• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/30

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

30 Cards in this Set

  • Front
  • Back
How many people can make up a team that is awarded the General Edwin W. Rawlings Award?
2 to 25
Which award in the AF communications and Information Annual Awards Program is named for the first commander of the AF communications service?
LT GEN Harold W. Grant Award
How many days must an individual have performed in the AFSC for nomination as the AF Info Mgt Outstanding Airman Award?
More than 180 days
What AFSC is qualified for nomination of the AF Info MGT outstanding NCO Award?
3Axxx Only
What is recognized during the quarterly awards program?
Individuals and teams only
What are the types of selection process for quarterly awards program?
Written packages and boards
What are the overarching elements of operationalizing the network?
Readiness and operational reporting
What does a MAJCOM network operations and security center provide commanders?
Real-time operational network intrusion detection
Who provides technical assistance to assigned network control centers?
Network operations and security center
Which task is the NCC responsible for?
Provide a core set of office automation application support services
Who is the lead command for the combat Information transfer system?
AF Communications Agency
What doe sthe combat information transfer system mgt office develop and maintain
Voice switching system and telecommunications mgt syst
Which system helps joint force commanders synchronize the actions of air, land, sea, space, and speciall operations force
Global Command and Control Systems (GCCS)
What common environmnets are at the center of the global combat support systems (GCSS)?
Operating and data
What architecture view describes tasks and activites, operational elements, and information flow required to accomplish or support a military operation?
Operational
What architecture view is a description, including graphics, of systems and interconnections supporting warfighting fuctions?
Systems
What is the organizing and transforming construction for managing info technology throughout the DOD?
Global information grid
What is the objective of the network operations standardization and evaluation program?
Create a working environment that inspires trust, teamwork, and a quest for improvements
To which of the following does the standardization and evaluation program apply?
Work center and all personnel assigned to the base NCC
Which program ensures the authenticity of telecommunications?
Communications security
What must you consider to achieve a balance between operational espedience and communication security (COMSEC)?
Classification of the information and speed of service required
When must commanders and decisiion makers apply operations security?
Earliest stages of planning
What security program is considered the first line of defense against unauthorized access to information?
Physical
What type of vunerability results from incorrect or inadequate computer security safeguards and controls to a network?
Administrative
What is the maximum time period in whcih you must scan a computer system for viruses?
7 Calendar days
What security program is designed to deny unauthorized persons information from interception and analysis from telecommunications systems?
Emission
With what does the information assurance (IA) awareness program integrate to achieve information superiority?
Computer, communication, and emission security
Who develops an implementaion plan with the concurrence of the requester?
Communications and information systems officer
How often are systems reaccredited?
Every 3 years
What type of accreditation is used to accredit functional systems and applications that are either not deployed to other locations and are stand-alone systems?
System