• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/78

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

78 Cards in this Set

  • Front
  • Back

Which document would you reference to see your specific AFSC responsibilities?

Career Field Progress and Information

What two groups make up the cyberspace support family?

Cyberspace operations and cyberspace systems

Within the cyberspace support families, what career field is responsible for maintenance and operation of cyberspace systems?

Cyberspace Systems

What is the core AFSC document used to document training for enlisted personnel?

CFETP- Career Field Education and Training Plan

Duty position tasks describe

All tasks that correspond to the duty position as directed

What part of the CFETP includes general information about how to use it?

Part 1

How many skill levels are there?

5 skill levels. 1,3,5,7,9

What AFI outlines the AF's training program?

AFI 36-2201, Air Force Training Program

With whom does the Air Force career field manager directly communicate to disseminate policies and program requirements?

AFCM- Air Force Career Field Manager

Whose duty is it to assist in gathering input and data to complete enlisted grade allocation for career progression group reviews?

MFM- Major Command Functional Manager

What type of workshop brings MFMs and SMEs together to determine the most effective and efficient way to ensure training standards and skill- level requirements of a career field are accurate?

Utilization and Training workshop- U&TW

What is the primary purpose of a STRT? (Specialty Training Requirements Team)

For the AFCFM and functional leaders to determine and present training requirements to the AETC Training Pipeline Manager (TPM) and Training Manager (TM)

What program provides training for personnel to attain knowledge and skill qualifications required to perform duty in their specialty?

The AF on the Job Training - OJT

What are the three components of the AF OJT program

Job knowledge, Job Proficiency, Job Experience

What the three essential elements in a QA program?

Quality Systems, Quality Assessments and Trend Analysis.

How is trend analysis used?

Quality assessments. Provides assurances, through some type of evaluation, that the Quality system functions are effective.

What program reports compliance with requirements listed in self-assessment checklists to the chain of command and appropriate staffs?

The self- assessment program reports compliance with requirements listed in self assessment

Who, in conjunction with the commander appointed self-assessment program manager, will oversee the unit's self-inspection/ assessment program?

QA- Quality Assurance

What are automated information systems?

AIS are combinations of computer hardware and computer software, data, and/or telecommunications equipment that performs functions such as collecting, processing, storing, transmitting, and displaying information

What is the standard Air Force system for maintenance information?

The IMDS- Integrated Maintenance Data System

What automated information system managers the entire life cycle of IT assets from procurement through retirement?

Remedy- Managers the entire life cycle of IT assets from procurement through retirement

What is the basis for drafting and enforcing all federal laws governing the U.S?

The U.S Constitution

Which title of the U.S code spells out the general provisions and punitive articles of the UCMJ?

Title 10

Who has inspection responsibility over the National Guard?

The secretaries of the US Army and Air Force

What is cyberspace?

A global domain within the information environment consisting of the interdependent network of information technology infrastructures

What type of cyberspace maneuverability occurs with the use of security protocols used by host systems?

Logical Maneuverability

What are cyberspace Operations?

Employment of cyberspace capabilities where the primary purpose is to achieve military objectives or effect or in through cyberspace.

What are three major considerations to understand while supporting cyber operations?

Policy, Authority and the law

What document provides AF leaders a particular principle in the execution of cyber operations?

AFDD 3-12 Cyberspace Operations

The National Strategy to Secure Cyberspace is driven by three priorities, what are those priorities?

National Strategy to Secure Cyberspace is driven by 3 priorities, Prevent Cyber attacks, Reduce National Vulnerability, Minimize damage and recover time from cyber attacks

Gaining and maintaining the initiative to operate within adversary decision cycles outlines what strategy?

National Military strategy for Cyberspace operations outlines the strategy of gaining and maininting

Before the employment of cyberspace capabilities, what considerations must be made?

Legal and international legal obligations.

What could prevent Air National Guard personnel from executing a cyber operation?

Title 32

In addition to the implied legal parameters, what else must individuals be clearly aware of when conducting cyber operations?

Ethical Aspects

Define Prohibited use

Prohibited Use where use adversely reflects on DOD; where use interferes with the employee or office productivity; or where use is to conduct outside commercial activity

What career field relies on many services provided by the Cyberspace Support Community?

1B4X1

What weapons system provides continuous monitoring and defense of AF unclassified and classified networks?

Air Force Cyberspace Defense (ACD)

Describe the four sub-discipline areas of the ACD

Incident Prevention, Incident Detection, Incident Response, Computer Forensics

What resulted from an operational initiative to consolidate numerous MAJCOM- specific stovepiped networks into a centrally managed and controlled network under three I-NOSCs?

The CSC Air Force Cyber Security and Control System Weapon System

What AF weapons system offers top-level boundary and entry point into the AFIN?

The Air Force Intranet Control (AFINC)

What are the four sub-discipline areas of the AFINC?

Defense in depth,Network standardization,Proactive, Situational Awareness

What weapon system is the single system providing overarching 24/7/365 awareness, management and control of the AF portion of the cyberspace domain?

C3MS- Cyber Command and Control Mission System Weaspon System

Describe CORA

Assess Data compromised through intrusions of AF network, with the objective of determining the associated impact to operations resulting from data loss

What is the mission of the CVA/ Hunter?

The Hunter mission focuses on the capability to find, fix, track, target, engage and assess the advanced persistent threat (APT)

How does end-to-end performance monitoring support mission assurance?

It supports missions assurance by including the end user experience and the warfighters' ability to access critical information

Who has the responsibility for determining what network elements should be monitored?

24th AF has the ultimate responsibility for determining the network elements to be monitored

What two things did the DOD Consent to Monitoring policy do?

The policy established departmental guidance on the use of DODIN systems and standardized the wording for to be included in user agreements.

What Air Force command is appointed as the primary for cyberspace missions?

The 24th Air Force

How do offensive operations support US cyberspace objectives?

OCO suport by denying, degrading, disrupting, destroying, or altering the adversary's ability to use cyberspace

Besides technical vulnerabilities, how do we attempt to exploit user-friendly networks?

We attempt to exploit user-friendly networks by gaining footholds through their routine sues of cyberspace

What are IRCs?

Information Related Capabilities- Tools, techniques or activities employed withing the physical, informational or cognitive of IT.

How does EW contribute to information operations?

Ew contributes to information operations by using offensive and defensive tactics and techniques to shape, disrupt and exploit

What is the intent of MISO?

To affect the behavior of foreign governments, organizations, groups, or individuals so that changes in foreign behavior or attitude favor an originator's objectives

What is the goal of MILDEC?

To deceive

What does OPSEC deny adversaries?

Denies adversaries critical information and observable indicators.

Audience engagements are meant to mold perceptions and shape relations with whom?

The intent is to mold perceptions and shape relations with key military and civilian organizations

What type of ISR support does IO require for integration?

A more concerted, tailored ISR support for IO integration.

Define CI

Information gathered and activities to identify, deceive, exploit, disrupt or protect against espionage

How do we influence the adversary's decision-making while protecting our operations?

Integrating the capabilities of influence operations, electronic warfare ops and network warfare operations in concert

What reaches across geopolitical boundaries and is tightly integrated into the operation of critical infrastructures and teh conduct of commerce, governance, and national security?

Cyberspace reaches across geopolitical boundaries and is tightly integrated into the operation of critical infrastructure and the conduct of commerce, governance, and national security

What three things ensure our freedom of action and deny the same to our adversaries in relation to cyber operations?

Network defense, exploitation and attack

What are the DODs three main roles regarding cyber operations?

Defense of the nation, national incident response and critical infrastructure protection

What items ensure critical infrastructure is protected?

Analysis, warning, information sharing, vulnerability identification,, reduction, mitigation and aiding of national recover efforts

Information superiority is a result of what abilities?

The abilities to collect, process and disseminate and uninterrupted flow of information while exploiting or denying an adversary's ability to do the same

How would you define SCADA?

Implemented as a distributed database, referred to as a tag database

What is the purpose of IO?

The purpose of IO is to affect adversary decision making with the intent to modify behavior

How many flights typically make up Air Force communications Squadrons?

two flights and an optional third

Which communications squadron flight provides technical and systems support for wing communications and computer systems including ground radio, voice networks, and secure communications maintenance?

The operations flight provides technical and systems support for wing commms

Who authorizes the use of a special mission flights withing a communications squadron?

Air Staff's Manpower Division (AF/A1M) must approve special missions flight

What is the primary mission of the AOC?

The primary mission of the AOC is to provide the Joint Forces with the tools necessary to fight and win a major theater war within the scope and coordination of all land, sea, and air forces.

How are cybersspace forces in an AOC tasked to execute cyber missions?

Through a cyber- tasking order (CTO)

What squadron is a communications support squadron that directly supports the AOC?

Air Communications Squadron (ACOMS) is a comms support squadron that directly supports the AOC

What type of unit provides flyaway communications packages to expeditionary air bases?

Combat Communications Squadron

Whyat active duty combat communications groups are in the CONUS?

The 5th Combat Communications Group (5CCG) located at Robins, AFB, Georgia

How are expeditionary communication units established to operate in a deployed environment?

Expeditionary units are established to operate with an Air Expeditionary Task Force (AETF)

Who is the major force provider for the 386th AEW?

The 86th Airlift Wing (Ramstein Air Base)

Which EIS unit, currently part of the Air Combat Command, is an indispensable part of the USAF- war- fighting community?

The 85th IES is an indespensable part of the USAF war-fighting community

What unit installs, reconstitutes and tests critical C4 systems for COCOMs, anywhere and anytime?

The 85th