19. (008) Which port range constitutes well-known ports?
7. (004) Which bound media has a core surrounded by cladding and a...
21. (008) Which port is used for hypertext transfer protocol (HTTP)?
37. (014) The definition of integrity as it's applied to...
16. (007) Which transmission control protocol (TCP) port is used by...
5. (002) Human error causes approximately what percentage of all...
18. (008) A logical connection point for the transmission of...
30. (011) What is the newest WiFi networking standard that is widely...
51. (019) A program that contains or installs a malicious program is...
13. (006) Which internet protocol (IP) address is used for limited...
83. (030) In which information assurance control must an organization...
55. (020) When classified information is inadvertently sent through...
41. (014) The contract manager must use what agency to validate a...
58. (023) What determines the number of alternate information...
46. (018) Weaknesses or holes in a security system are considered
47. (018) Which of the following options is not involved when securing...
44. (017) Users who perform troubleshooting, configuration changes, or...
86. (031) What is the minimum rank the AF Information Network (AFIN)...
2. (001) Which career field deploys, sustains, troubleshoots, and...
8. (004) Which of the following is not an example of unbound media?
9. (005) In which topology does a device wanting to communicate with...
20. (008) Which port is used for telnet?
12. (006) Which class of internet protocol (IP) addresses is only used...
26. (009) Which type of transition technology is used to set up secure...
50. (019) A companion file virus is one that
17. (007) Which protocol is an Internet Engineering Task Force (IETF)...
Which one do you like?
Which one do you like?
Which one do you like?
40. (014) What does the common access card (CAC) certificate used to...
65. (025) How often must a degausser be recertified during its first 2...
15. (007) Which protocol does the Internet support as the "language"...
73. (027) An installation commander can authorize keeping which...
10. (006) When viewed in binary form, each octet within an Internet...
45. (017) Which device provides the initial entry point into a...
71. (027) Which standard form (SF) is used to record the opening and...
32. (012) Defense-in-depth is the Department of Defense (DOD) approach...
80. (029) Once it is filled out an AF Form 4170, Emission Security...
52. (019) The two fundamental concepts of network security are
6. (003) Which type of network typically provides wireless broadband...
90. (033) Which of the following is not a phase in the information...
28. (010) Administrators must be in the habit of doing what to make it...
59. (024) What is the minimum grade requirement for an information...
48. (018) Which UNIX command allows remote logins?
74. (028) Which term identifies any equipment or area in which...
Match the following
31. (011) Which wireless standard was originally intended to create a...
29. (011) Which is the slowest yet least expensive WiFi standard?
42. (015) Which of the following represents a strong password?
43. (016) Which category of information must be stored on removable...
64. (025) How many times should you wipe each active surface of the...
1. (001) Which of the following is a duty performed by a cyber surety...
22. (008) In which type of port scan does the scanner connect to the...
34. (013) Which of the following is not a result of initial...
38. (014) Logon and password management screens must be encrypted with...
39. (014) Which common access card (CAC) certificate would be used to...
49. (018) When vulnerabilities are discovered within the Windows...
72. (027) Personnel removing top secret material from storage must use
79. (029) An emission security (EMSEC) manager documents an EMSEC...
Which one do you like?
23. (008) Which type of scan is also known as a half open scan?
63. (025) Where are thermal transfer and dye sublimation cartridges...
14. (006) The sequence of leading bits in an internet protocol...
36. (013) Who initiates a local files check prior to allowing...
70. (027) Who has the authority to impose restrictions upon and...
25. (009) How is an Internet protocol version 6 (IPv6) address...
78. (029) Who is the installation's focal point for emission security...
54. (020) An incident in which an Air Force computer, information...
66. (026) When destroying DVD storage devices, what is the maximum...
82. (030) What type of impact occurs when the loss of confidentiality,...
3. (002) How many steps are in the risk management (RM) process?
11. (006) How many bits are within an internet protocol version 4...
33. (012) What is assigned to all Department of Defense (DOD)...
62. (025) When sanitizing sealed disks with a degausser, what...
75. (028) A facility with an inspectable space of more than 20 meters,...
88. (032) Integrated Network Operations Security Centers (I-NOSC) use...
27. (010) Networked resources must be consistently monitored and...
67. (026) How many years are the records of destruction of a hard...
57. (022) Continuity of operations plans (COOP) are not used in which...
61. (025) Which form is used to annotate that storage media from an...
4. (002) What is the third step in the risk management (RM)...
56. (021) Who tracks Air Force information condition (INFOCON) status...
76. (028) Equipment with an equipment radiation TEMPEST zone (ERTZ) of...
81. (030) How many steps are in the risk management framework process?
77. (029) What type of equipment is used for acquisition, storage and...
85. (031) In which phase of the Department of Defense information...
69. (027) Which standard form (SF) label is used as a data descriptor...
53. (020) An incident in which an unauthorized person gained...
68. (026) When overwriting hard drives, you must examine no less than...
35. (013) Who is the approval authority for foreign nationals to...
60. (024) Which agency conducts assessments of wing information...
84. (030) How many steps are in the system development life cycle?
89. (032) Automated security incident measurement (ASIM) transcripts...
87. (031) Who is the connection approval authority for mission...
24. (008) Which organization is responsible for developing Air Force...