Section 14F - Electronic Communication and the Internet Flashcards Preview

PDG advisor > Section 14F - Electronic Communication and the Internet > Flashcards

Flashcards in Section 14F - Electronic Communication and the Internet Deck (61):
1

Email transmits information electronically over _____-based messaging systems.

Computer-based.

2

How does the Air Force ensure secure email messaging?

Through guidelines that ensure standardized and responsible use by all Air Force.

3

In identity management, what elements is vital to message security?

Public Key Infrastructure (PKI) and CAC.

4

______ authenticates an email sender's identity using a digital signature and message encryption and decryption.

PKI

5

Current Air Force guidance contains information about the use of PKI to send and receive email. T/F

False. (It is used to sign and encrypt email.)

6

Describe the Defense Message System(DMS)

It is the core message system of record fro the DoD and Air Force-interfacing to other US government agencies, allied forces and defense contractors.

7

Describe the Defense Message System (DMS).

It is the core message system of record for the DoD and Air Force - interfacing to other US government agencies, allied forces and defense contractors.

8

The Defense Message System was developed by the Air Force. T/F

False. (It is commercial off-the-shelf application.)

9

To whom does DMS provide messaging and interface?

DMS provides messaging to all DoD users (including deployed tactical users) and interfaces with other US Gov. agencies, allied forces and defense contractors.

10

What are the two classes of official Air Force email?

1) Organizational Defense Message System(DMS) High Grade Service(HGS); and 2) Simple Mail Transfer Protocol(SMTP)

11

Messages of which email class are directive in nature or require message release authority?

Original Defense Message System (DMS) High Grade Service (HGS).

12

Which email class includes messages to commit military resources, make formal requests or provide command positions?

Organizational DMS HGS

13

Which email class includes individual or organizational messages that do not promise or direct an organization?

SMTP

14

In the SMTP email class, how are official messages signed?

Digitally. (They are also encrypted.)

15

Unofficial SMTP email require a digital signature and encryption. T/F

False.

16

What system electronically transmits official tasking to organizational addresses?

HGS. (Do not send official tasking to individual addresses.)

17

Who must ensure tasking sent by email are received by the intended recipient?

The sender.

18

What must the receiver of an email tasking ensure?

The accuracy of the tasking.

19

When may Air Force members and civilian employees use a government-provided messaging system?

FOUO only. (All systems are subject to monitoring.)

20

When sending email, where should you place any special message handling instructions?

In the message body, after the classification and before the actual text. (Place handling instructions for HGS within the "handling instructions" field in the Automatic Digital Network (AUTODIN) tab.)

21

Never auto-forward email from the ".mil" domain to a local ISP. T/F

True.

22

When is it appropriate to routinely add slogans, quotes, special backgrounds, special stationaries, digital images or unusual fonts to your official or individual emails?

It is never appropriate. (Always consider the AF's professional image and conservation of AF network resources (bandwidth))

23

Individuals will not send harassing, intimidating, abusive or offensive material to, or about, others via email. T/F

True.

24

What law requires agencies to safeguard the security and confidentiality of records and protect personal privacy?

The Privacy Act of 1974.

25

What four measures should you consider before sending sensitive or personal info in DoD emails?

Confirm 1) there is an official need; 2) all addresses are authorized receivers under the Privacy Act; 3) the subject line includes "FOUO" followed by the subject; and 4) "This email contains FOUO information which must be protected under The Privacy Act and AFI 33-332" appears at the start of the email.

26

What provides guidelines for proper on-line behavior that avoids social blunders and offending recipients?

Email protocol ("netiquette")

27

List several ways you can avoid email protocol blunders.

1) Be clear and concise; 2) watch your tone; 3) be selective about the msg you send; 4) be selective about who receives your msg; 5) check your attachments and support material; and 6) keep your email under control.

28

To be clear and concise with your email, ensure the subject line communicates your purpose and lead with the most important info. List several other things you should do.

1) Use topic sentences for multiple paragraphs; 2) be brief and stick to the point; 3) use bold, italics or color to emphasize key points; and 4) choose readable fonts.

29

What size font is considered readable in email?

12-point or larger.

30

To watch your tone in an email, be polite, keep it clean and professional and don't shout. How do you shout in an email?

WRITE IN ALL CAPITAL LETTERS!!

31

To watch your tone in an email, be polite, keep it clean and professional and don't shout. How do you shout in an email?

WRITE IN ALL CAPITAL LETTERS!!

32

Why should you be careful with humor, irony and sarcasm in email?

Because they are perceived more harshly without nonverbal cues.

33

Nonverbal cues (body language, tone of voice, etc.) make up _____% of interpersonal communications.

90%

34

Be selective about the msg you send. List several topics you should not discuss in email.

Any controversial, sensitive, FOUO, classified, personal, PA or unclassified info requiring special document handling.

35

Because even unclassified info can create problems in the wrong hands when brought together with other info, always consider _____ when sending email.

OPSEC

36

Which is a good use of AF email-creating, forwarding or posting junk mail on bulletin boards; creating or sending chain letters; or using email for personal ads?

None of these.

37

List four ways you can be selective about who gets your email msgs.

1) Reply to specific addresses only; 2) use "Reply All" sparingly; 3) get permission before using large mail groups; and 4) double-check the address before mailing.

38

What should you ensure by checking your attachments and support material before you send an email?

Ensure that 1) your attachment is there (the most common mistake); 2) all information is provided the first time; 3) you've cited all quotes, references and sources; and 4) you've respected copyright and license agreements.

39

What should you ensure by checking your attachments and support material before you send an email?

Ensure that 1) your attachment is there (the most common mistake); 2) all information is provided the first time; 3) you've cited all quotes, references and sources; and 4) you've respected copyright and license agreements.

40

List several ways you can keep you email under control.

1) sign off the computer when you leave your workstation; 2) create mailing lists; 3) read and delete files daily; 4) create an organized directory on your hard drive; 5) ensure record copies are properly identified and stored in an approved filing system; 6) acknowledge important or sensitive msgs; and 7) set up an "Auto Reply" when you're away for an extended period.

41

List several ways you can keep you email under control.

1) sign off the computer when you leave your workstation; 2) create mailing lists; 3) read and delete files daily; 4) create an organized directory on your hard drive; 5) ensure record copies are properly identified and stored in an approved filing system; 6) acknowledge important or sensitive msgs; and 7) set up an "Auto Reply" when you're away for an extended period.

42

What information should your email "Auto Reply" include?

How long you're unavailable via email and alternate contacts for immediate answers or responses.

43

What resource provides the capability for quick and efficient dissemination of and access to information from government and nongovernment sources?

The internet (or "the Web").

44

Explain the differences between public and private AF websites.

Public sites are available and of interest to the general public. Private website are intended for a limited audience (".mil" and ".gov" users). (Users must consider access and security controls required for private web pages and sites.)

45

What is the AF goal for Internet usage?

To provide maximum availability at acceptable risk levels for personnel who need Internet access for official business.

46

Gov hardware and software are for official use and authorized purposes. Who may authorize personal uses?

Appropriate officials. (Such policies should be explicit to avoid adverse administrative or disciplinary actions.)

47

Which use of the Internet is permitted-conductuing unofficial and/or unauthorized Gov business, receiving personal or commercial financial gain, storing or otherwise transmitting offensive or obscene language or material, or using copyrighted material without violating the owner's rights?

Using copyrighted material without violating the owner's rights.

48

Which use of the Internet is permitted-conductuing unofficial and/or unauthorized Gov business, receiving personal or commercial financial gain, storing or otherwise transmitting offensive or obscene language or material, or using copyrighted material without violating the owner's rights?

Using copyrighted material without violating the owner's rights.

49

Copying and posting FOUO, controlled unclassified, critical or PII on DoD-owned, -operated or -controlled accessible sites or commercial Internet-based capabilities is prohibited. T/F

True.

50

Whose written permission do you need before modifying or altering the computer network operating system or system configuration?

The system administrator of that system.

51

When can you obtain, install, copy, store or use software in violation of the appropriate vendor's license agreement or permit unauthorized individuals access to a Gov system?

Never.

52

When can you view, change, damage, delete, or block access to another user's files or communications; or try to circumvent or defeat security or auditing systems?

With appropriate authorization or permission (i.e. legitimate system testing or security research).

53

Classified info must be stored or processed only on a computer system that has what approval?

Approval for classified processing.

54

Classified info must be stored or processed only on a computer system that has what approval?

Approval for classified processing.

55

Whose approval is required before you download or install freeware, shareware or any software product?

The Designated Approval Authority approval

56

All AF members must ____-check all downloaded files, including sound and video files and email attachments.

Virus-check

57

Why shouldn't you download computer files to a network or shared drive?

Because they can rapidly spread a virus.

58

When possible, where should you download files before placing them on the computer's hard drive?

To a CD/DVD. (Run a virus check before moving them to your computer.)

59

What should you do after virus-checking compressed downloaded files?

Run a second virus check on the decompressed files.

60

OPSEC training and education applies to computer use as much as conversations between personnel, transmitting correspondence and telephone conversations. T/F

True.

61

Why should military members and government employees refrain from discussing work-related issues on Facebook, Twitter, blogs and online discussion forums?

Because policies that restrict communicating with unauthorized personnel also apply to Internet communications. (Such discussions could result in unauthorized disclosure of military info to foreign individuals, Gov or intelligence age nice, or the disclosure of potential acquisition-sensitive info.)

Decks in PDG advisor Class (69):