Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
79 Cards in this Set
- Front
- Back
Which security program is defined as a process of identifying critical information and subsequently analyzing friendly actions attendant to military operations and other activities?
|
OPSEC
|
|
When was the first Air Force OPSEC program introduced?
|
1966
|
|
In what year was the present OPSEC program we use today established?
|
1970
|
|
OPSEC step that you would inform the AFOSI of potential adversaries and their associated capabilities, limitations and intentions to collect, analyze, and use critical information?
|
Threat assessment
|
|
Which OPSEC step would program managers and coordinators recommend actions to senior decision-makers and commanders?
|
Risk Assessment
|
|
Which OPSEC step would dynamic situations require you to reaccomplish preventative actions?
|
Apply OPSEC measures
|
|
Specific facts about friendly activities, intentions, capabilities or limitations vitally needed by adversaries for them to plan and act effectively to guarantee failure or unacceptable consequences for friendly mission accomplishment best descrive
|
Critical Information
|
|
In which OPSEC indicator would an abrupt changes or cancellations of schedules fall under?
|
Operational
|
|
Special briefings, meetings, or religions services would fall under which which OPSEC indicator?
|
Administrative
|
|
Deviating from normal procedures would fall under which OPSEC indicator?
|
Logistic and Maintenance support
|
|
Data aggregation is defined as the
|
collection of loosely associated data and/or information
|
|
What are among the most problematic OPSEC vunerabilities in the Air Force today?
|
Telephones and cell phones
|
|
The reason information is collected best describes which mandatory item of a privacy act statement?
|
Purpose
|
|
Disclosure of information that would result in the loss, misuse, unauthorized access, or modification that might adversely affect nation security would best be described as
|
Sensitive Unclassified
|
|
What specific restrictions can a designated approving authority (DAA) impose on classified systems or networks?
|
Prohibit the use of government owned removable storage media
|
|
What is the COMSEC program designed to do?
|
Detect and correct procedural weaknesses that could expose critical information
|
|
An uninvestigated or unevaluated occurence that potentially jeopardizes the security of COMSEC material or the secure transmission of government information is best described as a COMSEC
|
Incident
|
|
An investigated or evaluated incident that has been determined as jeopardizing the security of COMSEC material is best described as a COMSEC
|
Insecurity
|
|
What are the three types of COMSEC incidents?
|
Physical, personnel, and cryptographic
|
|
Which organization assigns COMSEC incident reports case numbers?
|
Air Force Communications Agency
|
|
Final reports of a COMSEC incident are due
|
30 days after the initial report is issued
|
|
Which security program applies discipline measures and controls to protect data computer system data against unauthorized, disclosure, modification, or destruction?
|
COMPUSEC
|
|
What computer softare is designed to collect personal information such as passwords and financial details without the users consent?
|
Spyware
|
|
What best describes an uninteded signal or noise appearing External to a piece of communications equipment?
|
Emanation
|
|
An unclassified term referring to technical investigations for compromising emanations from an electrically operated data processing equipment is known as
|
Tempest
|
|
How does the Air Force organize, train, equip, and sustain the best air and space force by
|
Using the AEF concept
|
|
Which condition exists when there is no apparent terrorist activity against computer networks?
|
INFOCON 5
|
|
WHich condition requires the mandate of increased monitoring of all network system activities when an increased risk of attack is present?
|
INFOCON 4
|
|
When a risk of a network system attack has been identified, which condition requires all unclassified dial-up connections be disconnected?
|
INFOCON 3
|
|
Which condition permits non-essential networks to be taken offline and substituted with alternate methods of communication?
|
INFOCON 2
|
|
At which NETOPS level is responsibility for the worldwide management and operational oversight of the defense information infrastructure globally managed?
|
Tier 1
|
|
At which NETOPS level are networkds managed at the local level?
|
Tier 3
|
|
An accreditation decision which allows a system to operate in an environment for which it was originally intended is known as
|
A Full accreditation
|
|
An accreditation decision which permits an information system to operate until specific identified steps can be completed is known as
|
an Interim accreditation
|
|
Which resources designated priority is provided whien the level of security requires the greatest possible deterrence against hostile acts?
|
A
|
|
Which resources designated priority is provided when the level of security requires a significant degree of deterrence against hostile acts?
|
B
|
|
Which resources designated priority is provided when the level of secuirty requires a reasonable degree of deterrence against hostile acts?
|
C
|
|
Which of the following is defined as the legal authority exercised over subordinates by virtue of rank or assignment
|
Command
|
|
Which best describes the definition of a unity type code (UTC)?
|
It is the basic building block used in joint force planning and deployments of AEFs.
|
|
Deployment execution and unit personnel preparation are responsibilities most often delegated to the
|
(UDM) Unit Deployment Manager
|
|
Which of the following do commanders use to report the ability of a standard UTC to perform its mission capability (MISCAP) statement worldwide and to identify its capability through the next AEF bucket?
|
ART
|
|
Which of the following is the Air Force computer system used for UTC package
|
MEFPAK
|
|
Which of the following is a DOD directed integrated joint command and control (C2) system used for conventional and theater-level nuclear operation planning and execution?
|
Jopes
|
|
Which database is used for the purpose of coordinating the movement of joint forces into their operational locations?
|
TPFDD
|
|
Which of the following is used to collect and store the data of material requirements and logistics details for UTCs?
|
LOGFOR
|
|
Which characteristics hsould proposed theater deployable communications (TDC) equipment strive to have?
|
Open system standards, interoperability, and survivability
|
|
Which is a suite of modules and accessory kits that serve as the backbone for deployed communications networks?
|
ICAP
|
|
TDC is composed of which three major components:
|
Ground satellite terminals, ICAP, NCC-D
|
|
Name two forces relating to spectrum concepts
|
Gravitational and electromagnetic
|
|
Radio waves travel thorough free space at the speed of light and can be
|
reflected, refracted, diffracted
|
|
Which frequency range is used for UHF band designation
|
300 to 3,000 MHz
|
|
Which frequency range is used for SHF band designation?
|
3 to 30 GHz
|
|
Which frequency range is used for the EHF band designation?
|
30 to 300 GHZ
|
|
Which are used as the primary transmissions of direct radio waves?
|
EHF/SHF
|
|
Waves that travel thorugh the air in a straight line (line-of-sight) from one transmitting antenna to a recieving antenna are known as
|
Direct waves
|
|
Which wave transmission is very effective for long-distance communications in the high-frequency range (3-30 MHz)?
|
Sky waves
|
|
One of the disadvantages of line-of-sight primary mode of radio transmissions is that relay stations are required
|
when distances exceed 30 to 40 miles
|
|
Which AOC area support team provides staff support to the Chief of AOC systems?
|
Communications focal point
|
|
Which area support team makes sure servers, workstations, peripherals, communications devices, and software programs are on-line and available to network users
|
Command and Control systems
|
|
Which of the following has the primary function of coordinating and direct immediate requests of tactical close air support to land forces?
|
Air support operations squadrons
|
|
Who has the mission to provide fast reaction to immediate requests from land forces or close air support?
|
Air support operations center
|
|
Which airborn platform collects real-time positioning and tracking data on the location of friendly and enemy aircraft and naval vessels in the AOR
|
E-3 sentry
|
|
Which is the primary system used for analyzing dynamic intelligence, surveillance, and reconnaissance data of rapid post-mission?
|
Ground data processing stations
|
|
Where would you find guidance on how to properly store, control, safeguard, transfer, and destroy COMSEC material
|
AFI 31-201, Volume 1
|
|
Which document provides guidance on the Information Security Program Management?
|
AFI 31-401
|
|
Official guidance on individual security clearances and permitting access to classified information can be found in
|
AFI 31-501
|
|
Which of the following provides the guidance necessary to manage the increasingly complex network environment and customers high quality service?
|
AFI 33-114, Volume 2
|
|
What reference would you use for guidance on Air Force messaging?
|
AFI 33-119
|
|
The Air Force Information Assurance (IA) Awareness Program is detailed in
|
AFI 33-204
|
|
Guidance for posting information on AF web sites is outlined in
|
AFI 33-219
|
|
The top secret control officer (TSCO) uses which form for the purpose of a "Top secret cover sheet and access" disclosure of record?
|
AF Form 144
|
|
Which form is used as a visitor register log to record visitors into restricted areas?
|
AF Form 1109
|
|
What form is used as a cover sheet to protect privacy act material?
|
AF Form 3227
|
|
Which form is used with a transfer report to accompany a COMSEC package?
|
SF 153
|
|
Before obtaining access to classified material, which document must be signed as a prerequisite?
|
SF 312
|
|
Personnel conducting end-of-day security checks will make sure classified material is stored appropriately at the close of each working day and record them on
|
SF 701
|
|
Which form would you use to properly label removable storage media containing "Top Secret" information?
|
SF 706
|
|
Which form would you use to properly label removable storage media containing "Secret" information?
|
SF 707
|
|
Which form would you use to properly label removable storage media containing "unclassified" material?
|
SF 710
|