(027) Which identity management process uses a fingerprint to...
(023) What is the most common wireless networking standard?
(027) Which threat vector is considered more of an annoyance than an...
(027) Which vulnerability preventive measure is a small piece of code...
(027) Which identity management process uses a password to...
(021) A modem is a device that
(011) What device is a series of single-pole, single-throw...
(025) Within the information environment what term describes the...
(208) Which of the following is not a career field assigned to...
(008) When a person uses his or her position for private or personal...
(001) Which of the following functions is primarily staffed by Client...
(016) What Internet Protocol version 4 (IPv4) reserved address ...
(012) Which application includes tools to help recover lost files and...
(024) Which operations center monitors and controls Air Force network...
(018) The design of communications network is known as
(018) What kind of network is a group of computer and associated...
(006) Which statement is not a goal of Operation Risk Management...
(019) What topology consists of cable segments from each computer...
(010) Which of the following is the highest level in which quarterly...
(010) What are the inclusive dates for Secretary of the Air...
(013) The Institute of Electrical and Electronics Engineers (IEEE)...
(018) What kind of network interconnects users with computer resources...
(021) Dynamic routing automatically calculates the best path between...
(006) How many steps are there in Operational Risk Management (ORM)?
(006) Supervisors document and maintain completed safety training on
(211) The desired outcome, product, or service of a project is...
(007) What systems allow for a commonly understood, maintainable, and...
(014) What is the combat information technology (IT) communications...
(206) What is the typical pay grade of the deployed Contingency...
(001) Which of the following is not a mandatory requirement for the...
(004) What Automated Information System (AIS) is used to document...
(016) What class uses a range of 1-126 in the first octet of an...
(205) Which is not an initial capability of the open the airbase force...
(024) What title status must National Guard Guardsmen be in to execute...
(015) What are the two classifications of transport protocols?
(025) Which of the following is a true statement about Electronic...
(009) Which type of fund covers the cost of relocating facilities?
(208) All armed forces broadcasting affiliates merged under the...
(004) Who establishes the necessary controls to ensure periodic...
(021) Two basic routing activities are determining optimal routing...
(011) The maximum number of devices a FireWire bus can take is up to
(226) Who is responsible for inspecting all "real property" on an...
(017) Which common port contains Hyper Text Transfer Protocol (HTTP)...
(012) A workgroup is a simple grouping of how many computers?
(001) Which Air Force Specialty Code (AFSC) requires members to pass...
(003) Which of the following is not a responsibility of the Air Force...
(014) Who must provide encryption devices for connection to the Secret...
(206) The Contingency Response Wing headquarters is located at
(223) Which type of contract is permissible when there is only one...
(025) Which Electronic Warfare capability uses jamming to reduce the...
(208) Which Engineering Installation (EI) unit has the only flight...
(019) What topology defines the layout of a network's devices and...
(009) Which of the following is not a responsibility of Government...
(015) What regulates how much information passes over a Transmission...
(002) Where is the Air Force active component manpower planning and...
(006) Which of the following is not a term for Job Safety Analysis?
(001) What document directs the Communications Focal point key...
(016) Instead of using binary, how are Internet Protocol version 6...
(206) In the operate the air base module, what is the maximum distance...
(008) The creation of the DOD as an executive component of the...
(207) Which of the following is categorized as a small unmanned aerial...
(008) Who appoints Air Force Portal Content Mangers and Content...
(009) What is the maximum amount for minor construction projects that...
(217) Which Cyberspace Infrastructure Planning System (CIPS)...
(021) What Data Link Layer network device logically separates a single...
(002) which of the following is a subdivision of programmed cost data...
(017) The range of well-known port numbers is
(203) Which of the following is not a readiness category measured by...
(023) Which transmission medium is the primary carrier of voice...
(217) Which of the following funding options does the local...
(222) Which of the following is not an exception to the "full and open...
(025) What is critical to mitigating unintended or undesirable...
(015) What of these lists in the fields in the User Datagram Protocol...
(219) Which type of planning meeting identifies civil engineering...
(002) Which of the following is the official source of manpower...
(007) Which of the following is information not contained in Technical...
(007) Who determines if local checklists and/or work cards are...
(023) Which type of cable is associated with the original designs of...
(205) The key capabilities for establishing control in the Command and...
(008) Procedures and circumstances for Congress to order units into...
(015) In a connection-oriented protocol, such as Transmission Control...
(016) How many bits are in an Internet Protocol version 4 (IPv4)...
(219) What area of the Annex K is used to detail wartime procedures...
(209) What does the project manager provide in the Initiate Phase?
(209) What are the source documents that define a needed cyberspace...
(202) Who initiates the requirements or deployment sourcing process?
(226) Secretary of Defense and House and Senate Armed Services...
(203) Which of these is not an area measured and reported by Status of...
(003) Who serves as the major command (MAJCOM) voting representative...
(010) Who reviews the selections after the board selects the 12...
(016) What Internet Protocol version 4 (IPv4) class address is used...
(016) What Internet Protocol version 4 (IPv4) class address is used...
(204) Who develops logistics details (LOGDETS) to allow for 30 days of...
(213) What is critical to controlling and ensuring the overall project...
(012) Which is not a type of UNIX pathname?
(221) As a minimum, a support agreement must be reviewed how soon...
(223) Which of the following is a simplified method of filling...
(218) Which of the following is not a cause for requirements to be...
(020) Over a single pair cable, Integrated Services Digital Network...
(202) Which type of Joint Expeditionary Tasking (JET) tasking is a...
(222) Within how many days of the delivery date must a fully...
(205) Which force module contains support forces that would generally...
(026) Which Cyberspace Defense Weapon System sub-discipline determines...
(005) Which of the following is included in the Master Training Plan...
(028) The technical solution for a communications and information...
(018) Which 802.11 standard is designed to operate at both 2.4 GHz and...
(220) The AF Form 1067 is used for defining, validating, and approving...
(007) Who should endorse the AF Form 673 as the Certifying Official?
(214) Who implements a technical solution for a base?
(219) If instructions are not detailed enough to warrant a separate...
(210) Which of these items is contained in the Project Plan?
(003) Which of the following is an optional attendee for the...
(212) Exceptions that could prevent a system from meeting specified...
(005) Special Personnel Evaluations (SPEs) are required on a sampling...
(013) Routers operate at what Open Systems Interconnect (OSI) layer
(223) Which type of contract acquires supplies or services based on...
(223) Which type of contract should only be used when it is impossible...
(214) What title is given to anyone assigned to assist the program...
(216) Engineering support for MAJCOMs is provided by Cyberspace...
(027) What system monitoring concept uses long trend analysis of...
(219) When tasked by the supported combatant commander which type of...
(007) Who provides accreditation for the Telecommunications Industry...
(007) Who develops standards for Interconnect, Passive and...
(024) What are the three major considerations that apply to Cyberspace...
(003) What is used as a starting point to develop the Career Field...
(224) Who is responsible for providing training to Quality Assurance...
(206) Which force module supported by Theater Deployable...
(207) Which is not a division of the Air and Space Operations Center?
(003) Which of the following is not an action of the Specialty...
(211) Which of the following is a type of change request used to...
(212) What document marks the end of a project and validates the...
(009) At the installation level which office is responsible for...
(209) What Methods and Procedures Technical Order (MPTO) defines...
(226) The cost threshold for a minor construction project not using...
(026) Which Supervisory Control and Data Acquisition (SCADA) subsystem...
(028) Who provides the formal declaration that an information system...
(003) Which segment of the Utilization of Training Workshop...
(018) Which 802.11 standard has a throughput of 11 Mbps and runs at...
(219) In which type of plan do writers fully develop the mission,...
(218) As a minimum which of the following is not required to review...
(026) Which Intranet Control Weapon System sub-discipline conducts...
(022) What type of encryption is applied to each end of a...
(201) Which deployment planning process develops predetermined...
(220) Which of the following is not a step required in the...
(013) Network switches and bridges operate at what Open System...
(225) Who acts as the unit focal point to provide design support to...
(010) Guidance for awards specific to the Cyber community are found in...
(026) Which Supervisory Control and Data Acquisition (SCADA) subsystem...
(009) Detailed instructions for submitting a reclama or shortfall...
(209) The five phases of Project Management are initiate,
(004) Which of the following is not a common duty of the Maintenance...
(009) In-depth information for administering the Government Purchase...
(201) Which War and Mobilization Plan (WMP) volume provides a...
(013) Virtual circuits are established, maintained, and terminated at...
(215) The five key stages of the Information Technology Infrastructure...
(007) Recommended technical order (TO) changes are required to be...
(213) Changes are requested during a project using an
(224) Who is responsible for assigning competent and capable...
(215) In what Information Technology Infrastructure Library (ITIL)...
(205) Which force module facilitates integration of open the airbase...
(215) In what Information Technology Infrastructure Library (ITIL)...
(221) Support agreements are documented on
(224) Who is responsible for establishing and maintaining the...
(217) Where can you find a list of lead commands or system program...
(220) Which modification type evaluates, demonstrates, or exercises...
(203) The Governing guidance for Air and Space Expeditionary Force...
(217) Which guidance directs the use of Cyberspace Infrastructure...
(204) Which document provides detailed information and instructions on...
(225) What must base Civil Engineering (CE) prepare and forward to...
(205) Within how many days after open the airbase does the operate the...