URE 3 Flashcards

1
Q

This component of the Global Information Grid (GIG) consists of those items that are necessary to directly connect the warfighter to the global network

A

Warrior component

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This characteristic of the GIG ensures seamless transmission of information between different service branches

A

Common policy and standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who bears the responsibility for maintenance & sustaining the base portion of the Defense Information System Network (DISN)?

A

The service that owns the installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which segment of the DISN may be a person in the deployed AOR or a person sitting in a fixed location thousands of miles from combat?

A

Deployed warfighter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of router is stubbed off of a Hub router and provides network access to single base, post, camp, or station, and have subscriber connections via LANs, hosts, and terminals?

A

Premise router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the difference between a hub router and a premise router

A

Hub routers are interconnected via the Defense Information Systems Agency Asynchronous Transfer Mode (DATM) network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How are non-internet protocols sent across the Secret Internet Protocol Router Network (SIPRNET)?

A

Encapsulated by the internet protocol before being transmitted across the SIPRNET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which is an internet protocol encryption device that can be directly connected to Red local area networks?

A

KG-84

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What provides a conduit for Joint Worldwide Intelligence Communications System (JWICS) data transmission from one location to another?

A

DISN backbone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What concerns slowed the military’s adoption of wireless network technology?

A

Security and reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the first step in merging voice, data, and video networks into one integrated network w/in the USAF?

A

Integrating traditional TDM switches w/ voice over IP (VOIP) systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Besides limiting connections to the GIG, what other Combat Information Transport Systems (CITS) initiative will help increase network security?

A

Eliminating the MAJCOM NOSC concept & integrating the functions into two Integrated NOSCs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which organization is responsible for the design, acquisition, and single systems management of the Defense Switched Network (DSN)?

A

Defense Information Systems Agency (DISA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How is responsiveness provided in the DSN?

A

Precedence access thresholding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of DSN precedence call cannot be preempted?

A

Priority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

*What is the maximum asynchronous data rate for the Defense Red Switch Network (DRSN)?

A

19.2 Kbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

While you are using the Red Switch, what feature lets you know that you have dialed the correct number at the proper level of security?

A

LCD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the purpose of the standardized tactical entry point terminal?

A

Provide a foxhole to National Command Authority link for commanders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The GPS program is responsible for maintaining GPS time to w/in how many seconds of universal time code?

A

1 microsecond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which security program is covered under AFI 10-701?

A

OPSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

*What security program is defined as a process of ID’ing critical information and subsequently analyzing friendly actions attendant to military operations and other activities?

A

OPSEC

22
Q

*Providing a list where and why the information will be disclosed outside the DoD best describes which mandatory item of a Privacy Act Statement?

A

Routine use

23
Q

What form is used as a cover sheet to protect Privacy Act material?

A

AF Form 3227

24
Q

Guidance for posting information on USAF web sites is outlined in

A

AFI 33-129

25
Q

Official guidance on individual security clearances and permitting access to classified information can be found in

A

AFI 31-501

26
Q

Disclosure of information that would result in the loss, misuse, modification or unauthorized access that might adversely affect national security would best be described as

A

Sensitive but unclassified

27
Q

What is the COMSEC program designed to do?

A

Detect and correct procedural weaknesses that could expose critical information

28
Q

What reference would you use for guidance on USAF messaging?

A

AFI 33-119

29
Q

Which form is used w/ a transfer report to accompany a COMSEC package?

A

SF 153

30
Q

*What form is used as a visitor register log to record visitors into restricted areas?

A

AF Form 1109

31
Q

*An uninvestigated or unevaluated occurrence that potentially jeopardizes the security of COMSEC material or the secure transmission of government information is best described as a COMSEC

A

Incident

32
Q

Which organization assigns communication security incident report case numbers?

A

Air Force Communications Agency (AFCA)

33
Q

*When are final reports of a communication security incident due?

A

30 days after the initial report is issued

34
Q

The Air Force Information Assurance Program is detailed in

A

AFI 33-200

35
Q

*Which applied discipline applies measures and controls to protect data in computer systems against unauthorized, disclosure, modification, or destruction?

A

COMPUSEC

36
Q

What best describes an unintended signal or noise appearing external to a piece of communications equipment?

A

Emanation

37
Q

An unclassified term referring to technical investigations for compromising emanations from electrically operated data processing equipment is known as

A

Telecommunications Electronic Material Protected from Emanating Spurious Transmissions (TEMPEST)

38
Q

Which condition exists when there is no apparent terrorist activity against computer networks?

A

INFOCON 5 (no activity; ops performance monitored; password systems in use)

39
Q

*Which condition requires the mandate of increased monitoring of all network system activities when an increased risk of attack is present?

A

INFOCON 4 (increased risk; Internet usage may be restricted)

40
Q

When a risk of a network system attack has been ID’d, which condition requires all unclassified dial-up connections be disconnected?

A

INFOCON 3 (risk ID’d; unclass dial-up cnxs disconnected)

41
Q

*Which condition permits non-essential networks to be taken offline and substituted w/ alternate methods of communication?

A

INFOCON 2 (attacks have taken place; non-essential nets taken offline)

42
Q

Which condition requires compromised systems to be isolated from the rest of the network?

A

INFOCON 1 (attacks are taking place; net defense at max alert; compromised systems isolated from rest of network)

43
Q

*At which Network Operations (NETOPS) level is responsibility for the worldwide management and operational oversight of the defense information infrastructure globally managed?

A

Tier 1 (worldwide)

44
Q

At what level do regional operation centers perform NETOPS to ensure operational and administrative control by implementing Systems and Network Management (S&NM) Information Assurance/Network Defense (IA/NetD), and Information Dissemination Management (IDM)?

A

Tier 2 (regional)

45
Q

At what NETOPS level do local NCCs generate a situational awareness picture and partner w/ NOSCs and ANG ROSCs to deliver S&NM, IA/NetD, and IDM?

A

Tier 3 (local)

46
Q

*An accreditation decision which allows a system to operate in an environment for which it was originally intended is known as

A

A full accreditation

47
Q

An accreditation decision which permits an AIS to operate until identified steps can be completed before receiving full accreditation is known as

A

An interim accreditation

48
Q

Accreditation decisions are made by

A

DAA

49
Q

Which resource designated priority is provided when the level of security requires a significant degree against hostile acts?

A

B (significant)

50
Q

Which resource designated priority is provided when the level of security requires a reasonable degree against hostile acts?

A

C (reason-able)

51
Q

Which resource designated priority is provided when the level of security requires the greatest possible deterrence against hostile acts?

A

A (great-est)

52
Q

Which form would you use to properly label removable storage media containing “confidential” information?

A

SF 708