Z3dx5x Self Test Questions Vol. 1 explores responsibilities in AFSC, distinguishing roles within cyberspace support, and understanding CFETP documentation. It assesses knowledge crucial for Air Force personnel involved in cyberspace operations and systems.
Cyberspace Operations and Cyberspace Systems
Cyberspace Family and Cyberspace Groups
Cyberspace Support and Cyberspace Family
Any two Cyberspace groups
Rate this question:
Cyberspace Systems
Cyberspace Maintenance
Cyberspace Families
Cyberspace Support
Rate this question:
CFETP
AFMAN
AFI
CEFTP
Rate this question:
Part 1
Part A
Part 11
No Part
Rate this question:
5
1
9
7
Rate this question:
AFI 36-2201
AFI 32-2601
AFI 33-2206
AFI 33-2601
Rate this question:
MFM's AETC Training managers
AFIN's AETC Training managers
UTM's AETC Training managers
U&TW's AETC Training managers
Rate this question:
MFM
AFCFM
UTM
U&TW
Rate this question:
U&TW
AETC
AEF
Breakfast
Rate this question:
Determine and Present training requirements.
Determine and Present deployment requirements.
Determine and Present retirement requirements.
Determine and Present no requirements.
Rate this question:
AF OJT program
AF CDC program
AF TBA program
AF ADLS program
Rate this question:
Knowledge, Proficiency, Experience
Time, Place, Reason
Words, Numbers, Questions
Study, Stuff, Skills
Rate this question:
Quality System, Quality Assessments, Trend Analysis
Quality Elements, Quality Essential, Programs
Quality Assessments, Quality Elements, Quality Analysis
Quality Elements, Quality Analysis, Trend Assessments
Rate this question:
The self-assessment program.
The compliance program.
The chain of command program.
The reporting program
Rate this question:
QA Personnel
UTM
AFCFM
MFM
Rate this question:
IMDS
AEF
E-learning
Toaster
Rate this question:
The US Constitution
UCMJ
AFI
The 10 Commandments
Rate this question:
Title 10
Title 8
Title 18
Title 1
Rate this question:
The Secretaries of the US Army and Air Force
The US National Guard
Inspector General
The Secretaries of the National Guard
Rate this question:
Logical
Systematic
Illogical
Symmetric
Rate this question:
Policy, Authority, Law
Considerations, Understanding, Support
Operations, Authority, Service
Integrity, Service, Excellence
Rate this question:
AFDD 3-12
AFI 3-12
AFMAN 3-12
COL 3:12
Rate this question:
Prevent Cyber Attacks, Reduce Vulnerability, Minimize Damage and Increase Recover Time
Exploit Cyber Attacks, Increase Vulnerability, Maximize Damage and Recover Time
Eliminate Cyber Attacks, Reduce Vulnerability, Minimize Damage and Increase Recover Time
Training and Education, Maintain Internet Superiority, Aim High...
Rate this question:
NMS CO
MNS CO
SNM CO
SMN CO
Rate this question:
Non-Public Information
Misuse of Position
Covered Relationships
Personal conflict of interest
Rate this question:
Misuse of Position
Personal Conflict of Interest
Covered Relationship
Non-public Information
Rate this question:
Personal Conflict of Interest
Covered Relationship
Misuse of Position
Non-Public Information
Rate this question:
Covered Relationship
Personal Conflict of Interest
Misuse of Position
Non-Public Information
Rate this question:
1B4X1
3D1X1
3D0X1
3B4X1
Rate this question:
AF Cyberspace Defence
AF Cyber Weapon System
AF Cyberspace Monitoring Network
AF Network Weapon System
Rate this question:
Prevention, Detection, Response, Forensics
Intimidation, Investigation, Action, Retaliation
Prevention, Detection, Selection, Action
Intimidation, Investigation, Selections, Forensics
Rate this question:
Cyber Security Control System
Cyber Command Control Mission System
Cyber Network Mission System
Cyberspace Defence Network
Rate this question:
Defense-in-depth, Proactive Defense, Network Standardization, Situational Awareness
Prevention, Response, Detection, Forensics
Offense-in-depth, Unproductive Defense, Network Disorganization, Situational Unawareness
Protein, Iron, Carbohydrates, Calcium
Rate this question:
Cyber Command and Control Mission System
Cyber Weapon System
Cyberspace Defense Network
Cyber Security and Control System
Rate this question:
F2T2EA The APT
EAF2T2 The APT
F2L2EA The APT
F2F2EA The APT
Rate this question:
24 AF
2 AF
12 AF
81 AF
Rate this question:
Established Guidance, Standardized Wording
Established Consent, Standardized Policies
Standardized Guidance, Established Wording
Standardized Consent, Established Policies
Rate this question:
AFSPC
AFCPS
AFPCS
AFSCP
Rate this question:
Denying, Degrading, Disrupting, Destroying, while Altering the Adversary's Abilities
Defying, Digressing, Deterring, Demolishing, while Altering the Adversary's Abilities
Depressing, Devoting, Digesting, Dethroning, while Altering the Adversary's Abilities
Denying, Deterring, Devoting, Destroying, while Altering the Adversary's Abilities
Rate this question:
True
False
Rate this question:
Gaining footholds in their routine uses of cyberspace
Throttle Internet speeds
Block Internet access
All of the above
Rate this question:
Affect the behavior of foreign governments, organizations, groups, or individuals...
Affect the behavior of domestic governments, organizations, groups, or individuals...
Reflect the behavior of foreign governments, organizations, groups, or individuals...
Reflect the behavior of domestic governments, organizations, groups, or individuals...
Rate this question:
True
False
Rate this question:
Cyberspace
Cyber Command
Cyber Security
Cyber Network
Rate this question:
Network Defense, Exploitation, Attack
Network Offense, Exploration, Defense
Network Defense, Exportation, Attack
Network Offense, Explosions, Defense
Rate this question:
Defense of the nation, National incident response, Critical infrastructure protection
Offense of the nation, National incident response, Critical infrastructure selection
Structure of the nation, National incident reaction, Critical infrastructure protection
Structure of the nation, National incident reaction, Critical infrastructure selection
Rate this question:
Analysis, Warning, Information sharing, Vulnerability mitigation, Aiding of recovery efforts
Enabling, Warden, Information concealment, Vulnerability mitigation, Aiding of discovery efforts
Processes, Systems, Facilities, Technologies, Networks, Assets and Essential Services
CIP, HIP, NIP, CID, HID, NID
Information superiority
Information security
Information networking
Information analysis
Rate this question:
Quiz Review Timeline (Updated): Mar 20, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.