1604 Flashcards
Which AFSC requires members to pass the Air Force Electronic Data Processing Test?
Computer Systems Programing (3D0X4)
What is not a mandatory requirement for the advancement to the 7-skill level?
A. Minimum rank of SSgt
B. 6 months OJT for retrainees
C. Completion of the AFSC specific requirements
D. Completion of the AETC Supplemental training courses
Completion of AETC Supplemental training courses.
What function is primarily staffed by Client Systems (3D1X1) personnel but may have a variety of AFSCs based upon the unit mission?
Communications Focal Point
What documents the CFP key processes?
MPTO 00-33A-1001-WA
Where is the Air Force active component manpower planning and programming centralized?
at HAF
What is the official source of manpower information for an organization and is used as a tool to manage positions?
Unit Manpower Document
What is a subdivision of programmed cost data related to a weapon system or support function?
A. Program Element Code (PEC)
B. Special Experience Identifier (SEI)
C. Authorization Change Request (ACR)
D. Unit Personnel Management Roster (UPMR)
Program Element Code(PEC)
What is not a responsibility of the AFCFM?
A. Construct career paths
B. Manage skill-level training requirements
C. Establish requirements for entry into the career field
D. Distribute personnel throughout their respective MAJCOM
Distribute personnel throughout their respective MAJCOM
Who serves as the MAJCOM voting representative during career field Specialty Training Requirements Team and Utilization and Training Workshop (STRT/U&TW)?
A. MAJCOM director of Communications (A6)
B. MAJCOM Functional Manager
C. CFM
D. SAF/CIO A6
MAJCOM Functional Manager
Which segment of the Specialty Training Requirements Team and Utilization and Training Workshop (STRT/U&TW) process concentrates on training proficiency levels and training resourcing?
Segment 2
What is not an action of the Specialty Training Requirements Team (STRT)?
A. Draft and sign minutes
B. Finalize part 1 of the CFETP
C. Finalize Air Force Enlisted Classification Directory (AFECD) specialty description
D. Finalize Specialty Training Standards (STS)/Course Training Standards (CTS) for all courses.
Finalize Specialty Training Standards(STS)/Course Training Standards(CTS) for all courses.
Who is an optional attendee for the Utilization and Training Workshop(U&TW)? A. AETC/Training Pipeline Manager B. AETC CDC Writer C. AFCFM D. MAJCOM Functional Manager
AETC CDC Writer
What is used as a starting point to develop the CFETP and STS during the Specialty Training Requirements Team and Utilization and Training Workshop (STRT/U&TW)? A. Occupational Analysis Report (OAR) B. Quality Training Package (QTP) C. Subject Matter Experts (SME) D. Job Quality Standards (JQS)
Occupational Analysis Report (OAR)
What AIS is used to document actions on any item with an assigned Standard Reporting Designator (SRD)?
IMDS
What is not a common duty of the Maintenance Data Collection (MDC) monitor?
A. Review IMDS reports to ensure job status is reflected properly
B. Ensure equipment status is entered into Equipment Status Reporting (ESR)
C. Match reports with Open Incident Listing (OIL)
D. Schedule and distribute daily maintenance actions
Ensures equipment status is entered into Equipment Status Reporting (ESR)
Who establishes the necessary controls to ensure periodic inspections are accomplished?
Fight Commander/Chief
What is included in the MTP only if applicable to the work center?
JQS
Special Personnel Evaluations are required on a sampling of the Air Reserve Component within how many days of new equipment/system acceptance?
120 Days
What is not a goal of ORM?
A. Enhance mission effectiveness at all levels, while preserving assets and safeguarding health and welfare.
B. Integrate ORM into mission processes, basing decisions upon assessments of risk integral to the activity and mission.
C. Create an Air Force in which every leader, Airman, and employee is trained and motivated to manage risk in all on- and off-duty activities.
D. Identify opportunities to decrease Air Force warfighting effectiveness on the battlefield and in the operational aerospace environment, helping to ensure decisive victory in any future conflict at the least possible cost.
ID opportunities to decrease Air Force warfighting effectiveness on the battlefield and in operational aerospace environment.
How many steps are in ORM?
6 steps
Supervisors document and maintain completed safety training on…
AF Form 55
What is not a term for Job Safety Analysis? A. Job Safety Training (JTS) B. Job Hazard Analysis (JHA) C. Task Hazard Analysis (THA) D. Activity Hazard Analysis (AHA)
Job Safety Training
What information is not contained in TO 00-5-1?
TCTO Procedures
Recommended TO changes are required to be submitted on…
AFTP Form 22
Who determines if local checklists and/or work cards are required for specific equipment?
Flight Commander/Chief
Who provides accreditation for the Telecommunications Industry Association (TIA)?
American National Standard Institute (ANSI)
Who develops standards for Interconnect, Passive and Electro-mechanical (IP&E) electronic components under the American National Standard Institute (ANSI) designation of Electronic Industries Alliance (EIA) standards?
Electronic Components Industry Association (ECIA)
Who should endorse the AF Form 673 as the Certifying Official?
The authoring OPR’s supervisor
What systems allow for a commonly understood, maintainable, and defendable domain through all federal and non-federal systems?
COTS
The creation of the DOD as an executive component of the government is authorized by United States Code Title…
10
Procedures and circumstances for Congress to order units into active Federal duty are established in United States Code Title…
32
Who appoints Air Force Portal Content Managers and Content Publishers for public and private websites?
Wing Commander
When a person uses his or her position for private or personal gain it is called…
misuse of position
Which type of fund covers the cost of relocating facilities?
Military Construction (MILCON)
What is the maximum amount for minor construction projects that Operation and Maintenance (O&M) funds will cover under normal conditions?
$750,000
In-depth information for administering the Government Purchase Card program at all responsible levels is found in AFI…
64-117
At the installation level which office is responsible for program implementation, administration, training, and monitoring the GPC Program?
Agency/Organization Program Coordinator (A/OPC)
What is not a responsibility of GPC cardholders?
Funds Accountability
Detailed instructions for submitting a reclama or shortfall request are found in…
AFI 10-401
Who reviews the selections after the board selects the 12 Outstanding Airmen of the Year?
Air Force Chief of Staff
What is the highest level in which quarterly awards are normally presented?
Wing
Guidance for awards specific to the Cyber community are found in AFI…
36-2845
What re the inclusive dates for Secretary of the Air Force/Chief Information Officer (SAF/CIO) annual awards?
1 Oct - 30 Sep
The maximum number of devices a FireWire bus can take is up to…
63
What device is a series of single-pole, single-throw switches mounted to a circuit board?
Keyboard
A workgroup is a simple grouping of how many computers?
No more than 20
What is not a type of UNIX pathname
Positive
Which application includes tools to help recover lost files and protect against computer failure?
Norton Utilities
The Institute of Electrical and Electronics Engineers (IEEE) divides the OSI Data Link Layers into what two sublayers?
Logical Link Control (LLC) and Media Access Control (MAC)
Network switches and bridges operate at what OSI layer?
Data Link
Routers operate at what OSI layer?
Network
Virtual circuits are established, maintained, and terminated at what OSI layer?
Transport
What is the combat IT communication support agency of the DOD called?
Defense Information Systems Agency
Who must provide encryption devices for connection to the Secret Internet Protocol Data service?
The customer
What are the two classifications of transport protocols?
Connection Oriented and Connectionless Oriented
In a connection-oriented protocol, such as TCP, what must happen before data is transmitted between clients?
Connection establishment
What regulates how much information passes over a TCP connection before the receiving hose must send an acknowledgement?
Sliding Window
What are the fields in the UDP Segment?
Source Port, Destination Port, Length, Checksum, Data
How many bits are in the IPv4 address?
32
What class uses a range of 1-126 in the first octet of an IPv4 address?
Class A
What IPv4 class address is used for networks with about 250 nodes?
Class C
What IPv4 Class address is used for multicast addressing?
Class D
What IPv4 Reserved address is used for loop back?
127.0.0.1
Instead of using binary, how are IPv6 addresses expressed to be more user-friendly?
Colon Hexadecimal Format
The range of well-known port numbers is…
0-1023
Which common ort contains HTTP servers and proxies?
Port 8080
The design of communications network is known as…
Network architecture
What kind of network is a group of computers and associated devices that share a common communications line within a small geographic area?
LAN
What kind of network interconnects users with computer resources in a geographic area or region like a city?
MAN
Which 802.11 standard has a throughput of 11 Mbps and runs at the 2.4 GHz freq?
802.11b
Which 802.11 standard is designed to operate at both 2.4 GHz and 5 GHz?
802.11n
What topology defines the layout of a network’s devices and media?
Physical
What topology consists of cable segments from each computer connected to a centralized component?
Star
Over a single pair cable, Integrated Services Digital Network (ISDN) is capable of transmission rates of…
144 Kbps
A modem is a device that…
Modulates and demodulates data signals
What Data Link Layer network device logically separates a single network into two segments or collision domains in Ethernet networks?
Bridge
Two basic routing activities are; determining optimal routing paths and…
transporting information groups (packets) through an internetwork
Dynamic routing automatically calculates the best path between how many nodes?
2
What type of encryption is applied to each end of a communications line in a distributed network, and ensures all information flowing is unintelligible to an unauthorized intruder?
Link encryption
Which type of cable is associated with the original designs of the Ethernet Standard?
Coaxial cable
Which transmission medium is the primary carrier of voice communications?
Twisted pair cable
What is the most common wireless networking standard?
802.11
What are the three major considerations that apply to Cyberspace Operations?
Law, Authority, Policy
What United States Code title status must National Guard Guardsmen be in to execute cyber operations?
Title 10
Which operations center monitors and controls Air Force network access points, boundary protection devices, and network activity to provide situational awareness, and report suspicious/malicious activity?
Integrated Network Operations Security Center (I-NOSC)
Within the information environment what term describes the advantage, or imbalance, in one’s favor?
Information Superiority
What is critical to mitigating unintended or undesirable effects, on either our behalf or the adversary’s, and maximizing cyberspace superiority?
Careful Planning
Which Electronic Warfare capability uses jamming to reduce the adversary’s use of electromagnetic spectrum (EMS)?
Electronic Attack
What is a true statement about Electronic Warfare (EW) and Computer Network Operations (CNO)?
EW Concerns radiated energy
Which Cyberspace Defense Weapon System Sub-discipline determines the extent of intrusions, develops courses of action required to mitigate threats, and determines and executes response actions?
Incident Response
Which Intranet Control Weapon System sub-discipline conducts continuous monitoring to ensure timely delivery of critical information?
Proactive Defense
Which Supervisory Control and Data Acquisition (SCADA) subsystem gathers data on the process and sends commands to the processor?
Supervisory System
Which Supervisory Control and Data Acquisition (SCADA) subsystem connects to sensors in the process, converting sensor signals to digital data?
Remote Terminal Unit
Which threat vector is considered more of an annoyance than an attack?
Spam
Which vulnerability preventive measure is a small piece of code that software developers create to address the flaws found in the original code of a program?
Patches
Which identity management process uses a fingerprint to authenticate a user?
Biometrics
Which identity management process uses a password to authenticate a user?
Knowledge-based
What system monitoring concepts uses long trend analysis of network devices and is performed in order to identify future constraints with results incorporated into future technical baselines?
Capacity Planning
Who provides the formal declaration that in information system is approved to operate in a particular security mode using a prescribed set of safeguards and acceptable risk?
Authorizing Official (AO)
The technical solution for a communications and information system requirement summarizes…
Full cost and recommended course of action