questions1 Flashcards
001. Qualifications and progression within Cyber specialties
1
- What are the Cyberspace Support specialist’s general responsibilities?
- Performing system analysis and design, programming, systems operation and maintenance, resource management and security management.
- What CompTIA certification fulfills the DODD 8570 requirement for IAT Level I only?
- Network+.
____ (1) Cyber Surety.
c. 3D0X3.
____ (2) Client Systems.
e. 3D1X1.
____ (3) Spectrum Operations
h. 3D1X4.
____ (4) Cyber Transport Ssytems.
f. 3D1X2.
____ (5) RF Transmission Systems.
g. 3D1X3.
____ (6) Cyber Systems Operations.
b. 3D0X2.
____ (7) Cable and Antenna Systems.
i. 3D1X7.
____ (8) Computer Systems Programming.
d. 3D0X4.
____ (9) Knowledge Operations Management.
a. 3D0X1.
- Which career Cyberspace Support career field(s) require IAT Level II certifications?
- 3D0X2, 3D0X3, and 3D1X2 .
- What career fields require personnel to be free from fear of heights and claustrophobia?
- Cable and Antenna Systems (3D1X7).
- What CFETP sections outline the required skills and progression for each assigned career field?
- Part I Sections B and C.
- For personnel not in retraining status what is the minimum number of months OJT are required for upgrade to the 5- and 7-skill levels?
- 12 Months.
- What function(s) of the unit’s operational mission does the Communications Focal Point directly support?
- Voice and data network systems, radio systems, video, and all other communications/cyber equipment/systems, while maintaining visibility of performance.
- What is the first organization that AFNET users contact when they experience issues with their government provided end-user equipment?
- ESD.
- Manpower and organization
2
- How is manpower sized?
- To reflect the minimum essential level to accomplish the required workload.
- Which document provides formulas to calculate target manning?
- AFMAN 38–208.
- Who provides the UMD to the organization?
- Local Mission Support Squadron’s Manpower and Organization office.
- Define unfunded positions.
- Approved manpower authorizations that have not been funded for fill by the Air Force.
- Define funded positions.
- Authorized manpower awarded to the unit and funded by the Air Force.
- What is the purpose of the UPMR?
- The UPMR is used to match personnel assigned within the unit to the position numbers listed on the UMD.
- What is the purpose of the PEC?
- It defines which pot of money will pay for a specific position.
- Who originates an ACR?
- The requesting unit.
- An OCR includes which actions?
- Unit activation, inactivation, redesignation, or variation to a policy, guidance, procedure or standard organization structure as depicted AFI 38–101.
- How does an OCR differ from an ACR?
- It does not add, modify or change existing authorizations; it adds or removes work centers or realigns flights or work centers within the unit.
- Career field management
3
- Which strategic level position is typically manned by CMSgts assigned to HAF and is responsible for organizing and managing one or more enlisted career fields?
- AFCFM.
- Who possesses final authority to waive CFETP requirements?
- AFCFM.
- Who serves as the MAJCOM liaison for her/his respective AFCFM?
- MAJCOM Functional Manager.
- Under what circumstances is the STRT held in conjunction with the U&TW?
- When it is obvious that new requirements will not drive additional sources.
- What is the primary purpose of the STRT?
- For the AFCFM and functional leaders to determine and present training requirements to the AETC.
- Who attends the Utilization and Training Workshop (U&TW)?
- AFCFM (Co-chair), AETC/TPM (Co-chair), AETC/TM, AETC/Program Element Manager (PEM), and MFMs. Optional U&TW attendees include the AETC CDC writer and representatives from AFCDA, AETC Occupational Analysis Division, AFPC education, training, and classification, and the AETC instructional technology unit (ITU).
- What is the aim of the Occupational Survey?
- To facilitate decision-making on Air Force personnel and training programs by providing objective information about Air Force occupations.
- Who is the job survey distributed to?
- All eligible career field members.
- Managing documenting, and scheduling
4
- What AIS is used to track outages for computer and cyber network equipment?
- Remedy.
- What AIS is used to document actions on any item with an assigned SRD?
- IMDS.
- What is the ESR system currently used for reporting IMDS related equipment status?
- REMIS.
- Define partial mission capable.
- System or equipment functioning in such a way that it can perform at least one, but not all of its assigned missions or functions; system is impaired but usable.
- Define inactive equipment.
- Equipment not commissioned or installed to perform an operational mission or requirement.
- What is used to develop user-level master inspection schedules?
- Scheduled inspection intervals.
- What is an Authorized Service Interruption?
- Coordinated and planned outage for preventative maintenance inspections, configuration changes and optimizations that require an AFNet component/service to be unavailable for a specified length of time.
- Training
5
- What is the system officially used to document training?
- TBA.
- What four items must the MTP include?
- (1) Master Task List.(2) Current CFETP and applicable AFJQS.(3) Local JQS (if applicable).(4) Milestones for tasks and CDC completion.
- What types of tasks are identified in the Master Task List?
- Contingency/Wartime tasks, additional duties identified by the supervisor as certifiable tasks, and mandatory core tasks identified by the AFCFM.
- Who determines when the trainee is ready for task certification?
- The trainer.
- How is the initial evaluation documented?
- Document the completion of the evaluation with a journal entry on the TBA Website via the Air Force Portal.
- What must be done prior to conducting the initial evaluation on newly assigned personnel?
- The supervisor must assign individual training requirements to the trainee’s Individual Training Plan.
- Which two factors should supervisors include when providing trainee feedback?
- (1) Include what the trainee is doing correctly (positive feedback).(2) Provide areas for improvement (constructive feedback)
- Who are UTC Personnel Evaluations conducted on?
- All 3DXXX personnel assigned to UTC-based organizations whose primary mission is to deploy.
- Safety and risk management
6
- Define ORM.
- ORM is a decision-making process to systematically evaluate possible courses of action, identify risks and benefits, and determine the best course of action for any given situation.
- Name the four principles that govern all actions associated with the ORM.
- (1) Accept no unnecessary risk.(2) Make risk decisions at the appropriate level.(3) Accept risk when benefits outweigh the costs.(4) Integrate ORM into operations and planning at all levels.
- Which document would you reference to learn about the ORM program?
- AFI 90–901, Operational Risk Management (ORM) Program.
- What is specifically tailored to address safety concerns of the work environment?
- A JST guide.
- Who provides job safety training to all newly assigned individuals?
- Supervisors.
- What must be exercised to ensure personnel follow all precautions and safety measures, including the proper use of PPE?
- Control over job tasks.
- What is the first step in Job Safety Analysis step?
- Document the activity: Assemble those involved in the activity and then, using the JSA worksheet, write down the tasks that make up the activity, step by step.
- What must be in place to ensure workers have the skills to complete the job and that there is a required level of supervision to ensure the tasks are completed as documented?
- Management processes.
- What will supervisors perform to check the day-to-day safety and health of an organization, work center, facility, and so forth?
- Spot inspections.
- Publications and directives
7
- What enables easy filing and indexing of TOs and provides a means for users to identify and establish distribution requirements?
- TO sequencing.
- What is the official Air Force system for managing TO libraries?
- ETIMS.
____ (1) Support equipment designed and manufactured for commercial use.
f. COTS Manual
____ (2) Excerpts from one or more basic TOs that organize and simplify instructions.
g. Abbreviated TO
____ (3) Used for modifying military systems and end items or performing one-time inspections.
a. TCTO
____ (4) Category 00 and are general in content and are not issued against specific military systems or end items.
b. MPTO
____ (5) Developed for other services or government departments and authorized for use by Air Force personnel.
i. Joint use publication
____ (6) Used in lieu of specific equipment TOs, and are categorized into three types: Category, System, and Equipment-series.
e. General TO
____ (7) Contain instructions for use in conjunction with data contained in their parent TOs, and are not stand-alone publications.
h. Supplemental TO
____ (8) Covers installation, operation, troubleshooting, repairing, removing, calibration, servicing or handling of Air Force military systems and end items.
c. SIPTO
____ (9) Include facility, system, subsystem, installation engineering and installation manuals, general engineering and planning manuals, and standard installation practices.
d. O&M TO
- What POC oversees TO requirements and distribution within an organization?
- The TODO.
- What are the duties of the TODO?
- Establish and maintain a TO Account in ETIMS, establish and maintain organization TODA for organization subaccounts, and maintain records of TOs required and on hand in organization physical distribution media TO libraries.
- When do work centers ensure LWCs, LJGs, LPSs, and LCLs are reviewed for currency?
- When source references change, or at least annually
- How are LWC Identification numbers developed?
- LWC, LCL, or LJG followed by originating organization, and the TO number or designator.
- What business sectors does the ANSI influence?
- Nearly every sector of business.
- Where does the Telecommunications Industry Association obtain its accreditation?
- From the ANSI.
- What standards does the ECIA develop?
- Interconnect, passive and electro-mechanical (IP&E) electronic components under the ANSI-designation of EIA standards.
- What are the negative effects of inadequate research when developing publications?
- Inadequate research could result in issuing more than one publication on the same subject, conflicting instructions, or publishing a nonessential or incomplete publication.
- List the required activities for creating a new publication.
- (1) Draft and collaborate with publications change manager.(2) Formal coordination.(3) Obtain certifying official’s endorsement.(4) Obtain approving official’s endorsement.(5) Submit to publications manager for final processing.
- What immediate result is expected after an AF TCNO is issued?
- Patching of AFIN or DoDIN systems to minimize or eliminate exploitation vulnerabilities.
- Authority and user responsibilities
8
- The USC is a compilation of which types of federal laws of the United States?
- General and permanent.
- What USC Title includes cyber-related topics, such as cyber security research and online shopper protection?
- USC Title 15, Commerce and Trade.
- What is meant by the term posse comitatus and what does it enforce?
- “Force of the country”; civil law when not expressly authorized by the Constitution or an act of Congress.
- Chapter 5 of what USC Title spells out the situations in which one can draw special pay or reenlistment bonuses?
- USC Title 37, Pay and Allowances of the Uniformed Services.
- What is the premise of the War Power Resolution?
- To clarify and expand on constitutional authority to enter the U.S. Armed Forces into hostilities.
- How does Air Force EIM enable mission capabilities?
- Through seamless integrated access to the right information anytime or anywhere.
- What is the primary purpose of a chat room?
- To share information via text with a group of individuals.
- What does the DCO portal do?
- Allows for registration, authentication and scheduling connection meetings and instant messaging sessions.
- What are the two types of Air Force Web pages/sites?
- Public and private.
- What is the difference between the two types of Air Force Web pages/sites?
- Public Webpages/sites are intended for viewing by the general public; private webpages/sites are intended for a limited audience.
- Who has the overall responsibility for publishing local policy and guidance defining authorized personal use of the internet?
- Wing commander.
- Define official use.
- Performance of work associated with your day-to-day responsibilities or performance of only official duties on official time.
- Name four situations that can be considered unethical but not necessarily illegal.
- (1) Personal conflict of interest.(2) Covered relationships.(3) Misuse of position.(4) Non-public information.
- Resource management
9
- What is the DoD internal methodology used to allocate resources to capabilities?
- The PPBE process.
- What is the purpose of the PPBE process?
- To allocate resources within the Department of Defense.
- Name three factors supervisors should consider for future operating costs when planning the work center budget.
(1) Will new equipment need to be purchased? If so, what is the total cost?(2) Which initial spares are required, and will they be locally funded?(3) Which items need to be added to bench stock and how much will they cost?(4) Are any special tools required? If so, what is the cost?(5) Is formal training required? If so, what are the temporary duty (TDY) costs?(6) Will extra trips to the site be necessary?
- What information can be used as a baseline for projecting next year’s operating costs?
- Cost information from supply reports.
- What does the MILCON program cover?
- All land acquisition; Acquiring and constructing facilities; Adding to, expanding, extending, converting, altering, or replacing existing facilities; Relocating facilities; Planning and Design; Construction overhead, supervision, and inspection; Equipment installed in and made a part of real property structures and improvements and real property installed equipment-RPIE.
- While congressional appropriations committees approve individual projects, what about the amounts appropriated?
- They may be less than their estimated cost.
- What is the main goal of the Government Purchase Card Program?
- To provide Air Force users a simplified, streamlined method of purchasing and paying for simple, low-dollar value, items of supply and service.
- What regulation provides in-depth information for administering the Government Purchase Card Program?
- AFI 64–117.
____ (1) The Office of the Deputy Secretary of the Air Force for Acquisition Contracting (SAF/AQC) Liaises between the Air Force organizations and the PCPMO and Communicates DoD and the Air Force policy to the field.
b. Level 2
____ (2) Commonly referred to as the Agency/Organization Program Coordinator (A/OPC), and is responsible for program implementation, administration, training, and monitoring at the installation level.
d. Level 4
____ (3) Approving Official (AO) approves/disapproves all purchases subsequent to reconciliation by the cardholder, accounts for funds, and conducts surveillance on cardholders within the AO’s account .
e. Level 5
____ (4) DoD Purchase Card Program Management Office (PCPMO) Establishes annual training documentation requirements and oversees the purchase card program.
a. Level 1
____ (5) The individual cardholder (CH) makes authorized transactions, and logs and reconciles transactions.
f. Level 6
____ (6) GPC program implemented and administered at the MAJCOM/Agency level.
c. Level 3
- What does the Air Force use as the electronic tool for managing its GPC program?
- PCOLS.
- When do wing or equivalent commanders submit shortfalls or reclamas?
- When a wing or tasked unit does not possess sufficient equipment or qualified personnel to support a UTC or the tasking will shut down critical elements of the home station mission.
- Define shortfall.
- The lack of forces, equipment, personnel, material or capability reflected as the difference between the resources identified as a plan requirement and those apportioned to a combatant commander for planning that would adversely affect the command’s ability to accomplish its mission
- List the conditions that will make a shortfall valid.
- The capability is not available at the unit and the wing or tasked unit has the capability and sufficient personnel to meet requirements, but deployment of personnel and/or equipment would cause a severe mission impact on the wing or unit.
- Recognition
10
- Which agency honors the 12 Outstanding Airmen at its annual convention in Washington D.C.?
- Air Force Association.
- If selected as one of the 12 Outstanding Airmen, what must the nominees agree to in a signed statement of intent?
- Nominees must sign a statement of intent agreeing to obtain retainability to serve for 12 months on the AFA Enlisted Advisory Council beginning on their 12 OAY induction date (September). Additionally, the statement of intent requires the member to agree not to apply for a commissioning program during the year of selection.
- What achievement(s) does the Lance P. Sijan USAF Leadership Award recognizes officers and enlisted leaders for?
- This award recognizes officers and enlisted leaders who exude the highest level of leadership in the performance of their duties and off duty conduct.
- Which document provides guidance for awards specific to the Cyber community?
- AFI 36–2845, Secretary of the Air Force, Chef of Information Dominance and Chief Information Officer Special Trophies and Awards.
- How long must individuals be in their rank tier and duty AFSC to be nominated for the Information Dominance Award?
- Nominated individuals must have been in the rank tier and performed in the duty AFSC for at and for least 183 days during the award period of service
- Basic components
11
- What does RAM mean?
- The term “random access” refers to the method of addressing memory. With random access, the CPU can address any memory location directly and read the data contained at that memory location.
- What is the difference between ROM and RAM?
- ROM is a type of memory that normally can only be read, as opposed to RAM, which can be both read and written to. The data stored in ROM is always there, whether there is power or no power.
- What is the special type of memory used to store the BIOS settings in a PC?
- CMOS memory.
- What term is used for the speed enhancement resulting from a small amount of memory placed inside the CPU or between the CPU and the computer’s main memory?
- Cache.
- What is the “trade name” that refers to the 40-pin interface and drive-controller architecture designed to implement the ATA standard?
- IDE.
- Which connection enables data transfer speeds of 480 Mbps and can handle up to 127 peripherals at once?
- USB 2.0
- How much data can be stored on a CD-R?
- Up to 700MB
- Most high-volume printers can connect to a network directly using what internal device?
- Integrated NIC
- Software
12
- At the simplest level, state the two things that an operating system does.
- It manages hardware and software resources of the computer system, and provides a stable, consistent way for applications to deal with the hardware without having to know all of the details of the software.
- Name an operating system’s six task categories.
- (1) Processor management.(2) Memory management.(3) Device management.(4) Storage management.(5) Application interface.(6) User interface.
- Name the Microsoft Windows family of operating systems.
- Windows 98, Windows NT, Windows 2000 series, Windows XP, Windows Vista, Windows 7 and Windows 8.
- What is a domain?
- A collection of computers defined by the administrator of a Windows Server network that share a common directory/database
- When did Bell Labs develop the UNIX operating system?
- In the early 1970s.
- What do you call the UNIX program that you interact with directly from your terminal or workstation?
- The “shell.”
- Name four common UNIX shells.
- (1) Bourne shell.(2) Korn Shell.(3) C shell.(4) Restricted shell.
- Define partitions.
- Partitions are physical areas of disk allocated with specific sizes to hold file systems
- When are partitions established?
- During system configuration.
- In which UNIX directory are application programs contained?
- In the usr directory.
- What is the firmware prompt called on Sun machines?
- ok (often called the O.K. prompt)
- Applications are what type of programs?
- End-user programs.
- Which application allows the creation of queries, forms, reports, and macros?
- Microsoft Access.
- What program, available as a free download from Adobe’s website, allows you to view PDF files?
- Adobe Acrobat Reader.
- Open Systems Interconnection reference model
13
- Into what two groups can you divide the OSI model?
- Application (upper) layer and Data Transport (lower) layer.
- What is the responsibility of the Data Transport layers of the OSI model?
- Define how data travels the physical media, through Internetwork devices, to the destination computer, and to the application on the destination machine.
____ (1) This layer divides into two sub layers: LLC and MAC.
f. Data Link.
____ (2) This layer typically includes multiplexing, virtual circuit management, and error checking and recovery.
d. Transport.
____ (3) This layer defines the electrical, mechanical, procedural, and functional specifications for network communications.
g. Physical.
____ (4) A hub operates at this layer.
g. Physical.
____ (5) Switches and bridges operate at this layer.
f. Data Link.
____ (6) This layer provides a variety of coding and conversion functions that are applied to application layer data.
b. Presentation.
____ (7) A router operates at this layer.
e. Network.
____ (8) This layer establishes, manages, and terminates communication sessions.
c. Session.
____ (9) At this layer, common data compression and encryption schemes are used.
b. Presentation.
- Department of Defense standards and protocols
14
- Describe the DISN.
- DISN is a telecommunications network that provides the exchange of information in an interoperable and global space, divided by security demands, transmission requirements, and geographic needs of targeted end-user customers. The DISN offers a selection of integrated standards-based services to fulfill these connectivity needs.
- What unclassified IP data service provides internet connectivity and supports e-mail and web services?
- SBU IP Data.
- List the key features of VoSIP.
- (1) Provides an interface between the IP telephony and the circuit-switched network.(2) Provides a full range of supplemental user features available for IP telephony (e.g., call hold, call transfer, and abbreviated dialing.).(3) Provides a separate IP address space for voice communications(4) Provides firewalls at each VoSIP site and access control lists on all routers to ensure that only permitted traffic flows.(5) Provides secure voice communication up to and including Secret.
- What service uses a number of different satellite services to provide warfighters with worldwide access and GIG connectivity for diversity, redundancy and availability?
- CSS.
- Transport protocols
15
- Transport protocols have two classifications based on the way data transports, name the two classifications.
- Connection Oriented and Connectionless Oriented.
- What must occur between both ends before transfer of information in a connection-oriented environment?
- A connection must be established between both ends.
- Define buffering.
- Temporary store of excess data bursts that remain in memory of network devices until processed.
- Transmission Control Protocol/Internet Protocol
16
- The easiest way to break down the many protocols of the TCP/IP suite is according to where they operate within the OSI model. Each protocol in this stack operates at one of what four layers?
- The Data Link layer, the Network layer (also known as the Internet layer in the TCP/IP model), the Transport layer or the Application layer.
- The protocols at the Data Link layer define the access method for the media, the architecture, and interface with the Physical layer of the network. What standards are these protocols based on?
- Project 802 standards.
- What are the four most important TCP/IP protocols that function within the network layer?
- (1) Internet Protocol (IP).(2) Address Resolution Protocol (ARP).(3) Reverse Address Resolution Protocol (RARP).(4) Internet Control Message Protocol (ICMP).
- What are the fields belonging to a TCP segment?
- Source Port, Destination port, Sequence number, Acknowledgement number (ACK), TCP header length, Reserved, Flags (Control bits), Sliding window size, Checksum, Urgent pointer, Options, Padding, and Data.
- In the context of TCP/IP, what is a packet also known as?
- An IP datagram.
- What are the two main parts of an IPv4 address?
- Network number and network host.
- Who assigns network numbers?
- Authorized representatives of IANA.
____ (1) The first bit (0) identifies the address class and, together with the next seven bits, identifies the network number.
a. Class A.
____ (2) There are about 2,097,152 networks, with 254 host on each network.
c. Class C.
____ (3) Reserved for multicast addressing.
d. Class D.
____ (4) What class address is 223.1.1.254?
c. Class C.
____ (5) What class address is 9.10.254.111?
a. Class A.
____ (6) The first four bits (1111) identify the address class.
e. Class E.
____ (7) What class address is 154.224.32.3?
b. Class B.
____ (8) There are about 16,384 networks, with 65,534 hosts on each network.
b. Class B.
- What is the reserved IPv4 address for loop back?
- 127 in the network field, and .any number in the host field
- What is the reserved IPv4 address for a limited broadcast?
- 255.255..
- What is a subnet mask?
- A mechanism that allows a network device to divide an IP address into a network and host number.
- What are the two methods of subnet masking?
- Classful and classless.
- What are some benefits to subneting?
- Subnets ease administration, improve network performance, and security.
- How long is an IPv6 address?
- 16 octets long, or 128 bits.
- How is an IPv6 address expressed?
- In 16 byte fields using a colon hexadecimal format.
- What are the two ways to shorten the expression of an IPv6 address?
- Leading zero compression and zero compression.
- What is a unicast address?
- Unicast addresses identify a single interface. A packet sent to a unicast address delivers to the interface identified by that address.
- What is a multicast address?
- Multicast addresses (FF00::/8) identify a group of interfaces belonging to different nodes. Multicast packets send to all interfaces identified by that address.
- What is an Anycast address?
- Anycast addresses also identify a set of interfaces, but the packets deliver to and accept by the closest interface.
- What are the three types of unicast address?
- (1) Link.(2) Site.(3) Global
- What is the IPv6 loop back address?
- 0:0:0:0:0:0:0:1 or ::1.
- Internet protocol ports
17
- What does a TCP/IP client use to request a particular service?
- Specific values called port numbers to request a particular service.
- What is the range of well-known port numbers?
- 0 thru 1023.
- What is the default port assignment for TELNET?
- Port 23.
- What is the default port assignment for credit card transactions on e-commerce sites?
- Port 443-Secure Socket Layer.
- Network types
18
- What is the internet?
- A network of networks.
- What is the name for networks that use the same software and protocols as the public internet, but exist as a portion of an entity’s private network?
- Intranets.
- What term describes a group of computers and devices that share a common communication line and resources in a small geographical area?
- LAN.
- What type of network interconnects several local area networks by bridging them with backbone lines?
- MAN.
- What is the name for a network connected between two cities?
- WAN.
- Primary addressing in WLANs is achieved by using what type of address?
- MAC.
- List the advantages to using WLAN.
- (1) Mobility.(2) Ease of installation.(3) Lower cost.
- List each of the IEEE wireless standards.
- (1) 802.11b.(2) 802.11a.(3) 802.11g.(4) 802.11n.
- The 802.11n standard operates at what frequency?
- 2.4 GHz and 5 GHz.
- What network provides a private tunnel through the Internet?
- VPN.
- What type of configuration does the Air Force use for most VPN traffic?
- The gateway-to-gateway configuration.
- Network topologies
19
- What is a physical topology?
- A description of the layout of the network media that interconnects the devices on a network.
- What is a logical topology?
- Defines the way in which devices communicate throughout the network.
- What is the rule of thumb to distinguish physical from logical topologies?
- If you can see it and touch it, it is physical, if you cannot see it or touch it, it is logical.
- Because a topology affects the network’s capabilities, what is the impact of choosing one topology over another?
- Equipment needs, equipment capabilities, network expansion, network management.
- What are the advantages of a bus topology?
- Inexpensive to install, easy to expand, requires less cabling that other topologies, works well for small networks.
- What are the disadvantages of a bus topology?
- No longer used, cable breaks causes entire network outage, limited number of devices, troubleshooting is difficult, slower access time.
- What are the advantages of a star topology?
- Easy network expansion, cable failure won’t interrupt the entire network, centralized management, easy to troubleshoot, faster network speeds, most common topology so equipment options are virtually unlimited.
- What are the disadvantages of a star topology?
- Requires more media than a ring or bus, failure of the central device can bring down the entire network, cost of installation.
- What are the advantages of a ring topology?
- Data transmits at greater speed, no collisions, easy to troubleshoot, no terminators.
- What are the disadvantages of ring topology?
- Requires more cable than a bus network, cable break could bring the network down, difficult to add devices to active network, uncommon so equipment is not readily available.
- What are the two most common hybrid topologies?
- (1) Star-bus.(2) Star-ring.
- Modes of switching
20
- What data transport method grew out of the need for a worldwide standard to allow interoperability of information, regardless of the information type or “end-system”?
- ATM.
- How many bytes make up the ATM cell, header, and payload?
- 53 byte cell, 5 byte header, 48 byte payload.
- ISDN channels are separated into two sub-channels, list and describe the sub-channels.
- Sub-channel B 56 Kbps or 64 Kbps and are used for both voice and data. Each B channel can carry a separate telephone call. The D-channel is a 16 Kbps use to carry call control (or supervisory) information. The information on the “D” channel tells the network switches what to do with the traffic on the “B” channels.
- When the full bandwidth of a T1 line is not needed it can be divided in 64 Kbps increments known as what?
- Fractional T–1 (FT–1).
- What Ethernet standard has supplanted Fast Ethernet in wired networks?
- Gigabit Ethernet (GbE or 1 GigE).
- Modems, switches, bridges, and routers
21
- Define modems.
- A modem (modulator-demodulator) is a device that modulates signals to encode digital information and demodulates signals to decode the transmitted information.
- What are the two types of modems used?
- Dial-up and dedicated, also known as leased.
- What is one of the principal functions of a CSU?
- Provides a barrier for electrical interference from either side of the unit.
- What is the main function of a DSU?
- To adapt the digital data stream produced by the customer’s equipment to the signaling standards of the telephone carrier equipment, and vice versa.
- What is the primary use for a bridge?
- To decrease network congestion but also propagate a signal like a repeater.
- What do LAN switches provide between network devices?
- Switches provide collision-free, high-speed communication between network devices.
- Can a switch connect LANs of different bandwidths? If so, give example.
- Yes; this is accomplished with buffering
- What type of switching is required when a moving a frame from a low-speed LAN to a high-speed LAN?
- Store-and-forward switching.
- What is the fundamental difference between Layer 2 and Layer 3 switching?
- The layer at which each forwarding decision is made.
- Routers operate at which layer of the OSI model?
- Layer three (network) of the OSI Model.
- What does a typical router contain?
- Internal processor, an operating system, memory, input and output jacks for different types of network connectors (depending on the network type); and, usually, a management console interface.
- Routers compare metrics to determine optimal routes; these methods differ depending on what?
- Design of the routing algorithm used.
- What are routing protocols that manage traffic within an autonomous system called?
- IGP.
- Name two methods for directing data on the network.
- Static or dynamic routing.
- What is static routing?
- Static routing is a technique in which a network administrator programs a router to use specific paths between nodes.
- What is dynamic routing?
- Dynamic routing automatically calculates the best path between two nodes and compiles this info in a routing table.
- Encryption devices
22
- What are the two methods that encryption can be applied?
- Encryption can be applied on either a link-by-link basis or an end-to-end basis.
- What is the most common telephone device used for voice encryption?
- STE.
- Communication mediums
23
- What are the most common types of all metallic cable used in networks?
- Twisted pair cable and coaxial cable.
- Which cable type is associated with the original designs of the Ethernet standard?
- Coaxial cable.
- List and describe the four most common coax cable types.
- (1) RG–6, 75Ohms.(2) RG–58, 50Ohms.(3) RG–8, 50 Ohms.(4) RG–11, 50 Ohms.
- What medium is the primary carrier for voice telecommunications?
- Twisted pair cable.
- List and describe the categories of twisted pair cable.
- (1) CAT 1, 1 Mbps, voice only analog phone lines (not used for data communications).(2) CAT 3, 10 Mbps, Ethernet (10BaseT).(3) CAT 5, 100 Mbps, Ethernet (100BaseT).(4) CAT 5e, 1 Gbps (1000 Mbps), Ethernet (1000BaseT).(5) CAT 6 and 6a, 10 Gbps, 10 Gigabit Ethernet (10GbE).
- What three things do an optical communications system require to transport communications?.
- (1) A light source (transmitter).(2) A transmission medium (cable).(3) A sensor (receiver).
- List the advantages of fiber optic systems over conventional cable systems.
- (1) Larger bandwidths.(2) Freedom from interference.(3) Low cost and lightweight.
- Is fiber optic cable immune to EMI?
- Yes.
- What is the most common wireless networking standard?
- 802.11.
- Cyberspace Operations policy, structure, and missions
24
- What three major considerations affect supporting cyber operations?
- (1) Policy.(2) Authority.(3) Law.
- What three priorities drive the National Strategy to Secure Cyberspace?
- (1) Prevention of cyber attacks against America’s critical infrastructure.(2) Reduce national vulnerability to cyber attacks.(3) Minimize damage and recover time from cyber attacks.
- Can an Air National Guardsman execute a cyber-operation?
- A guardsman in Title 32 status may train for Title 10 missions but cannot execute them.
- What is the primary Air Force command for cyberspace missions?
- AFSPC.
- How does OCO intend to project power?
- By the application of force in and through cyberspace.
- In DCO, what are reactive defenses?
- Measures taken to directly counter an adversary penetrating a network or actions taken to terminate the ongoing intrusion.
- Most exploitation activities evolve from what?
- Phishing.
- On delegation authority, whose cyber tasking orders does the 624 OC relay to all Air Force units?
- USCYBERCOM.
- What are the four agencies the I-NOSC relays cyber orders to?
- (1) MAJCOMs.(3) ES.(3) ACCCs.(4) Installation communications units.
- Does the ATO reflect the integrated air, space, and cyberspace operations plan that supports a joint force commander’s campaign?
- Yes.
- Cyberspace Operations capabilities
25
- What is the stimulant that generates increased information superiority?
- Targeting, either independently or in conjunction with IO, an adversary’s culture, organization, or individual psychology.
- What is key to mitigating unintended or undesirable effects and maximizing cyberspace superiority?
- Careful planning.
- How can CO affect an adversary’s informational and physical IO dimensions?
- Network-centric warfare.
- What are the three capabilities of EW?
- (1) EA.(2) EP.(3) ES.
- What was the original term used to describe MISO?
- PSYOP.
- What distinct capability does PA bring to the mission?
- Counterpropaganda.
- Can MILDEC intentionally target or mislead the news media, the U.S. public, or Congress?
- No.
- What process does OPSEC incorporate to deny adversaries critical information about friendly forces?
- SM.
- What is the function of military personnel conducting CMO?
- Aid the reestablishment or maintenance of stability within a region or host nation.
- Can ISR capabilities be used to conduct complex effects assessment to support a combatant or component commander?
- No.
- Cyberspace systems and security tools
26
- What weapons system provides continuous monitoring and defense of AF unclassified and classified networks?
- The ACD.
- What AF weapons system offers top-level boundary and entry point into the Air Force Information Network (AFIN)?
- The AFINC weapon system.
- What are the four sub-discipline areas of the AFINC?
- (1) Defense-in-Depth.(2) Proactive Defense.(3) Network Standardization.(4) Situational Awareness.
- What is the mission of the CVA/Hunter?
- F2T2EA the APT.
- How would you define SCADA?
- The term SCADA refers to centralized systems, which monitor and control industrial sites, or complexes of systems spread out over large areas.
- How are SCADA systems typically implemented?
- Through a distributed database, commonly referred to as a tag database, which contains data elements called tags or points.
- Who must evaluate and certify all IT systems, including NSS, with external interfaces?
- The DISA JITC.
- What TADIL is link 11?
- TADIL-A.
- What TADIL is link 4A?
- TADIL-C.
- What TADIL is link 16?
- TADIL-J.
- Cyber security
27
- What is a weakness in a computer system or network open to exploitation called?
- A vulnerability.
- What security professional goal is a result of understanding that all risk cannot be removed?
- To eliminate or mitigate as many risks as possible.
- What passive nature attack is the first step in a replay attack?
- MitM attack.
- Due to cost and imperfections, what method should not be used as the sole form of authentication?
- Biometrics.
- Although inexpensive in implementing, what systems have the major vulnerability of being prone to brute force attacks?
- Knowledge based.
- What actions are included in the scope of end-to-end monitoring?
- Monitoring, measuring, performance analysis, and optimizing networks and network systems.
- What is capacity planning?
- The long-trend analysis of network devices to identify future constraints with the results incorporated into future technical baselines.
- Information Assurance and Communication Security
28
- What is certification?
- The comprehensive evaluation and validation of an AF IS to establish the degree to which it complies with assigned IA controls based on standardized procedures.
- What is accreditation?
- The formal declaration by an AO that the information system is approved to operate in a particular security mode using a prescribed set of safeguards at an acceptable level of risk.
- When does the validation of computer requirements process begin?
- When the user identifies a mission need and requests CSO assistance with defining the requirement and developing a technical solution for that need.
- When do requirements arise?
- When there is a deficiency in an existing operational capability, a need for a new capability, or an opportunity to replace or modernize an existing system with improved technology when operationally and economically practical.
- What are the five phases in the DIACAP process?
- (1) Phase I, Initiate and plan IA and C&A.(2) Phase II, Implement and validate assigned IA controls.(3) Phase III, Make certification determination and accreditation decision.(4) Phase4 IV, Maintain authorization to operate and conduct reviews. (5) Phase V, Decommission.
- What is a connection approval?
- The formal approval for an IS to connect to the AFIN and the acceptance of risk associated with the IS connection by the Air Force Enterprise AO or delegated individual.
- What is an ATO?
- An approval granted by the lead AO or appointed AO to operate the system at an acceptable level of risk.
- What is the temporary authorization to test a DOD IS in a specified operational information environment within the timeframe and under the conditions or constraints enumerated in the accreditation decision?
- IATT.
- What is a specific fact about friendly intentions, capabilities, and activities vitally needed by adversaries for them to plan and act effectively, so as to guarantee failure or unacceptable consequences for friendly mission accomplishment?
- Critical information