Which Air Force Portal feature enables authorized users to enter...
The proper way we destroy records to prevent compromise is by
Records that are considered to be in draft format
The ability to move about without being tethered by wires in wireless...
Which 3D Air Force Specialty (AFS) responsibilities include the...
What is the main goal of the utilization and training workshop...
What topology combines two or more different physical topologies in a...
The classification of a fill device is
The path between the operating system and virtually all hardware not...
Offensive operations support United States cyberspace objectives by
When corresponding to an e-mail, which would you not use to follow...
What was the first disk operating system developed to operate on a...
What provides us with the transmission of analog or digital bits...
What directory is always identified by the slash symbol (/) and is in...
Final reports of a communication security incident are due
While you are using the Red Switch, what feature lets you know that...
Who is an authorized client that may unknowingly or maliciously help...
What organization developed several wireless standards to meet the...
Which 3D Air Force Specialty (AFS) responsibility includes local base...
Which 3D Air Force Specialty (AFS) responsibilities include the...
For which exception will federal records centers accept records having...
What are two anti-virus programs that the Air Force uses?
Which document is not considered an official government record?
Which document serves as the basis for holding military members...
In what year did the Air Force finalized and published its information...
What determines the cutoff for active records?
Using a range of 1–126 in the first octet of an IPv4 address,...
What type of network connects networks that are typically separated by...
What is the method called when the entire frame is received and placed...
What is the type of memory that retains data after power is removed or...
Which landline transmission medium is the primary carrier of voice...
What is a formal set of rules and conventions that govern how...
What topology consists of devices connected to a common, shared cable?
What concerns slowed the military's adoption of wireless network...
Records that are considered to be in final format have which...
A remotely piloted or self-piloted aircraft that can carry cameras,...
Applications are software programs designed to perform what type of...
Which system provides the capability to identify, sequence, and...
An uninvestigated or unevaluated occurrence that potentially...
The primary purpose for maintaining records is to ensure
What type of network makes use of tunneling and security protocols to...
What function provides the Department of Defense (DOD) with the...
What IPv4 reserved address is used for loop back?
An accreditation decision which allows a system to operate in an...
Which 3D Air Force Specialty (AFS) responsibilities include the...
What rule establishes the percent of data that should be local to a...
A comprehensive term that specifies the destruction, salvage, and...
From which of the following can a person absorb selectively damaging...
Which network protocol has the Department of Defense chosen as its...
Dynamic routing automatically calculates the best path between how...
As of September 2004, how many total flight hours have coalition...
Which component of theater deployable communications (TDC) is a suite...
Which system asset can be tasked to provide liaison, control tower,...
Which document is used as the basis for drafting and enforcing all...
What authorization generates a file disposition control label for each...
Which publication type are informational publications which are "how...
Which Air Force Portal feature provides a secure, Web-based...
What best describes an unintended signals or noise appearing external...
Which system was originally designed as a specialized system for Army,...
Which is a common port that contains Hyper Text Transfer Protocol...
The Institute of Electrical and Electronics Engineers divide the Open...
What topology defines the way in which devices communicate, and data...
Which of the following is not one the four security threats to...
Who is the advisor for all matters affecting the career field?
What do routing algorithms initialize and maintain to aid the process...
What topology consists of cable segments from each computer connected...
The computing part of the computer is the central processing unit,...
Which function is a state-of-the-art ground-to-ground communications...
The core operating-system function is the management of the computer...
Which document authorizes the creation of the Department of Defense...
What tool provides essential online resources for the Air Force and...
Which Air Force Portal feature is considered a major benefit of the...
This component of the Global Information Grid consists of those items...
What is the maximum asynchronous data rate for the Defense Red Switch...
Which system provides high-quality voice/data HF and ultra-high...
The Global Positioning System program is responsible for maintaining...
Instead of using binary, how are IPv4 addresses expressed to be more...
This type of bridge is used to convert one Data Link layer protocol to...
An optical communications system is comprised of a
Which of the following is not one of the three advantages to using...
What do you apply across Liquid Crystal Display material to change the...
Which 3D Air Force Specialty (AFS) focuses its attention on the...
Analog modems are used over the voice band range of
The main function of the Data Service Unit is to
What type of Defense Switched Network precedence call cannot be...
Which one is not a category of the operating system's task categories?
Which theater deployable communications (TDC) equipment characteristic...
What is the name of the standard all-purpose shell most commonly used?
Which applied discipline applies measures and controls to protect data...
Which condition exists when there is no apparent terrorist activity...
What application within Transmission Control Protocol/Internet...
What is a mechanism that allows a network device to divide an IP...
What is the default classful subnet mask on class B networks?
Which of these is an example of an Exterior Gateway Protocol?
What provides conduit for Joint Worldwide Intelligence Communication...
Which organization is responsible for air and space expeditionary...
What two main components make up the central processing unit?
Software is generally divided into
Which occupational risk management (ORM) principle has risk...
In what year did the Joint Staff and Armed Services consolidated their...
A logical group of record is called a/an
Marking the records for filing is considered which step of file...
What Transmission Control Protocol/Internet Protocol network layer...
What is the purpose of the standardized tactical entry point terminal?
Which system is a USAF program supporting Global, Defense...
What Open System Interconnect layer is closest to the end user?
Instead of using binary, how are IPv6 addresses expressed to be more...
What topology defines the layout of a network's devices and media?
What is a Data Link layer network device that logically separates a...
What title is normally assigned to the on-station ranking 3D...
What encryption device may you rarely see due to its lower maximum...
Which occupational risk management (ORM) principle requests you to...
Which option refers to centralized systems which monitor and control...
What is the COMSEC program designed to do?
One of the Windows Server Editions operating systems provides support...
Which publication type are directive policy statements of Office of...
What IPv4 class address is used for networks with about 250 nodes?
How many bits are in an IPv4 address?
At what Open System Interconnect layer do routers operate?
What is the difference between a hub router and a premise router?
How are non-internet protocols sent across the Secret Internet...
Who is the final authority to waive career field education training...
Which system focuses on providing exploitable digital imagery to the...
Which of the following security programs is defined as a process of...
Which center has the overall authoritative source for the status,...
Windows operating systems traditionally function in one of two network...
The 85th Engineering and Installation Squadron (EIS) is assigned to...
Which system is a service that broadcasts via communication payloads...
What layer of the Open System Interconnect model defines the...
What forwarding method is also known as runtless switching?
How many peripherals can a Universal Serial Bus handle at once?
What layer of the open system interconnection model do routers...
Which enlisted training element is assigned by the supervisor in...
What encryption device is certified to secure all classification...
What encryption device is capable of loading up to 500 keys?
What is the first step in merging voice, data and video networks into...
Which theater deployable communications (TDC) equipment characteristic...
Which center is typically aligned under the base communications...
Which pathnames begin at the current working directory?
What Transmission Control Protocol/Internet Protocol transport layer...
Which system capitalizes on the popular commercial direct broadcast...
How many devices can connect to a FireWire bus?
Which document is used for accountability purposes when retirement...
What Transmission Control Protocol/Internet Protocol network layer...
What places air and space expeditionary force (AEF) forces in a "ready...
Which document is the basic building block used in joint force...
Which organization is responsible for the design, acquisition, and...
Under what program does the Department of Defense (DOD) collects,...
What Transmission Control Protocol/Internet Protocol network layer...
Who has the primary mission of providing the joint force air component...
Which occupational risk management (ORM) principle states that most...
Disclosure of information that would result in the loss, misuse,...
Which form is used as a visitor register log to record visitors into...
An organized collection of data or data structures is known as a/an
What tool is considered a key enabler for the information technology...
Which system provides the ability to rapidly detect and identify...
Who bears the responsibility for maintenance of the sustaining base...
A modem is a device that modulates
Which function has the primary purpose of providing standard force...
This characteristic of the Global Information Grid ensures seamless...
An unclassified term referring to technical investigations for...
Which is an internet protocol encryption device that can be directly...
What Unicast address scope is designed to be private, internally...
Besides limiting connections to the Global Information Grid, what...
Providing a list of where and why the information will be disclosed...
Which function or organization was established to operate with an air...
Which system of interconnected computer networks is used by the United...
What notation is expressed in leading zero compression for IPv6?
What notation is expressed in zero compression for IPv6?
At what Open System Interconnect layer do network switches and bridges...
Which system provides support for features such as Windows System...
Which segment of the Defense Information System Network (DISN) may be...
What IPv4 class address is used for multicast addressing?
AFPD 10-4, Operations Planning: Air and Space Expeditionary Force...
What Unicast address scope is publicly accessible with the Network ID...
How is responsiveness provided in the Defense Switched Network?
Which function or organization has the goal to manage AF core...
Who has the authority to appoint record custodians within an office of...
Which command and control structure has network node whose...
Which system is a radar tracker and correlator software program that...
Defense Support of Civil Authorities (DSCA), Humanitarian Relief...
Which organization assigns communication security incident report case...
At which NETOPS level is responsibility for the worldwide management...
At what Open System Interconnect layer are common data compression and...
What form is used as a cover sheet to protect Privacy Act material?
Which Air Force Occupational Safety and Health (AFOSH) standard...
At what level do regional operation centers perform Network Operations...
Which Air Force Occupational Safety and Health (AFOSH) standard would...
Which security program is covered under AFI 10–701?
Which function or organization has a mission that varies from...
Which document would you reference for guidance on "Web management and...
Which program was created in response to the FY 97–03 Defense...
What Unicast address scope operates within a network segment, and will...
Official guidance on individual security clearances and permitting...
A logical group of organized data fields containing some type of...
Which system is employed at more than 600 sites across the global...
Which system primarily deals with logistics planning data, such as...
Which condition requires the mandate of increased monitoring of all...
Who assists with the identification of qualified subject matter...
The Air Force Occupational Safety and Health (AFOSH) standard that you...