CDCv1s9-17 Flashcards

1
Q

What United States Code (USC) title authorizes the creation of the Department of Defense (DoD) as an executive component of government and establishes all subordinate agencies including Army, Navy, Air Force, and Marine Corps?

A

Title 10.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The Uniform Code of Military Justice (UCMJ) is derived from what United States Code (USC)?

A

Title 10.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What document spells out the comprehensive strategy for the United States to secure cyberspace?

A

National Strategy to Secure Cyberspace.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which policy has prevention of cyber attacks against America’s critical infrastructure as a key strategic priority

A

National Military Strategy for Cyberspace Operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What policy outlines the United States (US) Armed Forces’ comprehensive strategic approach for using cyberspace operations to assure US military strategic superiority in the cyber domain?

A

National Military Strategy for Cyberspace Operations (NMS-CO).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When Air National Guard personnel in Title 32 status train for cyber operations, what title status must they be in to execute those missions?

A

Title 10.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An employee or employer relationship that leads to the appearance of impartiality or favoritism is an unethical situation known as:

A

Covered relationships.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Members of a household or relatives with whom you have a close personal relationship is an example of which type of unethical situation?

A

Covered relationship.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What cyberspace weapon system includes the Integrate Network Operations Security Center (I-NOSC), Enterprise Service Unit (ESU) and Area Processing Center (APC) functions?

A

Air Force Cyber Security and Control System (CSCS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What cyberspace weapon system resulted from an operational initiative to consolidate numerous major command (MAJCOM) specific stove-piped networks into a centrally managed and controlled network under three Integrated Network Operations and Security Centers (I-NOSC)?

A

Air Force Cyber Security and Control System (CSCS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What cyberspace weapon system is the top-level boundary and entry point into the Air Force Information Network (AFIN)?

A

Air Force Intranet Control Weapons System (AFINC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Proactive defense is one of the four integrated sub-disciplines of what cyberspace defense weapon system?

A

Air Force Intranet Control Weapons System (AFINC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What cyberspace weapon system ensures unfettered access, mission assurance and joint warfighter use of networks and information processing systems to accomplish worldwide operations?

A

Air Force Cyber Command and Control Mission System (C3MS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What cyberspace weapon system identifies vulnerabilities and provides commanders with a comprehensive assessment of the risk of existing vulnerabilities on critical mission networks?

A

Cyberspace Vulnerability Assessment/Hunter Weapon System (CVA/Hunter).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What major command and numbered Air Force (NAF) were realigned to support the Air Force cyberspace mission?

A

Air Force Space Command, 24th Air Force (24 AF).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What two cyber operation defenses involve continuous monitoring and analyzing and directly counter an adversary penetrating a network or terminating an ongoing intrusion?

A

Active and reactive.

17
Q

Since Military Information Support Operations (MISO) and Public Affairs (PA) share a common specific audience, which activities are designed to mislead?

A

Military deception (MILDEC).

18
Q

What document directs the development of the National Military Strategic Plan for Securing Cyberspace?

A

Department of Defense Strategic Planning Guidance.

19
Q

Which agency is responsible for matters pertaining to the identification, prioritization and remediation of critical Global Information Grid (GIG) infrastructure?

A

Defense Information Systems Agency (DISA).

20
Q

What unit installs, reconstitute, and test critical C4 systems for combatant commanders anywhere at any time?

A

85th Engineering Installation Squadron (85 EIS).

21
Q

Which unit within the Air Force Network Operations (AFNetOps) community has a goal to reduce training and increase the warfighter capacity?

A

Enterprise Service Unit (ESU).

22
Q

What regional computing and data center provide enterprise services like messaging, Web access, and storage?

A

Area processing centers (APC).

23
Q

What reason is the main purpose for consolidating Network Control Centers (NCC) and forming the Enterprise Service Desk?

A

Efficiency.

24
Q

What year did the Air Force institute a single instance of Remedy allowing support to all locations within a single ticketing system?

25
What two levels are joint task forces (JTF) divided into?
Unified command and subordinate unified command.
26
The commander, Air Force forces (COMAFFOR) commands an Air Expeditionary Task Force (AETF) and provides unity of command to a:
Joint Force Commander (JFC).
27
What methodology is used by Air Force for presenting forces to combatant commanders (CCDR)?
Aerospace Expeditionary Force (AEF).
28
What basic building block is used in joint force planning and deployments of Aerospace Expeditionary Forces (AEF)?
Unit type code.