Which computer system vulnerability is NOT one in a computer system?
The UCMJ is derived from what USC?
What system of the Global High Frequency (HF) Network provides rapid,...
Which incidents occur when a higher classification level of data...
What method is considered the least preferred when controlling hazards...
Which enlisted training element is assigned by the supervisor in...
Who is the supervisor for all matters affecting the career field?
Who is the final authority to waive career field education training...
How many rules are there for effective communication via e-mail?
What network routing protocols allow multiple autonomous systems to...
What reason is the main purpose for consolidating NCC and forming the...
What hazard is the greatest in the typical office?
What network topology is another name for a bus topology?
Which of the following does NOT describe information outlined in TO...
What negative effect could occur when star networks are...
What two levels are JTF divided into?
What system manages the distribution and printing of paper TOs?
Which governing body is the authority for IT communications within the...
How many workflow capabilities are available on Sharepoint Server?
What three parts make up CSIR?
Which classified document marking appears on the face of each US...
How would you determine if an IDS is required or another supplemental...
Which device optically reads an image, printed text, or an object and...
What range of numbers are those of well know port numbers?
An employee or employer relationship...?
What major command and numbered Air Force (NAF) were realigned to...
What characteristic is the major difference b/t RAM and ROM?
Member of a household or relatives...?
Records that are considered to be in draft format
What portion of the IP Datagram allows IP to detect datagrams with...
What directive publications expire one year after their effective date...
Who may post an update to a TO if they are trained/authorized?
What action should you take first when you encounter a fire?
What two cyber operation defenses involve continuous monitoring and...
Which wireless local area network (WLAN) security method is best...
Which type of encryption provides the greatest degree of protection...
What characteristic is NOT an advantage of fiber optic cable?
Which network provides a private tunnel through the Internet?
Occupational surveys are used to develop the SKT, what else?
What UNIX system software interacts most closely with the hardware?
What Microsoft application allows users to create a desktop database?
What Microsoft application is a personal information manager?
What step is the fourth in the firefighting process?
What AF publications are informational and suggest guidance that you...
What program provides training for personnel to attain knowledge and...
Which computer software is designed to collect personal information...
What basic building block is used in joint force planning and...
What document directs the development of the National Military...
What ITIL stage is an overarching stage for maintaining service...
Which network is a network that links local area networks (LAN) and...
What major program does the GCSS-AF provides as a single point of...
Which action is not a part of risk management (RM)?
What action is the main purpose of a system cache?
The OSHA is a part of the US Department of?
Whose responsibility is to advise commanders, function managers,...
Failure to observe the prohibitions and mandatory provisions of AFMAN...
Which agency is responsible for... identification, prioritization......
Which office annually evaluates agency efforts to improve the quality...
What inspection integrates elements of compliance and readiness with...
Automated info. system manages entire life cycle of IT assets from...
What layers make up the two categories of the seven layer on the OSI...
The LLC sublayer is part of the OSI model layer?
What three sub-categories make up human factors?
Which network supports unclassified e-mail service to the user?
Which network provides DoD customers with centralized and protected...
Which 3D Air Force Speciality (AFS) responsibilities include the...
What USC title authorizes the creation of DOD as an executive...
What directive publications provide essential procedural guidance on...
What tests your understanding of the original message blah
What year did the AF institute Remedy?
The commander, COMAFFOR commands an AETF and provides unity of command...
What policy outlines US Armed Forces' comprehensive strategic...
Which AFI defines an "official government record"?
Which document is NOT considered an official government record?
Who has the authority to appoint record custodians within an office of...
What entity assigns numbers to DoD issuances based on the established...
When ANG personnel in Title 32 status... cyber operations, what title...
What personnel oversees TO requirements and distribution w/in an...
Which type of TO has a numerical designator beginning with...
Whose duties include providing assistance, managing staging areas, and...
Who develops standards for IP&E electronic components under ANSI...
Who is the second-highest ranking official in the DoD?
What type of DODD establishes DoD information systems shall receive...
Who is responsible for scheduling STRT?
Since Military Information Support Operations (MISO) and Public...
What methodology is used by AF for presenting forces to combatant...
What cyberspace weapon system ensures unfettered access, mission...
Which stage is NOT one of the ITIL Service Life Cycle stages?
What directive publication prescribes the mission, area of...
What type of non-directive AF publication is not subject to frequent...
Which one of these is NOT an essential element in QA program?
Which evaluation is NOT an assessment type in a QA program?
What Cyberspace Weapon System identifies vulnerabilities and provides...
Which QA essential element collects, compiles, analyzes, etc.?
What publications are orders issued by the SECAF that contain...
Which unit installs, reconstitute, and test critical C4 systems for...
Which action is a physiological factor?
What speed is the maximum data transfer rate of USB 3.0 SS transfer...
What system provides a secure communications path for control and...
Who recommends controls to mitigate health risks associated with...
What is a peripheral device?
How many impact classifications do hardhats have?
What requirements mandate to develop of AF architecture?
Which device is used as a transceiver that converts the electrical...
Which classified document markings identifies the highest level of...
According to the CDC office workers are how many times more likely to...
What chapter in the AFI 91-203 provides specific guidance on office...
Which part of CSIR depicts physical layouts of communications and...
What action is the purpose of a sliding window in TCP?
What functions do the layers of the OSI reference model specify?
Which event is NOT a valid reason to change the combination on a...
Who has the authority to grant permission to ship classified materials...
Fuels that are normally classified as A or B will change to what...
What system includes all owned and leased communications and computing...
Which network uses Carrier Sense Multiple Access/Collision Avoidance...
What network device provides a remote network with connectivity to a...
Which network is a group of computers and associated devices that...
What year did the IEEE ratify the use of GbE?
COMPUSEC vulnerabilities are broken down into how many categories?
What system is the priority component of the DODIN that directly...
Under normal conditions, how many milliamps of current could cause...
Which system of the GCCS-AF monitors the status of resources and...
What action is the purpose of the Mishap Prevention Program?
How many volumes make up the DODAF specification?
What action must supervisors take before a work task not governed by a...
What AF form is used to report ground mishaps?
What does the MAC sublayer of the data link layer manage?
Which 3D Air Force Speciality (AFS) responsibilities include...
Who serves as the MAJCOM voting rep. during U&TW?
What title is normally assigned to the on-station 3D NCO?
What action is the main goal of U&TW?
What document spells out the comprehensive strategy for the US to...
Which policy has prevention of cyber attacks against America's...
What cyberspace weapon system is the top-level boundary and entry...
What regional computing and data center provide enterprise services...
How many types of DODI are there?
What type of DODD establishes OSD component heads and other agencies...
What JP is the keystone document for the communications-system series...
The vision of EIM is to provide tools to empower users to?
Which unit within the AFNetOps community has a goal to reduce training...
Which publication implements the Mishap Prevention Program?
When used alone, the word "topology" often refers to a...
What topology offers centralized management of a network?
What is a Transmission Control Protocol (TCP) socket?
How are fires classified?
Maximum value of an octet in IPv4?
What classification do flammable liquids receive?
Which AF form records the destruction of TS information?
In general, how many OS task categories are there?
How many T1 DSN access circuits do STEP terminals offer?
Which ladder practice is not prohibited?
Which helmet class does not provide protection against contact with...
Which system is a radar Tracker/Correlator software program hosted on...
Which system is a space-based high data rate communications link for...
Which of the following services provides additional communications...
Who assists with identification of qualified subject matter experts...
Who should you seek out if you need information on transporting TS...
Who is appointed at each base-level unit principal staff office within...
Which network provides high-quality, secure telecommunications for...
Which system is the primary network used to transmit Emergency Action...
The risk management process includes how many steps?
What information system (IS) threat is the greatest threat to an...
Which part of the CSIR is normally retained in the production work...
Which classes allow for a maximum of 254 hosts per network?
How many air defenses sectors is the BCS-F divided into?
Proactive defense is one of the four integrated sub-disciplines of...
Who is charged with the duties of establishing training programs for...
What class is reserved for multicast addressing?
What cyberspace weapons system includes the I-NOSC, ESU, APC...
Describe a network bridge.
What system mission is to provide reliable, rapid, two-way...
Which system is the AF' primary ISR collection, processing,...
What does the LLC sublayer of the data link layer manage?
What cyberspace weapons system resulted from... MAJCOM... stove-piped...
What system is a telecommunications network that provides the exchange...
Which system is the DoD's command and control (C2) system of...
What AF form is used to report a hazard?