STUDY SHEET 2026 UPDATED QUESTIONS
AND ANSWERS
◉Single source or non-competitive contract. Answer: Usually only
approved when the item or service is only available from one source
◉Disadvantaged Business Enterprises (DBEs). Answer: Small
businesses that have socially or economically disadvantaged
individuals who own at least 51% interest, and control management
and daily operations.
Personal net worth can't exceed $1.32 million.
States and some primary airports certify the eligibility by
establishing goals for the DBE or the Airport Concessions DBE.
Primary airports that accept federal funds must have an airport
concessions DBE program.
Airports are required to have a DBE program if they anticipate more
than $250,000 in prime contracts using federal funds.
,3-year goal (percentage) for prime contracts.
◉What is a primary airport?. Answer: More than 10,000
enplanements annually
◉What are the 4 components for airport IT?. Answer: Compatibility
& Integration - does it all work together
Security & Safety - does the old stuff continue to work until the new
stuff works
Scalability - can we add to, update, or upgrade later?
Usability - can the users actually use it
◉Geographical Information Systems (GIS). Answer: Links
geographical information with descriptive information
Presents many layers of data, model patterns, reveal relationships,
and analyse trends
Key component for eALPs
,◉9 common airport IT systems. Answer: 1. Airfield Lighting
2. Airport Noise and Operations Monitoring System - tracks noise
events and provides flight track analysis
3. Automated Vehicle Identification - transponders that track
commercial vehicle traffic for revenue purposes
4. Passenger processing systems - kiosks, multi-user flight
information display systems (arrival/departure screens)
5. Business and financial management systems - business functions
6. Property and asset management systems - tracks asset ownership,
lease and concession management, digital asset management system
7. Physical Access Control System (PACS) - allow, restrict, or track
movement of people who have been issued airport credentials
8. Facility and maintenance - environmental functions, heating,
ventilation, electrical, water, sewer
9. Airport operational database - centralized data storage such as the
Flight Information Display System and baggage management
systems)
◉Malicious outsiders ("outsider hacking") account for what
percentage of breaches and how long does it take to breach the
system?. Answer: 50-60%
About a minute
, ◉One of the most powerful weapons in a cyber attacker's arsenal.
Answer: Email
◉Hacking. Answer: The crime of breaking into an individual's
computer to access sensitive information
◉Denial of Service. Answer: Intended to disable a machine or
system, making it unavailable for users
◉Malware. Answer: Short for "malicious software", designed to gain
access or cause damage to a computer. Usually activated by clicking
on a link on an email or a webpage.
◉Phishing. Answer: Designed to steal information such as credit
card numbers or personally identifiable information
◉Spear phishing. Answer: Highly targeted attack where emails are
sent to only a few individuals
◉Identity theft/data mining. Answer: Collecting and examining
large databases in order to generate new information
◉Social engineering. Answer: The art of human manipulation. Used
to gain information about the victim.