Term
Which Air Force Specialty Code (AFSC) requires members to pass the Air Force Electronic Data Processing Test? |
|
Definition
Computer Systems Programming |
|
|
Term
Which of the following is not a mandatory requirement for the advancement to the 7-skill level? |
|
Definition
Completion of Air Education and Training Command (AETC) Supplemental training courses |
|
|
Term
Which of the following functions is primarily staffed by Client Systems personnel but may have a variety of Air Force Specialty Codes (AFSCs) based upon the unit mission? |
|
Definition
Communications Focal Point |
|
|
Term
What document directs the Communications Focal point key processes? |
|
Definition
|
|
Term
Where is the Air Force active component manpower planning and programming centralized |
|
Definition
At Headquarters Air Force (HAF). |
|
|
Term
Which of the following is the official source of manpower information for an organization and is used as a tool to manage positions? |
|
Definition
Unit Manpower Document (UMD). |
|
|
Term
Which of the following is a subdivision of programmed cost data related to a weapon system or support function? |
|
Definition
Program Element Code (PEC). |
|
|
Term
Which of the following is not a responsibility of the Air Force Career Field Manager (AFCFM)? |
|
Definition
Distribute personnel throughout their respective major command (MAJCOM). |
|
|
Term
Who serves as the major command (MAJCOM) voting representative during career field Specialty Training Requirements Team (STRT) and Utilization and Training Workshop (U&TW)? |
|
Definition
MAJCOM Functional Manager. |
|
|
Term
Which segment of the Utilization and Training Workshop (U&TW)/ Specialty Training Requirements Team (STRT) process concentrates on training proficiency levels and training |
|
Definition
|
|
Term
Which of the following is not an action of the Specialty Training Requirements Team (STRT)? |
|
Definition
Finalize Specialty Training Standards (STS)/Course Training Standards (CTS) for all courses |
|
|
Term
Which of the following is an optional attendee for the Utilization and Training Workshop (U&TW)? |
|
Definition
AETC Career Development Course (CD)C writer. |
|
|
Term
What is used as a starting point to develop the Career Field Education and Training Plan (CFETP) and Specialty Training Standard (STS) during the Specialty Training Requirements Team (STRT) and Utilization and Training Workshop (U&TW)? |
|
Definition
Occupational Analysis Report (OAR) |
|
|
Term
What Automated Information System (AIS) is used to document actions on any item with an assigned Standard Reporting Designator (SRD)? |
|
Definition
Integrated Maintenance Data System (IMDS). |
|
|
Term
Which of the following is not a common duty of the Maintenance Data Collection (MDC) monitor? |
|
Definition
Ensures equipment status is entered into Equipment Status Reporting (ESR). |
|
|
Term
Who establishes the necessary controls to ensure periodic inspections are accomplished? |
|
Definition
|
|
Term
Which of the following is included in the Master Training Plan only if applicable to the work center? |
|
Definition
Job Qualification Standard |
|
|
Term
Special Personnel Evaluations (SPEs) are required on a sampling of Air Reserve Component (ARC) personnel within how many days of new equipment/system acceptance? |
|
Definition
|
|
Term
Which statement is not a goal of Operational Risk Management (ORM)? |
|
Definition
Identify opportunities to decrease Air Force warfighting effectiveness on the battlefield and in the operational aerospace environment, helping to ensure decisive victory in any future conflict at the least possible cost |
|
|
Term
How many steps are there in Operational Risk Management (ORM)? |
|
Definition
|
|
Term
Supervisors document and maintain completed safety training on |
|
Definition
|
|
Term
Which of the following is not a term for Job Safety Analysis? |
|
Definition
Job Safety Training (JST) |
|
|
Term
Which of the following is information not contained in Technical Order (TO) 00–5–1? |
|
Definition
Time Compliance Technical Order (TCTO) procedures. |
|
|
Term
Recommended technical order (TO) changes are required to be submitted on |
|
Definition
|
|
Term
Who determines if local checklists and/or work cards are required for specific equipment? |
|
Definition
|
|
Term
Who provides accreditation for the Telecommunications Industry Association (TIA)? |
|
Definition
American National Standard Institute (ANSI). |
|
|
Term
Who develops standards for Interconnect, Passive and Electro-mechanical (IP&E) electronic components under the American National Standard Institute (ANSI) designation of |
|
Definition
Electronic Components Industry Association (ECIA). |
|
|
Term
Who should endorse the AF Form 673 as the Certifying Official? |
|
Definition
The authoring OPR’s supervisor. |
|
|
Term
What systems allow for a commonly understood, maintainable, and defendable domain through all federal and non-federal systems? |
|
Definition
Commercial Off-The-Shelf (COTS). |
|
|
Term
The creation of the DOD as an executive component of the government Is authorized by United States Code (USC) Title |
|
Definition
|
|
Term
Procedures and circumstances for Congress to order units into active Federal duty are established in United States Code (USC) Title |
|
Definition
|
|
Term
Who appoints Air Force Portal Content Managers and Content Publishers for public and private websites? |
|
Definition
|
|
Term
When a person uses his or her position for private or personal gain it is called |
|
Definition
|
|
Term
Which type of fund covers the cost of relocating facilities? |
|
Definition
Military Construction (MILCON). |
|
|
Term
What is the maximum amount for minor construction projects that Operation and Maintenance (O&M) funds will cover under normal conditions? |
|
Definition
|
|
Term
In-depth information for administering the Government Purchase Card program at all responsible levels is found in Air Force Instruction (AFI) |
|
Definition
|
|
Term
At the installation level which office is responsible for program implementation, administration, training, and monitoring the Government Purchase Card (GPC) Program? |
|
Definition
Agency/Organization Program Coordinator (A/OPC) |
|
|
Term
Which of the following is not a responsibility of Government Purchase Card (GPC) cardholders? |
|
Definition
|
|
Term
Detailed instructions for submitting a reclama or shortfall request are found in |
|
Definition
|
|
Term
Who reviews the selections after the board selects the 12 Outstanding Airmen of the Year? |
|
Definition
|
|
Term
Which of the following is the highest level in which quarterly awards are normally presented? |
|
Definition
|
|
Term
Guidance for awards specific to the Cyber community are found in Air Force instruction |
|
Definition
|
|
Term
What are the inclusive dates for Secretary of the Air Force/Chief Information Officer (SAF/CIO) annual awards? |
|
Definition
1 October - 30 September. |
|
|
Term
The maximum number of devices a FireWire bus can take is up to |
|
Definition
|
|
Term
What device is a series of single-pole, single-throw switches mounted to a circuit board? |
|
Definition
|
|
Term
A workgroup is a simple grouping of how many computers? |
|
Definition
|
|
Term
Which is not a type of UNIX pathname? |
|
Definition
|
|
Term
Which application includes tools to help recover lost files and protect against computer failure? |
|
Definition
|
|
Term
The Institute of Electrical and Electronics Engineers (IEEE) divides the Open System Interconnect (OSI) Data Link Layers into what two sublayers? |
|
Definition
Logical Link Control (LLC) and Media Access Control (MAC). |
|
|
Term
Network switches and bridges operate at what Open System Interconnect (OSI) layer? |
|
Definition
|
|
Term
Routers operate at what Open System Interconnect (OSI) layer? |
|
Definition
|
|
Term
Virtual circuits are established, maintained, and terminated at what Open System Interconnect (OSI) layer? |
|
Definition
|
|
Term
What is the combat information technology (IT) communication support agency of the DoD called? |
|
Definition
Defense Information Systems Agency |
|
|
Term
) Who must provide encryption devices for connection to the Secret Internet Protocol (IP) Data service? |
|
Definition
|
|
Term
What are the two classifications of transport protocols? |
|
Definition
Connection Oriented and Connectionless Oriented. |
|
|
Term
In a connection-oriented protocol, such as Transmission Control Protocol (TCP), what must happen before data is transmitted between clients? |
|
Definition
Connection establishment. |
|
|
Term
What regulates how much information passes over a Transmission Control Protocol (TCP) connection before the receiving host must send an acknowledgement? |
|
Definition
|
|
Term
what are the fields in the User Datagram Protocol (UDP) segment? |
|
Definition
Source Port, Destination Port, Length, Checksum, Data |
|
|
Term
How many bits are in an Internet Protocol version 4 (IPv4) address? |
|
Definition
|
|
Term
What class uses a range of 1–126 in the first octet of an Internet Protocol version 4 (IPv4)? |
|
Definition
|
|
Term
What Internet Protocol version 4 (IPv4) class address is used for networks with about 250 nodes? |
|
Definition
|
|
Term
What Internet Protocol version 4 (IPv4) class address is used for multicast addressing? |
|
Definition
|
|
Term
What Internet Protocol version 4 (IPv4) reserved address is used for loop back? |
|
Definition
|
|
Term
Instead of using binary, how are Internet Protocol version 6 (IPv6) addresses expressed to be more user-friendly? |
|
Definition
Colon Hexadecimal Format. |
|
|
Term
The range of well-known port numbers is |
|
Definition
|
|
Term
Which common port contains Hyper Text Transfer Protocol (HTTP) servers and proxies? |
|
Definition
|
|
Term
The design of communications network is known as |
|
Definition
|
|
Term
What kind of network is a group of computers and associated devices that share a common communications line within a small geographic area? |
|
Definition
Local Area Network (LAN). |
|
|
Term
What kind of network interconnects users with computer resources in a geographic area or region like a city? |
|
Definition
Metropolitan Area Network (MAN). |
|
|
Term
Which 802.11 standard has a throughput of 11 Mbps and runs at the 2.4 GHz frequency? |
|
Definition
|
|
Term
Which 802.11 standard is designed to operate at both 2.4 GHz and 5 GHz? |
|
Definition
|
|
Term
What topology defines the layout of a network’s devices and media? |
|
Definition
|
|
Term
What topology consists of cable segments from each computer connected to a centralized component? |
|
Definition
|
|
Term
Over a single pair cable, Integrated Services Digital Network (ISDN) is capable of transmission rates of |
|
Definition
|
|
Term
|
Definition
modulates and demodulates data signals |
|
|
Term
What Data Link Layer network device logically separates a single network into two segments or collision domains in Ethernet networks? |
|
Definition
|
|
Term
Two basic routing activities are determining optimal routing paths and |
|
Definition
transporting information groups (packets) through an internetwork |
|
|
Term
Dynamic routing automatically calculates the best path between how many nodes? |
|
Definition
|
|
Term
What type of encryption is applied to each end of a communications line in a distributed network, and ensures all information flowing is unintelligible to an unauthorized intruder? |
|
Definition
|
|
Term
Which type of cable is associated with the original designs of the Ethernet standard? |
|
Definition
|
|
Term
Which transmission medium is the primary carrier of voice communications? |
|
Definition
|
|
Term
What is the most common wireless networking standard? |
|
Definition
|
|
Term
What are the three major considerations that apply to Cyberspace Operations? |
|
Definition
|
|
Term
What title status must National Guard Guardsmen be in to execute cyber operations? |
|
Definition
|
|
Term
Which operations center monitors and controls Air Force network access points, boundary protection devices, and network activity to provide situational awareness, and report suspicious/malicious activity? |
|
Definition
Integrated Network Operations Security Center (I-NOSC). |
|
|
Term
Within the information environment what term describes the advantage, or imbalance, in one’s favor? |
|
Definition
|
|
Term
What is critical to mitigating unintended or undesirable effects, on either our behalf or the adversary’s, and maximizing cyberspace superiority? |
|
Definition
|
|
Term
Which Electronic Warfare capability uses jamming to reduce the adversary’s use of the electromagnetic spectrum (EMS)? |
|
Definition
|
|
Term
Which of the following is a true statement about Electronic Warfare (EW) and Computer Network Operations (CNO)? |
|
Definition
EW concerns radiated energy. |
|
|
Term
Which Cyberspace Defense Weapon System sub-discipline determines the extent of intrusions, develops courses of action required to mitigate threats, and determines and executes response actions? |
|
Definition
|
|
Term
Which Intranet Control Weapon System sub-discipline conducts continuous monitoring to ensure timely delivery of critical information? |
|
Definition
|
|
Term
Which Supervisory Control and Data Acquisition (SCADA) subsystem gathers data on the process and sends commands to the processor? |
|
Definition
|
|
Term
Which Supervisory Control and Data Acquisition (SCADA) subsystem connects to sensors in the process, converting sensor signals to digital data? |
|
Definition
|
|
Term
Which threat vector is considered more of an annoyance than an attack? |
|
Definition
|
|
Term
Which vulnerability preventive measure is a small piece of code that software developers create to address the flaws found in the original code of a program? |
|
Definition
|
|
Term
Which identity management process uses a fingerprint to authenticate a user? |
|
Definition
|
|
Term
Which identity management process uses a password to authenticate a user? |
|
Definition
|
|
Term
What system monitoring concept uses long trend analysis of network devices and is performed in order to identify future constraints with results incorporated into future technical baselines? |
|
Definition
|
|
Term
Who provides the formal declaration that an information system is approved to operate in a particular security mode using a prescribed set of safeguards and acceptable risk? |
|
Definition
Authorizing Official (AO). |
|
|
Term
The technical solution for a communications and information system requirement summarizes |
|
Definition
full cost and recommended course of action |
|
|
Term
Which deployment planning process develops predetermined responses to potential crises, determines forces required to achieve objectives, prepares deployment plans, and continually evaluates selected courses of action (COA)? |
|
Definition
|
|
Term
Which War and Mobilization Plan (WMP) volume provides a consolidated reference source for general policies and guidance for mobilization planning and the support of combat forces in time of war? |
|
Definition
|
|
Term
Who initiates the requirements or deployment sourcing process? |
|
Definition
Air Force Personnel Center (AFPC) Aerospace Expeditionary Forces (AEF) Center. |
|
|
Term
Which type of Joint Expeditionary Tasking (JET) tasking is a service providing a force or capability in place of another service’s core mission? |
|
Definition
|
|
Term
Which of these is not an area measured and reported by Status of Resources and Training System (SORTS)? |
|
Definition
|
|
Term
Which of the following is not a readiness category measured by Air and Space Expeditionary Force Reporting Tool (ART)? |
|
Definition
|
|
Term
The Governing guidance for Air and Space Expeditionary Force Reporting Tool (ART) reporting is AFI |
|
Definition
|
|
Term
Which document provides detailed information and instructions on Designated Operational Capability (DOC) statements? |
|
Definition
|
|
Term
Who develops logistics details (LOGDETS) to allow for 30 days of sustainment for unit type codes (UTC)? |
|
Definition
|
|
Term
Which is not an initial capability of the open the airbase force module? |
|
Definition
Explosive Ordinance Disposal (EOD). |
|
|
Term
The key capabilities for establishing control in the Command and Control module are |
|
Definition
secure communications and intelligence. |
|
|
Term
Which force module facilitates integration of open the airbase and command and control force module capabilities to enable the airfield to generate air support to accomplish its assigned mission? |
|
Definition
|
|
Term
Within how many days after open the airbase does the operate the airbase force module arrive, and when is delivery estimated to be complete? |
|
Definition
|
|
Term
Which force module contains support forces that would generally not arrive until 30 days after the deployed location is established? |
|
Definition
|
|
Term
The Contingency Response Wing headquarters is located at |
|
Definition
Joint Base McGuire-Dix-Lakehurst, NJ |
|
|
Term
What is the typical pay grade of the deployed Contingency Response Group commander? |
|
Definition
|
|
Term
Which force module supported by Theater Deployable Communications (TDC) is established within 48 hours and supports 50 to150 users in a café environment? |
|
Definition
|
|
Term
In the operate the air base module, what is the maximum distance an extended site can be located from the base Network Control Center Deployed (NCC-D)? |
|
Definition
|
|
Term
Which is not a division of the Air and Space Operations Center? |
|
Definition
|
|
Term
Which of the following is categorized as a small unmanned aerial system (UAS)? |
|
Definition
|
|
Term
Which of the following is not a career field assigned to engineering installation units? |
|
Definition
|
|
Term
Which Engineering Installation (EI) unit has the only flight assigned that supports a 72 hour rapid response force during crisis providing specialized engineering support in telecommunications and electromagnetic spectrum field analysis? |
|
Definition
85 Engineering Installation Squadron (EIS). |
|
|
Term
All armed forces broadcasting affiliates merged under the American Forces Network (AFN) in |
|
Definition
|
|
Term
What Methods and Procedures Technical Order (MPTO) defines project management as the application of knowledge, skills, tools, and techniques to project activities to meet project objectives? |
|
Definition
|
|
Term
The five phases of Project Management are initiate, |
|
Definition
plan, execute, close, and control. |
|
|
Term
What does the project manager provide in the Initiate Phase? |
|
Definition
Answers, guidance, and education |
|
|
Term
What are the source documents that define a needed cyberspace infrastructure capability called? |
|
Definition
|
|
Term
Which of these items is contained in the Project Plan? |
|
Definition
|
|
Term
The desired outcome, product, or service of a project is referred to as |
|
Definition
|
|
Term
Which of the following is a type of change request used to correct a portion of the project not meeting requirement specifications? |
|
Definition
|
|
Term
What document marks the end of a project and validates the successful installation of a communications system? |
|
Definition
|
|
Term
Exceptions that could prevent a system from meeting specified operational requirements are termed |
|
Definition
|
|
Term
What is critical to controlling and ensuring the overall project progresses accordingly, regardless of the phase? |
|
Definition
|
|
Term
Changes are requested during a project using an |
|
Definition
|
|
Term
Who implements a technical solution for a base? |
|
Definition
Implementing organization. |
|
|
Term
What title is given to anyone assigned to assist the program manager in fulfilling program management duties? |
|
Definition
|
|
Term
The five key stages of the Information Technology Infrastructure Library (ITIL) service life cycle are service strategy, |
|
Definition
service design, service transition, service operation, and continual service improvement. |
|
|
Term
In what Information Technology Infrastructure Library (ITIL) stage do you determine the underlying principles used for developing the policies, objectives, guidelines, and processes required throughout the Service Life Cycle? |
|
Definition
|
|
Term
) In what Information Technology Infrastructure Library (ITIL) stage do you create the framework to ensure the designed service is effectively and efficiently implemented in the live environment? |
|
Definition
|
|
Term
Engineering support for MAJCOMs is provided by Cyberspace Systems Integrator Tier |
|
Definition
|
|
Term
Which guidance directs the use of Cyberspace Infrastructure Planning System (CIPS)? |
|
Definition
|
|
Term
Which Cyberspace Infrastructure Planning System (CIPS) functional area supports enhancements to current capabilities funded and accomplished at the base level generally in less than 30 days and in the form of a maintenance task order? |
|
Definition
|
|
Term
Which of the following funding options does the local communications squadron implement using base level support and resources? |
|
Definition
|
|
Term
Where can you find a list of lead commands or system program offices (SPOs) for each major program? |
|
Definition
|
|
Term
As a minimum which of the following is not required to review and validate technical solutions? |
|
Definition
|
|
Term
Which of the following is not a cause for requirements to be considered special? |
|
Definition
Requires additional funding. |
|
|
Term
In which type of plan do writers fully develop the mission, situation, and concept of operations for accomplishing assigned mission in the event of future situation, but only summarize the mobility and logistic requirements? |
|
Definition
|
|
Term
When tasked by the supported combatant commander which type of plan is prepared in support of the contingency plans? |
|
Definition
|
|
Term
If instructions are not detailed enough to warrant a separate annex, information on base functional area support is placed in the |
|
Definition
Operations Plan (OPLAN) major paragraph. |
|
|
Term
What area of the Annex K is used to detail wartime procedures for maintaining the communications systems under contract during peacetime? |
|
Definition
|
|
Term
Which type of planning meeting identifies civil engineering projects including new construction, renovations, or demolitions of facilities, and relocations of organizations? |
|
Definition
Facilities Utilization Board |
|
|
Term
The AF Form 1067 is used for defining, validating, and approving requirements for |
|
Definition
all temporary and permanent modifications. |
|
|
Term
Which modification type evaluates, demonstrates, or exercises the technical performance, operational effectiveness, and/or the operational suitability of developmental and/or test materiel (hardware, firmware and software) capabilities? |
|
Definition
T–2 temporary modification |
|
|
Term
Which of the following is not a step required in the modification proposal process? |
|
Definition
Work center manager certification and approval. |
|
|
Term
Support agreements are documented on |
|
Definition
|
|
Term
As a minimum, a support agreement must be reviewed how soon after its effective date? |
|
Definition
|
|
Term
Which of the following is not an exception to the “full and open competition” stipulation of the Competition in Contracting Act? |
|
Definition
Unit commander’s interest. |
|
|
Term
Within how many days of the delivery date must a fully researched, completed requirement for a fixed-price and cost reimbursement contract with a monetary value of $100,000 be submitted to the Base Contracting Office? |
|
Definition
|
|
Term
Which type of contract acquires supplies or services based on direct labor hours at specified fixed hourly rates? |
|
Definition
|
|
Term
Which type of contract should only be used when it is impossible to accurately estimate the extent or duration of the work or anticipate costs with any reasonable degree of accuracy? |
|
Definition
|
|
Term
Which type of contract is permissible when there is only one viable option to satisfy the requirement for supplies or services? |
|
Definition
|
|
Term
Which of the following is a simplified method of filling anticipated repetitive needs for supplies or services by establishing “charge accounts” with qualified sources of supply? |
|
Definition
Blanket Purchase Agreement. |
|
|
Term
Who is responsible for establishing and maintaining the installation’s contract Quality Assurance Program? |
|
Definition
|
|
Term
Who is responsible for assigning competent and capable functional experts as primary and alternate Contract Officer Representatives (COR)? |
|
Definition
Functional Director/Commander. |
|
|
Term
Who is responsible for providing training to Quality Assurance (QA) personnel and functional directors/commanders? |
|
Definition
Quality Assurance Program Coordinator. |
|
|
Term
Who acts as the unit focal point to provide design support to and/or obtain base Civil Engineering (CE) support? |
|
Definition
Unit plans, planning, and agreements section |
|
|
Term
What must base Civil Engineering (CE) prepare and forward to MAJCOM for review and approval if major or minor construction is required? |
|
Definition
|
|
Term
Secretary of Defense and House and Senate Armed Services Committees authorization and appropriation are required for what type of construction projects? |
|
Definition
All military construction. |
|
|
Term
The cost threshold for a minor construction project not using Operation and Maintenance (O&M) funds is |
|
Definition
|
|
Term
Who is responsible for inspecting all “real property” on an installation to ensure it meets applicable standards? |
|
Definition
|
|
Term
What are the Cyberspace Support specialist’s general responsibilities? |
|
Definition
Performing system analysis and design, programming, systems operation and maintenance, resource management and security management. |
|
|
Term
What CompTIA certification fulfills the DODD 8570 requirement for IAT Level I only? |
|
Definition
|
|
Term
|
Definition
Knowledge Operations Management. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Computer Systems Programming |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Cable and Antenna Systems |
|
|
Term
Which career Cyberspace Support career field(s) require IAT Level II certifications? |
|
Definition
|
|
Term
What career fields require personnel to be free from fear of heights and claustrophobia |
|
Definition
Cable and Antenna Systems (3D1X7 |
|
|
Term
What CFETP sections outline the required skills and progression for each assigned career field? |
|
Definition
|
|
Term
For personnel not in retraining status what is the minimum number of months OJT are required for upgrade to the 5- and 7-skill levels? |
|
Definition
|
|
Term
What function(s) of the unit’s operational mission does the Communications Focal Point directly support? |
|
Definition
Voice and data network systems, radio systems, video, and all other communications/cyber equipment/systems, while maintaining visibility of performance. |
|
|
Term
What is the first organization that AFNET users contact when they experience issues with their government provided end-user equipment? |
|
Definition
|
|
Term
|
Definition
To reflect the minimum essential level to accomplish the required workload. |
|
|
Term
Which document provides formulas to calculate target manning? |
|
Definition
|
|
Term
Who provides the UMD to the organization? |
|
Definition
Local Mission Support Squadron’s Manpower and Organization office. |
|
|
Term
Define unfunded positions |
|
Definition
Approved manpower authorizations that have not been funded for fill by the Air Force |
|
|
Term
|
Definition
Authorized manpower awarded to the unit and funded by the Air Force. |
|
|
Term
What is the purpose of the UPMR? |
|
Definition
The UPMR is used to match personnel assigned within the unit to the position numbers listed on the UMD. |
|
|
Term
What is the purpose of the PEC |
|
Definition
It defines which pot of money will pay for a specific position |
|
|
Term
|
Definition
|
|
Term
An OCR includes which actions? |
|
Definition
Unit activation, inactivation, redesignation, or variation to a policy, guidance, procedure or standard organization structure as depicted AFI 38–101 |
|
|
Term
How does an OCR differ from an ACR? |
|
Definition
It does not add, modify or change existing authorizations; it adds or removes work centers or realigns flights or work centers within the unit. |
|
|
Term
Which strategic level position is typically manned by CMSgts assigned to HAF and is responsible for organizing and managing one or more enlisted career fields? |
|
Definition
|
|
Term
Who possesses final authority to waive CFETP requirements? |
|
Definition
|
|
Term
Who serves as the MAJCOM liaison for her/his respective AFCFM? |
|
Definition
MAJCOM Functional Manager |
|
|
Term
Under what circumstances is the STRT held in conjunction with the U&TW? |
|
Definition
When it is obvious that new requirements will not drive additional sources. |
|
|
Term
What is the primary purpose of the STRT? |
|
Definition
For the AFCFM and functional leaders to determine and present training requirements to the AETC. |
|
|
Term
Who attends the Utilization and Training Workshop (U&TW)? |
|
Definition
AFCFM (Co-chair), AETC/TPM (Co-chair), AETC/TM, AETC/Program Element Manager (PEM), and MFMs. Optional U&TW attendees include the AETC CDC writer and representatives from AFCDA, AETC Occupational Analysis Division, AFPC education, training, and classification, and the AETC instructional technology unit (ITU). |
|
|
Term
What is the aim of the Occupational Survey? |
|
Definition
To facilitate decision-making on Air Force personnel and training programs by providing objective information about Air Force occupations. |
|
|
Term
Who is the job survey distributed to? |
|
Definition
All eligible career field members. |
|
|
Term
What AIS is used to track outages for computer and cyber network equipment? |
|
Definition
|
|
Term
What AIS is used to document actions on any item with an assigned SRD? |
|
Definition
|
|
Term
What is the ESR system currently used for reporting IMDS related equipment status? |
|
Definition
|
|
Term
Define partial mission capable |
|
Definition
System or equipment functioning in such a way that it can perform at least one, but not all of its assigned missions or functions; system is impaired but usable |
|
|
Term
Define inactive equipment. |
|
Definition
Equipment not commissioned or installed to perform an operational mission or requirement. |
|
|
Term
What is used to develop user-level master inspection schedules |
|
Definition
Scheduled inspection intervals. |
|
|
Term
What is an Authorized Service Interruption? |
|
Definition
Coordinated and planned outage for preventative maintenance inspections, configuration changes and optimizations that require an AFNet component/service to be unavailable for a specified length of time |
|
|
Term
What is the system officially used to document training? |
|
Definition
|
|
Term
What four items must the MTP include? |
|
Definition
Master Task List, Current CFETP and applicable AFJQS, Local JQS (if applicable), Milestones for tasks and CDC completion. |
|
|
Term
What types of tasks are identified in the Master Task List? |
|
Definition
Contingency/Wartime tasks, additional duties identified by the supervisor as certifiable tasks, and mandatory core tasks identified by the AFCFM. |
|
|
Term
Who determines when the trainee is ready for task certification? |
|
Definition
|
|
Term
How is the initial evaluation documented? |
|
Definition
Document the completion of the evaluation with a journal entry on the TBA Website via the Air Force Portal. |
|
|
Term
What must be done prior to conducting the initial evaluation on newly assigned personnel? |
|
Definition
The supervisor must assign individual training requirements to the trainee’s Individual Training Plan. |
|
|
Term
Which two factors should supervisors include when providing trainee feedback? |
|
Definition
Include what the trainee is doing correctly (positive feedback), Provide areas for improvement (constructive feedback) |
|
|
Term
Who are UTC Personnel Evaluations conducted on? |
|
Definition
All 3DXXX personnel assigned to UTC-based organizations whose primary mission is to deploy. |
|
|
Term
|
Definition
ORM is a decision-making process to systematically evaluate possible courses of action, identify risks and benefits, and determine the best course of action for any given situation |
|
|
Term
Name the four principles that govern all actions associated with the ORM. |
|
Definition
Accept no unnecessary risk, Make risk decisions at the appropriate level, Accept risk when benefits outweigh the costs, Integrate ORM into operations and planning at all levels. |
|
|
Term
Which document would you reference to learn about the ORM program? |
|
Definition
AFI 90–901, Operational Risk Management (ORM) Program |
|
|
Term
What is specifically tailored to address safety concerns of the work environment? |
|
Definition
|
|
Term
Who provides job safety training to all newly assigned individuals? |
|
Definition
|
|
Term
What must be exercised to ensure personnel follow all precautions and safety measures, including the proper use of PPE? |
|
Definition
|
|
Term
What is the first step in Job Safety Analysis step? |
|
Definition
Document the activity: Assemble those involved in the activity and then, using the JSA worksheet, write down the tasks that make up the activity, step by step |
|
|
Term
What must be in place to ensure workers have the skills to complete the job and that there is a required level of supervision to ensure the tasks are completed as documented? |
|
Definition
|
|
Term
What will supervisors perform to check the day-to-day safety and health of an organization, work center, facility, and so forth? |
|
Definition
|
|
Term
What enables easy filing and indexing of TOs and provides a means for users to identify and establish distribution requirements? |
|
Definition
|
|
Term
What is the official Air Force system for managing TO libraries? |
|
Definition
|
|
Term
What POC oversees TO requirements and distribution within an organization? |
|
Definition
|
|
Term
What are the duties of the TODO? |
|
Definition
Establish and maintain a TO Account in ETIMS, establish and maintain organization TODA for organization subaccounts, and maintain records of TOs required and on hand in organization physical distribution media TO libraries |
|
|
Term
When do work centers ensure LWCs, LJGs, LPSs, and LCLs are reviewed for currency? |
|
Definition
When source references change, or at least annually |
|
|
Term
How are LWC Identification numbers developed? |
|
Definition
LWC, LCL, or LJG followed by originating organization, and the TO number or designator. |
|
|
Term
What business sectors does the ANSI influence? |
|
Definition
Nearly every sector of business. |
|
|
Term
Where does the Telecommunications Industry Association obtain its accreditation? |
|
Definition
|
|
Term
What standards does the ECIA develop? |
|
Definition
Interconnect, passive and electro-mechanical (IP&E) electronic components under the ANSI-designation of EIA standards |
|
|
Term
What are the negative effects of inadequate research when developing publications? |
|
Definition
Inadequate research could result in issuing more than one publication on the same subject, conflicting instructions, or publishing a nonessential or incomplete publication |
|
|
Term
List the required activities for creating a new publication |
|
Definition
(1) Draft and collaborate with publications change manager. (2) Formal coordination. (3) Obtain certifying official’s endorsement. (4) Obtain approving official’s endorsement. (5) Submit to publications manager for final processing. |
|
|
Term
What immediate result is expected after an AF TCNO is issued? |
|
Definition
Patching of AFIN or DoDIN systems to minimize or eliminate exploitation vulnerabilities |
|
|
Term
The USC is a compilation of which types of federal laws of the United States? |
|
Definition
|
|
Term
What USC Title includes cyber-related topics, such as cyber security research and online shopper protection? |
|
Definition
USC Title 15, Commerce and Trade |
|
|
Term
What is meant by the term posse comitatus and what does it enforce |
|
Definition
“Force of the country”; civil law when not expressly authorized by the Constitution or an act of Congress |
|
|
Term
Chapter 5 of what USC Title spells out the situations in which one can draw special pay or reenlistment bonuses |
|
Definition
USC Title 37, Pay and Allowances of the Uniformed Services |
|
|
Term
What is the premise of the War Power Resolution |
|
Definition
To clarify and expand on constitutional authority to enter the U.S. Armed Forces into hostilities |
|
|
Term
How does Air Force EIM enable mission capabilities |
|
Definition
Through seamless integrated access to the right information anytime or anywhere |
|
|
Term
What is the primary purpose of a chat room |
|
Definition
To share information via text with a group of individuals |
|
|
Term
What does the DCO portal do? |
|
Definition
Allows for registration, authentication and scheduling connection meetings and instant messaging sessions |
|
|
Term
What are the two types of Air Force Web pages/sites? |
|
Definition
|
|
Term
What is the difference between the two types of Air Force Web pages/sites |
|
Definition
Public Webpages/sites are intended for viewing by the general public; private webpages/sites are intended for a limited audience |
|
|
Term
Who has the overall responsibility for publishing local policy and guidance defining authorized personal use of the internet |
|
Definition
|
|
Term
|
Definition
Performance of work associated with your day-to-day responsibilities or performance of only official duties on official time |
|
|
Term
Name four situations that can be considered unethical but not necessarily illegal. |
|
Definition
(1) Personal conflict of interest. (2) Covered relationships. (3) Misuse of position. (4) Non-public information. |
|
|
Term
What is the DoD internal methodology used to allocate resources to capabilities? |
|
Definition
|
|
Term
What is the purpose of the PPBE process? |
|
Definition
To allocate resources within the Department of Defense |
|
|
Term
What information can be used as a baseline for projecting next year’s operating costs? |
|
Definition
Cost information from supply reports |
|
|
Term
What does the MILCON program cover |
|
Definition
All land acquisition; Acquiring and constructing facilities; Adding to, expanding, extending, converting, altering, or replacing existing facilities; Relocating facilities; Planning and Design; Construction overhead, supervision, and inspection; Equipment installed in and made a part of real property structures and improvements and real property installed equipment-RPIE |
|
|
Term
While congressional appropriations committees approve individual projects, what about the amounts appropriated |
|
Definition
They may be less than their estimated cost |
|
|
Term
What is the main goal of the Government Purchase Card Program |
|
Definition
To provide Air Force users a simplified, streamlined method of purchasing and paying for simple, lowdollar value, items of supply and service |
|
|
Term
What regulation provides in-depth information for administering the Government Purchase Card Program |
|
Definition
To provide Air Force users a simplified, streamlined method of purchasing and paying for simple, lowdollar value, items of supply and service |
|
|
Term
What does the Air Force use as the electronic tool for managing its GPC program |
|
Definition
|
|
Term
When do wing or equivalent commanders submit shortfalls or reclamas |
|
Definition
When a wing or tasked unit does not possess sufficient equipment or qualified personnel to support a UTC or the tasking will shut down critical elements of the home station mission. |
|
|
Term
|
Definition
The lack of forces, equipment, personnel, material or capability reflected as the difference between the resources identified as a plan requirement and those apportioned to a combatant commander for planning that would adversely affect the command’s ability to accomplish its mission |
|
|
Term
List the conditions that will make a shortfall valid |
|
Definition
The capability is not available at the unit and the wing or tasked unit has the capability and sufficient personnel to meet requirements, but deployment of personnel and/or equipment would cause a severe mission impact on the wing or unit. |
|
|
Term
Which agency honors the 12 Outstanding Airmen at its annual convention in Washington D.C.? |
|
Definition
|
|
Term
If selected as one of the 12 Outstanding Airmen, what must the nominees agree to in a signed statement of intent |
|
Definition
Nominees must sign a statement of intent agreeing to obtain retainability to serve for 12 months on the AFA Enlisted Advisory Council beginning on their 12 OAY induction date (September). Additionally, the statement of intent requires the member to agree not to apply for a commissioning program during the year of selection. |
|
|
Term
What achievement(s) does the Lance P. Sijan USAF Leadership Award recognizes officers and enlisted leaders for |
|
Definition
This award recognizes officers and enlisted leaders who exude the highest level of leadership in the performance of their duties and off duty conduct |
|
|
Term
Which document provides guidance for awards specific to the Cyber community |
|
Definition
AFI 36–2845, Secretary of the Air Force, Chef of Information Dominance and Chief Information Officer Special Trophies and Awards |
|
|
Term
How long must individuals be in their rank tier and duty AFSC to be nominated for the Information Dominance Award |
|
Definition
Nominated individuals must have been in the rank tier and performed in the duty AFSC for at and for least 183 days during the award period of service |
|
|
Term
|
Definition
The term “random access” refers to the method of addressing memory. With random access, the CPU can address any memory location directly and read the data contained at that memory location. |
|
|
Term
What is the difference between ROM and RAM |
|
Definition
ROM is a type of memory that normally can only be read, as opposed to RAM, which can be both read and written to. The data stored in ROM is always there, whether there is power or no power. |
|
|
Term
What is the special type of memory used to store the BIOS settings in a PC |
|
Definition
|
|
Term
What term is used for the speed enhancement resulting from a small amount of memory placed inside the CPU or between the CPU and the computer’s main memory |
|
Definition
|
|
Term
What is the “trade name” that refers to the 40-pin interface and drive-controller architecture designed to implement the ATA standard |
|
Definition
|
|
Term
Which connection enables data transfer speeds of 480 Mbps and can handle up to 127 peripherals at once? |
|
Definition
|
|
Term
How much data can be stored on a CD-R |
|
Definition
|
|
Term
Most high-volume printers can connect to a network directly using what internal device |
|
Definition
|
|
Term
At the simplest level, state the two things that an operating system does |
|
Definition
It manages hardware and software resources of the computer system, and provides a stable, consistent way for applications to deal with the hardware without having to know all of the details of the software |
|
|
Term
Name an operating system’s six task categories |
|
Definition
Processor management, Memory management, Device management, Storage management, Application interface, User interface. |
|
|
Term
Name the Microsoft Windows family of operating systems |
|
Definition
Windows 98, Windows NT, Windows 2000 series, Windows XP, Windows Vista, Windows 7 and Windows 8. |
|
|
Term
|
Definition
A collection of computers defined by the administrator of a Windows Server network that share a common directory/database |
|
|
Term
When did Bell Labs develop the UNIX operating system |
|
Definition
|
|
Term
What do you call the UNIX program that you interact with directly from your terminal or workstation? |
|
Definition
|
|
Term
Name four common UNIX shells |
|
Definition
(1) Bourne shell. (2) Korn Shell. (3) C shell. (4) Restricted shell. |
|
|
Term
|
Definition
Partitions are physical areas of disk allocated with specific sizes to hold file systems |
|
|
Term
When are partitions established |
|
Definition
During system configuration. |
|
|
Term
In which UNIX directory are application programs contained |
|
Definition
|
|
Term
What is the firmware prompt called on Sun machines |
|
Definition
ok (often called the O.K. prompt) |
|
|
Term
Applications are what type of programs |
|
Definition
|
|
Term
Which application allows the creation of queries, forms, reports, and macros |
|
Definition
|
|
Term
What program, available as a free download from Adobe’s website, allows you to view PDF files? |
|
Definition
|
|
Term
Into what two groups can you divide the OSI model |
|
Definition
Application (upper) layer and Data Transport (lower) layer. |
|
|
Term
What is the responsibility of the Data Transport layers of the OSI model? |
|
Definition
Define how data travels the physical media, through Internetwork devices, to the destination computer, and to the application on the destination machine. |
|
|
Term
This layer divides into two sub layers: LLC and MAC. |
|
Definition
|
|
Term
This layer typically includes multiplexing, virtual circuit management, and error checking and recovery. |
|
Definition
|
|
Term
This layer defines the electrical, mechanical, procedural, and functional specifications for network communications |
|
Definition
|
|
Term
A hub operates at this layer |
|
Definition
|
|
Term
Switches and bridges operate at this layer |
|
Definition
|
|
Term
This layer provides a variety of coding and conversion functions that are applied to application layer data |
|
Definition
|
|
Term
A router operates at this layer |
|
Definition
|
|
Term
This layer establishes, manages, and terminates communication sessions. |
|
Definition
|
|
Term
At this layer, common data compression and encryption schemes are used |
|
Definition
|
|
Term
|
Definition
DISN is a telecommunications network that provides the exchange of information in an interoperable and global space, divided by security demands, transmission requirements, and geographic needs of targeted end-user customers. The DISN offers a selection of integrated standards-based services to fulfill these connectivity needs. |
|
|
Term
What unclassified IP data service provides internet connectivity and supports e-mail and web services |
|
Definition
|
|
Term
What service uses a number of different satellite services to provide warfighters with worldwide access and GIG connectivity for diversity, redundancy and availability |
|
Definition
|
|
Term
Transport protocols have two classifications based on the way data transports, name the two classifications |
|
Definition
Connection Oriented and Connectionless Oriented. |
|
|
Term
What must occur between both ends before transfer of information in a connection-oriented environment |
|
Definition
A connection must be established between both ends. |
|
|
Term
|
Definition
Temporary store of excess data bursts that remain in memory of network devices until processed. |
|
|
Term
The easiest way to break down the many protocols of the TCP/IP suite is according to where they operate within the OSI model. Each protocol in this stack operates at one of what four layers? |
|
Definition
The Data Link layer, the Network layer (also known as the Internet layer in the TCP/IP model), the Transport layer or the Application layer. |
|
|
Term
The protocols at the Data Link layer define the access method for the media, the architecture, and interface with the Physical layer of the network. What standards are these protocols based on |
|
Definition
|
|
Term
What are the four most important TCP/IP protocols that function within the network layer |
|
Definition
(1) Internet Protocol (IP). (2) Address Resolution Protocol (ARP). (3) Reverse Address Resolution Protocol (RARP). (4) Internet Control Message Protocol (ICMP). |
|
|
Term
What are the fields belonging to a TCP segment |
|
Definition
Source Port, Destination port, Sequence number, Acknowledgement number (ACK), TCP header length, Reserved, Flags (Control bits), Sliding window size, Checksum, Urgent pointer, Options, Padding, and Data. |
|
|
Term
In the context of TCP/IP, what is a packet also known as |
|
Definition
|
|
Term
What are the two main parts of an IPv4 address |
|
Definition
Network number and network host |
|
|
Term
What are the two main parts of an IPv4 address |
|
Definition
Authorized representatives of IANA |
|
|
Term
What is the reserved IPv4 address for loop back |
|
Definition
127 in the network field, and .any number in the host field |
|
|
Term
What is the reserved IPv4 address for a limited broadcast |
|
Definition
|
|
Term
|
Definition
A mechanism that allows a network device to divide an IP address into a network and host number |
|
|
Term
What are the two methods of subnet masking |
|
Definition
|
|
Term
What are some benefits to subneting |
|
Definition
Subnets ease administration, improve network performance, and security |
|
|
Term
How long is an IPv6 address |
|
Definition
16 octets long, or 128 bits. |
|
|
Term
How is an IPv6 address expressed? |
|
Definition
In 16 byte fields using a colon hexadecimal format. |
|
|
Term
What are the two ways to shorten the expression of an IPv6 address |
|
Definition
Leading zero compression and zero compression. |
|
|
Term
What is a unicast address |
|
Definition
Unicast addresses identify a single interface. A packet sent to a unicast address delivers to the interface identified by that address. |
|
|
Term
What is a multicast address |
|
Definition
Multicast addresses (FF00::/8) identify a group of interfaces belonging to different nodes. Multicast packets send to all interfaces identified by that address. |
|
|
Term
What is an Anycast address |
|
Definition
Anycast addresses also identify a set of interfaces, but the packets deliver to and accept by the closest interface |
|
|
Term
What are the three types of unicast address |
|
Definition
(1) Link. (2) Site. (3) Global |
|
|
Term
What is the IPv6 loop back address |
|
Definition
|
|
Term
What does a TCP/IP client use to request a particular service |
|
Definition
Specific values called port numbers to request a particular service |
|
|
Term
What is the range of well-known port numbers |
|
Definition
|
|
Term
What is the default port assignment for TELNET |
|
Definition
|
|
Term
What is the default port assignment for credit card transactions on e-commerce sites |
|
Definition
Port 443-Secure Socket Layer |
|
|
Term
|
Definition
|
|
Term
What is the name for networks that use the same software and protocols as the public internet, but exist as a portion of an entity’s private network? |
|
Definition
|
|
Term
What term describes a group of computers and devices that share a common communication line and resources in a small geographical area? |
|
Definition
|
|
Term
What type of network interconnects several local area networks by bridging them with backbone lines? |
|
Definition
|
|
Term
What is the name for a network connected between two cities |
|
Definition
|
|
Term
Primary addressing in WLANs is achieved by using what type of address |
|
Definition
|
|
Term
List the advantages to using WLAN |
|
Definition
(1) Mobility. (2) Ease of installation. (3) Lower cost. |
|
|
Term
List each of the IEEE wireless standards |
|
Definition
(1) 802.11b. (2) 802.11a. (3) 802.11g. (4) 802.11n. |
|
|
Term
The 802.11n standard operates at what frequency |
|
Definition
|
|
Term
What network provides a private tunnel through the Internet? |
|
Definition
|
|
Term
What type of configuration does the Air Force use for most VPN traffic |
|
Definition
The gateway-to-gateway configuration |
|
|
Term
What is a physical topology |
|
Definition
A description of the layout of the network media that interconnects the devices on a network |
|
|
Term
What is a logical topology |
|
Definition
Defines the way in which devices communicate throughout the network. |
|
|
Term
What is the rule of thumb to distinguish physical from logical topologies |
|
Definition
If you can see it and touch it, it is physical, if you cannot see it or touch it, it is logical |
|
|
Term
Because a topology affects the network’s capabilities, what is the impact of choosing one topology over another |
|
Definition
Equipment needs, equipment capabilities, network expansion, network management |
|
|
Term
What are the advantages of a bus topology |
|
Definition
Inexpensive to install, easy to expand, requires less cabling that other topologies, works well for small networks |
|
|
Term
What are the disadvantages of a bus topology |
|
Definition
No longer used, cable breaks causes entire network outage, limited number of devices, troubleshooting is difficult, slower access time |
|
|
Term
What are the advantages of a star topology |
|
Definition
Easy network expansion, cable failure won’t interrupt the entire network, centralized management, easy to troubleshoot, faster network speeds, most common topology so equipment options are virtually unlimited |
|
|
Term
What are the disadvantages of a star topology |
|
Definition
Requires more media than a ring or bus, failure of the central device can bring down the entire network, cost of installation. |
|
|
Term
What are the advantages of a ring topology |
|
Definition
Data transmits at greater speed, no collisions, easy to troubleshoot, no terminators |
|
|
Term
What are the disadvantages of ring topology |
|
Definition
Requires more cable than a bus network, cable break could bring the network down, difficult to add devices to active network, uncommon so equipment is not readily available |
|
|
Term
What are the two most common hybrid topologies |
|
Definition
(1) Star-bus. (2) Star-ring. |
|
|
Term
What data transport method grew out of the need for a worldwide standard to allow interoperability of information, regardless of the information type or “end-system”? |
|
Definition
|
|
Term
How many bytes make up the ATM cell, header, and payload? |
|
Definition
53 byte cell, 5 byte header, 48 byte payload |
|
|
Term
ISDN channels are separated into two sub-channels, list and describe the sub-channels. |
|
Definition
Sub-channel B 56 Kbps or 64 Kbps and are used for both voice and data. Each B channel can carry a separate telephone call. The D-channel is a 16 Kbps use to carry call control (or supervisory) information. The information on the “D” channel tells the network switches what to do with the traffic on the “B” channels. |
|
|
Term
When the full bandwidth of a T1 line is not needed it can be divided in 64 Kbps increments known as what? |
|
Definition
|
|
Term
What Ethernet standard has supplanted Fast Ethernet in wired networks |
|
Definition
Gigabit Ethernet (GbE or 1 GigE). |
|
|
Term
|
Definition
A modem (modulator-demodulator) is a device that modulates signals to encode digital information and demodulates signals to decode the transmitted information |
|
|
Term
What are the two types of modems used |
|
Definition
Dial-up and dedicated, also known as leased. |
|
|
Term
What is one of the principal functions of a CSU? |
|
Definition
Provides a barrier for electrical interference from either side of the unit. |
|
|
Term
What is the main function of a DSU |
|
Definition
To adapt the digital data stream produced by the customer’s equipment to the signaling standards of the telephone carrier equipment, and vice versa |
|
|
Term
What is the primary use for a bridge |
|
Definition
To decrease network congestion but also propagate a signal like a repeater |
|
|
Term
What do LAN switches provide between network devices |
|
Definition
Switches provide collision-free, high-speed communication between network devices |
|
|
Term
Can a switch connect LANs of different bandwidths? If so, give example |
|
Definition
Yes; this is accomplished with buffering |
|
|
Term
What type of switching is required when a moving a frame from a low-speed LAN to a highspeed LAN |
|
Definition
Store-and-forward switching |
|
|
Term
What is the fundamental difference between Layer 2 and Layer 3 switching |
|
Definition
The layer at which each forwarding decision is made. |
|
|
Term
Routers operate at which layer of the OSI model |
|
Definition
Layer three (network) of the OSI Model |
|
|
Term
What does a typical router contain |
|
Definition
Internal processor, an operating system, memory, input and output jacks for different types of network connectors (depending on the network type); and, usually, a management console interface. |
|
|
Term
Routers compare metrics to determine optimal routes; these methods differ depending on what |
|
Definition
Design of the routing algorithm used |
|
|
Term
What are routing protocols that manage traffic within an autonomous system called? |
|
Definition
|
|
Term
Name two methods for directing data on the network. |
|
Definition
Static or dynamic routing |
|
|
Term
|
Definition
Static routing is a technique in which a network administrator programs a router to use specific paths between nodes. |
|
|
Term
|
Definition
Dynamic routing automatically calculates the best path between two nodes and compiles this info in a routing table. |
|
|
Term
What are the two methods that encryption can be applied |
|
Definition
Encryption can be applied on either a link-by-link basis or an end-to-end basis |
|
|
Term
What is the most common telephone device used for voice encryption? |
|
Definition
|
|
Term
What are the most common types of all metallic cable used in networks |
|
Definition
Twisted pair cable and coaxial cable. |
|
|
Term
Which cable type is associated with the original designs of the Ethernet standard |
|
Definition
|
|
Term
List and describe the four most common coax cable types. |
|
Definition
(1) RG–6, 75Ohms. (2) RG–58, 50Ohms. (3) RG–8, 50 Ohms. (4) RG–11, 50 Ohms |
|
|
Term
What medium is the primary carrier for voice telecommunications |
|
Definition
|
|
Term
List and describe the categories of twisted pair cable |
|
Definition
(1) CAT 1, 1 Mbps, voice only analog phone lines (not used for data communications). (2) CAT 3, 10 Mbps, Ethernet (10BaseT). (3) CAT 5, 100 Mbps, Ethernet (100BaseT). (4) CAT 5e, 1 Gbps (1000 Mbps), Ethernet (1000BaseT). (5) CAT 6 and 6a, 10 Gbps, 10 Gigabit Ethernet (10GbE). |
|
|
Term
What three things do an optical communications system require to transport communications |
|
Definition
(1) A light source (transmitter). (2) A transmission medium (cable). (3) A sensor (receiver). |
|
|
Term
List the advantages of fiber optic systems over conventional cable systems |
|
Definition
(1) Larger bandwidths. (2) Freedom from interference. (3) Low cost and lightweight |
|
|
Term
Is fiber optic cable immune to EMI |
|
Definition
|
|
Term
What is the most common wireless networking standard |
|
Definition
|
|
Term
What three major considerations affect supporting cyber operations |
|
Definition
(1) Policy. (2) Authority. (3) Law. |
|
|
Term
What three priorities drive the National Strategy to Secure Cyberspace |
|
Definition
(1) Prevention of cyber attacks against America’s critical infrastructure. (2) Reduce national vulnerability to cyber attacks. (3) Minimize damage and recover time from cyber attacks |
|
|
Term
Can an Air National Guardsman execute a cyber-operation |
|
Definition
A guardsman in Title 32 status may train for Title 10 missions but cannot execute them |
|
|
Term
What is the primary Air Force command for cyberspace missions |
|
Definition
|
|
Term
How does OCO intend to project power |
|
Definition
By the application of force in and through cyberspace. |
|
|
Term
In DCO, what are reactive defenses |
|
Definition
Measures taken to directly counter an adversary penetrating a network or actions taken to terminate the ongoing intrusion |
|
|
Term
Most exploitation activities evolve from what |
|
Definition
|
|
Term
On delegation authority, whose cyber tasking orders does the 624 OC relay to all Air Force units |
|
Definition
|
|
Term
What are the four agencies the I-NOSC relays cyber orders to |
|
Definition
(1) MAJCOMs. (2) MCCCs. (3) ACCCs. (4) Installation communications units. |
|
|
Term
Does the ATO reflect the integrated air, space, and cyberspace operations plan that supports a joint force commander’s campaign |
|
Definition
|
|
Term
What weapons system provides continuous monitoring and defense of AF unclassified and classified networks? |
|
Definition
|
|
Term
What AF weapons system offers top-level boundary and entry point into the Air Force Information Network (AFIN)? |
|
Definition
|
|
Term
What are the four sub-discipline areas of the AFINC? |
|
Definition
(1) Defense-in-Depth. (2) Proactive Defense. (3) Network Standardization. (4) Situational Awareness |
|
|
Term
How would you define SCADA |
|
Definition
The term SCADA refers to centralized systems, which monitor and control industrial sites, or complexes of systems spread out over large areas. |
|
|
Term
How are SCADA systems typically implemented |
|
Definition
Through a distributed database, commonly referred to as a tag database, which contains data elements called tags or points. |
|
|
Term
Who must evaluate and certify all IT systems, including NSS, with external interfaces |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
What is a weakness in a computer system or network open to exploitation called |
|
Definition
|
|
Term
What security professional goal is a result of understanding that all risk cannot be removed |
|
Definition
To eliminate or mitigate as many risks as possible. |
|
|
Term
What passive nature attack is the first step in a replay attack |
|
Definition
|
|
Term
Due to cost and imperfections, what method should not be used as the sole form of authentication? |
|
Definition
|
|
Term
Although inexpensive in implementing, what systems have the major vulnerability of being prone to brute force attacks? |
|
Definition
|
|
Term
What actions are included in the scope of end-to-end monitoring |
|
Definition
Monitoring, measuring, performance analysis, and optimizing networks and network systems. |
|
|
Term
What is capacity planning |
|
Definition
The long-trend analysis of network devices to identify future constraints with the results incorporated into future technical baselines |
|
|
Term
|
Definition
The comprehensive evaluation and validation of an AF IS to establish the degree to which it complies with assigned IA controls based on standardized procedures. |
|
|
Term
|
Definition
The formal declaration by an AO that the information system is approved to operate in a particular security mode using a prescribed set of safeguards at an acceptable level of risk. |
|
|
Term
When does the validation of computer requirements process begin? |
|
Definition
When the user identifies a mission need and requests CSO assistance with defining the requirement and developing a technical solution for that need |
|
|
Term
When do requirements arise |
|
Definition
When there is a deficiency in an existing operational capability, a need for a new capability, or an opportunity to replace or modernize an existing system with improved technology when operationally and economically practical. |
|
|
Term
What are the five phases in the DIACAP process |
|
Definition
(1) Phase I, Initiate and plan IA and C&A. (2) Phase II, Implement and validate assigned IA controls. (3) Phase III, Make certification determination and accreditation decision. (4) Phase IV, Maintain authorization to operate and conduct reviews. (5) Phase V, Decommission. |
|
|
Term
What is a connection approval |
|
Definition
The formal approval for an IS to connect to the AFIN and the acceptance of risk associated with the IS connection by the Air Force Enterprise AO or delegated individual |
|
|
Term
|
Definition
An approval granted by the lead AO or appointed AO to operate the system at an acceptable level of risk |
|
|
Term
What is the temporary authorization to test a DOD IS in a specified operational information environment within the timeframe and under the conditions or constraints enumerated in the accreditation decision |
|
Definition
|
|
Term
What is a specific fact about friendly intentions, capabilities, and activities vitally needed by adversaries for them to plan and act effectively, so as to guarantee failure or unacceptable consequences for friendly mission accomplishment |
|
Definition
|
|
Term
Define deployment planning |
|
Definition
Deployment planning is a continuous, iterative and highly structured process that allows for an orderly transition from peace to war and then to post-hostilities operations |
|
|
Term
Which type of plan is driven by current events in real time and normally occurs in emergencies and in the context of time-sensitive situations |
|
Definition
|
|
Term
Which document details deployment execution responsibilities and procedures for crisis action and deliberate plans, as well as executing the deployment and reception of equipment and personnel |
|
Definition
|
|
Term
Who initiates a Request for Forces in the development phase of the deployment sourcing process |
|
Definition
|
|
Term
What name is given to a tasking when a non-standard sourcing solution is required |
|
Definition
Joint Expeditionary Tasking (JET). |
|
|
Term
When must MAJCOMs verify whether or not they can support a requirement |
|
Definition
After the 10-day initial sourcing window has closed |
|
|
Term
SORTS assesses unit status based on what two factors |
|
Definition
(1) The mission for which it was designed and organized for. (2) The mission as tasked per the OPORD. |
|
|
Term
What rating applies to a unit if its personnel, equipment, and supplies on hand, equipment, and condition falls between 70 to 89% |
|
Definition
|
|
Term
What is the ART and its purpose |
|
Definition
ART is a SIPRNET Web-based tool with a NIPRNET training suite that gives AEF-allocated units the ability to report timely and accurate UTC readiness and tasking status |
|
|
Term
Which units are required to report status in ART |
|
Definition
All Air Force units including Air National Guard and Reserve components owning standard UTCs postured in UTC availability. |
|
|
Term
What is the definition of a DOC statement |
|
Definition
The mission for which a measured unit has been equipped, organized, or designed. |
|
|
Term
What is the purpose of an Air Force SORTS DOC statement |
|
Definition
To summarize the unit’s mission using the DRRS core Mission Essential Task List and provide units with a single document referencing all that determine the pool of resources and training to measure and report in SORTS. |
|
|
Term
What does the LOGDET define |
|
Definition
The standard passenger and equipment movement requirements for each UTC. |
|
|
Term
What is the objective of MANFOR |
|
Definition
To provide joint and AF planners with standardized force capabilities documenting manpower requirements for execution, operations and planning documents |
|
|
Term
Provided there is no need for extensive operational landing strip preparation, how soon after arrival of forces should the Open the airbase force module reach IOC? |
|
Definition
|
|
Term
When is the C2 force module estimated to be able to declare IOC |
|
Definition
16 hours from arrival at the deployed location |
|
|
Term
How many subordinate force modules comprise the Generate the mission force module |
|
Definition
|
|
Term
Which subordinate force module contains aviation and direct aviation support |
|
Definition
|
|
Term
The Operate the airbase force module includes mission support forces necessary to achieve what capability level |
|
Definition
|
|
Term
In the Robust the airbase force module, how many days do support forces generally arrive after the deployed location is established |
|
Definition
|
|
Term
What are the two Contingency Response Force mission sets |
|
Definition
(1) Contingency response. (2) Mobility advisory missions |
|
|
Term
What is the deployable CRG’s primary mission |
|
Definition
To open and/or operate airfields or airbases after seizure, or whenever needed to assess, open, and initially operate airbases in support of the Air Force component of the COCOM |
|
|
Term
|
Definition
To support the efficient transfer of command and control, intelligence, logistics, and administrative data between fixed sites and deployed locations, multiple functional areas at each deployed location, and/or CONUS gateway locations and deployed locations |
|
|
Term
Which units are the largest users of TDC equipment |
|
Definition
Combat Communications units |
|
|
Term
Which TDC package is established within 48 hours and supports 50-150 users in a café |
|
Definition
|
|
Term
What is the ASOC’s overall mission |
|
Definition
Provide tactical C2 of Close Air Support (CAS) assets to support Army, joint, and/or coalition ground force commanders. |
|
|
Term
What is unique about an ASOS |
|
Definition
It is comprised primarily of Air Force personnel and attached to various U.S. Army units |
|
|
Term
UASs were primarily developed for what purpose |
|
Definition
For use in reconnaissance and intelligence gathering |
|
|
Term
What are EI units responsible for designing, engineering, and installing |
|
Definition
The full range of cyberspace equipment and components typically found at a fixed site and other specialty systems unique to expeditionary forces |
|
|
Term
Which unit is assigned as the Engineering Installation Governance Structure Secretariat, and centrally manages and implements AF-wide cyberspace requirements and projects (not including ANG bases)? |
|
Definition
|
|
Term
What is the timeframe Air Force installations have to disseminate emergency information after incident notification and verification |
|
Definition
Immediately, but no longer than 10 minutes after incident notification and verification |
|
|
Term
Where is the AFN broadcast center located, and what services does it provide |
|
Definition
Riverside, California; provides programming for military radio and television outlets overseas. |
|
|
Term
What MPTO defines project management as “the application of knowledge, skills, tools, and techniques to project activities to meet project objectives?” |
|
Definition
|
|
Term
Name the five phases of project management |
|
Definition
Initiate, Planning, Execute, Close, Control |
|
|
Term
What are some items to consider when defining requirements |
|
Definition
Current Infrastructure, Radio Frequencies, Training Security, Space Tools/Equipment, Electrical Power, and HVAC Man hours |
|
|
Term
What information is required when submitting Cyber Systems requirements? |
|
Definition
Requirement Description (Required Capability), Justification, Funding Availability, Mission Impact, Required Implementation Date. Priority |
|
|
Term
What are some common actions during the planning phase |
|
Definition
Requirement review/validation, Site Survey Development/Validation of Technical Solution and Costing, Identify logistic support requirements, Development of Project Support Agreement/Project Support Plan, Development of Project Package, Project material acquisition, accountability and storage, Allied support completion, Schedule development. |
|
|
Term
What are the two types of site surveys? |
|
Definition
|
|
Term
What formally documents communications and information systems requirements and approval for base support |
|
Definition
The Project Support Agreement |
|
|
Term
Why is it important to remain involved in the execute phase |
|
Definition
To minimize or eliminate any problems that may occur |
|
|
Term
|
Definition
The desired outcome, product, or service of a project. |
|
|
Term
What are the three types of change requests |
|
Definition
Corrective action, Preventive action and Defect repairs |
|
|
Term
What is the most important document to have signed during the close phase |
|
Definition
|
|
Term
What is accomplished before a system or facility is turned over |
|
Definition
|
|
Term
All IT systems require what |
|
Definition
A security vulnerability assessment |
|
|
Term
What are the two types of exceptions that can affect a system from meeting inspection criteria |
|
Definition
|
|
Term
What must be used to formally transfer all real property to Base Civil Engineering |
|
Definition
|
|
Term
What phases does the control phase overlap |
|
Definition
The Plan, Execute, and Close phases |
|
|
Term
What is used during the control phase to organize project documentation |
|
Definition
|
|
Term
What is an Implementing Organization |
|
Definition
Implements a technical solution to a base, or requiring organization, with funds from a lead command |
|
|
Term
Who assists project managers with the technical aspects of a project? |
|
Definition
|
|
Term
What is the IT Infrastructure Library |
|
Definition
A framework that provides structure and best practice guidelines for implementing and maintaining IT Service Management. |
|
|
Term
What is the goal of the Continual Service Improvement stage |
|
Definition
To ensure that services are aligned with changes. |
|
|
Term
Which AFI provides the roles and responsibilities required to ensure all architectures are built for purpose; built to quality standards; and enable analysis that can be used to support decision making and guide transformation? |
|
Definition
|
|
Term
Define federated architecture |
|
Definition
It is a collection of information assets that accommodates the uniqueness and specific purpose of unlike architectures and allows them to remain autonomous while enabling the enterprise to benefit from their content |
|
|
Term
What is the current online repository of IT standards that mandates the minimum set of standards and guidelines for the acquisition of all DOD systems that produce, use, or exchange information |
|
Definition
|
|
Term
What is the Air Force’s authoritative source for enterprise standard IT products, computer configurations, platform and service profiles, technical solutions, and standard configurations of software and hardware |
|
Definition
|
|
Term
Which Air Force unit provides oversight for the Cyberspace Systems Integrator |
|
Definition
The 38th Engineering Squadron |
|
|
Term
Which publication governs the use of CIPS and applies to all 3D Air Force Specialties working on communications systems/equipment unless exempted by the appropriate career field functional managers |
|
Definition
|
|
Term
What is the approved automated information system for planning, installing, and managing the Air Force’s cyberspace infrastructure |
|
Definition
|
|
Term
Using the Requirements process flow chart from TO 00–33D–3003, what step takes place after validating a requirement |
|
Definition
|
|
Term
What does a trouble ticket or work order that exceeds its scope become in CIPS |
|
Definition
|
|
Term
What is the integrated tool permitting users to create, track, and process work orders within CIPS at both the base and MAJCOM levels, while keeping work orders and infrastructure requirements as separate business objects |
|
Definition
|
|
Term
Name the AF enterprise application, not available with the Legacy CSIRs that provides real-time situational awareness and analytical tools consisting of interim installation records, engineering drawings, and reference drawings |
|
Definition
|
|
Term
What are the three parts of the CSIR |
|
Definition
Administrative records, Drawing records, Maintenance records |
|
|
Term
Who serves as the focal point for processing data for updating CSIR drawings and for receiving new drawings |
|
Definition
Base IT/NSS Installation Records Manager/CSIR Manager |
|
|
Term
What system does a requesting agency use as the method for submitting requests |
|
Definition
|
|
Term
As a minimum who is required to review and validate technical solutions |
|
Definition
Affected Work Centers, CSIs, Project Managers, and the base CSO |
|
|
Term
Define special communication requirements |
|
Definition
Requirements that need additional assistance from agencies outside of the normal communications squadron to develop the complete technical solution for the requirement |
|
|
Term
What authorization is required to connect communications systems and equipment to one of the host country’s communications media |
|
Definition
|
|
Term
What are the three types of completion reports |
|
Definition
In-Effect Report,Exception Report, Delayed Service Report |
|
|
Term
What is the objective of concept planning? |
|
Definition
To develop rapidly expandable sound operational and support concepts |
|
|
Term
Which type of plan is written using JOPES procedures and formats specified for a CONPLAN without a TPFDD |
|
Definition
|
|
Term
Which plan outlines the details on how to respond to an emergency? |
|
Definition
|
|
Term
Which plan covers events like an aircraft crash recovery, snow removal, or hurricane condition |
|
Definition
|
|
Term
Who is the communications squadron focal point for all plans? |
|
Definition
|
|
Term
What attachment to an OPLAN covers all communications aspects required to support an operation? |
|
Definition
|
|
Term
In most cases, which flight maintains administrative responsibilities to assist the OPR in the upkeep of any plans pertaining to the communications squadron |
|
Definition
|
|
Term
Which type of planning meeting identifies Civil Engineering projects including new construction, renovations, or demolitions of facilities and relocations of organizations |
|
Definition
Facilities Utilization Board |
|
|
Term
Which type of modification changes the configuration of an item in order to satisfy short-term operational mission requirements by adding, modifying, or removing hardware and/or software components or capabilities in a manner that provides an immediate operational benefit |
|
Definition
|
|
Term
Which type of modification is a permanent modification that corrects materiel or other deficiencies that could endanger the safety or health of personnel, or cause the loss of, or extensive damage to systems or equipment? |
|
Definition
|
|
Term
Which document normally initiates temporary modifications and permanent sustainment modifications for fielded systems and equipment |
|
Definition
AF Form 1067, Modification Proposal |
|
|
Term
When does the span of configuration control begin |
|
Definition
Begins once the first configuration document is approved and base lined. |
|
|
Term
What is the purpose of support agreements |
|
Definition
Identify the specific support and responsibilities of the supplying and receiving activities |
|
|
Term
What form are intra-service and inter-service support agreements documented on |
|
Definition
DD Form 1144, Support Agreement |
|
|
Term
What four categories of support does the DD Form 1144 document |
|
Definition
Intra-service agreements, Inter-service agreements, Intra-governmental agreements, Other non-Federal activity agreements |
|
|
Term
What type of memorandum defines general areas of conditional agreement between two or more parties? |
|
Definition
|
|
Term
Which instruction governs the preparation of international support agreements |
|
Definition
AFI 51–701, Negotiating, Concluding, Recording and Maintaining International Agreements |
|
|
Term
Who is responsible for developing and maintaining an index of all support agreements in the Communications Squadron? |
|
Definition
|
|
Term
Which type of contract covers situations when it is impossible to accurately estimate the extent or duration of the work or anticipate costs with any reasonable degree of accuracy |
|
Definition
|
|
Term
Which type of contract is not subject to any adjustable fees |
|
Definition
|
|
Term
Which contract is made when only one viable source exists and no other supplies or services will satisfy the requirement? |
|
Definition
|
|
Term
What is the transfer of control of target business activity and associated assets to a public or private sector entity called? |
|
Definition
|
|
Term
Which type of contract is prepared for a specific quantity of supplies or services for a fixed period? |
|
Definition
|
|
Term
Define blanket purchase agreement |
|
Definition
A BPA is a simplified method of filling anticipated repetitive needs for supplies or services by establishing “charge accounts” with qualified sources of supply |
|
|
Term
Who delegates responsibilities to the base contracting office to enter into legal negotiations and commit the government to pay for products or services? |
|
Definition
|
|
Term
Who is responsible for training CORs on their duties, contract surveillance techniques, and standards of conduct within 90 days of appointment? |
|
Definition
|
|
Term
Which work center acts as the unit focal point when interacting with BCE to provide design support to and/or obtain BCE support |
|
Definition
Unit plans, planning, and agreements section. |
|
|
Term
Which CE work center is the centralized area that all CE or equivalent agency work requests pass through? |
|
Definition
CE customer service desk. |
|
|
Term
Who plans all of the work for the various BCE work centers? |
|
Definition
|
|
Term
Who reviews and validates major construction projects, then prioritizes it among other base facility requirements? |
|
Definition
Facilities Utilization Board |
|
|
Term
In addition to authorization, what is required for a MILCON project to go from paper to breaking ground? |
|
Definition
|
|
Term
What is the threshold dollar amount for minor construction projects when using O&M funds |
|
Definition
|
|
Term
What meetings are conducted by BCE to review the drawings and specifications related to a MILCON project |
|
Definition
Construction Design Reviews. |
|
|
Term
Name the law that governs our nation’s environmental concerns and ensures we carefully consider any undertakings having the ability to harm the environment or impose risks upon others. |
|
Definition
|
|