• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/148

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

148 Cards in this Set

  • Front
  • Back

Which AFI series covers all safety subjects?

91 series

Which publication outlines Communication Electronics Systems Safety?

91-203

In addition to obvious hazards such as slippery floor or own file drawer, a modern work area may also contain numerous other hazards

Poor lighting, noise, poorly designed furniture and equipment, machines that emit noxious gases and fumes.

List four leading types of all disabling accidents that occur within the work area.

Falls


strains and over exertion


Struck by or striking objects


Caught in or between objects



What are some methods of preventing poor lighting conditions from becoming a hazard?

Regular maintenance of the lighting system, adjustable shades on windows, and indirect task lighting

_______ can produce tension and stress as well as damage hearing.

Noise

What can be installed to help muffle noise in the workplace?


* Use carpeting, draperies, and acoustical ceiling tiles to muffle noise


Improper lifting can cause sprains, strains and inflamed joints. List 4 control methods to reduce handling and storage hazards?

* Heavy objects should be stored on lower shelves and materials stacked neatly


* Materials should be stored inside cabinets, files, or lockers whenever possible


* Marterial Safety Data Sheets must be provided for each hazardous chemical identified


* Materials should not be stored on top of cabinets

Improper lifting can cause musculoskeletal disorders such as..

Strains, sprains, and inflamed joints.

Poor design and/or poor housekeeping can lead to:

Crowding, lack of privacy, slips, trips, and falls

What can be done to reduce crowding, lack of privacy, slips, trips, and falls?

* Keep telephone and electrical cords out of aisles


* work area machines should be kept away from edges of desks and tables


* Regular inspection, repair, and replacement of faulty carpets


* Place floor mats in inside building entrances


* Proper placement of electrical, telephone, and computer wires

Blocked or improperly planned means of egress can lead to...

Injuries as a result of slips, trips, and falls.

How can we ensure a proper means of egress?

Generally have two exits which are clearly marked, free from obstructions and adequately lit, aware of all exits and procedures for evacuation.

Electrical accidents in a work area usually occur as a result of...

* Faulty or defective equipment


* unsafe installation


* misuse of equipment

What general guidelines should be followed when when installing or using electrical equipment?

* A sufficient number of of outlets will prevent circuit overloading


* Cords should not be dragged over nails, hooks, or other sharp objects


* Machines should be disconnected before cleaning or adjusting. Generally, machines and equipment should be locked or tagged out during maintenance.

A/an ______, incorporating employee awareness and training can reduce back injuries in the work place.

Effective control program

T/F


One control to ensure proproper use of chairs would be to regularly inspect them for broken or missing parts

True

What are controLs for maintaining safety around file cabinets?

* Open one drawer at time


* Do not locate file cabinets close to doorways or in aisles


* Use drawer handles to close file drawers.

Machines with rotating parts can cause...

Lacerations, abrasions, fractures, and amputations if not properly guarded

Fans must have...

Substantial bases and fan blades covered

T/F Workers should always face the ladder when climbing up or down

True

T/F Ladders should be inspected occasionally

False, regularly

T/F The top of the ladder is a step

False, it is not a step

T/F Ladders can be used when partially open and not locked in place.

False - ladders should be used when the are fully open and locked in place.

In what three ways can multifunctional devices present a health hazard to employees?

* toxic chemicals


* noise


* noise* intense light from the scanner


* intense light from the scanner

What three things can be done to help prevent MFD pollution?

* place machines in well ventilated rooms away from workers' desks


* routinely have the machines serviced to prevent chemical emissions


* Clean all spills and dispose of waste properly.

What four things must be present to start a fire?

Oxygen


Fuel


Heat


Chemical Reactions

How many class of fire extinguisher are there?

Five

Which class of extinguisher is used for it's cooling or quenching effect to reduce the burning material's temperature?

A

A class A fore extinguisher is...

Water

You use a the A fire extinguisher to put out..

Wood, cloth, rubber, or plastic fires.

Class B fire extinguishers use what to put out fires?

Carbon Dioxide, takes the oxygen away from the fire.

What is the range of a class B extinguisher?

3-8 ft.

Class B fire extinguishers are used to remove fires from what materials?

Gasoline, oil, lacquers, mineral spirits, and alcohol fires

What is the first step when battling a fire that can be put out using a Type C extinguisher?

Remove power high voltage circuit then treat as class A or B

Class C extinguishers are used for...

Electrical fire's, known as multipurpose

The is no extinguisher with a class ______

A, C rating

What two methods of labeling can be used to identify class A, B, and C extinguisher

Color Geometric shapes and picture symbols

Which class of extinguisher works by interrupting the chain reaction that jeeps a fire burning

Class D

_______ based extinguishers are used for class D fires

Sodium powder

Class D is used to put out what kind of fires?

Burning metals

Class D only has what one identifier?

Colored geometric shape.

What chemical and class of fire extinguisher is used to knock out flames in seconds, and to cool and seal the fire?

Wet potassium acetate based, low pH agent, Class K

Class K uses what two identifiers?

colored geometric and picture symbol

What does the acronym SPEED stand for?

Sound the alarm


Phone the fire department


Evacuate the building


Extinguish the fire if possible


Direct the fire fighters to the fire.

What is an easy way to remember how to use a fire extinguisher and what does each letter stand for?

PASS



Pull


Aim


Squeeze


Swipe

Four principles of of Risk Management

* Accept no unnecessary risk


* Make risk decisions at the appropriate level


* Integrate RM into operations and planning at all levels


Apply the process cyclically and continuously



What are the five steps in the risk management process?

1. Identify the hazards


2. Assess the hazards


3. Develop Controls and Make Decisions


4. Implement Controls


5. Supervisor and Evaluate

Which principal of risk management is used best by integrating the principLes as early as possible and provides decisions makers the greatest opportunity to apply them?

Integrate RM into operations and planning at all levels.

What are the two levels of Risk Management?

Real time


Deliberate

The severity of electric shock is determined by...

The amount of current flowing through the body, the time of duration of exposure, and the body's physical condition.

What is traumatic shock?

A depressed condition of body functions due to lack of adequate blood circulation which may occur following a serious injury.

The most dangerous shocks are those that involve...

The brain or vital organs in the chest and abdominal area.

What is the first step involved with helping someone attached to an electrical power source?

Turn of the power

If you can't locate the power of what is shocking someone what should you do?

Warn others

When somebody is being shocked what should you never do?

Touch them

What are the three steps of CPR

C-A-B



Chest compressions


Clear the airway


Breathing

How to prevent traumatic shock

* Keep victims lying down


* Elevate feet and legs


* keep victim warm; cover over and under.


* Do not move victim


* Do not leave victim unattended


* Do not give fluids

What are four methods to control bleeding

1. Direct pressure


2. Elevation


3. Pressure points


4. Tourniquet

What is the major risk with burns?

Infection

How do you prevent infection with a burn?

Remove excess clothing from the wound and cover with gauze or a clean cloth

What should an individual have ready prior to the chance of a terrorist attack?

* Family Readyness pLan


* Assemble an emergency supply kit


* prepare for the possibility of a terrorists incident in your area?


* use caution when you travel by locating stairways and emergency exits and develop plans for evacuating buildings, subways, and crowded public areas


* Adapt, as appropriate, the same technique used to prepare for tornadoes, fires, and other emergencies

What are the three factors for protecting oneself from radiation and fallout?

Time, Distance, shielding

ISO

International Organization for Standardization is the worlds largest developer of standards

The big thing that ISO defined is the...

Open Systems Interconnection (OSI)

IEEE

Institute of Electrical and Electronics Engineers. The world's leading professional association for the advancement of technology.

EIA

Electronic Industries Alliance - Organization of electronics manufacturers

TIA

Telecommunications Industry Associations

ICANN

Internet Corporation for Assigned Names and Number - Responsible for IP address space allocation, protocoL parameter assignment, domain name system management and root server system management functions.

So ICANN for profit or non-profit

Non-profit

EIA/TIA made which standard?

Commercial Building Telecommunications Wiring Standards, which define hierarchical wiring systems in network environments using data-grade twisted-pair wire

IANA

Internet Assigned Numbers Authority - allocates and maintains unique codes and numbering systems that are used in the technical standards (protocols) that drive the internet

IANA's role is to...

Distribute IP addresses from the pools of unallocated address to the Regional Internet Registries

RIR

Regional Internet Regestries

ARIN

American Registry for Internet Numbers.

ARIN covers the geometric region of...

United States, Canada, and many Caribbean and N. American Islands

What Air Force document defines cyberspace?

Air Force Doctrine AFDD 3-12

How does the Air Force define cyberspace?

A domain characterized by the use if electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated infrastructures.

What is the ultimate goal of communications?

Right information in the right right format to the right person and the right time

Cyberspace operations

The employment of cyber capabilities where the primary purpose is to achieve military objectives in it through the use of the cyberspace domain.

What are the three core competencies of the Communications and Information career fields according to the Strategic Vision of the Cyberspace Command

* Use the Domain


* Control the Domain


* Establish the domain

Use the domain

Leverage friendly operations across the electromagnetic spectrum and counter any adversary operating in the domain.

CO

Cyberspace Operations

OCO

Offensive Cyberspace Operations

Offensive Cyberspace Operstiobs are authorized by..

Executive Order

The specific actions of cyberspace attack operations are:

Deny, Degrade, Disrupt, destroy

Deny

To degrade, disrupt, or destroy access to, operation of, it availability if a target by a specified level for a specified time. Denial prevents adversary use of resources.

Degrade

To deny access +function of amount) to, or operation of, a target to a level represented as a percentage of capacity. L

Disrupt

To completely but. Temporarily deny (a function if time) access to, or operation of, a target for a period of time.

Defensive Cyberspace Operations

Intended to defend DoD or other friendly cyberspace

List the three operations that can be used under establishing the domain

* Global expeditionary cyberspace operations.


* Command and Co trial of Network Security Operations


* Cyberspace Civil Support Operations

US Code

The official subject matter order, compilation of laws.

The US code is prepared by who?

Office of Law Revision Counsel

Title 10

Outlines the role of the Arned forces

Code 15

Outlines terrible of commerce and trade

Code 18

Criminal and penal code

Code 32

Outlines the National Guard

Code 50

The role of War and National Defense.

Defines how joint forces use information operations to support our national military strategy

Doctrine for Information Operation (Joint Pub 3-13)

AFDD 3-13

Explains the Air Force perspective in information superiority

Information Operations

The integrated use of capabilities of influence operations, electronic warfare operations, and network warfare operations, in concert with specified integrated control enablers, influence, disrupt, corrupt or usurp adversial human and automated decision making systems while protecting our own

IO provides what predominantly?

None kinetic capabilities to the warfighter

Integrated Control Enablers (ICE)

A new term used to define what was formerly expressed as information in warfare.

Five general types of policies for network usage

* Network Usage policy


* internet usage policy


* email usage policy


* personal software policy


* user account policy

All military Information Users sign what document?

AF Form 4394 (Air Force User Agreement Status - Notice and Consent Provision

What form is used to request IS access and specific authorizations within the system?

DD 2875 System Authorization Access Request (SAAR)

Network Usage Policy

Dictates who can use network resources such as computer, printer, scanners and remote connections

Internet Usage Policy

Rule for Internet use on the job.

Email Usage Policy

Code of conduct. Emails are government property and can be accessed by government agencies

Personal Softwaee Policy

No outside software installed on the network

User Account Policy

Users are responsible for passwords/pin. Log off daily in order to facilitate pushes and to restart their system weekly.

00-5-1

TO that describes the TO system.

Technical Order

Provides clear and concise instructions for the safe and effective operation and maintenance of centrally acquired and managed Air Force military systems

Communications-Electronics Manuals

Used with specialized equipment or when TOs gave not been developed

Revision

A second or subsequent edit of a TO that supersedes the preceding edition

The official listing of active TOs

Air Force TO catalog

New TOs are ordered on...

ETIMS

ETIMS

Enhanced Technical Information System

TODO

TO Distribution Office - provides TO account administrative services for the Unit.

TO library

One of more current TOs with all the changes, revisions, and supplements maintained.

Rules of Engagement involve what activities related to information gathering and what is the information integrated into

Planning, execution, coordination, targeting, monitoring, adjustment, and assessment of information and are integrated into the information warfare flight

The IO team provides what information to AOC prior to the initiation of hostilities

Expertise to pLan, empLoy, and and assess information capabilities

Federal Information Secureith Management Act of 2002 (FISMA)

Federal Las enacted on 2002 to boLster completed and network security within the government.

System Monitoring

Air force networks are constantly surveilled to detect and defend against criminal and malicious activity

IDS

Intrusion Detection System - monitors network traffic, monitors for suspicious activities and alerts thr system or networkj administrator to any such activity

Who is responsible for testing and replying IDS?

Homeland Security

What is the IDS used to monitor US government network activity?

Einstein.

GIG

Global Information Grid

Air force cyber command is under what command?

24th Air Force

Port scanning

Connects to each device on the network and takes note

What documents define cyber ethics

RFC 1087 and The Ckde of Fair Information Practices

Unethical behavior includes

* seek to gain unauthorized access to the resources of the internet


* disrupt the intended use of the internet


* waste resources through these actions


* compromise the privacy of users

What laws protect people personal privacy information?

Freedom of Information Act and (FOIA) and Privacy Act of 1974

PII is defined as

Name, address, or telephone number combines with SS or tax ID, credit or debit number, financial/salary data, drivers license number, DoB, HIPPA

Privacy Act of 1974

Prescribes the management, access, handling, and denial of access to records within a system of records.

Air Force Privacy Act

AFI 33-332

Control Area

Requires some form of ID to get acces

Restricted Area

Requires special access badge and purpose to be there.

No Lone Zone

Require personal to not be alone with systems/equipment.

OPSEC vulnerabilitwz

Critical info, social media, open conversations, and, family/friends

Information Assurance

Measures to protect and defend j fk won computer systems

IA protective measures

ID and authentication


Access control


Controlling maintenance activities


Configuration management


Malicious logic protection


User awareness training

Comsec is the combination of what two things?

Cryptosecity and transmission securith

Compusec vulnerabilities

Unauthorized access, malicious logic, fraud waste, and abuse

Infocon 5

Normal operations

Infocon 1

Maximum readyness

DISN

Long haul

DSN

Phones