3D0X2 Air Force
35 community-sourced questions and answers. Free — no login.
Who has the authority to appoint record custodians within an office of record?
Chief of the office of records
What document spells out the comprehensive strategy for the United States to secure cyberspace?
National strategy to secure cyber space
What tests your understanding of the original message and your ability to re-state its main purpose?
well written summary
Who is the second-highest ranking official in the Department of Defense?
Deputy secretary
What personnel oversees technical order requirements and distribution within an organization?
Technical Order Distribution Officer TODO
Command records manager
Who is charged with the duties of establishing training programs for newly appointed base records managers?
The 85th Engineering and Installation Squadron (EIS)
What unit installs, reconstitute, and test critical C4 systems for combatant commanders anywhere at any time?
National Strategy to Secure Cyberspace
Which policy has prevention of cyber attacks against America's critical infrastructure as a key strategic priority?
Major command functional manager (MFM)
Who assists with the identification of qualified subject matter experts (SME) to help with the development of your specialty knowledge test (SKT) and your career development course (CDC)?
AF Handbook (AFH)
What type of non-directive Air Force (AF) publication is not subject to frequent change?
3
How many workflow capabilities are available to you on a SharePoint Server?
Can be altered and are not officially released
Records that are considered to be in draft format
What program provides training for personnel to attain knowledge and skill qualifications required to perform duty in their specialty?
On the Job Training
Chartering directives
What type of Department of Defense Directive (DODD) establishes Office of the Secretary of Defense (OSD) component heads and other agencies official mission, responsibilities, function, relationships and authority?
Air Force Cyber Security and Control System
What cyberspace weapon system resulted from an operational initiative to consolidate numerous major command (MAJCOM) specific stove-piped networks into a centrally managed and controlled network under three Integrated Network Operations and Security Centers (I-NOSC)?
Air Force Intranet Control Weapon System
What cyberspace weapon system is the top-level boundary and entry point into the Air Force Information Network (AFIN)?
Aerospace Expeditionary Force (AEF)
What cyberspace weapon system is the top-level boundary and entry point into the Air Force Information Network (AFIN)?
Develop a Career Development Course (CDC)
Occupational surveys are used to develop the specialty knowledge test (SKT), what tasking is another use for occupational surveys?
Electronic components industry association (ECIA)
Who develops standards for interconnect, passive and electro-mechanical (IP&E) electronic components under the American National Standard Institute (ANSI) designation of Electronic Industries Alliance (EIA) standards?
Defense Information Systems Agency (DISA)
Which agency is responsible for matters pertaining to the identification, prioritization and remediation of critical Global Information Grid (GIG) infrastructure?
Air Force Space Command, 24th Air Force
What major command and numbered Air Force (NAF) were realigned to support the Air Force cyberspace mission?
Service contact
Which stage is NOT one of the Information Technology Infrastructure Library (ITIL) Service Life Cycle stages?
Library reference or museum exhibitions
Which document is NOT considered an official government record?
(UEI) Unit Effectiveness Inspection
What inspection integrates elements of compliance and readiness with new inspection elements to create a new Inspector General (IG) inspection of unit effectiveness?
Covered Relationship
Members of a household or relatives with whom you have a close personal relationship is an example of which type of unethical situation?
Continual Service Improvement (CSI)
What Information Technology Infrastructure Library (ITIL) stage is an overarching stage for maintaining service quality?
AFCFM in conjunction with the TPM
Who is responsible for scheduling the Specialty Training Requirements Team (STRT)?
Any user
Who may post an update to a technical order assuming they are trained and authorized access to the data?
Enhanced Technical Information Management System (ETIMS)
What system manages the distribution and printing of paper technical orders?
JP 6-0, Joint Communications System
What joint publication (JP) is the keystone document for the communications-system series of publications?
Chief, Directives Division (DD), under the Director, Washington Headquarters Services (WHS)
What entity assigns numbers to Department of Defense (DOD) issuances based on the established subject groups and sub subject groups?
Standard Evaluation
Which evaluation is NOT an assessment type in a Quality Assurance (QA) program?
Cable and Antenna Systems
Which 3D Air Force Specialty (AFS) responsibilities include the installation and maintenance for large-scale network wiring in support of fixed and deployed operations?
Article 92
Failure to observe the prohibitions and mandatory provisions of AFMAN 33-153, User Responsibilities and Guidance for Information Systems, by military personnel is a violation of what article of the UCMJ?
Air Force career field manager (AFCFM)
Who is the final authority to waive career field education training plan (CFETP) requirements to include the completion of the Air Force Specialty (AFS) career development course (CDC)?
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials