Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
84 Cards in this Set
- Front
- Back
What document establishes basics of Cyberspace Operations design, planning, execution and assessment? |
Air Force Doctrine Document (AFDD) 3-12, Cyberspace operations |
|
This document defines cyberspace as "a global domain within the information environment consisting of the interdependent network of information technology infrastructures, |
Air Force Doctrine Document (AFDD) 3-12 |
|
This document is the core AFSC training document used for training enlisted personnel. |
CFETP |
|
The purpose of this is to provide the information necessary for Air Force Career Field Managers (AFCFMs) Majcom Functional Managers (MFM) commanders and others plan/develop/conduct an effective field career training program. |
CFETP |
|
This outlines the initial skills, upgrade, qualification, advanced, and proficiency training requirements for those individuals in specific AFSCs in order to promote career progress. |
CFETP |
|
The 3D CFETPS are maintaind by the 3D000 and 3D100 ______________? |
Air Force Career Field Managers |
|
This is the tasks assigned to a person for the position currently held, include at a minimum all core tasks, and tasks assigned by supervisor in accordance with IAW AFI 36-2201, Classifying Military Personnel (Officer and Enlisted) |
Duty Position Tasks |
|
These are defined as an integrated bundle of expert knowledge and organizational skills |
Core Competencies |
|
These are defined as "minimum qualification requirement for everyone within an AFSC, |
Core tasks |
|
This field "is concerned primarily with the function of handling |
3D0X1, Knowledge Operations Management |
|
This field "focuses its attention on the administration of servers and |
3D0X2, Cyber Systems Operations |
|
This field, "deals with the protection of information in the Air Force domain of |
3D0X3, Cyber Surety |
|
This is " a small but valuable career field which |
3D0X4, Computer System Programming |
|
This field "provides first tier technical support to communication systems users |
3D1X1, Client Systems |
|
This field "maintains the communications backbone infrastructure in |
3D1X2, Cyber Transport |
|
These people "deploy, sustain, troubleshoot, and repair standard RF line-of-sight, wideband and ground-based satellite devices. This specialty handles both ground-to ground and ground-to-air radio systems, as well as fixed and deployable satellite ground terminals." |
RF Transmission Systems 3D1X3 |
|
This field "analyzes and requests radio frequency spectrum space to support fixed |
3D1X4, Spectrum Operations |
|
This field handles" all Air Force radar systems in support of ground, air and weather operations around the world. This career field installs, maintains and repairs fixed and deployable air traffic, weather, ground air control, and warning radar systems. This includes friend-or-foe identification systems, visual display systems and remote equipment." |
3D1X5, Ground Radar Systems |
|
This field has technicians who "Provide expertise in the area of meteorological, navigation and |
3D1X6, Airfield Systems |
|
This fields personnel " take care of the many different types of medium that Air Force and DOD information must traverse. These technicians install, maintain, and configures fixed cable and wireless signal distribution systems. They are also responsible for the installation and maintenance of large scale network wiring in support of fixed and deployed operations." |
3D1X7, Cable and Antenna Systems |
|
How many Career fields are there in Cyberspace Operations? (3D0XX) |
7 |
|
How many Career fields are there in Cyberspace Systems? (3D1XX) |
4 |
|
This person acts as the central control point to assist with allocating training, and providing career guidance to all 3D personnel assigned to an installation. |
Career Field Managers |
|
This person is the advisor for all matters affecting the career field. He/she communicates directly with MAJCOM functional managers and AETC training managers for all career field policies and program requirements. This person is also the chairsperson for the career fields utilization and training workshop. This person is also the final waiver authority for career field education (CDC's, tech school etc) |
Air Force Career Field Manger (AFCFM) |
|
This person advises MAJCOM commanders and their staff on manpower utilization and training issues. Also serves as the MAJCOM voting representative during career field U&TW's. Assists with the dissemination of information regarding Air Force and career field policies/plans/programs and procedures to subordinate units. Also identifies subject matter experts to help with the development of specialty knowledge tests and our career development course. Primary MAJCOM reviewer on career devlopment course training and classification waiver request packages, Also cordinates on all Majcom staffing and manpower issues. |
MAJCOM functional manager |
|
This persons duties are normally asigned to the on station ranking 3DXXX cyberspace superintendent or chief enlisted manager (CEM). This person manages the following functions; system analysis and design, programming, systems operation, maitenance, resource management, and security management. |
Base Functional Manager |
|
This person assists unit personnel in the management of the unit’s training programs to |
Unit Training Manager |
|
This brings MAJCOM functional managers and subject matter experts together from across the |
Utilization and Training Workshop (U&TW) |
|
These,
-Set training goals and priorities.
-Review training programs impacting the communications and information community,
-Evaluate emerging training, training tracking, and technologies. |
Training advisory groups (TAG) |
|
These are surveys sent to Airmen asking how they spend their day during the job, these results are implemented as the focus of the 3 level school, and for the specialty knowledge test (SKT) |
Airmen Advancement Division (ADD) Surveys |
|
This person ensures job rotation occurs on the installation. |
Base Functional Manager |
|
Typically, the __ month point is when job rotation should take place. |
24 |
|
Benefits of job rotation are? (6) |
Fosters personal and professional growth, also goes hand and hand with career progression, reduced boredom, reduced work stress, increased innovation, and increased production. |
|
This AFOSH number is for the Occupational Noise and Hearing Conservation program. |
AFOSH 48-20 |
|
This AFOSH number is for Material Handling and Storage Equipment. |
AFOSH 91-46 |
|
This AFOSH number is for Communications Cable, Antenna & Communications-Electronics |
AFOSH 91-50 |
|
This AFOSH number is for Data Processing Facilities |
AFOSH 91-64 |
|
This AFOSH number is for Chemical Safety |
AFOSH 91-68 |
|
This AFI number is for Air Force Occupational and Environmental Safety, Fire Protection, and Health (AFOSH) Program. |
AFI 91–301 |
|
This AFI number is for Hazard Communication. |
AFI 90–821 |
|
If you believe a potential safety hazard may exist, immediately secure the area and contact your? (3) |
Supervisor, Unit Safety Rep, or Ground Safety Office. |
|
This AFPD number is for Environmental, Safety, and Occupational Health |
AFPD 90–8, |
|
The severity of electric shock is determined by the amount of? (3) |
Current flowing through the body, the |
|
Normally, any voltage capable of producing a |
50 miliampres |
|
When a metal object, such as a tool, comes in contact between a high current (amperage) source and ground, it becomes a? |
Conductor |
|
High current will flow from the electrical terminal (source) through the tool to ground, resulting in an? |
Arc |
|
An electric arc can cause? (2) |
Serious burns to the body, blindness |
|
This type of radiation is electromagnetic (EM) radiation whose waves contain energy sufficient to overcome the binding energy of electrons in atoms or molecules, thus creating |
Ionizing Radiation |
|
This is an atom or group of atoms in which the number of electrons is different from the |
Ion |
|
If the number of electrons is less than the number of protons, the particle is a |
Cation |
|
If the number of electrons is greater than the number of protons, the |
Anion |
|
Radioactive material is safe when? (2) |
It is in intact electron tubes, there are not a mass of tubes in a small location. |
|
This type of radiation produces heat in body tissues, is both frequency dependent and body-shape dependent. This type of radiation is possible for a person to absorb selectively damaging amounts of nonionizing radiation in deep tissue, harming organs with little or no sensation of skin heating. |
Nonionizing Radiation |
|
When you need to dispose of hazardous waste material, coordinate the hazardous waste disposal with the host installation environmental management such as the? |
Bioenvironmental engineering. (BE) |
|
This is the form for the USAF Hazard Report. |
AF IMT 457 |
|
Who are the 3 entities you can inform regarding a hazard? |
Supervisor, Ground Safety Office using an AF IMT 457 (USAF Hazard Report) OR notify the safety office by telephone. |
|
Personnel who install, maintain, relocate, or inspect communications systems or perform duties as safety observers will receive training in? (4) |
CPR, Bleeding control, shock management, and emergency care. |
|
SABC training can be documented using an AF Form? (1) And will be documented on the individuals AF Form (1) ? |
Training can be documented using an AF Form 1098, Special Task Certification and Recurring Training, for military or an approved computer automated system. Safety-related training is also documented on the individual’s AF Form 55, Employee Safety and Health Record. |
|
When are safety officers required? |
When installing or repairing Communications-Computer Systems (C-CS) equipment, communications cable, and antenna systems that expose workers to energized equipment |
|
What is considered a high voltage circuit? |
600 volts or above. |
|
T/F, Safety observers must be trained and remain current in First Aid and CPR? |
True |
|
Where voltages of ___ volts or more are present, each data processing facility must provide safety boards and emergency equipment, T/F? |
600 |
|
This is a decision-making process to systematically evaluate possible |
Operational Risk Management |
|
What are the 6 steps to ORM? |
1. Identify the Hazard 2. Assess the risk 3. Analyzer risk control measures 4. Make control decisions 5. Implement risk controls 6. Supervise and review |
|
Hazardous noise areas could restrict verbal communication and extensive exposure at levels at or |
85 |
|
This is what signs should say at all enterances to Hazardous noise areas- |
CAUTION: HAZARDOUS NOISE AREA HEARING PROTECTION REQUIRED |
|
National Fire Protection Association (NFPA) ___ Life Safety Code, may be refrenced for guidance on proper building lighting. |
101 |
|
All tape stands and storage racks will be of sound construction and will not exceed _ feet in |
7 |
|
What are the sheets required to be posted when chemicals are present? |
MSDS (Material safety data sheets) |
|
If flammable or toxic cleaning fluid must be used within a computer facility, |
1 |
|
Under no circumstances will materials be stacked within __ inches of ceiling fire sprinkler heads or |
18 |
|
Emergency control switches will be installed in ___ data processing rooms |
All |
|
In the event or a water spill, equipment will be shut down before it is covered with? |
Plastic Sheething |
|
Any voltage capable of producing a current of __ milliamperes can be lethal. |
50 |
|
What kills you, current or voltage? |
Current |
|
Cyberspace is defined in what Air Force Doctrine Document? |
3-12, Cyberspace Operations |
|
This is responsible for the day-to-day defense and protection is the? |
USCYBERCOM |
|
This is the USAF major command for the cyberspace mission |
AFSPC (Air Force Space Command) |
|
The __th Air Force functions as the air component to the DOD cyber mission. |
24AF |
|
These operations support US cyberspace objectives by denying, degrading, disrupting, destroying, or altering the adversary’s ability to use cyberspace. |
Offensive |
|
These operations detect and deny access when unauthorized intrusions are attempted. They determine the source, minimize the effectiveness and help to recover in a timely manner. |
Defensive |
|
Defensive activities are both ______ and ________. |
Active and reactive |
|
These activities seek passwords and other information via e-mail. |
Phishing |
|
All Information Technology systems must be evaluated and certified by the ? |
Defense Information Systems Agency Joint Interoperability Test Command. |