• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/115

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

115 Cards in this Set

  • Front
  • Back
This component of the Global Information Grid (GIG) consists of those items that are necessary to directly connect the warfighter to the global network...
Warrior Component
This characteristic of the GIG ensures seamless transmission of information between different service branches...
Common Policy and Standards
Who bears the responsibility for maintenance of the sustaining base portion of the Defense Information System Network?
The service that owns the installation
Which segment of the Defense Information System Network (DISN) may be a person in the deployed Area of Responsibility or a person sitting in a fixed location thousands of miles from combat?
Deployed Warfighter

What is the difference between a hub router and a premise router?
Interconnected via the Defense Information Systems Agency Asynchronous Transfer Mode network

How are non-internet protocols sent across the Secret Internet Protocol Router Network?
Encapsulated by the internet protocol before being transmitted across the SIPRNET
Which is an internet protocol encryption device that can be directly connected to Red local area networks?
KG-84
What provides conduit for Joint Worldwide Intelligence Communication System data transmission from one location to another?
DISN Backbone

What concerns slowed the military's adoption of wireless network technology?
Security and reliability
What is the first step in merging voice, data, and video networks into one integrated network within the Air Force?
Integrating traditional TDM switches with voice over IP systems

Besides limiting connections to the GIG, what other Combat Information Transport Systems initiative will help increase network security?
Eliminating the MAJCOM NOSC concept and integrating the functions into two integrated NOSC's

Which organization is responsible for the design, acquisition, and single systems management of the Defense Switched Network?
Defense Information Systems Agency (DISA)

How is responsiveness provided in the Defense Switched Network?
The DSN offers precedence access thresh holding
What type of Defense Switched Network precedence call cannot be preempted?
Flash Override
What is the maximum asynchronous data rate for the Defense Red Switch Network(DRSN)?
19.2 Kbps

While you are using the Red Switch, what feature lets you know that you have dialed the correct number at the proper level of security?
Liquid Crystal Display

What is the purpose of the standardized tactical entry point terminal?
to provide a foxhole to National Command Authority link for commanders

The Global Positioning System program is responsible for maintaining GPS time to within how many seconds of universal time code?
1 microsecond

Which security program is covered under AFI 10-701?
OPSEC

Which of the following security programs is defined as a process of identifying critical information and subsequently analyzing friendly actions attendant to military operations and other activities?
OPSEC

Providing a list of where and why the information will be disclosed outside the DOD best describes which mandatory item of a Privacy Act Statement?
Routine Use
What form is used as a cover sheet to protect Privacy Act material?
AF Form 3227
Guidance for posting information on Air Force websites is outlined in..
AFI 33-129

Official guidance on individual security clearances and permitting access to classified information can be found in..

AFI 31-501

Disclosure of information that would result in the loss, misuse, modification or unauthorized access that might adversely affect national security would be best described as...


sensitive but unclassified
What is the COMSEC program designed to do?
Detect and correct procedural weaknesses that could expose critical information

What reference would you use for guidance on Air Force messaging?
AFI 33-119
Which form is used with a transfer report to accompany a COMSEC package?
SF 153

Which form is used as a visitor register log to record visitors into restricted areas?
AF Form 1109
An uninvestigated or unevaluated occurrence that potentially jeopardizes the security of COMSEC material or the secure transmission of government information is best described as a COMSEC..
incident
Which organization assigns communication security incident report case numbers?
Air Force Communications Agency
Final reports of a communication security incident are due..
30 days after the initial report
The Air Force Information Assurance Program is detailed in..
AFI 33-200
Which applied discipline applies measures and controls to protect data in computer systems against unauthorized, disclosure, modification or destruction?
COMPUSEC

What best describes an unintended signal or noise appearing external to a piece of communications equipment?
Emanation

An unclassified term referring to technical investigations for compromising emanations from electrically operated data processing equipment is known as.
Telecommunications Electronic Material Protected from Emanating Spurious Transmissions
Which condition exists when there is no apparent terrorist activity against computer networks?
INFOCON 5
Which condition requires the mandate of increased monitoring of all network system activities when an increased risk of attack is present?
INFOCON 4
When a risk of network system attack has been identified, which condition requires all unclassified dial-up connections be disconnected?
INFOCON 3

Which condition permits non-essential networks to be taken offline and substituted with alternate methods of communication?
INFOCON 2
At which NETOPS level is responsibility for the worldwide management and operational oversight of the defense information infrastructure globally managed?
Tier 1
At what level do regional operation centers perform Network Operations (NETOPS) to ensure operational and administrative control by implementing Systems and Network Management Information Assurance/Network Defense, and Information Dissemination Management?
Tier 2

An accreditation decision which allows a system to operate in an environment for which it was originally intended is known as..
A full accreditation
Which resources designated priority is provided when the level of security requires a significant degree of deterrence against hostile acts?
B
Which resources designated priority is provided when the level of security requires a reasonable degree of deterrence against hostile acts?
C

Which form would you use to properly label removable storage media containing "confidential" information?
SF 708
What are the 7 components of the GIG?
Warrior component, Global Application, Computing, Communications, Foundation, Information Management
What organization has the mission of directing and operating the GIG?
USSTRATCOM
Which characteristic of the GIG ensures that users across the DOD can seamlessly connect to the systems and services offered by the GIG?
Joint Infrastructure

What 3 networks make up the data component of DISN?
Non-secure internet protocol router network, Secret Internet Protocol Router Network, Joint Worldwide Intelligence Communications System.

Why does the DOD need to have its own voice communications networks?
Because of the nature of the military's mission requirements and security concerns

What is the purpose of the long-haul transport infrastructure segment of the DISN?
It is the pipeline through which all DISN information will travel
What is the purpose of NIPRNET?

The NIPRNET is the way a local base LAN connects to other base LAN's to support medical, finance, supply, personnel, and other unclassified base data communication requirements
How is it possible for NIPRNET to carry non-internet protocol services?
Subscriber systems can use the NIPRNET to carry non-IP services if they have been encapsulated or converted to IP before being presented to a NIPRNET router

Who manages SIPRNET Hub routers and premise routers?
DISA

How does SIPRNET function like unclassified IP networks?
It can use Ethernet, router, FDDI, ATM data link protocols

What network is JWICS the top Secret equivalent?
is the Top Secret equivalent to SIPRNET

What system is the primary means of operator interface for JWICS?
Joint Deployable Intelligence Support System (JDISS)

How does CITS manage the lifecycle of the Air Forces communications and information systems?
By providing standardized infrastructure and network protection tools for all voice, video and data services that traverse base networks

What are the 4 segments of the CITS transport component?
Information Transport System, C4ISR Infrastructure planning system, Voice Switching System, 2nd Generation Wireless LAN

What are the 2 categories of DSN users?
Command and Control, Operational Support

Which user category is assigned flash or flash-override precedence?
Command and Control users

What are the 5 key objectives of DSN?
Survivability, responsiveness, security, cost effectiveness, interoperability

What device makes end-to-end encryption available to DSN users?
Secure Terminal Equipment (STE)

What are the major subsystems of DSN?
Switching, transmission, timing and synchronization, administration operations, and maintenance/network management

What is the system high level of security for operation of the Red Switch?
Secret to Top Secret SCI

Which standard data rates will the Red Switch offer direct switching?
64 Kbps synchronous and 19.2 Kbps for asynchronous

How many station lines can the multiline phone accommodate?
48

Briefly describe the purpose of standardized tactical entry points.
To allow tactical DSCS terminals to access the Defense Communication System.

Why are tactical terminals considered at a disadvantage?
Tactical terminals are generally considered "disadvantaged" because they require much more of the satellites downlink power to receive the signals.

Why was Teleport developed?
to expand multi-media RF access to multiple military and commercial communications systems

What are the 2 primary missions of the Global Positioning System?
Navigation and Nuclear Detection
How is OPSEC defined?
a process of identifying critical information and analyzing friendly actions attendant to military operations and other activities
Which security programs does OPSEC encompass?
All AF security programs

Who established the INFOSEC program?
The president

What is the definition and goal of the INFOSEC program?

The goal of the INFOSEC Program is to efficiently and effectively protect Air Force information by


delegating authority to the lowest levels possible; encouraging and advocating use of risk management


principles; focusing on identifying and protecting only that information that requires protection; integrating


security procedures into our business processes so that they become transparent; and, ensuring everyone


understands their security roles and responsibilities.



What does the Privacy Act of 1974 protect?
Protects individuals from unwarranted invasion of their personal privacy

What AFI contains information on the Privacy Act?
AFI 33-332

Name the 4 parts of the Privacy Act Statement.
Authority, Purpose, Routine uses, Disclosure

What are the categories of classified information?
Top Secret, Secret, Confidential

What document covers FOUO and FOIA?
DOD 5400.7-R

What is the definition of COMSEC?

the measures and controls taken to deny unauthorized persons information derived


from information systems of the US Government related to national security and to make sure the


authenticity of such information systems.



What is critical information?

information about friendly activities, intentions, capabilities, or limitations that an


adversary seeks in order to gain a military, political, diplomatic, economic, or technological advantage



What is AFCOMSEC Form 16 used for?

AFCOMSEC Form 16, Account Daily Shift Inventory is used to account for COMSEC material using both


Defense Courier Service and the Air Force Electronic Key Management System.



What is a COMSEC deviation?

an occurrence involving a failure to follow established COMSEC instructions,


procedures, or standards.


What is a COMSEC insecurity?

an investigated or evaluated incident that has been determined as jeopardizing the


security of COMSEC material or the secure transmission of government information.


Name the 3 COMSEC incidents

Physical, Personnel, and Cryptographic incidents.



What document is used to label unsecured phones?

DD Form 2056



Define COMPUSEC

the applied discipline that results from measures and controls that protect data in a


computer against unauthorized (accidental or intentional) disclosure, modification, or destruction.



What are 3 sources that threaten information systems?

natural, environmental, human, and viruses



Define the COMPUSEC and IA vulnerabilities.
Physical, Environmental, Personnel, Hardware, Software, Media, Network Communications, Procedural

How can you protect an unattended computer system?

You can protect a system by removing your Common Access Card (CAC) from reader when unattended



What type of network is used to process unclassified information?

Non-secure Internet Protocol Router Network (NIPRNET).


What type of network is ues to process classified information?

Secret Internet Protocol Router Network (SIPRNET).



What is spyware?

computer software that is designed to collect personal information about users without their


informed consent.



Define EMSEC

the protection resulting from all measures taken to deny unauthorized


personnel information of value that might be derived from communications systems and cryptographic


equipment intercepts and the interception and analysis of compromising emanations from cryptographicequipment,


information systems, and telecommunications systems.


What are compromising emanations?

Unintentional signal that, if intercepted and analyzed, would disclose the information transferred, received,


handled, or otherwise processed by any information-processing equipment.



What does an EMSEC assessment determine?

A desktop analysis to determine the fact an EMSEC countermeasures review is required or not. There are


separate EMSEC assessments for information systems, communications systems, and cryptographic


equipment.



What does the user identify before apply8ing EMSEC countermeasures?

The user identifies the information systems that will process classified information; the volume, relative


sensitivity, and perishability of the information; the physical control measures in effect around the area that


will process classified information; and applies identified IA and EMSEC countermeasures.



What do INFOCON's help us with?

help units take the proper protective measures to protect against threats



What disciplines does IA integrate?

Information awareness is an integrated communications awareness program covering COMSEC,


COMPUSEC, and emissions security (EMSEC) disciplines.



What equipment does the AF-GIG encompass?

includes any Air Force-provisioned system, equipment, software, or service residing on the


NIPRNET, SIPRNET, or Constellation Net.


What is the GIG?

an all-encompassing communications project of the DOD. It is


defined as the globally interconnected, end-to-end set of information capabilities, associated processes, and


personnel for collecting, processing, storing, disseminating, and managing information on demand to


warfighters, policymakers, and support personnel.


What are the 3 NETOPS levels?

Global, Regional, and Local



What is the responsibility of GNOSC?

Global NOSC is responsible for the worldwide management and operational oversight of the Defense


Information Infrastructure.



Where do FACs exist and what are their purposes?

Functional Awareness Cells are regional level entities that exist at the same NETOPS management tier as


the Base NCC. They report to and take direction from the Base and supporting NOSC. FACs require


smaller amounts of equipment and performs situational awareness for a functional system or mission.


What does an accreditation and certification constitute?

Accreditation and Certification constitutes a set of procedures and judgments which lead to a determination


of the suitability of an AIS to operate in a targeted operational environment.



Who makes accreditation decisions?

An accreditation decision is made by the DAA



Define physical security

Physical security results from using all physical measures necessary to safeguard COMSEC material from


access of unauthorized personnel. These measures include the application of control procedures and


physical barriers.



List the markings required for classified material

The overall classification of the document; the agency/office of origin and date of the document; the office


or source document that classified the information.



What items cannot be placed in security containers used to store classified material? why?

Funds, weapons, medical items, controlled drugs, precious metals, money or other non-mission related


items susceptible to theft are not, as a rule, stored in any security container that’s used to store classified


material. Storing these items together could result in the compromise of classified material.


What is the purpose of SF 700?

is to records the container’s location, the names, home addresses, and home


telephone numbers of people who know the combination. It is also used to list contact personnel when the


security of the material in the container is compromised.



On what days are secret packages typically shipped?

on Monday through Thursday only.


When should hand carrying classified material during a TDY assignment be allowed?

as a last resort in critical


situations



What provides guidance on how to properly dispose of classified information?

WebRims Records Disposition Schedule