• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/79

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

79 Cards in this Set

  • Front
  • Back
Which security program is defined as a process of identifying critical information and subsequently analyzing friendly actions attendant to military operations and other activities?
OPSEC
When was the first Air Force OPSEC program introduced?
1966
In what year was the present OPSEC program we use today established?
1970
OPSEC step that you would inform the AFOSI of potential adversaries and their associated capabilities, limitations and intentions to collect, analyze, and use critical information?
Threat assessment
Which OPSEC step would program managers and coordinators recommend actions to senior decision-makers and commanders?
Risk Assessment
Which OPSEC step would dynamic situations require you to reaccomplish preventative actions?
Apply OPSEC measures
Specific facts about friendly activities, intentions, capabilities or limitations vitally needed by adversaries for them to plan and act effectively to guarantee failure or unacceptable consequences for friendly mission accomplishment best descrive
Critical Information
In which OPSEC indicator would an abrupt changes or cancellations of schedules fall under?
Operational
Special briefings, meetings, or religions services would fall under which which OPSEC indicator?
Administrative
Deviating from normal procedures would fall under which OPSEC indicator?
Logistic and Maintenance support
Data aggregation is defined as the
collection of loosely associated data and/or information
What are among the most problematic OPSEC vunerabilities in the Air Force today?
Telephones and cell phones
The reason information is collected best describes which mandatory item of a privacy act statement?
Purpose
Disclosure of information that would result in the loss, misuse, unauthorized access, or modification that might adversely affect nation security would best be described as
Sensitive Unclassified
What specific restrictions can a designated approving authority (DAA) impose on classified systems or networks?
Prohibit the use of government owned removable storage media
What is the COMSEC program designed to do?
Detect and correct procedural weaknesses that could expose critical information
An uninvestigated or unevaluated occurence that potentially jeopardizes the security of COMSEC material or the secure transmission of government information is best described as a COMSEC
Incident
An investigated or evaluated incident that has been determined as jeopardizing the security of COMSEC material is best described as a COMSEC
Insecurity
What are the three types of COMSEC incidents?
Physical, personnel, and cryptographic
Which organization assigns COMSEC incident reports case numbers?
Air Force Communications Agency
Final reports of a COMSEC incident are due
30 days after the initial report is issued
Which security program applies discipline measures and controls to protect data computer system data against unauthorized, disclosure, modification, or destruction?
COMPUSEC
What computer softare is designed to collect personal information such as passwords and financial details without the users consent?
Spyware
What best describes an uninteded signal or noise appearing External to a piece of communications equipment?
Emanation
An unclassified term referring to technical investigations for compromising emanations from an electrically operated data processing equipment is known as
Tempest
How does the Air Force organize, train, equip, and sustain the best air and space force by
Using the AEF concept
Which condition exists when there is no apparent terrorist activity against computer networks?
INFOCON 5
WHich condition requires the mandate of increased monitoring of all network system activities when an increased risk of attack is present?
INFOCON 4
When a risk of a network system attack has been identified, which condition requires all unclassified dial-up connections be disconnected?
INFOCON 3
Which condition permits non-essential networks to be taken offline and substituted with alternate methods of communication?
INFOCON 2
At which NETOPS level is responsibility for the worldwide management and operational oversight of the defense information infrastructure globally managed?
Tier 1
At which NETOPS level are networkds managed at the local level?
Tier 3
An accreditation decision which allows a system to operate in an environment for which it was originally intended is known as
A Full accreditation
An accreditation decision which permits an information system to operate until specific identified steps can be completed is known as
an Interim accreditation
Which resources designated priority is provided whien the level of security requires the greatest possible deterrence against hostile acts?
A
Which resources designated priority is provided when the level of security requires a significant degree of deterrence against hostile acts?
B
Which resources designated priority is provided when the level of secuirty requires a reasonable degree of deterrence against hostile acts?
C
Which of the following is defined as the legal authority exercised over subordinates by virtue of rank or assignment
Command
Which best describes the definition of a unity type code (UTC)?
It is the basic building block used in joint force planning and deployments of AEFs.
Deployment execution and unit personnel preparation are responsibilities most often delegated to the
(UDM) Unit Deployment Manager
Which of the following do commanders use to report the ability of a standard UTC to perform its mission capability (MISCAP) statement worldwide and to identify its capability through the next AEF bucket?
ART
Which of the following is the Air Force computer system used for UTC package
MEFPAK
Which of the following is a DOD directed integrated joint command and control (C2) system used for conventional and theater-level nuclear operation planning and execution?
Jopes
Which database is used for the purpose of coordinating the movement of joint forces into their operational locations?
TPFDD
Which of the following is used to collect and store the data of material requirements and logistics details for UTCs?
LOGFOR
Which characteristics hsould proposed theater deployable communications (TDC) equipment strive to have?
Open system standards, interoperability, and survivability
Which is a suite of modules and accessory kits that serve as the backbone for deployed communications networks?
ICAP
TDC is composed of which three major components:
Ground satellite terminals, ICAP, NCC-D
Name two forces relating to spectrum concepts
Gravitational and electromagnetic
Radio waves travel thorough free space at the speed of light and can be
reflected, refracted, diffracted
Which frequency range is used for UHF band designation
300 to 3,000 MHz
Which frequency range is used for SHF band designation?
3 to 30 GHz
Which frequency range is used for the EHF band designation?
30 to 300 GHZ
Which are used as the primary transmissions of direct radio waves?
EHF/SHF
Waves that travel thorugh the air in a straight line (line-of-sight) from one transmitting antenna to a recieving antenna are known as
Direct waves
Which wave transmission is very effective for long-distance communications in the high-frequency range (3-30 MHz)?
Sky waves
One of the disadvantages of line-of-sight primary mode of radio transmissions is that relay stations are required
when distances exceed 30 to 40 miles
Which AOC area support team provides staff support to the Chief of AOC systems?
Communications focal point
Which area support team makes sure servers, workstations, peripherals, communications devices, and software programs are on-line and available to network users
Command and Control systems
Which of the following has the primary function of coordinating and direct immediate requests of tactical close air support to land forces?
Air support operations squadrons
Who has the mission to provide fast reaction to immediate requests from land forces or close air support?
Air support operations center
Which airborn platform collects real-time positioning and tracking data on the location of friendly and enemy aircraft and naval vessels in the AOR
E-3 sentry
Which is the primary system used for analyzing dynamic intelligence, surveillance, and reconnaissance data of rapid post-mission?
Ground data processing stations
Where would you find guidance on how to properly store, control, safeguard, transfer, and destroy COMSEC material
AFI 31-201, Volume 1
Which document provides guidance on the Information Security Program Management?
AFI 31-401
Official guidance on individual security clearances and permitting access to classified information can be found in
AFI 31-501
Which of the following provides the guidance necessary to manage the increasingly complex network environment and customers high quality service?
AFI 33-114, Volume 2
What reference would you use for guidance on Air Force messaging?
AFI 33-119
The Air Force Information Assurance (IA) Awareness Program is detailed in
AFI 33-204
Guidance for posting information on AF web sites is outlined in
AFI 33-219
The top secret control officer (TSCO) uses which form for the purpose of a "Top secret cover sheet and access" disclosure of record?
AF Form 144
Which form is used as a visitor register log to record visitors into restricted areas?
AF Form 1109
What form is used as a cover sheet to protect privacy act material?
AF Form 3227
Which form is used with a transfer report to accompany a COMSEC package?
SF 153
Before obtaining access to classified material, which document must be signed as a prerequisite?
SF 312
Personnel conducting end-of-day security checks will make sure classified material is stored appropriately at the close of each working day and record them on
SF 701
Which form would you use to properly label removable storage media containing "Top Secret" information?
SF 706
Which form would you use to properly label removable storage media containing "Secret" information?
SF 707
Which form would you use to properly label removable storage media containing "unclassified" material?
SF 710