Z3dx5x Volume 1 Dumb Questions

19 Questions | Total Attempts: 74

SettingsSettingsSettings
Z3dx5x Volume 1 Dumb Questions - Quiz


Questions and Answers
  • 1. 
    Proactive defense is one of the four integrated sub-disciplines of what cyberspace defense weapon system?
    • A. 

      Air Force Cyber Security and Control System Air Force Cyber Security and Control System

    • B. 

      Air Force Cyberspace Defense Weapon System

    • C. 

      Air Force Cyber Command and Control Mission System

    • D. 

      Air Force Intranet Control Weapon System

  • 2. 
    Who has the authority to appoint record custodians within an office of record?
    • A. 

      Functional area records manager

    • B. 

      Base records manager

    • C. 

      Command records manager

    • D. 

      Chief of the Office of Records

  • 3. 
    Who is appointed at each base-level unit principal staff office within an Air Force organization or contractor to perform records management?
    • A. 

      Functional area records manager

    • B. 

      Base records manager

    • C. 

      Chief of Office of Records.

    • D. 

      Command records manager

  • 4. 
    Whose duties include providing assistance, managing staging areas, and records training?
    • A. 

      Command records manager.

    • B. 

      Chief of Office of Records

    • C. 

      Functional area records manager.

    • D. 

      Base records manager.

  • 5. 
    Who is charged with the duties of establishing training programs for newly appointed base records managers?
    • A. 

      Chief of Office of Records.

    • B. 

      Base records manager.

    • C. 

      Functional area records manager.

    • D. 

      Command records manager.

  • 6. 
    What directive publication prescribes the mission, area of responsibility, organization and relationships of MAJCOMs, FOAs, and DRUs with their respective units?
    • A. 

      Air Force Policy Memorandums (AFPM).

    • B. 

      Air Force Instructions (AFI).

    • C. 

      Air Force Mission Directives (AFMD).

    • D. 

      Air Force Policy Directives (AFPD).

  • 7. 
    What cyberspace weapon system includes the Integrate Network Operations Security Center (I-NOSC), Enterprise Service Unit (ESU) and Area Processing Center (APC) functions?
    • A. 

      Air Force Cyber Command and Control Mission System.

    • B. 

      Air Force Intranet Control Weapon System.

    • C. 

      Air Force Cyberspace Defense Weapon System.

    • D. 

      Air Force Cyber Security and Control System.

  • 8. 
    Who is the final authority to waive career field education training plan (CFETP) requirements to include the completion of the Air Force Specialty (AFS) career development course (CDC)?
    • A. 

      Base functional manager (BFM).

    • B. 

      Air Force career field manager (AFCFM).

    • C. 

      Major command functional manager (MFM).

    • D. 

      Unit training manager (UTM).

  • 9. 
    What directive ​publications provide essential procedural guidance on implementing Department of Defense, Air Force, or higher departmental policies and/or laws?
    • A. 

      Air Force Mission Directives (AFMD).

    • B. 

      Air Force Policy Directives (AFPD).

    • C. 

      Air Force Policy Memorandums (AFPM).

    • D. 

      Air Force Instructions (AFI).

  • 10. 
    Who serves as the major command (MAJCOM) voting representative during career field Utilization and Training Workshops (U&TW)?
    • A. 

      Unit training manager (UTM).

    • B. 

      Air Force career field manager (AFCFM).

    • C. 

      Base functional manager (BFM).

    • D. 

      Major command functional manager (MFM).

  • 11. 
    Which policy has prevention of cyber attacks against America's critical infrastructure as a key strategic priority?
    • A. 

      National Security Policy.

    • B. 

      Comprehensive National Cybersecurity Initiative.

    • C. 

      National Military Strategy for Cyberspace Operations.

    • D. 

      National Strategy to Secure Cyberspace.

  • 12. 
    What cyberspace weapon system is the top-level boundary and entry point into the Air Force Information Network (AFIN)?
    • A. 

      Air Force Cyber Security and Control System

    • B. 

      Air Force Cyber Command and Control Mission System.

    • C. 

      Air Force Intranet Control Weapon System.

    • D. 

      Air Force Cyberspace Defense Weapon System

  • 13. 
    What cyberspace weapon system resulted from an operational initiative to consolidate numerous major command (MAJCOM) specific stove-piped networks into a centrally managed and controlled network under three Integrated Network Operations and Security Centers (I-NOSC)?   
    • A. 

      Air Force Cyberspace Defense Weapon System.

    • B. 

      Air Force Intranet Control Weapon System.

    • C. 

      Air Force Cyber Command and Control Mission System.

    • D. 

      Air Force Cyber Security and Control System.

  • 14. 
    What cyberspace weapon system ensures unfettered access, mission assurance and joint warfighter use of networks and information processing systems to accomplish worldwide operations?
    • A. 

      Air Force Cyber Command and Control Mission System.

    • B. 

      Air Force Cyberspace Defense Weapon System.

    • C. 

      Air Force Intranet Control Weapons System.

    • D. 

      Air Force Cyber Security and Control System.

  • 15. 
    What cyberspace weapon system identifies vulnerabilities and provides commanders with a comprehensive assessment of the risk of existing vulnerabilities on critical mission networks?   
    • A. 

      Cyberspace Defense Analysis Weapon System

    • B. 

      Air Force Cyber Command and Control Mission System

    • C. 

      Air Force Intranet Control Weapons System.

    • D. 

      Cyberspace Vulnerability Assessment/Hunter Weapon System

  • 16. 
    What document spells out the comprehensive strategy for the United States to secure cyberspace?
    • A. 

      National Military Strategy for Cyberspace.

    • B. 

      National Military Cyberspace Strategy.

    • C. 

      National Military Strategy to Secure Cyberspace.

    • D. 

      National Strategy to Secure Cyberspace.

  • 17. 
    What publications are orders issued by the Secretary of the Air Force (SECAF) that contain directive policy statements to initiate, govern, and/or regulate actions within specified areas of responsibility by Air Force activities?
    • A. 

      Air Force Mission Directives (AFMD).

    • B. 

      Air Force Instructions (AFI).

    • C. 

      Air Force Policy Directives (AFPD).

    • D. 

      Air Force Policy Memorandums (AFPM).

  • 18. 
    Who assists with the identification of qualified subject matter experts (SME) to help with the development of your specialty knowledge test (SKT) and your career development course (CDC)?
    • A. 

      Air Force career field manager (AFCFM).

    • B. 

      Unit training manager (UTM).

    • C. 

      Major command functional manager (MFM).

    • D. 

      Base functional manager (BFM).

  • 19. 
    What policy outlines the United States (US) Armed Forces' comprehensive strategic approach for using cyberspace operations to assure US military strategic superiority in the cyber domain?  
    • A. 

      National Military Strategy for Cyberspace Operations.

    • B. 

      National Security Policy.

    • C. 

      Comprehensive National Cybersecurity Initiative.

    • D. 

      National Strategy to Secure Cyberspace.

Back to Top Back to top