1.
Which publication implements the Mishap Prevention Program?
Correct Answer
B. AFI 91-202
Explanation
The correct answer is AFI 91-202. This publication implements the Mishap Prevention Program.
2.
What action is the purpose of the Mishap Prevention Program?
Correct Answer
D. Protect resources and personnel from damage, loss, injury, and or death
Explanation
The purpose of the Mishap Prevention Program is to protect resources and personnel from damage, loss, injury, and/or death. This program aims to prevent accidents, mishaps, and unsafe practices that could result in harm or negative consequences. By implementing safety measures and protocols, the program ensures the well-being and preservation of both physical and human resources within an organization.
3.
The Occupational Safety and Health Administration (OSHA) is a part of the United States Department of
Correct Answer
D. Labor
Explanation
The correct answer is Labor because the Occupational Safety and Health Administration (OSHA) is responsible for enforcing workplace safety and health regulations in the United States. It ensures that employers provide a safe and healthy working environment for their employees. As a part of the United States Department of Labor, OSHA works to prevent workplace injuries, illnesses, and fatalities through the development and enforcement of standards, training, education, and assistance programs.
4.
Whose responsibility is to advise commanders, function managers, supervisors and workers on safety matters on an Air Force installation?
Correct Answer
D. Installation safety office
Explanation
The installation safety office is responsible for advising commanders, function managers, supervisors, and workers on safety matters on an Air Force installation. They have the expertise and knowledge to provide guidance and ensure that safety protocols and procedures are followed to maintain a safe working environment.
5.
What action must supervisors take before a work task not governed by a technical order or other guidance can be accomplished?
Correct Answer
B. Conduct a job safety analysis (JSA)
Explanation
Before a work task not governed by a technical order or other guidance can be accomplished, supervisors must conduct a job safety analysis (JSA). This involves identifying potential hazards and risks associated with the task, evaluating the likelihood and severity of those risks, and implementing appropriate control measures to mitigate them. A JSA helps ensure that employees are aware of the potential dangers involved in the task and are equipped with the necessary knowledge and precautions to perform it safely. By conducting a JSA, supervisors can effectively manage and minimize workplace hazards, promoting a safer work environment.
6.
What Air Force (AF) form is used to report ground mishaps?
Correct Answer
C. 978
Explanation
The correct answer is 978. The Air Force (AF) uses AF Form 978 to report ground mishaps. This form is specifically designed for reporting accidents or incidents that occur on the ground, such as vehicle accidents or equipment damage. It allows the Air Force to track and investigate these incidents in order to prevent future mishaps and ensure the safety of personnel and equipment.
7.
What Air Force (AF) form is used to report a hazard?
Correct Answer
A. 457
Explanation
The correct answer is 457. The Air Force uses AF Form 457 to report a hazard. This form is used to document and report any potential hazards or unsafe conditions that may pose a risk to personnel, equipment, or operations. By reporting hazards using this form, the Air Force can take appropriate actions to mitigate risks and ensure the safety of its personnel and resources.
8.
What three sub-categories make up human factors?
Correct Answer
D. pHysical, pHysiological, organizational
Explanation
The three sub-categories that make up human factors are physical, physiological, and organizational. Physical factors refer to the physical environment in which individuals work, including factors such as lighting, noise, and ergonomics. Physiological factors involve understanding how the human body functions and reacts to different stimuli, such as fatigue and stress. Organizational factors focus on the social and organizational aspects of work, including communication, teamwork, and leadership. These three sub-categories help to understand and optimize the interaction between humans and their work environment, ensuring safety, efficiency, and well-being.
9.
Which action is a physiological factor?
Correct Answer
C. Ignoring directions from supervisors and work leaders
Explanation
Ignoring directions from supervisors and work leaders is not a physiological factor. Physiological factors refer to physical or biological conditions that can affect a person's performance, such as fatigue, intoxication, or the effects of medication. Ignoring directions is a behavioral or psychological factor, as it involves a conscious decision to disregard instructions rather than being influenced by physical or biological factors.
10.
Who recommends controls to mitigate health risks associated with identified health threats/hazards?
Correct Answer
A. Bioenvironmental Engineering
Explanation
Bioenvironmental Engineering is responsible for recommending controls to mitigate health risks associated with identified health threats/hazards. They are experts in assessing and managing environmental factors that can impact human health, such as air quality, water quality, and hazardous materials. They work closely with other departments and organizations to develop and implement strategies to minimize health risks and ensure the safety of personnel.
11.
What method is considered the least preferred when controlling hazards and should not be relied upon alone to protect against hazards
Correct Answer
C. Use of personal protective equipment (PPE)
Explanation
The use of personal protective equipment (PPE) is considered the least preferred method when controlling hazards because it should not be relied upon alone to protect against hazards. PPE is only a last line of defense and should be used in conjunction with other control measures such as engineering controls, administrative controls, and elimination or substitution of hazards. PPE can be easily compromised or misused, and it does not address the root cause of the hazard. Therefore, it is important to prioritize other control methods over relying solely on PPE.
12.
How many impact classifications do hardhats have?
Correct Answer
B. Two
Explanation
Hardhats have two impact classifications. This implies that hardhats are designed to provide protection against two different levels of impact. It suggests that hardhats are capable of protecting the wearer from different types of potential hazards or accidents that may occur in the workplace or construction sites.
13.
Which helmet class does not provide protection against contact with electrical conductors
Correct Answer
B. C
Explanation
Helmet class C does not provide protection against contact with electrical conductors. This is because helmet class C is designed for general use and does not have any specific electrical insulation properties. It is important to use a helmet with the appropriate class for the specific task or environment to ensure proper protection against electrical hazards.
14.
What hazard is the greatest in the typical office?
Correct Answer
A. Falls
Explanation
In a typical office setting, falls are the greatest hazard. This could be due to various factors such as slippery floors, cluttered walkways, or improper use of ladders or chairs. Falls can result in injuries ranging from minor cuts and bruises to more serious fractures or head injuries. It is important for employers to ensure a safe working environment by addressing potential hazards, providing proper training, and implementing safety measures such as non-slip flooring, clear walkways, and regular maintenance of office equipment.
15.
According to Centers for Disease Control and Prevention (CDC) office workers are how many times more likely to suffer a disabling injury for a fall than non-office workers?
Correct Answer
B. 2 to 2.5
Explanation
According to the Centers for Disease Control and Prevention (CDC), office workers are 2 to 2.5 times more likely to suffer a disabling injury from a fall compared to non-office workers. This indicates that office workers face a higher risk of getting injured due to falls in comparison to those who do not work in an office setting.
16.
What chapter in Air Force Instruction (AFI) 91-203, Air Force Consolidated Occupational Safety Instruction provides specific guidance on office safety?
Correct Answer
C. 10
Explanation
Chapter 10 in Air Force Instruction (AFI) 91-203, Air Force Consolidated Occupational Safety Instruction provides specific guidance on office safety.
17.
How are fires classified?
Correct Answer
A. Fuel Type
Explanation
Fires are classified based on the type of fuel involved. Different types of fuel, such as wood, paper, or gasoline, can produce different types of fires with varying characteristics. By categorizing fires based on fuel type, it becomes easier to understand their behavior, determine the appropriate firefighting methods, and assess potential risks and hazards.
18.
What classification do flammable liquids receive?
Correct Answer
B. Class B
Explanation
Flammable liquids receive the classification of Class B. Class B is specifically assigned to flammable liquids because these substances have a low flash point and can easily catch fire or explode when exposed to a flame or spark. This classification helps to identify and handle these liquids properly to prevent accidents and ensure safety.
19.
Fuels that are normally classified as A or B will change to what classification if an electric current is introduced?
Correct Answer
C. Class C
Explanation
When an electric current is introduced to fuels that are normally classified as A or B, they will change their classification to Class C. This is because the introduction of an electric current can cause the fuels to become conductive, which means they have the ability to carry an electric charge. Class C fuels are specifically designed to be conductive and are commonly used in electrical systems, such as in power plants or for fueling electric vehicles.
20.
What action should you take first when you encounter a fire?
Correct Answer
D. Sound the fire alarm
Explanation
When encountering a fire, the first action to take should be to sound the fire alarm. This is crucial as it alerts everyone in the building about the fire, allowing them to evacuate safely. By sounding the fire alarm, it helps to ensure that everyone is aware of the emergency and can take appropriate actions to exit the building quickly. Once the alarm is sounded, personnel can then proceed to evacuate the building, call the fire department, and attempt to extinguish the fire if it is safe to do so.
21.
What step is fourth in the firefighting procedure?
Correct Answer
B. Extinguish fire if possible
Explanation
The fourth step in the firefighting procedure is to extinguish the fire if possible. This step involves using the appropriate firefighting equipment and techniques to suppress and eliminate the fire. It is important to assess the situation and determine if it is safe to attempt extinguishing the fire before taking action.
22.
Under normal conditions, how many milliamps of current could cause cardiac arrest?
Correct Answer
A. 50
Explanation
Under normal conditions, a current of 50 milliamps can cause cardiac arrest. This means that if a person is exposed to an electrical current of 50 milliamps, it can disrupt the normal electrical signals in the heart and potentially lead to a dangerous condition. It is important to be cautious around electrical sources and take necessary precautions to avoid such incidents.
23.
Which ladder practice is not prohibited?
Correct Answer
A. Use of a wooden ladder in the vicinity of electrical circuits
Explanation
Using a wooden ladder in the vicinity of electrical circuits is not prohibited because wood is a non-conductive material, which means it does not conduct electricity. Therefore, using a wooden ladder near electrical circuits does not pose a risk of electric shock or short-circuiting. However, it is still important to exercise caution and follow safety guidelines to prevent accidents.
24.
Which action is not a part of risk management (RM)?
Correct Answer
C. Apply the process irregularly and continuously
Explanation
The correct answer is "Apply the process irregularly and continuously." This action contradicts the principles of risk management, which emphasize the need for consistency and regularity in assessing and addressing risks. Risk management involves identifying, evaluating, and responding to risks in a systematic and ongoing manner. Applying the process irregularly and continuously would undermine the effectiveness of risk management efforts, as it would lead to inconsistent and incomplete risk assessments and responses.
25.
The risk management process includes how many steps?
Correct Answer
B. Five
Explanation
The risk management process includes five steps. These steps are: 1) Identify the risks, 2) Analyze the risks, 3) Evaluate the risks, 4) Treat the risks, and 5) Monitor and review the risks. Each step plays a crucial role in effectively managing and mitigating risks within an organization.
26.
How many volumes make up the Department of Defense Architecture Framework (DODAF) specification?
Correct Answer
D. Four
Explanation
The Department of Defense Architecture Framework (DODAF) specification is divided into four volumes. Each volume covers different aspects of the framework, including the overall guidance, the architecture data, the architecture views, and the architecture descriptions. These volumes provide a comprehensive and structured approach to developing and managing architectures within the Department of Defense.
27.
Which office annually evaluates agency efforts to improve the quality and usefulness of information technology investments requested by agencies through well-organized strategic decisions relating to investments and portfolio management?
Correct Answer
D. Office of Management and Budget
Explanation
The Office of Management and Budget (OMB) annually evaluates agency efforts to improve the quality and usefulness of information technology investments requested by agencies through well-organized strategic decisions relating to investments and portfolio management. OMB plays a crucial role in overseeing and coordinating federal agencies' budget, management, and regulatory policies. It ensures that agencies are making informed decisions regarding their IT investments and that these investments align with the overall goals and priorities of the government.
28.
What requirements mandate to develop of Air Force Architectures?
Correct Answer
B. Federal level
Explanation
Federal level requirements mandate the development of Air Force Architectures. This means that the requirements for developing these architectures are set at the federal level, which implies that they are established by the federal government. This could include regulations, policies, or directives that outline the specific needs and goals for the Air Force Architectures. These requirements are likely to be comprehensive and cover various aspects such as technology, resources, and strategic objectives.
29.
What three parts make up Communications and Information Systems Installation Record (CSIR)?
Correct Answer
C. Administrative record, drawing record, and maintenance record
Explanation
The Communications and Information Systems Installation Record (CSIR) is a comprehensive document that includes administrative information, drawings, and maintenance records. The administrative record contains details about the installation, such as project timelines, personnel involved, and any relevant administrative procedures. The drawing record includes diagrams and schematics of the installed systems, providing a visual representation of the setup. The maintenance record documents any maintenance activities performed on the systems, including repairs, upgrades, and regular maintenance checks. Together, these three parts of the CSIR provide a complete record of the installation, its documentation, and its ongoing maintenance.
30.
Which part of the Communications and Information Systems Installation Record (CSIR) depicts physical layout of communications and information systems and provide engineering data?
Correct Answer
C. Drawing record
Explanation
The drawing record section of the Communications and Information Systems Installation Record (CSIR) depicts the physical layout of communications and information systems and provides engineering data. This section includes detailed drawings and diagrams that show the placement and connections of equipment, cables, and other components. It serves as a visual representation of the system's architecture and helps in understanding the physical aspects of the installation.
31.
Which part of the Communications Information Systems Installation Record (CSIR) is normally retained in the production work center?
Correct Answer
B. Maintenance record
Explanation
The maintenance record is normally retained in the production work center of the Communications Information Systems Installation Record (CSIR). This record contains important information about the maintenance activities performed on the communication systems, such as repairs, upgrades, and inspections. It helps track the history of maintenance actions and ensures that the systems are properly maintained and functioning effectively. Retaining the maintenance record in the production work center allows easy access to this information for future reference and troubleshooting purposes.
32.
What functions do the seven layers of the Open Systems Interconnection (OSI) reference model specify?
Correct Answer
C. Network
Explanation
The seven layers of the OSI reference model specify the functions related to networking. These layers define the different aspects of network communication, such as addressing, routing, and data transmission. The Network layer specifically deals with the logical addressing and routing of data packets across different networks. It determines the best path for data to travel from the source to the destination, ensuring efficient and reliable communication between different network devices.
33.
What layers make up the two categories of the seven layer of the Open Systems Interconnection (OSI) reference model?
Correct Answer
A. Data Transport and Application
Explanation
The correct answer is Data Transport and Application. The Open Systems Interconnection (OSI) reference model consists of seven layers, which are responsible for different functions in network communication. The Data Transport layer, also known as the Transport layer, is responsible for reliable and efficient delivery of data between devices. The Application layer is responsible for providing network services to applications and enables communication between different software applications. These two layers, Data Transport and Application, are part of the seven-layer OSI model.
34.
The logical link control (LLC) sublayer is a part of which Open Systems Interconnection (OSI) model layer?
Correct Answer
B. Data link
Explanation
The logical link control (LLC) sublayer is a part of the Data link layer in the OSI model. The Data link layer is responsible for the reliable transfer of data between network nodes over a physical link. The LLC sublayer specifically handles the flow control and error checking functions, ensuring the integrity and efficient transmission of data.
35.
What does the logical link control (LLC) sublayer of the data link layer manage?
Correct Answer
B. Communications between devices over a single link of a network
Explanation
The logical link control (LLC) sublayer of the data link layer manages communications between devices over a single link of a network. This sublayer provides services to the network layer and ensures that data is properly transmitted and received between devices on the same link. It handles tasks such as flow control, error control, and framing. By managing communications over a single link, the LLC sublayer ensures reliable and efficient data transfer within the network.
36.
What does the media access control (MAC) sublayer of the data link layer manage?
Correct Answer
C. Protocol access to the pHysical network medium
Explanation
The media access control (MAC) sublayer of the data link layer manages protocol access to the physical network medium. This means that it controls how devices on a network gain access to the physical transmission medium, such as Ethernet cables or wireless frequencies. The MAC sublayer is responsible for tasks like assigning unique addresses to devices, regulating the flow of data, and handling collisions that may occur when multiple devices try to access the medium simultaneously. By managing protocol access to the physical network medium, the MAC sublayer ensures efficient and reliable communication between devices on the network.
37.
When used alone, the word "topology" often refers to a network's
Correct Answer
B. pHysical topology
Explanation
The word "topology" refers to the arrangement or structure of a network. When used alone, it commonly refers to the physical topology, which describes the physical layout of devices and cables in a network. This includes the placement of routers, switches, and other network equipment, as well as the physical connections between them. The physical topology is important for understanding how data flows through the network and how devices are interconnected.
38.
What network topology is another name for a bus topology?
Correct Answer
D. Linear
Explanation
Linear is another name for a bus topology. In a bus topology, all devices are connected to a single cable, forming a linear arrangement. This cable acts as a backbone, allowing data to be transmitted between devices. Each device on the network listens to the data passing on the bus and only accepts the data intended for it.
39.
What topology offers centralized management of a network?
Correct Answer
B. Star
Explanation
The star topology offers centralized management of a network. In a star topology, all devices are connected to a central hub or switch, which acts as a central point for communication and management. This allows for easy monitoring, control, and troubleshooting of the network, as all connections are centralized. Additionally, adding or removing devices in a star topology is simple, as it only requires connecting or disconnecting them from the central hub.
40.
What negative effect could occur when star networks are interconnected?
Correct Answer
D. When the central node point fails, large portions of the network become isolated
Explanation
When star networks are interconnected, they rely on a central node point to facilitate communication between different devices. If this central node point fails, it can result in large portions of the network becoming isolated. This means that the devices connected to those isolated portions will not be able to communicate with each other or with devices in other parts of the network. This can lead to disruptions in communication and can negatively impact the overall functionality of the interconnected star networks.
41.
Which governing body is the authority for information technology (IT) communications within the Department of Defense (DOD) and every level of IT communication from the DOD information network to the warfighter under their scope of control?
Correct Answer
A. Defense Information Systems Agency (DISA)
Explanation
The correct answer is Defense Information Systems Agency (DISA). DISA is the governing body responsible for information technology (IT) communications within the Department of Defense (DOD). They have authority over every level of IT communication, from the DOD information network to the warfighter under their scope of control. They ensure that the DOD's IT systems are secure, reliable, and interoperable, supporting the military's mission and operations.
42.
What is a Transmission Control Protocol (TCP) socket?
Correct Answer
C. Combination of a port number and Internet Protocol (IP) address used by a process o request network services and passes as an argument between layers
Explanation
A TCP socket is a combination of a port number and an Internet Protocol (IP) address. It is used by a process to request network services and is passed as an argument between layers. This means that the socket identifies a specific application or process on each machine, allowing for communication and data transfer over a TCP connection.
43.
What action is the purpose of a sliding window in Transmission Control Protocol (TCP)?
Correct Answer
D. Regulate how much information passes over a TCP connection before the receiving host must send an acknowledgement
Explanation
A sliding window in TCP is used to regulate the amount of information that can be transmitted over a TCP connection before the receiving host must send an acknowledgement. It allows the sender to control the flow of data by specifying the number of packets that can be sent before receiving an acknowledgement. This helps in preventing network congestion and ensures that transmitting devices do not overwhelm receiving devices with data.
44.
What portion of the Internet Protocol (IP) Datagram (packet) allows IP to detect datagrams with corrupted headers and discard them?
Correct Answer
B. Header checksum
Explanation
The header checksum portion of the IP Datagram allows IP to detect datagrams with corrupted headers and discard them. The checksum is a value calculated from the header fields and included in the packet. When the packet is received, the recipient recalculates the checksum and compares it with the value in the packet. If they don't match, it indicates that the header has been corrupted during transmission, and the packet is discarded to ensure data integrity.
45.
What value is the maximum of an octet in Internet Protocol version 4 (IPv4)?
Correct Answer
C. 255
Explanation
The maximum value of an octet in Internet Protocol version 4 (IPv4) is 255. An octet is a group of 8 bits, which can represent values from 0 to 255 in binary. In IPv4, each octet represents one part of the IP address, and the maximum value of 255 allows for a wide range of possible addresses.
46.
Which classes allow for a maximum of 254 hosts per network?
Correct Answer
C. Class C addresses
Explanation
Class C addresses allow for a maximum of 254 hosts per network. This is because Class C addresses have a default subnet mask of 255.255.255.0, which provides 8 bits for host addresses. With 8 bits, there are 2^8 - 2 = 254 possible host addresses, as the first and last addresses are reserved for network and broadcast addresses respectively. Class A and Class B addresses have larger address spaces and therefore allow for more hosts per network. Class D addresses are used for multicast and do not have a fixed number of hosts per network.
47.
What class is reserved for multicast addressing?
Correct Answer
D. Class D address
Explanation
Class D address is reserved for multicast addressing. Multicast addressing is a method of sending data packets to a group of devices simultaneously. Class D addresses range from 224.0.0.0 to 239.255.255.255 and are used for multicast communication in IP networks. Multicast addresses are not assigned to individual devices but instead are used by groups of devices that are interested in receiving the multicast data.
48.
What range of numbers are those of well known port numbers?
Correct Answer
A. 0-1023
Explanation
The well-known port numbers range from 0 to 1023. These port numbers are reserved for specific services or applications that are commonly used and recognized by the Internet Assigned Numbers Authority (IANA). They are typically associated with protocols like HTTP (port 80), FTP (port 21), and SSH (port 22). Ports within this range are considered privileged ports and require administrative privileges to be opened by applications.
49.
What characteristic is the major difference between Random Access Memory (RAM) and Read Only Memory (ROM)?
Correct Answer
B. ROM is non-volatile, RAM is volatile
Explanation
The major difference between Random Access Memory (RAM) and Read Only Memory (ROM) is that ROM is non-volatile, meaning that the data stored in ROM is retained even when the power is turned off. On the other hand, RAM is volatile, which means that the data stored in RAM is lost when the power is turned off.
50.
What action is the main purpose of system cache?
Correct Answer
C. Reduce central processing unit (CPU) access time to stored data
Explanation
The main purpose of system cache is to reduce the central processing unit (CPU) access time to stored data. System cache stores frequently accessed data from the main memory, allowing the CPU to quickly retrieve it when needed. By reducing the CPU's access time to stored data, system cache helps improve overall system performance and efficiency.