(009) Knowledge-based identification and authentication methods...
(010) What is the preferred method of sanitizing magnetic media?
(009) What are three primary ways to authenticate one-self?
(207) Which program can be used to automatically launch programs on a...
(212) Which type of interface is friendlier for the average user to...
(012) A base web-server that interfaces with the public must be placed...
(212) Sitting at a computer and loading a software patch onto it is an...
(016) What is the primary unclassified public key infrastructure (PKI)...
(001) What type of network is made up of components from the same...
(005) What network management area is concerned with controlling...
(215) What type of service allows network administrators to install...
(001) What type of network environments consist of computer systems...
(201) What is a form of firmware that contains the computer's startup...
(202) What is defined as an asynchronous signal from a computer...
(202) Which controller component interprets an electronic signal,...
(010) What is the process of erasing magnetic media by reducing the...
(011) What documentation is required to permanently connect to the...
(011) What documentation signifies that a system is not allowed to...
(001) What is the minimum number of computers needed for a computer...
(226) How many primary groups can a user be a member of?
(001) How many users are normally in a peer-to-peer network?
(002) What is used to identify network nodes on a physically connected...
(003) What series of Air Force instruction series covers...
(201) What is considered as nonvolatile permanent memory?
(207) Which error-checking tool allows you to monitor the file system...
(208) Which numbering system characteristic is the leftmost non-zero...
(011) What is a collection of computing environments connected by one...
(014) Which component of the public key infrastructure (PKI) is...
(220) Which type of lists uses pointers to connect each element...
(224) Which UNIX command deletes files from within a directory?
(001) What is a privately-owned network whose access is restricted to...
(001) What type of communications network links different...
(002) How many octets is the standard internet protocol broken down...
(204) The hard drives in a redundant array of independent disks (RAID)...
(206) Which selection is a set of markup symbols or codes inserted in...
(010) What is the process of physically damaging the media to render...
(212) Which type of patch would utilize a remote installation services...
(012) What network device performs rigorous examinations of systems to...
(012) An information system on your network that is not set to require...
(013) What is a cryptographic key and certificate delivery system that...
(217) What component of windows unifies and simplifies day to day...
(018) Sustained communications support becomes a part of the...
(223) UNIX™ disks are divided into logical sections called
(003) According to the Air Force network structure, what tier is the...
(202) What is considered as a technique or method of checking data...
(007) What color on the systems management automated report tracking...
(012) What is the intrusion practice of encapsulating a message that...
(214) According to Air Force dynamic host configuration protocol...
(015) Which public key algorithm is exclusively a key establishment...
(218) When a new folder or file is created on a new technology file...
(220) Which is the most commonly used sequential query language (SQL)...
(220) Which sequential query language (SQL) server feature tracks...
(221) Which UNIX operating system component interacts directly with...
(229) Which UNIX command from the menu bar moves a window to the...
(003) What network entity provides reliable, secure networks and...
(006) What operational simple network management protocol (SNMP)...
(010) Who can declassify storage media that has been sanitized?
(210) Which type of backup will backup all files that have been...
(012) What are examples of network attacks that bypass the firewall?
(012) What do you call a current and perceived capability, intention,...
(012) What type of malicious logic can form large networks that can be...
(218) What permission always overrides all other permissions assigned...
(018) What program is known as a state of the art ground-to-ground...
(227) Which UNIX vi character represents the end of the file?
(228) What is the most common UNIX windows system?
(001) How many users are in a multi-server high-speed backbone...
(005) Which function of performance management tracks historical data...
(201) Which original components were very susceptible to damage from...
(007) What component of the systems management automated report...
(009) The Air Force requires a network password to be at least how...
(010) Which standard form is used to annotate storage media has been...
(212) Which of the following is not one of the elements that most...
(214) The group of IP addresses that a dynamic host configuration...
(217) Which type of group manages user's rights assignments and access...
(017) Which team provides a communication link between forces securing...
(220) What is the most common type of operation in sequential query...
(221) Which UNIX shell is the most compact and is often used for...
(221) Normally, when you create a file with a text editor, the file is...
(221) The simplest place to put your function definitions is in your
(229) What action puts unneeded windows out of the way without...
(001) What is a communications network that serves users within a...
(003) What Air Force instruction provides policy, direction, and...
(201) What is considered to be a computer's main storage?
(006) What operational simple network management protocol (SNMP)...
(007) What is the type of probe that collects inter-device...
(202) Which is a term used to describe that data is whole or complete?
(204) Which storage device has the means of providing data storage...
(010) Storage media that retains data after power is removed is...
(210) Which type of backup would you use at the end of the week to...
(012) A program that replicates by attaching itself to a program is a...
(014) What is an electronic document that officially links together a...
(018) Who provides uninterrupted flow of mission critical information...
(223) The /dev/dsk and /dev/rdsk directories are subdirectories of...
(225) Which UNIX command changes the ownership of one or more files to...
(228) Which UNIX default command starts the X windows system?
(001) What type of communications network links geographically...
(002) What is the binary equivalent to the dotted decimal number 96?
(002) How many bits are typically covered in an internet protocol...
(004) What network architecture has a network management platform on...
(006) What operational simple network management protocol (SNMP)...
(009) What is a measure used to verify the eligibility of a subject...
(206) Which Web application is most likely to succeed Hypertext Markup...
(209) What should each organization have that spells out which systems...
(011) How many non-secure internet protocol router network (NIPRNet)...
(211) What is a group of users, servers, and other resources that...
(012) Which agency must approve all information protection tools prior...
(012) What device is placed outside the boundary protection mechanism...
(214) What is the minimum number of scopes a dynamic host...
(221) Which UNIX capability can execute numerous programs at the same...
(224) Which UNIX command takes any characters from standard input and...
(229) The key to shutting down an xterm window is to know which of...
(001) How many users are in a multi-server network?
(002) What is the network id of internet protocol (IP) address...
(006) Network management protocols are designed (in most cases) to...
(006) What simple network management protocol (SNMP) node is...
(203) What is the connection type of choice for storage area networks...
(205) Which is not a characteristic of high-order languages?
(206) Which protocol is commonly used for managing the security of a...
(211) What is a set of rules that can be set to affect active...
(213) Which components of domain name service (DNS) contain a database...
(221) Which UNIX component provides a logical way to organize, store,...
(223) What is the basic unit for storing and manipulating a collection...
(224) Which UNIX command allows you to move to different directories...
(006) What area of the simple network management protocol (SNMP) tree...
(007) What are the three types of systems management automated report...
(202) Which is a very simple example of an error detecting code?
(204) Which technology is often used in redundant array of independent...
(206) A standard Web application used to pass a Web user's request to...
(012) What is the simplest and least expensive way to stop...
(012) What type of firewall consists of a screening router and a set...
(014) What can be used to encrypt a message so that it can only be...
(219) Which exchange service is the first service launched when...
(012) What action represents one of the greatest vulnerabilities to...
(222) What do you type to quit a UNIX shell?
(225) Which UNIX command looks at an individual file and finds a...
(227) Which UNIX vi mode allows users to execute set commands?
(230) Which UNIX command does the system administrator need to use to...
(004) Which of the following are the three most common network...
(012) What type of malicious logic can become active on an information...
(015) The two ways key establishment can occur are key __________
(223) What does the 7 in the device name c0t6d0s7 represent?
(225) Which UNIX command sets access and modification times for each...
(001) What type of communications network links a broad geographical...
(001) How many users are in a single-server network?
(005) What is established to distinguish between errors that fall...
(203) What is an advantage of using a storage area network (SAN)...
(011) What do you call the consolidated list of requirements that a...
(014) What is a file that is kept with you and will allow you to...
(218) What defines the rules by which operations can be performed on a...
(223) Hard links are created using which UNIX command?
(224) Which UNIX command displays the current working directory?
(002) What is the host id of internet protocol (IP) address...
(202) Which interrupt request (IRQ) line number is normally used for...
(203) Which storage device can be easily connected to a network and...
(205) What best describes programming machine code?
(011) What is the database of record for registering all systems and...
(220) What type of sequential query language (SQL) statement would you...
(221) Which UNIX ability can run on different types of hardware with...
(223) What does the 0 following the c in the device name c0t6d0s7...
(223) Which UNIX mechanism enables programs to communicate with one...
(228) The act of choosing the window you type is called setting the
(006) What operational simple network management protocol (SNMP)...
(008) How many different categories of information does the...
(010) What regulation covers remanence security?
(012) What type of firewall is used to separate secure sites,...
(229) The first step in quitting an xterm session is to
(005) Performance management can be broke into what two separate...
(008) What provides information concerning the network utilization and...
(008) What reports errors that occur at the physical layer such as bad...
(008) What provides information concerning the bandwidth utilization...
(211) What is based around a central directory database containing...
(214) Which software program manages an IP address allocation for a...
(227) While using UNIX vi to edit a file, what would you enter to save...
(213) Which query is made by one name server to another name server?
(011) What is the Department of Defense process for certifying and...
(219) In Exchange System Manager, which container holds configuration...
(223) Which UNIX mechanism provides for communication with system...
(006) What is a hierarchical structured format that defines the...
(216) Which is not a component of Internet information services (IIS)?
(221) To change permissions on a shell script, you use the UNIX...
(223) How many characters do most UNIX system administrators and users...
(225) Which UNIX command changes the group ownership of one or more...
(004) What is defined as a bundle of application software designed to...
(004) What network architecture uses multiple systems for network...
(008) What automatically runs in the background when the protocol...
(211) What kind of server contains the master listing of all active...
(012) What type of firewall generates audit trails of all...
(218) A feature of networking that enables individuals to designate...
(004) What level of network management activity are you working at...
(007) What is the centerpiece of a systems management automated report...
(011) What is a formal declaration by a designated approving official...
(004) What level of network management activity are you working at...
(217) Which special identity can represent users currently logged on...
(220) A set of data elements (values) organized using a model of...
(211) Where does a copy of the active directory database reside?
(203) What is a way of utilizing a group of storage devices as if they...
(011) What process, along with AFI 33–210, Air Force...
(008) What device provides a capability for digital network...
(011) What is a comprehensive evaluation and validation of an Air...
(228) In UNIX, which package of programs lets a terminal handle many...