• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/99

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

99 Cards in this Set

  • Front
  • Back
How many volts does it take to destroy a chip?
200-250 volts.
At what level can hazardous noise area restrict verbal communication and extensive exposure and cause hearing loss?
85 decibels (dB)
Items sensitive to less than 1,000 volts
Class I
Items sensitive to more than 1,000 but less than 4,000 volts
Class II
Items sensitive to more than 4,000 but less than 15,000 volts
Class III
The radix is also known as what?
Base
An exponent indicates what?
How many times a number is to be multiplied by itself.
The value of the exponent is also known as what?
Power
What two symbols does the binary numbering system use?
0 and 1
In the binary system, as the exponent increases by one...
the power doubles.
Base (radix) line.
The first base entry should always be made at teh far right and should be the base with an exponent of (0)
What is a protocol?
A set of rules that define how network communications are to take place.
What are the 7 layers of the OSI model?
Physical, Data-link, Network, Transport, Session, Presentation, Application
What is a De facto Standard?
One that has become popular without the guidance of any standards organization.
What is a family of protocols working together in a consistent fashion to provide communication services?
A protocol suite.
What is the most obvious improvement in IPv6 over the IPv4?
IP addresses are lengthened from 32 to 128 bits.
What is one type of interface that connects a device to the system unit by transmitting data one bit at a time?
A serial port.
What is the default port used when you do credit card transactions with e-commerce sites?
Port 443
What is a computar network that covers a small geographic area?
a LAN
What is an intermediate based entwork that interconnects users with computer resources in a moderate geographic area or region?
a MAN
What are the two main drivers for using a VPN?
Remote access and Extranet connections.
What allows outside users access to data on the network through a secure Web browser connection?
a VPN
What kind of data tranmissions are sent simultaneously to all nodes on the backbone media?
Logical bus topology
What allows transmisson from one point to several locations?
Multipoint
What type of switch makes its switching decision based solely upon the MAC address?
Layer 2
What type of switch makes its switchign decision based upon the MAC and IP addresses?
Layer 3
This switch reads the first 64 bytes before forwarding the frame?
Fragment free
What are nodes on a network that also acts as a bridge or entrance to another network?
Gateways
What is a networking device that channels incoming data from any of multiple input ports to the specific output port?
A switch
Have no physical constraints confining the signal to a set path.
Unguided/Unbound Media
What is Eternet?
a LAN architecture implemented in the physical layer of the OSI layer.
What are the 6 Operating systems tasks?
Processor management, Memory management, Device management, Storage management, Application interface, and user interface.
What feature is designed to keep viruses from infecting your system?
Prevention
What results from taking all meausres available to deny unauthorized persons information of value that might be derived from interception and analysis of compromising emanations from cryptological and information processing equipment?
Emission security
What are vulnerabilities?
Anything that causes availability, integrity, confidentiality and accountability to suffer where automated systems are concerened.
What is the practive of encapsulating a message that would be rejected by the firewall inside a second message that will pass through it?
Tunneling
What is a bastion host?
Type of firewall used to separate secure sites, networks, or network segments from less secure areas.
What are some advantages fo fixed wireless?
The ability to connect with users in remote areas without the need for laying new cables and the capacity for broad bandwidth that is not impeded by fiber or cable capacities.
What is amongst the most problematic OPSEC vulnerabilities in teh Air Force today?
Telephones and cell phones.
What is EMSEC?
The protection resulting from all measures taken to deny unauthorized personnel information of value that might be derived from communications systems and cryptographic equipment intercepts and the interception and analysis of compromising emanations from cryptographic equipment, information systems, and telecommunications systems.
What is the three-dimensional space surrounding equipment that processes classifed or sensitive information?
Inspectable space
What is the CITS program used for?
Acquisition, sustainment, implementation, and upgrade of high speed, broadband and digital information transport assets.
What system provides combatant commanders one predominant source for generating, receiving, sharing, and using information securely.
The Global Command and Control Systems (GCCS)
What system helps joint force commanders synchronize the actions of air, land, sea, space and special operations forces?
The Global Command and Control Systems (GCCS)
What system provides information interoperability across combat support functions and between combat support and command and control functions in support of the joint warfighter?
The Global combat Support Systems (GCSS)
What is at the center of the GCSS?
The common operating and data enviornments
What is the DOD information environment doing to ensure that warfighters and national decision makers achieve information and decision superiority?
Moving from broadcast and point-to-point communications to a net-centric environment.
What is the Global Information Grid's (GIG) vision?
To empower users through easy access to information anytime and anyplace, under any condition, with attendant security.
What is the main benefit of the GIG?
Improved speed and quality of information with which to make decisions.
What allows you to organize a database with the capability to request or query only the information necessary to fulfill a requirement?
Data structures
What is the structured description of records?
Schema
What does the schema describe?
The objects that are represented in the database, and the relationships among them, for example a "Name" data field may consist of two data fields of "First" and "Last" name types.
What is a database table?
A set of data elements (values) that is organized using a model of horizontal rows and vertical columns.
What are also relational data tables?
Views
When are views data calculated?
At query time.
What is the main purpose of a database?
To make data independent of the programs that use it.
What is normalization?
The process of organizing data into tables in such a way that the results of using the database are unambiguous as intended.
What 3 features does the Air Force Portal provide?
Common virtual platform for access and sharing acurate info, catalyst for reducing overlap and duplication among cross functional information systems, and means for conducting self service functions.
What is the PCP environment used for?
To enter data into online publishing forms
Users cannot publis to channels;
they can only display titles or are category separators.
What must be entered into PCP before it can be deployed?
The content
What 3 parts are to a table?
Row, header and data cell
Air Force profesionals can share information as the norm which is acessed from what?
A single authoritative source
Have full control of the site
Owners
Can contribute content to the site
Members
Can approve content submitted by contributors and contribute content
Approvers
At what level is indexing and search features activated by default for all information tored in SharePoint?
Central administration level
Knowledge Management is described as
managing an organization's knowledge-level information in a way that allows easy, usable access by members for use in decision-making.
What provides a Web bsed collaborative environment where members of a group use shared information and administrative and communications tools to conduct business, manage a project, keep abreast of important group issues, and solve group problems.
A Community of Practive (CoP) workspace.
Images must be .jpg or .gif and should not be wider than
420px.
Who creates subdirectores on the shared drive for each office?
The FARM and/or RC
What are the two types of vital records?
Emergency-operating records and records needed to protect rights.
What ensures standardization and accuracy of every record series by ensuring offices Air Force wide use the same disposition instructions for records?
Air Force Records Information Management System (AFRIMS)
Cutoff falls into these three categories;
N/A-disposition instruction does not contain a month or year; MO-disposition instructions contain 1 to 11 months; 30 Sep/31 Dec- disposition instruction contains a year or 12 months or more.
Records not authorized for a specific disposition have a rentention period of what?
Permanent
With who's approval can a waiver be granted to keep small volumes of 2-8 year retention records in the current files area until those itmes are eligable for disposal or retirement if no additional space or equipment is needed?
The base RM
What is the official daily publication for rules, proposed rules, and notices of Federal agencies and organizations, as well as executive orders and other presidential documents?
Federal Register
This class consists of newspapers and periodical publications issued regularly and on a continuing basis.
Periodical mail
What do you do with sealed and unsealed containers endorsed "DO NOT FORWARD" that remain in action offices at the close of business?
Must be stored in a classified storage container.
Could reasonably be expected to cause exceptionally grave damage to national security.
Top Secret
Could reasonably be expected to cause serious damage to national security.
Secret
Coudl reasonably be expected to cause damage to national security.
Confidential
What is Derivative classification?
The act of incorporating, paraphrasing, restating, or generating in new form information that is already classified and marking the newly developed material consistent with the markings of the source information.
What form do you use when classified information is taken out of apporved storage containers?
SF 702
What is any knowing, willful, or negligent action that could reasonably be expected to result in an unauthorized disclosure of classified information?
Security Violation
What is the best choice for ensuring that accountable containers remains in a controlled enviornment?
Registered Mail
What are the 3 basic formats for form memorandums?
Prewritten, Fill-In and Optional statement.
When a FOIA office withholds a record from release because they determine the record is exempt under one or more of teh exemptions, the requester may appeal that decision, in writing, to the...
Secretary of the Air Force
Annual reports are reported by each bse FOIA manager using what?
The current DD form 2564, Annual Report Freedom of Information Act.
To avoid unauthorized disclousure of PA information, the system manager must verify the identity of all requesters unless teh record sought is available to
anyone under the FOIA.
In 1998, congres amended the Rehabilitation Act for what?
To require Federal agencies to make their electronic and information technoloygy accessible to people with disabilities.
What are Federal Statutes responsible for?
Most of the federal information infrastructure used in managing information in today's electronic environment.
The authority for the functions and responsibilities of knowledge operations management orginates in what?
The United States Code (USC) and Public Law (PL)
Information managment (IM)
Encompasses the planning, budgeting, manipulating, and controlling information throughout its lifecycle.
Joint publication 3-0
Function of managing an organization's information resources by the handling knowledge acquired by one or many different individuals and organizations in a way that optimizes acess by all who have the right to access that knowledge.
Data Managment
A core competency that plans, coordinates, shares, and controls your organization
Knowledge Management
A core competence to handle, direct, govern, or control natural knowledge processes within an organization to achieve the organization goals and objectives.
TAG (Training Advisory Group)
The advisory groups provide a cohesie approach to address training management issues affecting AFSCs.
To conduct effective cyber combat operations, what must the Air Force do?
Develop the support structures and programs to sustain and develop cyber capabilities.