Term
Which of the following security programs is defined as a process of identifying critical information and subsequently analyzing friendly actions attendant to military operations and other activities? |
|
Definition
|
|
Term
When was the first Air Force OPSEC program introduced? |
|
Definition
|
|
Term
In what year was the present OPSEC program we use today established? |
|
Definition
|
|
Term
In which of the following OPSEC steps would you inform the AFOSI of potential adversaries and their associated capabilities, limitations and intentions to collect, analyze, and use critical information? |
|
Definition
|
|
Term
In which of the following OPSEC steps would program managers and coordinators recommend actions to senior decision-makers and commanders? |
|
Definition
|
|
Term
Which of the following OPSEC steps would dynamic situations require you to reaccomplish preventative actions? |
|
Definition
|
|
Term
Specific facts about friendly activities, intentions, capabilities or limitations vitally needed by adversaries for them to plan and act effectively to guarantee failure or unacceptable consequences for friendly mission accomplisment best describe |
|
Definition
|
|
Term
In which OPSEC indicator would abrupt changes or cancellations of schedules fall under? |
|
Definition
|
|
Term
Special briefings, meetings, or religious services would fall under which OPSEC indicator? |
|
Definition
|
|
Term
Deviating from normal procedures would fall under which OPSEC indicator? |
|
Definition
(d) Logistic and maintenance support |
|
|
Term
Data aggregation is defined as the |
|
Definition
(c) collection of loosely associated data and/or information |
|
|
Term
What are among the most problemic OPSEC vulnerabilities in the Air Force today? |
|
Definition
(b) Telephones and cell phones |
|
|
Term
The reason information is collected best describes which mandatory item of a Privacy Act Statement? |
|
Definition
|
|
Term
What form is used as a cover sheet to protect Privacy Act material? |
|
Definition
|
|
Term
Guidance for posting information on AF web sites is outlined in |
|
Definition
|
|
Term
Official guidance on individual security clearances and permitting access to classified information can be found in |
|
Definition
|
|
Term
Disclosure of information that would result in the loss, misuse, unauthorized access, or modifications that might adversely affect national security would best be described as |
|
Definition
(d) sensitive but unclassified |
|
|
Term
Which document provides guidance on the Information Security Program Management? |
|
Definition
|
|
Term
What specific restrictions can a designated approving authority (DAA) impose on classified systems or networks? |
|
Definition
(c) Prohibit the use of goverment owned removable storage media |
|
|
Term
Before obtaining access to classified material, which document must be signed as a prerequisite? |
|
Definition
|
|
Term
What form is annotated at the end-of-day security check to ensure classified material is stored appropriately? |
|
Definition
|
|
Term
What is the COMSEC program designed to do? |
|
Definition
(d) Detect and correct procedural weaknesses that could expose critical information |
|
|
Term
What reference would you use for guidance on Air Force messaging? |
|
Definition
|
|
Term
Where would you find guidance on how to properly store, control, safeguard, transfer, and destroy COMSEC material? |
|
Definition
|
|
Term
Which form is used with a transfer report to accompany a COMSEC package? |
|
Definition
|
|
Term
Which form is used as a visitor registor log to record visitors into a restricted areas? |
|
Definition
|
|
Term
An investigated or evaluated incident that has been determined as jeopardizing the security of COMSEC material is best described as a COMSEC |
|
Definition
|
|
Term
An uninvestigated or unevaluated occurrence that potentially jeopardizes the security of COMSEC material or the secure transmission of goverment information is best described as a COMSEC |
|
Definition
|
|
Term
What are the three types of COMSEC incidents? |
|
Definition
(b) Physical, personnel, and cryptographic |
|
|
Term
Which organization assignes COMSEC incident report case numbers? |
|
Definition
(a) Air Force Communications Agency |
|
|
Term
Final reports of a COMSEC incident are due |
|
Definition
(c) 30 days after the initial report is issued |
|
|
Term
The Air Force Information Assuance (IA) Awareness Program is detailed in |
|
Definition
|
|
Term
Which security program applies discipline measures and controls to protect data computer system data against unauthoized, disclosure, modification, or destruction? |
|
Definition
|
|
Term
What computer software is designed to collect personal information such as passwords and financial details without the users consent? |
|
Definition
|
|
Term
What best describes and unintended signal or noise appearing external to a piece of communications equipment? |
|
Definition
|
|
Term
An unclassified term referring to technical investigations for compromising emanations from an electrically operated data processing equipment is known as |
|
Definition
|
|
Term
Which condition exists when there is no apparent terrorist activity against computer networks? |
|
Definition
|
|
Term
Which condition requires the mandate of increased monitoring of all network system activities when an increased risk of attack is present? |
|
Definition
|
|
Term
When a risk of a network system attack has been identified, which condition requires all unclassified dial-up connections be disconnected? |
|
Definition
|
|
Term
Which condition permits non-essential networks to be taken offline and substituted with alternate methods of communication? |
|
Definition
|
|
Term
Which of the following provides the guidance necessary to manage the increasingly complex network environment and customers high quality service? |
|
Definition
(b) AFI 33-115, Volume 2 (Vol. 1 in the text) |
|
|
Term
At which NETOPS level is responsibility for the worldwide management and operational oversight of the defense information infrastructure globally managed? |
|
Definition
|
|
Term
At which NETOPS level are networks managed at the local level? |
|
Definition
|
|
Term
An accreditation decision which allows a system to operate in an environment for which it was originally intended is known as |
|
Definition
|
|
Term
An accreditation descision which permits an information system to operate until specific identified steps can be completed is known as |
|
Definition
(d) an interim accreditation |
|
|
Term
Which resources designated priority is provided when the level of security requires the greatest possible deterrence against hostile acts? |
|
Definition
|
|
Term
Which resources designated priority is provided when the level of security requires a significant degree of deterrence against hostile acts? |
|
Definition
|
|
Term
Which resources designated priority is provided when the level of security requires a reasonable degree of deterrence against hostile acts? |
|
Definition
|
|
Term
Which form would you use to properly label removable storage media containing "top secret" information? |
|
Definition
|
|
Term
Which form would you use to properly label removable storage media containing "secret" information? |
|
Definition
|
|
Term
Which form would you use to properly label removable storage media containing "unclassified" information? |
|
Definition
|
|
Term
Personnel conducting end-of-day security checks will make sure classified material is stored appropriately at the close of each working day and record them on |
|
Definition
|
|
Term
The top secret control officer (TSCO) uses which form for the purpose of a "top secret cover sheet and access" disclosure of record? |
|
Definition
|
|
Term
How does the Air Force organize, train, equip, and sustain, the best air and space force |
|
Definition
(a) by using the AEF concept |
|
|
Term
Which of the following is defined as the legal authoriity exercised over subordinates by virtue of rank or assignment? |
|
Definition
|
|
Term
Which best describes the definition of a unit type code (UTC)? |
|
Definition
(d) It is the basic building block used in joint force planning and deployments of AEFs |
|
|
Term
Deployment execution and unit personnel preparation are responsibilities most often delegated to the |
|
Definition
|
|
Term
Which of the following do commanders use to report the ability of a standard UTC to perform its mission capability (MISCAP) statement worldwide and to identify its capability through the next AEF bucket? |
|
Definition
|
|
Term
Which of the following is the Air Force computer system used for UTC package management? |
|
Definition
|
|
Term
Which of the following is a DOD directed integrated joint command and control (C2) system used for conventional and theater-level nuclear operation planning and execution? |
|
Definition
|
|
Term
Which database is used for the purpose of coordinating the movement of joint forces into their operational locations? |
|
Definition
|
|
Term
Which of the following is used to collect and store the data of material requirements and logistics details for UTCs? |
|
Definition
|
|
Term
Which characteristics should proposed theater deployable communications (TDC) equipment strive to have? |
|
Definition
(d) Open system standards, interoperability, and suvivability |
|
|
Term
TDC is composed of which three major components? |
|
Definition
(b) Ground satellite terminals, ICAP, NCC-D |
|
|
Term
Which is a suite of modules and accessory kits that serve as the backbone for deployed communication networks? |
|
Definition
|
|
Term
Which AOC area support team provides staff support to the Chief of AOC systems? |
|
Definition
(c) Communications focal point |
|
|
Term
Which area support team makes sure servers, workstations, peripherals, communications devices, and software programs are on-line and available to network users? |
|
Definition
(d) Command and control systems |
|
|
Term
What DOD agencies refine tactics, techniques, procedures, and measuring concepts for inusion into current and next generation operations systems? |
|
Definition
(a) Future combat systems |
|
|
Term
Which of the following has the primary function of coodinating and directing immediate requests of tactical close air support to land forces? |
|
Definition
(d) Air support operations squadrons |
|
|
Term
Who has the mission to provide fast reaction to immediate requests from land forces for close air support? |
|
Definition
(c) Air support operations center |
|
|
Term
Which airborne platform collects real-time positioning and tracking data on the location of friendly and enemy aircraft and naval vessels in the AOR? |
|
Definition
|
|
Term
Which is the primary system used for analyzing dynamic intelligence, surveillance, and reconnaissance data of rapid post-mission? |
|
Definition
(d) Ground data processing stations |
|
|
Term
Which is a development program focused on providing exploitable surveillance and reconnaissance digital imagery to the war fighter in near real-time? |
|
Definition
(c) High altitude endurance |
|
|
Term
Name two forces relating to spectrum concepts. |
|
Definition
(d) Gravitational and electromagnetic |
|
|
Term
Radio waves travel through free space at the speed of light and can be |
|
Definition
(d) reflected, refracted, or diffracted |
|
|
Term
Waves that travel through the air in a straight line (line-of-sight) from one transmitting antenna to a receiving antenna are known as |
|
Definition
|
|
Term
Which wave transmission is very effective for long-distance communications in the high-frequency range (3-30 MHz) |
|
Definition
|
|
Term
Which are used as the main propogation modes of transmissions for direct and ground reflected waves? |
|
Definition
|
|
Term
Which are used as the primary transmission of direct radio waves? |
|
Definition
|
|
Term
One of the disadvantages of line-of-sight primary mode of radio tranmission is that relay stations are required |
|
Definition
(c) when distance exceeds 30 to 40 miles |
|
|
Term
Which frequency range is used for UHF band designation? |
|
Definition
|
|
Term
Which frequency range is used for SHF band designation? |
|
Definition
|
|
Term
Which frequency range is used for EHF band designation? |
|
Definition
|
|