Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
115 Cards in this Set
- Front
- Back
This component of the Global Information Grid (GIG) consists of those items that are necessary to directly connect the warfighter to the global network...
|
Warrior Component
|
|
This characteristic of the GIG ensures seamless transmission of information between different service branches...
|
Common Policy and Standards
|
|
Who bears the responsibility for maintenance of the sustaining base portion of the Defense Information System Network?
|
The service that owns the installation
|
|
Which segment of the Defense Information System Network (DISN) may be a person in the deployed Area of Responsibility or a person sitting in a fixed location thousands of miles from combat?
|
Deployed Warfighter
|
|
What is the difference between a hub router and a premise router? |
Interconnected via the Defense Information Systems Agency Asynchronous Transfer Mode network
|
|
How are non-internet protocols sent across the Secret Internet Protocol Router Network? |
Encapsulated by the internet protocol before being transmitted across the SIPRNET
|
|
Which is an internet protocol encryption device that can be directly connected to Red local area networks?
|
KG-84
|
|
What provides conduit for Joint Worldwide Intelligence Communication System data transmission from one location to another?
|
DISN Backbone
|
|
What concerns slowed the military's adoption of wireless network technology? |
Security and reliability
|
|
What is the first step in merging voice, data, and video networks into one integrated network within the Air Force?
|
Integrating traditional TDM switches with voice over IP systems
|
|
Besides limiting connections to the GIG, what other Combat Information Transport Systems initiative will help increase network security? |
Eliminating the MAJCOM NOSC concept and integrating the functions into two integrated NOSC's
|
|
Which organization is responsible for the design, acquisition, and single systems management of the Defense Switched Network? |
Defense Information Systems Agency (DISA)
|
|
How is responsiveness provided in the Defense Switched Network? |
The DSN offers precedence access thresh holding
|
|
What type of Defense Switched Network precedence call cannot be preempted?
|
Flash Override
|
|
What is the maximum asynchronous data rate for the Defense Red Switch Network(DRSN)?
|
19.2 Kbps
|
|
While you are using the Red Switch, what feature lets you know that you have dialed the correct number at the proper level of security? |
Liquid Crystal Display
|
|
What is the purpose of the standardized tactical entry point terminal? |
to provide a foxhole to National Command Authority link for commanders
|
|
The Global Positioning System program is responsible for maintaining GPS time to within how many seconds of universal time code? |
1 microsecond
|
|
Which security program is covered under AFI 10-701? |
OPSEC
|
|
Which of the following security programs is defined as a process of identifying critical information and subsequently analyzing friendly actions attendant to military operations and other activities? |
OPSEC
|
|
Providing a list of where and why the information will be disclosed outside the DOD best describes which mandatory item of a Privacy Act Statement? |
Routine Use
|
|
What form is used as a cover sheet to protect Privacy Act material?
|
AF Form 3227
|
|
Guidance for posting information on Air Force websites is outlined in..
|
AFI 33-129
|
|
Official guidance on individual security clearances and permitting access to classified information can be found in.. |
AFI 31-501
|
|
Disclosure of information that would result in the loss, misuse, modification or unauthorized access that might adversely affect national security would be best described as... |
sensitive but unclassified
|
|
What is the COMSEC program designed to do?
|
Detect and correct procedural weaknesses that could expose critical information
|
|
What reference would you use for guidance on Air Force messaging? |
AFI 33-119
|
|
Which form is used with a transfer report to accompany a COMSEC package?
|
SF 153
|
|
Which form is used as a visitor register log to record visitors into restricted areas? |
AF Form 1109
|
|
An uninvestigated or unevaluated occurrence that potentially jeopardizes the security of COMSEC material or the secure transmission of government information is best described as a COMSEC..
|
incident
|
|
Which organization assigns communication security incident report case numbers?
|
Air Force Communications Agency
|
|
Final reports of a communication security incident are due..
|
30 days after the initial report
|
|
The Air Force Information Assurance Program is detailed in..
|
AFI 33-200
|
|
Which applied discipline applies measures and controls to protect data in computer systems against unauthorized, disclosure, modification or destruction?
|
COMPUSEC
|
|
What best describes an unintended signal or noise appearing external to a piece of communications equipment? |
Emanation
|
|
An unclassified term referring to technical investigations for compromising emanations from electrically operated data processing equipment is known as. |
Telecommunications Electronic Material Protected from Emanating Spurious Transmissions
|
|
Which condition exists when there is no apparent terrorist activity against computer networks?
|
INFOCON 5
|
|
Which condition requires the mandate of increased monitoring of all network system activities when an increased risk of attack is present?
|
INFOCON 4
|
|
When a risk of network system attack has been identified, which condition requires all unclassified dial-up connections be disconnected?
|
INFOCON 3
|
|
Which condition permits non-essential networks to be taken offline and substituted with alternate methods of communication? |
INFOCON 2
|
|
At which NETOPS level is responsibility for the worldwide management and operational oversight of the defense information infrastructure globally managed?
|
Tier 1
|
|
At what level do regional operation centers perform Network Operations (NETOPS) to ensure operational and administrative control by implementing Systems and Network Management Information Assurance/Network Defense, and Information Dissemination Management?
|
Tier 2
|
|
An accreditation decision which allows a system to operate in an environment for which it was originally intended is known as.. |
A full accreditation
|
|
Which resources designated priority is provided when the level of security requires a significant degree of deterrence against hostile acts?
|
B
|
|
Which resources designated priority is provided when the level of security requires a reasonable degree of deterrence against hostile acts?
|
C
|
|
Which form would you use to properly label removable storage media containing "confidential" information? |
SF 708
|
|
What are the 7 components of the GIG?
|
Warrior component, Global Application, Computing, Communications, Foundation, Information Management
|
|
What organization has the mission of directing and operating the GIG?
|
USSTRATCOM
|
|
Which characteristic of the GIG ensures that users across the DOD can seamlessly connect to the systems and services offered by the GIG?
|
Joint Infrastructure
|
|
What 3 networks make up the data component of DISN? |
Non-secure internet protocol router network, Secret Internet Protocol Router Network, Joint Worldwide Intelligence Communications System.
|
|
Why does the DOD need to have its own voice communications networks? |
Because of the nature of the military's mission requirements and security concerns
|
|
What is the purpose of the long-haul transport infrastructure segment of the DISN? |
It is the pipeline through which all DISN information will travel
|
|
What is the purpose of NIPRNET?
|
The NIPRNET is the way a local base LAN connects to other base LAN's to support medical, finance, supply, personnel, and other unclassified base data communication requirements
|
|
How is it possible for NIPRNET to carry non-internet protocol services?
|
Subscriber systems can use the NIPRNET to carry non-IP services if they have been encapsulated or converted to IP before being presented to a NIPRNET router
|
|
Who manages SIPRNET Hub routers and premise routers? |
DISA
|
|
How does SIPRNET function like unclassified IP networks? |
It can use Ethernet, router, FDDI, ATM data link protocols
|
|
What network is JWICS the top Secret equivalent? |
is the Top Secret equivalent to SIPRNET
|
|
What system is the primary means of operator interface for JWICS? |
Joint Deployable Intelligence Support System (JDISS)
|
|
How does CITS manage the lifecycle of the Air Forces communications and information systems? |
By providing standardized infrastructure and network protection tools for all voice, video and data services that traverse base networks
|
|
What are the 4 segments of the CITS transport component? |
Information Transport System, C4ISR Infrastructure planning system, Voice Switching System, 2nd Generation Wireless LAN
|
|
What are the 2 categories of DSN users? |
Command and Control, Operational Support
|
|
Which user category is assigned flash or flash-override precedence? |
Command and Control users
|
|
What are the 5 key objectives of DSN? |
Survivability, responsiveness, security, cost effectiveness, interoperability
|
|
What device makes end-to-end encryption available to DSN users? |
Secure Terminal Equipment (STE)
|
|
What are the major subsystems of DSN? |
Switching, transmission, timing and synchronization, administration operations, and maintenance/network management
|
|
What is the system high level of security for operation of the Red Switch? |
Secret to Top Secret SCI
|
|
Which standard data rates will the Red Switch offer direct switching? |
64 Kbps synchronous and 19.2 Kbps for asynchronous
|
|
How many station lines can the multiline phone accommodate? |
48
|
|
Briefly describe the purpose of standardized tactical entry points. |
To allow tactical DSCS terminals to access the Defense Communication System.
|
|
Why are tactical terminals considered at a disadvantage? |
Tactical terminals are generally considered "disadvantaged" because they require much more of the satellites downlink power to receive the signals.
|
|
Why was Teleport developed? |
to expand multi-media RF access to multiple military and commercial communications systems
|
|
What are the 2 primary missions of the Global Positioning System? |
Navigation and Nuclear Detection
|
|
How is OPSEC defined?
|
a process of identifying critical information and analyzing friendly actions attendant to military operations and other activities
|
|
Which security programs does OPSEC encompass?
|
All AF security programs
|
|
Who established the INFOSEC program? |
The president
|
|
What is the definition and goal of the INFOSEC program? |
The goal of the INFOSEC Program is to efficiently and effectively protect Air Force information by delegating authority to the lowest levels possible; encouraging and advocating use of risk management principles; focusing on identifying and protecting only that information that requires protection; integrating security procedures into our business processes so that they become transparent; and, ensuring everyone understands their security roles and responsibilities. |
|
What does the Privacy Act of 1974 protect? |
Protects individuals from unwarranted invasion of their personal privacy
|
|
What AFI contains information on the Privacy Act? |
AFI 33-332
|
|
Name the 4 parts of the Privacy Act Statement. |
Authority, Purpose, Routine uses, Disclosure
|
|
What are the categories of classified information? |
Top Secret, Secret, Confidential
|
|
What document covers FOUO and FOIA? |
DOD 5400.7-R
|
|
What is the definition of COMSEC? |
the measures and controls taken to deny unauthorized persons information derived from information systems of the US Government related to national security and to make sure the authenticity of such information systems. |
|
What is critical information? |
information about friendly activities, intentions, capabilities, or limitations that an adversary seeks in order to gain a military, political, diplomatic, economic, or technological advantage |
|
What is AFCOMSEC Form 16 used for? |
AFCOMSEC Form 16, Account Daily Shift Inventory is used to account for COMSEC material using both Defense Courier Service and the Air Force Electronic Key Management System. |
|
What is a COMSEC deviation? |
an occurrence involving a failure to follow established COMSEC instructions, procedures, or standards. |
|
What is a COMSEC insecurity?
|
an investigated or evaluated incident that has been determined as jeopardizing the security of COMSEC material or the secure transmission of government information. |
|
Name the 3 COMSEC incidents
|
Physical, Personnel, and Cryptographic incidents. |
|
What document is used to label unsecured phones? |
DD Form 2056 |
|
Define COMPUSEC |
the applied discipline that results from measures and controls that protect data in a computer against unauthorized (accidental or intentional) disclosure, modification, or destruction. |
|
What are 3 sources that threaten information systems? |
natural, environmental, human, and viruses |
|
Define the COMPUSEC and IA vulnerabilities. |
Physical, Environmental, Personnel, Hardware, Software, Media, Network Communications, Procedural
|
|
How can you protect an unattended computer system?
|
You can protect a system by removing your Common Access Card (CAC) from reader when unattended |
|
What type of network is used to process unclassified information? |
Non-secure Internet Protocol Router Network (NIPRNET). |
|
What type of network is ues to process classified information?
|
Secret Internet Protocol Router Network (SIPRNET). |
|
What is spyware? |
computer software that is designed to collect personal information about users without their informed consent. |
|
Define EMSEC |
the protection resulting from all measures taken to deny unauthorized personnel information of value that might be derived from communications systems and cryptographic equipment intercepts and the interception and analysis of compromising emanations from cryptographicequipment, information systems, and telecommunications systems. |
|
What are compromising emanations?
|
Unintentional signal that, if intercepted and analyzed, would disclose the information transferred, received, handled, or otherwise processed by any information-processing equipment. |
|
What does an EMSEC assessment determine? |
A desktop analysis to determine the fact an EMSEC countermeasures review is required or not. There are separate EMSEC assessments for information systems, communications systems, and cryptographic equipment. |
|
What does the user identify before apply8ing EMSEC countermeasures? |
The user identifies the information systems that will process classified information; the volume, relative sensitivity, and perishability of the information; the physical control measures in effect around the area that will process classified information; and applies identified IA and EMSEC countermeasures. |
|
What do INFOCON's help us with? |
help units take the proper protective measures to protect against threats |
|
What disciplines does IA integrate? |
Information awareness is an integrated communications awareness program covering COMSEC, COMPUSEC, and emissions security (EMSEC) disciplines. |
|
What equipment does the AF-GIG encompass? |
includes any Air Force-provisioned system, equipment, software, or service residing on the NIPRNET, SIPRNET, or Constellation Net. |
|
What is the GIG?
|
an all-encompassing communications project of the DOD. It is defined as the globally interconnected, end-to-end set of information capabilities, associated processes, and personnel for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policymakers, and support personnel. |
|
What are the 3 NETOPS levels?
|
Global, Regional, and Local |
|
What is the responsibility of GNOSC? |
Global NOSC is responsible for the worldwide management and operational oversight of the Defense Information Infrastructure. |
|
Where do FACs exist and what are their purposes? |
Functional Awareness Cells are regional level entities that exist at the same NETOPS management tier as the Base NCC. They report to and take direction from the Base and supporting NOSC. FACs require smaller amounts of equipment and performs situational awareness for a functional system or mission. |
|
What does an accreditation and certification constitute?
|
Accreditation and Certification constitutes a set of procedures and judgments which lead to a determination of the suitability of an AIS to operate in a targeted operational environment. |
|
Who makes accreditation decisions? |
An accreditation decision is made by the DAA |
|
Define physical security |
Physical security results from using all physical measures necessary to safeguard COMSEC material from access of unauthorized personnel. These measures include the application of control procedures and physical barriers. |
|
List the markings required for classified material |
The overall classification of the document; the agency/office of origin and date of the document; the office or source document that classified the information. |
|
What items cannot be placed in security containers used to store classified material? why? |
Funds, weapons, medical items, controlled drugs, precious metals, money or other non-mission related items susceptible to theft are not, as a rule, stored in any security container that’s used to store classified material. Storing these items together could result in the compromise of classified material. |
|
What is the purpose of SF 700? |
is to records the container’s location, the names, home addresses, and home telephone numbers of people who know the combination. It is also used to list contact personnel when the security of the material in the container is compromised. |
|
On what days are secret packages typically shipped? |
on Monday through Thursday only. |
|
When should hand carrying classified material during a TDY assignment be allowed?
|
as a last resort in critical situations |
|
What provides guidance on how to properly dispose of classified information? |
WebRims Records Disposition Schedule |