• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/669

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

669 Cards in this Set

  • Front
  • Back
Define an AFSC.
An Air Force Specialty Code ia a logically grouped five-digit alphanumeric code that further classifies an AFS
What are the five components that compose an AFSC?
Career Group, Career Field, Career Field Subdivision, Skill level and Career Field Identifier.
Name the three types of AFSC identifiers.
Primary AFSC, Duty AFSC, and Control AFSC.
What does the duty AFSC identify?
The Authorized Manning Position to which you are assigned and reflect the job you are currently performing.
What is the control AFSC used for?
It is used by AFPC for assignment and training purposes. AFPC uses this speciality code to distribute Airmen resources by grade and skill according to the needs of the Air Force.
Name the three AFSC modifiers.
Prefix, Suffix, and Special Experience Identifiers.
When should you be enrolled into your CDC course?
You should be enrolled into a career development course (CDC) within 45 days of arriving at your new duty assignment.
How long are retrainees placed in upgrade training before receiving a 5-skill level?
A minimum of nine months in upgrade training.
What is an AFJQS?
An Air Force job qualification standard (AFJQS) is a comprehensive task list that describes a particular job type or duty position.
What is an AFQTP?
An Air Force qualification training package (AFQTP) is an instructional course designed for use at the unit to qualify, or aid in qualifying, in a duty position, in a program, or on a piece of equipment.
When should you be first interviewed by the unit training manager?
Within the first 30 days of your duty assignment.
State a few differences between a FSA and a CSA.
Functional System Administrator (FSA) who will come up with solutions to network and network user related problems. FSA's communicate directly with local helpdesk personnel. FSA's will usually have several designated client system administrators (CSA), who assist the FSA with network user problems. CSA's try to solve network user problems first before asking the FSA for assistance.
Which AFSC is responsible for loading software programs, files, and databases on to network servers and who also responds to trouble calls and console messages?
C-CS Operators (3C0X1)
Which AFSC is responsible for configuring antennas and radio equipment for efficient field
operations, while establishing and maintaining communications links with distant.stations?
Radio Communications System Personnel (3C1X1)
Which AFSC is responsible for coordinating plans for acquiring, funding, testing, and certifying
new communications systems?
C-CS Planning and Implementation Personnel (3C3X1)
Name the three AFSC modifiers.
Prefix, Suffix, and Special Experience Identifiers.
When should you be enrolled into your CDC course?
You should be enrolled into a career development course (CDC) within 45 days of arriving at your new duty assignment.
How long are retrainees placed in upgrade training before receiving a 5-skill level?
A minimum of nine months in upgrade training.
What is an AFJQS?
An Air Force job qualification standard (AFJQS) is a comprehensive task list that describes a particular job type or duty position.
What is an AFQTP?
An Air Force qualification training package (AFQTP) is an instructional course designed for use at the unit to qualify, or aid in qualifying, in a duty position, in a program, or on a piece of equipment.
What are the requirements for obtaining a 3C 5-skill level?
1) Complete applicable AFJQS's/AFQTP's

2) Complete all the required 3CX5X STS core tasks.

3) Complete the 3CX5X and AFSC Specific CDC.

4) Have all qualifications in and possession of AFSC 3CX3X.

Complete all local tasks assigned for the duty position.

6) Eligible for a Secret security clearance IAW AFI 31-501, Personnel Security Program Management.

7) Experience performing basic AFSC tasks and functions.

8) Minimum 15 months OJT training (9 months for retrainees)

9) Be recommended by your immediate supervisor and commanders approval.
Name the three OJT components.
Job Knwledge, Job Proficiency, and job Experience.
What are the seven types of training used in UGT and QT?
Initial Skills Training, regional training centers, career development courses (CDC), mission readiness training, distance learning training, AFETS Air Force Engineering and Technical Services Courses, 7-Skill level craftsman courses.
What is an AF Form 623 is used for?
AF 623 is used for on the job training record (or electronic equivalent) is the standard folder used as a training record. The AF Form 623 reflects past and current qualifications, and is used to determine training requirements.
Name three basic military responsibilities that we must adhere to.
Upholding Military Standards, Fostering good customer relations, and maintaining/upgrading our technical competence.
Historically, to whom did 3C wartime support responsibility belonged?
To combat communications units such as the theater air control system (TACS) or contingency communications elements.
What do deployable communications capabilities require of CIS equipment?
Be readily Available and Modularly designed to support deployed AEF's.
What is our role in joint and combined force operations?
To support the joint task force (JTF) commander, who must have immediate access to the status of subordinate forces from all involved services.
What do AFOSH standards establish?
Air Force work area/shop environment safety and health standards.
What must you do if you believe a potential safety hazard may exist in your work area?
You must immediately secure the area and contact your supervisor, unit safety representative or ground safety office.
How does the Air Force obtain the AFOSH goal of minimizing incidences-of chemically induced occupational illnesses and injuries in the work area/shops?
The Air Force does this by establishing guidance for training employees on the health and physical hazards associated with proper preventative measures.
What is ionizing radiation (radioactivity)?
Electromagnetic (EM) radiation whose waves contain energy sufficient to overcome the binding energy of electrons in atoms or molecules, thus creating ions.
With whom would you coordinate the disposal of hazardous waste material?
With the host installation environmental management such as the base bioenvironmental engineering (BE).
State six (6) basic guidelines for safety observers.
1) Must be familiar with local procedures to obtain medical assistance;
2) trained and current in first-aid and CPR;
3) give a positive warning of potential danger to anyone approaching the equipment;
4) stand where they can plainly see all personnel who are working on the equipment;
5) have clear access to the main power switch;
6) need not be proficient in the task being observed.
Define operational risk management (ORM)?
ORM is a decision making process to systematically evaluate possible courses of action, identify risks and benefits, and determine the best course of action for any given situation.
Name the four (4) principles that govern all actions associated with the ORM.
1) Accept no unnecessary risk.
2) Make risk decision at the appropriate level.
3) Accept risk when benefits outweigh the costs.
4) Integrate ORM into operations and planning at all levels.
What hazards do a noise area with above 85 decibels (dB) create?
Noise could restrict verbal communication, while extensive exposure at levels at or above 85 decibels (dB) can cause hearing loss.
What should you consider when cleaning raised computer room floors?
Raised floors will not be cleaned with flamable liquids or abrasive scrubbing powders. When toxic cleaning agents are used, adequate ventilation must be provided to remove vapors.
Where should emergency control switches be installed in data processing rooms; what should
they disconnect?
Emergency controls are best located at designated exit doors. These controls will disconnect the ventilation system serving the room and selective power to all electrical equipment in the room except lighting.
How are electrostatic charges generated?
Whenever there is motion between various types of material.
When handling computer memory chips, what can you do to reduce electrostatic hazards?
You should use a grounding strap to eliminate the buildup or discharge of electrostatic energy before you
touched them to prevent possible chip damage.
State the three (3) classes of ESD.
1) Class I - Sensitive items from 0-999 volts.

2) Class II - Sensitive items from 1000 to 3999 volts.

3) Class III - Sensitive items from 4000 to 14999 volts.
What strong preventive measures can you take against ESDs?
You should wear a conductive wrist strap when using a grounded workbench; also include an ionizing air
blower.
When applied to the first digit of an AFSC, what identifies the career grouping in terms of its relationship to the Air Force mission?
Career Group
What uses a combination of the first digit and second position letter in an AFSC and is a functional grouping of personnel requiring the same knowledge and skills?
Career Field
What is comprised of positions I and 2 combined with the third positioned digit of an AFSC?
Career field subdivision.
What skill level does a trainee possess after initially entering into an AFSC?
Helper.
Before entering which skill level must an active duty trainee hold the rank of at least SSgt for?
Craftsman.
What is a comprehensive task list that describes a particular job type or duty position?
Air Force Job Qualification Standard. (AFJQS)
What is an instructional course designed for use at the unit to qualify, or aid in qualifying, in a duty position, in a program, or on a piece of equipment?
Air Force Qualification Training Package. (AFQTP)
Name the four (4) principles that govern all actions associated with the ORM.
1) Accept no unnecessary risk.
2) Make risk decision at the appropriate level.
3) Accept risk when benefits outweigh the costs.
4) Integrate ORM into operations and planning at all levels.
What hazards do a noise area with above 85 decibels (dB) create?
Noise could restrict verbal communication, while extensive exposure at levels at or above 85 decibels (dB) can cause hearing loss.
What should you consider when cleaning raised computer room floors?
Raised floors will not be cleaned with flamable liquids or abrasive scrubbing powders. When toxic cleaning agents are used, adequate ventilation must be provided to remove vapors.
Where should emergency control switches be installed in data processing rooms; what should
they disconnect?
Emergency controls are best located at designated exit doors. These controls will disconnect the ventilation system serving the room and selective power to all electrical equipment in the room except lighting.
How are electrostatic charges generated?
Whenever there is motion between various types of material.
Name the four (4) principles that govern all actions associated with the ORM.
1) Accept no unnecessary risk.
2) Make risk decision at the appropriate level.
3) Accept risk when benefits outweigh the costs.
4) Integrate ORM into operations and planning at all levels.
What hazards do a noise area with above 85 decibels (dB) create?
Noise could restrict verbal communication, while extensive exposure at levels at or above 85 decibels (dB) can cause hearing loss.
What should you consider when cleaning raised computer room floors?
Raised floors will not be cleaned with flamable liquids or abrasive scrubbing powders. When toxic cleaning agents are used, adequate ventilation must be provided to remove vapors.
Where should emergency control switches be installed in data processing rooms; what should
they disconnect?
Emergency controls are best located at designated exit doors. These controls will disconnect the ventilation system serving the room and selective power to all electrical equipment in the room except lighting.
How are electrostatic charges generated?
Whenever there is motion between various types of material.
What is a comprehensive multi-purpose document that encapsulates the entire spectrum of career field training?
Career Field Education and Training Plan. (CFETP)
What is a self-study correspondence course that provides airmen with the fundamental
knowledge of their AFS?
Career development course. (CDC)
Historically, 3C wartime support responsibility belonged to?
Combat Communications units or Contingency Communications Elements.
Emphasis on wartime communications is focused on?
Providing the command, control, and intelligence support to requesting warfighters.
Which AFSC is responsible for the Base Information Transfer System (BITS), postal
management, records management, network workgroup management?
Information management (3A0X1).
Which AFSC is responsible for reviewing reports and resolving electromagnetic
interference problems?
Electromagetic spectrum management (3C1X2).
Which AFSC is responsible for acquiring, funding, testing, and certifying new
communications systems coordination?
C-CS plans and implementation (3C3X1).
In which AFI would you reference information on personnel security program
management?
31-501
(remember 31 series is security)
Which AF document would you use to note on-the-job training qualifications?
IMT 623
Keeping your uniforms neat, clean, and safe as well as presenting a military image falls under which military member key responsibility?
Adhering to military standards.
Attending an AF technical school or completing a career development course upholds what key responsibility of a military member?
Maintaining technical competence.
In which AFOSH Standard would you reference information on Communications Cable,
Antenna and Communications-Electronics Systems?
91-50
(remember 91 series is safety)
In which AFOSH Standard would you reference information on Material Handling and
Storage Equipment?
91-46
In which AFOSH Standard would you reference information on Data Processing Facilities?
91-64
(64 is data processing)
In which AFOSH Standard would you reference Training Systems Fire Protection?
91-118
What is the least amount of current flow through the body that can result in shock and
cardiac arrest?
50 mA
Which source can harm deep tissue and organs with little or no sensation of skin heating?
Nonionizing radiation.
At which minimum voltage must safety boards and emergency equipment be present?
600
In which document do you reference information on Operational Risk Management?
AFI 90-901
In which electrostatic discharge (ESD) class would sensitive items be in when the voltage ranges from 1,000 to 3,999?
CLASS II (2)
In which electrostatic discharge (ESD) class would sensitive items be in when the voltage ranges from 4,000 to 15,000?
CLASS III (3)
To prevent the creating of static electricity when working with electrical components, you should?
wear a conductive wrist strap.
How can you best describe a bit? What is it equal to?
The bit, in computer terms, is the smallest representation of data. It is the basis of all computer memory.
One bit is equal to one binary digit.
What is a byte? What does it consist of?
A unit of data consisting of 8 bits.
What is a word? What does it consist of?
A unit of data consisting of 2 bytes or 16 bits.
How can you best describe a segment of memory?
A 64 KB area of memory, represented by four hexadecimal digits (0000-FFFF)
Describe the ASCII Coding Scheme?
ASCII is the most commonly used coding scheme for text files in computers and on the Internet. The ASCII coding scheme is widely used in hex-based computers. This coding scheme was developed by the
American National Standards Institute (ANSI) to provide a standard for information exchange between
computer systems. ASCII uses seven binary digits to represent each number, alphabetic character, and
special character.
How can you best describe a radix? What does it indicate?
The RADIX is also known as the base and indicates the number of digits used in a particular numbering system.
What is an exponent? What does it indicate?
The exponent is written as a superscript, located on the upper right side of the number. An exponent shows how many times a number is to be multiplied by itself. The value of the exponent is known as the power.
Explain the difference between the most and least significant digits?
The MSD or Most Significant Digit is the left most nonzero digit of a numeric value. The MSD is the digit that expresses the greatest possible value.
The LSD or Least Significant Digit is the right most digit of a numeric value to include zeros.
State the purpose of a fractional point.
The Fractional Point Is the point that separates the whole portion of the number from the fractional portion of a number.
Define a network.
Two or more computers or nodes connected together by one or more types of media to enable computers to share resources and/or communicate with each other.
What is a Node?
A device (such as a computer or router), used as a connection point on a computer network. It can be either a redistribution point or an end point for data transmission.
What are network interfaces?
The physical or logical arrangement supporting the attachment of any device to a connector or to another network device.
Define packet switching.
Packet switching is the intermittent transmission of logical information units or packets on a connectionless network.
What is the difference between a hub and switch?
A hub is a centrally located device which receives data from nodes in one or more directions and forwards data out in one or more other directions. A switch is a device that channels incoming data from any of multiple input ports to the specific output port that will forward data toward its intended destination.
State the two functions of a router?
1) Data Routing - Determines the optimal path or route for uits of data to travel and reach its destination.

2) Data Switching - Directs data from one intermediate physical address to the next physical address.
Why was the OSI model developed, and what does it describe?
The OSI Model was developed as a set of guidelines for the development of "open systems" standards. It describes how information from software application in one computer communicates with the software application in another computer.
What are protocols and standards?
A protocol is a set of rules that define how network communications are to take place. A standard is a set of rules or specifications that define a hardware or software device.
State the seven (7) layers of the OSI model.
1) Physical Layer
2) Data - Link Layer
3) Network Layer
4) Transport Layer
5) Session Layer
6) Presentation Layer
7) Application Layer
What functions are of primary concern of the upper and lower layers of the OSI model?
The upper three layers of the OSI model (Application, Presentation, and Session) are primarily concerned with using data while the lower four (4) layers (Transport, Network, Data-Link, and Physical) are primarily concerned with moving data.
List the two sublayers of the Data-link layer and describe their responsibilities.
1) The LLC is responsible for sequencing frames, error and flow control.
2) The MAC is responsible for controlling access between the source system and the network medium it uses.
What are the Session layer responsibilities, and for what was it primarily designed to do?
The session Layer is responsible for creating, maintaining, and terminating a network session. It handles any necessary "log-on", "password" and "Log-Off" procedures. The session layer was primarily designed around older time-sharing or mainframe systems.
What are de facto and de jure standards, and how do they differ?
A de facto standard is one that has become popular without the guidance of any standards organization. A de facto standard typically evolves from a product or service created by a single vendor or manufacturer. A de jure standard is a standard that has been ratified by an organization representing a governmental body, international group, professional organization, or any other entity with the authority to do so. A de jure standard often evolves from a de facto standard.
Define proprietary standards.
A standard that is legally "owned" by someone or some entity. Since this type of standard is actually property, you may have to purchase the right to use it.
Define protocol suite.
A family of protocols working together in a consistent fashion to provide communication services.
What is a protocol stack?
A layered set of protocols within a protocol suite working together to define communication between layers of the protocol suite.
How does a LAN differ from a MAN?
A local area network (LAN) is a computer network covering a small geographic area. LANs usually have
much higher data transfer rates than does a MAN and seldom if ever need leased telecommunication lines.
A MAN is an intermediate based network that interconnects users with computer resources in a geographic
area or region and can span a metropolitan area that local or state regulated utility commissions. A MAN is
composed of several interconnected local area networks by bridging them with backbone lines.
Define physical topology?
A physical topology is the geometric shape created when the networking medic (fiber or cabling) is attached to the network nodes.
What is a major disadvantage ofthe star topology?
A major disadvantage to the star topology is that failure of the central hub can disable the entire network.
How is a dual counter-rotating ring topology configured?
It contains an outer or primary ring, and an inner or secondary ring. Data likely flows counterclockwise on the primary or outer ring and clockwise on the secondary or inner ring.
How must the ends of a bus cable be configured?
You must treminate the ends of a bus topology with a resistor that matches the impedence of the cable.
How is data transmitted in a logical bus topology?
All data transmissions are sent simultaneously to all nodes on the backbone media. This broadcast transmission sends packets to all users in the network at the same time.
State a major difference between the logical bus and logical ring topologies.
Nodes on a logical bus topology do not regenerate data transmission while nodes on a logical ring topology do.
What does ISO consist of, and which member represents the US?
The ISO is an international organization composed of national standards bodies from over 130 countries; ANSI is the US member, and acts as our sole representative to the organization.
What does lANA stand for, and what does it control?
Internet Assigned Numbers Authority, worldwide IP Addresses which are registered and assigned by one of the four subordinate RIAR's
What are the development goals of the TCP/IP suite?
To allow communication among a variety of independent, multivendor systems.
What are the five layers of the TCP/IP suite?
Physical, Networkinterface, Internet, Transport, Application.
What do IP addresses identify?
Both the individual node and the network that the node is attached to.
What do network and host numbers identify?
The network number identifies a specific network and must be assigned by IANA if the network is to be part of the Internet. The host number identifies a specific host (or any node) on a network and is assigned by the local network administrator.
List the five classes of networks addresses and describe their purposes.
1) Class A - Are used for large networks. (ATT/GOV)
2) Class B - Are used for intermedicate size networks.
3) Class C - Are Used for smaller networks with about 250 nodes.
4) Class D - are reserved for multicast addresses.
5) Class E - are reserved for experimental use.
What is a computer port?
The interface or point of attachment to a computer system or unit. Generally ports are located on the front or back of a system. External devices such as a keyboard, monitor, printer and mouse often are attached to a computer system by a cable.
What is the difference between a serial and a parallel port?
A serial port is one type of interface that connects a device to the system unit by transmitting data one bit at a time; whereas, a parallel port is an interface that connects devices by transferring eight bits at a time.
What were USB ports designed to do?
To eliminate the need to install expansion cards into expansion slots.
What is the most exploited port?
Port 21-FTP
What is port 443 used for?
Port 443 _SSL is the default port used when you do credit card transactions with an e-commerce site.
Which of these memory components is the smallest representation of data?
Bit
Which of these memory components is the smallest addressable unit of memory?
Byte
Which of these memory components is a unit of data that can store four hexadecimal digits?
Word
What bit length do computer instructions use as an addressing scheme?
16
Which is the most commonly used coding scheme for computer text files?
ASCII
Which numbering system characteristic is known as the base and indicates the number of
digits in a particular numbering system?
Radix
Which numbering system characteristic, the value ofwhich is known as the power,
indicates how many times a number is multiplied by itself?
Exponent.
Which numeric representation is the leftmost non-zero digit of a numeric value?
MSD
Which numeric representation is the rightmost digit of a numeric value to include zeros?
LSD
Which is defined as the various physical environments through which communication
transmission signals pass?
Media
Which is best defined as two or more computers connected together by one or more types of
media to enable the computers to share resources and/or communicate with each other?
Network
Which is a device (such as a computer or router) used as a connection point on a computer network?
Node
Which is a single-run cable or network medium that connects or channels two or more
computers together?
Segment
1) Which is a physical or logical arrangement supporting the attachment of any device to a connector or to another network device?
Interface
Which networking device modulates outgoing digital signals to analog signals for telephone line usage?
Modem
Which networking device receives a digital signal transmission via a medium and
regenerates the signal along the next leg of the medium.
Repeater
Which networking device converts data from one network format type to another and can act as a bridge to another network?
Gateway
Which networking device channels incoming data from any of multiple input ports to a
specified output port thus advancing data towards its intended destination?
Switch
Which network configuration is best suited for serving a small geographic area?
Local Area Network
Which network configuration is best suited for maintaining the Internet?
Wide area network.
Which network topology has all of the network nodes connected directly to a central
controller?
Physical Star
Which network topology requires additional cabling and is subject to message
bottlenecking?
Physical Ring
Which network topology has the advantage of having each node act as a repeater?
Physical Ring
Which network topology has all devices attached to the same transmission medium or cable backbone?
Physical Bus
Which network topology transmits all data simultaneously to all nodes on the backbone media?
Logical Bus
What is a set of rules that define how network communications are to take place?
Protocols
Which layer of the OSI model is responsible for reliable end-to-end also called host-to-host
packet delivery?
Transport
Which protocol standard is one that has become popular without the guidance of any
standards organization?
De facto
What is a family of protocols working together in a consistent fashion to provide
communication services?
Protocol Suite
What is a layered set of protocols within a protocol suite working together to define
communication between layers of the protocol suite?
Protocol Stack
In what year did transmission control protocol/internet protocol (TCP/IP) become the
official transport mechanism for DOD Internet usage?
1982
Internet protocol is composed of 32 bits which consists of
Four Sets of (8) Eight binary bits.
Which class ofInternet protocol addressing would you use for large networks?
A
Which port can transfer eight bits of data or one byte simultaneously through eight separate lines in a single cable?
Parallel
Which port would you use to encrypt credit card transactions with e-cornmerce sites?
Port 443
What is a software license?
A legal agreement between the user and the software manufacturer that defines what the user can and cannot do with the software.
What document represents legal proof of software ownership?
A license certificate.
What do license management actions ensure?
That commercial off the shelf (COTS) software is correctly utilized with regards to how many users within a function actually have the software installed and running on their computers.
What is the most common reason for installing new software?
Upgrade to a newer version of a program you are already using.
What is the objective DOD Enterprise Software Initiative (ESI)?
To reduce problems identified with procuring software for DOD; to include price, acquisition cost, distribution, training, maintenance, and support for common-use of compliant software standards.
Define an operating system and explain what purpose it serves.
An operating system, or OS, is a program that manages all other programs in a computer.
List some general functions an operating system performs.
1) Manages memory usage and distribution. 2) Process and stores local data. 3) Process and stores local data. 4) Data input entry from external devices (eg; keyboard, scanners and flash drives) 5) Graphical appliaction presentation or output.
Describe an operational environment.
It is like a second set of resources added to the operating system to provide enhanced services.
What is the main difference between an operating system and an operating environment?
An operating environment cant be run by itself. It is dependant and relies on the operating system for resource allocation.
Define a file and what part of it must be unique?
An entity of data available to computer system users, to include personal computers, that is capable of being manipulated as an entity. A file must have a unique name within its own directory.
Define encryption and decryption.
Encryption is the conversion of data into ciphertext. Decryption is the process of converting encrypted data back into its original form so it can once again be understood.
What is VoIP?
VOIP is a term for a set of facilities used to manage the delivery of voice information over the Internet.
How does VoIP differ from traditional phone circuits?
VoIP involves sending the voice information in digital form in discrete packets rather than by using the traditional circuit-committed protocols of the public switched telephone network.
State one advantage of using VoIP.
A major advantage of using VOIP and Internet Telephone is that it avoids the tolls charged by ordinary telephone service.
What is IPv4?
IPv4 is an early version of the IP protocol that is still in use on the Internet today. IpV4 uses a 32-bit addressing scheme, represented by four 8-bit (0-255) numbers seperated by periods.
What problem has been created by the prolonged use of IPv4?
The prolonged use of IpV4 has created an Internet address shortage problem.
How does IPv6 alleviate the Internet address shortage problem?
IPv6 has IP addresses of which are lengthened from 32 bits to 128 bits. This extension anticipates
considerable future growth of the Internet and provides relief for what was perceived as an impending shortage of network addresses.
When was the Air Force information operations (IO) doctrine finalized and published?
August 1998
According to the Air Force's operations doctrine what are the two pillars of Information
Operations (IO)?
Information Warfare and Information-In-Warfare.
What are Air Force network operating instructions (AFNOIs) and what are they used for?
AFNOIs are directive specialized publications providing operating procedures and checklists for network
operations. AFNOIs are used to document standard processes as well as operate, maintain, or troubleshoot
network software and equipment and are generated for technical subjects not covered by Air Force
publications or technical orders.
How do AF policy directives relate to AF instructions?
Air Force PD's are drafted at the Air Force level and provide guidance for AFI's. AFI's are drafted at the MAJCOM and Field Operating Agency (FOA) level.
What do operation instructions assign and how do they differ from AF instructions?
OI's assign directive actions, responsibilities, and prescribe procedures. OI's differ from AFI's in that they are written at a much lower organizational level such as a squadron or flight level.
Illegal distribution of software can subject a seller to arrest and felony charges with fines up to $250,000 and prison terms up to how many years?
5 years.
When must each computer have a license to legally access networked software?
Prior to Utilization.
What is an entity of data available to computer system users and is capable of being
manipulated as an entity?
A File
One of the most commonly used methods of encryption is
Cryptography.
Encrypting File Systems (EFS) provide file security by
Encrypting each file with a randomly generated key.
The two major reasons why many users are attracted to Internet protocol (VoIP) services are
lower costs and increased functionality.
In what year did the Joint Staff and Armed Services consolidated the first drafts of joint doctrine?
1995
Which publications are drafted at the Air Force level and provide guidance for AFIs?
AF policy Directives
Which publication are guidance documents for procedures that contain examples for performing standard tasks, or supporting education and training programs?
Air Force Manuals.
Which are informational publications which are "how to" documents?
AF Pamphlets
What reason would you study your CDC's?
To pass them.
How is OPSEC defined?
OPSEC is defined as a process of identifying critical information and subsequently analyzing friendly actions attendant to military operations and activities.
How is operational effectiveness enhanced?
Operational effectiveness is enhanced when commanders and other decision-makers apply OPSEC principles from the earliest stages of planning.
Name the 5 steps in the OPSEC process.
Identification of Critical Information, threat assessment, vulnerability analysis, risk assessment, and apply OPSEC measures.
What is the goal of OPSEC?
The goal of OPSEC is to identify information and observable activities relating to mission capabilities, limitations and intentions in order to prevent exploitationby our adversaries.
Which security programs does OPSEC encompass?
OPSEC encompasses all Air Force Security Programs.
How does a survey differ from an inspection?
A survey attempts to produce an adversarys view of the operation or activity being surveyed. A security inspection seeks to determine if an organization is in compliance with the appropriate security directives and regulations.
How does the Air Force control critical information?
The Air Force must plan and execute OPSEC measures as early as possible during both mission and acquisition planning by actively anticipating the actions of petential adversaries.
Name the four general sources of OPSEC indicators.
Operational Indicators, Administrative Indicators, Communications Indicators, and logistic and maintenance support indicators.
What are data and information aggregation?
Data and Information aggregation are the collection of loosely associated data and or information. Placing simple units of data together can generate more information.
What are considered to be among the most problematic OPSEC vulnerabilities?
Telephones and Cell Phones.
Who established the INFOSEC program?
The Information Security (INFO SEC) Program, established by order of the President, assists in the protection of the United States by preventing the release of certain official information that would affect national defense.
What is the goal of the INFOSEC program?
The goal of the INFOSEC Program is to efficiently and effectively protect Air Force Information by delegating authority to the lowest levels possible; encouraging and advocating use of risk management principles; focusing on identifying and protecting only that information that requires protection; integrating security procedures into our business process so that they become transparent; and, ensuring everyone understands their security roles and responcibilities.
What does the privacy act of 1974 protect?
The Privacy Act (PA) of 1974 is the legal statute (law) protecting individuals from unwarranted invasion of their personal privacy.
What AFI contains information on the Privacy Act?
AFI 33-332, Air Force Privacy Act Program, contains the Air Force's policy on Privacy Act information.
Name the four parts of the Privacy Act statement.
Authority, Purpose, Routine Uses, and Disclosure.
How are PA protected records disposed?
Records protected by the privacy act are disposed of according to the records retention schedule on the file plan. The method of destruction depends on the composition of the material.
What are the categories of classified information?
Top Secret, Secret, and Confidential.
What document covers FOUO and FOIA?
The Freedom of Information Act (FOIA), covered in DoD S400.7-R, DoD Freedom of Information Act Program, provides information on the FOUO designation.
What authority does the designated approving authority (DAA) have?
The Designated Approving Authorities (DAA) has the authority to impose restrictions upon, and prohibit the use of, government owned removable information systems storage media for classified systems or networks.
When is someone permitted to access classified material?
When required for mission essential needs and when the individual has the appropriate clearance eligibility according to AFI 31-501, Personnel Security Program Management; has signed an SF 312, Classified Information Nondisclosure Agreement, (NDA) and has a need-to-know the information.
When must a Top Secret Control Account (TSCA) be established?
A Top Secret Account (TSCA) must be established when units or staff agencies routinely originate, store, receive, or dispatch Top Secret material.
When must INFOSEC insecurities be reported and to whom?
Personnel who learn of a security incident must immediately report it to their commander or equivalent, supervisor, or security manager who will in turn report the incident to the servicing Information Security Program Manager (ISPM) by the end of the first day.
What is the definition of COMSEC?
COMSEC is the protection resulting from the proper application of cryptosecurity, emissions security (EMSEC), Physical security, and transmission security (TRANSEC) measures relating to COMSEC materials.
How does TRANSEC relate to COMSEC?
Transmission security (TRANSEC) is the component of COMSEC resulting from the application of measures designed to protect information systems traffic from interception and exploitation by means other than crypto-analysis.
What is critical information?
Critical information is information about friendly activities, intentions, capabilities or limitations that an adversary seeks in order to gain a military, political, diplomatic, economic, or technological advantage.
Explain the two-person integrity system.
Two person integrity (TPI) is a storage and handling system that prohibits access to COMSEC keying material to lone or unaccompanied individuals. TPI procedures require the presence of at least two authorized persons, both who know TPI procedures and who can detect incorrect or unauthorized security procedures for the performed task.
What is AFCOMSEC Form 16 used for?
AFCOMSEC Form 16, Account Daily Shift Inventory is used to account for COM SEC material using both Defense Courier Service and the Air Force Electronic Key Management System.
What should you look for before you open a COMSEC package?
Make sure there is no evidence of tampering or forced entry from a previous custodian, do not open the package until advised to do so by the appropriate COMSEC authority or CRO.
What is AF Form I 109 used for?
AF Form I 109 is used to document visitor access to restricted areas where classified is being processed.
Who knows what these forms contain?
Only a wookie.
What is a COMSEC deviation?
A COMSEC deviation is an occurrence involving a failure to follow established COMSEC instructions, procedures, or standards.
What is a COMSEC insecurity?
A COMSEC insecurity is an investigated or evaluated incident that has been determined as jeopardizing the security of COMSEC material or the secure transmission of government information.
What is a COMSEC incident?
1) Any uninvestigated or unevaluated occurrence that potentially jeopardizes the security of COMSEC material or the secure transmission of government information. 2) Any investigated or evaluated occurrence determined as not jeopardizing the security of COMSEC material or the secure transmission of government information. Means presently, to harm unfounded or alleged. These are generally classified as "Confidential" until receiving guidance from higher agencies.
Name the three COMSEC incidents.
Physical, Personnel, and Cryptographic incidents.
How does a practice dangerous to security (PDS) differ from a COMSEC incident?
Practice dangerous to security (PDS) is defined as a procedure that has the potential to jeopardize the security of COMSEC material if allowed to continue. A PDS is not a COMSEC incident and is not assigned an Air Force COMSEC Incident case number.
What document is used to label unsecured phones?
DD form 2056 is used to label unsecured phones.
When are the COMSEC final reports due?
Final reports are due 30 days after the initial report is issued.
Define COMPUSEC.
COMPUSEC is the applied discipline that results from measures and controls that protect data in a computer against unauthorized (accidental or intentional) disclosure, modification, or destruction.
What are the objectives of COMPUSEC?
COMPUSEC objectives are to protect and maintain the confidentiality, integrity, availability, authenticity and non repudiation of information system resources and information processed throughout the systems life cycle.
What are three sources that threat information systems?
Threats are caused from natural, environmental, human, and viruses.
Name the COMPUSEC and IA vulnerabilities.
Deficiencies in these areas are- 1) Physical 2) Environmental 3) Personnel 4) Hardware 5) Software 6) Media 7) Network Communications 8) Procedural
How can you protect an unattended computer system?
You can protect an unattended computer system by removing your common access card (CAC) from the reader when unattended.
What type of network is used to process unclassified information?
Non-Secure Internet Protocol Router Network (NIPRNET)
What type of network is used to process. classified information?
Secret Internet Protocol Router Network (SIPRNET)
What is spyware?
Spyware is computer software that is designed to collect personal information about users without their informed consent.
Define EMSEC.
Emissions Security (EMSEC) is the protection resulting from all measures taken to deny unauthorized personnel information of value that might be derived from communications systems and cryptographic equipment intercepts and the interception and analysis of compromising emanations from cryptographic equipment, info systems, and telecom systems.
What is the objective of EMSEC?
The objective of EMSEC is to deny access to classified and in some instances, unclassified information and contain comprimising emanations within an inspectable space.
What are compromising emanations?
Unintentional signal that, if intercepted and analyzed, would disclose the information transferred, received, handled, or otherwise processed by any information-processing equipment.
What does an EMSEC assessment determine?
A desktop analysis to determine the fact an EMSEC countermeasures review is required or not. There are separate EMSEC assessments for information systems, communications systems, and cryptographic equipment.
What does an EMSEC countermeasure provide?
A technical evaluation of a facility where classified information will be processed that identifies the EMSEC vulnerabilities and threats, specifies the required inspectable space, determines the required EMSEC countermeasures and ascertains the most cost-effective way to apply required countermeasures.
What does the user identify before applying EMSEC countermeasures?
The user identifies the information systems that will process classified information; the volume, relative sensitivity, and perishability of the information; the physical control measures in effect around the area that will process classified information; and applies identified IA and EMSEC countermeasures.
What do INFOCONs help us with?
INFOCONS help units take the proper protective measures to protect against threats.
What measures are in place when there is an increased risk of attack in INFOCON 4?
Increased monitoring of all network activities is mandated, and all DOD end users must make sure their systems are secure. Internet usage may be restricted to government sites only, and backing up files to removable media is ideal.
Describe the actions taken in INFOCON 2.
Non-essential networks may be taken offline, and alternate methods of communication may be implemented.
What disciplines does IA integrate?
Information awareness is an integrated communications awareness program covering COMSEC, COMPUSEC, and emissions security (EMSEC) disciplines.
What disciplines does IA integrate?
Information awareness is an integrated communications awareness program covering COMSEC, COMPUSEC, and emissions security (EMSEC) disciplines.
What actions must personnel take to meet the goals of the IA program?
Personnel must understand the necessity and practice of safeguarding information processed, stored, or transmitted on information systems, and the various concepts of IA countermeasures to protect systems and information from being sabotaged, tampering, denial of service, espionage, fraud, misappropriation, misuse, or access by unauthorized persons.
What equipment does the AF-GIG encompass?
The AF-GIG includes any Air Force - provisioned system, equipment, software, or service residing on the Nonsecure Internet Protocol Router Network (NIPRNET), Secret Intenet Protocol Router Network (SIPRNET) or Constellation Net.
What is the Global Information Grid (GIG)?
The Global Information Grid (GIG) is an all-encompassing communications project of the DOD. It is defined as the globally interconnected, end to end set of information capabilities, associated processes, and personnel for collecting, processing, storing, disseminating, and manageing information on demand to warfighters, policymakers, and support personnel.
What is the goal of NETOPS?
The goal of Network Operations (NETOPS) is to provide effective, efficient, secure, and reliable information network services used in critical Department of Defense (DOD) and Air Force communications and information processes.
What are the three NETOPS Levels?
Global, Regional, and Local
What is the GNOSC responsible for?
Global NOSC (GNOSC) is responsible for the worldwide management and operational oversight of the Defense Information Infrastructure (DII).
Where do Functional Awareness Cells (FACs) exist and what are their purposes?
Functional Awareness Cells (FAC) are regional level entities that exist at the same NETWOPS management tier as the Base NCC. They report to and take direction from the Base and supporting NOSc. FAC's require smaller amounts of equipment and performs situational awareness for a functional system or mission.
What does an accreditation and certification constitute?
Accreditation and Certification (A&C) constitutes a set of procedures and judgments which lead to a determination of the suitability of an AIS to operate in a targeted operational environment.
Who makes accreditation decisions and what types can be made?
An accreditation decision is made by the DAA. This accreditation can be full accreditation which allows a system to operate until identified steps can be completed prior to receiving full accreditation.
Define physical security.
Physical security results from the using of all physical measures necessary to safeguard COMSEC material from access of unauthorized personnel. These measures include the application of control procedures and physical barriers.
List the marking required for classified material.
The overall classification of the document; the agency/office of origin and the date of the document; the office or source document that classified the information.
What items can't be placed in the security container and what is the reason?
Funds, weapons, medical items, controlled drugs, precious metals, money or other non-mission related items susceptible to theft are not, as a rule, stored in any security container thats used to store classified material. Storing these items together could result in the compromise of classified material.
What is the purpose of Standard Form 700?
The purpose of Standard Form 700 is to list contact personnel when the security of the material in the container is compromised.
On what days are Secret packages typically shipped?
Packages containing secret material are typically shipped on Monday through Thursday only.
When should hand carrying classified material during a TDY assignment be allowed?
Hand carrying classified material during TDY poses a risk and should be done as a last resort in critical situations.
How do you properly dispose of classified material?
Records during the destruction of classified material must be maintained. The Air Force accounts for Top Secret material and disposes of such administrative records according to WebRims Records Disposition Schedule.
What are the three secured facility deviations?
Temporary, permanent, and technical.
Name the security program which is defined as a process of identifying critical
information and subsequently analyzing friendly actions attendant to military operations and other
activities?
OPSEC
When was the first Air Force OPSEC program introduced?

(Something about Viet Nam?)
1966
In what year was the present OPSEC program we use today established?
1970
In which of the OPSEC steps would you inform the AFOSI of potential
adversaries and their associated capabilities, limitations and intentions to collect, analyze, and use
critical information?
Threat Assessment
In which OPSEC step would program managers and coordinators
recommend actions to senior decision-makers and commanders?
Risk Assessment
Which OPSEC step would dynamic situations require you to reaccomplish
preventative actions?
Apply OPSEC measures.
Specific facts about friendly activities, intentions, capabilities or limitations vitally needed by
adversaries for them to plan and act effectively to guarantee failure or unacceptable consequences
for friendly mission accomplishment best describe
Critical Information
In which OPSEC indicator would an abrupt changes or cancellations of schedules fall under?
Operational
Special briefings, meetings, or religious services would fall under which OPSEC indicator?
Administrative
Deviating from normal procedures would fall under which OPSEC indicator?
Logistic and maintenance support.
Data aggregation is defined as the
Collection of loosely associated data and/or information.
What are among the most problematic OPSEC vulnerabilities in the Air Force today?
Tellephones and Cell Phones.
The reason information is collected best describes which mandatory item of a Privacy Act
Statement?
Purpose
What form is used as a cover sheet to protect Privacy Act material?
AF Form 3227
Guidance for posting information on AF web sites is outlined in
AFI 33-129.
Official guidance on individual security clearances and permitting access to classified
information can be found in
AFI 31-501.
Disclosure of information that would result in the loss, misuse, unauthorized access, or modification that might adversely affect national security would best be described as
Sensitive but unclassified.

SBU
Which document provides guidance on the Information Security Program Management?
AFI 31-401.
What specific restrictions can a designated approving authority (DAA) impose on classified systems or networks?
Prohibit the use of government owned removable storage media.
Before obtaining access to classified material, which document must be signed as a
prerequisite?
Standard Form 312
What form is annotated at the end-of-day security check to ensure classified material is
stored appropriately?
Standard Form 701
What is the COMSEC program designed to do?
Detect and correct procedural weaknesses that could expose critical information.
What reference would you use for guidance on Air Force messaging?
AFI 33-119
Where would you find guidance on how to properly store, control, safeguard, transfer, and
destroy COMSEC material?
AFI 31-201, Volume I.
Which form is used with a transfer report to accompany a COMSEC package?
SF 153
Which form is used as a visitor register log to record visitors into restricted areas?
AF Form 1109
An investigated or evaluated incident that has been determined as jeopardizing the security of COMSEC material is best described as a COMSEC
insecurity
An uninvestigated or unevaluated occurrence that potentially jeopardizes the security of COM SEC material or the secure transmission of government information is best described as a COMSEC
Incident
What are the three types of COMSEC incidents?
Physical, personnel, and cryptographic
Which organization assigns COMSEC incident report case numbers?
Air Force Communications Agency
Final reports of a COMSEC incident are due
30 days after the initial report is issued.
The Air Force Information Assurance (lA) Awareness Program is detailed in
AFI 33-204.
Which security program applies discipline measures and controls to protect data computer system data against unauthorized, disclosure, modification, or destruction?
COMPUSEC
What computer software is designed to collect personal information such as passwords and
financial details without the users consent?
Spyware
What best describes an unintended signals or noise appearing external to a piece of communications equipment?
Emanation
An unclassified term referring to technical investigations for compromising emanations
from an electrically operated data processing equipment is known as
TEMPEST
Which condition exists when there is no apparent terrorist activity against computer
networks?
INFOCON 5
Which condition requires the mandate of increased monitoring of all network system activities when an increased risk of attack is present?
INFOCON 4
When a risk of a network system attack has been identified, which condition requires all unclassified dial-up connections be disconnected
INFOCON 3.
Which condition permits non-essential networks to be taken offline and substituted with alternate methods of communication?
INFOCON 2
Which AFI provides the guidance necessary to manage the increasingly
complex network environment and customers high quality service?
AFI 33-115, Volume 2.
At which NETOPS level is responsibility for the worldwide management and operational
oversight of the defense information infrastructure globally managed?
Tier 1
At which NETOPS level are networks managed at the local level?
Tier 3
An accreditation decision which allows a system to operate in an environment for which it was originally intended is known as
Full Accreditation
An accreditation decision which permits an information system to operate until specific identified steps can be completed is known as
an interim accreditation.
Which resources designated priority is provided when the level of security requires the
greatest possible deterrence against hostile acts?
A
Which resources designated priority is provided when the level of security requires a
significant degree of deterrence against hostile acts?
B
Which resources designated priority is provided when the level of security requires a
reasonable degree of deterrence against hostile acts?
C
Which form would you use to properly label removable storage media containing "top
secret" information?
SF 706
Which form would you use to properly label removable storage media containing "secret" information?
SF 707
Which form would you use to properly label removable storage media containing
"unclassified" material?
SF 710
Personnel conducting end-of-day security checks will make sure classified material is stored appropriately at the close of each working day and record them on
Standard Form 701
The top secret control officer (TSCO) uses which form for the purpose of a "top secret
cover sheet and access" disclosure of record?
AF Form 144
Explain what an AEF is composed of?
An air and space expeditionary force (AEF) is an organizational structure composed of Air Force
capabilities that can provide the war-fighting combatant commander with rapid and responsive air and
space power assets.
How has the AEF concept changed Air Force operations?
By retooling from a "stay-at-home," or fixed-base, mindset to an expeditionary/deployable one. Developing
the means to spread tasking across the force to relieve the increase in deployments on a small number of
units. Providing predictability and stability for our people.
How are Total Forces postured?
Total Forces are identified and made available (postured) across a rotational structure of 10 AEF force
packages to ensure availability of a full range of air and space capabilities for combatant commander
requirements.
In a surge/crisis-state, how does force predictability and stability relate to flexibility?
In a surge/crisis state, force predictability and stability take second place over flexibility because the
security environment is no longer predictable. Personnel may be frozen in place and pull a rotation longer
than 120 days when in a crisis state.
Where would you research information on 365-day deployments?
You can find lots of updated information at the AEF center website (https://aefcenter.afpc.randolph.af.mil/)
concerning 36S-day deployments.
What is the main mission for QRPs?
The main mission for QRPs was to deploy ahead of sustaining communications packages, set-up
communications for deployed commanders, then tum over the communication networks to the sustaining
inbound units.
What is the primary mission of the AOC?
The primary mission of the AOC is to provide the JFACC with the tools necessary to fight and win a MTW
within the scope and coordination of all land, sea and air forces.
What is a unit type code (UTC)?
A unit type code (UTC) is the basic building block used in joint force planning and deployments of AEFs.
Define UTC posturing.
Posturing is the process of identifying and making available a unit's trained and ready capable UTCs.
How would you best describe TDCs and its composition?
TDC is a state of the art ground-to-ground communications infrastructure designed to exchange secure and
non-secure voice, data, and video communications via line of sight (LOS), satellite, or hard-wired
resources. TDC is comprised of highly transportable commercial-off-the-shelf (COTS) communications
equipment, housed in transit cases, and is fully scalable to meet new Air Force mission requirements.
What does the AEF reporting xtool enable?
The ART enables commanders to report the ability of a standard UTC to perform its mission capability
statement (MISCAP) anywhere in the world (at the time of the assessment) and identify capability through
the next AEF bucket.
Explain what MEFPAK is and the purpose it serves.
MEFPAK is the Air Force system used for UTC package management. The purpose ofMEFPAK is to
provide standard descriptions of the force packages to be used to support contingency planning at all levels
of command.
What is JOPES and what was designed to facilitate?
JOPES is the DOD directed integrated joint command and control (C2) system for conventional operation
planning and execution (to include theater-level nuclear and chemical plans). JOPES was designed to
. facilitate rapid building and timely maintenance of plans and rapid development of effective options
through adaptation of approved operation plans during crisis.
Name three standard reference files.
Three standard reference files are: GEOFILE, TUCHA, and TUDET.
What does the TUCHA file contain?
The TUCHA file contains the deployment data for all approved DOD UTCs, including the number of
passengers and the cargo increments and the weights and dimensions.
Describe MANFOR
MANFOR is a database containing the UTC and title, mission capability (MISCAP), and manpower detail
for each applicable UTe.
How does LOGDET relate to LOGFOR?
LOGFOR is a subsystem ofMEFPAK and COMPES which contains the logistics detail for standard Air
Force packages. LOGFOR is used to collect and store the material requirements (also called the logistics
detail (LOGDET)) for UTes. The LOGDET defines the standard equipment requirements for each.
Name the two types of UTCs
Standard and non-standard.
What document should you refer to for additional guidance on using and posturing UTC?
AFI 10-401, Air Force Operations Planning and Execution, Chapter 7.
What specific restrictions can a designated approving authority (DAA) impose on classified
systems or networks?
Prohibit the use of government owned removable storage media.
Before obtaining access to classified material, which document must be signed as a
prerequisite?
Standard Form 312
What form is annotated at the end-of-day security check to ensure classified material is
stored appropriately?
Standard Form 701
What is the COMSEC program designed to do?
Detect and correct procedural weaknesses that could expose critical information.
What reference would you use for guidance on Air Force messaging?
AFI 33-119.
What best describes an unintended signals or noise appearing external to a piece of communications equipment?
Emanation
An unclassified term referring to technical investigations for compromising emanations
from an electrically operated data processing equipment is known as
TEMPEST
Which condition exists when there is no apparent terrorist activity against computer
networks?
INFOCON 5
Which condition requires the mandate of increased monitoring of all network system activities when an increased risk of attack is present?
INFOCON 4
When a risk of a network system attack has been identified, which condition requires all unclassified dial-up connections be disconnected
INFOCON 3.
Which form would you use to properly label removable storage media containing
"unclassified" material?
SF 710
Personnel conducting end-of-day security checks will make sure classified material is stored appropriately at the close of each working day and record them on
Standard Form 701
The top secret control officer (TSCO) uses which form for the purpose of a "top secret
cover sheet and access" disclosure of record?
AF Form 144
How does the Air Force organize, train, equip, and sustain the best air and space force by
Using the AEF concept.
Which of the following is defined as the legal authority exercised over subordinates by virtue of rank assignment?
Control
Which database is used for the purpose of coordinating the movement of joint forces into their operational locations?
TPFDD. ( Time-phased- Force and Deployment Data )
Which of the following is used to collect and store the data of material requirements and
logistics details for UTCs?
LOGFOR (Logistics Force Packaging Subsystem)
Which characteristics should proposed theater deployable communications (TDC)
equipment strive to have?
Open system standards, interoperability, and survivability.
TDC is composed of which three major components?
Ground Satellite Terminals, ICAP, NCC-D
Which is a suite of modules and accessory kits that serve as the backbone for deployed
communication networks?
ICAP
Which airborne platform collects real-time positioning and tracking data on the location of friendly and enemy aircraft and naval vessels in the AOR?
E-3 Sentry
Which is the primary system used for analyzing dynamic intelligence, surveillance, and
reconnaissance data of rapid post-mission?
Ground data processing stations.
Which is a development program focused on providing exploitable surveillance and
reconnaissance digital imagery to the war fighter in near real-time?
JSTARS?
Which frequency range is used for UHF band designation?
300 to 3000 MHz
Which frequency range is used for SHF band designation?
3 to 30 GHz
Which are used as the main propagation modes of transmissions for direct and ground reflected waves?
VHF/UHF.
Which are used as the primary transmissions of direct radio waves?
EHF/SHF
One of the disadvantages of line-of-sight primary mode of radio transmissions is that relay stations are required
when distances exceeds 30 to 40 miles.
Which frequency range using the tropospheric scatter, satellite, air/ground/air, and LOS for its
main propagation paths?
UHF (Ultra High Frequency)
Which frequency range uses satellite cross-linking capability for global transmissions using EHF
ranges for uplinks and SHF ranges for downlinks?
EHF (Extremely High Frequency)
How do electric and magnetic fields relate?
A time varying electric field generates a magnetic field, while a time varying magnetic field generates an electric field.
At approximately what frequency will a magnetic field no longer completely collapse?
10,000 cycles per second.
How can the movement of radio waves through space best be simplified?
By comparing them to wave movement in a pond.
How are wavelength measured?
Wavelength is measured by the distance between two successive crests or any corresponding points on two consecutive cycles of a sine wave.
Name three actions which can affect radio waves which travel through free space at the speed of light.
They can be reflected, refracted, or diffracted.
Define an AFSC.
An Air Force Specialty Code ia a logically grouped five-digit alphanumeric code that further classifies an AFS
What are the five components that compose an AFSC?
"Career Group, Career Field, Career Field Subdivision, Skill level and Career Field Identifier."
Name the three types of AFSC identifiers.
"Primary AFSC, Duty AFSC, and Control AFSC."
What does the duty AFSC identify?
The Authorized Manning Position to which you are assigned and reflect the job you are currently performing.
What is the control AFSC used for?
It is used by AFPC for assignment and training purposes. AFPC uses this specialty code to distribute Airmen resources by grade and skill according to the needs of the Air Force.
Name the three AFSC modifiers.
"Prefix, Suffix, and Special Experience Identifiers."
When should you be enrolled into your CDC course?
You should be enrolled into a career development course (CDC) within 45 days of arriving at your new duty assignment.
How long are retrainees placed in upgrade training before receiving a 5-skill level?
A minimum of nine months in upgrade training.
What is an AFJQS?
An Air Force job qualification standard (AFJQS) is a comprehensive task list that describes a particular job type or duty position.
What is an AFQTP?
"An Air Force qualification training package (AFQTP) is an instructional course designed for use at the unit to qualify, or aid in qualifying, in a duty position, in a program, or on a piece of equipment."
When should you be first interviewed by the unit training manager?
Within the first 30 days of your duty assignment.
State a few differences between a FSA and a CSA.
"Functional System Administrator (FSA) who will come up with solutions to network and network user related problems. FSA's communicate directly with local helpdesk personnel. FSA's will usually have several designated client system administrators (CSA), who assist the FSA with network user problems. CSA's try to solve network user problems first before asking the FSA for assistance."
"Which AFSC is responsible for loading software programs, files, and databases on to network servers and who also responds to trouble calls and console messages?"
C-CS Operators (3C0X1)
Which AFSC is responsible for configuring antennas and radio equipment for efficient field
"operations, while establishing and maintaining communications links with distant.stations?"
Radio Communications System Personnel (3C1X1)
"Which AFSC is responsible for coordinating plans for acquiring, funding, testing, and certifying"
new communications systems?
C-CS Planning and Implementation Personnel (3C3X1)
Name the three AFSC modifiers.
"Prefix, Suffix, and Special Experience Identifiers."
When should you be enrolled into your CDC course?
You should be enrolled into a career development course (CDC) within 45 days of arriving at your new duty assignment.
How long are retrainees placed in upgrade training before receiving a 5-skill level?
A minimum of nine months in upgrade training.
What is an AFJQS?
An Air Force job qualification standard (AFJQS) is a comprehensive task list that describes a particular job type or duty position.
What is an AFQTP?
"An Air Force qualification training package (AFQTP) is an instructional course designed for use at the unit to qualify, or aid in qualifying, in a duty position, in a program, or on a piece of equipment."
What are the requirements for obtaining a 3C 5-skill level?
1) Complete applicable AFJQS's/AFQTP's
2) Complete all the required 3CX5X STS core tasks.
3) Complete the 3CX5X and AFSC Specific CDC.
4) Have all qualifications in and possession of AFSC 3CX3X.
Complete all local tasks assigned for the duty position.
"6) Eligible for a Secret security clearance IAW AFI 31-501, Personnel Security Program Management."
7) Experience performing basic AFSC tasks and functions.
8) Minimum 15 months OJT training (9 months for retrainees)
9) Be recommended by your immediate supervisor and commanders approval.
Name the three OJT components.
"Job Knowledge, Job Proficiency, and job Experience."
What are the seven types of training used in UGT and QT?
"Initial Skills Training, regional training centers, career development courses (CDC), mission readiness training, distance learning training, AFETS Air Force Engineering and Technical Services Courses, 7-Skill level craftsman courses."
What is an AF Form 623 is used for?
"AF 623 is used for on the job training record (or electronic equivalent) is the standard folder used as a training record. The AF Form 623 reflects past and current qualifications, and is used to determine training requirements."
Name three basic military responsibilities that we must adhere to.
"Upholding Military Standards, Fostering good customer relations, and maintaining/upgrading our technical competence."
"Historically, to whom did 3C wartime support responsibility belonged?"
To combat communications units such as the theater air control system (TACS) or contingency communications elements.
What do deployable communications capabilities require of CIS equipment?
Be readily Available and Modularly designed to support deployed AEF's.
What is our role in joint and combined force operations?
"To support the joint task force (JTF) commander, who must have immediate access to the status of subordinate forces from all involved services."
What do AFOSH standards establish?
Air Force work area/shop environment safety and health standards.
What must you do if you believe a potential safety hazard may exist in your work area?
"You must immediately secure the area and contact your supervisor, unit safety representative or ground safety office."
How does the Air Force obtain the AFOSH goal of minimizing incidences-of chemically induced occupational illnesses and injuries in the work area/shops?
The Air Force does this by establishing guidance for training employees on the health and physical hazards associated with proper preventative measures.
What is ionizing radiation (radioactivity)?
"Electromagnetic (EM) radiation whose waves contain energy sufficient to overcome the binding energy of electrons in atoms or molecules, thus creating ions."
With whom would you coordinate the disposal of hazardous waste material?
With the host installation environmental management such as the base bioenvironmental engineering (BE).
State six (6) basic guidelines for safety observers.
1) Must be familiar with local procedures to obtain medical assistance;
2) trained and current in first-aid and CPR;
3) give a positive warning of potential danger to anyone approaching the equipment;
4) stand where they can plainly see all personnel who are working on the equipment;
5) have clear access to the main power switch;
6) need not be proficient in the task being observed.
Define operational risk management (ORM)?
"ORM is a decision making process to systematically evaluate possible courses of action, identify risks and benefits, and determine the best course of action for any given situation."
Name the four (4) principles that govern all actions associated with the ORM.
1) Accept no unnecessary risk.
2) Make risk decision at the appropriate level.
3) Accept risk when benefits outweigh the costs.
4) Integrate ORM into operations and planning at all levels.
What hazards do a noise area with above 85 decibels (dB) create?
"Noise could restrict verbal communication, while extensive exposure at levels at or above 85 decibels (dB) can cause hearing loss."
What should you consider when cleaning raised computer room floors?
"Raised floors will not be cleaned with flammable liquids or abrasive scrubbing powders. When toxic cleaning agents are used, adequate ventilation must be provided to remove vapors."
Where should emergency control switches be installed in data processing rooms; what should
they disconnect?
Emergency controls are best located at designated exit doors. These controls will disconnect the ventilation system serving the room and selective power to all electrical equipment in the room except lighting.
How are electrostatic charges generated?
Whenever there is motion between various types of material.
"When handling computer memory chips, what can you do to reduce electrostatic hazards?"
You should use a grounding strap to eliminate the buildup or discharge of electrostatic energy before you
touched them to prevent possible chip damage.
State the three (3) classes of ESD.
1) Class I - Sensitive items from 0-999 volts.
2) Class II - Sensitive items from 1000 to 3999 volts.
3) Class III - Sensitive items from 4000 to 14999 volts.
What strong preventive measures can you take against ESDs?
You should wear a conductive wrist strap when using a grounded workbench; also include an ionizing air
blower.
"When applied to the first digit of an AFSC, what identifies the career grouping in terms of its relationship to the Air Force mission?"
Career Group
What uses a combination of the first digit and second position letter in an AFSC and is a functional grouping of personnel requiring the same knowledge and skills?
Career Field
What is comprised of positions I and 2 combined with the third positioned digit of an AFSC?
Career field subdivision.
What skill level does a trainee possess after initially entering into an AFSC?
Helper.
Before entering which skill level must an active duty trainee hold the rank of at least SSgt for?
Craftsman.
What is a comprehensive task list that describes a particular job type or duty position?
Air Force Job Qualification Standard. (AFJQS)
"What is an instructional course designed for use at the unit to qualify, or aid in qualifying, in a duty position, in a program, or on a piece of equipment?"
Air Force Qualification Training Package. (AFQTP)
Name the four (4) principles that govern all actions associated with the ORM.
1) Accept no unnecessary risk.
2) Make risk decision at the appropriate level.
3) Accept risk when benefits outweigh the costs.
4) Integrate ORM into operations and planning at all levels.
What hazards do a noise area with above 85 decibels (dB) create?
"Noise could restrict verbal communication, while extensive exposure at levels at or above 85 decibels (dB) can cause hearing loss."
What should you consider when cleaning raised computer room floors?
"Raised floors will not be cleaned with flammable liquids or abrasive scrubbing powders. When toxic cleaning agents are used, adequate ventilation must be provided to remove vapors."
Where should emergency control switches be installed in data processing rooms; what should
they disconnect?
Emergency controls are best located at designated exit doors. These controls will disconnect the ventilation system serving the room and selective power to all electrical equipment in the room except lighting.
How are electrostatic charges generated?
Whenever there is motion between various types of material.
Name the four (4) principles that govern all actions associated with the ORM.
1) Accept no unnecessary risk.
2) Make risk decision at the appropriate level.
3) Accept risk when benefits outweigh the costs.
4) Integrate ORM into operations and planning at all levels.
What hazards do a noise area with above 85 decibels (dB) create?
"Noise could restrict verbal communication, while extensive exposure at levels at or above 85 decibels (dB) can cause hearing loss."
What should you consider when cleaning raised computer room floors?
"Raised floors will not be cleaned with flammable liquids or abrasive scrubbing powders. When toxic cleaning agents are used, adequate ventilation must be provided to remove vapors."
Where should emergency control switches be installed in data processing rooms; what should
they disconnect?
Emergency controls are best located at designated exit doors. These controls will disconnect the ventilation system serving the room and selective power to all electrical equipment in the room except lighting.
How are electrostatic charges generated?
Whenever there is motion between various types of material.
What is a comprehensive multi-purpose document that encapsulates the entire spectrum of career field training?
Career Field Education and Training Plan. (CFETP)
What is a self-study correspondence course that provides airmen with the fundamental
knowledge of their AFS?
Career development course. (CDC)
"Historically, 3C wartime support responsibility belonged to?"
Combat Communications units or Contingency Communications Elements.
Emphasis on wartime communications is focused on?
"Providing the command, control, and intelligence support to requesting war fighters."
"Which AFSC is responsible for the Base Information Transfer System (BITS), postal"
"management, records management, network workgroup management?"
Information management (3A0X1).
Which AFSC is responsible for reviewing reports and resolving electromagnetic
interference problems?
Electromagnetic spectrum management (3C1X2).
"Which AFSC is responsible for acquiring, funding, testing, and certifying new"
communications systems coordination?
C-CS plans and implementation (3C3X1).
In which AFI would you reference information on personnel security program
management?
31-501
(remember 31 series is security)
Which AF document would you use to note on-the-job training qualifications?
IMT 623
"Keeping your uniforms neat, clean, and safe as well as presenting a military image falls under which military member key responsibility?"
Adhering to military standards.
Attending an AF technical school or completing a career development course upholds what key responsibility of a military member?
Maintaining technical competence.
"In which AFOSH Standard would you reference information on Communications Cable,"
Antenna and Communications-Electronics Systems?
91-50
(remember 91 series is safety)
In which AFOSH Standard would you reference information on Material Handling and
Storage Equipment?
91-46
In which AFOSH Standard would you reference information on Data Processing Facilities?
91-64
(64 is data processing)
In which AFOSH Standard would you reference Training Systems Fire Protection?
91-118
What is the least amount of current flow through the body that can result in shock and
cardiac arrest?
50 mA
Which source can harm deep tissue and organs with little or no sensation of skin heating?
No ionizing radiation.
At which minimum voltage must safety boards and emergency equipment be present?
600
In which document do you reference information on Operational Risk Management?
AFI 90-901
"In which electrostatic discharge (ESD) class would sensitive items be in when the voltage ranges from 1,000 to 3,999?"
CLASS II (2)
"In which electrostatic discharge (ESD) class would sensitive items be in when the voltage ranges from 4,000 to 15,000?"
CLASS III (3)
"To prevent the creating of static electricity when working with electrical components, you should?"
wear a conductive wrist strap.
How can you best describe a bit? What is it equal to?
"The bit, in computer terms, is the smallest representation of data. It is the basis of all computer memory."
One bit is equal to one binary digit.
What is a byte? What does it consist of?
A unit of data consisting of 8 bits.
What is a word? What does it consist of?
A unit of data consisting of 2 bytes or 16 bits.
How can you best describe a segment of memory?
"A 64 KB area of memory, represented by four hexadecimal digits (0000-FFFF)"
Describe the ASCII Coding Scheme?
ASCII is the most commonly used coding scheme for text files in computers and on the Internet. The ASCII coding scheme is widely used in hex-based computers. This coding scheme was developed by the
American National Standards Institute (ANSI) to provide a standard for information exchange between
"computer systems. ASCII uses seven binary digits to represent each number, alphabetic character, and"
special character.
How can you best describe a radix? What does it indicate?
The RADIX is also known as the base and indicates the number of digits used in a particular numbering system.
What is an exponent? What does it indicate?
"The exponent is written as a superscript, located on the upper right side of the number. An exponent shows how many times a number is to be multiplied by itself. The value of the exponent is known as the power."
Explain the difference between the most and least significant digits?
The MSD or Most Significant Digit is the left most nonzero digit of a numeric value. The MSD is the digit that expresses the greatest possible value.
The LSD or Least Significant Digit is the right most digit of a numeric value to include zeros.
State the purpose of a fractional point.
The Fractional Point Is the point that separates the whole portion of the number from the fractional portion of a number.
Define a network.
Two or more computers or nodes connected together by one or more types of media to enable computers to share resources and/or communicate with each other.
What is a Node?
"A device (such as a computer or router), used as a connection point on a computer network. It can be either a redistribution point or an end point for data transmission."
What are network interfaces?
The physical or logical arrangement supporting the attachment of any device to a connector or to another network device.
Define packet switching.
Packet switching is the intermittent transmission of logical information units or packets on a connectionless network.
What is the difference between a hub and switch?
A hub is a centrally located device which receives data from nodes in one or more directions and forwards data out in one or more other directions. A switch is a device that channels incoming data from any of multiple input ports to the specific output port that will forward data toward its intended destination.
State the two functions of a router?
1) Data Routing - Determines the optimal path or route for units of data to travel and reach its destination.
2) Data Switching - Directs data from one intermediate physical address to the next physical address.
"Why was the OSI model developed, and what does it describe?"
The OSI Model was developed as a set of guidelines for the development of "open systems" standards. It describes how information from software application in one computer communicates with the software application in another computer.
What are protocols and standards?
A protocol is a set of rules that define how network communications are to take place. A standard is a set of rules or specifications that define a hardware or software device.
State the seven (7) layers of the OSI model.
1) Physical Layer
2) Data - Link Layer
3) Network Layer
4) Transport Layer
5) Session Layer
6) Presentation Layer
7) Application Layer
What functions are of primary concern of the upper and lower layers of the OSI model?
"The upper three layers of the OSI model (Application, Presentation, and Session) are primarily concerned with using data while the lower four (4) layers (Transport, Network, Data-Link, and Physical) are primarily concerned with moving data."
List the two sublayers of the Data-link layer and describe their responsibilities.
"1) The LLC is responsible for sequencing frames, error and flow control."
2) The MAC is responsible for controlling access between the source system and the network medium it uses.
"What are the Session layer responsibilities, and for what was it primarily designed to do?"
"The session Layer is responsible for creating, maintaining, and terminating a network session. It handles any necessary "log-on", "password" and "Log-Off" procedures. The session layer was primarily designed around older time-sharing or mainframe systems."
"What are de facto and de jure standards, and how do they differ?"
"A de facto standard is one that has become popular without the guidance of any standards organization. A de facto standard typically evolves from a product or service created by a single vendor or manufacturer. A de jure standard is a standard that has been ratified by an organization representing a governmental body, international group, professional organization, or any other entity with the authority to do so. A de jure standard often evolves from a de facto standard."
Define proprietary standards.
"A standard that is legally "owned" by someone or some entity. Since this type of standard is actually property, you may have to purchase the right to use it."
Define protocol suite.
A family of protocols working together in a consistent fashion to provide communication services.
What is a protocol stack?
A layered set of protocols within a protocol suite working together to define communication between layers of the protocol suite.
How does a LAN differ from a MAN?
A local area network (LAN) is a computer network covering a small geographic area. LANs usually have
much higher data transfer rates than does a MAN and seldom if ever need leased telecommunication lines.
A MAN is an intermediate based network that interconnects users with computer resources in a geographic
area or region and can span a metropolitan area that local or state regulated utility commissions. A MAN is
composed of several interconnected local area networks by bridging them with backbone lines.
Define physical topology?
A physical topology is the geometric shape created when the networking medic (fiber or cabling) is attached to the network nodes.
What is a major disadvantage ofthe star topology?
A major disadvantage to the star topology is that failure of the central hub can disable the entire network.
How is a dual counter-rotating ring topology configured?
"It contains an outer or primary ring, and an inner or secondary ring. Data likely flows counterclockwise on the primary or outer ring and clockwise on the secondary or inner ring."
How must the ends of a bus cable be configured?
You must terminate the ends of a bus topology with a resistor that matches the impedance of the cable.
How is data transmitted in a logical bus topology?
All data transmissions are sent simultaneously to all nodes on the backbone media. This broadcast transmission sends packets to all users in the network at the same time.
State a major difference between the logical bus and logical ring topologies.
Nodes on a logical bus topology do not regenerate data transmission while nodes on a logical ring topology do.
"What does ISO consist of, and which member represents the US?"
"The ISO is an international organization composed of national standards bodies from over 130 countries; ANSI is the US member, and acts as our sole representative to the organization."
"What does lANA stand for, and what does it control?"
"Internet Assigned Numbers Authority, worldwide IP Addresses which are registered and assigned by one of the four subordinate RIAR's"
What are the development goals of the TCP/IP suite?
"To allow communication among a variety of independent, multivendor systems."
What are the five layers of the TCP/IP suite?
"Physical, Network interface, Internet, Transport, Application."
What do IP addresses identify?
Both the individual node and the network that the node is attached to.
What do network and host numbers identify?
The network number identifies a specific network and must be assigned by IANA if the network is to be part of the Internet. The host number identifies a specific host (or any node) on a network and is assigned by the local network administrator.
List the five classes of networks addresses and describe their purposes.
1) Class A - Are used for large networks. (ATT/GOV)
2) Class B - Are used for intermediate size networks.
3) Class C - Are Used for smaller networks with about 250 nodes.
4) Class D - are reserved for multicast addresses.
5) Class E - are reserved for experimental use.
What is a computer port?
"The interface or point of attachment to a computer system or unit. Generally ports are located on the front or back of a system. External devices such as a keyboard, monitor, printer and mouse often are attached to a computer system by a cable."
What is the difference between a serial and a parallel port?
"A serial port is one type of interface that connects a device to the system unit by transmitting data one bit at a time; whereas, a parallel port is an interface that connects devices by transferring eight bits at a time."
What were USB ports designed to do?
To eliminate the need to install expansion cards into expansion slots.
What is the most exploited port?
Port 21-FTP
What is port 443 used for?
Port 443 _SSL is the default port used when you do credit card transactions with an e-commerce site.
Which of these memory components is the smallest representation of data?
Bit
Which of these memory components is the smallest addressable unit of memory?
Byte
Which of these memory components is a unit of data that can store four hexadecimal digits?
Word
What bit length do computer instructions use as an addressing scheme?
16
Which is the most commonly used coding scheme for computer text files?
ASCII
Which numbering system characteristic is known as the base and indicates the number of
digits in a particular numbering system?
Radix
"Which numbering system characteristic, the value of which is known as the power,"
indicates how many times a number is multiplied by itself?
Exponent.
Which numeric representation is the leftmost non-zero digit of a numeric value?
MSD
Which numeric representation is the rightmost digit of a numeric value to include zeros?
LSD
Which is defined as the various physical environments through which communication
transmission signals pass?
Media
Which is best defined as two or more computers connected together by one or more types of
media to enable the computers to share resources and/or communicate with each other?
Network
Which is a device (such as a computer or router) used as a connection point on a computer network?
Node
Which is a single-run cable or network medium that connects or channels two or more
computers together?
Segment
1) Which is a physical or logical arrangement supporting the attachment of any device to a connector or to another network device?
Interface
Which networking device modulates outgoing digital signals to analog signals for telephone line usage?
Modem
Which networking device receives a digital signal transmission via a medium and
regenerates the signal along the next leg of the medium.
Repeater
Which networking device converts data from one network format type to another and can act as a bridge to another network?
Gateway
Which networking device channels incoming data from any of multiple input ports to a
specified output port thus advancing data towards its intended destination?
Switch
Which network configuration is best suited for serving a small geographic area?
Local Area Network
Which network configuration is best suited for maintaining the Internet?
Wide area network.
Which network topology has all of the network nodes connected directly to a central
controller?
Physical Star
Which network topology requires additional cabling and is subject to message
bottlenecking?
Physical Ring
Which network topology has the advantage of having each node act as a repeater?
Physical Ring
Which network topology has all devices attached to the same transmission medium or cable backbone?
Physical Bus
Which network topology transmits all data simultaneously to all nodes on the backbone media?
Logical Bus
What is a set of rules that define how network communications are to take place?
Protocols
Which layer of the OSI model is responsible for reliable end-to-end also called host-to-host
packet delivery?
Transport
Which protocol standard is one that has become popular without the guidance of any
standards organization?
De facto
What is a family of protocols working together in a consistent fashion to provide
communication services?
Protocol Suite
What is a layered set of protocols within a protocol suite working together to define
communication between layers of the protocol suite?
Protocol Stack
In what year did transmission control protocol/internet protocol (TCP/IP) become the
official transport mechanism for DOD Internet usage?
1982
Internet protocol is composed of 32 bits which consists of
Four Sets of (8) Eight binary bits.
Which class of Internet protocol addressing would you use for large networks?
A
Which port can transfer eight bits of data or one byte simultaneously through eight separate lines in a single cable?
Parallel
Which port would you use to encrypt credit card transactions with e-commerce sites?
Port 443
What is a software license?
A legal agreement between the user and the software manufacturer that defines what the user can and cannot do with the software.
What document represents legal proof of software ownership?
A license certificate.
What do license management actions ensure?
That commercial off the shelf (COTS) software is correctly utilized with regards to how many users within a function actually have the software installed and running on their computers.
What is the most common reason for installing new software?
Upgrade to a newer version of a program you are already using.
What is the objective DOD Enterprise Software Initiative (ESI)?
"To reduce problems identified with procuring software for DOD; to include price, acquisition cost, distribution, training, maintenance, and support for common-use of compliant software standards."
Define an operating system and explain what purpose it serves.
"An operating system, or OS, is a program that manages all other programs in a computer."
List some general functions an operating system performs.
"1) Manages memory usage and distribution. 2) Process and stores local data. 3) Process and stores local data. 4) Data input entry from external devices (eg; keyboard, scanners and flash drives) 5) Graphical application presentation or output."
Describe an operational environment.
It is like a second set of resources added to the operating system to provide enhanced services.
What is the main difference between an operating system and an operating environment?
An operating environment cant be run by itself. It is dependant and relies on the operating system for resource allocation.
Define a file and what part of it must be unique?
"An entity of data available to computer system users, to include personal computers, that is capable of being manipulated as an entity. A file must have a unique name within its own directory."
Define encryption and decryption.
Encryption is the conversion of data into cipher text. Decryption is the process of converting encrypted data back into its original form so it can once again be understood.
What is VoIP?
VOIP is a term for a set of facilities used to manage the delivery of voice information over the Internet.
How does VoIP differ from traditional phone circuits?
VoIP involves sending the voice information in digital form in discrete packets rather than by using the traditional circuit-committed protocols of the public switched telephone network.
State one advantage of using VoIP.
A major advantage of using VOIP and Internet Telephone is that it avoids the tolls charged by ordinary telephone service.
What is IPv4?
"IPv4 is an early version of the IP protocol that is still in use on the Internet today. IpV4 uses a 32-bit addressing scheme, represented by four 8-bit (0-255) numbers separated by periods."
What problem has been created by the prolonged use of IPv4?
The prolonged use of IpV4 has created an Internet address shortage problem.
How does IPv6 alleviate the Internet address shortage problem?
IPv6 has IP addresses of which are lengthened from 32 bits to 128 bits. This extension anticipates
considerable future growth of the Internet and provides relief for what was perceived as an impending shortage of network addresses.
When was the Air Force information operations (IO) doctrine finalized and published?
Aug-98
According to the Air Force's operations doctrine what are the two pillars of Information
Operations (IO)?
Information Warfare and Information-In-Warfare.
What are Air Force network operating instructions (AFNOIs) and what are they used for?
AFNOIs are directive specialized publications providing operating procedures and checklists for network
"operations. AFNOIs are used to document standard processes as well as operate, maintain, or troubleshoot"
network software and equipment and are generated for technical subjects not covered by Air Force
publications or technical orders.
How do AF policy directives relate to AF instructions?
Air Force PD's are drafted at the Air Force level and provide guidance for AFI's. AFI's are drafted at the MAJCOM and Field Operating Agency (FOA) level.
What do operation instructions assign and how do they differ from AF instructions?
"OI's assign directive actions, responsibilities, and prescribe procedures. OI's differ from AFI's in that they are written at a much lower organizational level such as a squadron or flight level."
"Illegal distribution of software can subject a seller to arrest and felony charges with fines up to $250,000 and prison terms up to how many years?"
5 years.
When must each computer have a license to legally access networked software?
Prior to Utilization.
What is an entity of data available to computer system users and is capable of being
manipulated as an entity?
A File
One of the most commonly used methods of encryption is
Cryptography.
Encrypting File Systems (EFS) provide file security by
Encrypting each file with a randomly generated key.
The two major reasons why many users are attracted to Internet protocol (VoIP) services are
lower costs and increased functionality.
In what year did the Joint Staff and Armed Services consolidated the first drafts of joint doctrine?
1995
Which publications are drafted at the Air Force level and provide guidance for AFIs?
AF policy Directives
"Which publication are guidance documents for procedures that contain examples for performing standard tasks, or supporting education and training programs?"
Air Force Manuals.
Which are informational publications which are "how to" documents?
AF Pamphlets
What reason would you study your CDC's?
To pass them.
How is OPSEC defined?
OPSEC is defined as a process of identifying critical information and subsequently analyzing friendly actions attendant to military operations and activities.
How is operational effectiveness enhanced?
Operational effectiveness is enhanced when commanders and other decision-makers apply OPSEC principles from the earliest stages of planning.
Name the 5 steps in the OPSEC process.
"Identification of Critical Information, threat assessment, vulnerability analysis, risk assessment, and apply OPSEC measures."
What is the goal of OPSEC?
"The goal of OPSEC is to identify information and observable activities relating to mission capabilities, limitations and intentions in order to prevent exploitation by our adversaries."
Which security programs does OPSEC encompass?
OPSEC encompasses all Air Force Security Programs.
How does a survey differ from an inspection?
A survey attempts to produce an adversaries view of the operation or activity being surveyed. A security inspection seeks to determine if an organization is in compliance with the appropriate security directives and regulations.
How does the Air Force control critical information?
The Air Force must plan and execute OPSEC measures as early as possible during both mission and acquisition planning by actively anticipating the actions of potential adversaries.