3A Flashcards

1
Q

DAFMAN90-161 defines a publication as…?

A

“an officially produced, published, and distributed
document issued for compliance, implementation, and or information.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are two types of documents or issuances that establish and implement DoD policy?

A

Department of Defense instructions (DoDIs) and manuals (DoDMs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are issuances?

A

Issuances prescribe the manner or a specific plan or action for carrying out the policy, operating a program or activity, and assigning responsibilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does a publication provide?

A

Publications provide a wide variety of technical and nontechnical information. Some publications are directive in nature and tell how a task is to be accomplished. Other publications provide guidance and processes. All publications convey information pertaining to a subject.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Who do DODI’s and DODM’s apply to?

A

DODIs and DODMs apply to all military whether active duty, guard and reserve military, DoD civil service employees, and contractors as specified in their Statement of Work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

According to DoDI 50251.01, DODI’s…?

A

“establishes policy and . . . may provide general procedures
for implementing policy.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do DODI’s do?

A

They prescribe the manner or a specific plan or action for carrying out
the policy, operating a program or activity, and assigning responsibilities within a functional area assigned in an OSD Component head’s charter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Where can DODI’s be found?

A

DoDIs are found in the Executive Services Division website

https://www.esd.whs.mil/Directives/issuances/dodi/

where they are downloadable in .pdf format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

If you download a DODI, ensure when you reference it that you are?

A

Ensure the version you are using is current. You will not be notified of any changes made to DODI’s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

According to DoDI 50251, DODM’s…?

A

“implements policy established in a DoDD or DoDI by providing detailed procedures for carrying out that policy”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do DODM’s do?

A

DoDMs are authorized by a directive or instruction and identify uniform procedures for managing or operating systems and provide administrative information. DoDMs consist of procedures that usually contains examples for performing specific tasks, may be separated into volumes, and may contain a policy section.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Where can DODM’s be found?

A

DoDMs are found in the Executive Services Division website

https://www.esd.whs.mil/Directives/issuances/dodi/

and are downloadable in .pdf format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are AFIs?

A

AFIs are orders of the Secretary of the Air Force and are certified and approved at the Headquarters Air Force (Secretariat or Air Staff) level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What do AFIs do?

A

AFIs generally instruct readers on “what to do,” i.e., direct action, ensure compliance to standard actions Air Force-wide.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

AFIs are like DoDIs but…?

A

they are written for members of the United States Air Force and intended for use by active duty, guard, and reserve members and associated civilians. Contractors abide by AFIs identified in their Statement of Work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AFIs are grouped into what?

A

Into series. For example, Cyber is series 17. This means that all cyber related AFIs start with a 17 such as AFI17-203 Cyber Incident Handling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Is compliance with AFIs mandatory?

A

Yes and failure to comply with an AFI can result in action taken under the Uniform Code of Military Justice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Where can AFIs be found?

A

Most AFIs are electronic and can be downloaded from the Air Force Portal or the E-Pubs website at

https://www.e-publishing.af.mil.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Some AFIs cannot be accessed through E-Pubs due to…?

A

due to security concerns. These are identified during the access process
prompting you to order them through the Warehouse Management System (WMS).

20
Q

How do you acquire a WMS account?

A

You obtain a WMS account at the WMS website provided by E-Pubs.

21
Q

What does AFI stand for?

A

Air Force Instructions

22
Q

AFIs are also sometimes called?

A

DAFIs - Department of the Air Force Instruction

23
Q

What does TIA stand for?

A

The Telecommunications Industry Association

24
Q

Who is TIA accredited by?

A

the American National Standards Institute (ANSI)

25
Q

What does TIA do?

A

develop voluntary, consensus-based industry standards for a wide
variety of Information and Communication Technologies (ICT) products.

26
Q

How often does TIA review their standards?

A

Every 5 years

27
Q

TIA standards are used in what?

A

TIA standards are used in designing and installing networks and are commercial products.

28
Q

Where can TIA standards be found?

A

TIA standards are purchased at the website

https://global.ihs.com/

29
Q

How are TIA standards developed?

A

TIA standards documents are developed within the Technical Committees of the TIA and the standards coordinating committees of the TIA standards board.

30
Q

A Military Standard is commonly referred to as?

A

MIL-STD

31
Q

What do MIL-STDs do?

A

Detail the processes and materials to be used to make the product.

32
Q

How does MIL-STD differ from commercial standards?

A

A MIL-STD differs from a commercial standard because it is a
defense standard that establishes uniform engineering and technical requirements for military-unique or substantially modified commercial processes, procedures, practices, and methods.

33
Q

What are the five types of defense standards?

A

interface standards, design criteria standards, manufacturing process standards, standard practices, and test method standards.

34
Q

Where can MIL-STDs be found?

A

MIL-STDs can be downloaded in a .pdf file at http://everyspec.com/MIL-STD/

35
Q

What does STIG stand for?

A

Security Technical Implementation Guide

36
Q

What is STIG?

A

a cybersecurity methodology for standardizing security protocols within networks, servers, computers, and logical designs to enhance overall security.

37
Q

STIGS identify what?

A

Vulnerabilities and provide corrective actions in the form of a
checklist.

38
Q

Who is STIGS managed by?

A

DISA - Defense Information Security Agency

39
Q

DISA STIGS fall into how many categories?

A

Three - Category I, II and III

40
Q

What does a STIGS Category I refer to?

A

Category I refers to any vulnerability that will directly and immediately result in loss of confidentiality, availability, or integrity.

41
Q

Which category has the most risks and why?

A

Category I risks are the most severe, as they may result in loss of life, damage to facilities, or a mission failure.

42
Q

What does a STIGS Category II refer to?

A

Refers to any vulnerability that can result in loss of confidentiality,
availability, or integrity.

43
Q

What can a STIGS Category II lead to?

A

These vulnerabilities can lead to a Category I vulnerability,
result in personal injury, damage to equipment or facilities, and degrade a mission.

44
Q

What can a STIGS Category I lead to?

A

Category I vulnerabilities can allow unauthorized access to classified data or facilities and can lead to a denial of service or access.

45
Q

What does a STIGS Category III refer to?

A

Category III refers to any vulnerability that degrades measures to protect against loss of confidentiality, availability, or integrity.

46
Q

What can a STIGS Category III lead to?

A

These vulnerabilities can lead to a Category II vulnerability, delay in recovering from an outage, or affect the accuracy of data and information.

47
Q

Where can you access STIGS?

A

Unlike most publications which are in a .pdf format, the STIG is viewed with a STIG Viewer downloaded from the STIG website

https://cyber.mil/stigs/srg-stig-tools/.