Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
1. Which document would you reference to see your specific AFSC responsibilities?
3. Within the cyberspace support families, what career field is responsible for maintenance and
operation of cyberspace systems?
1. What is the core AFSC document used to document training for enlisted personnel?
3. What part of the CFETP includes general information about how to use it?
1. With whom does the Air Force career field manager directly communicate to disseminate policies and
program requirements?
2. Whose duty is it to assist in gathering input and data to complete enlisted grade allocation for career
progression group reviews?
1. What type of workshop brings MFMs and SMEs together to determine the most effective and efficient
way to ensure training standards and skill-level requirements of a career field are accurate?
1. What program provides training for personnel to attain knowledge and skill qualifications required to
perform duty in their specialty?
1. What program reports compliance with requirements listed in self-assessment checklists to the chain
of command and appropriate staffs?
2. Who, in conjunction with the commander appointed self-assessment program manager, will oversee
the unit’s self-inspection/assessment program?
3. What automated information system manages the entire lifecycle of IT assets from procurement
through retirement?
Answers
001.
1. Specific AFSC responsibilities are located in the 3DXXX CFETP Section B, Career Field Progression and
Information.
2. The cyberspace support family of career fields consists of two sub-groups: Cyberspace Operations
(3D0XX) and Cyberspace Systems (3D1XX).
3. Cyberspace Systems
002.
1. The CFETP is the core AFSC training document used for training enlisted personnel.
4. 5.
003.
1. He/she communicates directly with MFMs, AETC training managers to disseminate all Air Force and
career field policies and program requirements.
2. MFM.
004.
1. A U&TW brings MFMs and subject matter experts together from across the Air Force in an effort to
determine the most effective and efficient way to ensure training standards and skill level requirements
of a career field are accurate.
2. For the AFCFM and functional leaders to determine and present training requirements to the AETC
TPM.
005.
006.
2. To collect, compile, analyze, and record data on the processes sampled by QA personnel.
007.
2. QA personnel.
008.
1. AIS are combinations of computer hardware and computer software, data, and/or
telecommunications equipment that performs functions such as collecting, processing, storing,
transmitting, and displaying information.
2. The IMDS is the standard Air Force system for maintenance information.
3. Remedy.
Unit review
1. (001) Which 3D Air Force Specialty (AFS) responsibilities include the deployment, sustainment,
troubleshooting, and repairing of standard radio frequency (RF) line-of-sight, wideband and ground
based satellite devices? a. Spectrum Operations. b. Ground Radar Systems. c. Cable and Antenna
Systems. d. Radio Frequency Transmission.
2. (001) Which 3D Air Force Specialty (AFS) responsibilities include the installation and maintenance for
large-scale network wiring in support of fixed and deployed operations? a. Spectrum Operations. b.
Ground Radar Systems. c. Cable and Antenna Systems. d. Radio Frequency Transmission.
3. (002) Which enlisted training element is assigned by the supervisor in accordance with (IAW) AFI
36−2201, Air Force Training Program? a. Core task. b. Duty competency. c. Core competency. d. Duty
position task.
4. (003) Who is the advisor for all matters affecting the career field? a. Unit training manager (UTM). b.
Base functional manager (BFM). c. Major command functional manager (MFM). d. Air Force career field
manager (AFCFM).
5. (003) Who is the final authority to waive career field education training plan (CFETP) requirements to
include the completion of the Air Force Specialty (AFS) career development course (CDC)? a. Unit
training manager (UTM). b. Base functional manager (BFM). c. Major command functional manager
(MFM). d. Air Force career field manager (AFCFM).
6. (003) Who serves as the major command (MAJCOM) voting representative during career field
Utilization and Training Workshops (U&TW)? a. Unit training manager (UTM). b. Base functional
manager (BFM). c. Major command functional manager (MFM). d. Air Force career field manager
(AFCFM).
1–20
7. (003) Who assists with the identification of qualified subject matter experts (SME) to help with the
development of your specialty knowledge test (SKT) and your career development course (CDC)? a. Unit
training manager (UTM). b. Base functional manager (BFM). c. Major command functional manager
(MFM). d. Air Force career field manager (AFCFM).
8. (003) What title is normally assigned to the on-station ranking 3D cyberspace non-commissioned
officer (NCO)? a. Unit training manager (UTM). b. Base functional manager (BFM). c. Major command
functional manager (MFM). d. Air Force career field manager (AFCFM).
9. (004) Occupational surveys are used to develop the specialty knowledge test (SKT), what tasking is
another use for occupational surveys? a. Modify local training. b. Allocate manpower. c. Develop a
Career Development Course (CDC). d. Assist the unit training manager in course development.
10. (004) What action is the main goal of the utilization and training workshop (U&TW)? a. Conduct
climate training surveys. b. Develop Career Development Courses. c. Review the occupational analysis
report. d. Establish a viable Career Field Education and Training Plan (CFETP).
11. (004) Who is responsible for scheduling the Specialty Training Requirements Team (STRT)? a. Major
Command Functional Manager (MFM) in conjunction with the Training Pipeline Manager (TPM). b. Air
Force Career Field Manager (AFCFM) in conjunction with the SME. c. MFM in conjunction with the
subject matter expert (SME). d. AFCFM in conjunction with the TPM.
12. (005) What program provides training for personnel to attain knowledge and skill qualifications
required to perform duty in their specialty? a. Career Field Education and Training Plan (CFETP). b.
Weighted Airman Promotion System (WAPS). c. On-the-Job Training (OJT) program. d. Occupational
Analysis Program.
13. (006) Which one of these is NOT an essential element in a Quality Assurance (QA) program? a.
Quality Assessments. b. Quality Assurance. c. Quality System. d. Trend Analysis.
14. (006) Which evaluation is NOT an assessment type in a Quality Assurance (QA) program? a. Technical
Evaluation. b. Personnel Evaluation. c. Managerial Evaluation. d. Standard Evaluation.
1–21
15. (006) Which Quality Assurance (QA) essential element collects, compiles, analyzes, and records data
on the processes sampled by QA personnel? a. Trend analysis. b. Quality System. c. Quality Assessments.
d. Managerial Assessments.
16. (007) What inspection integrates elements of compliance and readiness with new inspection
elements to create a new Inspector General (IG) inspection of unit effectiveness? a. Management
Inspection (MI). b. Unit Effectiveness Inspection (UEI). c. Consolidated Unit Inspection (CUI). d.
Commander’s Inspection Program (CCIP).
17. (008) What automated information system manages the entire lifecycle of information technology
(IT) assets from procurement through retirement? a. Remedy. b. Training Business Area. c. Telephone
Management System. d. Integrated Maintenance Data System.
Unit 2
1. What is the basis for drafting and enforcing all federal laws governing the U.S.?
2. Which title of the U.S. code spells out the general provisions and punitive articles of the UCMJ?
1. What is cyberspace?
2. What type of cyberspace maneuverability occurs with the use of security protocols used by host
systems?
2–19
4. What are three major considerations to understand while supporting cyber operations?
5. What document provides AF leaders a particular principle in the execution of cyber operations?
6. The National Strategy to Secure Cyberspace is driven by three priorities, what are those priorities?
7. Gaining and maintaining the initiative to operate within adversary decision cycles outlines what
strategy?
8. Before the employment of cyberspace capabilities, what considerations must be made?
9. What could prevent Air National Guard personnel from executing a cyber operation?
10. In addition to the implied legal parameters, what else must individuals be clearly aware of when
conducting cyber operations?
12. Match the characteristics of each unethical situation to its corresponding title.
Column A
Column B
1. What career field relies on many services provided by the Cyberspace Support Community?
2. What weapons system provides continuous monitoring and defense of AF unclassified and classified
networks?
2–20
5. What AF weapons system offers top-level boundary and entry point into the AFIN?
7. What weapon system is the single system providing overarching 24/7/365 awareness, management
and control of the AF portion of the cyberspace domain?
8. Describe CORA.
11. Who has the responsibility for determining what network elements should be monitored?
12. What two things did the DOD Consent to Monitoring policy do?
1. What Air Force command is appointed as the primary for cyberspace missions?
3. (True/False) DCOs intend to defend DOD or friendly cyberspace through proactive and reactive
operations.
11. Audience engagements are meant to mold perceptions and shape relations with whom?
2. What reaches across geopolitical boundaries and is tightly integrated into the operation of critical
infrastructures and the conduct of commerce, governance, and national security?
3. What three things ensure our freedom of action and deny the same to our adversaries in relation to
cyber operations?
5. What are the DOD’s three main roles regarding cyber operations?
2. Which communications squadron flight provides technical and systems support for wing
communications and computer systems including ground radio, voice networks, and secure
communications maintenance?
3. Who authorizes the use of a Special Mission Flights within a communication squadron?
2–28
6. What squadron is a communications support squadron that directly supports the AOC?
7. What type of unit provides flyaway communications packages to expeditionary air bases?
10. Who is the major force provider for the 386th AEW?
11. Which EIS unit, currently part of the Air Combat Command, is an indispensable part of the USAF war-
fighting community?
12. What unit installs, reconstitutes and tests critical C4 systems for COCOMs, anywhere and anytime?
2. What AF unit interfaces with theater and functional Air Operations Centers to establish, plan, direct,
coordinate, assess, and command & control cyber operations in support of Air Force (AF) and Joint
warfighting requirements.
4. How does the 624th OC translate CDR USCYBERCOM and theatre JFCs objectives, priorities and intent
into a coherent plan for AF cyberspace forces?
5. What unit prepares Airmen to execute computer network exploitation and attack?
7. What entity performs security and operations functions and is the focal point for Tier-2 (regional)
execution of network enterprise security?
8. Regional computing and data centers that provide enterprise services are called?
10. From whom does the communications focal point collect data?
3. What responsibility does the CNAF commander assumes when joint military operations are in his or
her respective AO?
4. If air assets from more than one service are present within a joint force, what will the JFC
normallydesignate?
5. Who is designated by the JFC to be responsible for operating and supporting all Air Force forces
assigned or attached?
2. What is the name of the process in which AF units use to present their capabilities?
ANSWERS
009
1. The US Constitution.
2–32
010
1. A global domain within the information environment consisting of the interdependent network of
information technology infrastructures, including the Internet, telecommunications networks, computer
systems, and embedded processors and controllers.
2. Logical maneuverability.
3. Cyberspace operations are the employment of cyberspace capabilities where the primary purpose is
to achieve military objectives or effect in or through cyberspace.
4. (1) Policy.
(2) Authority.
(3) Law.
5. AFDD 3–12 Cyberspace Operations, Appendix B, Policy and Doctrine Related to Cyberspace
Operations.
7. The NMS-CO.
8. Legal considerations and international legal obligations apply to the employment of cyberspace
capabilities.
9. Guardsmen in Title 32 status may train for Title 10 missions but may not execute them.
11. Prohibited Use where use adversely reflects on DOD; where use interferes with employee or office
productivity; or where use is to conduct outside commercial activity.
12. (1) c.
(2) d.
(3) b.
(4) a.
011
1. 1B4X1.
3. (1) Incident Prevention: Services include the protection of Air Force networks against new and existing
malicious logic. The system has the ability to assess/mitigate known software and hardware
vulnerabilitilites.
(2) Incident Detection: Conducts monitoring of classified/unclassified Air Force networks, identifies and
researches anomalous activity to determine problems and threats to networks, and monitors real-time
alerts generated from network sensors. In addition, the system can perform in-depth research of
historical traffic reported through sensors.
(3) Incident Response: Determines the extent of instrusions, develops course of action required to
mitigate threat(s), and determines and executes response actions. Crew interfaces with law
enforcement during malicious logic related incidents.
(4) Computer Forensics: Conducts in-depth analysis to determine threats from identified incidents and
suspicsious activities, and then assesses damage. Supports incident response process capturing the full
impact of various exploits and reverse engineers code to determine the impact to the network/system.
6. (1) Defense-in-Depth.
2–33
8. CORA assesses data compromised through intrusions of AF networks with the objective of
determining the associated impact to operations resulting from that data loss. This sub-discipline is in
the second variant.
10. It supports mission assurance by including the end user experience and the warfighter’s ability to
access critical information.
11. 24 AF.
012
2. OCO supports US cyberspace objectives by denying, degrading, disrupting, destroying, or altering the
adversary’s ability to use cyberspace.
3. True.
4. We attempt to exploit user-friendly networks by gaining footholds through their routine uses of
cyberspace.
5. IRCs, which are tools, techniques or activities employed within the physical, informational or cognitive
dimensions of the information environment that can be used to create effects and operationally
desirable conditions.
6. EW contributes to information operations by using offensive and defensive tactics and techniques to
shape, disrupt and exploit adversarial use of EMS.
7. The intent of MISO is to affect the behavior of foreign governments, organizations, groups or
individuals so that changes in foreign behavior or attitude favor an originator’s objectives.
8. True.
9. The goal is to cause the adversary to take specific actions (or inactions) that contribute to the
accomplishment of the friendly force mission.
10. OPSEC denies adversaries critical information and observable indicators about friendly forces and
actions.
11. The intent is to mold perceptions and shape relations with key military and civilian organizations.
13. CIis information gathered and activities to identify, deceive, exploit, disrupt or protect against
espionage, other intelligence activities, sabotage or assassinations conducted for or on behalf of foreign
powers, persons or their agents, or international terrorist organizations or activities.
013
1. By integrating the capabilities of influence operations, electronic warfare operations and network
warfare operations in concert.
2. Cyberspace.
(2) Exploitation.
(3) Attack.
4. (1) Strategic Context provides the working definition and cyberspace characteristics.
(2) Threats and vulnerabilities create a common understanding of the context, threats, vulnerabilities,
and opportunities for cyberspace operations.
(5) Implementation and assessment identifies areas where change is needed and establishes a
mechanism to measure progress toward achieving the strategic goal.
2–34
8. SCADA refers to a centralized system that monitors and controls industrial sites or complexes of
systems spread out over large areas.
9. SCADA systems are typically implemented as a distributed database, commonly referred to as a tag
database, which contains data elements called tags or points.
10. The purpose of IO is to affect adversary decision-making with the intent to modify behavior.
014
1. Air Force Communications Squadrons are typically broken down into two flights with an optional third
flight.
4. The primary mission of the AOC is to provide the Joint Forces with the tools necessary to fight and win
a major theater war (MTW) within the scope and coordination of all land, sea and air forces.
5. These cyberspace forces execute cyber missions through a cyber-tasking order (CTO).
7. Combat communications.
8. There is presently one active duty combat communications group in the CONUS the 5th Combat
Communications Group (5 CCG) located at Robins AFB, Georgia.
9. Expeditionary units are established to operate with an Air Expeditionary Task Force (AETF).
015
2. 624th OC.
3. 624th OC.
7. I-NOSC.
8. Area Processing Centers (APC).
9. The ESD mission is to provide help desk network support to all personnel at CONUS and OCONUS US
Air Force bases.
10. Communications squadron itself, depot, AFNetOps, DISA, and others in the areas of assembly,
collation, and assessment of logistics information and sustainment requirements.
016
1. Secretary of Defense, a combatant commander, a sub unified commander, or an existing joint force
commander
3. JFACC.
4. A JFACC.
5. The COMAFFOR.
017
Unit review
18. (009) What United States Code (USC) title authorizes the creation of the Department of Defense
(DOD) as an executive component of government and establishes all subordinate agencies including
a. Title 10.
b. Title 18.
c. Title 32.
d. Title 50.
19. (009) The Uniform Code of Military Justice (UCMJ) is derived from what United States Code
(USC)?
a. Title 3.
b. Title 8.
c. Title 10.
d. Title 18.
20. (010) What document spells out the comprehensive strategy for the United States to secure
cyberspace?
21. (010) Which policy has prevention of cyber attacks against America’s critical infrastructure as
22. (010) What policy outlines the United States (US) Armed Forces’ comprehensive strategic
approach for using cyberspace operations to assure US military strategic superiority in the cyber
domain?
23. (010) When Air National Guard personnel in Title 32 status train for cyber operations, what
a. Title 10.
b. Title 30.
c. Title 50.
d. Title 52.
2–37
24. (010) An employee or employer relationship that leads to the appearance of impartiality or
a. misuse of position.
b. covered relationships.
c. non-public information.
25. (010) Members of a household or relatives with whom you have a close personal relationship is
a. Misuse of position.
b. Covered relationship.
26. (011) What cyberspace weapon system includes the Integrate Network Operations Security Center
(I-NOSC), Enterprise Service Unit (ESU) and Area Processing Center (APC) functions?
27. (011) What cyberspace weapon system resulted from an operational initiative to consolidate
numerous major command (MAJCOM) specific stove-piped networks into a centrally managed and
controlled network under three Integrated Network Operations and Security Centers (I- NOSC)?
29. (011) Proactive defense is one of the four integrated sub-disciplines of what cyberspace
30. (011) What cyberspace weapon system ensures unfettered access, mission assurance and joint
warfighter use of networks and information processing systems to accomplish worldwide operations?
2–38
31. (011) What cyberspace weapon system identifies vulnerabilities and provides commanders with a
32. (012) What major command and numbered Air Force (NAF) were realigned to support the Air Force
cyberspace mission?
33. (012) What two cyber operation defenses involve continuous monitoring and analyzing and
34. (012) Since Military Information Support Operations (MISO) and Public Affairs (PA) share a
a. Counterintelligence (CI).
35. (013) What document directs the development of the National Military Strategic Plan for
Securing Cyberspace?
a. Strategic Considerations.
36. (013) Which agency is responsible for matters pertaining to the identification, prioritization
37. (014) What unit installs, reconstitute, and test critical C4 systems for combatant commanders
38. (015) Which unit within the Air Force Network Operations (AFNetOps) community has a goal to
2–39
39. (015) What regional computing and data center provide enterprise services like messaging, Web
40. (015) What reason is the main purpose for consolidating Network Control Centers (NCC) and
a. Manpower.
b. Efficiency.
c. Reduce costs.
a. 2009.
b. 2010.
c. 2011.
d. 2012.
42. (016) What two levels are joint task forces (JTF) divided into?
43. (016) The commander, Air Force forces (COMAFFOR) commands an Air Expeditionary Task Force
44. (017) What methodology is used by Air Force for presenting forces to combatant commanders
(CCDR)?
45. (017) What basic building block is used in joint force planning and deployments of Aerospace
a. Coding.
b. Positioning.
c. Tempo bands.
3. Match the ITIL Service Life Cycle Stage in Column B with the description in Column A. Items in Column
B may be used once, more than once, or not at all.
Column A
Column B
____ (1) Ensures that the framework developed in the Service Transition Stage is implemented.
____ (2) This stage includes determining risks, constraints, and whether the service will meet
requirements.
____ (4) The stage in which the required service is designed and developed.
____ (5) A critical stage of the Service Life Cycle because the decisions made in this stage impact all
subsequent stages.
a. Service Strategy.
b. Service Design.
c. Service Transition.
d. Service Station.
e. Service Operation.
f. CSI.
3–10
4. What is the Air Force goal concerning Internet resources? 5. May government provided hardware and
software be authorized for personal use?
10. Who will appoint Air Force portal content managers and content publishers for public and private
websites?
1. What plays a vital role in managing and operating Air Force activities?
2. Whose rights must be protected through the proper implementation of the records management
programs?
3–16
1. Match the responsibility in column A with the position in column B. Items in column B may be used
once, more than once, or not at all.
Column A
Column B
____ (2) Ensures offices of records receive a SAV a least every 24 months.
____ (4) Maintains the office files plan and accountability for active and inactive records.
____ (5) Ensures all personnel who create, maintain, and dispose of records, attend records
management training.
____ (6) Trains all personnel within three months of assignment, whose duties include filing,
maintaining, and disposing of records.
a. RM.
b. FARM.
c. COR.
d. RC.
3. Who ensures installation offices of record conduct periodical unit self-inspections and receive a SAV
at least every 24 months?
ANSWERS
018
2. A structure that enables you to organize information and processes into an interconnected
framework.
3. (1) e.
(2) c.
(3) f.
(4) b.
(5) a.
019
4. Within acceptable risks, provide maximum accessibility to personnel requiring access for official
business.
6. Using the Internet for other than official or authorized purposes is the definition of inappropriate use.
7. Inappropriate.
3–17
020
1. Four.
2. Approval workflow.
021
1. Records.
4. Records that have been officially signed, released and cannot be altered.
5. Air Force units at all levels must manage records systematically to make sure they are complete,
accurate, trustworthy, and easily accessible.
6. Personal records.
022
1. (1) a.
(2) b.
(3) c.
(4) d.
(5) c.
(6) a.
UNIT REVIEW
46. (018) Which stage is NOT one of the Information Technology Infrastructure Library (ITIL)
a. Service Transition.
b. Service Strategy.
c. Service Contact.
d. Service Design.
47. (018) What Information Technology Infrastructure Library (ITIL) stage is an overarching stage
b. Service Transition.
c. Service Strategy.
d. Service Design.
48. (019) The vision of Enterprise Information Management (EIM) is to provide tools to empower
users to
49. (019) Failure to observe the prohibitions and mandatory provisions of AFMAN 33–153, User
Responsibilities and Guidance for Information Systems, by military personnel is a violation of what
a. Article 32.
b. Article 40.
c. Article 92.
d. Article 100.
50. (019) How many rules are there for effective communication via e-mail?
a. Two.
b. Four.
c. Six.
d. Eight.
51. (019) What tests your understanding of the original message and your ability to re-state its
main purpose?
b. A well-written summary.
c. A postscript message.
52. (020) How many workflow capabilities are available to you on a SharePoint Server?
a. One.
b. Two.
c. Three.
d. Four.
3–19
53. (021) Which Air Force Instruction (AFI) defines an “official government record?” a. AFI 33-321.
a. Published doctrines.
56. (022) Who is charged with the duties of establishing training programs for newly appointed base
records managers?
57. (022) Whose duties include providing assistance, managing staging areas, and records training?
58. (022) Who is appointed at each base-level unit principal staff office within an Air Force
59. (022) Who has the authority to appoint record custodians within an office of record?
4–13
4. What are the two types of DODD?
8. What DOD issuance is only used for a time-sensitive action that affects a current DOD issuance or that
will become a DOD issuance?
10. What Joint Doctrine Document provides a doctrine for information operations planning, preparation,
execution, and assessment in support of joint operations?
11. What website would you visit for more information on CJCS Publications?
3. Define doctrine.
4–14
13. (True/False) All publications must be at least as restrictive as the higher headquarters publication
they implement and must not contradict the higher headquarters publication.
15. What form would you use to recommend changes and improvements to Air Force publications?
025. Technical Order System
4–20
6. Match the technical order type in Column B with the description in Column A. Items in Column B may
be used once, more than once, or not at all.
Column A
Column B
____ (1) Support equipment designed and manufactured for commercial use.
____ (2) Excerpts from one or more basic TOs that organize and simplify instructions.
____ (3) Used for modifying military systems and end items or performing one-time inspections.
____ (4) Category 00 and are general in content and are not issued against specific military systems or
end items.
____ (5) Developed for other services or government departments and authorized for use by Air Force
personnel.
____ (6) Used in lieu of specific equipment TOs, and are categorized into three types: Category, System,
and Equipment-series.
____ (7) Contain instructions for use in conjunction with data contained in their parent TOs, and are not
stand-alone publications.
____ (8) Covers installation, operation, troubleshooting, repairing, removing, calibration, servicing or
handling of Air Force military systems and end items.
____ (9) Include facility, system, subsystem, installation engineering and installation manuals, general
engineering and planning manuals, and standard installation practices .
a. TCTO.
b. MPTO.
c. SIPTO.
d. O&M TO.
e. General TO.
f. COTS Manual.
g. Abbreviated TO.
h. Supplemental TO.
ANSWERS
023
2. Issuances.
3. (1) Directives.
(2) Instructions.
(3) Manuals.
4–21
5. DODD 8570.01 Information Assurance (IA) Training, Certification, and Workforce Management.
6. Establish policy.
8. Directive-type memorandums.
9. CJCS.
11. www.jcs.mil.
12. DISA issuances are official Agency policy that establish, delegate, or implement specific policies;
assign and delineate responsibilities; and in some cases provide procedures for DISA employees and
mission partners who use any DISA managed system.
024
1. Nondirective publication.
3. Fundamental principles by which the military forces or elements thereof guide their action in support
of national objectives.
4. True.
6. Directive policy statement to initiate, govern, and/or regulate actions within specified areas of
responsibility by Air Force activities.
7. When there is insufficient time to process a new AFPD or to rewrite and existing AFPD.
8. Essential procedural guidance on implementing DoD, Air Force, or higher departmental policies
and/or laws.
9. Provide operating procedures and checklists for network operations. AFNOIs are used to document
standard processes as well as operate, maintain, or troubleshoot network software and equipment and
are generated for technical subjects not covered by Air Force publications or technical orders.
10. OIs differ from AFIs in that they are written at a much lower organizational level such as a squadron
or flight level.
13. True
14. AFDPO.
025
1. The TOs, infrastructure, training, and resources to manage and use TOs.
2. The TODO.
3. Establish and maintain a TO Account in ETIMS, establish and maintain organization TODA for
organization subaccounts, and maintain records of TOs required and on hand in organization physical
distribution media TO libraries.
4. Physical distribution media TO/e-TO requirements and distribution activities within the assigned
mission area, shop or office.
5. SIPTO.
6. (1) f.
(2) g.
(3) a.
(4) b.
(5) i.
(6) e.
4–22
(7) h.
(8) d.
(9) c.
026
2. ANSI.
4. Specifications in which commercial vendors would have to meet or exceed when providing equipment
or services.
UNIT REVIEW
60. (023) Who is the second-highest ranking official in the Department of Defense?
a. The President.
61. (023) What type of Department of Defense Directive (DODD) establishes Office of the Secretary
of Defense (OSD) component heads and other agencies official mission, responsibilities, function,
c. Directive-type memo.
d. Chartering directives.
62. (023) What Department of Defense Directive (DODD) establishes that all authorized users of
Department of Defense (DOD) information systems shall receive initial information assurance (IA)
awareness orientation as a condition of access and thereafter must complete annual IA refresher
awareness?
a. DODD 8140.01.
b. DODD 5515.01.
c. DODD 8220.01.
d. DODD 8570.01.
63. (023) How many different types of Department of Defense Instructions (DODI) are there?
a. One.
b. Two.
c. Three.
d. Four.
64. (023) What entity assigns numbers to Department of Defense (DOD) issuances based on the
c. Chief, Manuals Division (MD), under the Director, Washington Headquarters Services (WHS).
d. Chief, Directives Division (DD), under the Director, Washington Headquarters Services (WHS).
65. (023) What joint publication (JP) is the keystone document for the communications-system series
of publications?
peration Planning.
66. (024) What Air Force publications are informational and suggest guidance that you can modify to
a. Directive.
b. Non-directive.
67. (024) What type of non-directive Air Force (AF) publication is not subject to frequent change?
a. AF Doctrine.
b. AF Handbook (AFH).
c. AF Pamphlet (AFPAM).
68. (024) What publications are orders issued by the Secretary of the Air Force (SECAF) that
contain directive policy statements to initiate, govern, and/or regulate actions within specified
69. (024) What directive publications expire one year after their effective date or when superseded
70. (024) What directive publication prescribes the mission, area of responsibility, organization
and relationships of MAJCOMs, FOAs, and DRUs with their respective units?
71. (024) What directive publications provide essential procedural guidance on implementing
72. (025) Which of the following does NOT describe information outlined in technical order (TO)
00–5–1?
73. (025) What system manages the distribution and printing of paper technical orders?
4–25
74. (025) What personnel oversees technical order requirements and distribution within an
organization?
a. Library custodian.
b. Technical Order Distribution Office (TODO).
75. (025) Who may post an update to a technical order assuming they are trained and authorized
c. Library custodian.
d. Any user.
76. (025) Which type of technical order (TO) has a numerical designator beginning with “31” and
d. General TO.
77. (026) Who develops standards for interconnect, passive and electro-mechanical (IP&E) electronic
components under the American National Standard Institute (ANSI) designation of Electronic