• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/102

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

102 Cards in this Set

  • Front
  • Back
Year the AF published its IO doctrine

1998
Directive publications that provide guidance on implementing AF policies

AFIs

AFI that provides online posting procedures

33-115

AFI for transmission security

33-119

Visitor Request Log
AF Form 1109
AFI detailing the IA program

33-200

AF manual for computer security

AFMAN 33-282

Two categories of the OSI model

Application and Data Transport

OSI layer that hubs operate at

Physical
OSI layer that switches and bridges operate at

Data Link
OSI layer that routers operate at

Network

OSI layer where virtual circuits are maintained

Transport

Matches a known IP address to a MAC address

ARP
Assigns an IP address to a known MAC address
RARP

Provides standards for Data Link protocols

IEEE Project 802

Provides reliable data delivery

TCP

Transmission of data without establishing a connection

UDP

FTP port

21

HTTP port

80

POP3 port

110

SNMP port, manages routers that compose the internet

161

Secure Socket Layer port, used for credit card transactions

443

Port for HTTP servers and proxies

8080

Network protocol designed for a single network for all traffic

Asynchronous Transfer Mode

Designed for a single digital telecommunications network

Integrated Services Digital Network

ISDN transmission rate

144 Kbps

IP address class with 126 networks with 16,777,214 hosts

class A

IP address class with 16,384 networks with 65,534 hosts

class B

IP address class with 2,097,152 networks with 254 hosts

class C

IP address class reserved for multicast addressing

class D

IP address class reserved for research and development

class E

Allows a network device to divide an IP address into a network and host number

Subnet mask

Default mask of a class A address

255.0.0.0

Default mask of a class D address

255.255.255.255

IPv6 compression that requires at least one number left in each field
Leading Zero Compression

Unicast address scope that will not operate in an interface that requires a router

Link local
Unicast address scope that does not route outside the site

Site local
Unicast address scope that is essentially public

Aggregatable Global
Storage of BIOS system

Complementary Metal Oxide System(CMOS)

Difference between CSMA/CD and CSMA/CA
CSMA/CA listens for network silence and then sends a warning signal telling the other stations not to transmit
WLAN security concerns

War drivers, employees, hackers, rogue access points

What IDE/ATA is designed to do
Integrate the controller onto the drive itself, instead of relying on a stand-alone controller board

Pins in IDE/ATA interface

40

Disadvantage of IDE/ATA

Designed for hard drives only

Advantage of SATA

Thinner serial cables allow more efficient airflow inside computer chassis

How many peripherals USB can handle at once

127

How many devices can attach to a FireWire bus

63
Primary use for a bridge
Separate network into 2 segments

Two rules that must be considered before implementing a bridge

80/20 rule and elimination of bridging loops

Bridging used on ethernet networks

Transparent

Five functions in transparent bridging

Learning, flooding, forwarding, filtering, aging

What LAN switches provide

Collision-free high speed communication

Type of switching required when a frame must be moved from low-speed LAN to high-speed

Store-and forward

Metrics routers use to determine the best route

Path length, bandwidth, reliability

Two types of encryption

Data and voice

Two devices used for encryption

TSEC KIV-7, TSEC KIV-19

Two telephone devices used for voice encryption

STU and STE

How can encryption be applied

End-to-end, link, bulk

Two types of modems

Dial-up, dedicated

Principal function of a CSU

Provide a barrier for interference from either side of the unit

Applications are known as ____

end-user programs

When Bell Labs developed the UNIX operating systems

Early 1970s

Common UNIX shells

Bourne, Korn, C, Restricted

Where UNIX partitions are established

During system config

UNIX directory where applications are contained

usr

UNIX firmware prompt on Sun machines

OK

Hard drives have a ____ coating

Electronic

Type of bridge that connects on Data Link protocol to another

Translational

Also known as runtless switching

Cut-through

Voice band range analog modems operate on

20 Hz to 20 MHz

2 anti-virus programs used by the air force

Norton and McAfee

Windows Server edition that does not operate as a domain controller

Datacenter

Windows Server edition that provides support for WSRM and metadirectory services

Enterprise

Windows Server edition that provides support for high-end high-traffic application servers

Datacenter

Document containing AFSC responsibilites

CFETP

Integrated bundle of expert knowledge

Core competency

Who does UT&W bring together

MFMs, subject matter experts, instructors from 3-level courses, 5-level CDC writers, 7-level CDC writers and instructors, representatives from Occupational Measurement Squadron

What do training advisory groups do

Address training management issues, review training concerns and successes and coordinate training initiatives

MIssion of an OSS

Control air traffic, manage airfield, weather support, train ATC

Mission of an Electronic Warfare Center

Planning, coordinating and executing information operations

Mission of an air control squadron

Provides a mobile, combat-rated senior radar element of the theater air control system for worldwide contingencies

AFOSH standard for hearing conservation

48-20

AFI for occupational safety instruction

91-203

AFI for hazard communication

90-821

Who to coordinate the disposal of hazardous waste material with

Host environmental management

Ionizing radiation

EM radiation whose waves contain sufficient energy to overcome the binding energy of electrons

Risk management AFI

90-802

Four principles of RM

Accept no unnecessary risk, make risk decisions at the appropriate level, accept risk when benefits outweigh the cost, integrate RM into operations and planning at all levels

Document for tempo banding

AFPD 10-4

Authority on AEF execution

Secretary of Defense

Purpose of support force modules

Augment the AETF FMs and identify the additional capability to support continual rotational presence

Examples of operational capabilities packages

DSCA, Humanitarian relief operations, NEO, support of international law enforcement

Three systems in the TPN-19

OK-235/236, TPN-24, TPN-25

Information provided by the TPN-25 PAR

Azimuth and elevation

TPN provides ATCs the ability to locate aircraft up to __ miles away

60

How many display indicators provided by the ASR and PAR systems

6

Purpose of C4ISR

Collects, processes, produces, disseminates and uses information

Ground theater air control elements

AOC, control and reporting center, air support and operations center, tactical air control party

85th engineering installation squadron MAJCOM

AFSPC

Air tasking order

Lead planning document commanders follow

What GTACS provides

Range, precision, low signature, control

Purpose of DATCALS

Provides capability to identify, sequence and separate aircraft and provide approach guidance to aircraft in all types of weather