Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
102 Cards in this Set
- Front
- Back
Year the AF published its IO doctrine
|
1998 |
|
Directive publications that provide guidance on implementing AF policies
|
AFIs |
|
AFI that provides online posting procedures |
33-115 |
|
AFI for transmission security |
33-119 |
|
Visitor Request Log |
AF Form 1109
|
|
AFI detailing the IA program
|
33-200 |
|
AF manual for computer security |
AFMAN 33-282 |
|
Two categories of the OSI model |
Application and Data Transport |
|
OSI layer that hubs operate at |
Physical |
|
OSI layer that switches and bridges operate at
|
Data Link |
|
OSI layer that routers operate at
|
Network |
|
OSI layer where virtual circuits are maintained |
Transport |
|
Matches a known IP address to a MAC address |
ARP |
|
Assigns an IP address to a known MAC address
|
RARP
|
|
Provides standards for Data Link protocols |
IEEE Project 802 |
|
Provides reliable data delivery |
TCP |
|
Transmission of data without establishing a connection |
UDP |
|
FTP port |
21 |
|
HTTP port |
80 |
|
POP3 port |
110 |
|
SNMP port, manages routers that compose the internet |
161 |
|
Secure Socket Layer port, used for credit card transactions |
443 |
|
Port for HTTP servers and proxies |
8080 |
|
Network protocol designed for a single network for all traffic |
Asynchronous Transfer Mode |
|
Designed for a single digital telecommunications network |
Integrated Services Digital Network |
|
ISDN transmission rate |
144 Kbps |
|
IP address class with 126 networks with 16,777,214 hosts |
class A |
|
IP address class with 16,384 networks with 65,534 hosts |
class B |
|
IP address class with 2,097,152 networks with 254 hosts |
class C |
|
IP address class reserved for multicast addressing |
class D |
|
IP address class reserved for research and development |
class E |
|
Allows a network device to divide an IP address into a network and host number |
Subnet mask |
|
Default mask of a class A address |
255.0.0.0 |
|
Default mask of a class D address |
255.255.255.255 |
|
IPv6 compression that requires at least one number left in each field |
Leading Zero Compression
|
|
Unicast address scope that will not operate in an interface that requires a router |
Link local |
|
Unicast address scope that does not route outside the site
|
Site local |
|
Unicast address scope that is essentially public
|
Aggregatable Global |
|
Storage of BIOS system
|
Complementary Metal Oxide System(CMOS) |
|
Difference between CSMA/CD and CSMA/CA |
CSMA/CA listens for network silence and then sends a warning signal telling the other stations not to transmit
|
|
WLAN security concerns
|
War drivers, employees, hackers, rogue access points |
|
What IDE/ATA is designed to do |
Integrate the controller onto the drive itself, instead of relying on a stand-alone controller board
|
|
Pins in IDE/ATA interface |
40 |
|
Disadvantage of IDE/ATA |
Designed for hard drives only |
|
Advantage of SATA |
Thinner serial cables allow more efficient airflow inside computer chassis |
|
How many peripherals USB can handle at once |
127 |
|
How many devices can attach to a FireWire bus |
63 |
|
Primary use for a bridge
|
Separate network into 2 segments
|
|
Two rules that must be considered before implementing a bridge |
80/20 rule and elimination of bridging loops |
|
Bridging used on ethernet networks |
Transparent |
|
Five functions in transparent bridging |
Learning, flooding, forwarding, filtering, aging |
|
What LAN switches provide |
Collision-free high speed communication |
|
Type of switching required when a frame must be moved from low-speed LAN to high-speed |
Store-and forward |
|
Metrics routers use to determine the best route |
Path length, bandwidth, reliability |
|
Two types of encryption |
Data and voice |
|
Two devices used for encryption |
TSEC KIV-7, TSEC KIV-19 |
|
Two telephone devices used for voice encryption |
STU and STE |
|
How can encryption be applied |
End-to-end, link, bulk |
|
Two types of modems |
Dial-up, dedicated |
|
Principal function of a CSU |
Provide a barrier for interference from either side of the unit |
|
Applications are known as ____ |
end-user programs |
|
When Bell Labs developed the UNIX operating systems |
Early 1970s |
|
Common UNIX shells |
Bourne, Korn, C, Restricted |
|
Where UNIX partitions are established |
During system config |
|
UNIX directory where applications are contained |
usr |
|
UNIX firmware prompt on Sun machines |
OK |
|
Hard drives have a ____ coating |
Electronic |
|
Type of bridge that connects on Data Link protocol to another |
Translational |
|
Also known as runtless switching |
Cut-through |
|
Voice band range analog modems operate on |
20 Hz to 20 MHz |
|
2 anti-virus programs used by the air force |
Norton and McAfee |
|
Windows Server edition that does not operate as a domain controller |
Datacenter |
|
Windows Server edition that provides support for WSRM and metadirectory services |
Enterprise |
|
Windows Server edition that provides support for high-end high-traffic application servers |
Datacenter |
|
Document containing AFSC responsibilites |
CFETP |
|
Integrated bundle of expert knowledge |
Core competency |
|
Who does UT&W bring together |
MFMs, subject matter experts, instructors from 3-level courses, 5-level CDC writers, 7-level CDC writers and instructors, representatives from Occupational Measurement Squadron |
|
What do training advisory groups do |
Address training management issues, review training concerns and successes and coordinate training initiatives |
|
MIssion of an OSS |
Control air traffic, manage airfield, weather support, train ATC |
|
Mission of an Electronic Warfare Center |
Planning, coordinating and executing information operations |
|
Mission of an air control squadron |
Provides a mobile, combat-rated senior radar element of the theater air control system for worldwide contingencies |
|
AFOSH standard for hearing conservation |
48-20 |
|
AFI for occupational safety instruction |
91-203 |
|
AFI for hazard communication |
90-821 |
|
Who to coordinate the disposal of hazardous waste material with |
Host environmental management |
|
Ionizing radiation |
EM radiation whose waves contain sufficient energy to overcome the binding energy of electrons |
|
Risk management AFI |
90-802 |
|
Four principles of RM |
Accept no unnecessary risk, make risk decisions at the appropriate level, accept risk when benefits outweigh the cost, integrate RM into operations and planning at all levels |
|
Document for tempo banding |
AFPD 10-4 |
|
Authority on AEF execution |
Secretary of Defense |
|
Purpose of support force modules |
Augment the AETF FMs and identify the additional capability to support continual rotational presence |
|
Examples of operational capabilities packages |
DSCA, Humanitarian relief operations, NEO, support of international law enforcement |
|
Three systems in the TPN-19 |
OK-235/236, TPN-24, TPN-25 |
|
Information provided by the TPN-25 PAR |
Azimuth and elevation |
|
TPN provides ATCs the ability to locate aircraft up to __ miles away |
60 |
|
How many display indicators provided by the ASR and PAR systems |
6 |
|
Purpose of C4ISR |
Collects, processes, produces, disseminates and uses information |
|
Ground theater air control elements |
AOC, control and reporting center, air support and operations center, tactical air control party |
|
85th engineering installation squadron MAJCOM |
AFSPC |
|
Air tasking order |
Lead planning document commanders follow |
|
What GTACS provides |
Range, precision, low signature, control |
|
Purpose of DATCALS |
Provides capability to identify, sequence and separate aircraft and provide approach guidance to aircraft in all types of weather |