Volume 1 Flashcards Preview

CDC Z3DX7X > Volume 1 > Flashcards

Flashcards in Volume 1 Deck (100):
1

Which AFSC requires members to pass the Air Force Electronic Data Processing Test? (Page 9)

Computer Systems Programming (3D0X4)

2

Which of the following is not a mandatory requirement for the advancement to the 7-skill level? (Page 13)
A. Minimum rank of SSgt
B. 6 months OJT for retrainees
C. Completion of AFSC specific requirements
D. Completion of AETC Supplemental training courses

D. Completion of AETC Supplemental training courses

3

Which of the following functions is primarily staffed by CST personnel but may have a variety of AFSCs based upon the unit mission? (Page 14)
A. CFP
B. UDM
C. ESD
D. QA

A. CFP

4

What document directs the CFP key processes? (Page 14)

MPTO 00-33A-1001-WA

5

Where is the AF active component manpower planning and programming centralized? (Page 17)

At Headquarters Air Force (HAF)

6

Which of the following is the official source of manpower information for an organization and is used as a tool to manage positions? (Page 18)
A. Program Element Code
B. Unit Manpower Document
C. Authorization Change Request
D. Unit Personnel Management Roster

B. Unit Manpower Document

7

Which of the following is a subdivision of programmed cost data related to a weapon system or support function? (Page 19)
A. Program Element Code
B. Unit Manpower Document
C. Authorization Change Request
D. Unit Personnel Management Roster

A. Program Element Code

8

Which of the following is not a responsibility of the AFCFM? (Page 20)
A. Construct career paths
B. Manage skill-level training requirements
C. Establish requirements for entry into the career field
D. Distribute personnel throughout their respective MAJCOM

D. Distribute personnel throughout their respective MAJCOM

9

Who serves as the MAJCOM voting representative during career field Specialty Training Requirements Team (STRT) and Utilization and Training Workshop (U and TW)? (Page 21)

MAJCOM Functional Manager

10

Which segment of the U and TW/STRT process concentrates on training proficiency levels and training resources?

Segment 2

11

Which of the following is not an action of the STRT?
A. Draft and sign minutes
B. Finalize part 1 of the CFETP
C. Finalize AFECD specialty description
D. Finalize STS/CTS for all courses

D. Finalize STS/CTS for all courses

12

Which of the following is an optional attendee for the U and TW?
A. AETC/TPM
B. AETC CDC writer
C. AFCFM
D. MAJCOM Functional Manager

B. AETC CDC writer

13

What is used as a starting point to develop the CFETP and STS during the STRT and U and TW?

Occupational Analysis Report (OAR)

14

What AIS is used to document actions on any item with an assigned Standard Reporting Designator (SRD)? (2-2)

Integrated Maintenance Data System (IMDS)

15

Which of the following is not a common duty of the Maintenance Data Collection (MDC) monitor? (2-4)
A. Review IMDS reports to ensure job status is reflected properly
B. Ensure equip. status is entered into Equip Status Reporting (ESR)
C. Match reports with Open Incident Listing (OIL)
D. Schedule and distribute daily maintenance actions

B. Ensure equip. status is entered into Equip Status Reporting (ESR)

16

Who establishes the necessary controls to ensure periodic inspections are accomplished? (2-6)

Flight Commander/Chief

17

Which of the following is included in the MTP only if applicable to the work center? (2-7)
A. MTL
B. JQS
C. Current CFETP
D. Milestones for tasks and CDC completion

B. JQS

18

Special Personnel Evaluations (SPEs) are required on a sampling of Air Reserve Component (ARC) personnel within how many days of new equip./system acceptance? (2-11)

120 days

19

Which statement is not a goal of ORM? (2-12)
A. Enhance mission effectiveness at all levels, while preserving assets and safeguarding health and welfare.
B. Integrate ORM into mission processes, ensuring decisions are based upon assessments of risk integral to the activity and mission
C. Create an AF in which every leader, Airman and employee is trained and motivated to manage risk in all their on- and off-duty activities.
D. Identify opportunities to decrease AF warfighting effectiveness on the battlefield and in the operational aerospace environment, helping to ensure decisive victory in any future conflict at the least possible cost.

D. Identify opportunities to decrease AF warfighting effectiveness on the battlefield and in the operational aerospace environment, helping to ensure decisive victory in any future conflict at the least possible cost.

20

How many steps are there in ORM? (2-13)

6

21

Supervisors document and maintain completed safety training on ____? (2-14)

AF Form 55

22

Which of the following is not a term for Job Safety Analysis? (2-14)
A. Job Safety Training (JST)
B. Job Hazard Analysis (JHA)
C. Task Hazard Analysis (THA)
D. Activity Hazard Analysis (AHA)

A. Job Safety Training (JST)

23

Which of the following is information not contained in Technical Order (TO) 00-5-1? (2-16)
A. TCTO procedure
B. Resources required to manage and use TOs
C. Infrastructure to manage and use TOs
D. Training to manage and use TOs

A. TCTO procedure

24

Recommended TO changes are required to be submitted on ___. (2-20)

AFTO Form 22

25

Who determines if local checklists and/or work cards are required for specific equipment? (2-20)

Flight commander/chief

26

Who provides accreditation for the Telecommunications Industry Associate (TIA)? (2-21)

American National Standard Institute (ANSI)

27

Who develops standards for Interconnect, Passive and Electro-mechanical (IP and E) electronic components under the ANSI designation of EIA standards? (2-21)

Electronic Components Industry Association (ECIA)

28

Who should endorse the AF Form 673 as the Certifying Official? (2-22)

The authoring OPR's supervisor

29

What systems allow for a commonly understood, maintainable, and defendable domain through all federal and non-federal systems? (2-22)

Commercial Off-The-Shelf (COTS)

30

The creation of the DOD as an executive component of the government is authorized by United States Code (USC) Title ___. (2-24)

10

31

Procedures and circumstances for Congress to order units into active Federal duty are established in USC Title ___. (2-25)

32

32

Who appoints AF Portal Content Managers and Content Publisher for public and private websites? (2-28)

Wing Commander

33

When a person uses his or her position for private or personal gain it is called ___. (2-31)

Misuse of position

34

Which type of fund covers the cost of relocating facilities? (2-38)

Military Construction (MILCON)

35

What is the maximum amount for minor construction projects that Operation and Maintenance (O and M) funds will cover under normal conditions? (2-39)

$750,000

36

In-depth information for administering the Government Purchase Card program at all responsible levels is found in AFI ___. (2-39)

AFI 64-117

37

At the installation level, which office is responsible for program implementation, administration, training, and monitoring the GPC Program? (2-40)

Agency/Organization Program Coordinator (A/OPC)

38

Which of the following is not a responsibility of GPC cardholders? (2-40)
A. Making authorized transactions
B. Reconciling transactions
C. Logging transactions
D. Funds accountability

D. Funds accountability

39

Detailed instructions for submitting a reclama or shortfall request are found in ___. (2-41)

AFI 10-401

40

Who reviews the selections after the board selects the 12 Outstanding Airmen of the Year? (2-41)

Air Force Chief of Staff

41

Which of the following the highest level in which quarterly awards are normally presented? (2-43)
A. Wing
B. Group
C. Squadron
D. Major Command

A. Wing

42

Guidance for awards specific to the Cyber community are found in AFI ___. (2-43)

AFI 36-2845

43

What are the inclusive dates for Secretary of the AF/Chief Information Officer (SAF/CIO) annual awards?

1 October - 3- September

44

The maximum number of devices a FireWire bus can take is up to ___. (3-4)

63

45

What device is a series of single-pole, single-throw switches mounted to a circuit board? (3-6)

Keyboard

46

A workgroup is a simple grouping of how many computers? (3-9)

No more than 20

47

Which is not a type of UNIX pathname? (3-14)
A. Simple
B. Relative
C. Positive
D. Absolute

C. Positive

48

Which application includes tools to help recover lost files and protect against computer failure? (3-16)

Norton Utilities

49

The IEEE divides the OSI Data Link Layers into what two sublayers? (4-3)

Logical Link Control (LLC) and Media Access Control (MAC)

50

Network switches and bridges operate at what OSI layer? (4-3)

Data Link

51

Routers operate at what OSI layer? (4-3)

Network

52

Virtual circuits are established, maintained, and terminated at what OSI layer? (4-3)

Transport

53

What is the combat information technology (IT) communication support agency of the DoD called? (4-4)

Defense Information Systems Agency

54

Who must provide encryption devices for connection to the Secret Internet Protocol (IP) Data service? (4-5)

The customer

55

What are the two classifications of transport protocols? (4-8)

Connection Oriented and Connectionless Oriented

56

In a connection-oriented protocol, such as Transmission Control Protocol (TCP), what must happen before data is transmitted between clients? (4-8)

Connection establishment

57

What regulates how much information passes over a TCP connection before the receiving host must send an acknowledgment? (4-10)

Sliding Window

58

Which of these lists the fields in the User Datagram Protocol (UDP) segment? (4-10)

Source Port, Destination Port, Length, Checksum, Data

59

How many bits are in an IPv4 address? (4-15)

32

60

What class uses a range of 1-126 in the first octet of an IPv4? (4-16)

Class A

61

What IPv4 class address is used for networks with about 250 nodes? (4-16)

Class C

62

What IPv4 class address is used for multicast addressing? (4-16)

Class D

63

What IPv4 reserved address is used for loop back? (4-17)

127.0.0.1

64

Instead of using binary, how are IPv6 addresses expressed to be more user friendly? (4-19)

Colon Hexadecimal Format

65

The range of well know port numbers is ___. (4-23)

0 to 1023

66

Which common port contains Hyper Text Transfer Protocol servers and proxies? (4-24)

Port 8080

67

The design of communications network is known as ___. (5-1)

network architecture

68

What kind of network is a group of computers and associated devices that share a common communications line within a small geographic area? (5-2)

Local Area Network (LAN)

69

What kind of network interconnects users with computer resources in a geographic area of region like a city? (5-2)

Metropolitan Area Network (MAN)

70

Which 802.11 standard has a throughput of 11 Mbps and runs at the 2.4 GHz frequency? (5-6)

802.11b

71

Which 802.11 standard is designed to operate at both 2.4 GHz and 5 GHz? (5-7)

802.11n

72

What topology defines the layout of a network's devices and media? (5-8)

Physical

73

What topology consists of cable segments from each computer connected to a centralized component? (5-10)

Star

74

Over a single pair cable, Integrated Services Digital Network (ISDN) is capable of transmission rates of ___. (5-15)

144 Kbps

75

A modem is a device that ___. (5-18)

A. transmits on every link attached to it.
B. modulates and demodulates data signals.
C. uses algorithms to determine optimal path to end destination.
D. operates on the Network layer of the OSI model.

B. modulates and demodulates data signals.

76

What Data Link Layer network device logically separates a single network into two segments or collision domains in Ethernet networks? (5-19)

Bridge

77

Two basic routing activities are determining optimal routing paths and ___. (5-20)

A. modulation of datagrams through an internetwork.
B. Layer-1 error determination and correction through an internetwork.
C. VPN tunnel determination through an internetwork.
D. transporting information groups (packets) through an internetwork.

D. transporting information groups (packets) through an internetwork.

78

Dynamic routing automatically calculates the best path between how many nodes? (5-22)

2

79

What type of encryption is applied to each end of communications line in a distributed network, and ensures all information flowing is unintelligible to an unauthorized intruder? (5-23)

Link encryption

80

Which type of cable is associated with the original designs of the Ethernet standard? (5-25)

Coaxial cable

81

Which transmission medium is the primary carrier of voice communications? (5-25)

Twisted pair cable

82

What is the most common wireless networking standard? (5-28)

802.11

83

What are the three major considerations that apply to Cyberspace operations? (6-1)

Law, Authority, Policy

84

What title status must National Guard Guardsmen be in to execute cyber operations? (6-2)

Title 10

85

Which operations center monitors and controls AF network access points, boundary protection devices, and network activity to provide situational awareness, and report suspicious/malicious activity? (6-7)

Integrated Network Operations Security Center (I-NOSC)

86

Within the information environment what term describes the advantage, or imbalance, in one's favor? (6-8)

Information Superiority

87

What is critical to mitigating unintended or undesirable effects, on either our behalf or the adversary's, and maximizing cyberspace superiority? (6-8)

Careful Planning

88

Which Electronic Warfare capability uses jamming to reduce the adversary's use of the electromagnetic spectrum (EMS)? (6-9)

Electronic attack

89

Which of the following is a true statement about Electronic Warfare (EW) and Computer Network Operations (CNO)? (6-10)

EW concerns radiated energy

90

Which Cyberspace Defense Weapon System sub-discipline determines the extent of intrusions, develops courses of action required to mitigate threats, and determines and executes response actions? (6-14)

Incident Response

91

Which Intranet Control Weapon System sub-discipline conducts continuous monitoring to ensure timely delivery of critical information? (6-15)

Proactive Defense

92

Which Supervisory Control and Data Acquisition (SCADA) subsystem gathers data on the process and sends commands to the processor? (6-18)

Supervisory System

93

Which SCADA subsystem connects to sensors in the process, converting sensor signals to digital data? (6-18)

Remote Terminal Unit

94

Which threat vector is considered more of an annoyance than an attack? (6-20)

Spam

95

Which vulnerability preventive measure is a small piece of code that software developers create to address the flaws found in the original code of a program? (6-23)

Patches

96

Which identity management process uses a fingerprint to authenticate a user? (6-24)

Biometrics

97

Which identity management process uses a password to authenticate a user? (6-24)

Knowledge-based

98

What system monitoring concept uses long trend analysis of network devices and is performed in order to identify future constraints with results incorporated into future technical baselines? (6-25)

Capacity Planning

99

Who provides the formal declaration that an information system is approved to operate in a particular security mode using a prescribed set of safeguards and acceptable risk? (6-25)

Authorizing Official (AO)

100

The technical solution for a communications and information system requirement summarizes ___. (6-26)

A. only full costs
B. recommended course of action only
C. full cost and recommended course of action
D. full cost, recommended course of action, and security requirements.

C. full cost and recommended course of action