1509 Flashcards
(115 cards)
Which 3D career field deploys, sustains, troubleshoots, and repairs wireless, line-of-sight, beyond line-of-sight, wideband and ground-based satellite and encryption transmission devices?
Radio Frequency Transmission Systems (3D1X3)
What is not a communications security program duty and responsibility for Cyber Transport Systems? A. Transmission security B. Technical security C. Emission security D. Physical security
Technical Security
What is defined as an integrated bundle of expert knowledge and organization skills inherent to a particular career field?
Core Competency
Which of the following is a core competency of Cyber Transport Systems? A. Fixed cable systems B. Voice Network systems C. Application software systems D. Client-server database systems
Voice network systems
Which AF form is used to report hazardous conditions that place Air Force personnel or property at risk?
AF Form 457
What is not one of the four major types of hazards? A. Biological B. Chemical C. Physical D. Nuclear
Nuclear
What hazard is caused by heavy workloads, lack of control over the pace of work, shift work, noise, working by yourself, and conflict with coworkers and employers?
Stress
To prevent manual handling hazards, utilize team lifting when lifting items that weigh more that how many pounds?
25
When working on electrical circuits, the role of safety observer is normally performed by the…
Supervisor
When working on electrical circuits, you may only wear metal framed eyeglasses if…
They are secured with a nonmetallic cord
To whom does the risk management (RM) process apply
All personnel
What simple, systematic process allows commanders to maximize combat capability, while limiting risk?
Risk Management
Which is a principle of Risk Management? A. Accept unnecessary risk B. Apply RM process continuously C. Train and adhere to safety guidelines D. Make risk decisions at the lowest level
Apply the RM process continuously
How many steps are in the risk management process?
5
An enclave that does not have a firewall and IDS is classified as having what category of vulnerability?
Category I
How many Integrated Network and Operation Security Centers (INOSCs) does the Air Force have?
Two
The Integrated Network and Operation Security Center (INOSC) has several responsibilities except…
A. Maintain sole administrative privileges on the firewall
B. Standardize, configure, backup, and otherwise maintain the firewall
C. Maintain a single naming/configuration standard for boundary devices
D. Install patches or perform any upgrades provided by the Air Force Enterprise Network (AFEN)
Standardize, configure, back up, and otherwise maintain the firewall
What term is used to describe the technology for transmitting voice communications over a data network using open-standard-based internet protocol?
IP Telephony
What security feature should you not implement to help defend IP telephony systems from attackers?
A. enabling ACLs on firewalls, routers, and switches
B. deploying protection from DHCP spoofing
C. consolidating your voice with your data using VLANs
D. enabling port security access to only allow the required devices needed by the client
consolidating your voice with your data using VLANs
At which OSI layer does a packet filter gateway operate at?
3 (Network)
At which OSI layer does a circuit layer gateway operate?
4 (Transport)
At which OSI layer does an application-level firewall operate?
7 (Application)
The disadvantage of a host-based intrusion detection system (HIDS) is that it…
A. can analyze any encrypted data if it is decrypted before reaching the target host
B. consumes resources on the host it resides on and slows that device down
C. monitors log files for inadvisable settings or passwords
D. monitors traffic on the host on which it is installed
Consumes resources on the host it resides on and slows that device down.
One advantage of a network-based intrusion detection system (NIDS) is that it... A. can decrypt data B. uses very few network resources C. Monitors logs for policy violations D. Can analyze encrypted network traffic
uses very few network resources