• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/30

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

30 Cards in this Set

  • Front
  • Back

what is the goal of the information security program?

to efficiently and effectively protect he AF information by delegating authority to the lowest levels possible, encouraging and advocating use of risk management principles, focusing on identifying and protecting only that information that requires protection, integrating security procedures in our business processes to they come transparent and ensuring everyone understands their security roles and responsibilities.


material other than ordinary paper documents must have what markings?

classification marking according to DOD5200.1-R

what markings are classified documents required to have?

overall classification of the document, the agency, office of orgin, date of the document, and will reference the office.

what classified document cover sheets shall be placed on all classified documents not in a secure storage?

SF 703, SF 704, SF 705

who has the authority to grant individuals access to classified information when required for mission essential needs?

personnel who have authorized possession, knowledge, or control of classified info

Who was a one-time verbal attestation directed to fist paragraph of the SF 312?

all military members and civilian employees with top secret eligibility or access to a specially controlled access category or compartment information

Name 3 factors to consider during the risk assessment process for hand carried classified material?

the environment, the sensitivity of the info, the availability of authorized facilities for storing info during overnight layovers

within how many days must the sender trace unacknowledged receipts?

30 days CONUS


45 days outside CONUS

who do you think in order to educate yourself on the proper procedures for transporting COMSEC information and material?

supporting COMSEC manager

why are laptops a high risk?

laptops have high commercial value

when using laptops to hand carry classified information, what must couriers take into consideration?

both laptop and disks are prepared properly

When we talk about proper customer service techniques we are talking about what?

effective communication tenchinques

Every task accomplished by a personnel specialist has a direct effort on what?

Another individuals career

what should you always do when referring customers to another office or organization?

always call ahead to make sure they are capable of assisting your customer.

what is the first thing you notice when meeting someone?

their apperance

what is considered a good way to give a positive first impression?

take the extra time to ensure your military appearance is above approach

What is considered the stepping stone to succeed as a personnel journeyman?

a positive attitude

to effectively communicate, what talent must be developed?

listening

what does the AFI 33-332 Air Force Privacy Act Program address?

collecting, safeguarding, maintaining, using, accessing, amending personal data kept in systems and records.

provisions of the privacy act program allow the AF to perform what act to personnel information?

collect, maintain, use, or disclose

what constitutes an official system of record?

authorized by law or executive order, needed to carry out an AF mission or function, published in the federal register

before you can release PI for third parties, what must you do first?

make sure such release is authorized, consider the consequences, and check the information's accuracy

what guidelines must you follow when deciding whether or not to release info?

would the subject have reasonable expectation of privacy in the info requested? would disclosing the info benefit the general public? balance the public interest against the individuals probable loss of privacy.

what system allows each service member to access their personnel record electronically?

ARMS

who automatically receive access to the PRDA system?

senior raters, wing ccs, groups ccs, sqd ccs, section ccs, command chief msgt, first sgt, raters, and indivulal member.

what is the purpose of military record system?

protects the legal and financial rights of the gov. and the individual and to record the history of the person's service

what does a military record consist of?

electronic personnel record group, officer command selection, record group, the master personnel record group and the officer selection record

in what systems must user identity be established and untenticated

AFP, AFPC secure, and VPSC

define 3 way a user may acquire a role in vPSC

system- grants the role to the user at login


assigned- an administrator grants the role to the user


associated- another user grants role

define 3 days a user may acquire jurisdiction within RBA

system- jurisdiction is determined by system


assigned- jurisdiction is defined by a RBA


associated- jurisdiction of the role that was granted