VOLUME 1, SET 2 - COMPREHENSION Flashcards
What is the name of the Air Forces’ safety program?
Mishap Prevention Program (MPP).
What AFI implements the installation safety offices’ Mishap Prevention Program?
AFI 91–202, The US Air Force Mishap Prevention Program.
What agency dictates what must be accomplished in the workplace, but not necessarily, how it will be accomplished?
OSHA
Who is responsible for the safety of their facilities and personnel, including the correction of all hazards and deficiencies in their work places?
The commander.
What should you do when there is conflicting safety guidance?
Apply the guidance that offers the most protection.
Match the characteristics of each situation to its corresponding title.
____ (1) Follow all OSHA safety and health standards.
____ (2) Working conditions that do not pose a risk.
____ (3) Receive training about chemicals and hazards.
____ (4) Review records of work-related injuries.
____ (5) Keep records of work-related injuries.
____ (6) Not retaliate against any worker.
____ (7) File a complaint.
a. Employers must.
b. Employees have the right to.
(1) a. (4) b. (7) b.
(2) b. (5) a.
(3) b. (6) a.
What AF series publications make up AFOSH standards?
AF 91–series publications.
What office/individual is responsible for managing proactive on- and off-duty safety programs?
Installation Safety Office.
What office/individual manages the occupational and environmental health surveillance program according to AF guidance?
BE.
What office/individual is responsible for implementing a safety and health program in their unit or area of responsibility?
Commander.
Who is required to complete the AF Risk Management Fundamentals course?
USR.
What office/individual is responsible for developing JSTOs?
The supervisor.
How many US workers were killed on the job in 2014?
More than 4,600.
What are the three sub-categories of human factors?
(1) Physiological.
(2) Physical.
(3) Organizational.
What are some physiological factors that can contribute to an unsafe attitude?
Unhealthy emotions, job or domestic pressures, distractions, job knowledge, shift work, hurrying or feeling rushed.
What are some examples of physical factors?
Fatigue, strength limits, lack of sleep, ergonomic design constraints, drugs/alcohol.
Who is responsible to mitigate human factors?
Everyone.
What should be done before considering the use of PPE?
Hazards should be engineered out if possible, substituting a less hazardous material or process, isolation of operations, workaround procedures, rearranging or moving elevated or tall objects or furniture, or providing administrative controls whenever possible.
When shall PPE be used?
Whenever there are hazards that can do bodily harm through absorption, inhalation or physical contact.
Within the office space what is the most common hazard?
Falls.
List the most common causes of office falls.
(1) Tripping over an open desk or file drawer, cords, loose carpet, or objects in walkways.
(2) Bending or reaching for something while seated in an unstable chair.
(3) Using a chair in place of a ladder.
(4) Slipping on wet floors.
(5) Inadequate lighting.
Define horseplay.
Horseplay is rough or boisterous play or pranks that occur in the workplace.
What could be the consequences of a workplace horseplay incident?
Workplace horseplay incidents may lead to serious injurie or death at work, divide the workplace, and prevent employees from getting their jobs done.
Who is responsible to ensure that all employees have access to a safe, respectful, and harassment free place to work?
The commander.
What AFI provides detailed guidance of office safety?
AFI 91–203, Air Force Consolidated Occupational Safety Instruction.
Who is responsible for developing and maintaining a training and certification system to ensure employee training on fire prevention and protection responsibilities?
The facility manager and supervisors.
Fires in facilities are usually attributed to what factors?
Improper use, selection or placement of heaters, coffee makers, holiday decorations or improper storage or disposal of flammable and combustible materials.
What three items are needed to complete the fire triangle?
(1) Fuel,
(2) Heat.
(3) Air (oxygen).
What are the four ways to put out a fire?
(1) Cool the burning material (fuel).
(2) Eliminate oxygen from the reaction.
(3) Remove the fuel.
(4) Break the chemical reaction.
List the classes of fires.
Class A, B, C, D, K.
What does the PASS acronym stand for?
Pull Aim Squeeze Sweep.
What determines the severity of electric shock?
Amount and duration of current flow.
When are you required to have a safety observer when installing or repairing C&I systems, communication cables and antenna systems that may expose you to energized equipment?
When the circuit voltage is above 600 volts or when low voltage circuits has a potential for high current flow
What is the primary hazard associated with ladders?
Falls.
When would you not use a metal framed ladder?
While working around energized electrical circuits.
What AFI identifies activities where the wear of finger rings is prohibited?
AFI 91–203.
Define risk management.
RM is a decision-making process used to systematically evaluate possible courses of action, identify risks, benefits, and determine the best course of action for any given situation.
How many principles govern all actions associated with the management of risk?
Four.
What is an unnecessary risk?
• Unnecessary risk comes without a commensurate return in terms of real benefits or available opportunities.
What are the five steps in the risks management process?
(1) Identify the hazards.
(2) Assess the hazards.
(3) Develop controls and make decisions.
(4) Implement controls.
(5) Supervise and evaluate.
What is the fundamental objective of risk management?
The fundamental objective of risk management is to enhance mission effectiveness at all levels while preserving assets and safeguarding the health and welfare of personnel.
What is IT?
Any equipment, or interconnected system or subsystem of equipment, that is used in the automatic acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of data or information by the Executive Agency.
What is a NSS?
Any IS operated by the US government that involves intelligence activities, cryptologic activities related to national security, command and control of military forces, weapons systems, or is critical to the fulfillment of military or intelligence missions is a NSS.
Is a payroll system a part of the NSS?
No
The DODAF specification contains how many volumes?
Four.
Describe the vision of the DODAF
Provide architecture concepts to guide development of architectures throughout the DOD in support of decision processes for departmental programs, military components, and capability areas focus on architectural data as information required for making critical decisions and deemphasize individual or independent architecture models.
What architecture framework is designated as the framework for DOD architecture development?
The DODAF is the designated architecture framework for DOD architecture development.
List at least three ways that DODAF’s architecture framework supports change in organizations through building and using architectures.
(1) Enhance decision-making processes by leveraging knowledge in existing architectures and opportunities for reusing existing information assets.
(2) Respond to stakeholder, customer, and client needs for effective and efficient processes, systems, services, and resource allocation.
(3) Provide mechanisms to manage configuration of the current state of the enterprise and to maintain validity of the expected performance.
(4) Analyze designs for future states of the enterprise.
(5) Establish baseline architectures for solutions under development.
Where does the mandate to develop architectures come from?
Law, federal level requirements, DOD policies, and instructions.
What are enterprise architectures?
Enterprise architectures are formal blueprints for methodically and completely defining an organization’s current (baseline) or desired (target) operational process and enabling environment
What was the name of the system that was employed before the CIPS?
CSIR.
What is the approved automated information system for planning, installing, and managing the AF cyberspace infrastructure?
CIPS.
Documents generated in CIPS are historical documentation, how long will the records remain associated with the equipment?
Throughout the equipment’s life cycle.
What three parts make up the Communications and Information Systems Installation Record?
Administrative record, drawing record, and maintenance record.
What are legacy records that provide a history and audit trail for AF systems?
Administrative records.
What records depict physical layout of communications and information systems and provide engineering data?
Drawing records.
In what year was the OSI model published and by whom?
1984 by the International Standards Organization
What ability does the OSI model provide?
• The ability for both hardware and software to communicate with each other across any type of media.
What two unique categories make up the seven layers of the OSI reference model?
(1) Application layers.
(2) Data transport layers.
Describe the application layers.
The Application layers of the OSI model deals with application issues and generally only implements in software. The highest layer, application, is closest to the end user. Both users and application-layer processes interact with software applications that contain a communications component. These layers deal with the user interface, formatting data, and access to applications.
What layer generally only implements in software?
Application layers.
Which layer of the OSI model is closest to the end user and interacts directly with the software application?
Application layer.
What are two key types of application-layer implementations?
(1) TCP/IP.
(2) OSI applications.
Which layer establishes virtual circuits?
Transport layer.
Which layer of the OSI model provides logical addressing as opposed to physical addressing?
Network layer.
Who subdivided the Data Link layer into two sublayers and what are the sublayers called?
The IEEE, LLC and MAC.
Which specification allows for unique identification at the data link layer?
The MAC sublayer.
What does the physical layer of the OSI model define?
The physical layer defines the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the physical link between communicating network systems.
Define a networks topology
A networks topology consists of the physical and logical arrangement of its stations in relation to one another.
What do we call a device that sits at the intersection of two or more transmission paths and switches traffic among those paths?
A node
Define topology
Topology is the branch of mathematics that examines the characteristics of geometric shapes.
If the topology cannot be seen or touched what type is it?
Logical topology
What considerations should you take when choosing a topology?
Type of equipment the network needs, capabilities of the equipment, growth of the network, and management of the network.
Name the two most common physical topologies
Bus and star topologies.
What is another name for a bus topology?
Linear bus
What IEEE standard applies to bus networks?
802.3.
List the advantages of a ring topology.
(1) Data packets travel at greater speeds.
(2) No collisions.
(3) Easier to troubleshoot.
(4) No terminators needed.
Which topology has cable segments connected to a centralized component?
Star topology
Which topology is the most common physical topology in Ethernet LANs?
Star topology
List the disadvantages of a star topology network.
Requires more media than a ring or bus, the failure of the centralized device will bring down the whole network, installation costs are higher.
What advantage does the extended star offer over the star topology?
The ability to cover greater distances for the central switch to the end nodes by adding repeaters or additional connectivity devices to the segments.
Which topology imitates an extended star topology and inherits properties of a bus topology?
Tree topology
List and describe the three tree topology layers.
(1) Access layer-the lowermost and is where computers attach.
(2) Distribution layer (middle)-is the mediator between upper layer and lower layer.
(3) Core layer (top)-central point of the network root of the tree form which all nodes fork.
What ensures effective, secure and efficient delivery of DOD IT communications?
Standards, policies and procedures.
List at least two of the standards used throughout the DOD to govern IT
(1) MIL-STD.
(2) DISA Instructions.
(3) DISA Circulars and numerous commercial standards.
What are the two classifications of transport protocols?
(1) Connection oriented.
(2) Connectionless oriented.
In connection-oriented systems, what must happen prior to transfer of any data?
The connection is established between the sender and recipient.
List four protocols that use TCP.
(1) FTP.
(2) HTTP.
(3) SMTP.
(4) DNS.
What layer defines end-to-end connectivity between host applications?
The transport layer.
What method does TCP use to prevent network congestion by ensuring that transmitting devices do not overwhelm receiving devices with data?
Flow control
Describe error-control.
Determines whether transmitted data has become corrupt or otherwise damaged while traveling from the source to the destination.
What does a sliding window regulate?
A sliding window regulates how much information passes over a TCP connection before the receiving host must send an acknowledgement.
How do connectionless-oriented protocols differ from connection-oriented protocols?
Connectionless-oriented protocols simply send out the data packets to the receiving system and do not require a receipt acknowledgment.
What is UDP best at?
Sending small amounts of data for which guaranteed delivery is not required and minor packet loss is acceptable.
List four protocols that utilize UDP
(1) TFTP.
(2) SNMP.
(3) DHCP.
(4) DNS.
What is the de facto standard protocol of the internet and is the protocol of choice on LANs and WANs?
TCP/IP.
Which IEEE standard defines Data Link layer protocols that operate within TCP/IP?
Project 802 standards.
What are the four most important Network layer TCP/IP protocols?
(1) IP.
(2) ARP.
(3) RARP.
(4) ICMP.
How many fields make up a TCP segment?
13 fields.
Which field is a 32-bit number identifying the next data byte the sender expects from the receiver?
Acknowledgement number.
Describe the checksum field.
A TCP sender computes a value based on the contents of the TCP header and data fields. This 16-bit value will be compared with the value the receiver generates using the same computation. If the values match, the receiver can be very confident that the segment arrived intact.
In which field is the actual data that is transmitting inserted in the TCP segment?
Data field.
In the context of TCP/IP, what is a packet also known as?
A packet is also known as an IP datagram.
What are the two main parts of an IPv4 address?
(1) Network number.
(2) Network host.
Who assigns network numbers?
Authorized representatives of Internet Assigned Numbers Authority (IANA).
What is the reserved IPv4 address for loop back?
127 in the network field, and any number in the host field.
What is the reserved IPv4 address for a limited broadcast?
255 in the network field and 255 in the host field
What is a subnet mask?
A subnet mask is a mechanism that allows a network device to divide an IP address into a network and host number
What are the two methods of subnet masking?
Classful and Classless.
What are some benefits to subnetting?
The benefits to subnetting are that subnets ease administration; improve network performance, and security.
How long is an IPv6 address?
16 octets long or 128 bits.
How is an IPv6 address expressed?
IPv6 is expressed in 16-byte fields using a colon hexadecimal format.
What are the two ways to shorten the expression of an IPv6 address?
(1) Leading zero compression.
(2) Zero compression
What is a unicast address?
Unicast addresses identify a single interface. A packet sent to a unicast address delivers to the interface identified by that address.
What is a multicast address?
Multicast addresses (FF00::/8) identify a group of interfaces belonging to different nodes. Multicast packets send to all interfaces identified by that address.
What is an anycast address?
Anycast addresses identify a set of interfaces but the packets deliver to and accept by the closest interface.