VOLUME 1, SET 1 - COMPREHENSION Flashcards
Which document would you reference to see your specific AFSC responsibilities?
In the 3DXXX CFETP Section B, Career Field Progression and Information.
What two groups make up the cyberspace support family?
- Cyberspace Operations (3D0XX)
- Cyberspace Systems (3D1XX).
Within the cyberspace support families, what career field is responsible for maintenance and operation of cyberspace systems?
Cyberspace Systems
What is the core AFSC document used to document training for enlisted personnel?
The CFETP is the core AFSC training document used for training enlisted personnel.
What do duty position tasks describe?
The tasks assigned to an individual for the position currently held.
What part of the CFETP includes general information about how to use it?
Part I includes general information about how to use the CFETP.
How many skill levels are there?
5
What AFI outlines the AF’s training program?
AFI 36–2201, Air Force Training Program
With whom does the Air Force career field manager directly communicate to disseminate policies and program requirements?
He/she communicates directly with MFMs, AETC training managers to disseminate all Air Force and career field policies and program requirements.
Whose duty is it to assist in gathering input and data to complete enlisted grade allocation for career progression group reviews?
MFM
What type of workshop brings MFMs and SMEs together to determine the most effective and efficient way to ensure training standards and skill-level requirements of a career field are accurate?
A U&TW brings MFMs and subject matter experts together from across the Air Force in an effort to determine the most effective and efficient way to ensure training standards and skill level requirements of a career field are accurate.
What is the primary purpose of a STRT?
For the AFCFM and functional leaders to determine and present training requirements to the AETC TPM.
What program provides training for personnel to attain knowledge and skill qualifications required to perform duty in their specialty?
The AF OJT Program.
What are the three components of the AF OJT program?
- Job knowledge.
- Job proficiency.
- Job experience.
What are the three essential elements in a QA program?
- Quality system.
- Quality assessments.
- Trend Analysis.
How is trend analysis used?
To collect, compile, analyze, and record data on the processes sampled by QA personnel.
What program reports compliance with requirements listed in self-assessment checklists to the chain of command and appropriate staffs?
The self-assessment program.
Who, in conjunction with the commander appointed self-assessment program manager, will oversee the units self-inspection/assessment program?
QA personnel
What are automated information systems?
AIS are combinations of computer hardware and computer software, data, and/or telecommunications equipment that performs functions such as collecting, processing, storing, transmitting, and displaying information.
What is the standard Air Force system for maintenance information?
The IMDS is the standard Air Force system for maintenance information.
What automated information system manages the entire lifecycle of IT assets from procurement through retirement?
Remedy
What is the basis for drafting and enforcing all federal laws governing the U.S.?
The US Constitution
Which title of the U.S. code spells out the general provisions and punitive articles of the UCMJ?
US Code Title 10, Armed Forces.
Who has inspection responsibility over the National Guard?
The Secretaries of the US Army and Air Force.
What is cyberspace?
A global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers.
What type of cyberspace maneuverability occurs with the use of security protocols used by host systems?
Logical maneuverability
What are cyberspace operations?
Cyberspace operations are the employment of cyberspace capabilities where the primary purpose is to achieve military objectives or effect in or through cyberspace.
What are three major considerations to understand while supporting cyber operations?
- Policy.
- Authority.
- Law.
What document provides AF leaders a particular principle in the execution of cyber operations?
AFDD 3–12 Cyberspace Operations, Appendix B, Policy and Doctrine Related to Cyberspace Operations
The National Strategy to Secure Cyberspace is driven by three priorities, what are those priorities?
- Prevention of cyber attacks against America’s critical infrastructure.
- Reduce national vulnerability to cyber attacks.
- Minimize damage and recover time from cyber-attacks.
Gaining and maintaining the initiative to operate within adversary decision cycles outlines what strategy?
The NMS-CO.
Before the employment of cyberspace capabilities, what considerations must be made?
Legal considerations and international legal obligations apply to the employment of cyberspace capabilities.
What could prevent Air National Guard personnel from executing a cyber operation?
Guardsmen in Title 32 status may train for Title 10 missions but may not execute them.
In addition to the implied legal parameters, what else must individuals be clearly aware of when conducting cyber operations?
• Authority for each operation they are a part of.
Define prohibited use.
• Prohibited Use where use adversely reflects on DOD; where use interferes with employee or office productivity; or where use is to conduct outside commercial activity.
- Match the characteristics of each unethical situation to its corresponding title.
Column A Column B
____ (1) Personal conflict of interest.
____ (2) Covered relationships.
____ (3) Misuse of position.
____ (4) Non-public information.
a. Disclosure of Privacy Act-protected records.
b. Officially endorsing or sanctioning a non-federal entity, its products, services or activities.
c. May be real or perceived and involve ethical/moral values.
d. May lead to the appearance of impartiality or favoritism.
(1) c.
(2) d.
(3) b.
(4) a.
What career field relies on many services provided by the Cyberspace Support Community?
1B4X1.
What weapons system provides continuous monitoring and defense of AF unclassified and classified networks?
The Air Force Cyberspace Defense.
What are the four sub-discipline areas of the ACD? Describe them.
(1) Incident Prevention: Services include the protection of Air Force networks against new and existing malicious logic. The system has the ability to assess/mitigate known software and hardware vulnerabilitilites.
(2) Incident Detection: Conducts monitoring of classified/unclassified Air Force networks, identifies and researches anomalous activity to determine problems and threats to networks, and monitors real-time alerts generated from network sensors. In addition, the system can perform in-depth research of historical traffic reported through sensors.
(3) Incident Response: Determines the extent of instrusions, develops course of action required to mitigate threat(s), and determines and executes response actions. Crew interfaces with law enforcement during malicious logic related incidents.
(4) Computer Forensics: Conducts in-depth analysis to determine threats from identified incidents and suspicsious activities, and then assesses damage. Supports incident response process capturing the full impact of various exploits and reverse engineers code to determine the impact to the network/system.
What resulted from an operational initiative to consolidate numerous MAJCOM-specific stove-piped networks into a centrally managed and controlled network under three I-NOSCs?
The Air Force Cyber Security and Control System
What AF weapons system offers top-level boundary and entry point into the AFIN?
The Air Force Intranet Control weapon system
What are the four sub-discipline areas of the AFINC?
(1) Defense-in-Depth.
(2) Proactive Defense.
(3) Network Standardization.
(4) Situational Awareness.
. What weapon system is the single system providing overarching 24/7/365 awareness, management and control of the AF portion of the cyberspace domain?
Cyber Command and Control Mission System
Describe CORA.
• CORA assesses data compromised through intrusions of AF networks with the objective of determining the associated impact to operations resulting from that data loss. This sub-discipline is in the second variant.
What is the mission of the CVA/Hunter?
F2T2EA the APT
How does end-to-end performance monitoring support mission assurance?
It supports mission assurance by including the end user experience and the warfighter’s ability to access critical information.
Who has the responsibility for determining what network elements should be monitored?
24 AF.
What two things did the DOD Consent to Monitoring policy do?
(1) Established departmental guidance on the use of DODIN systems.
(2) Standardized the wording for to be included in user agreements.
What Air Force command is appointed as the primary for cyberspace missions?
AFSPC is the USAF major command for the cyberspace mission.
How do offensive operations support US cyberspace objectives?
OCO supports US cyberspace objectives by denying, degrading, disrupting, destroying, or altering the adversaries ability to use cyberspace.
(True/False) DCOs intend to defend DOD or friendly cyberspace through proactive and reactive operations.
True
Besides technical vulnerabilities, how do we attempt to exploit user-friendly networks?
We attempt to exploit user-friendly networks by gaining footholds through their routine uses of cyberspace.
What are IRCs?
• IRCs, which are tools, techniques or activities employed within the physical, informational or cognitive dimensions of the information environment that can be used to create effects and operationally desirable conditions.
How does EW contribute to information operations?
EW contributes to information operations by using offensive and defensive tactics and techniques to shape, disrupt and exploit adversarial use of EMS.
What is the intent of MISO?
The intent of MISO is to affect the behavior of foreign governments, organizations, groups or individuals so that changes in foreign behavior or attitude favor an originator’s objectives.
(True/False) PA cannot provide false or misleading information to influence operations.
True
What is the goal of MILDEC?
The goal is to cause the adversary to take specific actions (or inactions) that contribute to the accomplishment of the friendly force mission.
What does OPSEC deny adversaries?
OPSEC denies adversaries critical information and observable indicators about friendly forces and actions.
Audience engagements are meant to mold perceptions and shape relations with whom?
The intent is to mold perceptions and shape relations with key military and civilian organizations.
What type of ISR support does IO require for integration?
IO requires a more concerted, tailored ISR support for IO integration.
Define CI
CIis information gathered and activities to identify, deceive, exploit, disrupt or protect against espionage, other intelligence activities, sabotage or assassinations conducted for or on behalf of foreign powers, persons or their agents, or international terrorist organizations or activities.
How do we influence the adversary’s decision-making while protecting our operations?
By integrating the capabilities of influence operations, electronic warfare operations and network warfare operations in concert.
What reaches across geopolitical boundaries and is tightly integrated into the operation of critical infrastructures and the conduct of commerce, governance, and national security?
Cyberspace.
What three things ensure our freedom of action and deny the same to our adversaries in relation to cyber operations?
(1) Network defense.
(2) Exploitation.
(3) Attack.
Describe the five elements that comprise the NMS-CO.
(1) Strategic Context provides the working definition and cyberspace characteristics.
(2) Threats and vulnerabilities create a common understanding of the context, threats, vulnerabilities, and opportunities for cyberspace operations.
(3) Strategic considerations provide additional clarity to identify priorities.
(4) Military strategic framework presents ends, way, and means.
(5) Implementation and assessment identifies areas where change is needed and establishes a mechanism to measure progress toward achieving the strategic goal.