VOLUME 1, SET 1 - COMPREHENSION Flashcards

1
Q

Which document would you reference to see your specific AFSC responsibilities?

A

In the 3DXXX CFETP Section B, Career Field Progression and Information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What two groups make up the cyberspace support family?

A
  • Cyberspace Operations (3D0XX)

- Cyberspace Systems (3D1XX).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Within the cyberspace support families, what career field is responsible for maintenance and operation of cyberspace systems?

A

Cyberspace Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the core AFSC document used to document training for enlisted personnel?

A

The CFETP is the core AFSC training document used for training enlisted personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do duty position tasks describe?

A

The tasks assigned to an individual for the position currently held.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What part of the CFETP includes general information about how to use it?

A

Part I includes general information about how to use the CFETP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How many skill levels are there?

A

5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What AFI outlines the AF’s training program?

A

AFI 36–2201, Air Force Training Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

With whom does the Air Force career field manager directly communicate to disseminate policies and program requirements?

A

He/she communicates directly with MFMs, AETC training managers to disseminate all Air Force and career field policies and program requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Whose duty is it to assist in gathering input and data to complete enlisted grade allocation for career progression group reviews?

A

MFM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of workshop brings MFMs and SMEs together to determine the most effective and efficient way to ensure training standards and skill-level requirements of a career field are accurate?

A

A U&TW brings MFMs and subject matter experts together from across the Air Force in an effort to determine the most effective and efficient way to ensure training standards and skill level requirements of a career field are accurate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the primary purpose of a STRT?

A

For the AFCFM and functional leaders to determine and present training requirements to the AETC TPM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What program provides training for personnel to attain knowledge and skill qualifications required to perform duty in their specialty?

A

The AF OJT Program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the three components of the AF OJT program?

A
  • Job knowledge.
  • Job proficiency.
  • Job experience.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three essential elements in a QA program?

A
  • Quality system.
  • Quality assessments.
  • Trend Analysis.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How is trend analysis used?

A

To collect, compile, analyze, and record data on the processes sampled by QA personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What program reports compliance with requirements listed in self-assessment checklists to the chain of command and appropriate staffs?

A

The self-assessment program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Who, in conjunction with the commander appointed self-assessment program manager, will oversee the units self-inspection/assessment program?

A

QA personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are automated information systems?

A

AIS are combinations of computer hardware and computer software, data, and/or telecommunications equipment that performs functions such as collecting, processing, storing, transmitting, and displaying information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the standard Air Force system for maintenance information?

A

The IMDS is the standard Air Force system for maintenance information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What automated information system manages the entire lifecycle of IT assets from procurement through retirement?

A

Remedy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the basis for drafting and enforcing all federal laws governing the U.S.?

A

The US Constitution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which title of the U.S. code spells out the general provisions and punitive articles of the UCMJ?

A

US Code Title 10, Armed Forces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Who has inspection responsibility over the National Guard?

A

The Secretaries of the US Army and Air Force.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is cyberspace?

A

A global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What type of cyberspace maneuverability occurs with the use of security protocols used by host systems?

A

Logical maneuverability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are cyberspace operations?

A

Cyberspace operations are the employment of cyberspace capabilities where the primary purpose is to achieve military objectives or effect in or through cyberspace.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are three major considerations to understand while supporting cyber operations?

A
  • Policy.
  • Authority.
  • Law.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What document provides AF leaders a particular principle in the execution of cyber operations?

A

AFDD 3–12 Cyberspace Operations, Appendix B, Policy and Doctrine Related to Cyberspace Operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The National Strategy to Secure Cyberspace is driven by three priorities, what are those priorities?

A
  • Prevention of cyber attacks against America’s critical infrastructure.
  • Reduce national vulnerability to cyber attacks.
  • Minimize damage and recover time from cyber-attacks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Gaining and maintaining the initiative to operate within adversary decision cycles outlines what strategy?

A

The NMS-CO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Before the employment of cyberspace capabilities, what considerations must be made?

A

Legal considerations and international legal obligations apply to the employment of cyberspace capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What could prevent Air National Guard personnel from executing a cyber operation?

A

Guardsmen in Title 32 status may train for Title 10 missions but may not execute them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

In addition to the implied legal parameters, what else must individuals be clearly aware of when conducting cyber operations?

A

• Authority for each operation they are a part of.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Define prohibited use.

A

• Prohibited Use where use adversely reflects on DOD; where use interferes with employee or office productivity; or where use is to conduct outside commercial activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
  1. Match the characteristics of each unethical situation to its corresponding title.
    Column A Column B

____ (1) Personal conflict of interest.
____ (2) Covered relationships.
____ (3) Misuse of position.
____ (4) Non-public information.

a. Disclosure of Privacy Act-protected records.
b. Officially endorsing or sanctioning a non-federal entity, its products, services or activities.
c. May be real or perceived and involve ethical/moral values.
d. May lead to the appearance of impartiality or favoritism.

A

(1) c.
(2) d.
(3) b.
(4) a.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What career field relies on many services provided by the Cyberspace Support Community?

A

1B4X1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What weapons system provides continuous monitoring and defense of AF unclassified and classified networks?

A

The Air Force Cyberspace Defense.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What are the four sub-discipline areas of the ACD? Describe them.

A

(1) Incident Prevention: Services include the protection of Air Force networks against new and existing malicious logic. The system has the ability to assess/mitigate known software and hardware vulnerabilitilites.
(2) Incident Detection: Conducts monitoring of classified/unclassified Air Force networks, identifies and researches anomalous activity to determine problems and threats to networks, and monitors real-time alerts generated from network sensors. In addition, the system can perform in-depth research of historical traffic reported through sensors.
(3) Incident Response: Determines the extent of instrusions, develops course of action required to mitigate threat(s), and determines and executes response actions. Crew interfaces with law enforcement during malicious logic related incidents.
(4) Computer Forensics: Conducts in-depth analysis to determine threats from identified incidents and suspicsious activities, and then assesses damage. Supports incident response process capturing the full impact of various exploits and reverse engineers code to determine the impact to the network/system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What resulted from an operational initiative to consolidate numerous MAJCOM-specific stove-piped networks into a centrally managed and controlled network under three I-NOSCs?

A

The Air Force Cyber Security and Control System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What AF weapons system offers top-level boundary and entry point into the AFIN?

A

The Air Force Intranet Control weapon system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What are the four sub-discipline areas of the AFINC?

A

(1) Defense-in-Depth.
(2) Proactive Defense.
(3) Network Standardization.
(4) Situational Awareness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

. What weapon system is the single system providing overarching 24/7/365 awareness, management and control of the AF portion of the cyberspace domain?

A

Cyber Command and Control Mission System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Describe CORA.

A

• CORA assesses data compromised through intrusions of AF networks with the objective of determining the associated impact to operations resulting from that data loss. This sub-discipline is in the second variant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is the mission of the CVA/Hunter?

A

F2T2EA the APT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

How does end-to-end performance monitoring support mission assurance?

A

It supports mission assurance by including the end user experience and the warfighter’s ability to access critical information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Who has the responsibility for determining what network elements should be monitored?

A

24 AF.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What two things did the DOD Consent to Monitoring policy do?

A

(1) Established departmental guidance on the use of DODIN systems.
(2) Standardized the wording for to be included in user agreements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What Air Force command is appointed as the primary for cyberspace missions?

A

AFSPC is the USAF major command for the cyberspace mission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

How do offensive operations support US cyberspace objectives?

A

OCO supports US cyberspace objectives by denying, degrading, disrupting, destroying, or altering the adversaries ability to use cyberspace.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

(True/False) DCOs intend to defend DOD or friendly cyberspace through proactive and reactive operations.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Besides technical vulnerabilities, how do we attempt to exploit user-friendly networks?

A

We attempt to exploit user-friendly networks by gaining footholds through their routine uses of cyberspace.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What are IRCs?

A

• IRCs, which are tools, techniques or activities employed within the physical, informational or cognitive dimensions of the information environment that can be used to create effects and operationally desirable conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

How does EW contribute to information operations?

A

EW contributes to information operations by using offensive and defensive tactics and techniques to shape, disrupt and exploit adversarial use of EMS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What is the intent of MISO?

A

The intent of MISO is to affect the behavior of foreign governments, organizations, groups or individuals so that changes in foreign behavior or attitude favor an originator’s objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

(True/False) PA cannot provide false or misleading information to influence operations.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What is the goal of MILDEC?

A

The goal is to cause the adversary to take specific actions (or inactions) that contribute to the accomplishment of the friendly force mission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What does OPSEC deny adversaries?

A

OPSEC denies adversaries critical information and observable indicators about friendly forces and actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Audience engagements are meant to mold perceptions and shape relations with whom?

A

The intent is to mold perceptions and shape relations with key military and civilian organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What type of ISR support does IO require for integration?

A

IO requires a more concerted, tailored ISR support for IO integration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Define CI

A

CIis information gathered and activities to identify, deceive, exploit, disrupt or protect against espionage, other intelligence activities, sabotage or assassinations conducted for or on behalf of foreign powers, persons or their agents, or international terrorist organizations or activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

How do we influence the adversary’s decision-making while protecting our operations?

A

By integrating the capabilities of influence operations, electronic warfare operations and network warfare operations in concert.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What reaches across geopolitical boundaries and is tightly integrated into the operation of critical infrastructures and the conduct of commerce, governance, and national security?

A

Cyberspace.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What three things ensure our freedom of action and deny the same to our adversaries in relation to cyber operations?

A

(1) Network defense.
(2) Exploitation.
(3) Attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Describe the five elements that comprise the NMS-CO.

A

(1) Strategic Context provides the working definition and cyberspace characteristics.
(2) Threats and vulnerabilities create a common understanding of the context, threats, vulnerabilities, and opportunities for cyberspace operations.
(3) Strategic considerations provide additional clarity to identify priorities.
(4) Military strategic framework presents ends, way, and means.
(5) Implementation and assessment identifies areas where change is needed and establishes a mechanism to measure progress toward achieving the strategic goal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What are the DOD’s three main roles regarding cyber operations?

A

(1) Defense of the nation.
(2) National incident response.
(3) Critical infrastructure protection

67
Q

What items ensure critical infrastructure is protected?

A

Critical infrastructure protection relies on analysis, warning, information sharing, vulnerability identification and reduction, mitigation, and aiding of national recovery efforts.

68
Q

Information superiority is a result of what abilities?

A

The ability to collect, process, and disseminate and uninterrupted flow of information while exploiting or denying an adversaries ability to do the same.

69
Q

How would you define SCADA?

A

SCADA refers to a centralized system that monitors and controls industrial sites or complexes of systems spread out over large areas.

70
Q

How are SCADA systems typically implemented?

A

SCADA systems are typically implemented as a distributed database, commonly referred to as a tag database, which contains data elements called tags or points.

71
Q

What is the purpose of IO?

A

The purpose of IO is to affect adversary decision-making with the intent to modify behavior.

72
Q

How many flights typically make up Air Force communications Squadrons?

A

Air Force Communications Squadrons are typically broken down into two flights with an optional third flight.

73
Q

Which communications squadron flight provides technical and systems support for wing communications and computer systems including ground radio, voice networks, and secure communications maintenance?

A

Operations Flight (SCO).

74
Q

Who authorizes the use of a Special Mission Flights within a communication squadron?

A

Air Staffs Manpower division (AF/A1M).

75
Q

What is the primary mission of the AOC?

A

The primary mission of the AOC is to provide the Joint Forces with the tools necessary to fight and win a major theater war (MTW) within the scope and coordination of all land, sea and air forces.

76
Q

How are cyberspace forces in an AOC tasked to execute cyber missions?

A

These cyberspace forces execute cyber missions through a cyber-tasking order (CTO).

77
Q

What squadron is a communications support squadron that directly supports the AOC?

A

Air Communications Squadron

78
Q

What type of unit provides flyaway communications packages to expeditionary air bases?

A

Combat communications.

79
Q

What active duty combat communications groups are in the CONUS?

A

There is presently one active duty combat communications group in the CONUSthe 5th Combat Communications Group (5 CCG) located at Robins AFB, Georgia.

80
Q

How are expeditionary communication units established to operate in a deployed environment?

A

Expeditionary units are established to operate with an Air Expeditionary Task Force (AETF).

81
Q

Who is the major force provider for the 386th AEW?

A

The 86th Airlift Wing (Ramstein Air Base).

82
Q

Which EIS unit, currently part of the Air Combat Command, is an indispensable part of the USAF war-fighting community?

A

85th EIS

83
Q

What unit installs, reconstitutes and tests critical C4 systems for COCOMs, anywhere and anytime?

A

85th EIS

84
Q

What term replaced Global Information Grid (GIG)?

A

DOD Information Network.

85
Q

What AF unit interfaces with theater and functional Air Operations Centers to establish, plan, direct, coordinate, assess, and command & control cyber operations in support of Air Force (AF) and Joint warfighting requirements.

A

624th OC.

86
Q

Who provides around the clock situational awareness of the AFN?

A

624th OC.

87
Q

How does the 624th OC translate CDR USCYBERCOM and theatre JFCs objectives, priorities and intent into a coherent plan for AF cyberspace forces?

A

By using a cyber-tasking cycle

88
Q

What unit prepares Airmen to execute computer network exploitation and attack?

A

67th Cyberspace Wing

89
Q

What is the mission focus of the NOSC?

A

To provide continuous operational and mission capable systems.

90
Q

What entity performs security and operations functions and is the focal point for Tier-2 (regional) execution of network enterprise security?

A

I-NOSC

91
Q

Regional computing and data centers that provide enterprise services are called?

A

Area Processing Centers (APC).

92
Q

What is the mission of the ESD?

A

The ESD mission is to provide help desk network support to all personnel at CONUS and OCONUS US Air Force bases.

93
Q

From whom does the communications focal point collect data?

A

Communications squadron itself, depot, AFNetOps, DISA, and others in the areas of assembly, collation, and assessment of logistics information and sustainment requirements.

94
Q

Who creates JTFs? (Joint Task Force)

A

• Secretary of Defense, a combatant commander, a sub unified commander, or an existing joint force commander

95
Q

Whom is a CCDR responsible to?

A

To the President and the SecDef

96
Q

What responsibility does the CNAF commander assumes when joint military operations are in his or her respective AO?

A

JFACC

97
Q

If air asse JFACC. ts from more than one service are present within a joint force, what will the JFC normally designate?

A

A JFACC.

98
Q

Who is designated by the JFC to be responsible for operating and supporting all Air Force forces assigned or attached?

A

The COMAFFOR

99
Q

What does the five-character alphanumeric code UTC identifier represent?

A

Combination of equipment and personnel

100
Q

What is the name of the process in which AF units use to present their capabilities?

A

UTC posturing (positioning) and coding.

101
Q

What is the core of the ITIL Framework?

A

The ITIL Service Life Cycle

102
Q

What does the ITIL Service Life Cycle provide?

A

A structure that enables you to organize information and processes into an interconnected framework.

103
Q

Match the ITIL Service Life Cycle Stage in Column B with the description in Column A. Items in Column B may be used once, more than once, or not at all.

Column A Column B

____ (1) Ensures that the framework developed in the Service Transition Stage is implemented.
____ (2) This stage includes determining risks, constraints, and whether the service will meet requirements.
____ (3) An overarching stage for maintaining service quality.
____ (4) The stage in which the required service is designed and developed.
____ (5) A critical stage of the Service Life Cycle because the decisions made in this stage impact all subsequent stages.

a. Service Strategy.
b. Service Design.
c. Service Transition.
d. Service Station.
e. Service Operation.
f. CSI.

A

(1) e.
(2) c
(3) f
(4) b
(5) a

104
Q

How does Air Force EIM enable mission capabilities?

A

Through seamless integrated access to the right information anytime or anywhere.

105
Q

What is the primary purpose of a chat room?

A

To share information via text with a group of individuals.

106
Q

What services are provided by DCS?

A

Web conferencing and IM

107
Q

What is the Air Force goal concerning Internet resources?

A

Within acceptable risks, provide maximum accessibility to personnel requiring access for official business.

108
Q

May government provided hardware and software be authorized for personal use?

A

Yes, only if approved by appropriate officials.

109
Q

Define inappropriate use of the Internet.

A

Using the Internet for other than official or authorized purposes is the definition of inappropriate use.

110
Q

Is it appropriate or inappropriate to view another user’s files or communications without permission?

A

Inappropriate.

111
Q

What are the two types of Air Force Web pages/sites?

A

Public and private.

112
Q

What is the difference between the public and private Air Force Web pages/sites?

A

Public webpages/sites are intended for viewing by the general public; private webpages/sites are intended for a limited audience.

113
Q

Who will appoint Air Force portal content managers and content publishers for public and private websites?

A

Wing commander.

114
Q

What do properly written email summaries provide?

A

They sum up a lengthy e-mail or re-emphasize topics of significant importance.

115
Q

How many distinct EIM capabilities does SharePoint offer?

A

Four

116
Q

Which SharePoint workflow requests agreement from all involved parties?

A

Approval workflow

117
Q

What capabilities does SharePoint offer you for managing documents?

A
  • Store, organize, and locate documents.
  • ensure the consistency of documents.
  • manage metadata for documents.
  • Help protect documents for unauthorized access or use.
  • Ensure consistent business process in document handling.
118
Q

What plays a vital role in managing and operating Air Force activities?

A

Records

119
Q

Whose rights must be protected through the proper implementation of the records management programs?

A

US government and persons directly affected by Air Force actions

120
Q

What are draft records?

A

Unsigned or unreleased records that may be altered.

121
Q

What are final records?

A

Records that have been officially signed, released and cannot be altered

122
Q

How must Air Force units at all levels manage records?

A

Air Force units at all levels must manage records systematically to make sure they are complete, accurate, trustworthy, and easily accessible.

123
Q

What records relate solely to an individuals private affairs?

A

Personal records

124
Q

Match the responsibility in column A with the position in column B. Items in column B may be used once, more than once, or not at all.
Column A Column B

____ (1) Manages the base staging area.
____ (2) Ensures offices of records receive a SAV a least every 24 months.
____ (3) Ensures records custodians attend record management training.
____ (4) Maintains the office files plan and accountability for active and inactive records.
____ (5) Ensures all personnel who create, maintain, and dispose of records, attend records management training.
____ (6) Trains all personnel within three months of assignment, whose duties include filing, maintaining, and disposing of records.

a. RM.
b. FARM.
c. COR.
d. RC.

A

(1) a. (4) d
(2) b. (5) c
(3) c. (6) a

125
Q

What is the purpose of a staging area?

A

Temporary storage of records pending destruction of transfer to a federal records center.

126
Q

Who ensures installation offices of record conduct periodical unit self-inspections and receive a SAV at least every 24 months?

A

RM ensures offices of record receive a SAV at least every 24 months.

127
Q

Who is the principal defense policy advisor to the President?

A

The Secretary of Defense

128
Q

What are all published DOD policies called?

A

Issuances

129
Q

What are the four major types of DOD issuances?

A

(1) Directives.
(2) Instructions.
(3) Manuals.
(4) Directive-type memorandums

130
Q

What are the two types of DODD?

A

Direct oversight and chartering.

131
Q

What DODD authorized the publication of DODM 8570.1-M?

A

DODD 8570.01 Information Assurance (IA) Training, Certification, and Workforce Management

132
Q

What do non-policy instructions not do?

A

Establish policy

133
Q

If a DODM exceeds 100 pages in length, what action must be taken?

A

Must be broken down into multiple volumes

134
Q

What DOD issuance is only used for a time-sensitive action that affects a current DOD issuance or that will become a DOD issuance?

A

Directive-type memorandums

135
Q

Who governs preparation of JP?

A

CJCS

136
Q

What Joint Doctrine Document provides a doctrine for information operations planning, preparation, execution, and assessment in support of joint operations?

A

Joint Publication 3–13, Joint Doctrine for Information Operations

137
Q

What website would you visit for more information on CJCS Publications?

A

www.jcs.mil

138
Q

What are DISA issuances?

A

DISA issuances are official Agency policy that establish, delegate, or implement specific policies; assign and delineate responsibilities; and in some cases provide procedures for DISA employees and mission partners who use any DISA managed system.

139
Q

What type of AF publication is a “how-to” guide?

A

Nondirective publication

140
Q

Why are AFPAMs written in an informal style?

A

To maintain the readers interest.

141
Q

Define doctrine.

A

Fundamental principles by which the military forces or elements thereof guide their action in support of national objectives

142
Q

(True/False) Permanent visual aids must be attributable to guidance or information in a directive publication.

A

True

143
Q

What statement must be printed in the header on directive publications?

A

Compliance with this publication is mandatory

144
Q

What purpose do AFPDs serve?

A

Directive policy statement to initiate, govern, and/or regulate actions within specified areas of responsibility by Air Force activities.

145
Q

When would it be appropriate to issue a new AFPM?

A

When there is insufficient time to process a new AFPD or to rewrite and existing AFPD.

146
Q

What do AFIs provide?

A

Essential procedural guidance on implementing DoD, Air Force, or higher departmental policies and/or laws.

147
Q

What do AFNOIs provide?

A

Provide operating procedures and checklists for network operations. AFNOIs are used to document standard processes as well as operate, maintain, or troubleshoot network software and equipment and are generated for technical subjects not covered by Air Force publications or technical orders.

148
Q

How are OIs different from AFIs?

A

OIs differ from AFIs in that they are written at a much lower organizational level such as a squadron or flight level.

149
Q

AFMAN 33–326, Preparing Official Communications, implements which AFPD?

A

AFPD 33–3, Information Management

150
Q

Installation publications are issued by whom?

A

Installation commanders

151
Q

(True/False) All publications must be at least as restrictive as the higher headquarters publication they implement and must not contradict the higher headquarters publication.

A

True

152
Q

What organization manages AF publications?

A

AFDPO.

153
Q

What form would you use to recommend changes and improvements to Air Force publications?

A

AF Form 847

154
Q

What information does the TO system include as outlined in TO 00–5–1?

A

The TOs, infrastructure, training, and resources to manage and use TOs

155
Q

What POC oversees TO requirements and distribution within an organization?

A

The TODO

156
Q

What are the Technical Order Distribution Office’s (TODO) duties?

A

• Establish and maintain a TO Account in ETIMS, establish and maintain organization TODA for organization subaccounts, and maintain records of TOs required and on hand in organization physical distribution media TO libraries

157
Q

What do TODA POCs oversee?

A

• Physical distribution media TO/e-TO requirements and distribution activities within the assigned mission area, shop or office

158
Q

What type of TO provides information on basic electronics or installation practices?

A

• SIPTO

159
Q

Match the technical order type in Column B with the description in Column A. Items in Column B may be used once, more than once, or not at all.
Column A Column B
____ (1) Support equipment designed and manufactured for commercial use.
____ (2) Excerpts from one or more basic TOs that organize and simplify instructions.
____ (3) Used for modifying military systems and end items or performing one-time inspections.
____ (4) Category 00 and are general in content and are not issued against specific military systems or end items.
____ (5) Developed for other services or government departments and authorized for use by Air Force personnel.
____ (6) Used in lieu of specific equipment TOs, and are categorized into three types: Category, System, and Equipment-series.
____ (7) Contain instructions for use in conjunction with data contained in their parent TOs, and are not stand-alone publications.
____ (8) Covers installation, operation, troubleshooting, repairing, removing, calibration, servicing or handling of Air Force military systems and end items.
____ (9) Include facility, system, subsystem, installation engineering and installation manuals, general engineering and planning manuals, and standard installation practices .

a. TCTO.
b. MPTO.
c. SIPTO.
d. O&M TO.
e. General TO.
f. COTS Manual.
g. Abbreviated TO.
h. Supplemental TO.
i. Joint use publication.

A

(1) f.
(2) g.
(3) a.
(4) b.
(5) i.
(6) e.
(7) h.
(8) d.
(9) c.

160
Q

What business sectors does the ANSI influence?

A

Nearly every sector of business.

161
Q

Where does the Telecommunications Industry Association obtain its accreditation?

A

ANSI

162
Q

What standards does the ECIA develop?

A

IP&E electronic components under the ANSI-designation of EIA standards.

163
Q

What specifications do MIL-STDs contain?

A

Specifications in which commercial vendors would have to meet or exceed when providing equipment or services.