make up Communications and Information Systems...
What negative effect could occur when star networks are...
What range of numbers are those of well known ports
Which network is a network that links local area networks (LAN) and...
Which device works as a transceiver that converts the electrical...
Which type of encryption provides the greatest degree of protection...
Which event is not a valid reason to change the combination on a...
Occupational surveys are used to develop the specialty knowledge test...
Since Military Information Support Operations (MISO) and Public...
Which agency is responsible for matters pertaining to the...
What basic building block is used in the joint force planning and...
Which document is NOT considered an official government record?
Fuels that are normally classified as A or B will change to what...
Which action is not a part of risk management (RM)
Which office annually evaluates agency efforts to improve the quality...
Which governing body is the authority for information technology (IT)...
What UNIX system software interacts most closely with the hardware?
Which computer system vulnerability is not one in a computer system?
Which network provides Department of Defense (DOD) customers with...
What major program does the Global Combat Support System-Air Force...
Members of a household or relatives with whom you have a close...
Who is the second highest ranking official in the Department of...
Which action is a physiological factor?
According to the Centers for Disease Control and Prevention (CDC),...
What action is the purpose of a sliding window in Transmission Control...
What Microsoft application is a software program that allows users to...
What action is the main goal of the utilization and training...
What program provides training for personnel to attain knowledge and...
An employee or employer relationship that leads to the appearance of...
What unit installs, reconstitutes, and tests critical C4 systems for...
Failure to observe the prohibitions and mandatory provisions of AFMAN...
What year did the Institute of Electrical and Electronics Engineers...
What Microsoft application is a personal information manager?
What cyberspace weapon system identifies vulnerabilities and provides...
The commander, Air Force forces (COMAFFOR) commands an Air...
Which of the following does NOT describe information outlined in...
Under normal conditions, how many milliamps of current could cause...
Which part of the Communications and Information Systems Installation...
What is a peripheral device?
Which network uses Carrier Sense Multiple Access/Collision Avoidance...
What network device provides a remote network with connectivity to a...
Who is the final authority to waive career field education training...
Which one of these is NOT an essential element in a Quality...
Which evaluation is NOT an assessment type in a Quality Assurance (QA)...
What personnel oversees technical order requirements and distribution...
Who developes standards for iinterconnect, passive and...
What action must supervisors take before a work task not governed by a...
The logical link control (LLC) sublayer is a part of which Open...
When used alone, the word "topology" often refers to a...
What action is the main purpose of system cache?
Which enlisted training element is assigned by the supervisor I...
Who serves as the major command (MAJCOM) voting representative during...
What title is normally assigned to the on-station ranking 3D...
What two levels are joint task forces (JTF) divided into?
What Information Technology Infrastructure Library (ITIL) stage is an...
What Department of Defense Directive (DODD) establishes that all...
What Air Force publications are informational and suggest guidance...
What three sub-catergories make up human factors?
What value is the maximum of an octet in Internet Protocol version 4...
What directive publications expire one year after their effective date...
Who may post an update to a technical order assuming they are trained...
What requirements mandate to develope of Air Force Architectures?
What functions do the seven layers of the Open System Interconnection...
What is a Transmission Control Protocol (TCP) socket?
What class is reserved for multicast addressing?
Which incidents occur when a higher classification level of data...
Who has the authority to grant permission to ship classified materials...
What policy outlines to United States (US) Armed Forces'...
How many rules are there for effective communication via e-mail?
Which type of technical order (TO) has a numerical designator...
Who recommends controls to mitigate health risks associated with...
What speed is the maximum data transfer rate of USB 3.0 SuperSpeed...
What network routing protocol allows multiple autonomous systems to...
What entity assigns numbers to Department of Defense (DOD) issuances...
What Joint Publication (JP) is the keystone document for the...
How many impact classifications do hardhats have?
Which part of the Communications and Information Systems Installation...
Which network provides high-quality, secure telecommunications for...
Which system of the Global Command and Control System-Air Force...
What document spells out the comprehensive strategy for the United...
What document directs the development of the National Military...
What year did the Air Force Institute a single instance of Remedy...
Which stage is NOT one of the Information Technology Infrastructure...
The vision of Enterprise Information Management (EIM) is to...
What type of non-directive Air Force (AF) publication is not subject...
What Information System (IS) threat is the greatest threat to an...
Which classified document marking identifies the highest level of...
Which Air Force (AF) form records the destruction of Top Secret...
Which of the following services provides additional communications...
Which system of the Global High Frequency (HF) Network provides rapid,...
What cyberspace weapon system is the top-level boundary and entry...
Which Air Force Instruction (AFI) defines an "official government...
What directive publication perscribes the mission, area of...
What chapter in Air Force Instruction (AFI) 91-203, Air Force...
Which class allows for a maximum of 254 hosts per network?
How many T1 Defense Switched Network (DSN) access ciruits do...
What type of Department of Defense Directive (DODD) establishes Office...
Which publication implements the Mishap Prevention Program?
Who should you seek out if you need information on transporting Top...
Which unit within the Air Force Network Operations (AFNetOps)...
Who has the authority to appoint record custodians within a office of...
What directive publications provide essential procedural guidance on...
What layers make up the two categories of the seven layers of the Open...
Which system's mission is to provide reliable, rapid two-way...
Which policy has prevention of cyber attacks against America's...
What classification do flammable liquids receive?
Which system is a radar Tracker/Correlator software program hosted on...
What regional computing and data center provide enterprise services...
What does the Media Access Control (MAC) sublayer of the data link...
How many workflow capabilities are available to you on a SharePoint...
The risk management process includes how many steps?
Which classified document marking appears on the face of each...
Which system us a space-based high data rate communications link for...
What system is the priority component of the Department of...
What methodology is used by Air Force for presenting forces to...
What Air Force (AF) form is used to report ground mishaps?
Who is responsible for scheduling the Specialty Training Requirements...
What Air Force (AF) form is used to report a hazard?
What system includes all owned and leased communications and computing...
Describe a network bridge?
Which system is the Department of Defense's (DOD) command and...
How many air defense sectors is the Battle Control System-Fixed...
What does the logical link control (LLC) sublayer of the data link...
What publications are orders issued by the Secretary of the Air Force...
Which system provides a secure communications path for command and...
Whose duties include providing assistance, managing staging areas, and...
How many different types of Department of Defese Instructions (DODI)...
How many volumes make up the Department of Defense Architecture...
Proactive defense is one of the four integrated sub-disciplines of...
In general, how many operating system task categories are there?
Who assists with the identification of qualified subject matter...
What system is a telecommunications network that provides the exchange...
Who is charged with the duties of establishing training programs for...
Which system is the primary network used to transmit the Emergency...
What cyberspace weapon system includes the Integrated Network...
Who is appointed at each base-level unit principal staff office within...
What cyberspace weapon system resulted from an operational initiative...
What cyberspace weapon system ensures unfettered access, mission...
Which system is the Air Force's primary intelligence, surveillance...
What characteristic is the major difference between Random Access...
What two cyber operation defenses involve continuous monitoring and...
Which helmet class does not provide protection against contact with...
How would you determine if an intrusion detection system is required...
Computer Security (COMPUSEC) vulnerabilities are broken down into how...