CDCs Ure Vol 1

77 Questions | Attempts: 23
Please wait...
Question 1 / 78
🏆 Rank #--
Score 0/100

1. What inspection integrates elements of compliance and readiness with new inspection elements to create a new Inspector General (IG) inspection of unit effectiveness?

Submit
Please wait...
About This Quiz
CDCs Ure Vol 1 - Quiz

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. Whose duties include providing assistance, managing staging areas, and records training?

Submit

3. Which stage is NOT one of the Information Technology Infrastructure Library (ITIL) Service Life Cycle stages?

Submit

4. What year did the Air Force institute a single instance of Remedy allowing support to all locations within a single ticketing system?

Submit

5. What Air Force publications are informational and suggest guidance that you can modify to fit the circumstances?

Submit

6. What personnel oversees technical order requirements and distribution within an organization?

Submit

7. What type of non-directive Air Force (AF) publication is not subject to frequent change?

Submit

8. Who is the advisor for all matters affecting the career field?

Submit

9. What automated information system manages the entire lifecycle of information technology (IT) assets from procurement through retirement?

Submit

10. What information Technology Infrastructure Library (ITIL) stage is an overarching stage for maintaining service quality?

Submit

11. What publications are orders issued by the Secretary of the Air Force (SECAF) that contain directive policy statements to initiate, govern, and/or regulate actions within specified areas of responsibility by Air Force activities?

Submit

12. Which type of technical order (TO) has a numerical designator beginning with "31" and covers topics such as basic electronics technology and testing practices?

Submit

13. The vision of Enterprise Information Management (EIM) is to provide tools to empower users to 

Submit

14. What two cyber operation defenses involve continuous monitoring and analyzing and directly counter an adversary penetrating a network or terminating an ongoing intrusion

Submit

15. Who is the final authority to waive career field education training plan (CFETP) requirements to include the completion of the Air Force Specialty (AFS) career development course (CDC)?

Submit

16. The commander, Air Force forces (COMAFFOR) commands an Air Expeditionary Task Force (AETF) and provides unity of command to a 

Submit

17. Who develops standards for interconnect, passive an electro-mechanical (IP&E) electronic components under the American National Standard Institute (ANSI) designation of Electronic Industries Alliance (EIA) standards?

Submit

18. Failure to observe the prohibitions and mandatory provisions of AFMAN 33-153, User responsibilities and Guidance for Information Systems, by military personnel is a violation of what article of the UCMJ?

Submit

19. How many rules are there for effective communication via e-mail?

Submit

20. What basic building block is used in joint force planning and deployments of Aerospace Expeditionary Forces (AEF)?

Submit

21. Who serves as the major command (MAJCOM) voting representative during career field Utilization and Training Workshops (U&TW)?

Submit

22. The Uniform of Military Justice (UCMJ) is derived from what United States Code (USC)?

Submit

23. When Air National Guard personnel in Title 32 status train for cyber operations, what title status must they be in to execute those missions?

Submit

24. Since Military Information Support Operations (MISO) and Public Affairs (PA) share a common specific audience, which activities are designed to mislead?

Submit

25. An employee or employer relationship that leads to the appearance of impartiality or favoritism is an unethical situation known as

Submit

26. Which of these is not an essential element in a Quality Assurance (QA) program?

Submit

27. Who is the second-highest ranking official in the Department of Defense

Submit

28. What major command and numbered Air Force (NAF) were realigned to support the Air Force cyberspace mission?

Submit

29. Which 3D Air Force Specialty (AFS) responsibilities include the deployment, sustainment, troubleshooting, and repairing of standard radio frequency (RF) line-of-sight, wideband and ground based satellite devices

Submit

30. What title is normally assigned to the on-station ranking 3D cyberspace non-commissioned officer (NCO)?

Submit

31. What test your understanding of the original message and your ability to re-state its main purpose?

Submit

32. What department of Defense Directive (DODD) establishes that all authorized users of Department of Defense (DOD) information systems shall receive initial information assurance (IA) awareness orientation as a condition of access and thereafter must complete annual IA refresher awareness?

Submit

33. What unit installs, reconstitute, and test critical C4 systems for combatant commanders anywhere at any time?

Submit

34. Which Quality Assurance (QA) essential element collects, compiles, analyzes, and records data on the process sampled by QA personnel?

Submit

35. What directive publications expire one year after their effective date or when superseded by an Air Force Policy Directive (AFPD)?

Submit

36. Occupational surveys are used to develop the specialty knowledge test (SKT), what tasking is another use for occupational surveys?

Submit

37. What directive publications provide essential procedural guidance on implementing Department of Defense, Air Force, or higher departmental policies and/or laws?

Submit

38. Members of a household or relatives with whom you have a close personal relationship is an example of which type of unethical situation?

Submit

39. Which of the following does NOT describe information outlined in technical order (TO) 00-5-1

Submit

40. What regional computing and data center provide enterprise services like messaging, Web access, and storage?

Submit

41. Which document is NOT considered an official government record?

Submit

42. Which 3D Air Force Specialty (AFS) responsibilities include the installation and maintenance for large-scale network wiring in support of fixed and deployed operations?

Submit

43. What cyberspace weapon system identifies vulnerabilities and provides commanders with a comprehensive assessment of the risk of existing vulnerabilities on critical mission networks?

Submit

44. What reason is the main purpose for consolidating Network Control centers (NCC) and forming the Enterprise Service Desk?

Submit

45. What system manages the distribution and printing of paper technical orders?

Submit

46. Who is responsible for scheduling the Specialty Training Requirements team (STRT)? 

Submit

47. Which enlisted training element is assigned by the supervisor in accordance with (IAW) AFI 36-2201, Air Force Training Program

Submit

48. What two levels are joint task forces (JTF) divided into?

Submit

49. What methodology is used by Air Force for presenting forces to combatant commanders (CCDR)?

Submit

50. What United States Code (USC) title authorizes the creation of the Department of Defense (DOD) as an executive component of government and establishes all subordinate agencies including the Army, Navy, Air Force, and Marine Corps?

Submit

51. What program provides training for personnel to attain knowledge and skill qualifications required to perform duty in their specialty?

Submit

52. Which evaluation is NOT an assessment type in a Quality Assurance (QA) program?

Submit

53. Which unit within the Air Force Network Operations (AFNetOps) community has a goal to reduce training and increase the warfighter capacity?

Submit

54. What type of Department of Defense Directive (DODD) establishes Office of the Secretary of Defense (OSD) component heads and other agencies official mission, responsibilities, function, relationships and authority?

Submit

55. How many different types of Department of Defense Instructions (DODI) are there?

Submit

56. What directive publication prescribes the mission, area of responsibility, organization and relationships of MAJCOMs, FOAs, and DRUs with their respective units?

Submit

57. What action is the main goal of the utilization and training workshop (U&TW)?

Submit

58. What document directs the development of the National Military Strategic Plan for Securing Cyberspace?

Submit

59. What entity assigns numbers to Department of Defense (DOD) issuances based on the established subject groups and sub subject groups?

Submit

60. Records that are considered to be in draft format

Submit

61. How many workflow capabilities are available to you on a Sharepoint Server?

Submit

62. What joint publication (JP) is the keystone document for the communications-system series of publications?

Submit

63. What cyberspace weapon system resulted from an operational initiative to consolidate numerous major command (MAJCOM) specific stove-piped networks into a centrally managed and controlled network under three Integrated Network Operations and Security Centers (I-NOSC)?

Submit

64. Who may post an update to a technical order assuming they are trained and authorized access to the data?

Submit

65. Which agency is responsible fro matters pertaining to the identification, prioritization and remediation of critical Global Information Grid (GIG) infrastructure

Submit

66. Which Air Force Instruction (AFI) defines an "official government record?"

Submit

67. Which policy has prevention of cyber attacks against America's critical infrastructure as a key strategic priority?

Submit

68. Who assists with the identification of qualified subject matter experts (SME) to help with the development of your specialty knowledge test (SKT) and your career development course (CDC)? 

Submit

69. Who has the authority to appoint record custodians within an office of record?

Submit

70. Proactive defense is one of the four integrated sub-disciplines of what cyberspace defense weapon system?

Submit

71. Who is appointed at each base-level unit principal staff office within a Air Force organization or contractor to perform records management?

Submit

72. What cyberspace weapon system is the top-level boundary and entry point into the Air Force Information Network (AFIN)

Submit

73. Who is charged with the duties of establishing training programs for newly appointed base records managers?

Submit

74. What policy outlines the United States (US) Armed Forces comprehensive strategic approach for using cyberspace operations to assure US military strategic superiority in the cyber domain?

Submit

75. What document spells out the comprehensive strategy for the United states to secure cyberspace?

Submit

76. What cyberspace weapon system ensures unfettered access, mission assurance and joint warfighter use of networks and information processing systems to accomplish worldwide operations?

Submit

77. What cyberspace weapon system includes the Integrate Network Operations Security Center (I-NOSC), Enterprise Service Unit (ESU) and Area Processing Center (APC) functions? 

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (77)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What inspection integrates elements of compliance and readiness with...
Whose duties include providing assistance, managing staging areas, and...
Which stage is NOT one of the Information Technology Infrastructure...
What year did the Air Force institute a single instance of Remedy...
What Air Force publications are informational and suggest guidance...
What personnel oversees technical order requirements and distribution...
What type of non-directive Air Force (AF) publication is not subject...
Who is the advisor for all matters affecting the career field?
What automated information system manages the entire lifecycle of...
What information Technology Infrastructure Library (ITIL) stage is an...
What publications are orders issued by the Secretary of the Air Force...
Which type of technical order (TO) has a numerical designator...
The vision of Enterprise Information Management (EIM) is to provide...
What two cyber operation defenses involve continuous monitoring and...
Who is the final authority to waive career field education training...
The commander, Air Force forces (COMAFFOR) commands an Air...
Who develops standards for interconnect, passive an electro-mechanical...
Failure to observe the prohibitions and mandatory provisions of AFMAN...
How many rules are there for effective communication via e-mail?
What basic building block is used in joint force planning and...
Who serves as the major command (MAJCOM) voting representative during...
The Uniform of Military Justice (UCMJ) is derived from what United...
When Air National Guard personnel in Title 32 status train for cyber...
Since Military Information Support Operations (MISO) and Public...
An employee or employer relationship that leads to the appearance of...
Which of these is not an essential element in a Quality Assurance (QA)...
Who is the second-highest ranking official in the Department of...
What major command and numbered Air Force (NAF) were realigned to...
Which 3D Air Force Specialty (AFS) responsibilities include the...
What title is normally assigned to the on-station ranking 3D...
What test your understanding of the original message and your ability...
What department of Defense Directive (DODD) establishes that all...
What unit installs, reconstitute, and test critical C4 systems for...
Which Quality Assurance (QA) essential element collects, compiles,...
What directive publications expire one year after their effective date...
Occupational surveys are used to develop the specialty knowledge test...
What directive publications provide essential procedural guidance on...
Members of a household or relatives with whom you have a close...
Which of the following does NOT describe information outlined in...
What regional computing and data center provide enterprise services...
Which document is NOT considered an official government record?
Which 3D Air Force Specialty (AFS) responsibilities include the...
What cyberspace weapon system identifies vulnerabilities and provides...
What reason is the main purpose for consolidating Network Control...
What system manages the distribution and printing of paper technical...
Who is responsible for scheduling the Specialty Training Requirements...
Which enlisted training element is assigned by the supervisor in...
What two levels are joint task forces (JTF) divided into?
What methodology is used by Air Force for presenting forces to...
What United States Code (USC) title authorizes the creation of the...
What program provides training for personnel to attain knowledge and...
Which evaluation is NOT an assessment type in a Quality Assurance (QA)...
Which unit within the Air Force Network Operations (AFNetOps)...
What type of Department of Defense Directive (DODD) establishes Office...
How many different types of Department of Defense Instructions (DODI)...
What directive publication prescribes the mission, area of...
What action is the main goal of the utilization and training workshop...
What document directs the development of the National Military...
What entity assigns numbers to Department of Defense (DOD) issuances...
Records that are considered to be in draft format
How many workflow capabilities are available to you on a Sharepoint...
What joint publication (JP) is the keystone document for the...
What cyberspace weapon system resulted from an operational initiative...
Who may post an update to a technical order assuming they are trained...
Which agency is responsible fro matters pertaining to the...
Which Air Force Instruction (AFI) defines an "official government...
Which policy has prevention of cyber attacks against America's...
Who assists with the identification of qualified subject matter...
Who has the authority to appoint record custodians within an office of...
Proactive defense is one of the four integrated sub-disciplines of...
Who is appointed at each base-level unit principal staff office within...
What cyberspace weapon system is the top-level boundary and entry...
Who is charged with the duties of establishing training programs for...
What policy outlines the United States (US) Armed Forces comprehensive...
What document spells out the comprehensive strategy for the United...
What cyberspace weapon system ensures unfettered access, mission...
What cyberspace weapon system includes the Integrate Network...
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!