URE 3 Flashcards

1
Q

This component of the Global Information Grid (GIG) consists of those items that are necessary to directly connect the warfighter to the global network

A

Warrior component

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This characteristic of the GIG ensures seamless transmission of information between different service branches

A

Common policy and standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who bears the responsibility for maintenance & sustaining the base portion of the Defense Information System Network (DISN)?

A

The service that owns the installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which segment of the DISN may be a person in the deployed AOR or a person sitting in a fixed location thousands of miles from combat?

A

Deployed warfighter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of router is stubbed off of a Hub router and provides network access to single base, post, camp, or station, and have subscriber connections via LANs, hosts, and terminals?

A

Premise router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the difference between a hub router and a premise router

A

Hub routers are interconnected via the Defense Information Systems Agency Asynchronous Transfer Mode (DATM) network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How are non-internet protocols sent across the Secret Internet Protocol Router Network (SIPRNET)?

A

Encapsulated by the internet protocol before being transmitted across the SIPRNET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which is an internet protocol encryption device that can be directly connected to Red local area networks?

A

KG-84

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What provides a conduit for Joint Worldwide Intelligence Communications System (JWICS) data transmission from one location to another?

A

DISN backbone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What concerns slowed the military’s adoption of wireless network technology?

A

Security and reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the first step in merging voice, data, and video networks into one integrated network w/in the USAF?

A

Integrating traditional TDM switches w/ voice over IP (VOIP) systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Besides limiting connections to the GIG, what other Combat Information Transport Systems (CITS) initiative will help increase network security?

A

Eliminating the MAJCOM NOSC concept & integrating the functions into two Integrated NOSCs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which organization is responsible for the design, acquisition, and single systems management of the Defense Switched Network (DSN)?

A

Defense Information Systems Agency (DISA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How is responsiveness provided in the DSN?

A

Precedence access thresholding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of DSN precedence call cannot be preempted?

A

Priority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

*What is the maximum asynchronous data rate for the Defense Red Switch Network (DRSN)?

A

19.2 Kbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

While you are using the Red Switch, what feature lets you know that you have dialed the correct number at the proper level of security?

A

LCD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the purpose of the standardized tactical entry point terminal?

A

Provide a foxhole to National Command Authority link for commanders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The GPS program is responsible for maintaining GPS time to w/in how many seconds of universal time code?

A

1 microsecond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which security program is covered under AFI 10-701?

A

OPSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

*What security program is defined as a process of ID’ing critical information and subsequently analyzing friendly actions attendant to military operations and other activities?

22
Q

*Providing a list where and why the information will be disclosed outside the DoD best describes which mandatory item of a Privacy Act Statement?

A

Routine use

23
Q

What form is used as a cover sheet to protect Privacy Act material?

A

AF Form 3227

24
Q

Guidance for posting information on USAF web sites is outlined in

A

AFI 33-129

25
Official guidance on individual security clearances and permitting access to classified information can be found in
AFI 31-501
26
Disclosure of information that would result in the loss, misuse, modification or unauthorized access that might adversely affect national security would best be described as
Sensitive but unclassified
27
What is the COMSEC program designed to do?
Detect and correct procedural weaknesses that could expose critical information
28
What reference would you use for guidance on USAF messaging?
AFI 33-119
29
Which form is used w/ a transfer report to accompany a COMSEC package?
SF 153
30
*What form is used as a visitor register log to record visitors into restricted areas?
AF Form 1109
31
*An uninvestigated or unevaluated occurrence that potentially jeopardizes the security of COMSEC material or the secure transmission of government information is best described as a COMSEC
Incident
32
Which organization assigns communication security incident report case numbers?
Air Force Communications Agency (AFCA)
33
*When are final reports of a communication security incident due?
30 days after the initial report is issued
34
The Air Force Information Assurance Program is detailed in
AFI 33-200
35
*Which applied discipline applies measures and controls to protect data in computer systems against unauthorized, disclosure, modification, or destruction?
COMPUSEC
36
What best describes an unintended signal or noise appearing external to a piece of communications equipment?
Emanation
37
An unclassified term referring to technical investigations for compromising emanations from electrically operated data processing equipment is known as
Telecommunications Electronic Material Protected from Emanating Spurious Transmissions (TEMPEST)
38
Which condition exists when there is no apparent terrorist activity against computer networks?
INFOCON 5 (no activity; ops performance monitored; password systems in use)
39
*Which condition requires the mandate of increased monitoring of all network system activities when an increased risk of attack is present?
INFOCON 4 (increased risk; Internet usage may be restricted)
40
When a risk of a network system attack has been ID'd, which condition requires all unclassified dial-up connections be disconnected?
INFOCON 3 (risk ID'd; unclass dial-up cnxs disconnected)
41
*Which condition permits non-essential networks to be taken offline and substituted w/ alternate methods of communication?
INFOCON 2 (attacks have taken place; non-essential nets taken offline)
42
Which condition requires compromised systems to be isolated from the rest of the network?
INFOCON 1 (attacks are taking place; net defense at max alert; compromised systems isolated from rest of network)
43
*At which Network Operations (NETOPS) level is responsibility for the worldwide management and operational oversight of the defense information infrastructure globally managed?
Tier 1 (worldwide)
44
At what level do regional operation centers perform NETOPS to ensure operational and administrative control by implementing Systems and Network Management (S&NM) Information Assurance/Network Defense (IA/NetD), and Information Dissemination Management (IDM)?
Tier 2 (regional)
45
At what NETOPS level do local NCCs generate a situational awareness picture and partner w/ NOSCs and ANG ROSCs to deliver S&NM, IA/NetD, and IDM?
Tier 3 (local)
46
*An accreditation decision which allows a system to operate in an environment for which it was originally intended is known as
A full accreditation
47
An accreditation decision which permits an AIS to operate until identified steps can be completed before receiving full accreditation is known as
An interim accreditation
48
Accreditation decisions are made by
DAA
49
Which resource designated priority is provided when the level of security requires a significant degree against hostile acts?
B (significant)
50
Which resource designated priority is provided when the level of security requires a reasonable degree against hostile acts?
C (reason-able)
51
Which resource designated priority is provided when the level of security requires the greatest possible deterrence against hostile acts?
A (great-est)
52
Which form would you use to properly label removable storage media containing "confidential" information?
SF 708