CDC MQF Flashcards
Hazards should be reported to the safety office using the
af form 457
Any system of policies and procedures used for identifying, controlling, and protecting from unauthorized disclosure, information whose protection is authorized by executive order or statute.
infosec
Outlines measures and controls taken to deny unauthorized persons access to information derived from telecommunication and to ensure the authenticity of those communications.
comsec
Measures and controls that ensure confidentiality, integrity, and availability of information systems being processed, stored, and communicated.
compusec
All measures necessary to protect classified information from access by unauthorized persons.
physical security
security container check sheet, show a security container has been properly marked and checked
standard form 702
What instruction deals with Information Security Program management, which provides basic guidance on the type of containers to be used for storage.
afi 31-401
What manual should be used for consulted for special storage requirements for SCI material.
afman 14-304
Built in combinations will be reset to ________ and padlocks will be reset to _______
50-25-50, 10-20-30
a formally accredited area, room, group of rooms, buildings, or installations where SCI may be stored, used, discussed, or processed.
scif
This permits storage of SCI material on shelves or in metal containers within a SCIF, while authorized personnel do not occupy the SCIF
open storage
. This allows storage of SCI in properly secured GSA approved security containers within a SCIF when authorized personnel do not occupy the SCIF
closed storage
are used daily for handling, processing, or discussing SCI material
secure working area
An area under control of a designated custodian and used to store and protect SCI material.
secure vault area
An area, room, or group of rooms secured against physical and audio penetration for the temporary use of SCI
temporary secure working area
An area in which SCI can be stored in approved security containers and openly discussed and used
secure area
A temporarily accredited facility used for storing, handling, discussing, and processing SCI. It can be established for 6 months.
temporary secure working area
Cooperate to achieve a common end state
unity of effort
Leverage expertise of diverse analytic resources
collaboration
Exploit all sources of information and intelligence
fusion
_________ is a force that is constituted and so designated by the Sec Def, a CCDR, a subordinate unified commander, or an existing JTF CDR.
joint task force
Establishes and maintains personnel accountability and personnel support
j1
Supports the commander and the staff by ensuring the availability of reliable intelligence and timely indications and warnings
j2
Operations directorate in the discharge of assigned responsibility for the direction and control of operations.
j3
Logistics directorate formulates logistics plans, coordination, and supervision of supply, maintenance, repair, evacuation and other logistical activities
j4
Plans directorate assists the commander in long-range or future planning, preparation, of campaign and joint operations plans
j5
Assists the commander in all responsibilities for communications infrastructure, communications computer networking, communications electronics, etc.
j6
The role of ISR during this level of war provides accurate, timely, and predictive intelligence so decision makers can take appropriate actions before or during a crisis.
strategic
At this level of war, campaigns and major operations are planned, conducted, and assessed.
operational
At this level of war ISR assets provide intelligence crucial to understanding an enemy’s weakness and key nodes that can be affected. Detects, discovers, indentify, locate, and describe enemy vulnerabilities and the COG.
operational
This level of war is where individual battles and engagements are fought.
tactical
ISR helps the unit level operators determine adversary tactics, techniques, and procedures (TTP’s).
tactical
Conflict between governments, nations, or coalitions
traditional warfare
A conflict in which one or more of the participants is a nostate entity and is trying to either overthrow the governing entity or to win over the public
irregular warfare
Uses locals and other gueilla type forces including the use of sabotage, intelligence activities, and unconventional recovery activities
unconventional warfare
Conflict between equally capable forces
symmetric
Conflict between groups that are not equally equipped
asymmetric
is a military operation designated by the SecDef as an operation in which the members of the armed forces are or may become involved in military actions, operations, or hostilities against an enemy of the US.
contingency operations
________ or limited contingency operation can be a single small-scale, limited-duration operation or a significant part of a major operation of extended duration involving combat.
crisis response
attempts to address any potential scenario before it happens, giving leadership a head start should that theorized situation arise.
contingency planning
Written description of the combatant commanders concept of operations to counter a perceived threat. Includes all phases of the tasked operation, identify forces, and supplies required, and detail the movement schedule of resources to the theatre of operations
oplan
Initiates development and evaluation of a course of action by a supported commander and requests a commanders estimate be submitted
warnord
Direct execution planning before a COA is formally approved by the SecDef and President
planord
Normally used following a decision by the president that conduct military operations in support of national interests
alertord
Directive issued by a commander to subordinate commanders for the purpose of executing a coordinated operation
opord
Issued by the authority and direction of the SecDef through the CJCS and directs the deployment and/or employment of forces
exord
________ is a temporary, joint SOF headquarters established by the NCA or a JFC to accomplish a specific mission or to control SOF in a specific theater of operation
sof
________ is an ad hoc arrangement between two or more nations for a common action
coalition operation
. Air Force intelligence doctrine is contained in ________
afdd 2-0
defined as a cross-domain synchonization and integration of the planning and operation of ISR assets; sensors; processing, exploitation, and dissemination systems; and analysis and production capabilities across the globe to enable current and future operations.
global integrated isr
provide support across the range of military operations (ROMO). These systems have global and wide-area coverage over denied areas where little or no data can be obtained from ground and airborne sources.
space
and the concept of global integrated ISR is essential to providing commanders with the most complete ISR “picture” of the battlespace
integrating operations
Accurate intelligence to execute; intelligence assets to plan and execute in a tactical nature
centralized control and decentralized command
Require a constant flow of current intelligence, adapting to and ever-changing combat environment
flexability and versatility
Accurate intelligence to determine what targets to strike first
priority
Require a constant flow of current intelligence, adapting to and ever-changing combat environment
balance
Multi-role aircraft, typical dogfighter, small, and extremely versatile
f-16 fighting falcon
carries the largest payload, the backbone of americas long range bomber force
b-1 bone
multi role bomber capable of delivering both conventional and nuclear munitions
b2 spirit
With jamming and high-speed, anti-radiation missile (HARM) capability, deployed from land bases and aircraft carriers. Monitors EM spectrum and actively denies adversary use of radar and communications
ea-6b prowler
Airborne tactical weapon system that disrupts enemy command and control communications, and limits adversary coordination
ec-130h compass call
Performs SEAD missions, is heavily modified version of the C-130 Hercules designed to disrupt enemy command and control communications
f-16cj
Collects weather data for US military operations
defense meterological satellite program
Allow JFC and subordinate commanders to shape the operational environment. Provides a broad range of capabilities including instant reach back to the global information grid, transmission of critical intelligence, etc.
defense satellite communications system and wideband global satellite communications
Provides secure, jam resistant, worldwide communications to meet essential wartime requirements for high priority military users
MILSTAR
. Defines intelligence sources as the means or systems that can be used to observe and record information relating to the condition, situation, or activites ofa targeted location, organization, or individual
joint intelligence