VOLUME 1, SET 2 - COMPREHENSION Flashcards

1
Q

What is the name of the Air Forces’ safety program?

A

Mishap Prevention Program (MPP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What AFI implements the installation safety offices’ Mishap Prevention Program?

A

AFI 91–202, The US Air Force Mishap Prevention Program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What agency dictates what must be accomplished in the workplace, but not necessarily, how it will be accomplished?

A

OSHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Who is responsible for the safety of their facilities and personnel, including the correction of all hazards and deficiencies in their work places?

A

The commander.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What should you do when there is conflicting safety guidance?

A

Apply the guidance that offers the most protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Match the characteristics of each situation to its corresponding title.

____ (1) Follow all OSHA safety and health standards.
____ (2) Working conditions that do not pose a risk.
____ (3) Receive training about chemicals and hazards.
____ (4) Review records of work-related injuries.
____ (5) Keep records of work-related injuries.
____ (6) Not retaliate against any worker.
____ (7) File a complaint.

a. Employers must.
b. Employees have the right to.

A

(1) a. (4) b. (7) b.
(2) b. (5) a.
(3) b. (6) a.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What AF series publications make up AFOSH standards?

A

AF 91–series publications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What office/individual is responsible for managing proactive on- and off-duty safety programs?

A

Installation Safety Office.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What office/individual manages the occupational and environmental health surveillance program according to AF guidance?

A

BE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What office/individual is responsible for implementing a safety and health program in their unit or area of responsibility?

A

Commander.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Who is required to complete the AF Risk Management Fundamentals course?

A

USR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What office/individual is responsible for developing JSTOs?

A

The supervisor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How many US workers were killed on the job in 2014?

A

More than 4,600.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the three sub-categories of human factors?

A

(1) Physiological.
(2) Physical.
(3) Organizational.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some physiological factors that can contribute to an unsafe attitude?

A

Unhealthy emotions, job or domestic pressures, distractions, job knowledge, shift work, hurrying or feeling rushed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some examples of physical factors?

A

Fatigue, strength limits, lack of sleep, ergonomic design constraints, drugs/alcohol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Who is responsible to mitigate human factors?

A

Everyone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What should be done before considering the use of PPE?

A

Hazards should be engineered out if possible, substituting a less hazardous material or process, isolation of operations, workaround procedures, rearranging or moving elevated or tall objects or furniture, or providing administrative controls whenever possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When shall PPE be used?

A

Whenever there are hazards that can do bodily harm through absorption, inhalation or physical contact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Within the office space what is the most common hazard?

A

Falls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

List the most common causes of office falls.

A

(1) Tripping over an open desk or file drawer, cords, loose carpet, or objects in walkways.
(2) Bending or reaching for something while seated in an unstable chair.
(3) Using a chair in place of a ladder.
(4) Slipping on wet floors.
(5) Inadequate lighting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Define horseplay.

A

Horseplay is rough or boisterous play or pranks that occur in the workplace.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What could be the consequences of a workplace horseplay incident?

A

Workplace horseplay incidents may lead to serious injurie or death at work, divide the workplace, and prevent employees from getting their jobs done.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Who is responsible to ensure that all employees have access to a safe, respectful, and harassment free place to work?

A

The commander.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What AFI provides detailed guidance of office safety?

A

AFI 91–203, Air Force Consolidated Occupational Safety Instruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Who is responsible for developing and maintaining a training and certification system to ensure employee training on fire prevention and protection responsibilities?

A

The facility manager and supervisors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Fires in facilities are usually attributed to what factors?

A

Improper use, selection or placement of heaters, coffee makers, holiday decorations or improper storage or disposal of flammable and combustible materials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What three items are needed to complete the fire triangle?

A

(1) Fuel,
(2) Heat.
(3) Air (oxygen).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are the four ways to put out a fire?

A

(1) Cool the burning material (fuel).
(2) Eliminate oxygen from the reaction.
(3) Remove the fuel.
(4) Break the chemical reaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

List the classes of fires.

A

Class A, B, C, D, K.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What does the PASS acronym stand for?

A

Pull Aim Squeeze Sweep.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What determines the severity of electric shock?

A

Amount and duration of current flow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

When are you required to have a safety observer when installing or repairing C&I systems, communication cables and antenna systems that may expose you to energized equipment?

A

When the circuit voltage is above 600 volts or when low voltage circuits has a potential for high current flow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the primary hazard associated with ladders?

A

Falls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

When would you not use a metal framed ladder?

A

While working around energized electrical circuits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What AFI identifies activities where the wear of finger rings is prohibited?

A

AFI 91–203.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Define risk management.

A

RM is a decision-making process used to systematically evaluate possible courses of action, identify risks, benefits, and determine the best course of action for any given situation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

How many principles govern all actions associated with the management of risk?

A

Four.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is an unnecessary risk?

A

• Unnecessary risk comes without a commensurate return in terms of real benefits or available opportunities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What are the five steps in the risks management process?

A

(1) Identify the hazards.
(2) Assess the hazards.
(3) Develop controls and make decisions.
(4) Implement controls.
(5) Supervise and evaluate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is the fundamental objective of risk management?

A

The fundamental objective of risk management is to enhance mission effectiveness at all levels while preserving assets and safeguarding the health and welfare of personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is IT?

A

Any equipment, or interconnected system or subsystem of equipment, that is used in the automatic acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of data or information by the Executive Agency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is a NSS?

A

Any IS operated by the US government that involves intelligence activities, cryptologic activities related to national security, command and control of military forces, weapons systems, or is critical to the fulfillment of military or intelligence missions is a NSS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Is a payroll system a part of the NSS?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

The DODAF specification contains how many volumes?

A

Four.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Describe the vision of the DODAF

A

Provide architecture concepts to guide development of architectures throughout the DOD in support of decision processes for departmental programs, military components, and capability areas focus on architectural data as information required for making critical decisions and deemphasize individual or independent architecture models.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What architecture framework is designated as the framework for DOD architecture development?

A

The DODAF is the designated architecture framework for DOD architecture development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

List at least three ways that DODAF’s architecture framework supports change in organizations through building and using architectures.

A

(1) Enhance decision-making processes by leveraging knowledge in existing architectures and opportunities for reusing existing information assets.
(2) Respond to stakeholder, customer, and client needs for effective and efficient processes, systems, services, and resource allocation.
(3) Provide mechanisms to manage configuration of the current state of the enterprise and to maintain validity of the expected performance.
(4) Analyze designs for future states of the enterprise.
(5) Establish baseline architectures for solutions under development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Where does the mandate to develop architectures come from?

A

Law, federal level requirements, DOD policies, and instructions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What are enterprise architectures?

A

Enterprise architectures are formal blueprints for methodically and completely defining an organization’s current (baseline) or desired (target) operational process and enabling environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What was the name of the system that was employed before the CIPS?

A

CSIR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is the approved automated information system for planning, installing, and managing the AF cyberspace infrastructure?

A

CIPS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Documents generated in CIPS are historical documentation, how long will the records remain associated with the equipment?

A

Throughout the equipment’s life cycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What three parts make up the Communications and Information Systems Installation Record?

A

Administrative record, drawing record, and maintenance record.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What are legacy records that provide a history and audit trail for AF systems?

A

Administrative records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What records depict physical layout of communications and information systems and provide engineering data?

A

Drawing records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

In what year was the OSI model published and by whom?

A

1984 by the International Standards Organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What ability does the OSI model provide?

A

• The ability for both hardware and software to communicate with each other across any type of media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What two unique categories make up the seven layers of the OSI reference model?

A

(1) Application layers.

(2) Data transport layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Describe the application layers.

A

The Application layers of the OSI model deals with application issues and generally only implements in software. The highest layer, application, is closest to the end user. Both users and application-layer processes interact with software applications that contain a communications component. These layers deal with the user interface, formatting data, and access to applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What layer generally only implements in software?

A

Application layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Which layer of the OSI model is closest to the end user and interacts directly with the software application?

A

Application layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What are two key types of application-layer implementations?

A

(1) TCP/IP.

(2) OSI applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Which layer establishes virtual circuits?

A

Transport layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Which layer of the OSI model provides logical addressing as opposed to physical addressing?

A

Network layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Who subdivided the Data Link layer into two sublayers and what are the sublayers called?

A

The IEEE, LLC and MAC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Which specification allows for unique identification at the data link layer?

A

The MAC sublayer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What does the physical layer of the OSI model define?

A

The physical layer defines the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the physical link between communicating network systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Define a networks topology

A

A networks topology consists of the physical and logical arrangement of its stations in relation to one another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

What do we call a device that sits at the intersection of two or more transmission paths and switches traffic among those paths?

A

A node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Define topology

A

Topology is the branch of mathematics that examines the characteristics of geometric shapes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

If the topology cannot be seen or touched what type is it?

A

Logical topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

What considerations should you take when choosing a topology?

A

Type of equipment the network needs, capabilities of the equipment, growth of the network, and management of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Name the two most common physical topologies

A

Bus and star topologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

What is another name for a bus topology?

A

Linear bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What IEEE standard applies to bus networks?

A

802.3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

List the advantages of a ring topology.

A

(1) Data packets travel at greater speeds.
(2) No collisions.
(3) Easier to troubleshoot.
(4) No terminators needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Which topology has cable segments connected to a centralized component?

A

Star topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Which topology is the most common physical topology in Ethernet LANs?

A

Star topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

List the disadvantages of a star topology network.

A

Requires more media than a ring or bus, the failure of the centralized device will bring down the whole network, installation costs are higher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

What advantage does the extended star offer over the star topology?

A

The ability to cover greater distances for the central switch to the end nodes by adding repeaters or additional connectivity devices to the segments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Which topology imitates an extended star topology and inherits properties of a bus topology?

A

Tree topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

List and describe the three tree topology layers.

A

(1) Access layer-the lowermost and is where computers attach.
(2) Distribution layer (middle)-is the mediator between upper layer and lower layer.
(3) Core layer (top)-central point of the network root of the tree form which all nodes fork.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

What ensures effective, secure and efficient delivery of DOD IT communications?

A

Standards, policies and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

List at least two of the standards used throughout the DOD to govern IT

A

(1) MIL-STD.
(2) DISA Instructions.
(3) DISA Circulars and numerous commercial standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

What are the two classifications of transport protocols?

A

(1) Connection oriented.

(2) Connectionless oriented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

In connection-oriented systems, what must happen prior to transfer of any data?

A

The connection is established between the sender and recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

List four protocols that use TCP.

A

(1) FTP.
(2) HTTP.
(3) SMTP.
(4) DNS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

What layer defines end-to-end connectivity between host applications?

A

The transport layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

What method does TCP use to prevent network congestion by ensuring that transmitting devices do not overwhelm receiving devices with data?

A

Flow control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Describe error-control.

A

Determines whether transmitted data has become corrupt or otherwise damaged while traveling from the source to the destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

What does a sliding window regulate?

A

A sliding window regulates how much information passes over a TCP connection before the receiving host must send an acknowledgement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

How do connectionless-oriented protocols differ from connection-oriented protocols?

A

Connectionless-oriented protocols simply send out the data packets to the receiving system and do not require a receipt acknowledgment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

What is UDP best at?

A

Sending small amounts of data for which guaranteed delivery is not required and minor packet loss is acceptable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

List four protocols that utilize UDP

A

(1) TFTP.
(2) SNMP.
(3) DHCP.
(4) DNS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

What is the de facto standard protocol of the internet and is the protocol of choice on LANs and WANs?

A

TCP/IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Which IEEE standard defines Data Link layer protocols that operate within TCP/IP?

A

Project 802 standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

What are the four most important Network layer TCP/IP protocols?

A

(1) IP.
(2) ARP.
(3) RARP.
(4) ICMP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

How many fields make up a TCP segment?

A

13 fields.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Which field is a 32-bit number identifying the next data byte the sender expects from the receiver?

A

Acknowledgement number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Describe the checksum field.

A

A TCP sender computes a value based on the contents of the TCP header and data fields. This 16-bit value will be compared with the value the receiver generates using the same computation. If the values match, the receiver can be very confident that the segment arrived intact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

In which field is the actual data that is transmitting inserted in the TCP segment?

A

Data field.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

In the context of TCP/IP, what is a packet also known as?

A

A packet is also known as an IP datagram.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

What are the two main parts of an IPv4 address?

A

(1) Network number.

(2) Network host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Who assigns network numbers?

A

Authorized representatives of Internet Assigned Numbers Authority (IANA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

What is the reserved IPv4 address for loop back?

A

127 in the network field, and any number in the host field.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

What is the reserved IPv4 address for a limited broadcast?

A

255 in the network field and 255 in the host field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

What is a subnet mask?

A

A subnet mask is a mechanism that allows a network device to divide an IP address into a network and host number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

What are the two methods of subnet masking?

A

Classful and Classless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

What are some benefits to subnetting?

A

The benefits to subnetting are that subnets ease administration; improve network performance, and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

How long is an IPv6 address?

A

16 octets long or 128 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

How is an IPv6 address expressed?

A

IPv6 is expressed in 16-byte fields using a colon hexadecimal format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

What are the two ways to shorten the expression of an IPv6 address?

A

(1) Leading zero compression.

(2) Zero compression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

What is a unicast address?

A

Unicast addresses identify a single interface. A packet sent to a unicast address delivers to the interface identified by that address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

What is a multicast address?

A

Multicast addresses (FF00::/8) identify a group of interfaces belonging to different nodes. Multicast packets send to all interfaces identified by that address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

What is an anycast address?

A

Anycast addresses identify a set of interfaces but the packets deliver to and accept by the closest interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

What are the three types of unicast address?

A

(1) Link.

(2) Site, and global.

118
Q

What is the IPv6 loop back address?

A

0:0:0:0:0:0:0:1 or ::1 is the loopback address.

119
Q

What allows servers the capability to provide multiple services?

A

Ports

120
Q

What is the number range of registered ports?

A

1024-49151

121
Q

What is the default port assignment for HTTP?

A

Port 80.

122
Q

What is the default port used with credit card transactions on e-commerce sites?

A

Port 443-Secure Socket Layer.

123
Q

What does RAM mean?

A

The term “random access” refers to the method of addressing memory. With random access, the CPU can address any memory location directly and read the data contained at that memory location.

124
Q

What is the difference between ROM and RAM?

A

ROM is a type of memory that normally can only be read, as opposed to RAM, which can be both read and written. The data stored in ROM is always there, whether there is power or no power.

125
Q

Name the special type of memory used to store the BIOS settings in a PC.

A

CMOS memory.

126
Q

What speed enhancement is a small amount of memory placed inside the CPU or between the CPU and the main memory computer?

A

Cache.

127
Q

How much data can be stored on a DVD-ROM?

A

Up to 4.7 GB.

128
Q

What interface was the evolution of the parallel ATA physical storage interface from a parallel bus to a serial bus architecture?

A

SATA.

129
Q

What is the primary internal interconnecting for desktop and mobile PCs, connecting the host system to peripherals such as hard drives and SSD?

A

SATA.

130
Q

Describe the latest version of SCSI.

A

The latest version, 16-bit Ultra-640 (Fast-320) SCSI, was introduced in 2003 and has a 640 MBps transfer speed, connecting up to 16 devices with a 12-meter cable length.

131
Q

What is the key difference between SCSI and SAS devices?

A

SAS devices have two data ports, each of which resides in a different SAS domain. This enables complete failover redundancy as if one path fails; there is still communication along a separate and independent path.

132
Q

Which connection enables data transfer speeds of 480 Mbps and can handle up to 127 peripherals at once?

A

USB 2.0.

133
Q

Define a peripheral device.

A

A peripheral device is not a main component of a computer and can be either internal or external.

134
Q

What type of internal component most high-volume printers use to connect to a network?

A

Integrated NIC.

135
Q

What is the internet?

A

The Internet is a network of networks.

136
Q

What is the name for networks that use the same software and protocols as the public internet, but exist as a portion of an entities private network?

A

Intranets.

137
Q

What is a group of computers and devices that share a common communication line and resources in a small geographical area?

A

LAN.

138
Q

What type of network interconnects several local area networks by bridging them with backbone lines?

A

MAN.

139
Q

What is the name for a network connected between two cities?

A

WAN.

140
Q

Primary addressing in WLANs is achieved by using what type of address?

A

MAC.

141
Q

WLAN implements what algorithm to prevent data collisions?

A

CSMA/CA

142
Q

List the advantages to using WLAN.

A

(1) Mobility.
(2) Ease of installation.
(3) Lower cost.

143
Q

List each of the IEEE wireless standards.

A

(1) 802.11b.
(2) 802.11a.
(3) 802.11g.
(4) 802.11n.

144
Q

At what speed does the 802.11n standard operate?

A

2.4 GHz and 5 GHz.

145
Q

What network provides a private tunnel through the Internet?

A

VPN.

146
Q

Most VPN traffic in the Air Force is done in what type of configuration?

A

Gateway-to-gateway configuration.

147
Q

What data transport method grew out of the need for a worldwide standard to allow interoperability of information, regardless of the information type or “end-system”?

A

ATM.

148
Q

How many bytes make up the ATM cell, header and payload?

A

53 byte cell, a five byte header and a 48 byte payload.

149
Q

ISDN channels are separated into two sub-channels, list and describe the sub-channels.

A

Sub-channel B 56 Kbps or 64 Kbps and are used for both voice and data. Each B channel can carry a separate telephone call. The D-channel is a 16 Kbps use to carry call control (or supervisory) information. The information on the “D” channel tells the network switches what to do with the traffic on the “B” channels.

150
Q

What T-carrier service can a subscriber request when the full bandwidth of a T1 line is not needed?

A

Fractional T–1 (FT–1).

151
Q

What Ethernet standard has supplanted fast Ethernet in wired networks?

A

Gigabit Ethernet (GbE or 1 GigE)

152
Q

What are the primary entry points for DSCS satellites?

A

STEP terminals.

153
Q

STEP offers standardized support for whom?

A

Tactical forces.

154
Q

What is the disadvantage of tactical terminals?

A

They require much more of the satellite’s downlink power to receive the signal.

155
Q

DOD Teleport system implementation has how many phases?

A

Three

156
Q

Define modems

A

A modem is a device that modulates signals to encode digital information and demodulates signals to decode the transmitted information.

157
Q

What are the two types of modems used?

A

(1) Dial-up.

(2) Dedicated or leased.

158
Q

What is one of the principal functions of a CSU?

A

Provides a barrier for electrical interference from either side of the unit.

159
Q

What is the main function of a DSU?

A

A DSU’s main function is to adapt the digital data stream produced by the customer equipment to the signaling standards of the telephone carrier equipment, and vice versa.

160
Q

What layer of the OSI reference model do converters operate?

A

Layer 2, Data Link.

161
Q

What is the primary use for a bridge in networking?

A

The primary use for a bridge is to decrease network congestion, but it also propagates a signal like a repeater.

162
Q

What do LAN switches provide between network devices?

A

Switches provide collision-free, high-speed communication between network devices.

163
Q

Can a switch connect LANs of different bandwidths? If so, give example.

A

Yes, this is accomplished with buffering

164
Q

What type of switching is required when a moving a frame from a low-speed LAN to a high-speed LAN?

A

Store-and-forward switching is required whenever a frame must be moved from a low-speed connection to a high-speed connection.

165
Q

What is the fundamental difference between Layer 2 and Layer 3 switching?

A

The fundamental difference between Layer 2 and Layer 3 switch operation is the layer at which each forwarding decision is made.

166
Q

Which layer of the OSI model do routers operate?

A

Routers operate at layer three (network) of the OSI Model.

167
Q

What does a typical router contain?

A

Internal processor, an operating system, memory, input and output jacks for different types of network connectors (depending on the network type); and, usually, a management console interface.

168
Q

Routers compare metrics to determine optimal routes; these methods differ depending on what?

A

Design of the routing algorithm used.

169
Q

What are routing protocols that manage traffic within an autonomous system called?

A

IGP.

170
Q

Name two methods for directing data on the network.

A

Static or dynamic routing.

171
Q

What is static routing?

A

Static routing is a technique in which a network administrator programs a router to use specific paths between nodes.

172
Q

What is dynamic routing?

A

Dynamic routing automatically calculates the best path between two nodes and compiles this info in a routing table.

173
Q

What protocols govern how networks share information beyond the gateway and behind the gateway device a network?

A

Gateway protocols.

174
Q

What are the two common gateway protocols?

A

BGP and IGRP.

175
Q

What are the two methods that encryption can be applied?

A

Link-by-link basis or end-to-end basis.

176
Q

What is the most common telephone device used for voice encryption?

A

The STE is the most commonly used secure voice telephone.

177
Q

What are the most common types of metallic cable used in networks?

A

Twisted pair cable and coaxial cable.

178
Q

Which cable type is associated with the original designs of the Ethernet standard?

A

Coaxial cable.

179
Q

List and describe the four most common coax cable types.

A

(1) RG–6 75Ohms.
(2) RG–58 50Ohms.
(3) RG–8 50Ohms.
(4) RG–11 50Ohms.

180
Q

What medium is the primary carrier for voice telecommunications?

A

Twisted pair cable.

181
Q

List and describe the categories of twisted pair cable.

A

(a) CAT 1–1 Mbps, voice only analog phone lines (not used for data communications).
(b) CAT 3–10 Mbps, Ethernet (10BaseT).
(c) CAT 5–100 Mbps, Ethernet (100BaseT).
(d) CAT 5e–1 Gbps (1000 Mbps), Ethernet (1000BaseT).
(e) CAT 6 and 6a–10 Gbps& 10 Gigabit Ethernet (10GbE).

182
Q

An optical communications system requires three things to transport communications, list them.

A

An optical communications system requires a light source (transmitter), a transmission medium (cable), and a sensor (receiver).

183
Q

List the advantages of fiber optic systems over conventional cable systems.

A

Larger bandwidths, freedom from interference, low cost, and lightweight.

184
Q

(True/False) Fiber optic cable is immune to EMI.

A

True.

185
Q

What is the most common wireless networking standard?

A

802.11.

186
Q

At the simplest level, state the two things that an operating system does.

A

(1) Manages hardware and software resources of the computer system.
(2) Provides a stable, consistent way for applications to deal with the hardware without having to know all of the details of the software.

187
Q

What are the six task categories of the operating system?

A

(1) Processor management.
(2) Memory management.
(3) Device management.
(4) Storage management.
(5) Application interface.
(6) User interface.

188
Q

Name the Microsoft Windows family of operating systems.

A

(a) Windows 98. (f) Windows 7.
(b) Windows NT. (g) Windows 8.
(c) Windows 2000 Series. (h) Windows 8.1.
(d) Windows XP. (i) Windows 10.
(e) Windows Vista.

189
Q

What is a domain?

A

A domain is a collection of computers defined by the administrator of a Windows Server network that share a common directory/database.

190
Q

What year did the Bell Labs develop the UNIX operating system?

A

Early 1970s.

191
Q

What is the program called that you interact with directly from your terminal or workstation?

A

The program that you will interact with directly from your terminal or workstation is called the “shell”.

192
Q

Name four common shells in UNIX.

A

(1) Bourne Shell.
(2) Korn Shell.
(3) C Shell.
(4) Restricted shell.

193
Q

Define partitions.

A

Partitions are physical areas of disk allocated with specific sizes to hold file systems.

194
Q

When are partitions established?

A

Partitions are established during system configuration.

195
Q

In which directory are application programs contained?

A

Application programs are contained in the usr directory.

196
Q

What is the firmware prompt called on Sun machines?

A

On the Sun machines the firmware prompt is “ok” (often called the O.K. prompt)

197
Q

What type of programs are applications?

A

End-user programs.

198
Q

Which application allows the creation of queries, forms, reports and macros?

A

Microsoft Access.

199
Q

What program is free to download from Adobe’s website that allows you to PDF files?

A

Adobe Acrobat Reader.

200
Q

What is the COMSEC program designed to do?

A

The COMSEC program is designed to detect and correct procedural weaknesses that could expose critical information.

201
Q

COMSEC is part of what overall program?

A

OPSEC.

202
Q

What poses the greatest threat to an organization’ mission critical information?

A

Hostile information operations/information cyber-warfare activities pose the greatest threats to an organization’s mission critical information via its communications and information systems.

203
Q

What Air Force program meets public law, national, and DOD requirements to secure or protect classified and sensitive information processed using Air Force information systems?

A

AF COMSEC.

204
Q

What is the objective of COMPUSEC?

A

The objective of COMPUSEC is to ensure the employment of countermeasures to protect and maintain the confidentiality, integrity, availability, and nonrepudiation of AF IS resources and information processed throughout the system’s life cycle.

205
Q

Define vulnerability in relation to an IS.

A

It is a problem, or weakness, in a computer system that allows an intruder or hacker to exploit the system’s information security.

206
Q

List the forms of threats in regards to COMPUSEC.

A

(1) Natural.
(2) Environmental.
(3) Human.
(4) Viruses.

207
Q

Which type of COMPUSEC threat is a severe storm?

A

Natural.

208
Q

What type of COMPUSEC threat is increased by poor housekeeping practices?

A

Environmental.

209
Q

Can human threats be intentional or unintentional?

A

Yes.

210
Q

What is one of the newest COMPUSEC threats?

A

One of the newest COMPUSEC threats comes from hand held portable electronic devices and wireless technologies.

211
Q

Weaknesses or deficiencies in maintaining the environmental stability, control, and safety of a data processing area is an example of what type of vulnerability?

A

Environmental vulnerability.

212
Q

Which COMPUSEC vulnerability defines deficiencies in the development of rosters, responsibilities, and identification?

A

Procedural vulnerability.

213
Q

How many additional security requirements for safeguarding classified information are there?

A

8

214
Q

What is required when using nonvolatile or non-removable storage media?

A

a) Install the information system in an area approved for open storage of information at or above the highest classification level of processed information.
(b) Use an approved product or technique to prevent storing classified information on nonvolatile, non-removable storage media.

215
Q

Define COMPUSEC incident.

A

An incident is defined as an assessed occurrence that actually or potentially jeopardizes the confidentiality, integrity, or availability of an IS; or when the information on the system processes, stores, or transmits; or that constitutes a violation or imminent threat of violation of security polices, security, procedures, or acceptable use policies.

216
Q

What is one of the most common COMPUSEC threats?

A

Malicious software.

217
Q

Is malicious software capable of destroying disk directories and file allocation tables?

A

Yes

218
Q

What is spyware?

A

Spyware is computer software designed to collect personal information about users without their informed consent.

219
Q

What can you do in conjunction with installing a good antivirus program to protect against malicious software?

A

(a) Take precautions when any removable media (CD-ROMs or flash drives). Viruses can spread through infected disks; do not share disks unless it is absolutely necessary. Virus-check any disks before accessing files on the disk.
(b) Do not share software. Only use original software on the computer being used. Do not share software with anyone else or put copies of someone else’s software on another machine.
(c) Always back up files. If a computer is infected with a virus that wipes out the hard drive, the data can still recover up to the last backup.
(d) Schedule time to scan your system’s hard drive. Scan removable media for viruses before each use. Hard drive media scans can be automated if antivirus software is configured properly

220
Q

What is a classified message incident?

A

A classified message incident occurs when higher classification level of data is transferred to a lower classification level system/device via messaging systems.

221
Q

How do denial of service attacks differ from other types of exploits?

A

DOS attacks do not try to gain access to the system but designed to render the system unusable.

222
Q

What is the only way to prevent access to your data if you fall victim to a direct-access attack?

A

The only way to prevent this is to encrypt the storage media and store the key separate from the system.

223
Q

What is your responsibility when you realize an incident has occurred?

A

You must report the incident that is your number one responsibility.

224
Q

What three core disciplines encompass information protection?

A

(1) Personnel.
(2) Industrial.
(3) Information security.

225
Q

What are the three types of classification?

A

(1) Original.
(2) Tentative.
(3) Derivative.

226
Q

What does correctly marked classified material conspicuously and immediately alert holders to?

A

The presence of classified information.

227
Q

Who has the specific responsibility to properly mark a new classified document?

A

The proper marking of a classified document is the specific responsibility of the original or derivative classifier (i.e., the author or originator of the information).

228
Q

What actions must you take if you are the holder of an improperly marked classified document?

A

Contact the document originator to obtain correct markings and shall apply those marking as required.

229
Q

What actions should be accomplished if a document has components likely to be removed and used or maintained separately?

A

Mark each component as a separate document.

230
Q

What markings are required on a classified document?

A

Banner lines, portion marks, component, office and date of origin, and classification authority block.

231
Q

What information can be gained from the banner line?

A

The banner line specifies the highest level of classification (Confidential, Secret, or Top Secret) of information contained within the document and the most restrictive control markings applicable to the overall document (hereafter referred to as “overall classification”).

232
Q

Where does the classification authority block appear on a classified document?

A

On the face of each classified document.

233
Q

If required, where are downgrading instructions placed on classified documents?

A

On the face of each document to which they apply.

234
Q

When would it be appropriate to store money and/or weapons in the same container as classified information?

A

Never under any circumstances.

235
Q

At what level is the classified information in a container that must be checked every two hours if no other supplementary control is in place?

A

Top Secret

236
Q

What supplemental controls are required for Confidential information?

A

None, supplemental controls are not required for Confidential information.

237
Q

What process takes place to determine which supplemental controls will be the most effective?

A

A risk assessment

238
Q

At a minimum, what should be considered when conducting a risk assessment?

A

Consider local threats, both known and anticipated, and vulnerabilities; the existing security environment and controls; the ease of access to containers or other areas where classified data is stored; the criticality, sensitivity, and value of the information stored; and cost verses benefits of potential countermeasures.

239
Q

What form is used to maintain a record for containers, vaults or secure room doors, used for storing classified information?

A

SF 700.

240
Q

Which part of the SF 700, when completed, is classified at the highest level of classification authorized for storage in the container?

A

Part 2.

241
Q

What must be done to a container that is taken out of service or is no longer used to store classified?

A

The combination must be rest to the standard combination of 50-25-50.

242
Q

List the routine methods used to destroy classified material.

A

(a) Burning.
(b) Crosscut shredding.
(c) Wet pulping.
(d) Mutilation.
(e) Chemical decomposition or pulverizing.

243
Q

List the methods used to sanitize or destroy classified IT equipment and media.

A

(a) Overwriting.
(b) Degaussing.
(c) Sanding.
(d) Physical destruction.

244
Q

What happens to classified materials that cannot be destroyed?

A

Reevaluation of the material, when appropriate, downgraded, declassified, or retired to a designated record center.

245
Q

What service is used when physically transporting Top Secret material?

A

DOD component courier service.

246
Q

What service is used when the Top Secret material is traveling through or within countries hostile to the US?

A

Department of State Diplomatic Courier Service.

247
Q

Can classified COMSEC materials be shipped overnight?

A

No.

248
Q

Why should you not ship secret information on Friday?

A

To prevent the package from remaining in the possession of the carrier service over a weekend.

249
Q

Prior to using electronic media and when technically feasible what should you do?

A

Clear or format the media.

250
Q

Why is it important to clear media?

A

This precaution removes malicious software and other types of software that may exist on previously used media or media obtained from vendors.

251
Q

Whose missions and functions are supported by the DODIN?

A

• Department of Defense, National Security, and related Intelligence community missions and functions (strategic, operational, tactical, and business), in war and in peace.

252
Q

Name the two elements that make up the DODIN’s access services.

A

(1) DISN Interface.

(2) DOD Gateway.

253
Q

What is the primary interface between the sustaining base and deployed forces?

A

DOD Gateway.

254
Q

What DODIN service includes the Defense Red Switched Network?

A

Voice Service.

255
Q

What does the aerial layer provide?

A

The aerial layer provides additional communications capacity by using manned and unmanned systems to host communications packages for continuous communications coverage of large geographic areas.

256
Q

What service provides a framework for protocols used by the DOD to support diverse telecommunication requirements for its organizations?

A

The DISN.

257
Q

What are the DISN’s seven subgroups?

A

(1) Content delivery.
(2) Data.
(3) Messaging.
(4) Satellite.
(5) Transport.
(6) Voice.
(7) Virtual private network.

258
Q

What are the three data services that DISN offers?

A

(1) SBU IP Data.
(2) Secret IP Data.
(3) TS/SCI Data.

259
Q

What establishes a virtual point-to-point connection using dedicated connections, virtual tunneling protocols or traffic encryptions?

A

A VPN.

260
Q

What are the two different Base Information Transport Infrastructure systems?

A

(1) BITI-Wired.

(2) BITI-Wireless.

261
Q

What are three DOD application examples that rely on SBU IP Data to communicate?

A

(1) E-mail.
(2) Web service.
(3) File transfer

262
Q

What data rates are the SBU IP services capable of?

A

56kbps to 2.4Gbps.

263
Q

What is the DOD’s largest interoperable C2 data network?

A

SIPRNET/Secret IP Data network.

264
Q

What are the current data rates of Secret IP Data networks?

A

56 Kbps to 1 Gbps.

265
Q

What provides a transmission path capable of secure video/data within the defense intelligence community?

A

JWICS.

266
Q

What type of information can be exchanged by point to point or multipoint technologies?

A

Voice, data, graphics, video teleconferencing.

267
Q

Why is the NSA network considered highly secure?

A

Because it is almost completely separated from the public Internet.

268
Q

Define the Defense Switched Network.

A

DSN is a worldwide hierarchal network of telecommunication switches to which end instruments are connected.

269
Q

What is the primary function of the Defense Switched Network?

A

To provide non-secure dial-up voice service.

270
Q

How does DRSN provide secure communications to the various DOD, civilian and allied communities?

A

Through the use of cryptographically secured backbone trunks and access interfaces.

271
Q

What systems use the DRSN as their primary network for secure conferencing?

A

World Wide Secure Voice Conferencing System (WWSVCS), Defense Satellite Communications System (DSCS), and the Military Strategic and Tactical Relay Satellite (MILSTAR).

272
Q

Which system provides operation commanders with an integrated, near real-time picture of the battle?

A

Global Command and Control System.

273
Q

What are the four systems that make up the GCCS-AF program.

A

(1) JOPES.
(2) GSORTS.
(3) DCAPES.
(4) COP.

274
Q

Which system is a classified system designed to provide update to JOPES?

A

DCAPES.

275
Q

What system was replaced by GCSS?

A

Defense Information Infrastructure Common Operating Environment

276
Q

Which system provides the AF portal?

A

GCSS-AF.

277
Q

What is the AF’s primary ISR CPAD system?

A

DCGS.

278
Q

How does DCGS support multiple, simultaneous worldwide operations?

A

From in garrison and through scalable, modular system deployments.

279
Q

What is the purpose of the Battle Control System-Fixed?

A

To track and intercept hostile aircraft.

280
Q

How many sectors is the CONUS divided into?

A

Two

281
Q

Where is the CONUS geographically divided?

A

The Mississippi River

282
Q

What is the mission of the Global Broadcast Service?

A

The GBS mission is to provide warfighters with a one-way, high data rate, and high volume of intelligence info to forces garrisoned, deployed, or on the move.

283
Q

What size is the GBS antenna?

A

18 inches in diameter.

284
Q

What is the maximum data rate for the GBS?

A

1.5 Mbps.

285
Q

What is the responsibility of the NMCC?

A

The generation of Emergency Action Messages (EAMs) to notify launch control centers, nuclear submarines, reconnaissance aircraft and battlefield commanders around the world.

286
Q

What component of the GIG supports the President, SECDEF, and JCS in the exercise of their responsibilities?

A

The National Military Command System.

287
Q

What are the command nodes for the NMCS?

A

NMCC, National Airborne Operation Center, USSTRATCOM Command Center, USSTRATCOM and USNORTHCOM mobile consolidated command centers, and other command centers designated by the SECDEF.

288
Q

What is SACCS designed to support?

A

The Air Force’s strategic aircraft and missile functions.

289
Q

How does the SACCS system achieve the requirement for survivability?

A

By using nuclear hardened equipment, redundant circuits, and alternate communications paths.

290
Q

What is the mission of the HF-GCS?

A

To provide reliable, rapid, two-way communications between air-, land-, and sea-based users.

291
Q

Which of the 15 Global HF System stations does not remotely control from the CNCS? Why?

A

The South Atlantic station. Because it only provides dedicated ALE support for AMC aircraft.

292
Q

What is the purpose of the DCS HF entry?

A

To provide non-secure voice and secure/non-secure data connectivity to commanders and tactical units operating in areas of the world where DCS connectivity is unavailable or insufficient.