216) Which network provides a private tunnel through the Internet?
(215) Which device optically reads an image, printed text, or an...
(233) Which network supports unclassified e-mail service to the user?
(224) What characteristic is not an advantage of fiber optic cable?
(208) What network topology is another name for a bus topology?
(201) The Occupational Safety and Health Administration (OSHA) is a...
(203) What action should you take first when you encounter a fire?
(228) Which computer software is designed to collect personal...
(216) Which wireless local area network (WLAN) security method is best...
(203) What hazard is the greatest in the typical office?
(212) What range of numbers are those of well know port numbers?
(201) Whose responsibility is to advise commanders, function managers,...
(204) Which action is not a part of risk management (RM)?
(216) Which network is a group of computers and associated devices...
(201) What action is the purpose of the Mishap Prevention Program?
(211) What portion of the Internet Protocol (IP) Datagram (packet)...
(208) What topology offers centralized management of a network?
(219) Which device works as a transceiver that converts the electrical...
(203) How are fires classified?
(203) Fuels that are normally classified as A or B will change to what...
(208) What negative effect could occur when star networks are...
(230) Which event is not a valid reason to change the combination on a...
(203) What step is the fourth in the firefighting procedure?
(225) What UNIX system software interacts most closely with the...
(209) Which governing body is the authority for information technology...
(216) Which network is a network that links local area networks (LAN)...
(206) What three parts make up Communications and Information Systems...
(203) Which ladder practice is not prohibited?
(205) Which office annually evaluates agency efforts to improve the...
(226) What Microsoft application is a software program that allows...
(202) What method is considered the least preferred when controlling...
(236) What major program does the Global Combat Support System-Air...
(202) Which action is a physiological factor?
(217) What year did the Institute of Electrical and Electronics...
(203) According to the Centers for Disease Control and Prevention...
(228) Which computer system vulnerability is not one in a computer...
(203) Under normal conditions, how many milliamps of current could...
(216) Which network uses Carrier Sense Multiple Access/Collision...
(208) When used alone, the word "topology" often refers to a...
(215) What is a peripheral device?
(226) What Microsoft application is a personal information manager?
(207) The logical link control (LLC) sublayer is a part of which Open...
(202) What three sub-categories make up human factors?
(210) What action is the purpose of a sliding window in Transmission...
(201) What action must supervisors take before a work task not...
(214) What speed is the maximum data transfer rate of USB 3.0...
(234) Which network provides Department of Defense (DOD) customers...
(205) What requirements mandate to develop of Air Force architectures?
(206) Which part of the Communications and Information Systems...
(228) Which incidents occur when a higher classification level of data...
(213) What action is the main purpose of system cache?
(222) What network device provides a remote network with connectivity...
(211) What value is the maximum of an octet in Internet Protocol...
(202) Who recommends controls to mitigate health risks associated with...
(206) Which part of the Communications and Information Systems...
(207) What functions do the seven layers of the Open Systems...
(242) What system of the Global High Frequency (HF) Network provides...
(231) Who has the authority a grant permission to ship classified...
(210) What is a Transmission Control Protocol (TCP) socket?
(230) Which Air Force (AF) form records the destruction of Top Secret...
(232) Which of the following services provides additional...
(227) What information system (IS) threat is the greatest threat to an...
(202) Which helmet class does not provide protection against contact...
(203) What chapter in Air Force Instruction (AFI) 91–203, Air...
(202) How many impact classifications do hardhats have?
(211) What class is reserved for multicast addressing?
(229) Which classified document markings identifies the highest level...
(221) What network routing protocols allow multiple autonomous systems...
(231) Who should you seek out if you need information on transporting...
(234) Which network provides high-quality, secure telecommunications...
(240) What system is the priority component of the Department of...
(218) How many T1 Defense Switched Network (DSN) access circuits do...
(207) What layers make up the two categories of the seven layer of the...
(235) Which system of the Global Command and Control System-Air Force...
(211) Which classes allow for a maximum of 254 hosts per network?
(201) What Air Force (AF) form is used to report a hazard?
(204) The risk management process includes how many steps?
(203) What classification do flammable liquids receive?
(238) Which system is a radar Tracker/Correlator software program...
(239) Which system is a space-based high data rate communications link...
(207) What does the media access control (MAC) sublayer of the data...
(242) What system mission is to provide reliable, rapid, two-way...
(201) What Air Force (AF) form is used to report ground mishaps?
(220) Describe a network bridge.
(207) What does the logical link control (LLC) sublayer of the data...
(235) Which system is the Department of Defense's (DOD) command and...
(232) What system includes all owned and leased communications and...
(238) How many air defenses sectors is the Battle Control System-Fixed...
(225) In general, how many operating system task categories are there?
(241) What system provides a secure communications path for command...
(205) How many volumes make up the Department of Defense Architecture...
(233) What system is a telecommunications network that provides the...
(241) Which system is the primary network used to transmit the...
(201) Which publication implements the Mishap Prevention Program?
(230) How would you determine if an intrusion detection system is...
(213) What characteristic is the major difference between Random...
(229) Which classified document marking appears on the face of each...
(237) Which system is the Air Forces' primary intelligence,...
(223) Which type of encryption provides the greatest degree of...
(228) Computer security (COMPUSEC) vulnerabilities are broken down...