(001) Which 3D Air Force Specialty (AFS) responsibilities include the...
(006) Which Quality Assurance (QA) essential element collects,...
(009) What United States Code (USC) title authorizes the creation of...
(015) What reason is the main purpose for consolidating Network...
(021) Which document is NOT considered an official government record?
(021) Records that are considered to be in draft format
(201) What action is the purpose of the Mishap Prevention Program?
(201) The Occupational Safety and Health Administration (OSHA) is a...
(203) What hazard is the greatest in the typical office?
(208) What network topology is another name for a bus topology?
(208) What negative effect could occur when star networks are...
(215) Which device optically reads an image, printed text, or an...
(216) Which network provides a private tunnel through the Internet?
(224) What characteristic is not an advantage of fiber optic cable?
(228) Which computer software is designed to collect personal...
(236) What major program does the Global Combat Support System-Air...
(001) Which 3D Air Force Specialty (AFS) responsibilities include the...
(003) Who is the advisor for all matters affecting the career field?
(007) What inspection integrates elements of compliance and readiness...
(009) The Uniform Code of Military Justice (UCMJ) is derived from what...
(010) When Air National Guard personnel in Title 32 status train for...
(012) What major command and numbered Air Force (NAF) were realigned...
(012) Since Military Information Support Operations (MISO) and Public...
(014) What unit installs, reconstitute, and test critical C4 systems...
(017) What basic building block is used in joint force planning and...
(019) What tests your understanding of the original message and your...
(023) Who is the second-highest ranking official in the Department of...
(025) What system manages the distribution and printing of paper...
(202) What method is considered the least preferred when controlling...
(203) How are fires classified?
(203) What action should you take first when you encounter a fire?
(203) Which ladder practice is not prohibited?
(205) Which office annually evaluates agency efforts to improve the...
(206) What three parts make up Communications and Information Systems...
(208) What topology offers centralized management of a network?
(210) What action is the purpose of a sliding window in Transmission...
(211) What portion of the Internet Protocol (IP) Datagram (packet)...
(216) Which network is a group of computers and associated devices...
(216) Which wireless local area network (WLAN) security method is best...
(219) Which device works as a transceiver that converts the electrical...
(225) What UNIX system software interacts most closely with the...
(230) Which event is not a valid reason to change the combination on a...
(233) Which network supports unclassified e-mail service to the user?
(004) Occupational surveys are used to develop the specialty knowledge...
(005) What program provides training for personnel to attain knowledge...
(008) What automated information system manages the entire lifecycle...
(011) What cyberspace weapon system identifies vulnerabilities and...
(012) What two cyber operation defenses involve continuous monitoring...
(023) What joint publication (JP) is the keystone document for the...
(025) Which of the following does NOT describe information outlined in...
(026) Who develops standards for interconnect, passive and...
(201) What action must supervisors take before a work task not...
(203) Fuels that are normally classified as A or B will change to what...
(203) What step is the fourth in the firefighting procedure?
(204) Which action is not a part of risk management (RM)?
(209) Which governing body is the authority for information technology...
(212) What range of numbers are those of well know port numbers?
(213) What action is the main purpose of system cache?
(216) Which network is a network that links local area networks (LAN)...
(242) What system of the Global High Frequency (HF) Network provides...
(006) Which evaluation is NOT an assessment type in a Quality...
(010) Members of a household or relatives with whom you have a close...
(013) Which agency is responsible for matters pertaining to the...
(016) What two levels are joint task forces (JTF) divided into?
(016) The commander, Air Force forces (COMAFFOR) commands an Air...
(023) What Department of Defense Directive (DODD) establishes that all...
(024) What Air Force publications are informational and suggest...
(203) Under normal conditions, how many milliamps of current could...
(205) What requirements mandate to develop of Air Force architectures?
(207) The logical link control (LLC) sublayer is a part of which Open...
(216) Which network uses Carrier Sense Multiple Access/Collision...
(223) Which type of encryption provides the greatest degree of...
(226) What Microsoft application is a software program that allows...
(228) Which computer system vulnerability is not one in a computer...
(002) Which enlisted training element is assigned by the supervisor in...
(003) Who serves as the major command (MAJCOM) voting representative...
(006) Which one of these is NOT an essential element in a Quality...
(010) An employee or employer relationship that leads to the...
(018) What Information Technology Infrastructure Library (ITIL) stage...
(019) Failure to observe the prohibitions and mandatory provisions of...
(024) What type of non-directive Air Force (AF) publication is not...
(201) Whose responsibility is to advise commanders, function managers,...
(202) Which action is a physiological factor?
(203) According to the Centers for Disease Control and Prevention...
(206) Which part of the Communications and Information Systems...
(207) What functions do the seven layers of the Open Systems...
(208) When used alone, the word "topology" often refers to a network's
(211) What value is the maximum of an octet in Internet Protocol...
(214) What speed is the maximum data transfer rate of USB 3.0...
(217) What year did the Institute of Electrical and Electronics...
(222) What network device provides a remote network with connectivity...
(226) What Microsoft application is a personal information manager?
(228) Which incidents occur when a higher classification level of data...
(234) Which network provides Department of Defense (DOD) customers...
(003) What title is normally assigned to the on-station ranking 3D...
(004) What action is the main goal of the utilization and training...
(019) How many rules are there for effective communication via e-mail?
(023) What type of Department of Defense Directive (DODD) establishes...
(024) What directive publications expire one year after their...
(025) What personnel oversees technical order requirements and...
(025) Which type of technical order (TO) has a numerical designator...
(202) Who recommends controls to mitigate health risks associated with...
(227) What information system (IS) threat is the greatest threat to an...
(230) How would you determine if an intrusion detection system is...
(231) Who has the authority a grant permission to ship classified...
(232) Which of the following services provides additional...
(003) Who is the final authority to waive career field education...
(010) What document spells out the comprehensive strategy for the...
(015) What year did the Air Force institute a single instance of...
(018) Which stage is NOT one of the Information Technology...
(023) What entity assigns numbers to Department of Defense (DOD)...
(202) What three sub-categories make up human factors?
(202) How many impact classifications do hardhats have?
(206) Which part of the Communications and Information Systems...
(215) What is a peripheral device?
(234) Which network provides high-quality, secure telecommunications...
(013) What document directs the development of the National Military...
(021) Which Air Force Instruction (AFI) defines an "official...
(202) Which helmet class does not provide protection against contact...
(210) What is a Transmission Control Protocol (TCP) socket?
(211) Which classes allow for a maximum of 254 hosts per network?
(211) What class is reserved for multicast addressing?
(235) Which system of the Global Command and Control System-Air Force...
(010) Which policy has prevention of cyber attacks against America's...
(011) What cyberspace weapon system is the top-level boundary and...
(015) Which unit within the Air Force Network Operations (AFNetOps)...
(019) The vision of Enterprise Information Management (EIM) is to...
(025) Who may post an update to a technical order assuming they are...
(213) What characteristic is the major difference between Random...
(230) Which Air Force (AF) form records the destruction of Top Secret...
(020) How many workflow capabilities are available to you on a...
(022) Who has the authority to appoint record custodians within an...
(024) What directive publication prescribes the mission, area of...
(201) Which publication implements the Mishap Prevention Program?
(203) What chapter in Air Force Instruction (AFI) 91–203, Air...
(204) The risk management process includes how many steps?
(218) How many T1 Defense Switched Network (DSN) access circuits do...
(010) What policy outlines the United States (US) Armed Forces'...
(203) What classification do flammable liquids receive?
(221) What network routing protocols allow multiple autonomous systems...
(229) Which classified document markings identifies the highest level...
(015) What regional computing and data center provide enterprise...
(231) Who should you seek out if you need information on transporting...
(242) What system mission is to provide reliable, rapid, two-way...
(024) What directive publications provide essential procedural...
(207) What layers make up the two categories of the seven layer of the...
(238) Which system is a radar Tracker/Correlator software program...
(220) Describe a network bridge.
(207) What does the logical link control (LLC) sublayer of the data...
(207) What does the media access control (MAC) sublayer of the data...
(232) What system includes all owned and leased communications and...
(240) What system is the priority component of the Department of...
(004) Who is responsible for scheduling the Specialty Training...
(225) In general, how many operating system task categories are there?
(238) How many air defenses sectors is the Battle Control System-Fixed...
(239) Which system is a space-based high data rate communications link...
(017) What methodology is used by Air Force for presenting forces to...
(201) What Air Force (AF) form is used to report ground mishaps?
(228) Computer security (COMPUSEC) vulnerabilities are broken down...
(024) What publications are orders issued by the Secretary of the Air...
(201) What Air Force (AF) form is used to report a hazard?
(229) Which classified document marking appears on the face of each...
(023) How many different types of Department of Defense Instructions...
(011) Proactive defense is one of the four integrated sub-disciplines...
(022) Whose duties include providing assistance, managing staging...
(235) Which system is the Department of Defense's (DOD) command and...
(011) What cyberspace weapon system includes the Integrate Network...
(022) Who is appointed at each base-level unit principal staff office...
(241) Which system is the primary network used to transmit the...
(241) What system provides a secure communications path for command...
(003) Who assists with the identification of qualified subject matter...
(022) Who is charged with the duties of establishing training programs...
(011) What cyberspace weapon system resulted from an operational...
(233) What system is a telecommunications network that provides the...
(205) How many volumes make up the Department of Defense Architecture...
(011) What cyberspace weapon system ensures unfettered access, mission...
(237) Which system is the Air Forces' primary intelligence,...