203. Within the office space what is the most common hazard?
216. What is the Internet?
216. What network provides a private tunnel through the...
225. What is the program called that you interact with directly from...
226. What program is free to download from Adobe's website that...
228. (True/False) Human threats are likely to be both intentional and...
228. (Ture/False) Malicious software is capable of destroying disk...
203. What three items are needed to complete the fire triangle?
203. What does PASS acronym stand for?
215. What is not a main component of a computer and can be either...
216. What is a group of computers and devices that share a common...
224. (True/False) Fiber optic cable is immune to EMI.
201. What is the name of the Air Forces safety program?
203. What determines the severity of electric shock?
203. What is the primary hazard associated with ladders?
208. What is another name for a bus topology?
208. Which topology has cable segments connected to a centralized...
208. What are the three tree topology layers?
215. What type of internal component most high-volume printers use to...
226. What type of programs are applications?
232. What provides additional communications capacity by using manned...
202. What are the three sub-categories of human factors?
203. List the classes of fires.
206. What was the name of the system that was employed before the...
228. What is one of the newest COMPUSEC threats?
238. Where is the CONUS geographically divided?
201. What agency dictates what must be accomplished in the workplace,...
208. If the topology cannot be seen or touched what type is it?
210. What is used to regulate how much information is transmitted over...
214. What interface was the evolution of the parallel ATA...
216. At what speed does the 802.11n standard operate?
217. What Ethernet standard has supplanted fast Ethernet in wired...
228. What computer attack does not try to gain access to the system...
206. What three parts make up the Communications and Information...
207. What layer generally only implements in software?
212. What is the default port assignment for HTTP?
221. Name two methods for directing data on the network.
224. What is the most common wireless networking standard?
226. Which application allows the creation of queries, forms,...
231. What service is used when physically transporting Top Secret...
233. What service provides a framework for protocols used by the...
233. What establishes a virtual point-to-point connection using...
201. Who is responsible for the safety of their facilities and...
206. Documents generated in CIPS are historical documentation, how...
207. Which specification allows for unique identification at the data...
210. What are the two classifications of transport protocols?
211. What are the two methods of subnet masking?
216. What is the name for networks that use the same software and...
234. What provides a transmission path capable of secure...
202. Who is responsible to mitigate human factors?
206. What is the approved automated information system for planning,...
206. What records depict physical layout of communications and...
207. Which layer of the OSI model is closest to the end user and...
208. What are the two most common physical topologies?
211. What are the three types of unicast address?
212. What is the default port used with credit card transactions...
213. Name the special type of memory used to store the BIOS...
230. At what level is the classified information in a container...
230. What form is used to maintain a record for containers,...
241. What is SACCS designed to support?
201. What AF series publications make up AFOSH standards?
203. What AFI provides detailed guidance of office safety?
208. What IEEE standard applies to bus networks?
212. What allows servers the capability to provide multiple...
223. What are the two methods that encryption can be...
236. Which system provides the AF portal?
201. What AFI implements the installation safety offices Mishap...
202. How many US workers were killed on the job in 2014?
208. What is the branch of mathematics that examines the...
211. What are the two main parts of an IPv4 address?
211. Who assigns network numbers?
211. What is the reserved IPv4 address for a limited broadcast?
216. Primary addressing in WLANs is achieved by using what type...
231. What service is used when the Top Secret material is...
213. What speed enhancement is a small amount of memory placed...
225. What is the firmware prompt called on Sun machines?
230. When would it be appropriate to store money and/or weapons...
234. What are the current data rates of Secret IP Data...
207. Who subdivided the Data Link Layer into two sub-layers, what are...
208. What topology imitates an extended star topology and inherits...
209. What ensures effective, secure and efficient delivery of DOD IT...
211. What is the de facto standard protocol of the Internet and...
211. Which IEEE standard defines Data Link layer protocols that...
216. WLAN implements what algorithm to prevent data...
225. When are partitions established?
228. Weaknesses or deficiencies in maintaining the environmental...
232. What DODIN service includes the Defense Red Switched...
240. What component of the GIG supports the President, SECDEF,...
207. What two unique categories make up the seven layers of the OSI...
211. Which field is a 32-bit number identifying the next data...
214. What is the primary internal interconnecting for desktop and...
222. What protocols govern how networks share information beyond...
227. COMSEC is part of what overall program?
228. Which COMPUSEC vulnerability defines deficiencies in the...
230. When a container that is taken out of service or is no longer...
231. Prior to using electronic media and when technically...
235. Which system is a classified system designed to provide...
237. What is the AF's primary ISR CPAD system?
210. In connection-oriented systems, what must happen prior to the...
210. What method does TCP use to prevent network congestion by...
211. In the context of TCP/IP, what is a packet also known...
216. What type of network interconnects several local area...
224. What medium is the primary carrier for voice...
228. What is one of the most common COMPUSEC threats?
205. Is a Payroll system a part of the NSS?
209. What are two standards used throughout the DOD to govern IT?
211. What are the four most important Network layer TCP/IP...
211. What is the IPv6 loop back address?
218. What are the primary entry points for DSCS satellites?
219. What are the two types of modems used?
221. Which layer of the OSI model do routers operate?
228. Which type of COMPUSEC threat is a severe storm?
203. What AFI identifies activities where the wear of finger rings is...
205. The DODAF specification contain how many volumes?
217. What data transport method grew out of the need for a...
221. Routers compare metrics to determine optimal routes; these...
225. What year did the Bell Labs develop the UNIX operating...
225. In which directory are application programs contained?
239. What size is the GBS antenna?
207. What are two key types of application-layer implementations?
213. How much data can be currently stored on a DVD-ROM at the...
216. What is the name for a network connected between two...
217. What T-carrier service can a subscriber request when the...
220. What is used to decrease network congestion, but also...
234. What is the DOD's largest interoperable C2 data...
238. How many sectors is the CONUS divided into?
201. What office/individual manages the occupational and environmental...
205. What architecture framework is designated as the framework for...
220. What provides collision-free, high-speed communication between...
206. What are legacy records that provide a history and audit trail...
211. What is the reserved IPv4 address for loop back?
214. Which connection enables data transfer speeds of 480 Mbps...
228. What type of COMPUSEC threat is increased by poor housekeeping...
230. What supplemental controls are required for Confidential...
231. (True/False) Classified COMSEC materials may be shipped...
208. Which topology is the most common physical topology in Ethernet...
211. How many fields make up a TCP segment?
218. STEP offers standardized support for whom?
221. What are routing protocols that manage traffic within an...
201. What office/individual is responsible for managing proactive on...
203. Who is responsible for developing and maintaining a training and...
232. What is the primary interface between the sustaining base...
207. In what year was the OSI model published and by whom?
212. What is the number range of registered ports?
218. DOD Teleport system implementation has how many...
229. What are the three types of classification?
201. What office/individual is responsible for developing JSTO's?
224. Which cable type is associated with the original designs of...
228. How many additional security requirements for safeguarding...
234. What data rates are the SBU IP services capable of?
201. Who is required to complete the AF Risk Management Fundamentals...
208. What do we call a device that sits at the intersection of two or...
223. What is the most common telephone device used for voice...
235. Which system provides operation commanders with an...
203. Who is responsible to ensure that all employees have access to a...
227. What Air Force program meets public law, national, and DOD...
216. Most VPN traffic in the Air Force is done in what type of...
219. What layer of the OSI reference model do converters...
207. Which layer of the OSI model provides logical addressing as...
230. Which part of the SF 700, when completed, is classified at...
204. How many principles govern all actions associated with the...
210. What layer defines end-to-end connectivity between host and...
211. In which field is the actual data that is transmitting...
229. What three core disciplines encompass information...
207. Which layer establishes virtual circuits?
239. What is the maximum data rate for the GBS?