Set 1: Volume 1

77 Questions | Total Attempts: 180

SettingsSettingsSettings
Please wait...
Z3dx5x Quizzes & Trivia

.


Questions and Answers
  • 1. 
    Which 3D Air Force Specialty (AFS) responsibilities include the deployment, sustainment, troubleshooting, and repairing of standard radio frequency (RF) line-of-sight, wideband and ground based satellite devices?
    • A. 

      Spectrum Operations.

    • B. 

      Ground Radar Systems.

    • C. 

      Cable and Antenna Systems.

    • D. 

      Radio Frequency Transmission.

  • 2. 
    Which 3D Air Force Specialty (AFS) responsibilities include the installation and maintenance for large-scale network wiring in support of fixed and deployed operations?
    • A. 

      Spectrum Operations.

    • B. 

      Ground Radar Systems.

    • C. 

      Cable and Antenna Systems.

    • D. 

      Radio Frequency Transmission.

  • 3. 
    Which enlisted training element is assigned by the supervisor in accordance with (IAW) AFI 36−2201, Air Force Training Program?
    • A. 

      Core task.

    • B. 

      Duty competency.

    • C. 

      Core competency.

    • D. 

      Duty position task.

  • 4. 
    Who is the advisor for all matters affecting the career field?
    • A. 

      Unit training manager (UTM).

    • B. 

      Base functional manager (BFM).

    • C. 

      Major command functional manager (MFM).

    • D. 

      Air Force career field manager (AFCFM).

  • 5. 
    Who is the final authority to waive career field education training plan (CFETP) requirements to include the completion of the Air Force Specialty (AFS) career development course (CDC)?
    • A. 

      Unit training manager (UTM).

    • B. 

      Base functional manager (BFM).

    • C. 

      Major command functional manager (MFM).

    • D. 

      Air Force career field manager (AFCFM).

  • 6. 
    Who serves as the major command (MAJCOM) voting representative during career field Utilization and Training Workshops (U&TW)?
    • A. 

      Unit training manager (UTM).

    • B. 

      Base functional manager (BFM).

    • C. 

      Major command functional manager (MFM).

    • D. 

      Air Force career field manager (AFCFM).

  • 7. 
    Who assists with the identification of qualified subject matter experts (SME) to help with the development of your specialty knowledge test (SKT) and your career development course (CDC)?
    • A. 

      Unit training manager (UTM).

    • B. 

      Base functional manager (BFM).

    • C. 

      Major command functional manager (MFM).

    • D. 

      Air Force career field manager (AFCFM).

  • 8. 
    What title is normally assigned to the on-station ranking 3D cyberspace non-commissioned officer (NCO)?
    • A. 

      Unit training manager (UTM).

    • B. 

      Base functional manager (BFM).

    • C. 

      Major command functional manager (MFM).

    • D. 

      Air Force career field manager (AFCFM).

  • 9. 
    Occupational surveys are used to develop the specialty knowledge test (SKT), what tasking is another use for occupational surveys?
    • A. 

      Modify local training.

    • B. 

      Allocate manpower.

    • C. 

      Develop a Career Development Course (CDC).

    • D. 

      Assist the unit training manager in course development.

  • 10. 
    What action is the main goal of the utilization and training workshop (U&TW)?
    • A. 

      Conduct climate training surveys.

    • B. 

      Develop Career Development Courses.

    • C. 

      Review the occupational analysis report.

    • D. 

      Establish a viable Career Field Education and Training Plan (CFETP).

  • 11. 
    Who is responsible for scheduling the Specialty Training Requirements Team (STRT)?
    • A. 

      Major Command Functional Manager (MFM) in conjunction with the Training Pipeline Manager (TPM).

    • B. 

      Air Force Career Field Manager (AFCFM) in conjunction with the SME.

    • C. 

      MFM in conjunction with the subject matter expert (SME).

    • D. 

      AFCFM in conjunction with the TPM.

  • 12. 
    What program provides training for personnel to attain knowledge and skill qualifications required to perform duty in their specialty?
    • A. 

      Career Field Education and Training Plan (CFETP).

    • B. 

      Weighted Airman Promotion System (WAPS).

    • C. 

      On-the-Job Training (OJT) program.

    • D. 

      Occupational Analysis Program.

  • 13. 
    Which one of these is NOT an essential element in a Quality Assurance (QA) program?
    • A. 

      Quality Assessments.

    • B. 

      Quality Assurance.

    • C. 

      Quality System.

    • D. 

      Trend Analysis.

  • 14. 
    Which evaluation is NOT an assessment type in a Quality Assurance (QA) program?
    • A. 

      Technical Evaluation.

    • B. 

      Personnel Evaluation.

    • C. 

      Managerial Evaluation.

    • D. 

      Standard Evaluation.

  • 15. 
    Which Quality Assurance (QA) essential element collects, compiles, analyzes, and records data on the processes sampled by QA personnel?
    • A. 

      Trend analysis.

    • B. 

      Quality System.

    • C. 

      Quality Assessments.

    • D. 

      Managerial Assessments.

  • 16. 
    What inspection integrates elements of compliance and readiness with new inspection elements to create a new Inspector General (IG) inspection of unit effectiveness?
    • A. 

      Management Inspection (MI).

    • B. 

      Unit Effectiveness Inspection (UEI).

    • C. 

      Consolidated Unit Inspection (CUI).

    • D. 

      Commander’s Inspection Program (CCIP).

  • 17. 
    What automated information system manages the entire lifecycle of information technology (IT) assets from procurement through retirement?
    • A. 

      Remedy.

    • B. 

      Training Business Area.

    • C. 

      Telephone Management System.

    • D. 

      Integrated Maintenance Data System.

  • 18. 
    What United States Code (USC) title authorizes the creation of the Department of Defense (DOD) as an executive component of government and establishes all subordinate agencies including the Army, Navy, Air Force, and Marine Corps?
    • A. 

      Title 10

    • B. 

      Title 18

    • C. 

      Title 32

    • D. 

      Title 50

  • 19. 
    The Uniform Code of Military Justice (UCMJ) is derived from what United States Code (USC)?
    • A. 

      Title 3.

    • B. 

      Title 8.

    • C. 

      Title 10.

    • D. 

      Title 18.

  • 20. 
    What document spells out the comprehensive strategy for the United States to secure cyberspace?
    • A. 

      National Military Cyberspace Strategy.

    • B. 

      National Strategy to Secure Cyberspace.

    • C. 

      National Military Strategy for Cyberspace.

    • D. 

      National Military Strategy to Secure Cyberspace.

  • 21. 
    Which policy has prevention of cyber attacks against America’s critical infrastructure as a key strategic priority?
    • A. 

      National Security Policy.

    • B. 

      National Strategy to Secure Cyberspace.

    • C. 

      Comprehensive National Cybersecurity Initiative.

    • D. 

      National Military Strategy for Cyberspace Operations.

  • 22. 
    What policy outlines the United States (US) Armed Forces’ comprehensive strategic approach for using cyberspace operations to assure US military strategic superiority in the cyber domain?
    • A. 

      National Security Policy.

    • B. 

      National Strategy to Secure Cyberspace.

    • C. 

      Comprehensive National Cybersecurity Initiative.

    • D. 

      National Military Strategy for Cyberspace Operations.

  • 23. 
    When Air National Guard personnel in Title 32 status train for cyber operations, what title status must they be in to execute those missions?
    • A. 

      Title 10.

    • B. 

      Title 30.

    • C. 

      Title 50.

    • D. 

      Title 52.

  • 24. 
    An employee or employer relationship that leads to the appearance of impartiality or favoritism is an unethical situation known as
    • A. 

      Misuse of position.

    • B. 

      Covered relationships.

    • C. 

      Non-public information.

    • D. 

      Personal conflict of interest.

  • 25. 
    Members of a household or relatives with whom you have a close personal relationship is an example of which type of unethical situation?
    • A. 

      Misuse of position.

    • B. 

      Covered relationship.

    • C. 

      Personal conflict of interest.

    • D. 

      None, this is not an example of an unethical situation.

  • 26. 
    What cyberspace weapon system includes the Integrate Network Operations Security Center (I-NOSC), Enterprise Service Unit (ESU) and Area Processing Center (APC) functions?
    • A. 

      Air Force Intranet Control Weapon System.

    • B. 

      Air Force Cyber Security and Control System.

    • C. 

      Air Force Cyberspace Defense Weapon System.

    • D. 

      Air Force Cyber Command and Control Mission System.

  • 27. 
    What cyberspace weapon system resulted from an operational initiative to consolidate numerous major command (MAJCOM) specific stove-piped networks into a centrally managed and controlled network under three Integrated Network Operations and Security Centers (I-NOSC)?
    • A. 

      Air Force Cyber Command and Control Mission System.

    • B. 

      Air Force Cyberspace Defense Weapon System.

    • C. 

      Air Force Cyber Security and Control System.

    • D. 

      Air Force Intranet Control Weapon System.

  • 28. 
    What cyberspace weapon system is the top-level boundary and entry point into the Air Force Information Network (AFIN)?
    • A. 

      Air Force Cyber Command and Control Mission System.

    • B. 

      Air Force Cyberspace Defense Weapon System

    • C. 

      Air Force Cyber Security and Control System

    • D. 

      Air Force Intranet Control Weapon System.

  • 29. 
    Proactive defense is one of the four integrated sub-disciplines of what cyberspace defense weapon system?
    • A. 

      Air Force Intranet Control Weapon System

    • B. 

      Air Force Cyber Security and Control System

    • C. 

      Air Force Cyberspace Defense Weapon System

    • D. 

      Air Force Cyber Command and Control Mission System

  • 30. 
    What cyberspace weapon system ensures unfettered access, mission assurance and joint warfighter use of networks and information processing systems to accomplish worldwide operations?
    • A. 

      Air Force Cyber Command and Control Mission System.

    • B. 

      Air Force Cyberspace Defense Weapon System.

    • C. 

      Air Force Cyber Security and Control System.

    • D. 

      Air Force Intranet Control Weapons System.

  • 31. 
    What cyberspace weapon system identifies vulnerabilities and provides commanders with a comprehensive assessment of the risk of existing vulnerabilities on critical mission networks?
    • A. 

      Cyberspace Vulnerability Assessment/Hunter Weapon System

    • B. 

      Air Force Cyber Command and Control Mission System

    • C. 

      Cyberspace Defense Analysis Weapon System

    • D. 

      Air Force Intranet Control Weapons System.

  • 32. 
    What major command and numbered Air Force (NAF) were realigned to support the Air Force cyberspace mission?
    • A. 

      Air Combat Command, 9th Air Force

    • B. 

      Air Force Space Command, 24th Air Force

    • C. 

      Air Force Global Strike Command, 8th Air Force

    • D. 

      Air Education and Training Command, 2nd Air Force

  • 33. 
    What two cyber operation defenses involve continuous monitoring and analyzing and directly counter an adversary penetrating a network or terminating an ongoing intrusion.
    • A. 

      Active and reactive.

    • B. 

      Evasive and decisive.

    • C. 

      Subversive and divisive.

    • D. 

      Offensive and defensive.

  • 34. 
    Since Military Information Support Operations (MISO) and Public Affairs (PA) share a common specific audience, which activities are designed to mislead?
    • A. 

      Counterintelligence (CI).

    • B. 

      Operation Security (OPSEC).

    • C. 

      Military deception (MILDEC)

    • D. 

      Intelligence Surveillance and Reconnaissance (ISR).

  • 35. 
    What document directs the development of the National Military Strategic Plan for Securing Cyberspace?
    • A. 

      Strategic Considerations.

    • B. 

      Military Strategic Framework.

    • C. 

      Implementation and Assessment.

    • D. 

      Department of Defense Strategic Planning Guidance.

  • 36. 
    Which agency is responsible for matters pertaining to the identification, prioritization and remediation of critical Global Information Grid (GIG) infrastructure?
    • A. 

      Defense Industrial Base (DIB).

    • B. 

      Defense Intelligence Agency (DIA).

    • C. 

      National Reconnaissance Office (NRO).

    • D. 

      Defense Information Systems Agency (DISA).

  • 37. 
    What unit installs, reconstitute, and test critical C4 systems for combatant commanders anywhere at any time?
    • A. 

      644th Combat Communication Squadron.

    • B. 

      85th Engineering Installation Squadron.

    • C. 

      83th Network Operations Squadron.

    • D. 

      4th Expeditionary Fighter Wing.

  • 38. 
    Which unit within the Air Force Network Operations (AFNetOps) community has a goal to reduce training and increase the warfighter capacity?
    • A. 

      Enterprise Service Unit (ESU).

    • B. 

      Area Processing Center (APC).

    • C. 

      Enterprise Service Desk (ESD).

    • D. 

      Network Operations Security Center (NOSC).

  • 39. 
    What regional computing and data center provide enterprise services like messaging, Web access, and storage?
    • A. 

      Enterprise Service Unit (ESU).

    • B. 

      Area Processing Center (APC).

    • C. 

      Enterprise Service Desk (ESD).

    • D. 

      Network Operations Security Center (NOSC).

  • 40. 
    What reason is the main purpose for consolidating Network Control Centers (NCC) and forming the Enterprise Service Desk?
    • A. 

      Manpower.

    • B. 

      Efficiency.

    • C. 

      Reduce costs.

    • D. 

      Department of Defense 8570 mandate

  • 41. 
    What year did the Air Force institute a single instance of Remedy allowing support to all locations within a single ticketing system?
    • A. 

      2009.

    • B. 

      2010.

    • C. 

      2011.

    • D. 

      2012.

  • 42. 
    What two levels are joint task forces (JTF) divided into?
    • A. 

      Subordinate unified command and geographical command.

    • B. 

      Unified command and subordinate unified command.

    • C. 

      Functional command and geographical command.

    • D. 

      Unified command and functional command.

  • 43. 
    The commander, Air Force forces (COMAFFOR) commands an Air Expeditionary Task Force (AETF) and provides unity of command to a
    • A. 

      Combined force air and space component commander (CFAAC).

    • B. 

      Joint force air and space component commander (JFACC).

    • C. 

      Component Numbered Air Force (CNAF).

    • D. 

      Joint Force Commander (JFC).

  • 44. 
    What methodology is used by Air Force for presenting forces to combatant commanders (CCDR)?
    • A. 

      Aerospace Expeditionary Force (AEF).

    • B. 

      Air Expeditionary Task Force (AETF).

    • C. 

      Unit type codes (UTC)

    • D. 

      Stratum levels (SL).

  • 45. 
    What basic building block is used in joint force planning and deployments of Aerospace Expeditionary Forces (AEF)?
    • A. 

      Coding.

    • B. 

      Positioning.

    • C. 

      Tempo bands.

    • D. 

      Unit type code.

  • 46. 
    Which stage is NOT one of the Information Technology Infrastructure Library (ITIL) Service Life Cycle stages?
    • A. 

      Service Transition.

    • B. 

      Service Strategy.

    • C. 

      Service Contact

    • D. 

      Service Design

  • 47. 
    What tests your understanding of the original message and your ability to re-state its main purpose?
    • A. 

      A rewriting of the main point.

    • B. 

      A well-written summary

    • C. 

      A postscript message.

    • D. 

      None of the above.

  • 48. 
    What Information Technology Infrastructure Library (ITIL) stage is an overarching stage for maintaining service quality?
    • A. 

      Continual Service Improvement.

    • B. 

      Service Transition.

    • C. 

      Service Strategy.

    • D. 

      Service Design.

  • 49. 
    The vision of Enterprise Information Management (EIM) is to provide tools to empower users to
    • A. 

      Safeguard information in an enterprise-wide environment

    • B. 

      Exploit information in an enterprise-wide environment.

    • C. 

      Improve the effectiveness of the mission.

    • D. 

      Improve the efficiency of the mission.

  • 50. 
    Failure to observe the prohibitions and mandatory provisions of AFMAN 33–153, User Responsibilities and Guidance for Information Systems, by military personnel is a violation of what article of the UCMJ?
    • A. 

      Article 32.

    • B. 

      Article 40.

    • C. 

      Article 92.

    • D. 

      Article 100.

  • 51. 
    How many rules are there for effective communication via e-mail?
    • A. 

      Two.

    • B. 

      Four.

    • C. 

      Six.

    • D. 

      Eight.

  • 52. 
    How many workflow capabilities are available to you on a SharePoint Server?
    • A. 

      One.

    • B. 

      Two.

    • C. 

      Three.

    • D. 

      Four.

  • 53. 
    Which Air Force Instruction (AFI) defines an "official government record?"
    • A. 

      AFI 33−321.

    • B. 

      AFI 33−322.

    • C. 

      AFI 33−329.

    • D. 

      AFI 33−332.

  • 54. 
    Which document is NOT considered an official government record?
    • A. 

      Published doctrines.

    • B. 

      Geographical base maps.

    • C. 

      Photographs of a retreat ceremony.

    • D. 

      Library reference or museum exhibitions.

  • 55. 
    Records that are considered to be in draft format
    • A. 

      Can be altered and are not officially released.

    • B. 

      Can’t be altered, but are officially released.

    • C. 

      Can’t be altered and are officially signed.

    • D. 

      Officially signed and officially released.

  • 56. 
    Who is charged with the duties of establishing training programs for newly appointed base records managers?
    • A. 

      Base records manager.

    • B. 

      Chief of Office of Records.

    • C. 

      Command records manager.

    • D. 

      Functional area records manager.

  • 57. 
    Whose duties include providing assistance, managing staging areas, and records training?
    • A. 

      Base records manager.

    • B. 

      Chief of Office of Records.

    • C. 

      Command records manager.

    • D. 

      Functional area records manager.

  • 58. 
    Who is appointed at each base-level unit principal staff office within an Air Force organization or contractor to perform records management?
    • A. 

      Base records manager.

    • B. 

      Chief of Office of Records.

    • C. 

      Command records manager.

    • D. 

      Functional area records manager.

  • 59. 
    Who has the authority to appoint record custodians within an office of record?
    • A. 

      Base records manager.

    • B. 

      Command records manager.

    • C. 

      Chief of the Office of Records.

    • D. 

      Functional area records manager.

  • 60. 
    Who is the second-highest ranking official in the Department of Defense?
    • A. 

      The President.

    • B. 

      The Chief of Staff.

    • C. 

      The Vice President.

    • D. 

      The Deputy Secretary.

  • 61. 
    What type of Department of Defense Directive (DODD) establishes Office of the Secretary of Defense (OSD) component heads and other agencies official mission, responsibilities, function, relationships and authority?
    • A. 

      Direct oversight directives.

    • B. 

      Secretary Policy memo.

    • C. 

      Directive-type memo.

    • D. 

      Chartering directives.

  • 62. 
    What Department of Defense Directive (DODD) establishes that all authorized users of Department of Defense (DOD) information systems shall receive initial information assurance (IA) awareness orientation as a condition of access and thereafter must complete annual IA refresher awareness?
    • A. 

      DODD 8140.01.

    • B. 

      DODD 5515.01.

    • C. 

      DODD 8220.01.

    • D. 

      DODD 8570.01.

  • 63. 
    How many different types of Department of Defense Instructions (DODI) are there?
    • A. 

      One

    • B. 

      Two

    • C. 

      Three

    • D. 

      Four

  • 64. 
    What entity assigns numbers to Department of Defense (DOD) issuances based on the established subject groups and sub subject groups?
    • A. 

      Chairman of the Joint Chiefs of Staff.

    • B. 

      Deputy Secretary of Defense and authorized signers.

    • C. 

      Chief, Manuals Division (MD), under the Director, Washington Headquarters Services (WHS).

    • D. 

      Chief, Directives Division (DD), under the Director, Washington Headquarters Services (WHS).

  • 65. 
    What joint publication (JP) is the keystone document for the communications-system series of publications?
    • A. 

      JP 6–0, Joint Communications System.

    • B. 

      JP 5–0, Joint Communications System.

    • C. 

      JP 5–0, Joint Operation Planning.

    • D. 

      JP 6–0, Joint Operations Series.

  • 66. 
    What Air Force publications are informational and suggest guidance that you can modify to fit the circumstances?
    • A. 

      Directive.

    • B. 

      Non-directive

    • C. 

      Air Force Pamphlet (AFPAM).

    • D. 

      Air Force Policy Directive (AFPD).

  • 67. 
    What type of non-directive Air Force (AF) publication is not subject to frequent change?
    • A. 

      AF Doctrine.

    • B. 

      AF Handbook (AFH).

    • C. 

      AF Pamphlet (AFPAM).

    • D. 

      AF Visual Aid (AFVA).

  • 68. 
    What publications are orders issued by the Secretary of the Air Force (SECAF) that contain directive policy statements to initiate, govern, and/or regulate actions within specified areas of responsibility by Air Force activities?
    • A. 

      Air Force Instructions (AFI).

    • B. 

      Air Force Policy Directives (AFPD).

    • C. 

      Air Force Mission Directives (AFMD).

    • D. 

      Air Force Policy Memorandums (AFPM).

  • 69. 
    What directive publications expire one year after their effective date or when superseded by an Air Force Policy Directive (AFPD)?
    • A. 

      Air Force Instructions (AFI).

    • B. 

      Air Force Policy Directive (AFPD).

    • C. 

      Air Force Mission Directives (AFMD).

    • D. 

      Air Force Policy Memorandum (AFPM).

  • 70. 
    What directive publication prescribes the mission, area of responsibility, organization and relationships of MAJCOMs, FOAs, and DRUs with their respective units?
    • A. 

      Air Force Instructions (AFI).

    • B. 

      Air Force Policy Directives (AFPD).

    • C. 

      Air Force Mission Directives (AFMD).

    • D. 

      Air Force Policy Memorandums (AFPM).

  • 71. 
    What directive publications provide essential procedural guidance on implementing Department of Defense, Air Force, or higher departmental policies and/or laws?
    • A. 

      Air Force Instructions (AFI).

    • B. 

      Air Force Policy Directives (AFPD).

    • C. 

      Air Force Mission Directives (AFMD).

    • D. 

      Air Force Policy Memorandums (AFPM).

  • 72. 
    Which of the following does NOT describe information outlined in technical order (TO) 00–5–1?
    • A. 

      Time Compliance Technical Order (TCTO) procedures.

    • B. 

      Resources required to manage and use TOs.

    • C. 

      Infrastructure to manage and use TOs.

    • D. 

      Training to manage and use TOs.

  • 73. 
    What system manages the distribution and printing of paper technical orders?
    • A. 

      Enhanced Technical Information Management System (ETIMS).

    • B. 

      Office Automation System (OAS).

    • C. 

      Decision Support System (DSS)

    • D. 

      Training Business Area (TBA).

  • 74. 
    What personnel oversees technical order requirements and distribution within an organization?
    • A. 

      Library custodian.

    • B. 

      Technical Order Distribution Office (TODO).

    • C. 

      Technical Order Distribution Account (TODA).

    • D. 

      Non-Commissioned Officer in Charge (NCOIC).

  • 75. 
    Who may post an update to a technical order assuming they are trained and authorized access to the data?
    • A. 

      Technical Order Distribution Account (TODA).

    • B. 

      Technical Order Distribution Office (TODO).

    • C. 

      Library custodian.

    • D. 

      Any user.

  • 76. 
    Which type of technical order (TO) has a numerical designator beginning with "31" and covers topics such as basic electronics technology and testing practices?
    • A. 

      Standard Installation Practices TO (SIPTO).

    • B. 

      Operation and Maintenance TO.

    • C. 

      Methods and Procedures TO.

    • D. 

      General TO.

  • 77. 
    Who develops standards for interconnect, passive and electro-mechanical (IP&E) electronic components under the American National Standard Institute (ANSI) designation of Electronic Industries Alliance (EIA) standards?
    • A. 

      Defense Standardization Program (DSP).

    • B. 

      Telecommunications Industry Association (TIA).

    • C. 

      Information and Communications Technology (ICT).

    • D. 

      Electronic Components Industry Association (ECIA).