3DX7X - Volume 1&2 Ure 170 Questions.

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Bgilb00c
B
Bgilb00c
Community Contributor
Quizzes Created: 1 | Total Attempts: 7,411
| Attempts: 7,411 | Questions: 170
Please wait...
Question 1 / 170
0 %
0/100
Score 0/100
1. (027) Which identity management process uses a fingerprint to authenticate a user?

Explanation

Biometrics is the correct answer because it is the identity management process that uses a fingerprint to authenticate a user. Biometrics refers to the measurement and analysis of unique physical or behavioral characteristics, such as fingerprints, to verify an individual's identity. By using a fingerprint, biometric systems can accurately identify and authenticate users, providing a high level of security and convenience.

Submit
Please wait...
About This Quiz
Air Force Quizzes & Trivia

This quiz should only be used as reference material and does not include all the questions that may be given on the final test. It is also possible... see morethat there were errors made in the creation of this quiz and as such should be considered with caution and not be used as the sole source of study material(s). This quiz contains ONLY the questions that are outlined in the Unit Review Exercises (UREs). see less

2. (023) What is the most common wireless networking standard?

Explanation

The most common wireless networking standard is 802.11. This standard is widely used for Wi-Fi networks and allows for wireless communication between devices such as computers, smartphones, and routers. It provides fast and reliable connections, making it the preferred choice for most wireless networks.

Submit
3. (027) Which threat vector is considered more of an annoyance than an attack?

Explanation

Spam is considered more of an annoyance than an attack because it involves the mass sending of unsolicited and unwanted messages, typically through email. While spam can be a nuisance and waste of time, it does not typically pose a direct threat to the security or integrity of a system or personal information. On the other hand, viruses, spyware, and phishing attacks are designed to infiltrate, damage, or steal sensitive data, making them more dangerous and malicious threat vectors.

Submit
4. (027) Which vulnerability preventive measure is a small piece of code that software developers create to address the flaws found in the original code of a program?

Explanation

Patches are small pieces of code that software developers create to fix flaws or vulnerabilities in the original code of a program. These flaws could potentially be exploited by attackers to gain unauthorized access or cause harm. Patches are released by software vendors to address these vulnerabilities and improve the security of the software. They are essential for keeping software up to date and protecting it from potential threats.

Submit
5. (027) Which identity management process uses a password to authenticate a user?

Explanation

Knowledge-based identity management process uses a password to authenticate a user. In this process, the user is required to provide specific information or answer security questions that only they should know. This method verifies the user's identity based on their knowledge of the password or other personal information, ensuring that only authorized individuals can access the system or data.

Submit
6. (021) A modem is a device that

Explanation

A modem is a device that modulates and demodulates data signals. Modulation is the process of converting digital data into analog signals that can be transmitted over a communication channel, while demodulation is the process of converting the analog signals back into digital data at the receiving end. Therefore, a modem is responsible for encoding and decoding data signals, allowing them to be transmitted over a network.

Submit
7. (011) What device is a series of single-pole, single-throw switches mounted to a circuit board?

Explanation

A keyboard is a device that consists of a series of single-pole, single-throw switches mounted to a circuit board. These switches, also known as keys, are used to input data or commands into a computer or other electronic devices. When a key is pressed, it completes an electrical circuit and sends a signal to the computer, which then registers the corresponding character or action. Therefore, a keyboard is the correct answer to this question.

Submit
8. (025) Within the information environment what term describes the advantage, or imbalance, in one's favor?

Explanation

Information superiority refers to the advantage or imbalance in one's favor within the information environment. It means having access to accurate, timely, relevant, and reliable information that enables better decision-making and actions. With information superiority, one can effectively gather, analyze, and disseminate information, giving them a competitive edge over others. It involves leveraging technology, processes, and strategies to gain a comprehensive understanding of the information environment and exploit it to achieve desired outcomes.

Submit
9. (208) Which of the following is not a career field assigned to engineering installation units?

Explanation

not-available-via-ai

Submit
10. (008) When a person uses his or her position for private or personal gain it is called

Explanation

When a person uses their position for private or personal gain, it is considered as a misuse of position. This means that the individual is abusing their authority or influence for their own benefit, rather than acting in the best interest of the organization or the public. This behavior is unethical and can lead to negative consequences, such as loss of trust, damage to reputation, and potential legal implications.

Submit
11. (001) Which of the following functions is primarily staffed by Client Systems personnel but may have a variety of Air Force Specialty Codes (AFSCs) based upon the unit mission?

Explanation

The correct answer is Communications Focal Point. This function is primarily staffed by Client Systems personnel, who are responsible for managing and maintaining communication systems. However, the specific Air Force Specialty Codes (AFSCs) assigned to individuals in this role may vary depending on the unit's mission and requirements.

Submit
12. (016) What Internet Protocol version 4 (IPv4) reserved address  is used for loop back?

Explanation

The correct answer is 127.0.0.1. This address is reserved for loopback, which means it is used to test network connectivity on a local device. When a device sends data to the loopback address, it is immediately returned back to itself without being sent over the network. This allows the device to test its own network stack and ensure that it is functioning correctly.

Submit
13. (012) Which application includes tools to help recover lost files and protect against computer failure?

Explanation

Norton Utilities is the correct answer because it is a software application that includes various tools designed to help recover lost files and protect against computer failure. These tools can scan for and repair disk errors, recover deleted files, optimize system performance, and provide backup and recovery options. Norton Utilities is specifically designed to provide comprehensive system maintenance and protection, making it an ideal choice for addressing file recovery and computer failure concerns.

Submit
14. (024) Which operations center monitors and controls Air Force network access points, boundary protection devices, and network activity to provide situational awareness, and report suspicious/malicious activity?

Explanation

The Integrated Network Operations Security Center (I-NOSC) is the correct answer because it is responsible for monitoring and controlling Air Force network access points, boundary protection devices, and network activity. It provides situational awareness and reports any suspicious or malicious activity. The other options, Base Defense Operations Center, 624th Operations Center, and Air Operations Center, are not specifically focused on network operations and security.

Submit
15. (018) The design of communications network is known as

Explanation

The design of a communications network refers to the overall structure, layout, and organization of the network. This includes the arrangement of various components such as routers, switches, servers, and cables, as well as the protocols and technologies used for communication. Network architecture encompasses the planning, design, and implementation of a network, considering factors like scalability, reliability, security, and performance. It involves determining the network topology, addressing scheme, and the selection of appropriate network protocols. Therefore, "network architecture" is the correct answer as it accurately describes the process of designing a communications network.

Submit
16. (018) What kind of network is a group of computer and associated devices that share a common communications line within a small geographic area?

Explanation

A Local Area Network (LAN) is a type of network that connects computers and devices within a small geographic area, such as a home, office, or building. It allows for the sharing of resources, such as files and printers, and enables communication between connected devices. LANs are typically faster and more secure than other types of networks, such as Wide Area Networks (WANs) or Metropolitan Area Networks (MANs), due to their limited size and localized nature. Therefore, a LAN is the most appropriate answer for a network that connects computers and associated devices within a small geographic area.

Submit
17. (006) Which statement is not a goal of Operation Risk Management (ORM)?

Explanation

The statement "Identify opportunities to decrease Air Force warfighting effectiveness on the battlefield and in the operational aerospace environment, helping to ensure decisive victory in any future conflict at the least possible cost" is not a goal of Operational Risk Management (ORM). ORM aims to enhance mission effectiveness, integrate risk assessments into decision-making processes, and train and motivate individuals to manage risk. The given statement suggests actively seeking opportunities to decrease effectiveness, which is contrary to the goals of ORM.

Submit
18. (019) What topology consists of cable segments from each computer connected to a centralized component?

Explanation

A star topology consists of cable segments from each computer connected to a centralized component, typically a switch or hub. In this configuration, all communication between computers goes through the central component, which allows for easy management and troubleshooting. Unlike a bus or ring topology, where all computers are connected in a linear or circular manner, a star topology provides better reliability since a failure in one cable segment does not affect the entire network. Additionally, it allows for more flexibility as new computers can be easily added or removed without disrupting the rest of the network.

Submit
19. (010) Which of the following is the highest level in which quarterly awards are normally presented

Explanation

In the military hierarchy, the highest level in which quarterly awards are normally presented is the Wing. The Wing is a larger organizational unit that consists of multiple groups, squadrons, and other subunits. It is responsible for overseeing operations and providing support to subordinate units. Quarterly awards are typically given at the Wing level to recognize outstanding performance and achievements within the entire Wing, making it the highest level for such awards.

Submit
20. (010) What are the inclusive dates for Secretary of the Air Force/Chief Information Officer (SAF/CIO) annual awards?

Explanation

The inclusive dates for Secretary of the Air Force/Chief Information Officer (SAF/CIO) annual awards are 1 October - 30 September. This means that the awards are given out for achievements and contributions made within this time frame.

Submit
21. (013) The Institute of Electrical and Electronics Engineers (IEEE) divides the Open System Interconnect (OSI) Data Link Layers into what two sublayers?

Explanation

The correct answer is Logical Link Control (LLC) and Media Access Control (MAC). The OSI Data Link Layer is divided into these two sublayers to handle different functions. The LLC sublayer is responsible for flow control, error control, and framing of data packets. It also provides a service interface to the network layer. The MAC sublayer is responsible for controlling access to the physical medium, handling collisions, and providing a unique identifier for each device on the network. These two sublayers work together to ensure reliable and efficient communication between devices in a network.

Submit
22. (018) What kind of network interconnects users with computer resources in a geographic area or region like a city?

Explanation

A Metropolitan Area Network (MAN) is a type of network that connects users with computer resources in a specific geographic area or region, such as a city. Unlike a Local Area Network (LAN), which is limited to a small area like a building or campus, a MAN covers a larger area and can connect multiple LANs together. A Wide Area Network (WAN) is even larger and covers a wider geographical area, such as multiple cities or countries. A Virtual Private Network (VPN) is a secure connection that allows users to access a private network over a public network, but it is not specifically designed for connecting users with computer resources in a geographic area or region.

Submit
23. (021) Dynamic routing automatically calculates the best path between how many nodes?

Explanation

Dynamic routing automatically calculates the best path between two nodes. This means that it determines the most efficient route for data to travel from the source node to the destination node. By continuously updating and adjusting the routing tables, dynamic routing protocols ensure that data is sent through the most optimal path, taking into account factors such as network congestion, link failures, and traffic load. Therefore, the correct answer is 2.

Submit
24. (006) How many steps are there in Operational Risk Management (ORM)?

Explanation

Operational Risk Management (ORM) involves a systematic approach to identify, assess, and control risks in operational processes. It typically consists of six steps: 1) Identify hazards, 2) Assess hazards, 3) Make risk decisions, 4) Implement controls, 5) Supervise, and 6) Review. These steps enable organizations to proactively manage and mitigate operational risks, ensuring the safety and efficiency of their processes. Therefore, the correct answer is 6.

Submit
25. (006) Supervisors document and maintain completed safety training on

Explanation

Supervisors document and maintain completed safety training on AF Form 55. This form is specifically designed for documenting safety training and is used by supervisors to track and record the completion of safety training for their personnel. It serves as a centralized record for all safety training completed by individuals within the organization, allowing supervisors to easily monitor and verify that all required training has been completed. Using AF Form 55 ensures that there is a standardized and organized system for documenting and maintaining safety training records.

Submit
26. (211) The desired outcome, product, or service of a project is referred to as

Explanation

A deliverable refers to the desired outcome, product, or service of a project. It is something that can be tangible or intangible and is usually provided to the stakeholders or clients upon completion of the project. This term is commonly used in project management to define the specific results or outputs that need to be achieved within a given timeframe.

Submit
27. (007) What systems allow for a commonly understood, maintainable, and defendable domain through all federal and non-federal systems?

Explanation

Commercial Off-The-Shelf (COTS) systems are commonly understood, maintainable, and defendable domains that can be used in both federal and non-federal systems. These systems are commercially available and can be easily integrated into existing infrastructure. They are designed to meet industry standards and regulations, making them reliable and widely accepted. Using COTS systems ensures interoperability, reduces costs, and allows for efficient maintenance and support.

Submit
28. (014) What is the combat information technology (IT) communications support agency of the DoD called?

Explanation

The correct answer is Defense Information Systems Agency. Defense Information Systems Agency is the combat information technology (IT) communications support agency of the Department of Defense (DoD). It provides and manages the IT and communications support for the military and other government organizations.

Submit
29. (206) What is the typical pay grade of the deployed Contingency Response Group commander?

Explanation

The typical pay grade of the deployed Contingency Response Group commander is O-6.

Submit
30. (001) Which of the following is not a mandatory requirement for the advancement to the 7-skill level?

Explanation

The completion of Air Education and Training Command (AETC) Supplemental training courses is not a mandatory requirement for the advancement to the 7-skill level. The other options listed, such as minimum rank of SSgt, 6 months on-the-job training for retrainees, and completion of Air Force Specialty Code (AFSC) specific requirements, are all mandatory requirements for advancement.

Submit
31. (004) What Automated Information System (AIS) is used to document actions on any item with an assigned Standard Reporting Designator (SRD)?

Explanation

The Integrated Maintenance Data System (IMDS) is the correct answer because it is an automated information system used to document actions on any item with an assigned Standard Reporting Designator (SRD). IMDS is commonly used in maintenance and logistics operations to track and manage maintenance actions, repair orders, and other related data for equipment and systems. It allows for efficient documentation and reporting of actions taken on items with SRDs, ensuring accurate and up-to-date information is available for maintenance and repair purposes.

Submit
32. (016) What class uses a range of 1-126 in the first octet of an Internet Protocol version 4 (IPv4)?

Explanation

Class A uses a range of 1-126 in the first octet of an IPv4 address. This class is used for large networks as it allows for a large number of hosts. The first bit in the first octet is always 0 in Class A addresses, which allows for up to 126 networks with 16,777,214 hosts each.

Submit
33. (205) Which is not an initial capability of the open the airbase force module?

Explanation

The open the airbase force module is designed to provide initial capabilities for various tasks related to airbase operations. Force protection, airfield operations, and force accountability are all initial capabilities of the module, meaning they are included in its primary functions. However, explosive ordinance disposal (EOD) is not listed as an initial capability, suggesting that it is not part of the module's primary functions.

Submit
34. (024) What title status must National Guard Guardsmen be in to execute cyber operations?

Explanation

National Guard Guardsmen must be in Title 10 status to execute cyber operations. Title 10 refers to the section of the United States Code that outlines the role and responsibilities of the Armed Forces, including the National Guard. This status allows Guardsmen to be called into federal service and operate under federal authority. Therefore, to carry out cyber operations, National Guard Guardsmen need to be in Title 10 status.

Submit
35. (015) What are the two classifications of transport protocols?

Explanation

The correct answer is Connection Oriented and Connectionless Oriented. These two classifications refer to different ways of establishing and maintaining a communication channel between two devices. Connection-oriented protocols, such as TCP, establish a reliable and ordered connection before transmitting data, ensuring that all packets are received and in the correct order. Connectionless-oriented protocols, such as UDP, do not establish a dedicated connection and simply send packets without any guarantee of delivery or order.

Submit
36. (025) Which of the following is a true statement about Electronic Warfare (EW) and Computer Network Operations (CNO)?

Explanation

Electronic Warfare (EW) involves the use of electromagnetic energy to control or disrupt enemy communication systems. It focuses on the manipulation of radiated energy to gain an advantage in warfare. On the other hand, Computer Network Operations (CNO) refers to activities conducted in cyberspace, including the use of computer networks to gather intelligence, launch attacks, or defend against cyber threats. While both EW and CNO involve the manipulation of information and energy, EW specifically deals with radiated energy, while CNO encompasses a broader range of activities in the cyber domain.

Submit
37. (009) Which type of fund covers the cost of relocating facilities?

Explanation

Military construction (MILCON) funds cover the cost of relocating facilities. MILCON funds are specifically allocated for the construction, expansion, or improvement of military facilities and infrastructure. This includes the relocation of existing facilities to new locations. MILCON funds are separate from other types of funds such as Military Personnel (MILPERS), Operation and Maintenance (O&M), and Research, Development, Test, and Evaluation (RDT&E) funds, which are used for different purposes within the military budget.

Submit
38. (208) All armed forces broadcasting affiliates merged under the American Forces Network (AFN) in

Explanation

In 1998, all armed forces broadcasting affiliates merged under the American Forces Network (AFN). This merger allowed for a centralized broadcasting system that could reach military personnel stationed around the world. By combining the various broadcasting affiliates, AFN was able to provide a consistent and reliable source of news, entertainment, and information to members of the armed forces. This merger also helped to streamline operations and improve efficiency in delivering programming to military bases and ships.

Submit
39. (004) Who establishes the necessary controls to ensure periodic inspections are accomplished?

Explanation

The Flight Commander/Chief is responsible for establishing the necessary controls to ensure periodic inspections are accomplished. This includes implementing protocols and procedures to ensure that inspections are conducted regularly and that any issues or discrepancies are addressed promptly. They oversee the inspection process and ensure that all necessary documentation and records are maintained. By establishing these controls, the Flight Commander/Chief helps to ensure the safety and efficiency of operations.

Submit
40. (021) Two basic routing activities are determining optimal routing paths and

Explanation

The given answer correctly identifies one of the two basic routing activities, which is transporting information groups (packets) through an internetwork. This refers to the process of forwarding data packets from the source to the destination through various network devices and routes. Routing involves making decisions based on network protocols, routing tables, and algorithms to determine the optimal path for the packets to reach their destination efficiently and reliably.

Submit
41. (011) The maximum number of devices a FireWire bus can take is up to

Explanation

FireWire is a high-speed serial bus interface commonly used for connecting devices such as external hard drives, cameras, and audio interfaces to a computer. The maximum number of devices that a FireWire bus can support is determined by the number of unique device IDs available on the bus. In the case of FireWire, there are 64 possible device IDs, numbered from 0 to 63. Therefore, the correct answer is 63, as it represents the maximum number of devices that can be connected to a FireWire bus.

Submit
42. (226) Who is responsible for inspecting all "real property" on an installation to ensure it meets applicable standards?

Explanation

Base Civil Engineering is responsible for inspecting all "real property" on an installation to ensure it meets applicable standards. This includes conducting regular inspections, identifying any issues or deficiencies, and coordinating with other departments or contractors to address and resolve them. They play a crucial role in maintaining the overall infrastructure and safety of the installation.

Submit
43. (017) Which common port contains Hyper Text Transfer Protocol (HTTP) servers and proxies?

Explanation

Port 8080 is commonly used for HTTP servers and proxies. While the default port for HTTP is 80, port 8080 is often used as an alternative for running web servers or proxies. It allows for multiple web servers to run on the same machine without conflicts. Additionally, some internet service providers or organizations may choose to use port 8080 for security reasons or to bypass restrictions on port 80. Therefore, port 8080 is a valid option for hosting HTTP servers and proxies.

Submit
44. (012) A workgroup is a simple grouping of how many computers?

Explanation

A workgroup is a simple grouping of computers that typically consists of no more than 20 computers. This means that the maximum number of computers in a workgroup is 20, but it could be less than 20 as well. Workgroups are commonly used in small businesses or home networks to facilitate file and printer sharing, as well as collaboration among the computers within the group.

Submit
45. (001) Which Air Force Specialty Code (AFSC) requires members to pass the Air Force Electronic Data Processing Test?

Explanation

The correct answer is Computer Systems Programming. This Air Force Specialty Code (AFSC) requires members to pass the Air Force Electronic Data Processing Test. This test is likely to assess the candidate's knowledge and skills in electronic data processing, which are essential for computer systems programming.

Submit
46. (003) Which of the following is not a responsibility of the Air Force Career Field Manager (AFCFM)?

Explanation

The responsibility of distributing personnel throughout their respective major command (MAJCOM) does not fall under the role of the Air Force Career Field Manager (AFCFM). The AFCFM is responsible for constructing career paths, managing skill-level training requirements, and establishing requirements for entry into the career field. However, the distribution of personnel is typically handled by other personnel management entities within the Air Force.

Submit
47. (014) Who must provide encryption devices for connection to the Secret Internet Protocol (IP) Data service?

Explanation

The customer must provide encryption devices for connection to the Secret Internet Protocol (IP) Data service. This means that it is the responsibility of the customer to ensure that they have the necessary encryption devices in order to connect to the service securely.

Submit
48. (206) The Contingency Response Wing headquarters is located at

Explanation

The Contingency Response Wing headquarters is located at Joint Base McGuire-Dix-Lakehurst, NJ. This means that the main headquarters of the Contingency Response Wing is situated in Joint Base McGuire-Dix-Lakehurst, New Jersey.

Submit
49. (223) Which type of contract is permissible when there is only one viable option to satisfy the requirement for supplies or services?

Explanation

A sole source contract is permissible when there is only one viable option to satisfy the requirement for supplies or services. This means that there is no competition or alternative options available, and the contract can be awarded directly to the sole source without going through a competitive bidding process. This type of contract is usually used when there is a unique product or service that only one supplier can provide, or when there is an urgent need that cannot be met by other suppliers in a timely manner.

Submit
50. (025) Which Electronic Warfare capability uses jamming to reduce the adversary's use of the electromagnetic spectrum (EMS)?

Explanation

Electronic attack is the correct answer because it involves the use of jamming to disrupt or degrade the adversary's use of the electromagnetic spectrum. By jamming their communications or radar systems, electronic attack aims to limit their ability to effectively use the EMS for their operations. This capability is an important aspect of electronic warfare, which encompasses various techniques and technologies to gain control over or deny the adversary's use of the electromagnetic spectrum.

Submit
51. (208) Which Engineering Installation (EI) unit has the only flight assigned that supports a 72 hour rapid response force during crisis providing specialized engineering support in telecommunications and electromagnetic spectrum field analysis?

Explanation

The correct answer is 85 Engineering Installation Squadron (EIS). This unit is the only one that supports a 72-hour rapid response force during a crisis and provides specialized engineering support in telecommunications and electromagnetic spectrum field analysis.

Submit
52. (019) What topology defines the layout of a network's devices and media?

Explanation

The correct answer is "Physical." This refers to the physical arrangement or layout of a network's devices and media. It includes the placement of devices such as computers, routers, and switches, as well as the physical connections between them, such as cables and wires. The physical topology determines how the devices are physically connected and organized in the network.

Submit
53. (009) Which of the following is not a responsibility of Government Purchase Card (GPC) cardholders?

Explanation

The responsibility of Government Purchase Card (GPC) cardholders includes making authorized transactions, reconciling transactions, and logging transactions. However, funds accountability is not a responsibility of GPC cardholders. This means that they are not responsible for ensuring the proper allocation and management of funds related to the GPC. This responsibility typically falls on higher-level officials or the finance department within the government organization.

Submit
54. (015) What regulates how much information passes over a Transmission Control Protocol (TCP) connection before the receiving host must send an acknowledgement?

Explanation

The sliding window is a mechanism that regulates how much information can be transmitted over a TCP connection before the receiving host sends an acknowledgment. It allows the sender to continuously send a certain amount of data without waiting for individual acknowledgments for each packet. The size of the sliding window determines the amount of data that can be sent before an acknowledgment is required. As the receiver acknowledges the received data, the window slides forward, allowing the sender to send more data. This helps optimize the efficiency of data transmission over the TCP connection.

Submit
55. (002) Where is the Air Force active component manpower planning and programming centralized?

Explanation

The correct answer is at Headquarters Air Force (HAF). This means that the Air Force active component manpower planning and programming is centralized at the headquarters of the Air Force. This suggests that decision-making and coordination regarding manpower planning and programming for the Air Force is done at the highest level of command.

Submit
56. (006) Which of the following is not a term for Job Safety Analysis?

Explanation

The term "Job Safety Training (JST)" is not a term for Job Safety Analysis. Job Safety Analysis (JHA), Task Hazard Analysis (THA), and Activity Hazard Analysis (AHA) are all commonly used terms for the process of analyzing and identifying potential hazards in a job or task. However, Job Safety Training (JST) refers specifically to the training provided to employees to ensure their safety while performing their job duties. It is not the same as the analysis itself.

Submit
57. (001) What document directs the Communications Focal point key processes?

Explanation

The correct answer is MPTO 00-33A-1001-WA. This document directs the Communications Focal point key processes.

Submit
58. (016) Instead of using binary, how are Internet Protocol version 6 (IPv6) addresses expressed to be more user-friendly?

Explanation

IPv6 addresses are expressed in the colon hexadecimal format to make them more user-friendly. This format replaces the traditional binary representation used in IPv4 addresses with a combination of hexadecimal numbers and colons. This allows for a larger address space and makes the addresses easier to read and remember. The colon hexadecimal format also helps to reduce the length of the addresses, making them more manageable for users.

Submit
59. (206) In the operate the air base module, what is the maximum distance an extended site can be located from the base Network Control Center Deployed (NCC-D)?

Explanation

The maximum distance an extended site can be located from the base Network Control Center Deployed (NCC-D) in the operate the air base module is 16 km.

Submit
60. (008) The creation of the DOD as an executive component of the government is authorized by United States Code (USC) Title

Explanation

The creation of the DOD as an executive component of the government is authorized by United States Code (USC) Title 10. This means that the legal basis for establishing the Department of Defense (DOD) can be found in Title 10 of the United States Code, which is a compilation of federal laws that pertain to the armed forces and national defense. Title 10 outlines the organization and structure of the DOD, as well as its roles and responsibilities in national security and military affairs.

Submit
61. (207) Which of the following is categorized as a small unmanned aerial system (UAS)?

Explanation

The RQ-11B Raven is categorized as a small unmanned aerial system (UAS). This is because it is a lightweight and portable drone that is primarily used for reconnaissance and surveillance purposes. It is designed to be easily deployable and can be operated by a small team of personnel. The other options listed, such as the MQ-9 Reaper, MQ-1B Predator, and RQ-4B Global Hawk, are larger and more advanced UAS that are used for various military missions and have longer endurance capabilities.

Submit
62. (008) Who appoints Air Force Portal Content Mangers and Content Publishers for public and private websites?

Explanation

The Wing Commander is responsible for appointing Air Force Portal Content Managers and Content Publishers for public and private websites.

Submit
63. (009) What is the maximum amount for minor construction projects that Operation and Maintenance (O&M) funds will cover under normal conditions?

Explanation

The maximum amount for minor construction projects that Operation and Maintenance (O&M) funds will cover under normal conditions is $750,000. This means that O&M funds can be used to cover construction projects up to this amount, but any projects exceeding this limit would require funding from other sources.

Submit
64. (217) Which Cyberspace Infrastructure Planning System (CIPS) functional area supports enhancements to current capabilities funded and accomplished at the base level generally in less than 30 days and in the form of a maintenance task order?

Explanation

The correct answer is work orders. Work orders are used to support enhancements to current capabilities funded and accomplished at the base level in a timely manner, typically within 30 days. They are in the form of a maintenance task order, which allows for efficient planning and execution of the necessary work. This functional area of the Cyberspace Infrastructure Planning System (CIPS) focuses on addressing maintenance needs and improving the overall infrastructure.

Submit
65. (021) What Data Link Layer network device logically separates a single network into two segments or collision domains in the Ethernet networks?

Explanation

A bridge is a Data Link Layer network device that logically separates a single network into two segments or collision domains in Ethernet networks. It does this by examining the destination MAC address of each incoming frame and selectively forwarding it to the appropriate segment. This helps to reduce collisions and improve network performance by isolating traffic within each segment. Unlike a hub, which simply broadcasts all incoming frames to all connected devices, a bridge intelligently forwards frames only to the necessary segment, thereby reducing network congestion.

Submit
66. (002) which of the following is a subdivision of programmed cost data related to a weapon system or support function?

Explanation

Program Element Code (PEC) is a subdivision of programmed cost data related to a weapon system or support function. PEC is a unique code assigned to each program element within a budget or financial system. It helps in tracking and allocating costs associated with specific elements of a program or project. By using PEC, cost data can be organized and analyzed more effectively, allowing for better budget planning and resource management. PEC provides a detailed breakdown of costs within a larger program or project, making it an essential tool for financial management in the defense industry.

Submit
67. (017) The range of well-known port numbers is

Explanation

The range of well-known port numbers is 0 to 1023. Well-known ports are reserved for specific services or protocols and are commonly used by applications. These ports are standardized by the Internet Assigned Numbers Authority (IANA) and are assigned to commonly used services such as HTTP (port 80), FTP (port 21), and SSH (port 22). Ports within this range are considered privileged and require administrative privileges to be accessed.

Submit
68. (203) Which of the following is not a readiness category measured by Air and Space Expeditionary Force Reporting Tool (ART)?

Explanation

The Air and Space Expeditionary Force Reporting Tool (ART) measures readiness categories to assess the preparedness of the Air and Space Expeditionary Force. These categories include training, personnel, and equipment condition. However, "home station mission" is not a readiness category measured by ART.

Submit
69. (023) Which transmission medium is the primary carrier of voice communications?

Explanation

Twisted pair cable is the primary carrier of voice communications because it is the most common and widely used transmission medium for telephone systems. It consists of two insulated copper wires twisted together, which helps to minimize interference and crosstalk. Twisted pair cable is cost-effective, easy to install, and can support voice signals over long distances. It is also compatible with various communication technologies and can be used for both analog and digital voice transmissions.

Submit
70. (217) Which of the following funding options does the local communications squadron implement using base level support and resources?

Explanation

The local communications squadron implements the funding option of self-help using base level support and resources. Self-help refers to the practice of using one's own resources and efforts to solve a problem or meet a need. In this case, the squadron is utilizing their own resources and support from the base to fund their communication needs. This option allows them to be self-reliant and independent in meeting their funding requirements.

Submit
71. (222) Which of the following is not an exception to the "full and open competition" stipulation of the Competition in Contracting Act?

Explanation

The "full and open competition" stipulation of the Competition in Contracting Act requires that government contracts be awarded through a competitive process. This means that multiple vendors have the opportunity to bid on the contract. However, the unit commander's interest is not an exception to this stipulation. The unit commander's interest refers to a situation where a specific unit or department within the government has a preference for a particular vendor or supplier. This preference does not justify bypassing the competitive process and awarding the contract without competition. Therefore, the unit commander's interest is not an exception to the "full and open competition" stipulation.

Submit
72. (025) What is critical to mitigating unintended or undesirable effects, on either our behalf or the adversary's, and maximizing cyberspace superiority?

Explanation

Careful planning is critical to mitigating unintended or undesirable effects and maximizing cyberspace superiority. By carefully planning and strategizing, potential risks and vulnerabilities can be identified and addressed in advance. This allows for the development of effective measures to prevent and counteract any adverse effects on both our own operations and those of the adversary. Careful planning ensures that resources are allocated efficiently and that actions are taken in a deliberate and calculated manner, increasing the chances of success in cyberspace operations.

Submit
73. (015) What of these lists in the fields in the User Datagram Protocol (UDP) segment?

Explanation

The correct answer is Source Port, Destination Port, Length, Checksum, Data. This is because these are the fields that are included in the User Datagram Protocol (UDP) segment. The Source Port field identifies the port number of the sender, the Destination Port field identifies the port number of the receiver, the Length field specifies the length of the UDP segment, the Checksum field is used for error checking, and the Data field contains the actual data being transmitted.

Submit
74. (219) Which type of planning meeting identifies civil engineering projects including new construction, renovations, or demolitions of facilities, and relocations of organizations?

Explanation

The Facilities Utilization Board is the correct answer because it is the type of planning meeting that identifies civil engineering projects such as new construction, renovations, demolitions of facilities, and relocations of organizations. This board is responsible for determining how facilities are used and making decisions regarding their utilization. The other options, Communications and Information (C&I) Systems Planning Forum, Mission Briefings, and Informal Meeting, do not specifically address civil engineering projects and facilities planning.

Submit
75. (002) Which of the following is the official source of manpower information for an organization and is used as a tool to manage positions?

Explanation

The Unit Manpower Document (UMD) is the official source of manpower information for an organization and is used as a tool to manage positions. It provides detailed information about the authorized positions within an organization, including the number of personnel required, their job titles, and any special qualifications or skills needed. The UMD is used to track and manage personnel assignments, monitor staffing levels, and ensure that the organization has the necessary manpower to fulfill its mission. It is an essential tool for workforce planning and management.

Submit
76. (007) Which of the following is information not contained in Technical Order (TO) 00-5-1?

Explanation

The information not contained in Technical Order (TO) 00-5-1 is Time Compliance Technical Order (TCTO) procedures. TO 00-5-1 provides information on resources required to manage and use TOs, infrastructure to manage and use TOs, and training to manage and use TOs. However, it does not include information on TCTO procedures.

Submit
77. (007) Who determines if local checklists and/or work cards are required for specific equipment?

Explanation

The flight commander/chief determines if local checklists and/or work cards are required for specific equipment. They are responsible for making decisions regarding the operational procedures and requirements within their unit. This includes determining the need for checklists and work cards to ensure the proper maintenance and operation of equipment.

Submit
78. (023) Which type of cable is associated with the original designs of the Ethernet standard?

Explanation

Coaxial cable is associated with the original designs of the Ethernet standard. Coaxial cable was commonly used in early Ethernet networks because it provided a reliable and high-speed connection. It consists of a central conductor surrounded by insulation, a metallic shield, and an outer insulating layer. The coaxial cable allowed for the transmission of data signals over long distances without significant loss or interference. However, with advancements in technology, Ethernet networks now primarily use twisted-pair cables, such as shielded twisted-pair (STP) or unshielded twisted-pair (UTP), which are more cost-effective and easier to install.

Submit
79. (205) The key capabilities for establishing control in the Command and Control module are

Explanation

The key capabilities for establishing control in the Command and Control module are secure communications and intelligence. Secure communications are crucial for maintaining effective communication channels within the command structure, ensuring that information is transmitted securely and accurately. Intelligence is also vital as it provides commanders with the necessary information and situational awareness to make informed decisions and effectively control their forces. By having secure communications and access to intelligence, commanders can establish control and effectively coordinate their forces.

Submit
80. (008) Procedures and circumstances for Congress to order units into active Federal duty are established in United States Code (USC) Title

Explanation

The correct answer is 32. The procedures and circumstances for Congress to order units into active Federal duty are established in United States Code (USC) Title 32. This title specifically deals with the National Guard and provides the legal framework for its activation and deployment. It outlines the conditions under which the National Guard can be called into federal service, such as during emergencies or in cases of national defense.

Submit
81. (015) In a connection-oriented protocol, such as Transmission Control Protocol (TCP), what must happen before data is transmitted between clients?

Explanation

Before data is transmitted between clients in a connection-oriented protocol like TCP, the connection must be established. This involves a series of steps where the client and server exchange control messages to negotiate and set up the parameters of the connection. Once the connection is successfully established, data can be transmitted between the clients.

Submit
82. (016) How many bits are in an Internet Protocol version 4 (IPv4) address?

Explanation

An Internet Protocol version 4 (IPv4) address consists of 32 bits. This means that there are a total of 2^32 (approximately 4.3 billion) unique IPv4 addresses available. Each bit in the address represents a binary value of either 0 or 1, resulting in a 32-bit address structure. This allows for the identification and communication of devices on a network using unique IP addresses.

Submit
83. (219) What area of the Annex K is used to detail wartime procedures for maintaining the communications systems under contract during peacetime?

Explanation

The correct answer is Logistics. In the Annex K, the area that is used to detail wartime procedures for maintaining the communications systems under contract during peacetime is Logistics. This section would outline the specific steps and protocols for ensuring the functionality and maintenance of the communication systems during wartime, while the systems are normally maintained under contract during peacetime.

Submit
84. (209) What does the project manager provide in the Initiate Phase?

Explanation

In the Initiate Phase, the project manager provides answers, guidance, and education. This means that they are responsible for providing information and clarification to team members and stakeholders, guiding them through the project processes and procedures, and educating them on the project objectives and goals. This helps to ensure that everyone involved in the project has a clear understanding of their roles and responsibilities, and is equipped with the knowledge and support they need to successfully initiate the project.

Submit
85. (209) What are the source documents that define a needed cyberspace infrastructure capability called?

Explanation

Requirements are the source documents that define a needed cyberspace infrastructure capability. Requirements outline the specific criteria and functionalities that the infrastructure capability must possess in order to meet the desired objectives. They serve as the foundation for designing and implementing the necessary processes and technical solutions to fulfill those requirements. Priorities, on the other hand, refer to the order in which tasks or objectives are ranked in terms of importance. While processes and technical solutions are important components of implementing the capability, they are derived from the requirements themselves.

Submit
86. (202) Who initiates the requirements or deployment sourcing process?

Explanation

The Air Force Personnel Center (AFPC) Aerospace Expeditionary Forces (AEF) Center initiates the requirements or deployment sourcing process.

Submit
87. (226) Secretary of Defense and House and Senate Armed Services Committees authorization and appropriation are required for what type of construction projects?

Explanation

All military construction projects require authorization and appropriation from the Secretary of Defense and the House and Senate Armed Services Committees. This means that any construction projects related to the military, regardless of size or scope, must go through the proper channels and receive approval and funding from these entities.

Submit
88. (203) Which of these is not an area measured and reported by Status of Resources and Training System (SORTS)?

Explanation

The Status of Resources and Training System (SORTS) measures and reports on various areas, such as training, personnel, and equipment condition. However, facility condition is not one of the areas measured and reported by SORTS.

Submit
89. (003) Who serves as the major command (MAJCOM) voting representative during career field Specialty Training Requirements Team (STRT) and Utilization and Training Workshop (U&TW)?

Explanation

The MAJCOM Functional Manager serves as the major command (MAJCOM) voting representative during career field Specialty Training Requirements Team (STRT) and Utilization and Training Workshop (U&TW). This individual is responsible for representing the interests and needs of the MAJCOM in these meetings and ensuring that the training and utilization requirements for the career field are met. They have a deep understanding of the career field and are able to provide valuable input and guidance during these discussions.

Submit
90. (010) Who reviews the selections after the board selects the 12 Outstanding Airmen of the Year?

Explanation

After the board selects the 12 Outstanding Airmen of the Year, the selections are reviewed by the Air Force Chief of Staff. This individual holds a high-ranking position in the Air Force and is responsible for overseeing and making decisions regarding the overall operations and policies of the Air Force. Therefore, it is logical that the Air Force Chief of Staff would review the selections made by the board to ensure that they align with the objectives and standards of the Air Force.

Submit
91. (016) What Internet Protocol version 4 (IPv4) class address is used for networks with about 250 nodes?

Explanation

Class C is the correct answer because it is the class of IPv4 addresses that is used for networks with approximately 250 nodes. Class C addresses have a network portion of 24 bits, allowing for up to 256 networks and 254 hosts per network. This makes it suitable for small to medium-sized networks, which typically have around 250 nodes. Class D addresses are used for multicast purposes, Class E addresses are reserved for future use, and Class F addresses are experimental and not commonly used.

Submit
92. (016) What Internet Protocol version 4 (IPv4) class address is used for multicast addressing?

Explanation

Class D is the correct answer because it is the class of IPv4 addresses that is specifically reserved for multicast addressing. Multicast addressing allows a single packet to be sent to multiple hosts simultaneously, rather than being unicast to a single host or broadcast to all hosts on the network. Class D addresses range from 224.0.0.0 to 239.255.255.255.

Submit
93. (204) Who develops logistics details (LOGDETS) to allow for 30 days of sustainment for unit type codes (UTC)?

Explanation

Pilot Units develop logistics details (LOGDETS) to allow for 30 days of sustainment for unit type codes (UTC). This means that the responsibility lies with the pilot units to plan and coordinate the necessary logistics support for their specific operations, ensuring that they have the resources and supplies needed to sustain themselves for a period of 30 days. This is an important aspect of operational readiness and ensuring that units are prepared to carry out their missions effectively.

Submit
94. (213) What is critical to controlling and ensuring the overall project progresses accordingly, regardless of the phase?

Explanation

Follow-up is critical to controlling and ensuring the overall project progresses accordingly, regardless of the phase. Follow-up involves regularly checking and monitoring the project's progress, identifying any issues or deviations from the plan, and taking necessary actions to address them. It helps to maintain project control, track milestones, and ensure that the project stays on track towards its objectives. Without proper follow-up, it becomes difficult to detect and rectify any problems or deviations, leading to potential delays or failures in the project.

Submit
95. (012) Which is not a type of UNIX pathname?

Explanation

The correct answer is "Positive" because it is not a type of UNIX pathname. Simple, relative, and absolute are all valid types of UNIX pathnames. A simple pathname refers to a file or directory in the current directory, a relative pathname specifies the location of a file or directory relative to the current directory, and an absolute pathname specifies the exact location of a file or directory in the file system hierarchy. However, "positive" is not a recognized type of UNIX pathname.

Submit
96. (221) As a minimum, a support agreement must be reviewed how soon after its effective date?

Explanation

A support agreement must be reviewed at least every 3 years after its effective date. This ensures that the agreement remains up to date and relevant to the current needs and requirements of the parties involved. Regular reviews help identify any necessary updates or modifications that may be needed to improve the effectiveness and efficiency of the support agreement.

Submit
97. (223) Which of the following is a simplified method of filling anticipated repetitive needs for supplies or services by establishing "charge accounts" with qualified sources of supply?

Explanation

A Blanket Purchase Agreement is a simplified method of filling anticipated repetitive needs for supplies or services by establishing "charge accounts" with qualified sources of supply. This allows the government to make multiple purchases under a single agreement, streamlining the procurement process and reducing administrative burden. The agreement typically covers a specific period of time and sets forth the terms and conditions for future purchases, including pricing, delivery, and performance requirements. It provides flexibility and convenience in acquiring goods and services while ensuring compliance with procurement regulations.

Submit
98. (218) Which of the following is not a cause for requirements to be considered special?

Explanation

The given options describe various causes that can make requirements special. These include requiring services from outside agencies, mobility equipment, and additional manpower. However, requiring additional funding is not listed as a cause for requirements to be considered special. This suggests that the need for additional funding does not necessarily make the requirements special, unlike the other factors mentioned.

Submit
99. (020) Over a single pair cable, Integrated Services Digital Network (ISDN) is capable of transmission rates of

Explanation

ISDN (Integrated Services Digital Network) is a telecommunications technology that uses a single pair cable for transmission. It is capable of transmission rates of 144 Kbps, as stated in the answer. This means that it can transmit data at a speed of 144,000 bits per second.

Submit
100. (202) Which type of Joint Expeditionary Tasking (JET) tasking is a service providing a force or capability in place of another service's core mission?

Explanation

The correct answer is Joint force/capability. This type of Joint Expeditionary Tasking (JET) tasking involves one service providing a force or capability to perform the core mission of another service. This could be due to various reasons such as resource constraints or operational needs. It allows for the efficient utilization of resources and enhances joint operations and cooperation among different services.

Submit
101. (222) Within how many days of the delivery date must a fully researched, completed requirement for a fixed-price and cost reimbursement contract with a monetary value of $100,000 be submitted to the Base Contracting Office?

Explanation

A fully researched, completed requirement for a fixed-price and cost reimbursement contract with a monetary value of $100,000 must be submitted to the Base Contracting Office within 35 calendar days of the delivery date.

Submit
102. (205) Which force module contains support forces that would generally not arrive until 30 days after the deployed location is established?

Explanation

The force module that contains support forces that would generally not arrive until 30 days after the deployed location is established is "Robust the airbase." This implies that the process of making the airbase strong and resilient is the one that takes time and requires additional support forces to be deployed. The other options, such as generating the mission, establishing the airbase, and operating the airbase, do not specifically mention the arrival of support forces after a certain time period.

Submit
103. (026) Which Cyberspace Defense Weapon System sub-discipline determines the extent of intrusions, develops courses of action required to mitigate threats, and determines and executes response actions?

Explanation

Incident Response is the correct answer because it involves determining the extent of intrusions, developing courses of action to mitigate threats, and executing response actions. This sub-discipline focuses on effectively responding to cyber incidents, such as breaches or attacks, in order to minimize damage and protect systems and data. Computer Forensics, on the other hand, deals with collecting and analyzing digital evidence, while Incident Prevention focuses on proactive measures to prevent incidents, and Incident Detection focuses on identifying and alerting about potential incidents.

Submit
104. (005) Which of the following is included in the Master Training Plan only if applicable to the work center?

Explanation

The Job Qualification Standard is included in the Master Training Plan only if it is applicable to the work center. This means that if the work center requires specific qualifications for certain job roles or tasks, the Job Qualification Standard will be included in the Master Training Plan. However, if the work center does not have any specific qualification requirements, the Job Qualification Standard may not be included in the plan.

Submit
105. (028) The technical solution for a communications and information system requirement summarizes

Explanation

The technical solution for a communications and information system requirement summarizes the full cost and recommended course of action. This means that it provides information on the total cost associated with implementing the solution, as well as the suggested steps or actions to be taken. It does not include security requirements, as mentioned in the other option.

Submit
106. (018) Which 802.11 standard is designed to operate at both 2.4 GHz and 5GHz?

Explanation

802.11n is designed to operate at both 2.4 GHz and 5 GHz. It is a wireless networking standard that provides higher data rates and improved range compared to previous standards. It uses multiple-input multiple-output (MIMO) technology to enhance performance and supports both frequency bands, allowing for increased flexibility and compatibility with different devices.

Submit
107. (220) The AF Form 1067 is used for defining, validating, and approving requirements for

Explanation

The AF Form 1067 is a document used for defining, validating, and approving requirements for modifications. The question asks what types of modifications this form is used for, and the correct answer is "all temporary and permanent modifications." This means that the AF Form 1067 is applicable for any type of modification, whether it is temporary or permanent.

Submit
108. (007) Who should endorse the AF Form 673 as the Certifying Official?

Explanation

The correct answer is the authoring OPR's supervisor. The Certifying Official for the AF Form 673 should be the supervisor of the Office of Primary Responsibility (OPR) that authored the form. This ensures that the supervisor has reviewed and approved the information provided in the form before it is certified.

Submit
109. (214) Who implements a technical solution for a base?

Explanation

The implementing organization is responsible for implementing a technical solution for a base. This means that they are in charge of actually carrying out the necessary steps and tasks to bring the solution to life. They may work closely with the project manager and communications squadron to ensure that the solution is implemented successfully and meets the requirements of the base. However, the implementing organization is the primary entity responsible for the execution of the technical solution.

Submit
110. (219) If instructions are not detailed enough to warrant a separate annex, information on base functional area support is placed in the a. Programming Plan (PPLAN).

Explanation

The given correct answer is Operations Plan (OPLAN) major paragraph. This is because the question states that if instructions are not detailed enough to warrant a separate annex, information on base functional area support is placed in the OPLAN major paragraph. Therefore, the OPLAN major paragraph is the appropriate place to include information on base functional area support when separate annexes are not needed.

Submit
111. (210) Which of these items is contained in the Project Plan?

Explanation

The cost management plan is included in the project plan. This plan outlines how costs will be estimated, budgeted, and controlled throughout the project. It includes details on cost baselines, cost tracking, cost change control, and cost reporting. By including the cost management plan in the project plan, the project team ensures that there is a clear understanding of how costs will be managed and controlled, which is crucial for the successful execution of the project.

Submit
112. (003) Which of the following is an optional attendee for the Utilization and Training Workshop (U&TW)?

Explanation

The AETC Career Development (CDC) writer is an optional attendee for the Utilization and Training Workshop (U&TW). This means that their attendance is not mandatory, but they have the option to attend if they choose to do so.

Submit
113. (212) Exceptions that could prevent a system from meeting specified operational requirements are termed

Explanation

Exceptions that could prevent a system from meeting specified operational requirements are termed "major." This suggests that there are certain issues or problems that have a significant impact on the system's ability to function as intended. These exceptions are likely to require immediate attention and resolution in order to ensure the system can meet its operational requirements effectively.

Submit
114. (005) Special Personnel Evaluations (SPEs) are required on a sampling of Air Reserve Component (ARC) personnel within how many days of new equipment/system acceptance?

Explanation

Special Personnel Evaluations (SPEs) are required on a sampling of Air Reserve Component (ARC) personnel within 120 days of new equipment/system acceptance. This means that after new equipment or systems are accepted, a certain number of ARC personnel will undergo evaluations within 120 days to assess their proficiency and effectiveness in operating the new equipment or systems. This evaluation helps ensure that the ARC personnel are properly trained and capable of effectively utilizing the new equipment or systems.

Submit
115. (013) Routers operate at what Open Systems Interconnect (OSI) layer

Explanation

Routers operate at the Network layer of the OSI model. The Network layer is responsible for logical addressing and routing of data packets across different networks. Routers use IP addresses to determine the best path for forwarding packets between networks. They make decisions based on network layer information and choose the most efficient route for data transmission. Therefore, the correct answer is Network.

Submit
116. (223) Which type of contract acquires supplies or services based on direct labor hours at specified fixed hourly rates?

Explanation

A Time and Material contract is a type of contract that acquires supplies or services based on direct labor hours at specified fixed hourly rates. This type of contract is commonly used when the scope of work is uncertain or when it is not possible to accurately estimate the extent or duration of the work required. It provides flexibility for the contractor to be reimbursed for actual labor hours and material costs incurred, while still having predetermined hourly rates.

Submit
117. (223) Which type of contract should only be used when it is impossible to accurately estimate the extent or duration of the work or anticipate costs with any reasonable degree of accuracy?

Explanation

The time and material contract should only be used when it is impossible to accurately estimate the extent or duration of the work or anticipate costs with any reasonable degree of accuracy. This type of contract allows for flexibility in terms of time and materials used, as the contractor is reimbursed for the actual time spent and materials used. It is suitable for projects where there is a high level of uncertainty or where the scope of work may change significantly during the course of the project.

Submit
118. (214) What title is given to anyone assigned to assist the program manager in fulfilling program management duties?

Explanation

A program action officer is a title given to someone who is assigned to assist the program manager in fulfilling program management duties. This role involves supporting the program manager in planning, coordinating, and executing various actions and activities related to the program. The program action officer helps ensure that the program is on track and that all necessary actions are being taken to achieve the program's goals and objectives. This role requires strong organizational and communication skills, as well as a good understanding of program management principles and practices.

Submit
119. (216) Engineering support for MAJCOMs is provided by Cyberspace Systems Integrator Tier

Explanation

not-available-via-ai

Submit
120. (027) What system monitoring concept uses long trend analysis of network devices and is performed in order to identify future constraints with results incorporated into future technical baselines?

Explanation

Capacity planning is a system monitoring concept that involves long trend analysis of network devices. It is performed to identify future constraints and ensure that the necessary resources are available to meet the demands of the system. The results of capacity planning are incorporated into future technical baselines, which help in managing and optimizing the performance of the system. Intrusion Detection and Prevention Systems, End-to-End Performance Monitoring, and Vulnerability scanners are not directly related to long trend analysis and future constraints identification.

Submit
121. (219) When tasked by the supported combatant commander which type of plan is prepared in support of the contingency plans?

Explanation

When tasked by the supported combatant commander, a supporting plan is prepared in support of the contingency plans. A supporting plan is a detailed plan that provides specific guidance and support to the overall operational plan. It outlines the actions, resources, and tasks required to achieve the objectives of the contingency plan. The supporting plan ensures that all necessary support functions are coordinated and executed effectively, helping to achieve the overall mission success.

Submit
122. (007) Who provides accreditation for the Telecommunications Industry Association (TIA)?

Explanation

ANSI provides accreditation for the Telecommunications Industry Association (TIA).

Submit
123. (007) Who develops standards for Interconnect, Passive and Electro-mechanical (IP&E) electronic components under the American National Standard Institute (ANSI) designation of Electronic Industries Alliance (EIA) standards?

Explanation

The correct answer is Electronic Components Industry Associate (ECIA). ECIA develops standards for Interconnect, Passive and Electro-mechanical (IP&E) electronic components under the American National Standard Institute (ANSI) designation of Electronic Industries Alliance (EIA) standards.

Submit
124. (024) What are the three major considerations that apply to Cyberspace Operations?

Explanation

The three major considerations that apply to Cyberspace Operations are Law, Authority, and Policy. Law refers to the legal framework and regulations that govern cyberspace activities, ensuring compliance and accountability. Authority refers to the allocation of power and decision-making capabilities within cyberspace operations, determining who has the right to take action. Policy involves the development and implementation of guidelines and procedures to govern cyberspace operations, ensuring consistency and effectiveness. By considering these three factors, organizations can navigate the complex landscape of cyberspace operations while maintaining legality, accountability, and efficiency.

Submit
125. (003) What is used as a starting point to develop the Career Field Education and Training Plan (CFETP) and Specialty Training Standard (STS) during the Specialty Training Requirements Team (STRT) and Utilization and Training Workshop (U&TW)?

Explanation

The Occupational Analysis Report (OAR) is used as a starting point to develop the Career Field Education and Training Plan (CFETP) and Specialty Training Standard (STS) during the Specialty Training Requirements Team (STRT) and Utilization and Training Workshop (U&TW). The OAR provides detailed information about the tasks, knowledge, and skills required for a particular job or career field. This information is then used to create the CFETP and STS, which outline the training and education requirements for individuals in that career field. The OAR serves as a foundation for the development of these training documents and ensures that they accurately reflect the needs of the job.

Submit
126. (224) Who is responsible for providing training to Quality Assurance (QA) personnel and functional directors/commanders?

Explanation

The Quality Assurance Program Coordinator is responsible for providing training to Quality Assurance (QA) personnel and functional directors/commanders. They are in charge of ensuring that all QA personnel are properly trained and equipped to carry out their duties effectively. They also work closely with functional directors/commanders to identify training needs and develop appropriate training programs. The QA Program Coordinator plays a crucial role in maintaining the quality standards of an organization by ensuring that all personnel involved are well-trained and knowledgeable in their respective roles.

Submit
127. (206) Which force module supported by Theater Deployable Communications (TDC) is established within 48 hours and supports 50 to150 users in a café environment?

Explanation

The correct answer is Command and control. The question asks for the force module supported by Theater Deployable Communications (TDC) that can be established within 48 hours and supports 50 to 150 users in a café environment. Command and control refers to the systems and procedures used to direct military operations and coordinate the activities of different units. This force module would provide the necessary communication and coordination capabilities for the users in a café environment.

Submit
128. (207) Which is not a division of the Air and Space Operations Center?

Explanation

The division of the Air and Space Operations Center that is not mentioned in the options is "Intelligence." Intelligence is an essential division in an operations center, as it provides crucial information and analysis to support combat operations and combat plans. However, since "Intelligence" is not listed as an option, the correct answer is "Combat support."

Submit
129. (003) Which of the following is not an action of the Specialty Training Requirements Team (STRT)?

Explanation

The Specialty Training Requirements Team (STRT) is responsible for various actions related to training and education. They draft and sign minutes, finalize part 1 of the career field education and training plan (CFETP), and finalize the Air Force Enlisted Classification Directory (AFECD) specialty description. However, they do not finalize the Specialty Training Standards (STS)/Course Training Standards (CTS) for all courses. This task is likely handled by another team or department within the organization.

Submit
130. (211) Which of the following is a type of change request used to correct a portion of the project not meeting requirement specifications?

Explanation

Defect repairs is the correct answer because it refers to a type of change request that is used to correct a portion of the project that does not meet the requirement specifications. When a defect is identified in the project, a change request is submitted to address and fix the issue, ensuring that the project meets the desired requirements. This corrective action helps to improve the quality and functionality of the project.

Submit
131. (212) What document marks the end of a project and validates the successful installation of a communications system?

Explanation

AFTO Form 747 is the correct answer because it is a document that is used to mark the end of a project and validate the successful installation of a communications system. This form is typically used in the military and aerospace industries to record and document the completion of maintenance and installation tasks. It serves as a formal record of the work done and provides verification that the project has been successfully completed.

Submit
132. (009) At the installation level which office is responsible for program implementation, administration, training, and monitoring the Government Purchase Card (GPC) Program?

Explanation

The Agency/Organization Program Coordinator (A/OPC) is responsible for program implementation, administration, training, and monitoring the Government Purchase Card (GPC) Program at the installation level. They oversee the day-to-day operations of the program, ensure compliance with policies and regulations, provide training to cardholders, and monitor card usage and transactions. The A/OPC acts as a liaison between the installation and the higher-level program management office, ensuring effective communication and coordination. They play a crucial role in managing and maintaining the GPC Program at the installation level.

Submit
133. (209) What Methods and Procedures Technical Order (MPTO) defines project management as the application of knowledge, skills, tools, and techniques to project activities to meet project objectives?

Explanation

not-available-via-ai

Submit
134. (226) The cost threshold for a minor construction project not using Operation and Maintenance (O&M) funds is

Explanation

The cost threshold for a minor construction project not using Operation and Maintenance (O&M) funds is $1.5 million (M). This means that any construction project with a cost below $1.5 million can be considered a minor construction project. Projects with a cost above this threshold would not fall under the category of a minor construction project.

Submit
135. (026) Which Supervisory Control and Data Acquisition (SCADA) subsystem connects to sensors in the process, converting sensor signals to digital data?

Explanation

The Remote Terminal Unit (RTU) is a SCADA subsystem that connects to sensors in the process and converts sensor signals to digital data. The RTU acts as an interface between the sensors and the SCADA system, collecting data from the sensors and transmitting it to the supervisory system for monitoring and control. It is responsible for acquiring data from the field devices, performing data conversions, and transmitting the data to the central SCADA system for further processing. The RTU plays a crucial role in the SCADA system by enabling real-time data acquisition and control of the process.

Submit
136. (028) Who provides the formal declaration that an information system is approved to operate in a particular security mode using a prescribed set of safeguards and acceptable risk?

Explanation

The Authorizing Official (AO) is the individual who provides the formal declaration that an information system is approved to operate in a particular security mode using a prescribed set of safeguards and acceptable risk. The AO is responsible for assessing the risks associated with the system and making the decision to authorize its operation. This role is typically held by a senior official within an organization who has the authority to make decisions regarding the system's security posture. The AO ensures that the system meets all necessary security requirements before granting approval for it to operate.

Submit
137. (003) Which segment of the Utilization of Training Workshop (U&TW)/Specialty Training Requirements Team (STRT) process concentrates on training proficiency levels and training resourcing?

Explanation

Segment 2 of the Utilization of Training Workshop (U&TW)/Specialty Training Requirements Team (STRT) process concentrates on training proficiency levels and training resourcing. This segment likely involves assessing the proficiency levels of individuals or teams and determining the resources needed for their training. It may include evaluating the current skill levels, identifying any gaps or deficiencies, and developing a plan to address them through appropriate training resources.

Submit
138. (018) Which 802.11 standard has a throughput of 11 Mbps and runs at the 2.4 GHz frequency?

Explanation

The correct answer is 802.11b. This standard has a throughput of 11 Mbps and operates at the 2.4 GHz frequency. It was one of the earliest Wi-Fi standards and offered faster speeds than its predecessor, 802.11a. However, it has been largely replaced by newer standards like 802.11g and 802.11n, which offer even higher speeds and better performance.

Submit
139. (219) In which type of plan do writers fully develop the mission, situation, and concept of operations for accomplishing assigned mission in the event of future situation, but only summarize the mobility and logistic requirements?

Explanation

A concept plan is a type of plan where writers fully develop the mission, situation, and concept of operations for accomplishing an assigned mission in the event of a future situation. However, they only provide a summary of the mobility and logistic requirements. This means that the concept plan focuses more on the overall strategy and approach to achieving the mission, rather than the specific details of how transportation and logistics will be handled.

Submit
140. (218) As a minimum which of the following is not required to review and validate technical solutions?

Explanation

To review and validate technical solutions, it is necessary to involve various stakeholders who have expertise in different areas. The Base Communications Systems Officer would be involved to ensure that the technical solutions align with the communication systems in place. The Affected Work Center would be involved to assess the impact of the solutions on their specific work area. Project Managers would be involved to oversee the implementation of the solutions. However, the Base Civil Engineer may not be required for reviewing and validating technical solutions, as their expertise is primarily related to construction and infrastructure projects rather than technical solutions.

Submit
141. (026) Which Intranet Control Weapon System sub-discipline conducts continuous monitoring to ensure timely delivery of critical information?

Explanation

Proactive Defense is the correct answer because it involves conducting continuous monitoring to ensure timely delivery of critical information. This sub-discipline focuses on actively identifying and mitigating potential threats and vulnerabilities in order to prevent attacks and ensure the security of the intranet control weapon system. It involves taking preemptive measures and implementing proactive security measures to stay ahead of potential threats and ensure the timely delivery of critical information.

Submit
142. (022) What type of encryption is applied to each end of a communications line in a distribute network, and ensures all the information flowing is unintelligible to an unauthorized intruder?

Explanation

Link encryption is the correct answer because it refers to the type of encryption applied to each end of a communications line in a distributed network. It ensures that all the information flowing through the line is unintelligible to unauthorized intruders. Link encryption specifically focuses on securing the communication link itself, rather than individual devices or end-to-end encryption. This type of encryption is crucial for maintaining the confidentiality and integrity of data transmitted over the network.

Submit
143. (201) Which deployment planning process develops predetermined responses to potential crises, determines forces required to achieve objectives, prepares deployment plans, and continually evaluates selected courses of action (COA)?

Explanation

Deliberate planning is the correct answer because it involves developing predetermined responses to potential crises, determining the forces required to achieve objectives, preparing deployment plans, and continually evaluating selected courses of action. This process is typically done in advance and allows for thorough analysis and consideration of various factors to ensure effective deployment and response to potential crises.

Submit
144. (220) Which of the following is not a step required in the modification proposal process?

Explanation

The work center manager certification and approval is not a step required in the modification proposal process. The other three options, which include request for action and organization validation, using command and lead command validation, and program manager review and approval of technical requirements and solution, are all necessary steps in the process.

Submit
145. (013) Network switches and bridges operate at what Open System Interconnect (OSI) layer?

Explanation

Network switches and bridges operate at the Data Link layer of the Open System Interconnect (OSI) model. This layer is responsible for the reliable transfer of data between nodes on a network. Switches and bridges use MAC addresses to forward data packets within a local area network (LAN) by examining the destination address in each packet and forwarding it to the appropriate port. They provide connectivity and manage the flow of data at the data link layer, ensuring efficient and secure communication between devices on the network.

Submit
146. (225) Who acts as the unit focal point to provide design support to and/or obtain base Civil Engineering (CE) support?

Explanation

The unit plans, planning, and agreements section acts as the unit focal point to provide design support to and/or obtain base Civil Engineering (CE) support. This section is responsible for coordinating and planning the unit's infrastructure requirements and ensuring that the necessary support is obtained from the base CE. They work closely with the facility manager, quality assurance evaluator, and functional director/commander to ensure that the unit's design needs are met and that the necessary CE support is provided.

Submit
147. (010) Guidance for awards specific to the Cyber community are found in Air Force instruction

Explanation

not-available-via-ai

Submit
148. (026) Which Supervisory Control and Data Acquisition (SCADA) subsystem gathers data on the process and sends commands to the processor?

Explanation

The Supervisory System is the SCADA subsystem that gathers data on the process and sends commands to the processor. It acts as the central control unit, collecting information from various sensors and devices, and then transmitting commands to the processor or other subsystems based on the gathered data. The Supervisory System plays a crucial role in monitoring and controlling the process, ensuring efficient and effective operation.

Submit
149. (009) Detailed instructions for submitting a reclama or shortfall request are found in

Explanation

AFI 10-401 contains the detailed instructions for submitting a reclama or shortfall request. The other options, Air Force Instruction (AFI) 10-201, Joint Publication 1-02, and Joint Publication 1-03, do not provide the specific instructions for this process. Therefore, AFI 10-401 is the correct answer.

Submit
150. (209) The five phases of Project Management are initiate,

Explanation

The correct answer is "plan, execute, close, and control." This answer accurately represents the five phases of Project Management. The first phase is planning, where the project objectives, scope, and strategies are defined. The second phase is execution, where the project plan is put into action. The third phase is closure, where the project is completed, and deliverables are handed over to the client. The final phase is control, where the project progress is monitored, and necessary adjustments are made to ensure the project's success.

Submit
151. (004) Which of the following is not a common duty of the Maintenance Data Collection (MDC) monitor?

Explanation

The correct answer is "Ensures equipment status is entered into Equipment Status Reporting (ESR)". This duty is not typically performed by the Maintenance Data Collection (MDC) monitor. The MDC monitor is responsible for reviewing Integrated Maintenance Data System (IMDS) reports to ensure job status is reflected properly, matching reports with Open Incident Listing (OIL), and scheduling and distributing daily maintenance actions.

Submit
152. (009) In-depth information for administering the Government Purchase Card program at all responsible levels is found in Air Force Instruction (AFI)

Explanation

The correct answer is 64-117. This Air Force Instruction provides comprehensive guidance and instructions for administering the Government Purchase Card program at all responsible levels. It contains in-depth information on the policies, procedures, and requirements for effectively managing the program.

Submit
153. (201) Which War and Mobilization Plan (WMP) volume provides a consolidated reference source for general policies and guidance for mobilization planning and the support of combat forces in time of war?

Explanation

Volume 1 of the War and Mobilization Plan (WMP) provides a consolidated reference source for general policies and guidance for mobilization planning and the support of combat forces in time of war. This volume likely contains the overarching principles and strategies that guide the planning and execution of mobilization efforts, serving as a comprehensive resource for military planners and decision-makers.

Submit
154. (013) Virtual circuits are established, maintained, and terminated at what Open System Interconnect (OSI) layer?

Explanation

Virtual circuits are established, maintained, and terminated at the Transport layer of the Open System Interconnect (OSI) model. The Transport layer is responsible for end-to-end communication between hosts and ensures reliable and orderly delivery of data. Virtual circuits are a method of establishing a logical connection between two endpoints in a network, providing a dedicated communication path for the duration of the connection. This layer handles the establishment, maintenance, and termination of virtual circuits, allowing for efficient and reliable communication between network devices.

Submit
155. (215) The five key stages of the Information Technology Infrastructure Library (ITIL) service life cycle are service strategy,

Explanation

The correct answer is "service design, service transition, service operation, and continual service improvement." This is the correct sequence of the five key stages of the ITIL service life cycle. The stages start with service design, where the service is planned and designed. Then, it moves to service transition, where the service is built, tested, and implemented. After that, it goes to service operation, where the service is delivered and managed. Finally, it concludes with continual service improvement, where the service is constantly evaluated and enhanced.

Submit
156. (007) Recommended technical order (TO) changes are required to be submitted on

Explanation

not-available-via-ai

Submit
157. (213) Changes are requested during a project using an

Explanation

During a project, changes are requested using an AF Form 1146. This form is specifically designed for requesting changes and modifications within the Air Force. It is the appropriate form to use in this scenario as it allows for clear documentation and tracking of requested changes throughout the project. The other forms listed, AF Form 1747, AFTO Form 46, and AFTO Form 47, are not specifically designed for requesting changes and may not provide the necessary documentation and tracking capabilities.

Submit
158. (224) Who is responsible for assigning competent and capable functional experts as primary and alternate Contract Officer Representatives (COR)?

Explanation

The functional director or commander is responsible for assigning competent and capable functional experts as primary and alternate Contract Officer Representatives (COR). This individual has the knowledge and authority to select individuals who possess the necessary expertise and skills to effectively oversee and manage contracts on behalf of the contracting office. The functional director or commander plays a crucial role in ensuring that the CORs are well-equipped to fulfill their responsibilities and meet the requirements of the contracts they are assigned to.

Submit
159. (215) In what Information Technology Infrastructure Library (ITIL) stage do you create the framework to ensure the designed service is effectively and efficiently implemented in the live environment?

Explanation

In the Service Transition stage of the Information Technology Infrastructure Library (ITIL), the framework is created to ensure that the designed service is effectively and efficiently implemented in the live environment. This stage focuses on transitioning the service from the design phase to the operational phase, including activities such as testing, training, and deployment. It aims to minimize any disruptions or risks during the transition process and ensure that the service is ready for operation.

Submit
160. (205) Which force module facilitates integration of open the airbase and command and control force module capabilities to enable the airfield to generate air support to accomplish its assigned mission?

Explanation

The force module that facilitates integration of open the airbase and command and control force module capabilities to enable the airfield to generate air support to accomplish its assigned mission is "Establish the airbase". This force module focuses on setting up and organizing the airbase infrastructure, facilities, and resources necessary for successful air operations. It involves tasks such as constructing runways, establishing communication systems, setting up fuel and maintenance facilities, and coordinating with command and control elements to ensure the airfield can effectively support air missions.

Submit
161. (215) In what Information Technology Infrastructure Library (ITIL) stage do you determine the underlying principles used for developing the policies, objectives, guidelines, and processes required throughout the Service Life Cycle?

Explanation

In the Service Strategy stage of the ITIL, the underlying principles used for developing the policies, objectives, guidelines, and processes required throughout the Service Life Cycle are determined. This stage focuses on understanding the organization's goals and customer needs, and then developing a strategy to meet those needs effectively. It involves making decisions about which services to offer, how to differentiate from competitors, and how to align IT services with business objectives. Therefore, the correct answer is Service strategy.

Submit
162. (221) Support agreements are documented on

Explanation

Support agreements are documented on DD Form 1144.

Submit
163. (224) Who is responsible for establishing and maintaining the installation's contract Quality Assurance Program?

Explanation

The correct answer is Contracting Office. The contracting office is responsible for establishing and maintaining the installation's contract Quality Assurance Program. This includes ensuring that the program meets all necessary requirements and is implemented effectively. The contracting office is also responsible for overseeing any quality assurance evaluations and making any necessary adjustments to the program.

Submit
164. (217) Where can you find a list of lead commands or system program offices (SPOs) for each major program?

Explanation

not-available-via-ai

Submit
165. (220) Which modification type evaluates, demonstrates, or exercises the technical performance, operational effectiveness, and/or the operational suitability of developmental and/or test materiel (hardware, firmware and software) capabilities?

Explanation

All temporary and permanent modifications evaluate, demonstrate, or exercise the technical performance, operational effectiveness, and/or the operational suitability of developmental and/or test materiel (hardware, firmware, and software) capabilities.

Submit
166. (203) The Governing guidance for Air and Space Expeditionary Force Reporting Tool (ART) reporting is AFI

Explanation

The correct answer is 10-244. This is because AFI 10-244 provides the governing guidance for the Air and Space Expeditionary Force Reporting Tool (ART) reporting. The other options (10-201, 10-401, 10-403) do not specifically relate to ART reporting.

Submit
167. (217) Which guidance directs the use of Cyberspace Infrastructure Planning System (CIPS)?

Explanation

AFI 33-150 is the correct answer because it provides guidance for the use of the Cyberspace Infrastructure Planning System (CIPS). AFI 33-115 does not mention CIPS, and TO 00-33D-3001 and TO 00-33D-3004 are technical orders that do not specifically address the use of CIPS.

Submit
168. (204) Which document provides detailed information and instructions on Designated Operational Capability (DOC) statements?

Explanation

AFI 10–201 provides detailed information and instructions on Designated Operational Capability (DOC) statements.

Submit
169. (225) What must base Civil Engineering (CE) prepare and forward to MAJCOM for review and approval if major or minor construction is required?

Explanation

Base Civil Engineering (CE) must prepare and forward DD Form 1391 to MAJCOM for review and approval if major or minor construction is required. This form provides detailed information about the proposed construction project, including the purpose, scope, estimated cost, and justification. It allows MAJCOM to assess the project's feasibility, budgetary requirements, and potential impact on resources. By reviewing and approving DD Form 1391, MAJCOM ensures that the proposed construction aligns with organizational goals and priorities.

Submit
170. (205) Within how many days after open the airbase does the operate the airbase force module arrive, and when is delivery estimated to be complete?

Explanation

The "operate the airbase" force module arrives within 2 days after the airbase is opened. This module is responsible for establishing and maintaining the operational capabilities of the airbase, including air traffic control, aircraft maintenance, and logistics support. The delivery of the module is estimated to be complete within 14 days, allowing for the full operationalization of the airbase.

Submit
View My Results

Quiz Review Timeline (Updated): Jan 20, 2025 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 20, 2025
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 06, 2016
    Quiz Created by
    Bgilb00c
Cancel
  • All
    All (170)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
(027) Which identity management process uses a fingerprint to...
(023) What is the most common wireless networking standard?
(027) Which threat vector is considered more of an annoyance than an...
(027) Which vulnerability preventive measure is a small piece of code...
(027) Which identity management process uses a password to...
(021) A modem is a device that
(011) What device is a series of single-pole, single-throw...
(025) Within the information environment what term describes the...
(208) Which of the following is not a career field assigned to...
(008) When a person uses his or her position for private or personal...
(001) Which of the following functions is primarily staffed by Client...
(016) What Internet Protocol version 4 (IPv4) reserved address ...
(012) Which application includes tools to help recover lost files and...
(024) Which operations center monitors and controls Air Force network...
(018) The design of communications network is known as
(018) What kind of network is a group of computer and associated...
(006) Which statement is not a goal of Operation Risk Management...
(019) What topology consists of cable segments from each computer...
(010) Which of the following is the highest level in which quarterly...
(010) What are the inclusive dates for Secretary of the Air...
(013) The Institute of Electrical and Electronics Engineers (IEEE)...
(018) What kind of network interconnects users with computer resources...
(021) Dynamic routing automatically calculates the best path between...
(006) How many steps are there in Operational Risk Management (ORM)?
(006) Supervisors document and maintain completed safety training on
(211) The desired outcome, product, or service of a project is...
(007) What systems allow for a commonly understood, maintainable, and...
(014) What is the combat information technology (IT) communications...
(206) What is the typical pay grade of the deployed Contingency...
(001) Which of the following is not a mandatory requirement for the...
(004) What Automated Information System (AIS) is used to document...
(016) What class uses a range of 1-126 in the first octet of an...
(205) Which is not an initial capability of the open the airbase force...
(024) What title status must National Guard Guardsmen be in to execute...
(015) What are the two classifications of transport protocols?
(025) Which of the following is a true statement about Electronic...
(009) Which type of fund covers the cost of relocating facilities?
(208) All armed forces broadcasting affiliates merged under the...
(004) Who establishes the necessary controls to ensure periodic...
(021) Two basic routing activities are determining optimal routing...
(011) The maximum number of devices a FireWire bus can take is up to
(226) Who is responsible for inspecting all "real property" on an...
(017) Which common port contains Hyper Text Transfer Protocol (HTTP)...
(012) A workgroup is a simple grouping of how many computers?
(001) Which Air Force Specialty Code (AFSC) requires members to pass...
(003) Which of the following is not a responsibility of the Air Force...
(014) Who must provide encryption devices for connection to the Secret...
(206) The Contingency Response Wing headquarters is located at
(223) Which type of contract is permissible when there is only one...
(025) Which Electronic Warfare capability uses jamming to reduce the...
(208) Which Engineering Installation (EI) unit has the only flight...
(019) What topology defines the layout of a network's devices and...
(009) Which of the following is not a responsibility of Government...
(015) What regulates how much information passes over a Transmission...
(002) Where is the Air Force active component manpower planning and...
(006) Which of the following is not a term for Job Safety Analysis?
(001) What document directs the Communications Focal point key...
(016) Instead of using binary, how are Internet Protocol version 6...
(206) In the operate the air base module, what is the maximum distance...
(008) The creation of the DOD as an executive component of the...
(207) Which of the following is categorized as a small unmanned aerial...
(008) Who appoints Air Force Portal Content Mangers and Content...
(009) What is the maximum amount for minor construction projects that...
(217) Which Cyberspace Infrastructure Planning System (CIPS)...
(021) What Data Link Layer network device logically separates a single...
(002) which of the following is a subdivision of programmed cost data...
(017) The range of well-known port numbers is
(203) Which of the following is not a readiness category measured by...
(023) Which transmission medium is the primary carrier of voice...
(217) Which of the following funding options does the local...
(222) Which of the following is not an exception to the "full and open...
(025) What is critical to mitigating unintended or undesirable...
(015) What of these lists in the fields in the User Datagram Protocol...
(219) Which type of planning meeting identifies civil engineering...
(002) Which of the following is the official source of manpower...
(007) Which of the following is information not contained in Technical...
(007) Who determines if local checklists and/or work cards are...
(023) Which type of cable is associated with the original designs of...
(205) The key capabilities for establishing control in the Command and...
(008) Procedures and circumstances for Congress to order units into...
(015) In a connection-oriented protocol, such as Transmission Control...
(016) How many bits are in an Internet Protocol version 4 (IPv4)...
(219) What area of the Annex K is used to detail wartime procedures...
(209) What does the project manager provide in the Initiate Phase?
(209) What are the source documents that define a needed cyberspace...
(202) Who initiates the requirements or deployment sourcing process?
(226) Secretary of Defense and House and Senate Armed Services...
(203) Which of these is not an area measured and reported by Status of...
(003) Who serves as the major command (MAJCOM) voting representative...
(010) Who reviews the selections after the board selects the 12...
(016) What Internet Protocol version 4 (IPv4) class address is used...
(016) What Internet Protocol version 4 (IPv4) class address is used...
(204) Who develops logistics details (LOGDETS) to allow for 30 days of...
(213) What is critical to controlling and ensuring the overall project...
(012) Which is not a type of UNIX pathname?
(221) As a minimum, a support agreement must be reviewed how soon...
(223) Which of the following is a simplified method of filling...
(218) Which of the following is not a cause for requirements to be...
(020) Over a single pair cable, Integrated Services Digital Network...
(202) Which type of Joint Expeditionary Tasking (JET) tasking is a...
(222) Within how many days of the delivery date must a fully...
(205) Which force module contains support forces that would generally...
(026) Which Cyberspace Defense Weapon System sub-discipline determines...
(005) Which of the following is included in the Master Training Plan...
(028) The technical solution for a communications and information...
(018) Which 802.11 standard is designed to operate at both 2.4 GHz and...
(220) The AF Form 1067 is used for defining, validating, and approving...
(007) Who should endorse the AF Form 673 as the Certifying Official?
(214) Who implements a technical solution for a base?
(219) If instructions are not detailed enough to warrant a separate...
(210) Which of these items is contained in the Project Plan?
(003) Which of the following is an optional attendee for the...
(212) Exceptions that could prevent a system from meeting specified...
(005) Special Personnel Evaluations (SPEs) are required on a sampling...
(013) Routers operate at what Open Systems Interconnect (OSI) layer
(223) Which type of contract acquires supplies or services based on...
(223) Which type of contract should only be used when it is impossible...
(214) What title is given to anyone assigned to assist the program...
(216) Engineering support for MAJCOMs is provided by Cyberspace...
(027) What system monitoring concept uses long trend analysis of...
(219) When tasked by the supported combatant commander which type of...
(007) Who provides accreditation for the Telecommunications Industry...
(007) Who develops standards for Interconnect, Passive and...
(024) What are the three major considerations that apply to Cyberspace...
(003) What is used as a starting point to develop the Career Field...
(224) Who is responsible for providing training to Quality Assurance...
(206) Which force module supported by Theater Deployable...
(207) Which is not a division of the Air and Space Operations Center?
(003) Which of the following is not an action of the Specialty...
(211) Which of the following is a type of change request used to...
(212) What document marks the end of a project and validates the...
(009) At the installation level which office is responsible for...
(209) What Methods and Procedures Technical Order (MPTO) defines...
(226) The cost threshold for a minor construction project not using...
(026) Which Supervisory Control and Data Acquisition (SCADA) subsystem...
(028) Who provides the formal declaration that an information system...
(003) Which segment of the Utilization of Training Workshop...
(018) Which 802.11 standard has a throughput of 11 Mbps and runs at...
(219) In which type of plan do writers fully develop the mission,...
(218) As a minimum which of the following is not required to review...
(026) Which Intranet Control Weapon System sub-discipline conducts...
(022) What type of encryption is applied to each end of a...
(201) Which deployment planning process develops predetermined...
(220) Which of the following is not a step required in the...
(013) Network switches and bridges operate at what Open System...
(225) Who acts as the unit focal point to provide design support to...
(010) Guidance for awards specific to the Cyber community are found in...
(026) Which Supervisory Control and Data Acquisition (SCADA) subsystem...
(009) Detailed instructions for submitting a reclama or shortfall...
(209) The five phases of Project Management are initiate,
(004) Which of the following is not a common duty of the Maintenance...
(009) In-depth information for administering the Government Purchase...
(201) Which War and Mobilization Plan (WMP) volume provides a...
(013) Virtual circuits are established, maintained, and terminated at...
(215) The five key stages of the Information Technology Infrastructure...
(007) Recommended technical order (TO) changes are required to be...
(213) Changes are requested during a project using an
(224) Who is responsible for assigning competent and capable...
(215) In what Information Technology Infrastructure Library (ITIL)...
(205) Which force module facilitates integration of open the airbase...
(215) In what Information Technology Infrastructure Library (ITIL)...
(221) Support agreements are documented on
(224) Who is responsible for establishing and maintaining the...
(217) Where can you find a list of lead commands or system program...
(220) Which modification type evaluates, demonstrates, or exercises...
(203) The Governing guidance for Air and Space Expeditionary Force...
(217) Which guidance directs the use of Cyberspace Infrastructure...
(204) Which document provides detailed information and instructions on...
(225) What must base Civil Engineering (CE) prepare and forward to...
(205) Within how many days after open the airbase does the operate the...
Alert!

Advertisement