1.
(009) What United States Codes (USC) title authorizes the creation of the Department of Defense (DOD) as an executive component of government and establishes all subordinate agencies including the Army, Navy, Air Force, and Marine Corps?
Correct Answer
A. Title 10
Explanation
Title 10 of the United States Codes (USC) authorizes the creation of the Department of Defense (DOD) as an executive component of government and establishes all subordinate agencies, including the Army, Navy, Air Force, and Marine Corps. This title outlines the organization, structure, and responsibilities of the DOD, as well as the powers and authorities of the military branches. It is the primary legal basis for the operations and administration of the Department of Defense and its components.
2.
(009) The Uniform Code of Military Justice (UCMJ) is derived from what United States Code (USC)?
Correct Answer
C. Title 10
Explanation
The correct answer is Title 10. The Uniform Code of Military Justice (UCMJ) is derived from Title 10 of the United States Code (USC). Title 10 is specifically focused on the organization and structure of the armed forces, including the military justice system. It outlines the legal framework for military discipline and the rights and responsibilities of service members. The UCMJ is a set of laws that govern the conduct of military personnel and ensures the maintenance of good order and discipline within the military.
3.
(010) Which document spells out the comprehensive strategy for the United States to secure cyberspace?
Correct Answer
B. National Strategy to Secure Cyberspace
Explanation
The correct answer is "National Strategy to Secure Cyberspace." This document outlines the comprehensive strategy for the United States to secure cyberspace. It provides guidance and direction for government agencies, private sector organizations, and individuals to protect critical infrastructure, information systems, and data from cyber threats. The National Strategy to Secure Cyberspace focuses on promoting cyber awareness, enhancing cybersecurity capabilities, and fostering international cooperation to ensure the security and resilience of cyberspace.
4.
(010) Which policy has prevention of cyber attacks against America's critical infrastructure as a key strategic priority?
Correct Answer
B. National Strategy to Secure Cyberspace
Explanation
The National Strategy to Secure Cyberspace has prevention of cyber attacks against America's critical infrastructure as a key strategic priority. This policy focuses on protecting the nation's cyber infrastructure, including its critical systems and networks, from cyber threats and attacks. It aims to enhance cybersecurity measures, promote information sharing and collaboration, and develop a resilient and secure cyberspace environment.
5.
(010) What policy outlines the United States (US) Armed Forces' comprehensive strategic approach for using cyberspace operations to assure US military strategic superiority in the cyber domain?
Correct Answer
D. National Military Strategy for Cyberspace Operations
Explanation
The National Military Strategy for Cyberspace Operations outlines the comprehensive strategic approach for using cyberspace operations to assure US military strategic superiority in the cyber domain. This policy specifically focuses on the military's use of cyberspace and its importance in maintaining superiority in this domain. It provides guidance and direction for the US Armed Forces to effectively utilize cyberspace operations in order to protect national security interests and maintain strategic advantage in the cyber realm.
6.
(010) When Air National Guard personnel in Title 32 status train for cyber operations, what title status must they be in to execute those missions?
Correct Answer
A. Title 10
Explanation
Air National Guard personnel in Title 32 status train for cyber operations. In order to execute those missions, they must be in Title 10 status.
7.
(010) An employee or employer relationship that leads to the appearance of impartiality or favoritism is an unethical situation known as
Correct Answer
B. Covered relationships
Explanation
Covered relationships refer to an unethical situation where there is an employee or employer relationship that leads to the appearance of impartiality or favoritism. This means that there is a personal connection or relationship between the individuals involved, which can compromise fairness and objectivity in decision-making processes. This situation is considered unethical because it undermines the principles of fairness, equality, and meritocracy in the workplace.
8.
(010) Members of a household or relatives with whom you have a close personal relationship is an example of which type of unethical situation
Correct Answer
B. Covered relationship
Explanation
A covered relationship refers to a situation where an individual has a personal relationship with someone they have professional or business dealings with. In this case, the question suggests that members of a household or close relatives fall under this category. This means that if someone in a position of power or authority engages in professional decisions or actions that favor their household members or close relatives, it can be considered unethical due to the potential for bias or favoritism. Therefore, the correct answer is covered relationship.
9.
(011) What cyberspace weapon system includes the Integrated Network Operations Security Center (I-NOSC), Enterprise Service Unit (ESU), and Area Processing Center (APC) functions?
Correct Answer
B. Air Force Cyber Security and Control System
Explanation
The correct answer is Air Force Cyber Security and Control System. This system includes the Integrated Network Operations Security Center (I-NOSC), Enterprise Service Unit (ESU), and Area Processing Center (APC) functions. It is a weapon system used by the Air Force to protect and defend their cyberspace operations. The I-NOSC is responsible for monitoring and securing the network, the ESU provides services and support to users, and the APC handles the processing and storage of data. Together, these functions work to ensure the security and control of the Air Force's cyberspace operations.
10.
(011) What cyberspace weapon system resulted from an operational initiative to consolidate numerous major command (MAJCOM) specific stove-piped networks into a centrally managed and controlled network under three Integrated Network Operations and Security Centers (I-NOSC)?
Correct Answer
C. Air Force Cyber Security and Control System
Explanation
The Air Force Cyber Security and Control System resulted from an operational initiative to consolidate numerous major command specific networks into a centrally managed and controlled network. This system is designed to enhance the security and control of cyberspace operations within the Air Force. It allows for centralized management and control of network operations and security through three Integrated Network Operations and Security Centers (I-NOSC). This consolidation helps to streamline operations, improve efficiency, and strengthen the overall cybersecurity posture of the Air Force.
11.
(011) What cyberspace weapons system is the top-level boundary and entry point into the Air Force Information Network (AFIN)?
Correct Answer
D. Air Force Intranet Control Weapon System
Explanation
The Air Force Intranet Control Weapon System (AFICWS) is the top-level boundary and entry point into the Air Force Information Network (AFIN). It is responsible for controlling and securing the Air Force's intranet, which is a private network used by Air Force personnel for communication and sharing of information. The AFICWS ensures that only authorized users can access the network and implements security measures to protect against cyber threats.
12.
(011) Proactive defense is one of the four integrated sub-disciplines of what cyberspace defense weapons system?
Correct Answer
A. Air Force Intranet Control Weapon System
Explanation
Proactive defense is one of the four integrated sub-disciplines of the Air Force Intranet Control Weapon System.
13.
(011) What cyberspace weapon system ensures unfettered access, mission assurance and joint warfighter use of networks and information processing systems to accomplish worldwide operations?
Correct Answer
A. Air Force Cyber Command and Control Mission System
Explanation
The Air Force Cyber Command and Control Mission System ensures unfettered access, mission assurance, and joint warfighter use of networks and information processing systems to accomplish worldwide operations. This system is specifically designed to provide command and control capabilities in cyberspace, allowing for effective management and coordination of cyber operations. It plays a crucial role in maintaining the security and functionality of Air Force networks and information systems, enabling successful mission execution in the cyberspace domain.
14.
(011) What cyberspace weapon system identifies vulnerabilities and provides commanders with a comprehensive assessment of the risk of existing vulnerabilities on critical mission networks?
Correct Answer
A. Cyberspace Vulnerability Assessment/Hunter Weapon System
Explanation
The Cyberspace Vulnerability Assessment/Hunter Weapon System is the correct answer because it is specifically designed to identify vulnerabilities and provide commanders with a comprehensive assessment of the risk of existing vulnerabilities on critical mission networks. This system is used to detect and analyze potential weaknesses in cyberspace, allowing for proactive defense and mitigation strategies to be implemented. It plays a crucial role in ensuring the security and integrity of critical mission networks in the face of evolving cyber threats.
15.
(012) What major command and numbered Air Force (NAF) were realigned to support the Air Force cyberspace missions?
Correct Answer
B. Air Force Space Command, 24th Air Force
Explanation
Air Force Space Command, 24th Air Force was realigned to support the Air Force cyberspace missions. This realignment was done to enhance the Air Force's capabilities in cyberspace operations and to ensure a dedicated command structure for cyber warfare. The 24th Air Force is responsible for conducting cyberspace operations, while the Air Force Space Command provides support and resources for these operations. This realignment allows for better coordination and integration of cyberspace missions within the Air Force.
16.
(012) What two cyber operation defense involve continuous monitoring and analyzing and directly counter an adversary penetrating a network or terminating an ongoing intrusion.
Correct Answer
A. Active and reactive
Explanation
Active and reactive cyber operation defense involve continuous monitoring and analyzing of a network and directly countering an adversary who has penetrated the network or is carrying out an ongoing intrusion. Active defense refers to taking proactive measures to detect and respond to threats, such as deploying intrusion detection systems and conducting real-time analysis of network traffic. Reactive defense involves reacting to an ongoing intrusion by implementing countermeasures, such as isolating compromised systems, blocking malicious activities, and removing the adversary from the network. These two defense strategies work together to actively defend against and respond to cyber threats.
17.
(012) Since Military Information Support Operations (MISO) and Public Affairs (PA) share a common specific audience, which activities are designed to mislead?
Correct Answer
C. Military deception (MILDEC)
Explanation
MILDEC, or Military Deception, is designed to mislead the enemy by manipulating information, actions, and perceptions. It involves the use of various tactics, such as spreading false information, creating decoy operations, and conducting feints, to deceive the enemy and make them believe false or misleading information. Since MISO and PA share a common specific audience, MILDEC can be used to mislead this audience by manipulating the information they receive and shaping their perceptions.
18.
(013) What document directs the development of the National Military Strategic Plan for Securing Cyberspace?
Correct Answer
D. Department of Defense Strategic Planning Guidance
Explanation
The Department of Defense Strategic Planning Guidance is the document that directs the development of the National Military Strategic Plan for Securing Cyberspace. This guidance provides the strategic direction and priorities for the Department of Defense, including the development of plans and policies related to cyberspace security. It outlines the goals, objectives, and strategies that the Department of Defense will pursue in order to secure cyberspace and protect national security interests.
19.
(013) Which agency is responsible for matters pertaining to the identification, prioritization and remediation of critical Global Information Grid (GIG) infrastructure?
Correct Answer
D. Defense Information Systems Agency (DISA)
Explanation
The Defense Information Systems Agency (DISA) is responsible for matters pertaining to the identification, prioritization, and remediation of critical Global Information Grid (GIG) infrastructure. The GIG is a globally interconnected set of information capabilities that enables secure and seamless communication among military personnel, information systems, and platforms. DISA plays a crucial role in ensuring the security and reliability of this infrastructure, identifying any vulnerabilities or threats, and taking appropriate measures to mitigate them. This includes managing and protecting the networks, systems, and data that make up the GIG, as well as coordinating with other agencies and stakeholders to address any critical issues.
20.
(014) What unit installs, reconstitute, and test critical C4 systems for combatant commanders anywhere at any time?
Correct Answer
B. 85th Engineering Installation Squadron
Explanation
The correct answer is the 85th Engineering Installation Squadron. This unit is responsible for installing, reconstituting, and testing critical C4 (Command, Control, Communications, and Computers) systems for combatant commanders. They are capable of providing these services anywhere and at any time, ensuring that the C4 systems are operational and effective for military operations.
21.
(015) Which unit within the Air Force Network Operations (AFNetOps) community has a goal to reduce training and increase the warfighter capacity?
Correct Answer
A. Enterprise Service Unit (ESU)
Explanation
The Enterprise Service Unit (ESU) within the Air Force Network Operations (AFNetOps) community has a goal to reduce training and increase the warfighter capacity. This means that the ESU focuses on providing efficient and effective services and support to the warfighters, allowing them to focus on their primary duties and responsibilities rather than spending time on training and other administrative tasks. By reducing the training requirements and increasing the warfighter capacity, the ESU contributes to enhancing the overall operational readiness and effectiveness of the Air Force.
22.
(015) What regional computing and data center provide enterprise services like messaging , Web access, and storage?
Correct Answer
B. Area Processing Center (APC)
Explanation
An Area Processing Center (APC) is a regional computing and data center that provides enterprise services like messaging, web access, and storage. These centers are responsible for managing and maintaining the IT infrastructure of an organization, ensuring that all employees have access to the necessary resources and support for their work. APCs play a crucial role in ensuring the smooth operation of enterprise services and are essential for the efficient functioning of an organization.
23.
(015) What reason is the main purpose for consolidating Network Control Centers (NCC) and forming the Enterprise Service Desk?
Correct Answer
B. Efficiency
Explanation
The main purpose for consolidating Network Control Centers (NCC) and forming the Enterprise Service Desk is to improve efficiency. By consolidating these centers and creating a single service desk, organizations can streamline their operations, reduce redundancies, and improve communication and coordination. This leads to faster response times, better customer service, and overall improved efficiency in managing network and IT services.
24.
(015) What year did the Air Force institute a single instance of Remedy allowing support to all locations within a single ticketing system?
Correct Answer
B. 2010
Explanation
In 2010, the Air Force implemented a single instance of Remedy, which enabled support to all locations within a single ticketing system. This means that instead of having separate ticketing systems for different locations, they consolidated everything into one system, making it more efficient and streamlined.
25.
(016) What two levels are joint task forces (JTF) divided into?
Correct Answer
B. Unified command and subordinate unified command
Explanation
Joint Task Forces (JTF) are divided into two levels: unified command and subordinate unified command. The unified command level refers to the overall command structure that oversees the JTF's operations and coordinates with other military commands. The subordinate unified command level, on the other hand, refers to the specific command structures that are established within the JTF to carry out specific missions or tasks. These two levels work together to ensure effective coordination and execution of operations within the JTF.
26.
(016) The commander, Air Force forces (COMAFFOR) commands an Air Expeditionary Task Force (AETF) and provides unity of command to a
Correct Answer
D. Joint Force Commander (JFC)
Explanation
The correct answer is Joint Force Commander (JFC). The commander, Air Force forces (COMAFFOR) commands an Air Expeditionary Task Force (AETF) and provides unity of command to a Joint Force Commander (JFC). This means that the COMAFFOR is responsible for leading and coordinating air and space operations within a joint force, under the direction of the JFC. The COMAFFOR ensures that the air and space component of the joint force operates effectively and supports the overall mission objectives of the JFC.
27.
(017) What methodology is used by Air Force for presenting forces to combatant commanders (CCDR)
Correct Answer
A. Aerospace Expeditionary Force (AEF)
Explanation
The Air Force uses the Aerospace Expeditionary Force (AEF) methodology for presenting forces to combatant commanders (CCDR). This methodology involves organizing and deploying forces in a rotational cycle to ensure a continuous and sustainable presence in various locations around the world. The AEF system is designed to provide combatant commanders with ready and trained forces that can be rapidly deployed to support their operational requirements. By using this methodology, the Air Force is able to effectively respond to global security challenges and maintain a high state of readiness.
28.
(017) What basic building block is used in joint force planning and deployments of Aerospace Expeditionary Forces (AEF)?
Correct Answer
D. Unit type code
Explanation
Unit type code is the correct answer because it is a basic building block used in joint force planning and deployments of Aerospace Expeditionary Forces (AEF). Unit type codes are alphanumeric codes that represent specific types of units, such as aircraft squadrons, support units, or personnel units. These codes provide a standardized way to identify and categorize units, which is essential for effective planning and coordination in military operations. By using unit type codes, AEFs can ensure that the right units with the necessary capabilities are deployed to support specific missions or tasks.