Which bound media has a core surrounded by cladding and a second layer...
What determines the number of alternate information assurance officers...
In which information assurance control must an organization ensure...
What is the minimum rank the AF Information Network (AFIN) connection...
Which of the following is not an example of unbound media?
The definition of integrity as it's applied to identification,...
How many bits are within an internet protocol version 4 (IPv4)...
Which class of internet protocol (IP) addresses is only used for...
A companion file virus is one that
Human error causes approximately what percentage of all accidents?
Which port range constitutes well-known ports?
Which port is used for telnet?
Which port is used for hypertext transfer protocol (HTTP)?
What is the minimum grade requirement for an information assurance...
How many times should you wipe each active surface of the media being...
How often must a degausser be recertified during its first 2 years of...
Which standard form (SF) label is used as a data descriptor label?
An installation commander can authorize keeping which classification...
Which term identifies any equipment or area in which classified...
Who is the installation's focal point for emission security (EMSEC)...
The sequence of leading bits in an internet protocol (IP) that are...
Logon and password management screens must be encrypted with at least...
In which topology does a device wanting to communicate with another...
Which common access card (CAC) certificate would be used to sign an...
The contract manager must use what agency to validate a contractor...
Users who perform troubleshooting, configuration changes, or system...
Weaknesses or holes in a security system are considered
Which of the following options is not involved when securing a UNIX...
When vulnerabilities are discovered within the Windows operating...
A logical connection point for the transmission of information packets...
Which type of transition technology is used to set up secure...
What is the newest WiFi networking standard that is widely available?
How many steps are in the risk management (RM) process?
When classified information is inadvertently sent through unclassified...
Where are thermal transfer and dye sublimation cartridges sent for...
An emission security (EMSEC) manager documents an EMSEC assessment on
Once it is filled out an AF Form 4170, Emission Security...
What type of impact occurs when the loss of confidentiality,...
Which of the following is not a phase in the information technology...
Defense-in-depth is the Department of Defense (DOD) approach for...
Which of the following is not a result of initial information...
When viewed in binary form, each octet within an Internet Protocol...
Which transmission control protocol (TCP) port is used by hypertext...
In which type of port scan does the scanner connect to the same port...
Which type of scan is also known as a half open scan?
Administrators must be in the habit of doing what to make it possible...
Which is the slowest yet least expensive WiFi standard?
A program that contains or installs a malicious program is called a
The two fundamental concepts of network security are
Continuity of operations plans (COOP) are not used in which of the...
When sanitizing sealed disks with a degausser, what percentage of the...
When destroying DVD storage devices, what is the maximum particle size...
Who has the authority to impose restrictions upon and prohibit the use...
Which of the following is a duty performed by a cyber surety...
Which wireless standard was originally intended to create a wireless...
Which device provides the initial entry point into a network?
How is an Internet protocol version 6 (IPv6) address written?
Which career field deploys, sustains, troubleshoots, and repairs...
What is the third step in the risk management (RM) process?
Which type of network typically provides wireless broadband data...
What type of equipment is used for acquisition, storage and...
What is assigned to all Department of Defense (DOD) information...
Who initiates a local files check prior to allowing volunteers access...
What does the common access card (CAC) certificate used to sign e-mail...
Which of the following represents a strong password?
Which UNIX command allows remote logins?
Which internet protocol (IP) address is used for limited broadcasts?
Which protocol is an Internet Engineering Task Force (IETF) standard...
An incident in which an Air Force computer, information system, or...
Who tracks Air Force information condition (INFOCON) status to ensure...
A facility with an inspectable space of more than 20 meters, but less...
Equipment with an equipment radiation TEMPEST zone (ERTZ) of 20 to 100...
Which protocol does the Internet support as the "language"...
Which category of information must be stored on removable media?
Networked resources must be consistently monitored and controlled to...
Which agency conducts assessments of wing information assurance (IA)...
Which standard form (SF) is used to record the opening and closing of...
Personnel removing top secret material from storage must use
How many steps are in the risk management framework process?
How many steps are in the system development life cycle?
Integrated Network Operations Security Centers (I-NOSC) use security...
Automated security incident measurement (ASIM) transcripts are...
Who is the approval authority for foreign nationals to access...
An incident in which an unauthorized person gained user-level...
Who is the connection approval authority for mission assurance...
In which phase of the Department of Defense information assurance...
When overwriting hard drives, you must examine no less than what...
Which organization is responsible for developing Air Force ports,...
Which form is used to annotate that storage media from an information...
How many years are the records of destruction of a hard drive...