CDCs Ure Vol 1

77 Questions | Attempts: 23
Share
Please wait...
Question 1 / 77
0 %
0/100
Score 0/100
1. What inspection integrates elements of compliance and readiness with new inspection elements to create a new Inspector General (IG) inspection of unit effectiveness?
Submit
Please wait...
About This Quiz
CDCs Ure Vol 1 - Quiz

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. Whose duties include providing assistance, managing staging areas, and records training?
Submit
3. Which stage is NOT one of the Information Technology Infrastructure Library (ITIL) Service Life Cycle stages?
Submit
4. What year did the Air Force institute a single instance of Remedy allowing support to all locations within a single ticketing system?
Submit
5. What Air Force publications are informational and suggest guidance that you can modify to fit the circumstances?
Submit
6. What personnel oversees technical order requirements and distribution within an organization?
Submit
7. What type of non-directive Air Force (AF) publication is not subject to frequent change?
Submit
8. Who is the advisor for all matters affecting the career field?
Submit
9. What automated information system manages the entire lifecycle of information technology (IT) assets from procurement through retirement?
Submit
10. What information Technology Infrastructure Library (ITIL) stage is an overarching stage for maintaining service quality?
Submit
11. What publications are orders issued by the Secretary of the Air Force (SECAF) that contain directive policy statements to initiate, govern, and/or regulate actions within specified areas of responsibility by Air Force activities?
Submit
12. Which type of technical order (TO) has a numerical designator beginning with "31" and covers topics such as basic electronics technology and testing practices?
Submit
13. The vision of Enterprise Information Management (EIM) is to provide tools to empower users to 
Submit
14. What two cyber operation defenses involve continuous monitoring and analyzing and directly counter an adversary penetrating a network or terminating an ongoing intrusion
Submit
15. Who is the final authority to waive career field education training plan (CFETP) requirements to include the completion of the Air Force Specialty (AFS) career development course (CDC)?
Submit
16. The commander, Air Force forces (COMAFFOR) commands an Air Expeditionary Task Force (AETF) and provides unity of command to a 
Submit
17. Who develops standards for interconnect, passive an electro-mechanical (IP&E) electronic components under the American National Standard Institute (ANSI) designation of Electronic Industries Alliance (EIA) standards?
Submit
18. Failure to observe the prohibitions and mandatory provisions of AFMAN 33-153, User responsibilities and Guidance for Information Systems, by military personnel is a violation of what article of the UCMJ?
Submit
19. How many rules are there for effective communication via e-mail?
Submit
20. What basic building block is used in joint force planning and deployments of Aerospace Expeditionary Forces (AEF)?
Submit
21. Who serves as the major command (MAJCOM) voting representative during career field Utilization and Training Workshops (U&TW)?
Submit
22. The Uniform of Military Justice (UCMJ) is derived from what United States Code (USC)?
Submit
23. When Air National Guard personnel in Title 32 status train for cyber operations, what title status must they be in to execute those missions?
Submit
24. Since Military Information Support Operations (MISO) and Public Affairs (PA) share a common specific audience, which activities are designed to mislead?
Submit
25. An employee or employer relationship that leads to the appearance of impartiality or favoritism is an unethical situation known as
Submit
26. Which of these is not an essential element in a Quality Assurance (QA) program?
Submit
27. Who is the second-highest ranking official in the Department of Defense
Submit
28. What major command and numbered Air Force (NAF) were realigned to support the Air Force cyberspace mission?
Submit
29. Which 3D Air Force Specialty (AFS) responsibilities include the deployment, sustainment, troubleshooting, and repairing of standard radio frequency (RF) line-of-sight, wideband and ground based satellite devices
Submit
30. What title is normally assigned to the on-station ranking 3D cyberspace non-commissioned officer (NCO)?
Submit
31. What test your understanding of the original message and your ability to re-state its main purpose?
Submit
32. What department of Defense Directive (DODD) establishes that all authorized users of Department of Defense (DOD) information systems shall receive initial information assurance (IA) awareness orientation as a condition of access and thereafter must complete annual IA refresher awareness?
Submit
33. What unit installs, reconstitute, and test critical C4 systems for combatant commanders anywhere at any time?
Submit
34. Which Quality Assurance (QA) essential element collects, compiles, analyzes, and records data on the process sampled by QA personnel?
Submit
35. What directive publications expire one year after their effective date or when superseded by an Air Force Policy Directive (AFPD)?
Submit
36. Occupational surveys are used to develop the specialty knowledge test (SKT), what tasking is another use for occupational surveys?
Submit
37. What directive publications provide essential procedural guidance on implementing Department of Defense, Air Force, or higher departmental policies and/or laws?
Submit
38. Members of a household or relatives with whom you have a close personal relationship is an example of which type of unethical situation?
Submit
39. Which of the following does NOT describe information outlined in technical order (TO) 00-5-1
Submit
40. What regional computing and data center provide enterprise services like messaging, Web access, and storage?
Submit
41. Which document is NOT considered an official government record?
Submit
42. Which 3D Air Force Specialty (AFS) responsibilities include the installation and maintenance for large-scale network wiring in support of fixed and deployed operations?
Submit
43. What cyberspace weapon system identifies vulnerabilities and provides commanders with a comprehensive assessment of the risk of existing vulnerabilities on critical mission networks?
Submit
44. What reason is the main purpose for consolidating Network Control centers (NCC) and forming the Enterprise Service Desk?
Submit
45. What system manages the distribution and printing of paper technical orders?
Submit
46. Who is responsible for scheduling the Specialty Training Requirements team (STRT)? 
Submit
47. Which enlisted training element is assigned by the supervisor in accordance with (IAW) AFI 36-2201, Air Force Training Program
Submit
48. What two levels are joint task forces (JTF) divided into?
Submit
49. What methodology is used by Air Force for presenting forces to combatant commanders (CCDR)?
Submit
50. What United States Code (USC) title authorizes the creation of the Department of Defense (DOD) as an executive component of government and establishes all subordinate agencies including the Army, Navy, Air Force, and Marine Corps?
Submit
51. What program provides training for personnel to attain knowledge and skill qualifications required to perform duty in their specialty?
Submit
52. Which evaluation is NOT an assessment type in a Quality Assurance (QA) program?
Submit
53. Which unit within the Air Force Network Operations (AFNetOps) community has a goal to reduce training and increase the warfighter capacity?
Submit
54. What type of Department of Defense Directive (DODD) establishes Office of the Secretary of Defense (OSD) component heads and other agencies official mission, responsibilities, function, relationships and authority?
Submit
55. How many different types of Department of Defense Instructions (DODI) are there?
Submit
56. What directive publication prescribes the mission, area of responsibility, organization and relationships of MAJCOMs, FOAs, and DRUs with their respective units?
Submit
57. What action is the main goal of the utilization and training workshop (U&TW)?
Submit
58. What document directs the development of the National Military Strategic Plan for Securing Cyberspace?
Submit
59. What entity assigns numbers to Department of Defense (DOD) issuances based on the established subject groups and sub subject groups?
Submit
60. Records that are considered to be in draft format
Submit
61. How many workflow capabilities are available to you on a Sharepoint Server?
Submit
62. What joint publication (JP) is the keystone document for the communications-system series of publications?
Submit
63. What cyberspace weapon system resulted from an operational initiative to consolidate numerous major command (MAJCOM) specific stove-piped networks into a centrally managed and controlled network under three Integrated Network Operations and Security Centers (I-NOSC)?
Submit
64. Who may post an update to a technical order assuming they are trained and authorized access to the data?
Submit
65. Which agency is responsible fro matters pertaining to the identification, prioritization and remediation of critical Global Information Grid (GIG) infrastructure
Submit
66. Which Air Force Instruction (AFI) defines an "official government record?"
Submit
67. Which policy has prevention of cyber attacks against America's critical infrastructure as a key strategic priority?
Submit
68. Who assists with the identification of qualified subject matter experts (SME) to help with the development of your specialty knowledge test (SKT) and your career development course (CDC)? 
Submit
69. Who has the authority to appoint record custodians within an office of record?
Submit
70. Proactive defense is one of the four integrated sub-disciplines of what cyberspace defense weapon system?
Submit
71. Who is appointed at each base-level unit principal staff office within a Air Force organization or contractor to perform records management?
Submit
72. What cyberspace weapon system is the top-level boundary and entry point into the Air Force Information Network (AFIN)
Submit
73. Who is charged with the duties of establishing training programs for newly appointed base records managers?
Submit
74. What policy outlines the United States (US) Armed Forces comprehensive strategic approach for using cyberspace operations to assure US military strategic superiority in the cyber domain?
Submit
75. What document spells out the comprehensive strategy for the United states to secure cyberspace?
Submit
76. What cyberspace weapon system ensures unfettered access, mission assurance and joint warfighter use of networks and information processing systems to accomplish worldwide operations?
Submit
77. What cyberspace weapon system includes the Integrate Network Operations Security Center (I-NOSC), Enterprise Service Unit (ESU) and Area Processing Center (APC) functions? 
Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2022 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 29, 2020
    Quiz Created by
    Ilianadavila10
Cancel
  • All
    All (77)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What inspection integrates elements of compliance and readiness with...
Whose duties include providing assistance, managing staging areas, and...
Which stage is NOT one of the Information Technology Infrastructure...
What year did the Air Force institute a single instance of Remedy...
What Air Force publications are informational and suggest guidance...
What personnel oversees technical order requirements and distribution...
What type of non-directive Air Force (AF) publication is not subject...
Who is the advisor for all matters affecting the career field?
What automated information system manages the entire lifecycle of...
What information Technology Infrastructure Library (ITIL) stage is an...
What publications are orders issued by the Secretary of the Air Force...
Which type of technical order (TO) has a numerical designator...
The vision of Enterprise Information Management (EIM) is to provide...
What two cyber operation defenses involve continuous monitoring and...
Who is the final authority to waive career field education training...
The commander, Air Force forces (COMAFFOR) commands an Air...
Who develops standards for interconnect, passive an electro-mechanical...
Failure to observe the prohibitions and mandatory provisions of AFMAN...
How many rules are there for effective communication via e-mail?
What basic building block is used in joint force planning and...
Who serves as the major command (MAJCOM) voting representative during...
The Uniform of Military Justice (UCMJ) is derived from what United...
When Air National Guard personnel in Title 32 status train for cyber...
Since Military Information Support Operations (MISO) and Public...
An employee or employer relationship that leads to the appearance of...
Which of these is not an essential element in a Quality Assurance (QA)...
Who is the second-highest ranking official in the Department of...
What major command and numbered Air Force (NAF) were realigned to...
Which 3D Air Force Specialty (AFS) responsibilities include the...
What title is normally assigned to the on-station ranking 3D...
What test your understanding of the original message and your ability...
What department of Defense Directive (DODD) establishes that all...
What unit installs, reconstitute, and test critical C4 systems for...
Which Quality Assurance (QA) essential element collects, compiles,...
What directive publications expire one year after their effective date...
Occupational surveys are used to develop the specialty knowledge test...
What directive publications provide essential procedural guidance on...
Members of a household or relatives with whom you have a close...
Which of the following does NOT describe information outlined in...
What regional computing and data center provide enterprise services...
Which document is NOT considered an official government record?
Which 3D Air Force Specialty (AFS) responsibilities include the...
What cyberspace weapon system identifies vulnerabilities and provides...
What reason is the main purpose for consolidating Network Control...
What system manages the distribution and printing of paper technical...
Who is responsible for scheduling the Specialty Training Requirements...
Which enlisted training element is assigned by the supervisor in...
What two levels are joint task forces (JTF) divided into?
What methodology is used by Air Force for presenting forces to...
What United States Code (USC) title authorizes the creation of the...
What program provides training for personnel to attain knowledge and...
Which evaluation is NOT an assessment type in a Quality Assurance (QA)...
Which unit within the Air Force Network Operations (AFNetOps)...
What type of Department of Defense Directive (DODD) establishes Office...
How many different types of Department of Defense Instructions (DODI)...
What directive publication prescribes the mission, area of...
What action is the main goal of the utilization and training workshop...
What document directs the development of the National Military...
What entity assigns numbers to Department of Defense (DOD) issuances...
Records that are considered to be in draft format
How many workflow capabilities are available to you on a Sharepoint...
What joint publication (JP) is the keystone document for the...
What cyberspace weapon system resulted from an operational initiative...
Who may post an update to a technical order assuming they are trained...
Which agency is responsible fro matters pertaining to the...
Which Air Force Instruction (AFI) defines an "official government...
Which policy has prevention of cyber attacks against America's...
Who assists with the identification of qualified subject matter...
Who has the authority to appoint record custodians within an office of...
Proactive defense is one of the four integrated sub-disciplines of...
Who is appointed at each base-level unit principal staff office within...
What cyberspace weapon system is the top-level boundary and entry...
Who is charged with the duties of establishing training programs for...
What policy outlines the United States (US) Armed Forces comprehensive...
What document spells out the comprehensive strategy for the United...
What cyberspace weapon system ensures unfettered access, mission...
What cyberspace weapon system includes the Integrate Network...
Alert!

Advertisement