5. (002) Human error causes approximately what percentage of all...
8. (004) Which of the following is not an example of unbound media?
24. (210) How often should communications security (COMSEC) access...
48. (220) Sign the communication security (COMSEC) material...
7. (004) Which bound media has a core surrounded by cladding and a...
9. (005) In which topology does a device wanting to communicate with...
18. (008) A logical connection point for the transmission of...
26. (009) Which type of transition technology is used to set up secure...
39. (014) Which common access card (CAC) certificate would be used to...
41. (014) The contract manager must use what agency to validate a...
46. (018) Weaknesses or holes in a security system are considered
58. (023) What determines the number of alternate information...
19. (008) Which port range constitutes well-known ports?
20. (008) Which port is used for telnet?
21. (008) Which port is used for hypertext transfer protocol (HTTP)?
23. (008) Which type of scan is also known as a half open scan?
30. (011) What is the newest WiFi networking standard that is widely...
37. (014) The definition of integrity as it’s applied to...
47. (018) Which of the following options is not involved when securing...
52. (019) The two fundamental concepts of network security are
23. (210) Which type of security clearance is not valid for personnel...
44. (219) Who may destroy communications security (COMSEC) material?
54. (223) When you are performing courier duties and transporting...
55. (224) How many times do you wrap communications security (COMSEC)...
4. (002) What is the third step in the risk management (RM) process?
14. (006) The sequence of leading bits in an internet protocol (IP)...
17. (007) Which protocol is an Internet Engineering Task Force (IETF)...
40. (014) What does the common access card (CAC) certificate used to...
42. (015) Which of the following represents a strong password?
51. (019) A program that contains or installs a malicious program is...
74. (028) Which term identifies any equipment or area in which...
83. (030) In which information assurance control must an organization...
86. (031) What is the minimum rank the AF Information Network (AFIN)...
90. (033) Which of the following is not a phase in the information...
19. (209) Which of the following requirements would make a person...
39. (217) When you are sealing a package containing communications...
41. (218) Changes that must be made to material in communication...
52. (222) How many people must unwrap the inner wrapper of a top...
79. (235) Comm kits are normally contained in
2. (001) Which career field deploys, sustains, troubleshoots, and...
16. (007) Which transmission control protocol (TCP) port is used by...
38. (014) Logon and password management screens must be encrypted with...
43. (016) Which category of information must be stored on removable...
44. (017) Users who perform troubleshooting, configuration changes, or...
78. (029) Who is the installation’s focal point for emission...
26. (211) At a minimum, how often must you review the communications...
43. (219) Who requests disposition instructions for communications...
50. (221) Two-person integrity (TPI) is the storage and handling...
51. (221) What provides the special protection of Top Secret (TS)...
64. (229) The front of the KOK–22A device fill connector allows...
65. (229) On the back of the KOK–22A, which interface allows you to...
1. (001) Which of the following is a duty performed by a cyber surety...
12. (006) Which class of internet protocol (IP) addresses is only used...
13. (006) Which internet protocol (IP) address is used for limited...
15. (007) Which protocol does the Internet support as the...
34. (013) Which of the following is not a result of initial...
49. (018) When vulnerabilities are discovered within the Windows...
50. (019) A companion file virus is one that
59. (024) What is the minimum grade requirement for an information...
63. (025) Where are thermal transfer and dye sublimation cartridges...
64. (025) How many times should you wipe each active surface of the...
67. (026) How many years are the records of destruction of a hard...
4. (201) Who assists the communications security account manager (CAM)...
Match the following
71. (233) Who provides formal classroom training to instruct aircrews...
72. (233) What squadron are Combat Crew Communications (CCC) units...
73. (234) Combat Crew Communications (CCC) Level 2 certification...
75. (234) Which code helps the Air Force identify special experience...
29. (011) Which is the slowest yet least expensive WiFi standard?
32. (012) Defense-in-depth is the Department of Defense (DOD) approach...
55. (020) When classified information is inadvertently sent through...
65. (025) How often must a degausser be recertified during its first 2...
70. (027) Who has the authority to impose restrictions upon and...
79. (029) An emission security (EMSEC) manager documents an EMSEC...
2. (201) What allows one electronic key management system (EKMS)...
28. (212) What term is used to describe a communication security...
36. (215) A communications security account manager (CAM) submits an...
38. (217) When you create a communication security physical inventory...
57. (225) What local communications security management software...
6. (003) Which type of network typically provides wireless broadband...
10. (006) When viewed in binary form, each octet within an Internet...
22. (008) In which type of port scan does the scanner connect to the...
31. (011) Which wireless standard was originally intended to create a...
57. (022) Continuity of operations plans (COOP) are not used in which...
66. (026) When destroying DVD storage devices, what is the maximum...
71. (027) Which standard form (SF) is used to record the opening and...
73. (027) An installation commander can authorize keeping which...
29. (213) When an error or anomaly is detected upon receipt/inspection...
34. (215) The rank requirement for an inquiry officer includes all of...
Which one do you like?
58. (226) Which statement is not accurate regarding firefly...
76. (235) Who is responsible for building, issuing, and recovering...
28. (010) Administrators must be in the habit of doing what to make it...
48. (018) Which UNIX command allows remote logins?
1. (201) What is a collection of interoperable systems developed for...
11. (205) Who performs the semiannual inspections and audits on the...
35. (215) Who completes an initial report for each communications...
37. (216) When removing material from a communication security...
84. (236) What type of change notice is not scheduled and is only...
11. (006) How many bits are within an internet protocol version 4...
33. (012) What is assigned to all Department of Defense (DOD)...
45. (017) Which device provides the initial entry point into a...
Which one do you like?
13. (206) Qualified personnel perform preventative maintenance and...
59. (226) The simple key loader (SKL) is the replacement for which...
81. (236) Flight Information Publications (FLIP) are divided into how...
25. (009) How is an Internet protocol version 6 (IPv6) address...
Which one do you like?
72. (027) Personnel removing top secret material from storage must use
82. (030) What type of impact occurs when the loss of confidentiality,...
88. (032) Integrated Network Operations Security Centers (I-NOSC) use...
6. (202) Who requires that the communications security account manager...
25. (210) At the base level, who initials the communications security...
33. (215) Within how many hours from the time a communications...
40. (217) How often must a communications security account manager...
42. (218) How many people are required to complete page replacements...
63. (228) How often must local communications management software...
77. (235) Of the four types of comm kits you can build, which one...
69. (027) Which standard form (SF) label is used as a data descriptor...
8. (203) Who assists the communications security account manager (CAM)...
31. (214) What type of communications security (COMSEC) incident is...
53. (222) How many people are required to transport Top Secret (TS)...
74. (234) Once entered into Combat Crew Communications (CCC) Level 1...
82. (236) Which documents are designed to provide aircrews with...
83. (236) Flight Information Handbooks (FIH) are issued every
62. (025) When sanitizing sealed disks with a degausser, what...
77. (029) What type of equipment is used for acquisition, storage and...
22. (209) Who is responsible for overseeing the cryptographic access...
56. (224) Which method is not used to complete a bulk encrypted...
3. (002) How many steps are in the risk management (RM) process?
75. (028) A facility with an inspectable space of more than 20 meters,...
32. (215) Report communications security (COMSEC) deviations and...
46. (219) Which is not an authorized method to destroy key tapes?
61. (227) The local management device (LMD) supports or utilizes all...
78. (235) What comm kit type do you build for emergency war orders...
85. (236) Which squadron commander must be notified before outdated...
85. (031) In which phase of the Department of Defense information...
18. (208) Which form do you use to record the arrival or departure of...
20. (209) Those not eligible to be enrolled in the cryptographic...
45. (219) Which is not an authorized method for routinely destroying...
47. (220) What form serves as the destruction certificate for...
5. (201) Who is responsible for identifying cryptonet members?
10. (204) When a unit receives an unsatisfactory rating on a...
54. (020) An incident in which an Air Force computer, information...
7. (202) Who must sign all communications security manager (CAM)...
61. (025) Which form is used to annotate that storage media from an...
80. (029) Once it is filled out an AF Form 4170, Emission Security...
9. (204) Wing information assurance (IA) assessments are generally...
15. (207) For accountability purposes, store short-term keyed devices...
60. (227) What classification of communication security (COMSEC)...
66. (230) What is the classification of magnetic media used to...
60. (024) Which agency conducts assessments of wing information...
12. (205) How often does the communications security account manager...
16. (208) Which form do you use to document and annotate opening,...
30. (214) What type of incident includes the unauthorized disclosure...
80. (236) Which is not a flight phase that Flight Information...
27. (010) Networked resources must be consistently monitored and...
68. (026) When overwriting hard drives, you must examine no less than...
81. (030) How many steps are in the risk management framework process?
87. (031) Who is the connection approval authority for mission...
27. (212) What is the term used to identify the highest level of...
49. (220) What is the classification of the Standard Form (SF) 153...
67. (231) Which communication security (COMSEC) management software is...
56. (021) Who tracks Air Force information condition (INFOCON) status...
84. (030) How many steps are in the system development life cycle?
24. (008) Which organization is responsible for developing Air Force...
36. (013) Who initiates a local files check prior to allowing...
69. (232) Which communications security (COMSEC) management software...
76. (028) Equipment with an equipment radiation TEMPEST zone (ERTZ) of...
89. (032) Automated security incident measurement (ASIM) transcripts...
17. (208) Which form do you use to document when a safe or vault is...
35. (013) Who is the approval authority for foreign nationals to...
68. (231) Which communication security (COMSEC) management software...
70. (232) Which communications security (COMSEC) management software...
53. (020) An incident in which an unauthorized person gained...
3. (201) Who appoints a communications security responsible officer...
62. (228) Which type of National Security Agency (NSA)-approved...
21. (209) Who appoints a cryptographic access program (CAP)...
14. (206) Which form is used to document the highest level...