3DX7X Vol 1 Cyberspace Support Craftsman

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Wally_
W
Wally_
Community Contributor
Quizzes Created: 1 | Total Attempts: 2,768
| Attempts: 2,768 | Questions: 100
Please wait...
Question 1 / 100
0 %
0/100
Score 0/100
1. Which identity management process uses a fingerprint to authenticate a user?

Explanation

Biometrics is the correct answer because it refers to the identity management process that uses a fingerprint to authenticate a user. Biometrics involves the use of unique physical or behavioral characteristics, such as fingerprints, iris patterns, or facial recognition, to verify a person's identity. By comparing the fingerprint provided by the user with the stored fingerprint data, the system can authenticate the user's identity. This method is considered highly secure as it is difficult to replicate or forge someone's unique biometric traits.

Submit
Please wait...
About This Quiz
Air Force Quizzes & Trivia

The air force being a very important section and part of the military, we have different Air Force Specialty Codes that determine the different ranks within the force. Cyberspace support craftsman quiz below has more on this.

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. What is the most common wireless networking standard?

Explanation

The most common wireless networking standard is 802.11. This standard is commonly known as Wi-Fi and is used for wireless communication between devices such as computers, smartphones, and routers. It operates in the 2.4 GHz and 5 GHz frequency bands and provides fast and reliable wireless connectivity. The other options (802.3, 802.9, and 802.14) are not wireless networking standards but instead refer to wired Ethernet standards.

Submit
3. Within the information environment what term describes the advantage, or imbalance, in one's favor?

Explanation

Information Superiority refers to the advantage or imbalance in one's favor within the information environment. It means having access to accurate, relevant, and timely information, as well as the ability to process and analyze it effectively. With information superiority, individuals or organizations can make informed decisions, gain a competitive edge, and achieve their objectives more efficiently. It encompasses the management, control, and exploitation of information to gain an advantage over adversaries or competitors.

Submit
4. Which threat vector is considered more of an annoyance than an attack?

Explanation

Spam is considered more of an annoyance than an attack because it involves the mass sending of unsolicited and unwanted messages, typically for advertising purposes. While spam can be disruptive and time-consuming to deal with, it does not directly compromise the security or integrity of a system or personal information. In contrast, viruses, spyware, and phishing attacks are designed to infiltrate and harm systems, steal sensitive data, or deceive users into revealing confidential information. Therefore, spam is generally seen as a nuisance rather than a direct threat.

Submit
5. Which vulnerability preventive measure is a small piece of code that software developers create to address the flaws found in the original code of a program?

Explanation

Patches are small pieces of code that software developers create to fix or address the flaws found in the original code of a program. These patches are designed to prevent vulnerabilities and improve the security of the software. They are typically released by the software developers as updates or upgrades to the existing program, providing fixes for identified security issues or bugs. By applying patches, users can protect their systems from potential exploits and ensure that their software is up to date with the latest security enhancements.

Submit
6. Which of the following functions is primarily staffed by Client Systems personnel but may have a variety of Air Force Specialty Codes (AFSCs) based upon the unit mission?

Explanation

The Communications Focal Point function is primarily staffed by Client Systems personnel but may have a variety of Air Force Specialty Codes (AFSCs) based upon the unit mission. This means that while Client Systems personnel are the main staff for this function, there may be individuals from different AFSCs assigned to this role depending on the specific mission of the unit.

Submit
7. When a person uses his or her position for private or personal gain it is called

Explanation

When a person uses their position for private or personal gain, it is considered a misuse of their position. This implies that the individual is taking advantage of their authority or influence for their own personal benefit, which is unethical and often against regulations or policies. It involves using one's position to gain advantages, privileges, or benefits that are not available to others.

Submit
8. What device is a series of single-pole, single-throw switches mounted to a circuit board?

Explanation

A keyboard is a device that consists of a series of single-pole, single-throw switches mounted to a circuit board. These switches are responsible for registering the keystrokes made by the user and transmitting them to the computer. This allows the user to input data and commands into the computer system. Therefore, the correct answer is Keyboard.

Submit
9. Which application includes tools to help recover lost files and protect against computer failure?

Explanation

Norton Utilities is the correct answer because it is a software application that provides tools specifically designed to help recover lost files and protect against computer failure. It offers features such as disk optimization, file recovery, system diagnostics, and data protection. Acrobat Reader is a PDF reader, Virus Scan is an antivirus software, and WinZip is a file compression tool, none of which are primarily focused on file recovery or computer failure protection.

Submit
10. Which identity management process uses a password to authenticate a user?

Explanation

The identity management process that uses a password to authenticate a user is known as knowledge-based authentication. In this process, the user is required to provide a password that they have previously chosen and is associated with their account. This method is commonly used in various systems and platforms to verify the identity of users and grant them access to their accounts or resources.

Submit
11. A modem is a device that

Explanation

A modem is a device that modulates and demodulates data signals. This means that it converts digital data from a computer into analog signals that can be transmitted over a telephone or cable line, and then converts the analog signals back into digital data at the receiving end. This process allows for the transmission of data over long distances using existing infrastructure.

Submit
12. What are the inclusive dates for Secretary of the Air Force/Chief Information Officer (SAF/CIO) annual awards?

Explanation

The inclusive dates for the Secretary of the Air Force/Chief Information Officer (SAF/CIO) annual awards are from 1 October to 30 September. This means that the awards cover a one-year period starting from October 1st and ending on September 30th of the following year.

Submit
13. Which operations center monitors and controls Air Force network access points, boundary protection devices, and network activity to provide situational awareness, and report suspicious/malicious activity?

Explanation

The correct answer is Integrated Network Operations Security Center (I-NOSC). This center is responsible for monitoring and controlling Air Force network access points, boundary protection devices, and network activity. It provides situational awareness and reports any suspicious or malicious activity. The other options mentioned, such as Base Defense Operations Center, 624th Operations Center, and Air Operations Center, are not specifically focused on network monitoring and control.

Submit
14. What Internet Protocol version 4 (IPv4) reserved address is used for loop back?

Explanation

The Internet Protocol version 4 (IPv4) reserved address used for loop back is 127.0.0.1. This address is commonly referred to as the "localhost" address and is used to test network connections on a local machine. It allows a computer to send and receive data within its own network interface without actually connecting to an external network.

Submit
15. The design of communications network is known as

Explanation

The design of a communications network refers to the overall structure and organization of the network, including its layout, protocols, and components. This encompasses decisions regarding the arrangement of devices, the flow of data, and the overall functionality of the network. Therefore, "network architecture" is the most appropriate term to describe the design of a communications network.

Submit
16. What topology consists of cable segments from each computer connected to a centralized component?

Explanation

A star topology consists of cable segments from each computer connected to a centralized component, usually a hub or switch. In this topology, all communication between computers is done through the centralized component, which acts as a central point of control. This allows for easy management and troubleshooting of the network, as well as the ability to add or remove computers without disrupting the entire network.

Submit
17. Which statement is not a goal of Operational Risk Management (ORM)?

Explanation

not-available-via-ai

Submit
18. Supervisors document and maintain completed safety training on

Explanation

Supervisors document and maintain completed safety training on AF Form 55. This form is specifically designed for documenting and tracking safety training completion. It serves as a record of an individual's safety training history and can be used to ensure compliance with safety regulations. By using AF Form 55, supervisors can easily keep track of who has completed the required safety training and ensure that all necessary training is documented and maintained.

Submit
19. Which of the following is the highest level in which quarterly awards are normally presented?

Explanation

The highest level in which quarterly awards are normally presented is at the Wing level. This indicates that the awards are given at the level of a Wing, which is typically higher in hierarchy compared to a Group, Squadron, or major command.

Submit
20. The Institute of Electrical and Electronics Engineers (IEEE) divides the Open System Interconnect (OSI) Data Link Layers into what two sublayers?

Explanation

The correct answer is Logical Link Control (LLC) and Media Access Control (MAC). The OSI Data Link Layer is divided into these two sublayers to handle different functions. The LLC sublayer is responsible for managing flow control, error control, and framing of data, while the MAC sublayer is responsible for controlling access to the physical media and handling data transmission between devices. These two sublayers work together to ensure reliable and efficient communication between network devices.

Submit
21. What class uses a range of 1–126 in the first octet of an Internet Protocol version 4 (IPv4)?

Explanation

Class A uses a range of 1-126 in the first octet of an IPv4 address. Class A addresses are used for large networks with a large number of hosts. The first bit in the first octet is always 0, indicating that it is a Class A address. This allows for a maximum of 126 networks, with each network capable of accommodating a large number of hosts.

Submit
22. Which Air Force Specialty Code (AFSC) requires members to pass the Air Force Electronic Data Processing Test?

Explanation

The Air Force Specialty Code (AFSC) that requires members to pass the Air Force Electronic Data Processing Test is Computer Systems Programming. This test is likely a requirement for this specialty because computer systems programmers need to have a strong understanding of electronic data processing in order to effectively develop and maintain software programs. The other AFSC options listed may also involve working with computer systems and technology, but they do not specifically mention the requirement of passing the Air Force Electronic Data Processing Test.

Submit
23. How many steps are there in Operational Risk Management (ORM)?

Explanation

Operational Risk Management (ORM) typically involves a six-step process. These steps include identifying risks, assessing and analyzing risks, evaluating and prioritizing risks, developing risk management strategies, implementing risk controls, and monitoring and reviewing the effectiveness of these controls. Therefore, the correct answer is 6.

Submit
24. What is the combat information technology (IT) communication support agency of the DoD called?

Explanation

The correct answer is Defense Information Systems Agency. Defense Information Systems Agency (DISA) is the combat information technology (IT) communication support agency of the Department of Defense (DoD). DISA provides information technology and communications support to the military services, combatant commands, and other DoD components. It is responsible for managing and operating the Defense Information Systems Network (DISN), which is the global enterprise network for the DoD.

Submit
25. What are the two classifications of transport protocols?

Explanation

The correct answer is "Connection Oriented and Connectionless Oriented." This is because transport protocols can be classified into two main categories based on their connection establishment and management. Connection-oriented protocols, such as TCP, establish a dedicated connection between the sender and receiver before data transmission, ensuring reliable and ordered delivery. On the other hand, connectionless protocols, like UDP, do not establish a connection and simply send data packets without any guarantee of delivery or order.

Submit
26. What kind of network is a group of computers and associated devices that share a common communications line within a small geographic area?

Explanation

A Local Area Network (LAN) is a network that connects a group of computers and associated devices within a small geographic area, such as a building or campus. It allows for the sharing of resources and communication between devices, making it ideal for small businesses or homes. Unlike a Wide Area Network (WAN) that covers a larger area, a LAN is limited to a specific location. A Metropolitan Area Network (MAN) is a larger network that covers a city or metropolitan area, while a Virtual Private Network (VPN) is a secure network that allows users to access a private network over a public network.

Submit
27. Dynamic routing automatically calculates the best path between how many nodes?

Explanation

Dynamic routing automatically calculates the best path between two nodes. This means that it determines the most efficient route for data packets to travel from the source node to the destination node. By continuously analyzing network conditions and updating routing tables, dynamic routing protocols such as OSPF or BGP can adapt to changes in the network topology and select the optimal path based on factors such as link cost, bandwidth, or delay.

Submit
28. What kind of network interconnects users with computer resources in a geographic area or region like a city?

Explanation

A Metropolitan Area Network (MAN) is a type of network that interconnects users with computer resources in a specific geographic area or region, typically a city. This network provides high-speed connectivity and covers a larger area than a Local Area Network (LAN) but smaller than a Wide Area Network (WAN). MANs are commonly used by organizations or institutions that have multiple locations within a city and need to share resources and data efficiently.

Submit
29. What Automated Information System (AIS) is used to document actions on any item with an assigned Standard Reporting Designator (SRD)?

Explanation

The Integrated Maintenance Data System (IMDS) is the correct answer because it is an Automated Information System (AIS) that is used to document actions on any item with an assigned Standard Reporting Designator (SRD). IMDS is specifically designed for maintenance management and provides a centralized database for recording and tracking maintenance actions, including work orders, repairs, and inspections. It allows for efficient documentation and analysis of maintenance activities, ensuring that all actions on items with SRD are properly recorded and managed.

Submit
30. Which of the following is not a mandatory requirement for the advancement to the 7-skill level?

Explanation

The completion of Air Education and Training Command (AETC) Supplemental training courses is not a mandatory requirement for advancement to the 7-skill level. The other options, such as minimum rank of SSgt, 6 months on-the-job training for retrainees, and completion of Air Force Specialty Code (AFSC) specific requirements, are all mandatory requirements for advancement to the 7-skill level.

Submit
31. What document directs the Communications Focal point key processes?

Explanation

The document that directs the Communications Focal Point key processes is MPTO 00-33A-1001-WA.

Submit
32. What systems allow for a commonly understood, maintainable, and defendable domain through all federal and non-federal systems?

Explanation

Commercial Off-The-Shelf (COTS) systems are commonly understood, maintainable, and defendable domains through all federal and non-federal systems. COTS refers to ready-made, commercially available software or hardware that can be easily integrated into various systems. These systems are widely used across different industries and are designed to meet industry standards and regulations. By using COTS systems, organizations can ensure interoperability, ease of maintenance, and the ability to defend against potential security threats.

Submit
33. Which of the following is not a responsibility of the Air Force Career Field Manager (AFCFM)?

Explanation

The Air Force Career Field Manager (AFCFM) is responsible for various tasks related to managing and developing a specific career field within the Air Force. This includes constructing career paths, managing skill-level training requirements, and establishing requirements for entry into the career field. However, distributing personnel throughout their respective major command (MAJCOM) is not a responsibility of the AFCFM. This task is typically handled by personnel managers or assignment officers who are responsible for assigning individuals to specific positions within the Air Force.

Submit
34. Which type of fund covers the cost of relocating facilities?

Explanation

Military Construction (MILCON) funds cover the cost of relocating facilities. MILCON funds are specifically allocated for construction projects related to military facilities, including the relocation of existing facilities. These funds are used to build, expand, or upgrade military infrastructure such as barracks, hangars, training facilities, and other necessary structures. Therefore, MILCON funds are the appropriate type of fund to cover the cost of relocating facilities.

Submit
35. The maximum number of devices a FireWire bus can take is up to

Explanation

A FireWire bus can support a maximum of 63 devices. FireWire is a high-speed serial bus interface that allows multiple devices to be connected to a computer. Each device on the bus is assigned a unique address, and the bus can handle up to 63 unique addresses. Therefore, the correct answer is 63.

Submit
36. What title status must National Guard Guardsmen be in to execute cyber operations?

Explanation

National Guard Guardsmen must be in Title 10 status to execute cyber operations. Title 10 refers to the federal status of the National Guard, which means they are under the control of the President and can be deployed for federal missions. This status allows them to participate in cyber operations, which often involve national security and defense. Title 30, Title 50, and Title 52 do not specifically pertain to the National Guard's authority for cyber operations.

Submit
37. Where is the Air Force active component manpower planning and programming centralized

Explanation

The correct answer is at Headquarters Air Force (HAF). This means that the Air Force active component manpower planning and programming is centralized at the headquarters of the Air Force. This suggests that the decision-making and coordination for manpower planning and programming activities occur at the highest level of the Air Force organization.

Submit
38. Which of the following is the official source of manpower information for an organization and is used as a tool to manage positions?

Explanation

The Unit Manpower Document (UMD) is the official source of manpower information for an organization and is used as a tool to manage positions. It provides detailed information about the authorized manpower positions within an organization, including the number of personnel required for each position, the skill sets needed, and the specific duties and responsibilities associated with each position. The UMD is an essential tool for organizations to effectively manage their workforce and ensure that they have the right personnel in the right positions to meet their operational needs.

Submit
39. The creation of the DOD as an executive component of the government Is authorized by United States Code (USC) Title

Explanation

The correct answer is 10. The creation of the DOD as an executive component of the government is authorized by United States Code (USC) Title 10. This means that the legal basis for establishing the Department of Defense (DOD) can be found in Title 10 of the United States Code, which is a compilation of all federal laws pertaining to the armed forces. Title 10 outlines the roles, responsibilities, and organization of the DOD, including its relationship with the President and Congress.

Submit
40. Who must provide encryption devices for connection to the Secret Internet Protocol (IP) Data service?

Explanation

The customer must provide encryption devices for connection to the Secret Internet Protocol (IP) Data service. This means that it is the responsibility of the customer to ensure that they have the necessary encryption devices in order to connect to the service securely. The Security Manager, National Security Agency, and Communications Squadron do not have the obligation to provide encryption devices in this context.

Submit
41. Who establishes the necessary controls to ensure periodic inspections are accomplished?

Explanation

The Flight Commander/Chief is responsible for establishing the necessary controls to ensure periodic inspections are accomplished. This includes setting up a system to schedule and track inspections, assigning personnel to carry out the inspections, and ensuring that the inspections are conducted according to regulations and standards. The Flight Commander/Chief plays a crucial role in maintaining the safety and operational readiness of the aircraft by overseeing the inspection process.

Submit
42. Which of the following is a subdivision of programmed cost data related to a weapon system or support function?

Explanation

The Program Element Code (PEC) is a subdivision of programmed cost data related to a weapon system or support function. It is used to identify and track specific elements within a program's budget. PECs are typically assigned to various components or tasks within a program, allowing for better cost management and analysis.

Submit
43. Who appoints Air Force Portal Content Managers and Content Publishers for public and private websites?

Explanation

The Wing Commander is responsible for appointing Air Force Portal Content Managers and Content Publishers for public and private websites. This individual holds the authority to select individuals who will oversee and manage the content on these websites.

Submit
44. What is the maximum amount for minor construction projects that Operation and Maintenance (O&M) funds will cover under normal conditions?

Explanation

Under normal conditions, Operation and Maintenance (O&M) funds will cover a maximum amount of $750,000 for minor construction projects.

Submit
45. A workgroup is a simple grouping of how many computers?

Explanation

A workgroup is a simple grouping of computers that typically consists of a small number of computers, usually less than 20. This allows for easy communication and file sharing among the computers within the workgroup. It is important to keep the number of computers in a workgroup limited to ensure efficient collaboration and management.

Submit
46. What regulates how much information passes over a Transmission Control Protocol (TCP) connection before the receiving host must send an acknowledgement?

Explanation

The sliding window is a mechanism that regulates how much data can be sent over a TCP connection before receiving an acknowledgement. It allows the sender to transmit a certain amount of data without waiting for an acknowledgement, improving efficiency. As the receiver acknowledges the received data, the window slides, allowing more data to be sent. This helps in optimizing the flow of data and ensuring reliable communication between the sender and receiver in a TCP connection.

Submit
47. How many bits are in an Internet Protocol version 4 (IPv4) address?

Explanation

An Internet Protocol version 4 (IPv4) address consists of 32 bits. This means that there are a total of 2^32 (4,294,967,296) unique IPv4 addresses available. Each bit in the address represents a binary value of either 0 or 1, resulting in a 32-bit address format.

Submit
48. Which Electronic Warfare capability uses jamming to reduce the adversary's use of the electromagnetic spectrum (EMS)?

Explanation

Electronic attack is the correct answer because it refers to the use of jamming to disrupt or degrade the adversary's use of the electromagnetic spectrum. This capability aims to deny or impair the enemy's ability to communicate or gather information through electronic means. By jamming their signals, electronic attack reduces the effectiveness of the adversary's electronic warfare systems, ultimately gaining an advantage in the electromagnetic battlespace.

Submit
49. Which of the following is a true statement about Electronic Warfare (EW) and Computer Network Operations (CNO)?

Explanation

Electronic Warfare (EW) involves the use of electromagnetic energy to control the electromagnetic spectrum and disrupt enemy communication and sensing systems. It encompasses activities such as jamming, deception, and electronic countermeasures. Radiated energy is a primary focus of EW as it is used to interfere with enemy electronic systems. On the other hand, Computer Network Operations (CNO) involve the use of computer networks to infiltrate, manipulate, or disrupt enemy computer systems. While both EW and CNO involve the use of energy and have offensive and defensive applications, the statement that EW concerns radiated energy is true.

Submit
50. Which common port contains Hyper Text Transfer Protocol (HTTP) servers and proxies?

Explanation

Port 8080 is commonly used for HTTP servers and proxies. While Port 80 is the standard port for HTTP, some organizations may choose to use Port 8080 as an alternative. This can be done for various reasons, such as avoiding conflicts with other services or providing additional security. However, it is important to note that Port 8080 is not as widely used as Port 80 for HTTP, which is why it is considered the correct answer in this case.

Submit
51. What topology defines the layout of a network's devices and media?

Explanation

The correct answer is physical because the physical topology refers to the actual layout of the network, including the devices and media used to connect them. It describes how the devices are physically connected to each other and to the network medium, such as cables or wireless connections. This includes the arrangement of devices, the types of cables used, and the location of network components. Logical topology, on the other hand, refers to the way data flows within the network, regardless of the physical layout. Hybrid topology combines multiple physical topologies, while star topology is a specific type of physical topology where all devices are connected to a central hub or switch.

Submit
52. Two basic routing activities are determining optimal routing paths and

Explanation

The correct answer is "transporting information groups (packets) through an internetwork." This answer accurately describes one of the basic routing activities, which is the process of moving packets of information through an internetwork. Routing involves determining the optimal paths for these packets to travel, ensuring that they reach their intended destinations efficiently and effectively. This process is essential for the functioning of computer networks and the internet, as it allows for the reliable and timely delivery of data packets.

Submit
53. Which transmission medium is the primary carrier of voice communications?

Explanation

Twisted pair cable is the primary carrier of voice communications because it is a type of copper cable that consists of two insulated copper wires twisted together. It is widely used for telephone systems and provides a reliable and cost-effective solution for transmitting voice signals. Twisted pair cables are capable of carrying analog voice signals as well as digital data, making them suitable for both traditional telephone systems and modern VoIP (Voice over Internet Protocol) applications. They offer good noise resistance and can support long-distance communication, making them an ideal choice for voice communication transmission.

Submit
54. Which of the following is not a term for Job Safety Analysis?

Explanation

The term "Job Safety Training (JST)" is not a term for Job Safety Analysis. Job Safety Analysis (JHA), Task Hazard Analysis (THA), and Activity Hazard Analysis (AHA) are all terms used to describe the process of identifying and evaluating potential hazards and risks associated with a specific job or task. However, Job Safety Training (JST) refers specifically to the training provided to employees to ensure their safety while performing their job duties, rather than the analysis of those job duties themselves.

Submit
55. Which of the following is not a responsibility of Government Purchase Card (GPC) cardholders?

Explanation

Government Purchase Card (GPC) cardholders have several responsibilities, including making authorized transactions, reconciling transactions, and logging transactions. However, funds accountability is not one of their responsibilities. This means that GPC cardholders are not responsible for ensuring the proper allocation and management of funds related to the transactions made using the GPC. This responsibility typically falls on higher-level financial personnel or designated individuals within the government organization.

Submit
56. What is critical to mitigating unintended or undesirable effects, on either our behalf or the adversary's, and maximizing cyberspace superiority?

Explanation

Careful planning is critical to mitigating unintended or undesirable effects and maximizing cyberspace superiority. By carefully planning our actions, we can anticipate potential risks and develop strategies to prevent or minimize any negative consequences. This allows us to take proactive measures to protect our interests and maintain an advantage over adversaries in cyberspace. Without careful planning, we may be more susceptible to unintended consequences or be caught off guard by the actions of our adversaries. Therefore, careful planning is essential for effective cyber operations.

Submit
57. The range of well-known port numbers is

Explanation

The range of well-known port numbers is 0 to 1023. Well-known ports are assigned to specific services or protocols by the Internet Assigned Numbers Authority (IANA). These ports are commonly used by popular protocols such as HTTP (port 80), FTP (port 21), and SSH (port 22). The range of 0 to 1023 is reserved for these well-known ports, while ports in the range of 1024 to 65535 are used for dynamic or private ports.

Submit
58. Who determines if local checklists and/or work cards are required for specific equipment?

Explanation

The flight commander/chief is responsible for determining if local checklists and/or work cards are required for specific equipment. They have the authority and knowledge to assess the needs of their flight operations and ensure that the necessary documentation is in place for the safe and efficient use of equipment. The library custodian is responsible for managing technical publications, but they do not determine the need for local checklists and work cards. The Technical Order Distribution Office (TODO) and Technical Order Distribution Account (TODA) are involved in the distribution of technical orders, but they do not have the authority to determine the requirement for local checklists and work cards.

Submit
59. Who serves as the major command (MAJCOM) voting representative during career field Specialty Training Requirements Team (STRT) and Utilization and Training Workshop (U&TW)?

Explanation

The MAJCOM Functional Manager serves as the major command (MAJCOM) voting representative during career field Specialty Training Requirements Team (STRT) and Utilization and Training Workshop (U&TW). This individual is responsible for representing the interests and needs of the MAJCOM in these meetings, ensuring that the training requirements and utilization of personnel within the career field align with the command's objectives and priorities. They work closely with other stakeholders, such as the Career Field Manager and SAF/CIO A6, but it is the MAJCOM Functional Manager who specifically serves as the voting representative in these meetings.

Submit
60. Which of these lists the fields in the User Datagram Protocol (UDP) segment?

Explanation

The correct answer is "Source Port, Destination Port, Length, Checksum, Data." This is because these are the fields that are present in the User Datagram Protocol (UDP) segment. The Source Port field indicates the port number of the sender, the Destination Port field indicates the port number of the receiver, the Length field specifies the length of the UDP segment, the Checksum field is used for error detection, and the Data field contains the actual data being transmitted.

Submit
61. What Data Link Layer network device logically separates a single network into two segments or collision domains in Ethernet networks?

Explanation

A bridge is a Data Link Layer network device that logically separates a single network into two segments or collision domains in Ethernet networks. It operates by examining the MAC addresses of incoming frames and forwarding them only to the appropriate segment, based on the destination MAC address. This helps to reduce collisions and improve network performance by limiting the number of devices competing for network bandwidth. Unlike a hub, which simply broadcasts all incoming frames to all connected devices, a bridge intelligently filters and forwards frames, making it an effective solution for segmenting networks.

Submit
62. Which type of cable is associated with the original designs of the Ethernet standard?

Explanation

Coaxial cable is associated with the original designs of the Ethernet standard. Coaxial cable was the primary medium used for transmitting Ethernet signals in the early days of networking. It consists of a central conductor surrounded by a layer of insulation, a metallic shield, and an outer insulating layer. This design provides good protection against electromagnetic interference and allows for longer distance transmissions. However, with advancements in technology, coaxial cable has been largely replaced by twisted-pair cables such as UTP and STP, and fiber optic cables, which offer higher data transfer rates and greater bandwidth.

Submit
63. Which of the following is information not contained in Technical Order (TO) 00–5–1?

Explanation

The information not contained in Technical Order (TO) 00-5-1 is the Time Compliance Technical Order (TCTO) procedures. The passage mentions the resources, infrastructure, and training required to manage and use TOs, but it does not specifically mention TCTO procedures.

Submit
64. Procedures and circumstances for Congress to order units into active Federal duty are established in United States Code (USC) Title

Explanation

The correct answer is 32. The procedures and circumstances for Congress to order units into active Federal duty are established in United States Code (USC) Title 32. This title specifically outlines the authority and guidelines for the National Guard, including the conditions under which they can be called into federal service. It is important for Congress to have clear procedures and guidelines in place to ensure the proper and lawful activation of units when necessary.

Submit
65. In a connection-oriented protocol, such as Transmission Control Protocol (TCP), what must happen before data is transmitted between clients?

Explanation

In a connection-oriented protocol like TCP, before data can be transmitted between clients, a connection must be established. This involves a series of steps where the client and server exchange control messages to negotiate and set up the connection. This process ensures that both parties are ready to communicate and establishes a reliable pathway for the data to be transmitted. Once the connection is established, the data can be transmitted between the clients.

Submit
66. What Internet Protocol version 4 (IPv4) class address is used for networks with about 250 nodes?

Explanation

Class C is the correct answer because it is specifically designed for networks with approximately 250 nodes. Class C addresses have a default subnet mask of 255.255.255.0, which allows for a maximum of 254 usable host addresses. This makes it suitable for small to medium-sized networks, such as small businesses or home networks. Class D is used for multicast addresses, Class E is reserved for experimental purposes, and Class F is not used in IPv4.

Submit
67. Instead of using binary, how are Internet Protocol version 6 (IPv6) addresses expressed to be more user-friendly?

Explanation

IPv6 addresses are expressed in a user-friendly format using the Colon Hexadecimal Format. This format replaces long strings of zeros with a double colon (::), making the addresses shorter and easier to read. Additionally, each segment of the address is represented in hexadecimal notation, which allows for a larger range of possible values compared to binary or decimal notation.

Submit
68. Who reviews the selections after the board selects the 12 Outstanding Airmen of the Year?

Explanation

After the board selects the 12 Outstanding Airmen of the Year, the selections are reviewed by the Air Force Chief of Staff. This individual holds the highest-ranking position in the Air Force and is responsible for overseeing the operations and organization of the entire Air Force. As such, it is their role to ensure that the selections made by the board align with the goals and values of the Air Force. The Air Force Chief of Staff's review adds an additional layer of scrutiny and validation to the selection process.

Submit
69. Which is not a type of UNIX pathname?

Explanation

The question is asking about the types of UNIX pathnames. A UNIX pathname refers to the location of a file or directory within the UNIX file system. The options provided are Simple, Relative, Positive, and Absolute. Simple, Relative, and Absolute are all valid types of UNIX pathnames. However, "Positive" is not a recognized type of UNIX pathname. Therefore, the correct answer is Positive.

Submit
70. Which Cyberspace Defense Weapon System sub-discipline determines the extent of intrusions, develops courses of action required to mitigate threats, and determines and executes response actions?

Explanation

The correct answer is Incident Response. Incident response is the sub-discipline of Cyberspace Defense Weapon System that involves determining the extent of intrusions, developing courses of action to mitigate threats, and executing response actions. It focuses on effectively and efficiently addressing and resolving cybersecurity incidents to minimize damage and restore normal operations. Computer forensics, incident prevention, and incident detection are related but distinct sub-disciplines within the broader field of cyberspace defense.

Submit
71. What Internet Protocol version 4 (IPv4) class address is used for multicast addressing?

Explanation

IPv4 uses five different classes of addresses: A, B, C, D, and E. Class D addresses are specifically reserved for multicast addressing. Multicast addressing allows a single packet to be sent to multiple recipients simultaneously. This is different from unicast addressing, where a packet is sent to a single recipient, and broadcast addressing, where a packet is sent to all devices on a network. Therefore, the correct answer is Class D.

Submit
72. Which segment of the Utilization and Training Workshop (U&TW)/ Specialty Training Requirements Team (STRT) process concentrates on training proficiency levels and training resourcing?

Explanation

Segment 2 of the Utilization and Training Workshop (U&TW)/ Specialty Training Requirements Team (STRT) process focuses on training proficiency levels and training resourcing. This segment involves assessing the proficiency levels of personnel and determining the resources needed for their training. It involves identifying the training gaps and requirements to ensure that personnel have the necessary skills and knowledge to perform their duties effectively. This segment plays a crucial role in ensuring that training is adequately planned and resources are allocated appropriately to meet the training needs of the organization.

Submit
73. Which of the following is an optional attendee for the Utilization and Training Workshop (U&TW)?

Explanation

The AETC Career Development Course (CDC) writer is an optional attendee for the Utilization and Training Workshop (U&TW). This means that their presence at the workshop is not mandatory but they can choose to attend if they wish. The other options listed, such as the Air Education and Training Command (AETC)/Training Pipeline Manager (TPM), Air Force Career Field Manager (AFCFM), and MAJCOM Functional Manager, are not specified as optional attendees, so they may be required to attend the workshop.

Submit
74. Which 802.11 standard is designed to operate at both 2.4 GHz and 5 GHz?

Explanation

802.11n is the correct answer because it is a Wi-Fi standard that operates at both 2.4 GHz and 5 GHz frequencies. It is backward compatible with previous standards (a, b, and g) and offers improved speed and range compared to them. The use of multiple antennas and other advanced technologies in 802.11n allows for better performance and increased bandwidth, making it suitable for high-demand applications such as streaming media and online gaming.

Submit
75. Which of the following is included in the Master Training Plan only if applicable to the work center?

Explanation

The Master Training Plan includes various elements that are relevant to the work center. The Master Task List is a comprehensive list of tasks that need to be completed. The Current Career Field Education and Training Plan (CFETP) outlines the education and training requirements for a specific career field. The Milestones for tasks and Career Development Course (CDC) completion provide a timeline for completing tasks and courses. The Job Qualification Standard, on the other hand, is included in the Master Training Plan only if it is applicable to the work center. This suggests that not all work centers may have a Job Qualification Standard included in their Master Training Plan.

Submit
76. Special Personnel Evaluations (SPEs) are required on a sampling of Air Reserve Component (ARC) personnel within how many days of new equipment/system acceptance?

Explanation

Special Personnel Evaluations (SPEs) are required on a sampling of Air Reserve Component (ARC) personnel within 120 days of new equipment/system acceptance. This means that after new equipment or a system is accepted, a certain number of ARC personnel will undergo evaluations within 120 days. This is important to ensure that the personnel are properly trained and qualified to operate the new equipment or system effectively and safely.

Submit
77. Who should endorse the AF Form 673 as the Certifying Official?

Explanation

The authoring OPR's supervisor should endorse the AF Form 673 as the Certifying Official because they are responsible for overseeing the work of the authoring OPR and ensuring its accuracy and compliance with regulations. As the supervisor, they have the authority to review and approve the form, certifying its correctness and completeness.

Submit
78. Routers operate at what Open System Interconnect (OSI) layer?

Explanation

Routers operate at the Network layer of the OSI model. This layer is responsible for routing and forwarding data packets between different networks. Routers use IP addresses to determine the best path for data transmission and make decisions on how to direct the data packets to their destination. They also provide network connectivity by connecting multiple networks together. Therefore, the correct answer is Network.

Submit
79. The technical solution for a communications and information system requirement summarizes

Explanation

The technical solution for a communications and information system requirement summarizes both the full costs and the recommended course of action. This means that the solution provides an overview of all the expenses associated with the system, as well as the suggested steps to be taken in order to implement it effectively. It does not include security requirements, as the question does not mention them.

Submit
80. What is used as a starting point to develop the Career Field Education and Training Plan (CFETP) and Specialty Training Standard (STS) during the Specialty Training Requirements Team (STRT) and Utilization and Training Workshop (U&TW)?

Explanation

The Occupational Analysis Report (OAR) is used as a starting point to develop the Career Field Education and Training Plan (CFETP) and Specialty Training Standard (STS) during the Specialty Training Requirements Team (STRT) and Utilization and Training Workshop (U&TW). The OAR provides a comprehensive analysis of the specific occupational requirements, tasks, and competencies needed for a particular career field. This information is then used to develop the CFETP and STS, which outline the training and education requirements for individuals in that career field. The OAR is considered a crucial source of information and guidance in the development of these training plans.

Submit
81. Over a single pair cable, Integrated Services Digital Network (ISDN) is capable of transmission rates of

Explanation

ISDN (Integrated Services Digital Network) is a telecommunications network that allows the transmission of voice, video, and data over a single pair cable. It uses a circuit-switched network to establish a dedicated connection between two points. The maximum transmission rate for ISDN over a single pair cable is 144 Kbps, which refers to the amount of data that can be transmitted per second. This speed is sufficient for basic internet browsing, email, and some low-bandwidth applications but may not be suitable for high-speed data transfer or streaming.

Submit
82. Who provides accreditation for the Telecommunications Industry Association (TIA)?

Explanation

The American National Standards Institute (ANSI) provides accreditation for the Telecommunications Industry Association (TIA). ANSI is a non-profit organization that oversees the development of voluntary consensus standards for various industries, including telecommunications. TIA is a trade association that represents the telecommunications industry, and its standards are developed and accredited by ANSI to ensure industry-wide compatibility and quality.

Submit
83. Who develops standards for Interconnect, Passive and Electro-mechanical (IP&E) electronic components under the American National Standard Institute (ANSI) designation of Electronic Industries Alliance (EIA) standards?

Explanation

The correct answer is Electronic Components Industry Association (ECIA). ECIA develops standards for Interconnect, Passive and Electro-mechanical (IP&E) electronic components under the American National Standard Institute (ANSI) designation of Electronic Industries Alliance (EIA) standards.

Submit
84. What are the three major considerations that apply to Cyberspace Operations?

Explanation

The three major considerations that apply to Cyberspace Operations are Law, Authority, and Policy. Law refers to the legal framework and regulations that govern cyberspace activities. Authority relates to the allocation of responsibilities and decision-making power within cyberspace operations. Policy involves the establishment of guidelines and procedures to ensure the effective and secure use of cyberspace.

Submit
85. Network switches and bridges operate at what Open System Interconnect (OSI) layer?

Explanation

Network switches and bridges operate at the Data Link layer of the Open System Interconnect (OSI) model. This layer is responsible for the reliable transfer of data between adjacent nodes on a network. Switches and bridges are devices that connect multiple network segments together and make forwarding decisions based on the MAC addresses of the devices connected to them. They use the Data Link layer protocols, such as Ethernet, to perform these functions.

Submit
86. What system monitoring concept uses long trend analysis of network devices and is performed in order to identify future constraints with results incorporated into future technical baselines?

Explanation

Capacity planning is the correct answer because it involves long trend analysis of network devices to identify future constraints. This process helps in predicting and addressing potential bottlenecks or limitations in the network infrastructure. The results of capacity planning are then incorporated into future technical baselines to ensure that the network can handle the expected workload and performance requirements. Intrusion Detection and Prevention Systems, End-to-End Performance Monitoring, and Vulnerability scanners are not directly related to long trend analysis or future constraints identification.

Submit
87. Detailed instructions for submitting a reclama or shortfall request are found in

Explanation

The correct answer is AFI 10–401. This is because the question asks for the source that provides detailed instructions for submitting a reclama or shortfall request. AFI 10–401 is an Air Force Instruction that specifically addresses the procedures and guidelines for submitting reclama or shortfall requests. Joint Publication 1–02 and Joint Publication 1–03 are not specific to Air Force instructions and may not contain the detailed instructions needed. Therefore, AFI 10–401 is the most appropriate source for the information required.

Submit
88. Which Intranet Control Weapon System sub-discipline conducts continuous monitoring to ensure timely delivery of critical information?

Explanation

Proactive Defense is the correct answer because it refers to the sub-discipline within the Intranet Control Weapon System that conducts continuous monitoring to ensure timely delivery of critical information. This sub-discipline focuses on actively identifying and mitigating potential threats and vulnerabilities in order to prevent attacks and maintain the integrity and availability of critical information. By implementing proactive defense measures, organizations can stay ahead of potential risks and ensure the timely delivery of critical information within their intranet system.

Submit
89. Who provides the formal declaration that an information system is approved to operate in a particular security mode using a prescribed set of safeguards and acceptable risk?

Explanation

The correct answer is the Authorizing Official (AO). The AO is responsible for providing the formal declaration that an information system is approved to operate in a particular security mode using a prescribed set of safeguards and acceptable risk. They have the authority to make decisions regarding the system's security posture and ensure that it meets the necessary requirements and standards.

Submit
90. Which of the following is not an action of the Specialty Training Requirements Team (STRT)?

Explanation

The Specialty Training Requirements Team (STRT) is responsible for various actions related to career field education and training. These actions include drafting and signing minutes, finalizing part 1 of the career field education and training plan (CFETP), and finalizing the Air Force Enlisted Classification Directory (AFECD) specialty description. However, the team is not responsible for finalizing Specialty Training Standards (STS)/Course Training Standards (CTS) for all courses.

Submit
91. Which Supervisory Control and Data Acquisition (SCADA) subsystem connects to sensors in the process, converting sensor signals to digital data?

Explanation

A Remote Terminal Unit (RTU) is a key component of a Supervisory Control and Data Acquisition (SCADA) system. It connects to sensors in the process and is responsible for converting sensor signals to digital data. The RTU acts as a communication link between the field devices and the supervisory system, allowing for real-time monitoring and control of the process. The other options, such as the Supervisory System, Human Machine Interface, and Programmable Logic Controller, may be part of a SCADA system but do not specifically connect to sensors and convert sensor signals to digital data.

Submit
92. At the installation level which office is responsible for program implementation, administration, training, and monitoring the Government Purchase Card (GPC) Program?

Explanation

The Agency/Organization Program Coordinator (A/OPC) is responsible for program implementation, administration, training, and monitoring the Government Purchase Card (GPC) Program at the installation level. They oversee the day-to-day operations of the program, including ensuring compliance with regulations, providing guidance to cardholders, and conducting training sessions. The A/OPC acts as a liaison between the installation and higher-level program management offices, and is responsible for maintaining accurate records and reporting on program activities.

Submit
93. Which Supervisory Control and Data Acquisition (SCADA) subsystem gathers data on the process and sends commands to the processor?

Explanation

The Supervisory System is the SCADA subsystem that gathers data on the process and sends commands to the processor. It acts as the central control unit, monitoring the process and collecting data from various sources. It then sends commands and instructions to the processor to control and regulate the process based on the collected data. The Supervisory System plays a crucial role in managing and controlling the overall SCADA system.

Submit
94. Which 802.11 standard has a throughput of 11 Mbps and runs at the 2.4 GHz frequency?

Explanation

The correct answer is 802.11b. This standard has a throughput of 11 Mbps and operates at the 2.4 GHz frequency. 802.11a operates at a higher frequency of 5 GHz, while 802.11g and 802.11n have higher throughputs of up to 54 Mbps and 600 Mbps respectively.

Submit
95. Recommended technical order (TO) changes are required to be submitted on

Explanation

The correct answer is AFTO Form 22. This form is used for submitting recommended technical order (TO) changes. The other forms mentioned (AFTO Form 673 and AF Form 673) are not specifically used for submitting TO changes. Therefore, AFTO Form 22 is the most appropriate form for submitting recommended TO changes.

Submit
96. Guidance for awards specific to the Cyber community are found in Air Force instruction

Explanation

The correct answer is 36–2845 because this Air Force instruction specifically provides guidance for awards that are specific to the Cyber community. The other options (36–2604, 36–2803, and 36–2805) may cover different topics or areas, but they do not pertain specifically to awards in the Cyber community. Therefore, 36–2845 is the correct choice.

Submit
97. What type of encryption is applied to each end of a communications line in a distributed network, and ensures all information flowing is unintelligible to an unauthorized intruder?

Explanation

Link encryption is the type of encryption that is applied to each end of a communications line in a distributed network to ensure that all information flowing is unintelligible to an unauthorized intruder. This means that the data transmitted over the network is encrypted at the link level, making it secure and protected from any potential eavesdropping or unauthorized access. Device encryption refers to encrypting data stored on a specific device, while end-to-end encryption refers to encrypting data from the source to the destination, bypassing any intermediaries. Line encryption is not a commonly used term in the context of network security.

Submit
98. Virtual circuits are established, maintained, and terminated at what Open System Interconnect (OSI) layer?

Explanation

Virtual circuits are established, maintained, and terminated at the Transport layer of the OSI model. The Transport layer is responsible for end-to-end communication between hosts and ensures reliable and orderly delivery of data. It establishes a virtual circuit, which is a logical connection between two endpoints, and manages the flow control, error control, and sequencing of data packets. Therefore, the Transport layer is the correct layer for handling virtual circuits.

Submit
99. Which of the following is not a common duty of the Maintenance Data Collection (MDC) monitor?

Explanation

The MDC monitor is responsible for reviewing IMDS reports to ensure job status is reflected properly, matching reports with OIL, and scheduling and distributing daily maintenance actions. However, ensuring equipment status is entered into ESR is not listed as a common duty of the MDC monitor.

Submit
100. In-depth information for administering the Government Purchase Card program at all responsible levels is found in Air Force Instruction (AFI)

Explanation

The correct answer is 64–117 because this Air Force Instruction provides detailed information on how to administer the Government Purchase Card program at all responsible levels. It is a comprehensive guide that outlines the procedures and guidelines for using the card and ensures that all personnel involved in the program are following the correct protocols. This instruction is specifically tailored to the Air Force and provides the necessary information for effective management of the Government Purchase Card program within the organization.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 09, 2016
    Quiz Created by
    Wally_
Cancel
  • All
    All (100)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which identity management process uses a fingerprint to authenticate a...
What is the most common wireless networking standard?
Within the information environment what term describes the advantage,...
Which threat vector is considered more of an annoyance than an attack?
Which vulnerability preventive measure is a small piece of code that...
Which of the following functions is primarily staffed by Client...
When a person uses his or her position for private or personal gain it...
What device is a series of single-pole, single-throw switches mounted...
Which application includes tools to help recover lost files and...
Which identity management process uses a password to authenticate a...
A modem is a device that
What are the inclusive dates for Secretary of the Air Force/Chief...
Which operations center monitors and controls Air Force network access...
What Internet Protocol version 4 (IPv4) reserved address is used for...
The design of communications network is known as
What topology consists of cable segments from each computer connected...
Which statement is not a goal of Operational Risk Management (ORM)?
Supervisors document and maintain completed safety training on
Which of the following is the highest level in which quarterly awards...
The Institute of Electrical and Electronics Engineers (IEEE) divides...
What class uses a range of 1–126 in the first octet of an...
Which Air Force Specialty Code (AFSC) requires members to pass the Air...
How many steps are there in Operational Risk Management (ORM)?
What is the combat information technology (IT) communication support...
What are the two classifications of transport protocols?
What kind of network is a group of computers and associated devices...
Dynamic routing automatically calculates the best path between how...
What kind of network interconnects users with computer resources in a...
What Automated Information System (AIS) is used to document actions on...
Which of the following is not a mandatory requirement for the...
What document directs the Communications Focal point key processes?
What systems allow for a commonly understood, maintainable, and...
Which of the following is not a responsibility of the Air Force Career...
Which type of fund covers the cost of relocating facilities?
The maximum number of devices a FireWire bus can take is up to
What title status must National Guard Guardsmen be in to execute cyber...
Where is the Air Force active component manpower planning and...
Which of the following is the official source of manpower information...
The creation of the DOD as an executive component of the government Is...
Who must provide encryption devices for connection to the Secret...
Who establishes the necessary controls to ensure periodic inspections...
Which of the following is a subdivision of programmed cost data...
Who appoints Air Force Portal Content Managers and Content Publishers...
What is the maximum amount for minor construction projects that...
A workgroup is a simple grouping of how many computers?
What regulates how much information passes over a Transmission Control...
How many bits are in an Internet Protocol version 4 (IPv4) address?
Which Electronic Warfare capability uses jamming to reduce the...
Which of the following is a true statement about Electronic Warfare...
Which common port contains Hyper Text Transfer Protocol (HTTP) servers...
What topology defines the layout of a network's devices and media?
Two basic routing activities are determining optimal routing paths and
Which transmission medium is the primary carrier of voice...
Which of the following is not a term for Job Safety Analysis?
Which of the following is not a responsibility of Government Purchase...
What is critical to mitigating unintended or undesirable effects, on...
The range of well-known port numbers is
Who determines if local checklists and/or work cards are required for...
Who serves as the major command (MAJCOM) voting representative during...
Which of these lists the fields in the User Datagram Protocol (UDP)...
What Data Link Layer network device logically separates a single...
Which type of cable is associated with the original designs of the...
Which of the following is information not contained in Technical Order...
Procedures and circumstances for Congress to order units into active...
In a connection-oriented protocol, such as Transmission Control...
What Internet Protocol version 4 (IPv4) class address is used for...
Instead of using binary, how are Internet Protocol version 6 (IPv6)...
Who reviews the selections after the board selects the 12 Outstanding...
Which is not a type of UNIX pathname?
Which Cyberspace Defense Weapon System sub-discipline determines the...
What Internet Protocol version 4 (IPv4) class address is used for...
Which segment of the Utilization and Training Workshop (U&TW)/...
Which of the following is an optional attendee for the Utilization and...
Which 802.11 standard is designed to operate at both 2.4 GHz and 5...
Which of the following is included in the Master Training Plan only if...
Special Personnel Evaluations (SPEs) are required on a sampling of Air...
Who should endorse the AF Form 673 as the Certifying Official?
Routers operate at what Open System Interconnect (OSI) layer?
The technical solution for a communications and information system...
What is used as a starting point to develop the Career Field Education...
Over a single pair cable, Integrated Services Digital Network (ISDN)...
Who provides accreditation for the Telecommunications Industry...
Who develops standards for Interconnect, Passive and...
What are the three major considerations that apply to Cyberspace...
Network switches and bridges operate at what Open System Interconnect...
What system monitoring concept uses long trend analysis of network...
Detailed instructions for submitting a reclama or shortfall request...
Which Intranet Control Weapon System sub-discipline conducts...
Who provides the formal declaration that an information system is...
Which of the following is not an action of the Specialty Training...
Which Supervisory Control and Data Acquisition (SCADA) subsystem...
At the installation level which office is responsible for program...
Which Supervisory Control and Data Acquisition (SCADA) subsystem...
Which 802.11 standard has a throughput of 11 Mbps and runs at the 2.4...
Recommended technical order (TO) changes are required to be submitted...
Guidance for awards specific to the Cyber community are found in Air...
What type of encryption is applied to each end of a communications...
Virtual circuits are established, maintained, and terminated at what...
Which of the following is not a common duty of the Maintenance Data...
In-depth information for administering the Government Purchase Card...
Alert!

Advertisement