(215) Which device optically reads an image, printed text, or an...
(216) Which network provides a private tunnel through the Internet?
(201) The Occupational Safety and Health Administration (OSHA) is a...
(208) What network topology is another name for a bus topology?
(211) What portion of the Internet Protocol (IP) Datagram (packet)...
(212) What range of numbers are those of well know port numbers?
(224) What characteristic is not an advantage of fiber optic cable?
(228) Which computer software is designed to collect personal...
(019) What tests your understanding of the original message and your...
(021) Records that are considered to be in draft format
(201) What action is the purpose of the Mishap Prevention Program?
(203) What hazard is the greatest in the typical office?
(203) How are fires classified?
(204) Which action is not a part of risk management (RM)?
(208) What negative effect could occur when star networks are...
(216) Which wireless local area network (WLAN) security method is best...
(219) Which device works as a transceiver that converts the electrical...
(230) Which event is not a valid reason to change the combination on a...
(233) Which network supports unclassified e-mail service to the user?
(009) The Uniform Code of Military Justice (UCMJ) is derived from what...
(010) When Air National Guard personnel in Title 32 status train for...
(201) Whose responsibility is to advise commanders, function managers,...
(203) What action should you take first when you encounter a fire?
(203) Which ladder practice is not prohibited?
(206) What three parts make up Communications and Information Systems...
(208) What topology offers centralized management of a network?
(216) Which network is a network that links local area networks (LAN)...
(223) Which type of encryption provides the greatest degree of...
(001) Which 3D Air Force Specialty (AFS) responsibilities include the...
(001) Which 3D Air Force Specialty (AFS) responsibilities include the...
(003) Who is the advisor for all matters affecting the career field?
(004) Occupational surveys are used to develop the specialty knowledge...
(006) Which Quality Assurance (QA) essential element collects,...
(008) What automated information system manages the entire lifecycle...
(009) What United States Code (USC) title authorizes the creation of...
(012) What major command and numbered Air Force (NAF) were realigned...
(013) Which agency is responsible for matters pertaining to the...
(015) What reason is the main purpose for consolidating Network...
(017) What basic building block is used in joint force planning and...
(021) Which document is NOT considered an official government record?
(025) What system manages the distribution and printing of paper...
(202) What method is considered the least preferred when controlling...
(203) Fuels that are normally classified as A or B will change to what...
(203) What step is the fourth in the firefighting procedure?
(203) Under normal conditions, how many milliamps of current could...
(205) Which office annually evaluates agency efforts to improve the...
(209) Which governing body is the authority for information technology...
(216) Which network is a group of computers and associated devices...
(226) What Microsoft application is a software program that allows...
(005) What program provides training for personnel to attain knowledge...
(007) What inspection integrates elements of compliance and readiness...
(236) What major program does the Global Combat Support System-Air...
(010) An employee or employer relationship that leads to the...
(010) Members of a household or relatives with whom you have a close...
(011) What cyberspace weapon system identifies vulnerabilities and...
(012) What two cyber operation defenses involve continuous monitoring...
(012) Since Military Information Support Operations (MISO) and Public...
(014) What unit installs, reconstitute, and test critical C4 systems...
(023) Who is the second-highest ranking official in the Department of...
(202) Which action is a physiological factor?
(203) According to the Centers for Disease Control and Prevention...
(207) The logical link control (LLC) sublayer is a part of which Open...
(215) What is a peripheral device?
(217) What year did the Institute of Electrical and Electronics...
(228) Which computer system vulnerability is not one in a computer...
(234) Which network provides Department of Defense (DOD) customers...
(019) Failure to observe the prohibitions and mandatory provisions of...
(201) What action must supervisors take before a work task not...
(208) When used alone, the word "topology" often refers to a...
(213) What action is the main purpose of system cache?
(216) Which network uses Carrier Sense Multiple Access/Collision...
(222) What network device provides a remote network with connectivity...
(016) The commander, Air Force forces (COMAFFOR) commands an Air...
(023) What Department of Defense Directive (DODD) establishes that all...
(025) Which of the following does NOT describe information outlined in...
(206) Which part of the Communications and Information Systems...
(210) What action is the purpose of a sliding window in Transmission...
(211) What value is the maximum of an octet in Internet Protocol...
(226) What Microsoft application is a personal information...
(228) Which incidents occur when a higher classification level of data...
(002) Which enlisted training element is assigned by the supervisor in...
(004) What action is the main goal of the utilization and training...
(006) Which evaluation is NOT an assessment type in a Quality...
(202) What three sub-categories make up human factors?
(205) What requirements mandate to develop of Air Force architectures?
(211) What class is reserved for multicast addressing?
(214) What speed is the maximum data transfer rate of USB 3.0...
(230) How would you determine if an intrusion detection system is...
(003) Who is the final authority to waive career field education...
(003) Who serves as the major command (MAJCOM) voting representative...
(006) Which one of these is NOT an essential element in a Quality...
(242) What system of the Global High Frequency (HF) Network provides...
(016) What two levels are joint task forces (JTF) divided into?
(018) What Information Technology Infrastructure Library (ITIL) stage...
(024) What Air Force publications are informational and suggest...
(026) Who develops standards for interconnect, passive and...
(210) What is a Transmission Control Protocol (TCP) socket?
(213) What characteristic is the major difference between Random...
(232) Which of the following services provides additional...
(015) What year did the Air Force institute a single instance of...
(024) What type of non-directive Air Force (AF) publication is not...
(024) What directive publications expire one year after their...
(025) What personnel oversees technical order requirements and...
(202) Who recommends controls to mitigate health risks associated with...
(206) Which part of the Communications and Information Systems...
(207) What functions do the seven layers of the Open Systems...
(003) What title is normally assigned to the on-station ranking 3D...
(231) Who has the authority a grant permission to ship classified...
(025) Which type of technical order (TO) has a numerical designator...
(202) How many impact classifications do hardhats have?
(202) Which helmet class does not provide protection against contact...
(221) What network routing protocols allow multiple autonomous systems...
(230) Which Air Force (AF) form records the destruction of Top Secret...
(235) Which system of the Global Command and Control System-Air Force...
(018) Which stage is NOT one of the Information Technology...
(019) The vision of Enterprise Information Management (EIM) is to...
(023) What type of Department of Defense Directive (DODD) establishes...
(023) What entity assigns numbers to Department of Defense (DOD)...
(023) What joint publication (JP) is the keystone document for the...
(211) Which classes allow for a maximum of 254 hosts per network?
(011) What cyberspace weapon system is the top-level boundary and...
(013) What document directs the development of the National Military...
(019) How many rules are there for effective communication via e-mail?
(021) Which Air Force Instruction (AFI) defines an "official...
(025) Who may post an update to a technical order assuming they are...
(203) What chapter in Air Force Instruction (AFI) 91–203, Air...
(227) What information system (IS) threat is the greatest threat to an...
(010) What document spells out the comprehensive strategy for the...
(207) What layers make up the two categories of the seven layer of the...
(010) What policy outlines the United States (US) Armed Forces'...
(218) How many T1 Defense Switched Network (DSN) access circuits do...
(229) Which classified document markings identifies the highest level...
(231) Who should you seek out if you need information on transporting...
(010) Which policy has prevention of cyber attacks against America's...
(201) Which publication implements the Mishap Prevention Program?
(024) What directive publication prescribes the mission, area of...
(203) What classification do flammable liquids receive?
(024) What directive publications provide essential procedural...
(204) The risk management process includes how many steps?
(015) What regional computing and data center provide enterprise...
(020) How many workflow capabilities are available to you on a...
(004) Who is responsible for scheduling the Specialty Training...
(022) Who has the authority to appoint record custodians within an...
(201) What Air Force (AF) form is used to report a hazard?
(207) What does the media access control (MAC) sublayer of the data...
(220) Describe a network bridge.
(238) Which system is a radar Tracker/Correlator software program...
(240) What system is the priority component of the Department of...
(242) What system mission is to provide reliable, rapid, two-way...
(238) How many air defenses sectors is the Battle Control System-Fixed...
(239) Which system is a space-based high data rate communications link...
(017) What methodology is used by Air Force for presenting forces to...
(024) What publications are orders issued by the Secretary of the Air...
(207) What does the logical link control (LLC) sublayer of the data...
(228) Computer security (COMPUSEC) vulnerabilities are broken down...
(022) Whose duties include providing assistance, managing staging...
(023) How many different types of Department of Defense Instructions...
(201) What Air Force (AF) form is used to report ground mishaps?
(225) In general, how many operating system task categories are there?
(235) Which system is the Department of Defense's (DOD) command and...
(232) What system includes all owned and leased communications and...
(011) Proactive defense is one of the four integrated sub-disciplines...
(205) How many volumes make up the Department of Defense Architecture...
(241) Which system is the primary network used to transmit the...
(241) What system provides a secure communications path for command...
(022) Who is appointed at each base-level unit principal staff office...
(003) Who assists with the identification of qualified subject matter...
(022) Who is charged with the duties of establishing training programs...
(233) What system is a telecommunications network that provides the...
(011) What cyberspace weapon system includes the Integrate Network...
(011) What cyberspace weapon system ensures unfettered access, mission...
(011) What cyberspace weapon system resulted from an operational...
(237) Which system is the Air Forces' primary intelligence,...
(234) Which network provides high-quality, secure telecommunications...
(015) Which unit within the Air Force Network Operations (AFNetOps)...
(225) What UNIX system software interacts most closely with the...
(229) Which classified document marking appears on the face of each...