Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
78 Cards in this Set
- Front
- Back
Which document would you reference to see your specific AFSC responsibilities? |
Career Field Progress and Information |
|
What two groups make up the cyberspace support family? |
Cyberspace operations and cyberspace systems |
|
Within the cyberspace support families, what career field is responsible for maintenance and operation of cyberspace systems? |
Cyberspace Systems |
|
What is the core AFSC document used to document training for enlisted personnel? |
CFETP- Career Field Education and Training Plan |
|
Duty position tasks describe |
All tasks that correspond to the duty position as directed |
|
What part of the CFETP includes general information about how to use it? |
Part 1 |
|
How many skill levels are there? |
5 skill levels. 1,3,5,7,9 |
|
What AFI outlines the AF's training program? |
AFI 36-2201, Air Force Training Program |
|
With whom does the Air Force career field manager directly communicate to disseminate policies and program requirements? |
AFCM- Air Force Career Field Manager |
|
Whose duty is it to assist in gathering input and data to complete enlisted grade allocation for career progression group reviews? |
MFM- Major Command Functional Manager |
|
What type of workshop brings MFMs and SMEs together to determine the most effective and efficient way to ensure training standards and skill- level requirements of a career field are accurate? |
Utilization and Training workshop- U&TW |
|
What is the primary purpose of a STRT? (Specialty Training Requirements Team) |
For the AFCFM and functional leaders to determine and present training requirements to the AETC Training Pipeline Manager (TPM) and Training Manager (TM) |
|
What program provides training for personnel to attain knowledge and skill qualifications required to perform duty in their specialty? |
The AF on the Job Training - OJT |
|
What are the three components of the AF OJT program |
Job knowledge, Job Proficiency, Job Experience |
|
What the three essential elements in a QA program? |
Quality Systems, Quality Assessments and Trend Analysis. |
|
How is trend analysis used? |
Quality assessments. Provides assurances, through some type of evaluation, that the Quality system functions are effective. |
|
What program reports compliance with requirements listed in self-assessment checklists to the chain of command and appropriate staffs? |
The self- assessment program reports compliance with requirements listed in self assessment |
|
Who, in conjunction with the commander appointed self-assessment program manager, will oversee the unit's self-inspection/ assessment program? |
QA- Quality Assurance |
|
What are automated information systems? |
AIS are combinations of computer hardware and computer software, data, and/or telecommunications equipment that performs functions such as collecting, processing, storing, transmitting, and displaying information |
|
What is the standard Air Force system for maintenance information? |
The IMDS- Integrated Maintenance Data System |
|
What automated information system managers the entire life cycle of IT assets from procurement through retirement? |
Remedy- Managers the entire life cycle of IT assets from procurement through retirement |
|
What is the basis for drafting and enforcing all federal laws governing the U.S? |
The U.S Constitution |
|
Which title of the U.S code spells out the general provisions and punitive articles of the UCMJ? |
Title 10 |
|
Who has inspection responsibility over the National Guard? |
The secretaries of the US Army and Air Force |
|
What is cyberspace? |
A global domain within the information environment consisting of the interdependent network of information technology infrastructures |
|
What type of cyberspace maneuverability occurs with the use of security protocols used by host systems? |
Logical Maneuverability |
|
What are cyberspace Operations? |
Employment of cyberspace capabilities where the primary purpose is to achieve military objectives or effect or in through cyberspace. |
|
What are three major considerations to understand while supporting cyber operations? |
Policy, Authority and the law |
|
What document provides AF leaders a particular principle in the execution of cyber operations? |
AFDD 3-12 Cyberspace Operations |
|
The National Strategy to Secure Cyberspace is driven by three priorities, what are those priorities? |
National Strategy to Secure Cyberspace is driven by 3 priorities, Prevent Cyber attacks, Reduce National Vulnerability, Minimize damage and recover time from cyber attacks |
|
Gaining and maintaining the initiative to operate within adversary decision cycles outlines what strategy? |
National Military strategy for Cyberspace operations outlines the strategy of gaining and maininting |
|
Before the employment of cyberspace capabilities, what considerations must be made? |
Legal and international legal obligations. |
|
What could prevent Air National Guard personnel from executing a cyber operation? |
Title 32 |
|
In addition to the implied legal parameters, what else must individuals be clearly aware of when conducting cyber operations? |
Ethical Aspects |
|
Define Prohibited use |
Prohibited Use where use adversely reflects on DOD; where use interferes with the employee or office productivity; or where use is to conduct outside commercial activity |
|
What career field relies on many services provided by the Cyberspace Support Community? |
1B4X1 |
|
What weapons system provides continuous monitoring and defense of AF unclassified and classified networks? |
Air Force Cyberspace Defense (ACD) |
|
Describe the four sub-discipline areas of the ACD |
Incident Prevention, Incident Detection, Incident Response, Computer Forensics |
|
What resulted from an operational initiative to consolidate numerous MAJCOM- specific stovepiped networks into a centrally managed and controlled network under three I-NOSCs? |
The CSC Air Force Cyber Security and Control System Weapon System |
|
What AF weapons system offers top-level boundary and entry point into the AFIN? |
The Air Force Intranet Control (AFINC) |
|
What are the four sub-discipline areas of the AFINC? |
Defense in depth,Network standardization,Proactive, Situational Awareness |
|
What weapon system is the single system providing overarching 24/7/365 awareness, management and control of the AF portion of the cyberspace domain? |
C3MS- Cyber Command and Control Mission System Weaspon System |
|
Describe CORA |
Assess Data compromised through intrusions of AF network, with the objective of determining the associated impact to operations resulting from data loss |
|
What is the mission of the CVA/ Hunter? |
The Hunter mission focuses on the capability to find, fix, track, target, engage and assess the advanced persistent threat (APT) |
|
How does end-to-end performance monitoring support mission assurance? |
It supports missions assurance by including the end user experience and the warfighters' ability to access critical information |
|
Who has the responsibility for determining what network elements should be monitored? |
24th AF has the ultimate responsibility for determining the network elements to be monitored |
|
What two things did the DOD Consent to Monitoring policy do? |
The policy established departmental guidance on the use of DODIN systems and standardized the wording for to be included in user agreements. |
|
What Air Force command is appointed as the primary for cyberspace missions? |
The 24th Air Force |
|
How do offensive operations support US cyberspace objectives? |
OCO suport by denying, degrading, disrupting, destroying, or altering the adversary's ability to use cyberspace |
|
Besides technical vulnerabilities, how do we attempt to exploit user-friendly networks? |
We attempt to exploit user-friendly networks by gaining footholds through their routine sues of cyberspace |
|
What are IRCs? |
Information Related Capabilities- Tools, techniques or activities employed withing the physical, informational or cognitive of IT. |
|
How does EW contribute to information operations? |
Ew contributes to information operations by using offensive and defensive tactics and techniques to shape, disrupt and exploit |
|
What is the intent of MISO? |
To affect the behavior of foreign governments, organizations, groups, or individuals so that changes in foreign behavior or attitude favor an originator's objectives |
|
What is the goal of MILDEC?
|
To deceive |
|
What does OPSEC deny adversaries? |
Denies adversaries critical information and observable indicators. |
|
Audience engagements are meant to mold perceptions and shape relations with whom? |
The intent is to mold perceptions and shape relations with key military and civilian organizations |
|
What type of ISR support does IO require for integration? |
A more concerted, tailored ISR support for IO integration. |
|
Define CI |
Information gathered and activities to identify, deceive, exploit, disrupt or protect against espionage |
|
How do we influence the adversary's decision-making while protecting our operations? |
Integrating the capabilities of influence operations, electronic warfare ops and network warfare operations in concert |
|
What reaches across geopolitical boundaries and is tightly integrated into the operation of critical infrastructures and teh conduct of commerce, governance, and national security? |
Cyberspace reaches across geopolitical boundaries and is tightly integrated into the operation of critical infrastructure and the conduct of commerce, governance, and national security |
|
What three things ensure our freedom of action and deny the same to our adversaries in relation to cyber operations? |
Network defense, exploitation and attack |
|
What are the DODs three main roles regarding cyber operations? |
Defense of the nation, national incident response and critical infrastructure protection |
|
What items ensure critical infrastructure is protected? |
Analysis, warning, information sharing, vulnerability identification,, reduction, mitigation and aiding of national recover efforts |
|
Information superiority is a result of what abilities? |
The abilities to collect, process and disseminate and uninterrupted flow of information while exploiting or denying an adversary's ability to do the same |
|
How would you define SCADA? |
Implemented as a distributed database, referred to as a tag database |
|
What is the purpose of IO? |
The purpose of IO is to affect adversary decision making with the intent to modify behavior |
|
How many flights typically make up Air Force communications Squadrons? |
two flights and an optional third |
|
Which communications squadron flight provides technical and systems support for wing communications and computer systems including ground radio, voice networks, and secure communications maintenance? |
The operations flight provides technical and systems support for wing commms |
|
Who authorizes the use of a special mission flights withing a communications squadron? |
Air Staff's Manpower Division (AF/A1M) must approve special missions flight |
|
What is the primary mission of the AOC? |
The primary mission of the AOC is to provide the Joint Forces with the tools necessary to fight and win a major theater war within the scope and coordination of all land, sea, and air forces. |
|
How are cybersspace forces in an AOC tasked to execute cyber missions? |
Through a cyber- tasking order (CTO) |
|
What squadron is a communications support squadron that directly supports the AOC? |
Air Communications Squadron (ACOMS) is a comms support squadron that directly supports the AOC |
|
What type of unit provides flyaway communications packages to expeditionary air bases? |
Combat Communications Squadron |
|
Whyat active duty combat communications groups are in the CONUS? |
The 5th Combat Communications Group (5CCG) located at Robins, AFB, Georgia |
|
How are expeditionary communication units established to operate in a deployed environment? |
Expeditionary units are established to operate with an Air Expeditionary Task Force (AETF) |
|
Who is the major force provider for the 386th AEW? |
The 86th Airlift Wing (Ramstein Air Base) |
|
Which EIS unit, currently part of the Air Combat Command, is an indispensable part of the USAF- war- fighting community? |
The 85th IES is an indespensable part of the USAF war-fighting community |
|
What unit installs, reconstitutes and tests critical C4 systems for COCOMs, anywhere and anytime? |
The 85th |