44. (017) Users who perform troubleshooting, configuration changes, or...
51. (221) What provides the special protection of Top Secret (TS)...
76. (235) Who is responsible for building, issuing, and recovering...
46. (018) Weaknesses or holes in a security system are considered
47. (018) Which of the following options is not involved when securing...
19. (209) Which of the following requirements would make a person...
55. (020) When classified information is inadvertently sent through...
23. (210) Which type of security clearance is not valid for personnel...
58. (023) What determines the number of alternate information...
26. (211) At a minimum, how often must you review the communications...
2. (001) Which career field deploys, sustains, troubleshoots, and...
5. (002) Human error causes approximately what percentage of all...
7. (004) Which bound media has a core surrounded by cladding and a...
29. (213) When an error or anomaly is detected upon receipt/inspection...
8. (004) Which of the following is not an example of unbound media?
74. (028) Which term identifies any equipment or area in which...
9. (005) In which topology does a device wanting to communicate with...
10. (006) When viewed in binary form, each octet within an Internet...
83. (030) In which information assurance control must an organization...
54. (223) When you are performing courier duties and transporting...
14. (006) The sequence of leading bits in an internet protocol (IP)...
16. (007) Which transmission control protocol (TCP) port is used by...
17. (007) Which protocol is an Internet Engineering Task Force (IETF)...
19. (008) Which port range constitutes well-known ports?
86. (031) What is the minimum rank the AF Information Network (AFIN)...
90. (033) Which of the following is not a phase in the information...
21. (008) Which port is used for hypertext transfer protocol (HTTP)?
23. (008) Which type of scan is also known as a half open scan?
30. (011) What is the newest WiFi networking standard that is widely...
6. (202) Who requires that the communications security account manager...
8. (203) Who assists the communications security account manager (CAM)...
37. (014) The definition of integrity as it's applied to...
11. (205) Who performs the semiannual inspections and audits on the...
38. (014) Logon and password management screens must be encrypted with...
39. (014) Which common access card (CAC) certificate would be used to...
40. (014) What does the common access card (CAC) certificate used to...
41. (014) The contract manager must use what agency to validate a...
71. (233) Who provides formal classroom training to instruct aircrews...
43. (219) Who requests disposition instructions for communications...
44. (219) Who may destroy communications security (COMSEC) material?
42. (015) Which of the following represents a strong password?
48. (220) Sign the communication security (COMSEC) material...
50. (221) Two-person integrity (TPI) is the storage and handling...
78. (235) What comm kit type do you build for emergency war orders...
48. (018) Which UNIX command allows remote logins?
79. (235) Comm kits are normally contained in
49. (018) When vulnerabilities are discovered within the Windows...
51. (019) A program that contains or installs a malicious program is...
52. (019) The two fundamental concepts of network security are
84. (236) What type of change notice is not scheduled and is only...
57. (022) Continuity of operations plans (COOP) are not used in which...
1. (001) Which of the following is a duty performed by a cyber surety...
59. (024) What is the minimum grade requirement for an information...
63. (025) Where are thermal transfer and dye sublimation cartridges...
73. (027) An installation commander can authorize keeping which...
79. (029) An emission security (EMSEC) manager documents an EMSEC...
52. (222) How many people must unwrap the inner wrapper of a top...
12. (006) Which class of internet protocol (IP) addresses is only used...
56. (224) Which method is not used to complete a bulk encrypted...
15. (007) Which protocol does the Internet support as the "language"...
18. (008) A logical connection point for the transmission of...
59. (226) The simple key loader (SKL) is the replacement for which...
20. (008) Which port is used for telnet?
22. (008) In which type of port scan does the scanner connect to the...
28. (010) Administrators must be in the habit of doing what to make it...
29. (011) Which is the slowest yet least expensive WiFi standard?
32. (012) Defense-in-depth is the Department of Defense (DOD) approach...
34. (013) Which of the following is not a result of initial...
34. (215) The rank requirement for an inquiry officer includes all of...
35. (215) Who completes an initial report for each communications...
38. (217) When you create a communication security physical inventory...
39. (217) When you are sealing a package containing communications...
73. (234) Combat Crew Communications (CCC) Level 2 certification...
47. (220) What form serves as the destruction certificate for...
83. (236) Flight Information Handbooks (FIH) are issued every
85. (236) Which squadron commander must be notified before outdated...
24. (210) How often should communications security (COMSEC) access...
27. (212) What is the term used to identify the highest level of...
65. (025) How often must a degausser be recertified during its first 2...
78. (029) Who is the installation's focal point for emission security...
13. (006) Which internet protocol (IP) address is used for limited...
32. (215) Report communications security (COMSEC) deviations and...
25. (009) How is an Internet protocol version 6 (IPv6) address...
26. (009) Which type of transition technology is used to set up secure...
31. (011) Which wireless standard was originally intended to create a...
4. (201) Who assists the communications security account manager (CAM)...
9. (204) Wing information assurance (IA) assessments are generally...
65. (229) On the back of the KOK–22A, which interface allows you...
41. (218) Changes that must be made to material in communication...
42. (218) How many people are required to complete page replacements...
72. (233) What squadron are Combat Crew Communications (CCC) units...
74. (234) Once entered into Combat Crew Communications (CCC) Level 1...
13. (206) Qualified personnel perform preventative maintenance and...
43. (016) Which category of information must be stored on removable...
55. (224) How many times do you wrap communications security (COMSEC)...
60. (227) What classification of communication security (COMSEC)...
64. (229) The front of the KOK–22A device fill connector allows...
75. (234) Which code helps the Air Force identify special experience...
45. (017) Which device provides the initial entry point into a...
81. (236) Flight Information Publications (FLIP) are divided into how...
82. (236) Which documents are designed to provide aircrews with...
50. (019) A companion file virus is one that
20. (209) Those not eligible to be enrolled in the cryptographic...
70. (027) Who has the authority to impose restrictions upon and...
31. (214) What type of communications security (COMSEC) incident is...
71. (027) Which standard form (SF) is used to record the opening and...
72. (027) Personnel removing top secret material from storage must use
81. (030) How many steps are in the risk management framework process?
58. (226) Which statement is not accurate regarding firefly...
1. (201) What is a collection of interoperable systems developed for...
27. (010) Networked resources must be consistently monitored and...
36. (215) A communications security account manager (CAM) submits an...
66. (230) What is the classification of magnetic media used to...
37. (216) When removing material from a communication security...
40. (217) How often must a communications security account manager...
18. (208) Which form do you use to record the arrival or departure of...
22. (209) Who is responsible for overseeing the cryptographic access...
25. (210) At the base level, who initials the communications security...
80. (029) Once it is filled out an AF Form 4170, Emission Security...
80. (236) Which is not a flight phase that Flight Information...
53. (020) An incident in which an unauthorized person gained...
62. (025) When sanitizing sealed disks with a degausser, what...
3. (002) How many steps are in the risk management (RM) process?
4. (002) What is the third step in the risk management (RM) process?
64. (025) How many times should you wipe each active surface of the...
68. (026) When overwriting hard drives, you must examine no less than...
69. (027) Which standard form (SF) label is used as a data descriptor...
76. (028) Equipment with an equipment radiation TEMPEST zone (ERTZ) of...
77. (029) What type of equipment is used for acquisition, storage and...
82. (030) What type of impact occurs when the loss of confidentiality,...
11. (006) How many bits are within an internet protocol version 4...
57. (225) What local communications security management software...
84. (030) How many steps are in the system development life cycle?
2. (201) What allows one electronic key management system (EKMS)...
33. (012) What is assigned to all Department of Defense (DOD)...
10. (204) When a unit receives an unsatisfactory rating on a...
15. (207) For accountability purposes, store short-term keyed devices...
77. (235) Of the four types of comm kits you can build, which one...
17. (208) Which form do you use to document when a safe or vault is...
28. (212) What term is used to describe a communication security...
67. (026) How many years are the records of destruction of a hard...
61. (227) The local management device (LMD) supports or utilizes all...
67. (231) Which communication security (COMSEC) management software is...
45. (219) Which is not an authorized method for routinely destroying...
49. (220) What is the classification of the Standard Form (SF) 153...
6. (003) Which type of network typically provides wireless broadband...
30. (214) What type of incident includes the unauthorized disclosure...
33. (215) Within how many hours from the time a communications...
12. (205) How often does the communications security account manager...
46. (219) Which is not an authorized method to destroy key tapes?
36. (013) Who initiates a local files check prior to allowing...
35. (013) Who is the approval authority for foreign nationals to...
61. (025) Which form is used to annotate that storage media from an...
53. (222) How many people are required to transport Top Secret (TS)...
3. (201) Who appoints a communications security responsible officer...
63. (228) How often must local communications management software...
14. (206) Which form is used to document the highest level...
5. (201) Who is responsible for identifying cryptonet members?
16. (208) Which form do you use to document and annotate opening,...
88. (032) Integrated Network Operations Security Centers (I-NOSC) use...
21. (209) Who appoints a cryptographic access program (CAP)...
87. (031) Who is the connection approval authority for mission...
75. (028) A facility with an inspectable space of more than 20 meters,...
24. (008) Which organization is responsible for developing Air Force...
62. (228) Which type of National Security Agency (NSA)-approved...
54. (020) An incident in which an Air Force computer, information...
60. (024) Which agency conducts assessments of wing information...
7. (202) Who must sign all communications security manager (CAM)...
69. (232) Which communications security (COMSEC) management software...
70. (232) Which communications security (COMSEC) management software...
56. (021) Who tracks Air Force information condition (INFOCON) status...
66. (026) When destroying DVD storage devices, what is the maximum...
68. (231) Which communication security (COMSEC) management software...
85. (031) In which phase of the Department of Defense information...
89. (032) Automated security incident measurement (ASIM) transcripts...