Set 1: Volume 1

77 Questions | Attempts: 195
Share
Please wait...
Question 1 / 77
0 %
0/100
Score 0/100
1. What automated information system manages the entire lifecycle of information technology (IT) assets from procurement through retirement?
Submit
Please wait...
About This Quiz
Air Force Quizzes & Trivia

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. The Uniform Code of Military Justice (UCMJ) is derived from what United States Code (USC)?
Submit
3. When Air National Guard personnel in Title 32 status train for cyber operations, what title status must they be in to execute those missions?
Submit
4. What reason is the main purpose for consolidating Network Control Centers (NCC) and forming the Enterprise Service Desk?
Submit
5. Which document is NOT considered an official government record?
Submit
6. Which 3D Air Force Specialty (AFS) responsibilities include the deployment, sustainment, troubleshooting, and repairing of standard radio frequency (RF) line-of-sight, wideband and ground based satellite devices?
Submit
7. Which 3D Air Force Specialty (AFS) responsibilities include the installation and maintenance for large-scale network wiring in support of fixed and deployed operations?
Submit
8. Occupational surveys are used to develop the specialty knowledge test (SKT), what tasking is another use for occupational surveys?
Submit
9. What action is the main goal of the utilization and training workshop (U&TW)?
Submit
10. What major command and numbered Air Force (NAF) were realigned to support the Air Force cyberspace mission?
Submit
11. Which agency is responsible for matters pertaining to the identification, prioritization and remediation of critical Global Information Grid (GIG) infrastructure?
Submit
12. What basic building block is used in joint force planning and deployments of Aerospace Expeditionary Forces (AEF)?
Submit
13. What tests your understanding of the original message and your ability to re-state its main purpose?
Submit
14. Records that are considered to be in draft format
Submit
15. What system manages the distribution and printing of paper technical orders?
Submit
16. Who is the advisor for all matters affecting the career field?
Submit
17. What inspection integrates elements of compliance and readiness with new inspection elements to create a new Inspector General (IG) inspection of unit effectiveness?
Submit
18. What United States Code (USC) title authorizes the creation of the Department of Defense (DOD) as an executive component of government and establishes all subordinate agencies including the Army, Navy, Air Force, and Marine Corps?
Submit
19. An employee or employer relationship that leads to the appearance of impartiality or favoritism is an unethical situation known as
Submit
20. What two cyber operation defenses involve continuous monitoring and analyzing and directly counter an adversary penetrating a network or terminating an ongoing intrusion.
Submit
21. Since Military Information Support Operations (MISO) and Public Affairs (PA) share a common specific audience, which activities are designed to mislead?
Submit
22. What unit installs, reconstitute, and test critical C4 systems for combatant commanders anywhere at any time?
Submit
23. Who is the second-highest ranking official in the Department of Defense?
Submit
24. Which of the following does NOT describe information outlined in technical order (TO) 00–5–1?
Submit
25. What program provides training for personnel to attain knowledge and skill qualifications required to perform duty in their specialty?
Submit
26. Members of a household or relatives with whom you have a close personal relationship is an example of which type of unethical situation?
Submit
27. How many rules are there for effective communication via e-mail?
Submit
28. Which enlisted training element is assigned by the supervisor in accordance with (IAW) AFI 36−2201, Air Force Training Program?
Submit
29. Which Quality Assurance (QA) essential element collects, compiles, analyzes, and records data on the processes sampled by QA personnel?
Submit
30. What cyberspace weapon system identifies vulnerabilities and provides commanders with a comprehensive assessment of the risk of existing vulnerabilities on critical mission networks?
Submit
31. What two levels are joint task forces (JTF) divided into?
Submit
32. Which evaluation is NOT an assessment type in a Quality Assurance (QA) program?
Submit
33. What year did the Air Force institute a single instance of Remedy allowing support to all locations within a single ticketing system?
Submit
34. The commander, Air Force forces (COMAFFOR) commands an Air Expeditionary Task Force (AETF) and provides unity of command to a
Submit
35. What joint publication (JP) is the keystone document for the communications-system series of publications?
Submit
36. Which type of technical order (TO) has a numerical designator beginning with "31" and covers topics such as basic electronics technology and testing practices?
Submit
37. Who is the final authority to waive career field education training plan (CFETP) requirements to include the completion of the Air Force Specialty (AFS) career development course (CDC)?
Submit
38. What personnel oversees technical order requirements and distribution within an organization?
Submit
39. Who develops standards for interconnect, passive and electro-mechanical (IP&E) electronic components under the American National Standard Institute (ANSI) designation of Electronic Industries Alliance (EIA) standards?
Submit
40. Which one of these is NOT an essential element in a Quality Assurance (QA) program?
Submit
41. Which Air Force Instruction (AFI) defines an "official government record?"
Submit
42. What type of Department of Defense Directive (DODD) establishes Office of the Secretary of Defense (OSD) component heads and other agencies official mission, responsibilities, function, relationships and authority?
Submit
43. What Department of Defense Directive (DODD) establishes that all authorized users of Department of Defense (DOD) information systems shall receive initial information assurance (IA) awareness orientation as a condition of access and thereafter must complete annual IA refresher awareness?
Submit
44. What type of non-directive Air Force (AF) publication is not subject to frequent change?
Submit
45. How many workflow capabilities are available to you on a SharePoint Server?
Submit
46. What Information Technology Infrastructure Library (ITIL) stage is an overarching stage for maintaining service quality?
Submit
47. The vision of Enterprise Information Management (EIM) is to provide tools to empower users to
Submit
48. Failure to observe the prohibitions and mandatory provisions of AFMAN 33–153, User Responsibilities and Guidance for Information Systems, by military personnel is a violation of what article of the UCMJ?
Submit
49. What entity assigns numbers to Department of Defense (DOD) issuances based on the established subject groups and sub subject groups?
Submit
50. What Air Force publications are informational and suggest guidance that you can modify to fit the circumstances?
Submit
51. Which stage is NOT one of the Information Technology Infrastructure Library (ITIL) Service Life Cycle stages?
Submit
52. Who serves as the major command (MAJCOM) voting representative during career field Utilization and Training Workshops (U&TW)?
Submit
53. What cyberspace weapon system is the top-level boundary and entry point into the Air Force Information Network (AFIN)?
Submit
54. What document directs the development of the National Military Strategic Plan for Securing Cyberspace?
Submit
55. How many different types of Department of Defense Instructions (DODI) are there?
Submit
56. What directive publications expire one year after their effective date or when superseded by an Air Force Policy Directive (AFPD)?
Submit
57. What title is normally assigned to the on-station ranking 3D cyberspace non-commissioned officer (NCO)?
Submit
58. What directive publications provide essential procedural guidance on implementing Department of Defense, Air Force, or higher departmental policies and/or laws?
Submit
59. What policy outlines the United States (US) Armed Forces' comprehensive strategic approach for using cyberspace operations to assure US military strategic superiority in the cyber domain?
Submit
60. What document spells out the comprehensive strategy for the United States to secure cyberspace?
Submit
61. Which unit within the Air Force Network Operations (AFNetOps) community has a goal to reduce training and increase the warfighter capacity?
Submit
62. What regional computing and data center provide enterprise services like messaging, Web access, and storage?
Submit
63. What directive publication prescribes the mission, area of responsibility, organization and relationships of MAJCOMs, FOAs, and DRUs with their respective units?
Submit
64. Which policy has prevention of cyber attacks against America's critical infrastructure as a key strategic priority?
Submit
65. Who may post an update to a technical order assuming they are trained and authorized access to the data?
Submit
66. Who is responsible for scheduling the Specialty Training Requirements Team (STRT)?
Submit
67. Proactive defense is one of the four integrated sub-disciplines of what cyberspace defense weapon system?
Submit
68. Who has the authority to appoint record custodians within an office of record?
Submit
69. What methodology is used by Air Force for presenting forces to combatant commanders (CCDR)?
Submit
70. Whose duties include providing assistance, managing staging areas, and records training?
Submit
71. What publications are orders issued by the Secretary of the Air Force (SECAF) that contain directive policy statements to initiate, govern, and/or regulate actions within specified areas of responsibility by Air Force activities?
Submit
72. Who assists with the identification of qualified subject matter experts (SME) to help with the development of your specialty knowledge test (SKT) and your career development course (CDC)?
Submit
73. Who is appointed at each base-level unit principal staff office within an Air Force organization or contractor to perform records management?
Submit
74. What cyberspace weapon system includes the Integrate Network Operations Security Center (I-NOSC), Enterprise Service Unit (ESU) and Area Processing Center (APC) functions?
Submit
75. What cyberspace weapon system ensures unfettered access, mission assurance and joint warfighter use of networks and information processing systems to accomplish worldwide operations?
Submit
76. Who is charged with the duties of establishing training programs for newly appointed base records managers?
Submit
77. What cyberspace weapon system resulted from an operational initiative to consolidate numerous major command (MAJCOM) specific stove-piped networks into a centrally managed and controlled network under three Integrated Network Operations and Security Centers (I-NOSC)?
Submit
View My Results

Quiz Review Timeline (Updated): Mar 19, 2022 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 19, 2018
    Quiz Created by
    Dowhaniuk
Cancel
  • All
    All (77)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What automated information system manages the entire lifecycle of...
The Uniform Code of Military Justice (UCMJ) is derived from what...
When Air National Guard personnel in Title 32 status train for cyber...
What reason is the main purpose for consolidating Network Control...
Which document is NOT considered an official government record?
Which 3D Air Force Specialty (AFS) responsibilities include the...
Which 3D Air Force Specialty (AFS) responsibilities include the...
Occupational surveys are used to develop the specialty knowledge test...
What action is the main goal of the utilization and training workshop...
What major command and numbered Air Force (NAF) were realigned to...
Which agency is responsible for matters pertaining to the...
What basic building block is used in joint force planning and...
What tests your understanding of the original message and your ability...
Records that are considered to be in draft format
What system manages the distribution and printing of paper technical...
Who is the advisor for all matters affecting the career field?
What inspection integrates elements of compliance and readiness with...
What United States Code (USC) title authorizes the creation of the...
An employee or employer relationship that leads to the appearance of...
What two cyber operation defenses involve continuous monitoring and...
Since Military Information Support Operations (MISO) and Public...
What unit installs, reconstitute, and test critical C4 systems for...
Who is the second-highest ranking official in the Department of...
Which of the following does NOT describe information outlined in...
What program provides training for personnel to attain knowledge and...
Members of a household or relatives with whom you have a close...
How many rules are there for effective communication via e-mail?
Which enlisted training element is assigned by the supervisor in...
Which Quality Assurance (QA) essential element collects, compiles,...
What cyberspace weapon system identifies vulnerabilities and provides...
What two levels are joint task forces (JTF) divided into?
Which evaluation is NOT an assessment type in a Quality Assurance (QA)...
What year did the Air Force institute a single instance of Remedy...
The commander, Air Force forces (COMAFFOR) commands an Air...
What joint publication (JP) is the keystone document for the...
Which type of technical order (TO) has a numerical designator...
Who is the final authority to waive career field education training...
What personnel oversees technical order requirements and distribution...
Who develops standards for interconnect, passive and...
Which one of these is NOT an essential element in a Quality Assurance...
Which Air Force Instruction (AFI) defines an "official government...
What type of Department of Defense Directive (DODD) establishes Office...
What Department of Defense Directive (DODD) establishes that all...
What type of non-directive Air Force (AF) publication is not subject...
How many workflow capabilities are available to you on a SharePoint...
What Information Technology Infrastructure Library (ITIL) stage is an...
The vision of Enterprise Information Management (EIM) is to provide...
Failure to observe the prohibitions and mandatory provisions of AFMAN...
What entity assigns numbers to Department of Defense (DOD) issuances...
What Air Force publications are informational and suggest guidance...
Which stage is NOT one of the Information Technology Infrastructure...
Who serves as the major command (MAJCOM) voting representative during...
What cyberspace weapon system is the top-level boundary and entry...
What document directs the development of the National Military...
How many different types of Department of Defense Instructions (DODI)...
What directive publications expire one year after their effective date...
What title is normally assigned to the on-station ranking 3D...
What directive publications provide essential procedural guidance on...
What policy outlines the United States (US) Armed Forces'...
What document spells out the comprehensive strategy for the United...
Which unit within the Air Force Network Operations (AFNetOps)...
What regional computing and data center provide enterprise services...
What directive publication prescribes the mission, area of...
Which policy has prevention of cyber attacks against America's...
Who may post an update to a technical order assuming they are trained...
Who is responsible for scheduling the Specialty Training Requirements...
Proactive defense is one of the four integrated sub-disciplines of...
Who has the authority to appoint record custodians within an office of...
What methodology is used by Air Force for presenting forces to...
Whose duties include providing assistance, managing staging areas, and...
What publications are orders issued by the Secretary of the Air Force...
Who assists with the identification of qualified subject matter...
Who is appointed at each base-level unit principal staff office within...
What cyberspace weapon system includes the Integrate Network...
What cyberspace weapon system ensures unfettered access, mission...
Who is charged with the duties of establishing training programs for...
What cyberspace weapon system resulted from an operational initiative...
Alert!

Advertisement