3DX7X Vol 1

314 Questions | Attempts: 166
Please wait...
Question 1 / 201
🏆 Rank #--
Score 0/100

1. (009) This is the lack of forces, equipment, personnel, material or capability reflected as the difference between the resources identified as a plan requirement and those apportioned to a combatant commander for planning that would adversely affect the command's ability to accomplish its mission

Submit
Please wait...
About This Quiz
3DX7X Vol 1 - Quiz

Being a wide military unit, the Air Force Speciality Code determines who undetakes the different roles in the unit and when. This quiz will allow you to get an understanding of it all and correct you where you have the wrong understanding.

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. (027) A |_______| is a weakness in a computer system or network open to exploitation called?

Submit

3. (025) Within the information environment what term describes the advantage, or imbalance, in one's favor?

Submit

4. (006) Which statement is not a goal of Operational Risk Management (ORM)?

Submit

5. (016) A packet sent to a |_______| address delivers to the interface identified by that address.  This is identified as a single interface.

Submit

6. (016) What class uses a range of 1–126 in the first octet of an Internet Protocol version 4 (IPv4)?

Submit

7. (012) What program, available as a free download from Adobe's website, allows you to view PDF files?

Submit

8. (018) What network provides a private tunnel through the Internet?

Submit

9. (012) Which application includes tools to help recover lost files and protect against computer failure?

Submit

10. (017) What is the range of well-known port numbers?

Submit

11. (023) What is the most common wireless networking standard?

Submit

12. (014) What is the combat information technology (IT) communication support agency of the DoD called?

Submit

13. (012) Which of these are NOT one of the Microsoft Windows family of operating systems

Submit

14. (027) Which identity management process uses a fingerprint to authenticate a user?

Submit

15. (012) These are physical areas of disk allocated with specific sizes to hold file systems.

Submit

16. (016) What Internet Protocol version 4 (IPv4) reserved address is used for loop back?

Submit

17. (024) An Air National Guardsman is authorized to execute a cyber-operation.

Submit

18. (008) When a person uses his or her position for private or personal gain it is called

Submit

19. (018) The design of communications network is known as

Submit

20. (005) How is the initial evaluation documented?

Submit

21. (021) A modem is a device that

Submit

22. (001) What career fields require personnel to be free from fear of heights and claustrophobia?

Submit

23. (024) What title status must National Guard Guardsmen be in to execute cyber operations?

Submit

24. (006) How many steps are there in Operational Risk Management (ORM)?

Submit

25. (027) Which threat vector is considered more of an annoyance than an attack?

Submit

26. (027) Which vulnerability preventive measure is a small piece of code that software developers create to address the flaws found in the original code of a program?

Submit

27. (027) Which identity management process uses a password to authenticate a user?

Submit

28. (024) What are NOT one of the three major considerations affect supporting cyber operations?

Submit

29. (017) The range of well-known port numbers is

Submit

30. (011) What device is a series of single-pole, single-throw switches mounted to a circuit board?

Submit

31. (013) The Institute of Electrical and Electronics Engineers (IEEE) divides the Open System Interconnect (OSI) Data Link Layers into what two sublayers?

Submit

32. (013) Switches and bridges operate at this layer.

Submit

33. (011) How much data can be stored on a CD-R?

Submit

34. (007) What describes support equipment designed and manufactured for commercial use.

Submit

35. (002) How is manpower sized?

Submit

36. (003) Which of the following is not a responsibility of the Air Force Career Field Manager (AFCFM)?

Submit

37. (002) Authorized manpower awarded to the unit and funded by the Air Force are

Submit

38. (005) What is the system officially used to document training?

Submit

39. (023) What medium is the primary carrier for voice telecommunications?

Submit

40. (003) Who is the job survey distributed to?

Submit

41. (009) What is the maximum amount for minor construction projects that Operation and Maintenance (O&M) funds will cover under normal conditions?

Submit

42. (001) Which Air Force Specialty Code (AFSC) requires members to pass the Air Force Electronic Data Processing Test?

Submit

43. (018) Which 802.11 standard is designed to operate at both 2.4 GHz and 5 GHz?

Submit

44. (011) What is the difference between ROM and RAM?

Submit

45. (010) Which of the following is the highest level in which quarterly awards are normally presented?

Submit

46. (021) Dynamic routing automatically calculates the best path between how many nodes?

Submit

47. (011) Most high-volume printers can connect to a network directly using what internal device?

Submit

48. (013) A router operates at this layer.

Submit

49. (007) What is the official Air Force system for managing TO libraries?

Submit

50. (001) Which of the following functions is primarily staffed by Client Systems personnel but may have a variety of Air Force Specialty Codes (AFSCs) based upon the unit mission?

Submit

51. (024) Which operations center monitors and controls Air Force network access points, boundary protection devices, and network activity to provide situational awareness, and report suspicious/malicious activity?

Submit

52. (018) What term describes a group of computers and devices that share a common communication line and resources in a small geographical area?

Submit

53. (015) Transport protocols have two classifications based on the way data transports, name the two classifications.

Submit

54. (006) |____________| is a decision-making process to systematically evaluate possible courses of action, identify risks and benefits, and determine the best course of action for any given situation.

Submit

55. (006) Supervisors document and maintain completed safety training on

Submit

56. (023) Fiber optic cable is immune to EMI.

Submit

57. (012) Applications are what type of programs?

Submit

58. (018) Which of these are NOT one of the IEEE wireless standards?

Submit

59. (010) What are the inclusive dates for Secretary of the Air Force/Chief Information Officer (SAF/CIO) annual awards?

Submit

60. (013) Routers operate at what Open System Interconnect (OSI) layer?

Submit

61. (023) Which transmission medium is the primary carrier of voice communications?

Submit

62. (016) This IPv4 class is reserved for multicast addressing.

Submit

63. (002) Which of the following is a subdivision of programmed cost data related to a weapon system or support function?

Submit

64. (015) This type of connection must be established between both ends,

Submit

65. (016) What are the two methods of subnet masking?

Submit

66. (015) Which of these lists the fields in the User Datagram Protocol (UDP) segment?

Submit

67. (016) What Internet Protocol version 4 (IPv4) class address is used for multicast addressing?

Submit

68. (024) Most exploitation activities evolve from what?

Submit

69. (009) The main goal of the |_________| is to provide Air Force users a simplified, streamlined method of purchasing and paying for simple, low-dollar value, items of supply and service.

Submit

70. (001) Which of the following is not a mandatory requirement for the advancement to the 7-skill level?

Submit

71. (010) This award recognizes officers and enlisted leaders who exude the highest level of leadership in the performance of their duties and off duty conduct.

Submit

72. (004) This is defined as a system or equipment functioning in such a way that it can perform at least one, but not all of its assigned missions or functions; system is impaired but usable.

Submit

73. (027) Although inexpensive in implementing, what systems have the major vulnerability of being prone to brute force attacks?

Submit

74. (021) A |__________|  is a device that modulates signals to encode digital information and demodulates signals to decode the transmitted information.

Submit

75. (002) Approved manpower authorizations that have not been funded for fill by the Air Force are

Submit

76. (004) Coordinated and planned outage for preventative maintenance inspections, configuration changes and optimizations that require an AFNet component/service to be unavailable for a specified length of time are

Submit

77. (014) Who must provide encryption devices for connection to the Secret Internet Protocol (IP) Data service?

Submit

78. (016) This is a mechanism that allows a network device to divide an IP address into a network and host number.

Submit

79. (016) How is an IPv6 address expressed?

Submit

80. (008) Chapter 5 of what USC Title spells out the situations in which one can draw special pay or reenlistment bonuses?

Submit

81. (017) Which common port contains Hyper Text Transfer Protocol (HTTP) servers and proxies?

Submit

82. (018) The frequencies 2.4GHz and 5GHz are used by

Submit

83. (019) What topology defines the layout of a network's devices and media?

Submit

84. (019) What topology consists of cable segments from each computer connected to a centralized component?

Submit

85. (025) Which of the following is a true statement about Electronic Warfare (EW) and Computer Network Operations (CNO)?

Submit

86. (002) Who provides the UMD to the organization?

Submit

87. (023) Which is NOT one of the three things that an optical communications system requires to transport communications?

Submit

88. (018) What kind of network is a group of computers and associated devices that share a common communications line within a small geographic area?

Submit

89. (018) What kind of network interconnects users with computer resources in a geographic area or region like a city?

Submit

90. (025) |_______|  is key to mitigating unintended or undesirable effects and maximizing cyberspace superiority.

Submit

91. (006) What will supervisors perform to check the day-to-day safety and health of an organization, work center, facility, and so forth?

Submit

92. (001) For personnel not in retraining status what is the minimum number of months OJT are required for upgrade to the 5- and 7-skill levels?

Submit

93. (018) What is the name for networks that use the same software and protocols as the public internet, but exist as a portion of an entity's private network?

Submit

94. (021) |_______| routing automatically calculates the best path between two nodes and compiles this info in a routing table.

Submit

95. (004) What Automated Information System (AIS) is used to document actions on any item with an assigned Standard Reporting Designator (SRD)?

Submit

96. (015) What are the two classifications of transport protocols?

Submit

97. (015) What regulates how much information passes over a Transmission Control Protocol (TCP) connection before the receiving host must send an acknowledgement?

Submit

98. (009) Which type of fund covers the cost of relocating facilities?

Submit

99. (005) These 4 items should be included in the(1) Master Task List.(2) Current CFETP and applicable AFJQS.(3) Local JQS (if applicable).(4) Milestones for tasks and CDC completion.

Submit

100. (012) A workgroup is a simple grouping of how many computers?

Submit

101. (017) What is the default port assignment for TELNET?

Submit

102. (021) Two basic routing activities are determining optimal routing paths and

Submit

103. (026) |_______|  refers to centralized systems, which monitor and control industrial sites, or complexes of systems spread out over large areas.

Submit

104. (019) This defines the way in which devices communicate throughout the network.

Submit

105. (001) What function(s) of the unit's operational mission does the Communications Focal Point directly support?

Submit

106. (001) What document directs the Communications Focal point key processes?

Submit

107. (005) Who are UTC Personnel Evaluations conducted on?

Submit

108. (007) What POC oversees TO requirements and distribution within an organization?

Submit

109. (016) What class address is 9.10.254.111?

Submit

110. (007) Where does the Telecommunications Industry Association obtain its accreditation?

Submit

111. (006) Who provides job safety training to all newly assigned individuals?

Submit

112. (008) Who appoints Air Force Portal Content Managers and Content Publishers for public and private websites?

Submit

113. (016) What is the IPv6 loop back address?

Submit

114. (025) What distinct capability does PA bring to the mission?

Submit

115. (017) What is the default port assignment for credit card transactions on e-commerce sites?

Submit

116. (009) What regulation provides in-depth information for administering the Government Purchase Card Program?

Submit

117. (025) Which Electronic Warfare capability uses jamming to reduce the adversary's use of the electromagnetic spectrum (EMS)?

Submit

118. (004) This type of equipment are not commissioned or installed to perform an operational mission or requirement.

Submit

119. (007) The |___________| establish and maintain a TO Account in ETIMS, establish and maintain organization TODA for organization subaccounts, and maintain records of TOs required and on hand in organization physical distribution media TO libraries.

Submit

120. (003) Which of the following is an optional attendee for the Utilization and Training Workshop(U&TW)?

Submit

121. (022) What is the most common telephone device used for voice encryption?

Submit

122. (006) Which one of these principles are not those that govern all actions associated with the ORM.

Submit

123. (004) Who establishes the necessary controls to ensure periodic inspections are accomplished?

Submit

124. (008) The USC is a compilation of which types of federal laws of the United States?

Submit

125. (012) What do you call the UNIX program that you interact with directly from your terminal or workstation?

Submit

126. (007) What systems allow for a commonly understood, maintainable, and defendable domain through all federal and non-federal systems?

Submit

127. (009) Which of the following is not a responsibility of Government Purchase Card (GPC) cardholders?

Submit

128. (010) Who reviews the selections after the board selects the 12 Outstanding Airmen of the Year?

Submit

129. (011) What is the special type of memory used to store the BIOS settings in a PC?

Submit

130. (011) The maximum number of devices a FireWire bus can take is up to

Submit

131. (018) What type of configuration does the Air Force use for most VPN traffic?

Submit

132. (023) Which type of cable is associated with the original designs of the Ethernet standard?

Submit

133. (028) This is the approval granted by the lead AO or appointed AO to operate the system at an acceptable level of risk.

Submit

134. (016) What Internet Protocol version 4 (IPv4) class address is used for networks with about 250 nodes?

Submit

135. (024) What is the primary Air Force command for cyberspace missions?

Submit

136. (019) What are the two most common hybrid topologies?

Submit

137. (002) Where is the Air Force active component manpower planning and programming centralized

Submit

138. (020) What data transport method grew out of the need for a worldwide standard to allow interoperability of information, regardless of the information type or "end-system"?

Submit

139. (020) When the full bandwidth of a T1 line is not needed it can be divided in 64 Kbps increments known as what?

Submit

140. (003) Who serves as the major command (MAJCOM) voting representative during career field Specialty Training Requirements Team (STRT) and Utilization and Training Workshop (U&TW)?

Submit

141. (007) What immediate result is expected after an AF TCNO is issued?

Submit

142. (003) Who serves as the MAJCOM liaison for her/his respective AFCFM?

Submit

143. (011) What does RAM mean?

Submit

144. (024) The ATO reflect the integrated air, space, and cyberspace operations plan that supports a joint force commander's campaign.

Submit

145. (020) Over a single pair cable, Integrated Services Digital Network (ISDN) is capable of transmission rates of

Submit

146. (001) What AFSC is Knowledge Operations Management?

Submit

147. (011) Which connection enables data transfer speeds of 480 Mbps and can handle up to 127 peripherals at once?

Submit

148. (025) MILDEC can intentionally target or mislead the news media, the U.S. public, or Congress? 

Submit

149. (016) In an IPv4 class of address, the first bit (0) identifies the address class and, together with the next seven bits, identifies the network number.

Submit

150. (025) What is critical to mitigating unintended or undesirable effects, on either our behalf or the adversary's, and maximizing cyberspace superiority?

Submit

151. (007) When do work centers ensure LWCs, LJGs, LPSs, and LCLs are reviewed for currency?

Submit

152. (012) Which of these are not one of the operating system's task categories.

Submit

153. (006) Which of the following is not a term for Job Safety Analysis?

Submit

154. (007) Who provides accreditation for the Telecommunications Industry Association (TIA)?

Submit

155. (016) |_________|  identify a group of interfaces belonging to different nodes, these packets send to all interfaces identified by that address.

Submit

156. (008) This is performance of work associated with your day-to-day responsibilities or performance of only official duties on official time.

Submit

157. (001) What AFSC is Cyber Transport Systems?

Submit

158. (011) What is the "trade name" that refers to the 40-pin interface and drive-controller architecture designed to implement the ATA standard?

Submit

159. (019)  A description of the layout of the network media that interconnects the devices on a network is

Submit

160. (010) Which document provides guidance for awards specific to the Cyber community?

Submit

161. (002) Which of the following is the official source of manpower information for an organization and is used as a tool to manage positions?

Submit

162. (016) How many bits are in an Internet Protocol version 4 (IPv4) address?

Submit

163. (007) Who develops standards for Interconnect, Passive and Electro-mechanical (IP&E) electronic components under the American National Standard Institute (ANSI) designation of Electronic Industries Alliance (EIA) standards?

Submit

164. (015) This is the temporary store of excess data bursts that remain in memory of network devices until processed.

Submit

165. (016) The protocols at the Data Link layer define the access method for the media, the architecture, and interface with the Physical layer of the network. What standards are these protocols based on?

Submit

166. (005) Contingency/Wartime tasks, additional duties identified by the supervisor as certifiable tasks, and mandatory core tasks identified by the AFCFM are all a part of

Submit

167. (008) Who has the overall responsibility for publishing local policy and guidance defining authorized personal use of the internet?

Submit

168. (016)
  • Source Port
  • Destination port
  • Sequence number
  • Acknowledgement number (ACK)
  • TCP header length
  • Reserved, Flags (Control bits)
  • Sliding window size
  • Checksum
  • Urgent pointer
  • Options
  • Padding
  • Data
These are all fields belonging to:

Submit

169. (011) What term is used for the speed enhancement resulting from a small amount of memory placed inside the CPU or between the CPU and the computer's main memory?

Submit

170. (021) What Data Link Layer network device logically separates a single network into two segments or collision domains in Ethernet networks?

Submit

171. (005) What must be done prior to conducting the initial evaluation on newly assigned personnel?

Submit

172. (026) Which Supervisory Control and Data Acquisition (SCADA) subsystem connects to sensors in the process, converting sensor signals to digital data?

Submit

173. (028) The technical solution for a communications and information system requirement summarizes

Submit

174. (008) Procedures and circumstances for Congress to order units into active Federal duty are established in United States Code (USC) Title

Submit

175. (001) What AFSC is RF Transmission Systems?

Submit

176. (013) Network switches and bridges operate at what Open System Interconnect (OSI) layer?

Submit

177. (012) This manages hardware and software resources of the computer system, and provides a stable, consistent way for applications to deal with the hardware without having to know all of the details of the software.

Submit

178. (003) Which segment of the Utilization and Training Workshop (U&TW)/ Specialty Training Requirements Team (STRT) process concentrates on training proficiency levels and training resourcing?

Submit

179. (007) Who develops interconnect, passive and electro-mechanical (IP&E) electronic components under the ANSI-designation of EIA standards.

Submit

180. (016) What is the reserved IPv4 address for loop back?

Submit

181. (015) In a connection-oriented protocol, such as Transmission Control Protocol (TCP), what must happen before data is transmitted between clients?

Submit

182. (007) Which of the following is information not contained in Technical Order (TO) 00–5–1?

Submit

183. (008) The creation of the DOD as an executive component of the government Is authorized by United States Code (USC) Title

Submit

184. (004) What AIS is used to track outages for computer and cyber network equipment?

Submit

185. (018) Which 802.11 standard has a throughput of 11 Mbps and runs at the 2.4 GHz frequency?

Submit

186. (008) What are the two types of Air Force Web pages/sites?

Submit

187. (025) What is NOT one of the three capabilities of EW?

Submit

188. (021) What type of switching is required when a moving a frame from a low-speed LAN to a high-speed LAN?

Submit

189. (007) What describes excerpts from one or more basic TOs that organize and simplify instructions.

Submit

190. (021) |________|  routing is a technique in which a network administrator programs a router to use specific paths between nodes.

Submit

191. (003) What is used as a starting point to develop the Career Field Education and Training Plan (CFETP) and Specialty Training Standard (STS) during the Specialty Training requirements Team (STRT) and Utilization and Training Workshop (U&TW)?

Submit

192. (016) What class address is 154.224.32.3?

Submit

193. (007) Who determines if local checklists and/or work cards are required for specific equipment?

Submit

194. (009) In-depth information for administering the Government Purchase Card program at all responsible levels is found in Air Force Instruction (AFI)

Submit

195. (024) On delegation authority, whose cyber tasking orders does the 624 OC relay to all Air Force units?

Submit

196. (010) Guidance for awards specific to the Cyber community are found in Air Force instruction

Submit

197. (012) This is a collection of computers defined by the administrator of a Windows Server network that share a common directory/database

Submit

198. (012) In which UNIX directory are application programs contained?

Submit

199. (007) Who should endorse the AF Form 673 as the Certifying Official?

Submit

200. (028) Who provides the formal declaration that an information system is approved to operate in a particular security mode using a prescribed set of safeguards and acceptable risk?

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (200)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
(009) This is the lack of forces, equipment, personnel, material or...
(027) A |_______| is a weakness in a computer system or network open...
(025) Within the information environment what term describes the...
(006) Which statement is not a goal of Operational Risk Management...
(016) A packet sent to a |_______| address delivers to the interface...
(016) What class uses a range of 1–126 in the first octet of an...
(012) What program, available as a free download from Adobe's website,...
(018) What network provides a private tunnel through the Internet?
(012) Which application includes tools to help recover lost files and...
(017) What is the range of well-known port numbers?
(023) What is the most common wireless networking standard?
(014) What is the combat information technology (IT) communication...
(012) Which of these are NOT one of the Microsoft Windows family of...
(027) Which identity management process uses a fingerprint to...
(012) These are physical areas of disk allocated with specific sizes...
(016) What Internet Protocol version 4 (IPv4) reserved address is used...
(024) An Air National Guardsman is authorized to execute a...
(008) When a person uses his or her position for private or personal...
(018) The design of communications network is known as
(005) How is the initial evaluation documented?
(021) A modem is a device that
(001) What career fields require personnel to be free from fear of...
(024) What title status must National Guard Guardsmen be in to execute...
(006) How many steps are there in Operational Risk Management (ORM)?
(027) Which threat vector is considered more of an annoyance than an...
(027) Which vulnerability preventive measure is a small piece of code...
(027) Which identity management process uses a password to...
(024) What are NOT one of the three major considerations affect...
(017) The range of well-known port numbers is
(011) What device is a series of single-pole, single-throw switches...
(013) The Institute of Electrical and Electronics Engineers (IEEE)...
(013) Switches and bridges operate at this layer.
(011) How much data can be stored on a CD-R?
(007) What describes support equipment designed and manufactured for...
(002) How is manpower sized?
(003) Which of the following is not a responsibility of the Air Force...
(002) Authorized manpower awarded to the unit and funded by the Air...
(005) What is the system officially used to document training?
(023) What medium is the primary carrier for voice telecommunications?
(003) Who is the job survey distributed to?
(009) What is the maximum amount for minor construction projects that...
(001) Which Air Force Specialty Code (AFSC) requires members to pass...
(018) Which 802.11 standard is designed to operate at both 2.4 GHz and...
(011) What is the difference between ROM and RAM?
(010) Which of the following is the highest level in which quarterly...
(021) Dynamic routing automatically calculates the best path between...
(011) Most high-volume printers can connect to a network directly...
(013) A router operates at this layer.
(007) What is the official Air Force system for managing TO libraries?
(001) Which of the following functions is primarily staffed by Client...
(024) Which operations center monitors and controls Air Force network...
(018) What term describes a group of computers and devices that share...
(015) Transport protocols have two classifications based on the way...
(006) |____________| is a decision-making process to systematically...
(006) Supervisors document and maintain completed safety training on
(023) Fiber optic cable is immune to EMI.
(012) Applications are what type of programs?
(018) Which of these are NOT one of the IEEE wireless standards?
(010) What are the inclusive dates for Secretary of the Air...
(013) Routers operate at what Open System Interconnect (OSI) layer?
(023) Which transmission medium is the primary carrier of voice...
(016) This IPv4 class is reserved for multicast addressing.
(002) Which of the following is a subdivision of programmed cost data...
(015) This type of connection must be established between both ends,
(016) What are the two methods of subnet masking?
(015) Which of these lists the fields in the User Datagram Protocol...
(016) What Internet Protocol version 4 (IPv4) class address is used...
(024) Most exploitation activities evolve from what?
(009) The main goal of the |_________| is to provide Air Force users a...
(001) Which of the following is not a mandatory requirement for the...
(010) This award recognizes officers and enlisted leaders who exude...
(004) This is defined as a system or equipment functioning in such a...
(027) Although inexpensive in implementing, what systems have the...
(021) A |__________|  is a device that modulates signals to...
(002) Approved manpower authorizations that have not been funded for...
(004) Coordinated and planned outage for preventative maintenance...
(014) Who must provide encryption devices for connection to the Secret...
(016) This is a mechanism that allows a network device to divide an IP...
(016) How is an IPv6 address expressed?
(008) Chapter 5 of what USC Title spells out the situations in which...
(017) Which common port contains Hyper Text Transfer Protocol (HTTP)...
(018) The frequencies 2.4GHz and 5GHz are used by
(019) What topology defines the layout of a network's devices and...
(019) What topology consists of cable segments from each computer...
(025) Which of the following is a true statement about Electronic...
(002) Who provides the UMD to the organization?
(023) Which is NOT one of the three things that an optical...
(018) What kind of network is a group of computers and associated...
(018) What kind of network interconnects users with computer resources...
(025) |_______|  is key to mitigating unintended or undesirable...
(006) What will supervisors perform to check the day-to-day safety and...
(001) For personnel not in retraining status what is the minimum...
(018) What is the name for networks that use the same software and...
(021) |_______| routing automatically calculates the best path between...
(004) What Automated Information System (AIS) is used to document...
(015) What are the two classifications of transport protocols?
(015) What regulates how much information passes over a Transmission...
(009) Which type of fund covers the cost of relocating facilities?
(005) These 4 items should be included in the(1) Master Task List.(2)...
(012) A workgroup is a simple grouping of how many computers?
(017) What is the default port assignment for TELNET?
(021) Two basic routing activities are determining optimal routing...
(026) |_______|  refers to centralized systems, which monitor and...
(019) This defines the way in which devices communicate throughout the...
(001) What function(s) of the unit's operational mission does the...
(001) What document directs the Communications Focal point key...
(005) Who are UTC Personnel Evaluations conducted on?
(007) What POC oversees TO requirements and distribution within an...
(016) What class address is 9.10.254.111?
(007) Where does the Telecommunications Industry Association obtain...
(006) Who provides job safety training to all newly assigned...
(008) Who appoints Air Force Portal Content Managers and Content...
(016) What is the IPv6 loop back address?
(025) What distinct capability does PA bring to the mission?
(017) What is the default port assignment for credit card transactions...
(009) What regulation provides in-depth information for administering...
(025) Which Electronic Warfare capability uses jamming to reduce the...
(004) This type of equipment are not commissioned or installed to...
(007) The |___________| establish and maintain a TO Account in ETIMS,...
(003) Which of the following is an optional attendee for the...
(022) What is the most common telephone device used for voice...
(006) Which one of these principles are not those that govern all...
(004) Who establishes the necessary controls to ensure periodic...
(008) The USC is a compilation of which types of federal laws of the...
(012) What do you call the UNIX program that you interact with...
(007) What systems allow for a commonly understood, maintainable, and...
(009) Which of the following is not a responsibility of Government...
(010) Who reviews the selections after the board selects the 12...
(011) What is the special type of memory used to store the BIOS...
(011) The maximum number of devices a FireWire bus can take is up to
(018) What type of configuration does the Air Force use for most VPN...
(023) Which type of cable is associated with the original designs of...
(028) This is the approval granted by the lead AO or appointed AO to...
(016) What Internet Protocol version 4 (IPv4) class address is used...
(024) What is the primary Air Force command for cyberspace missions?
(019) What are the two most common hybrid topologies?
(002) Where is the Air Force active component manpower planning and...
(020) What data transport method grew out of the need for a worldwide...
(020) When the full bandwidth of a T1 line is not needed it can be...
(003) Who serves as the major command (MAJCOM) voting representative...
(007) What immediate result is expected after an AF TCNO is issued?
(003) Who serves as the MAJCOM liaison for her/his respective AFCFM?
(011) What does RAM mean?
(024) The ATO reflect the integrated air, space, and cyberspace...
(020) Over a single pair cable, Integrated Services Digital Network...
(001) What AFSC is Knowledge Operations Management?
(011) Which connection enables data transfer speeds of 480 Mbps and...
(025) MILDEC can intentionally target or mislead the news media, the...
(016) In an IPv4 class of address, the first bit (0) identifies the...
(025) What is critical to mitigating unintended or undesirable...
(007) When do work centers ensure LWCs, LJGs, LPSs, and LCLs are...
(012) Which of these are not one of the operating system's task...
(006) Which of the following is not a term for Job Safety Analysis?
(007) Who provides accreditation for the Telecommunications Industry...
(016) |_________|  identify a group of interfaces belonging to...
(008) This is performance of work associated with your day-to-day...
(001) What AFSC is Cyber Transport Systems?
(011) What is the "trade name" that refers to the 40-pin interface and...
(019)  A description of the layout of the network media that...
(010) Which document provides guidance for awards specific to the...
(002) Which of the following is the official source of manpower...
(016) How many bits are in an Internet Protocol version 4 (IPv4)...
(007) Who develops standards for Interconnect, Passive and...
(015) This is the temporary store of excess data bursts that remain in...
(016) The protocols at the Data Link layer define the access method...
(005) Contingency/Wartime tasks, additional duties identified by the...
(008) Who has the overall responsibility for publishing local policy...
(016)Source PortDestination portSequence numberAcknowledgement number...
(011) What term is used for the speed enhancement resulting from a...
(021) What Data Link Layer network device logically separates a single...
(005) What must be done prior to conducting the initial evaluation on...
(026) Which Supervisory Control and Data Acquisition (SCADA) subsystem...
(028) The technical solution for a communications and information...
(008) Procedures and circumstances for Congress to order units into...
(001) What AFSC is RF Transmission Systems?
(013) Network switches and bridges operate at what Open System...
(012) This manages hardware and software resources of the computer...
(003) Which segment of the Utilization and Training Workshop...
(007) Who develops interconnect, passive and electro-mechanical...
(016) What is the reserved IPv4 address for loop back?
(015) In a connection-oriented protocol, such as Transmission Control...
(007) Which of the following is information not contained in Technical...
(008) The creation of the DOD as an executive component of the...
(004) What AIS is used to track outages for computer and cyber network...
(018) Which 802.11 standard has a throughput of 11 Mbps and runs at...
(008) What are the two types of Air Force Web pages/sites?
(025) What is NOT one of the three capabilities of EW?
(021) What type of switching is required when a moving a frame from a...
(007) What describes excerpts from one or more basic TOs that organize...
(021) |________|  routing is a technique in which a network...
(003) What is used as a starting point to develop the Career Field...
(016) What class address is 154.224.32.3?
(007) Who determines if local checklists and/or work cards are...
(009) In-depth information for administering the Government Purchase...
(024) On delegation authority, whose cyber tasking orders does the 624...
(010) Guidance for awards specific to the Cyber community are found in...
(012) This is a collection of computers defined by the administrator...
(012) In which UNIX directory are application programs contained?
(007) Who should endorse the AF Form 673 as the Certifying Official?
(028) Who provides the formal declaration that an information system...
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!