What training actions are required when controllers have not performed...
Which AF form can be used as a visitor register log to control visitor...
What is the minimum classification of a computer password that permits...
What connects computers and peripheral devices for sharing of hardware...
When a document's interior page contains Top Secret, Secret,...
Even though an individual has a valid security clearance that...
Within how many calendar days of your arrival to a new duty station...
When reproducing classified information, reproduction of the...
What action is required when conducting an inventory of communications...
When you determine an individual''s trustworthiness, what...
What percentage is the minimum passing score for certification tests...
Which training plan identifies life-cycle education and training...
Which pubication provides essential procedural guidance necessary to...
How do you transmit numbers?
Shift changeover checklists are developed and maintained to ensure...
Once you have entered initial training, you will also be entered into:
Why must the Top Secret register page for any given year must remain...
What are the categories of Air Force publications?
What action must you take when you receive an incorrect response...
What measures are used to uniformly heighten or reduce our defensive...
What facility operator activates the secondary crash alarm circuit?
How should file folders containing classified materials be marked?
Which documents require destruction records when being destroyed by...
Which entry control technique is especially valuable where relatively...
What type of controlled unclassified information contains facts about...
What classified material, if any, always requires a hand receipt for...
Which security incident is used to describe when classified...
Which form is used to record daily security checks?
What is the highest procedence in the telephone priority system?
What type of on-the-job training (OJT) does career development courses...
Which type of publications is necessary to meet the requirements of...
What system uses a FORTEZZA plus card to provide security?
During quick reaction checklist construction, telephone notifications...
In radio communications, which proword would you use tell some to...
Within how many duty days are you retested after failing a monthly...
What program is a formal system that ensures all aspects of...
If command post quick reaction checklists (QRC) can prescribe complete...
What classified information's unauthorized disclosure could...
What facility operator activates the primary crash alarm circuit?
What are the categories of classified information?
Who must train all individuals receiving initial or recertification...
What type of radio system is used as a backup for communication with...
What are the three categories of recurring training?
Which type of communications security (COMSEC) incident has occured if...
Which security incident best describes an incident that involves the...
Who certifies controllers at the major command (MAJCOM) level?
What months will semiannual performance evaluations be administered to...
Within how many calendar days of your arrival to a new duty station...
What force protection condition (FPCON) is issued as a localized...
What system is the primary authentication document used by the...
Who assigns accounting legend codes (ALC) to communications security...
What official information does not require security safeguards, but...
What is established within a controlled area that contains no...
When a security incident has occurred, who must take custody of ...
What procedure is used verify a user has a right to access a computer...
Each article of Top Secret material is accounted for by using an AF...
When should you reset a security container's built-in combination...
What is the recommended minimum number of random antiterrorism...
Who implements the emergency action plan by issuing the emergency...
When marking classified material, how is the classification of the...
By dispersin key facilities, command, control, communications, and...
What publication contains complete information to accomplish a...
When you destroy classified waste such as handwritten notes or working...
What part of the career field education and training plan (CFETP)...
In a classified document, how is the classification level...
Proficiency training consists of:
If not compromised, when must duress codes be changed?
When transferring classified material outside an Air Force...
What command and control (C2) system mission is to aid unit commanders...
What display do you use in Global Decision Support System (GDSS)...
What do training managers use to outline that month's training...
Who periodically reviews the trainee progress in initial or...
If you receive an "UNSAT" on your performance evaluation, within how...
What are the methods of calling used in radio communications?
When must you perform an inventory on a Top Secret account?
You should speak clearly and distinctly, but not too loud, when using
The purpose of making periodic communications checks in the command...
When would protection level (PL) 3 be assigned to a priority resource?
Which secure radio system is used mostly in theater operations?
What number of calendar days will controllers be entered into initial...
When conducting self-inspections, you must perform major command...
How many calendar days do active duty and air reserve components...
Which response is one of the four most important factors of speech?
Modular system designs and microelectronics give a command, control,...
Containers used to store classified information are indentified by
How long may classified working papers be maintained before they must...
What command, control, communications, and computer (C4) system...
Normally recordings of command post (CP) communications are not...
Which review requires a line-by-line examination of classified...
What force protection condition (FPCON) is declared when there is a...
One of the prime prerequisites for good voice communications is using
What category of classified material is based upon the limited use of...
Which action is a specific objective of command, control,...
What proword would you use before transmitting numerals or numbers?
What command and control (C2) system provides preformatted report...
Which computer security (COMPUSEC) objective ensures information is...
What are the types of calls used in readio communications?
How often is your communications security responsible officer (CRO)...
What command, control, communications, and computer (C4) system...
Air Force activities add organizations-specific guidance to higher...