225. What is the program called that you interact with directly from...
203. Within the office space what is the most common hazard?
226. What program is free to download from Adobe's website that...
216. What is the Internet?
228. (True/False) Human threats are likely to be both intentional and...
228. (Ture/False) Malicious software is capable of destroying disk...
216. What network provides a private tunnel through the...
203. What three items are needed to complete the fire triangle?
203. What does PASS acronym stand for?
215. What is not a main component of a computer and can be either...
216. What is a group of computers and devices that share a common...
224. (True/False) Fiber optic cable is immune to EMI.
203. What determines the severity of electric shock?
226. What type of programs are applications?
203. What is the primary hazard associated with ladders?
201. What is the name of the Air Forces safety program?
215. What type of internal component most high-volume printers use to...
232. What provides additional communications capacity by using manned...
208. What is another name for a bus topology?
208. Which topology has cable segments connected to a centralized...
208. What are the three tree topology layers?
206. What was the name of the system that was employed before the...
202. What are the three sub-categories of human factors?
203. List the classes of fires.
228. What is one of the newest COMPUSEC threats?
238. Where is the CONUS geographically divided?
214. What interface was the evolution of the parallel ATA...
208. If the topology cannot be seen or touched what type is it?
201. What agency dictates what must be accomplished in the workplace,...
228. What computer attack does not try to gain access to the system...
216. At what speed does the 802.11n standard operate?
210. What is used to regulate how much information is transmitted over...
217. What Ethernet standard has supplanted fast Ethernet in wired...
226. Which application allows the creation of queries, forms,...
231. What service is used when physically transporting Top Secret...
206. What three parts make up the Communications and Information...
233. What service provides a framework for protocols used by the...
221. Name two methods for directing data on the network.
207. What layer generally only implements in software?
233. What establishes a virtual point-to-point connection using...
224. What is the most common wireless networking standard?
212. What is the default port assignment for HTTP?
210. What are the two classifications of transport protocols?
234. What provides a transmission path capable of secure...
216. What is the name for networks that use the same software and...
206. Documents generated in CIPS are historical documentation, how...
211. What are the two methods of subnet masking?
201. Who is responsible for the safety of their facilities and...
207. Which specification allows for unique identification at the data...
241. What is SACCS designed to support?
202. Who is responsible to mitigate human factors?
212. What is the default port used with credit card transactions...
213. Name the special type of memory used to store the BIOS...
230. At what level is the classified information in a container...
230. What form is used to maintain a record for containers,...
208. What are the two most common physical topologies?
206. What is the approved automated information system for planning,...
211. What are the three types of unicast address?
207. Which layer of the OSI model is closest to the end user and...
206. What records depict physical layout of communications and...
203. What AFI provides detailed guidance of office safety?
236. Which system provides the AF portal?
201. What AF series publications make up AFOSH standards?
223. What are the two methods that encryption can be...
212. What allows servers the capability to provide multiple...
208. What IEEE standard applies to bus networks?
202. How many US workers were killed on the job in 2014?
211. What are the two main parts of an IPv4 address?
208. What is the branch of mathematics that examines the...
231. What service is used when the Top Secret material is...
211. Who assigns network numbers?
201. What AFI implements the installation safety offices Mishap...
211. What is the reserved IPv4 address for a limited broadcast?
216. Primary addressing in WLANs is achieved by using what type...
225. What is the firmware prompt called on Sun machines?
213. What speed enhancement is a small amount of memory placed...
234. What are the current data rates of Secret IP Data...
230. When would it be appropriate to store money and/or weapons...
209. What ensures effective, secure and efficient delivery of DOD IT...
211. What is the de facto standard protocol of the Internet and...
225. When are partitions established?
211. Which IEEE standard defines Data Link layer protocols that...
228. Weaknesses or deficiencies in maintaining the environmental...
232. What DODIN service includes the Defense Red Switched...
216. WLAN implements what algorithm to prevent data...
207. Who subdivided the Data Link Layer into two sub-layers, what are...
240. What component of the GIG supports the President, SECDEF,...
208. What topology imitates an extended star topology and inherits...
227. COMSEC is part of what overall program?
214. What is the primary internal interconnecting for desktop and...
230. When a container that is taken out of service or is no longer...
231. Prior to using electronic media and when technically...
235. Which system is a classified system designed to provide...
228. Which COMPUSEC vulnerability defines deficiencies in the...
237. What is the AF's primary ISR CPAD system?
207. What two unique categories make up the seven layers of the OSI...
222. What protocols govern how networks share information beyond...
211. Which field is a 32-bit number identifying the next data...
210. In connection-oriented systems, what must happen prior to the...
210. What method does TCP use to prevent network congestion by...
228. What is one of the most common COMPUSEC threats?
216. What type of network interconnects several local area...
224. What medium is the primary carrier for voice...
211. In the context of TCP/IP, what is a packet also known...
218. What are the primary entry points for DSCS satellites?
209. What are two standards used throughout the DOD to govern IT?
221. Which layer of the OSI model do routers operate?
211. What are the four most important Network layer TCP/IP...
228. Which type of COMPUSEC threat is a severe storm?
219. What are the two types of modems used?
211. What is the IPv6 loop back address?
205. Is a Payroll system a part of the NSS?
225. What year did the Bell Labs develop the UNIX operating...
205. The DODAF specification contain how many volumes?
221. Routers compare metrics to determine optimal routes; these...
225. In which directory are application programs contained?
203. What AFI identifies activities where the wear of finger rings is...
239. What size is the GBS antenna?
217. What data transport method grew out of the need for a...
213. How much data can be currently stored on a DVD-ROM at the...
234. What is the DOD's largest interoperable C2 data...
238. How many sectors is the CONUS divided into?
216. What is the name for a network connected between two...
207. What are two key types of application-layer implementations?
217. What T-carrier service can a subscriber request when the...
220. What is used to decrease network congestion, but also...
205. What architecture framework is designated as the framework for...
220. What provides collision-free, high-speed communication between...
201. What office/individual manages the occupational and environmental...
230. What supplemental controls are required for Confidential...
214. Which connection enables data transfer speeds of 480 Mbps...
231. (True/False) Classified COMSEC materials may be shipped...
228. What type of COMPUSEC threat is increased by poor housekeeping...
211. What is the reserved IPv4 address for loop back?
206. What are legacy records that provide a history and audit trail...
221. What are routing protocols that manage traffic within an...
218. STEP offers standardized support for whom?
208. Which topology is the most common physical topology in Ethernet...
211. How many fields make up a TCP segment?
232. What is the primary interface between the sustaining base...
201. What office/individual is responsible for managing proactive on...
203. Who is responsible for developing and maintaining a training and...
218. DOD Teleport system implementation has how many...
229. What are the three types of classification?
207. In what year was the OSI model published and by whom?
212. What is the number range of registered ports?
228. How many additional security requirements for safeguarding...
234. What data rates are the SBU IP services capable of?
224. Which cable type is associated with the original designs of...
201. What office/individual is responsible for developing JSTO's?
235. Which system provides operation commanders with an...
223. What is the most common telephone device used for voice...
201. Who is required to complete the AF Risk Management Fundamentals...
208. What do we call a device that sits at the intersection of two or...
203. Who is responsible to ensure that all employees have access to a...
227. What Air Force program meets public law, national, and DOD...
216. Most VPN traffic in the Air Force is done in what type of...
219. What layer of the OSI reference model do converters...
207. Which layer of the OSI model provides logical addressing as...
230. Which part of the SF 700, when completed, is classified at...
204. How many principles govern all actions associated with the...
210. What layer defines end-to-end connectivity between host and...
211. In which field is the actual data that is transmitting...
229. What three core disciplines encompass information...
207. Which layer establishes virtual circuits?
239. What is the maximum data rate for the GBS?