M1 B2 Flashcards
Which publication implements the Mishap Prevention Program?
AFI 91-202
What action is the purpose of the Mishap Prevention Program?
Protect resources and personnel from damage, loss, injury and/or death
The Occupational Safety and Health Administration (OSHA) is a part of the United States Department of …
Labor
Whose responsibility is to advise commanders, function managers, supervisors and workers safety matters on an Air Force installation?
Installation safety office personnel
What action must supervisors take before a work task not governed by a technical order or other guidance can be accomplished?
Conduct a Job Safety Analysis (JSA)
What Air Force form is used to report ground mishaps?
AF Form 978
What Air Force form is used to report a hazard?
AF Form 457
What three sub-categories make up human factors?
- Physiological
- Physical
- Organizational
What are examples of physiological factors?
- Ignoring direction from supervisors
- Failing to use PPE or proper tools
- Performing tasks while distracted
- Using equipment when not properly trained or qualified
- Being unaware of hazardous properties of materials and their proper control
Who recommends controls to mitigate health risks associated with identified health threats/hazards?
Bioenvironmental Engineering
What method is considered the least preferred when controlling hazards and should not be relied upon alone to protect against hazards?
Use of PPE alone
How many impact classifications do hardhats have?
Two
Which helmet class does not provide protection against contact with electrical conductors?
Class C (Conductive)
What hazard is the greatest in the typical office?
Falls
According to the Centers of Disease Control and Prevention (CDC) office workers are how many times more likely to suffer a disabling injury from a fall than non-office workers?
2 to 2.5 times more likely
What chapter in AFI 91-203, Air Force Consolidated Occupational Safety Instruction provides specific guidance on office safety?
Chapter 10
How are fires classified?
Fuel Type
What classification do flammable liquids receive?
Class B
Fuels that are normally classified as A or B will change to what classification if an electric current is introduced?
Class C
What action should you take first when you encounter a fire?
- SOUND THE ALARM
- Phone the fire department
- Evacuate personnel from the building
- Extinguish the fire if possible
- Direct the firefighters to the fire
What step is the fourth in the firefighting procedure?
- Sound the alarm
- Phone the fire department
- Evacuate personnel from the building
- EXTINGUISH THE FIRE IF POSSIBLE
- Direct the firefighters to the fire
Under normal conditions, how many milliamps of current could cause cardiac arrest?
50 miliamps
What are examples of prohibited ladder practices?
- Unstable surfaces
- Placed in front of doors
- Used as scaffolds
- Reaching too far out to the sides
- Standing too high
- Defective ladder
- Make-shift ladder
- Carrying materials in their hands while ascending or descending
- Ladder with conductive side rails while near electrical circuits
Which actions are part of risk management (RM)?
- Accept no unnecessary risk
- Make risk decisions at the appropriate level
- Integrate RM into operations and planning at all levels
- Apply the process CYCLICALLY and continuously
The risk management process includes how many steps?
Five
- Identify the Hazards
- Assess the hazards
- Develop controls and make decisions
- Implement controls
- Supervise and evaluate
How many volumes make up the Department of Defense Architecture Framework (DODAF) specification?
Four volumes
- Volume I, the manager’s volume
- Volume II, the architect’s volume
- Volume III, the developer’s volume
- Volume IV, the DODAF Journal
Which office annually evaluates agency efforts to improve the quality and usefulness of information technology investments requested by agencies through well-organized strategic decisions relating to investments and portfolio management?
Office of Management and Budget
What requirements are mandated to develop of Air Force architecture?
Federal level requirements
What three parts make up Communications and Information Systems Installation Record (CSIR)?
- Maintenance Records
- Administrative Records
- Drawing Records
Which part of the Communications and Information Systems Installation Record (CSIR) depicts physical layout of communications and information systems and provide engineering data?
Drawing Records
Which part of the Communications and Information Systems Installation Record (CSIR) is normally retrained in the production work center?
Maintenance Records
What functions do the seven layers of the Open Systems Interconnection (OSI) reference model specify?
Particular NETWORK functions
What layers make up the two categories of the seven layer of the Open Systems Interconnection (OSI) reference model?
Application and Data Transport
The logical link control (LLC) sublayer is a part of which Open Systems Interconnection (OSI) model layer?
Data link
What does the logical link control (LLC) sublayer of the data link layer manage?
Communications between devices over a single link of a network
What does the media access control (MAC) sublayer of the data link layer manage?
Protocol access to the physical network medium
When used alone, the word “topology” often refers to a network’s?
A network’s physical topology
What network topology is another name for a bus topology?
Linear topology
What topology offers centralized management of a network?
Star Topology
What NEGATIVE effect could occur when star networks are interconnected?
When the central node point fails, large portions of the network become isolated
Which governing body is the authority for information technology (IT) communications within the Department of Defense (DOD) and every level of IT communication from the DOD information network to the warfighter under their scope of control?
Defense Information Systems Agency (DISA)
What is a Transmission Control Protocol (TCP) socket?
Combination of a port number and IP address used by a process to request network services and passes as an argument between layers
What is the purpose of a sliding window in Transmission Control Protocol (TCP)?
Regulate how much information passes over a TCP connection before the receiving host must send an acknowledgement
What portion of the Internet Protocol (IP) Datagram (packet) allows IP to detect datagrams with corrupted headers and discard them?
Header Checksum
What value is the maximum of an octet in Internet Protocol Version 4 (IPv4)?
255
Which classes allow for a maximum of 254 hosts per network?
Class C
What class is reserved for multicast addressing?
Class D
What range of numbers are those of well known port numbers?
0 - 1023
What characteristics is the major difference between Random Access Memory (RAM) and Read Only Memory (ROM)?
RAM is volatile and ROM is non-volatile
What action is the main purpose of system cache?
Reduce CPU access time
What speed is the maximum data transfer rate of USB 3.0 SuperSpeed (SS) transfer mode?
5 GB/S
What is a peripheral device?
NOT a main component of a computer and can be either internal or external
Which device optically reads an image, printed text, or an object and converts it to a digital image?
Scanner
Which network is a group of computers and associated devices that share a common communications line and typically share the resources of a single processor or server within a small geographic area?
Local Area Network (LAN)
Which network is a network that links local area networks (LAN) and Metropolitan area networks (MAN) by using long-distance communications links leased or purchased from a telecommunications company?
Wide Area Network (WAN)
Which network uses Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) to avoid collisions while transmitting data?
Wireless Local Area Network (WLAN)
Which wireless local area network (WLAN) security method is best described as hiding a message in a special code?
Encryption
Which network provides a private tunnel through the Internet?
Virtual Private Network (VPN)
What year did the Institute of Electrical and Electronics Engineers (IEEE) ratify the use of gigabit Ethernet (GbE)?
1999
How many TI Defense Switched Network (DSN) access circuits do Standardized Tactical Entry Point (STEP) terminals offer?
7 DSN access circuits
Which device works as a transceiver that converts the electrical signal utilized in copper unshielded twisted pair (UTP) network cabling to light waves used for fiber optic cabling?
Media Converter
What is a Data Link Layer network device or software set that logically separates a single network into multiple segments or collision domains in Ethernet networks?
Network Bridge
What network routing protocols allow multiple autonomous systems to connect together?
Exterior Gateway Protocols (EGP)
What network device provides a remote network with connectivity to a host network?
Gateway
Which type of encryption provides the greatest degree of protection since the information fully encodes all the way through the network to the users’ own end terminals?
End-to-end encryption
What is a disadvantage of fiber optic cable?
Cost to install and train technicians
In general, how many operating system task categories are there?
Six
- Processor management
- Memory management
- Device management
- Storage management
- Application management
- User interface
What UNIX system software interacts most closely with the hardware?
Kernel software
What Microsoft application is a software program that allows users to create a desktop database?
Microsoft Access
What Microsoft application is a personal information manager?
Microsoft Outlook
What information system (IS) threat is the greatest threat to an organization’s mission critical information via its communications and ISs?
Hostile information operations
What are the three elements of computer system vulnerability?
- A system susceptibility or flaw
- Attacker access to the flaw
- Attacker capability to exploit the flaw
Computer security (COMPUSEC) vulnerabilities are broken down into how many categories?
Four
- Natural
- Environmental
- Human
- Viruses
Which computer software is designed to collect personal information about users without their informed consent?
Spyware
Which incidents occur when a higher classification level of data transfers to a lower classification level system via a messaging system?
Classified message incidents (CMI)
Which classified document markings identifies the highest level of classification?
Banner Lines
Which classified document marking appears on the face of each classified United States document and shall indicate the authority for the classification determination and the duration of the classifiaction?
Classification authority
How would you determine if an intrusion detection system is required or another supplemental control is sufficient?
By completing a risk assessment
What are valid reasons to change the combination on a container storing classified materials?
- When the container is placed in service
- Whenever an individual knowing the combo no longer requires access
- When compromise is suspected
- When the container is taken out of service
Which Air Force forms record the destruction of Top Secret classified material?
- AF Form 143
Who should you seek out if you need information on transporting Top Secret information?
Information Assurance Officer (IAO)
Who has the authority to grant permission to ship classified materials on Friday - Sunday?
Security Manager
What system includes all owned and leased communications and computing systems and services, software, data, security services, and other services necessary to achieve information superiority?
DOD Information Network (DODIN)
Which of the following services provides additional communications capacity by using manned and unmanned systems to host communications packages for continuous communications coverage of large geographic areas?
Aerial Layer
What system is a telecommunications network that provides the exchange of information in an interoperable and global space, divided by security demands, transmission requirements and geographic needs of targeted end-user customers?
Defense Information System Network
Which network supports unclassified e-mail service to the user?
SBU IP data or NIPRNet
Which network provides DOD customers with centralized and protected access to the public Internet?
SBU IP data or NIPRNet
Which network provides high-quality, secure telecommunications for command and control (C2) and crisis management?
Defense Red Switch Network (DRSN)
Which system is the DOD’s command and control (C2) system of record and full spectrum dominance enabler?
Global Command and Control System (GCCS)
Which system of the Global Command and Control System-Air Force (GCCS-AF) monitors status of resources and training systems ensuring that decision makers have the most accurate snapshot of the resources available to them for mission completion?
Global Command and Control System Status of Resources and Training (GSORTS)
What major program does the Global Combat Support System-Air Force (GCSS-AF) provides as a single point of reference for services and information for Air Force personnel?
AF Portal
Which system is the Air Forces’ primary intelligence, surveillance and reconnaissance (ISR) collection, processing, exploitation, analysis and dissemination system?
DOD Distributed Common Ground Station (DCGS)
Which system is a radar Tracker/Correlator software program hosted on a powerful server-based computer system that takes inputs from long range and short range radars and displays it all on a scope?
Battle Control System-Fixed (BCS-F)
How many air defense sectors is the Battle Control System-Fixed (BSC-F) divided into?
Two
- Western Air Defense Sector (WADS)
- Eastern Air Defense Sector (EADS)
Which system is a space-based high data rate communications link for the flow of information from the United States or rear echelon locations to deployed forces?
Global Broadcast Service
What system is the priority component of the Department of Defense Information Network (DODIN) that directly supports the president, secretary of defense, and the Joint Chiefs of Staff in the exercise of their responsibilities?
National Military Command Center/System (NMCC/NMCS)
Which system is the primary network used to transmit the Emergency Action Messages (EAM) generated by the National Military Command Center (NMCC) to the warfighting commanders in the field?
Strategic Automated Command and Control System (SACCS)
What system provides a secure communications path for command and control information in support of the Air Force’s strategic aircraft and missile functions?
Strategic Automated Command and Control System (SACCS)
What system mission is to provide reliable, rapid, two-way communications between air, land and sea based users?
High Frequency Global Communications System (HF-GCS)
What system of the Global High Frequency (HF) Network provides rapid, reliable, non-dedicated communications support between the National Command Authority, DOD, aircraft and ships of the US government during peacetime, contingency situations and war?
Global HF System