Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
148 Cards in this Set
- Front
- Back
Which AFI series covers all safety subjects? |
91 series |
|
Which publication outlines Communication Electronics Systems Safety? |
91-203 |
|
In addition to obvious hazards such as slippery floor or own file drawer, a modern work area may also contain numerous other hazards |
Poor lighting, noise, poorly designed furniture and equipment, machines that emit noxious gases and fumes. |
|
List four leading types of all disabling accidents that occur within the work area. |
Falls strains and over exertion Struck by or striking objects Caught in or between objects |
|
What are some methods of preventing poor lighting conditions from becoming a hazard? |
Regular maintenance of the lighting system, adjustable shades on windows, and indirect task lighting |
|
_______ can produce tension and stress as well as damage hearing. |
Noise |
|
What can be installed to help muffle noise in the workplace? |
* Use carpeting, draperies, and acoustical ceiling tiles to muffle noise
|
|
Improper lifting can cause sprains, strains and inflamed joints. List 4 control methods to reduce handling and storage hazards? |
* Heavy objects should be stored on lower shelves and materials stacked neatly * Materials should be stored inside cabinets, files, or lockers whenever possible * Marterial Safety Data Sheets must be provided for each hazardous chemical identified * Materials should not be stored on top of cabinets |
|
Improper lifting can cause musculoskeletal disorders such as.. |
Strains, sprains, and inflamed joints. |
|
Poor design and/or poor housekeeping can lead to: |
Crowding, lack of privacy, slips, trips, and falls |
|
What can be done to reduce crowding, lack of privacy, slips, trips, and falls? |
* Keep telephone and electrical cords out of aisles * work area machines should be kept away from edges of desks and tables * Regular inspection, repair, and replacement of faulty carpets * Place floor mats in inside building entrances * Proper placement of electrical, telephone, and computer wires |
|
Blocked or improperly planned means of egress can lead to... |
Injuries as a result of slips, trips, and falls. |
|
How can we ensure a proper means of egress? |
Generally have two exits which are clearly marked, free from obstructions and adequately lit, aware of all exits and procedures for evacuation. |
|
Electrical accidents in a work area usually occur as a result of... |
* Faulty or defective equipment * unsafe installation * misuse of equipment |
|
What general guidelines should be followed when when installing or using electrical equipment? |
* A sufficient number of of outlets will prevent circuit overloading * Cords should not be dragged over nails, hooks, or other sharp objects * Machines should be disconnected before cleaning or adjusting. Generally, machines and equipment should be locked or tagged out during maintenance. |
|
A/an ______, incorporating employee awareness and training can reduce back injuries in the work place. |
Effective control program |
|
T/F One control to ensure proproper use of chairs would be to regularly inspect them for broken or missing parts |
True |
|
What are controLs for maintaining safety around file cabinets? |
* Open one drawer at time * Do not locate file cabinets close to doorways or in aisles * Use drawer handles to close file drawers. |
|
Machines with rotating parts can cause... |
Lacerations, abrasions, fractures, and amputations if not properly guarded |
|
Fans must have... |
Substantial bases and fan blades covered |
|
T/F Workers should always face the ladder when climbing up or down |
True |
|
T/F Ladders should be inspected occasionally |
False, regularly |
|
T/F The top of the ladder is a step |
False, it is not a step |
|
T/F Ladders can be used when partially open and not locked in place. |
False - ladders should be used when the are fully open and locked in place. |
|
In what three ways can multifunctional devices present a health hazard to employees? |
* toxic chemicals * noise * noise* intense light from the scanner * intense light from the scanner |
|
What three things can be done to help prevent MFD pollution? |
* place machines in well ventilated rooms away from workers' desks * routinely have the machines serviced to prevent chemical emissions * Clean all spills and dispose of waste properly. |
|
What four things must be present to start a fire? |
Oxygen Fuel Heat Chemical Reactions |
|
How many class of fire extinguisher are there? |
Five |
|
Which class of extinguisher is used for it's cooling or quenching effect to reduce the burning material's temperature? |
A |
|
A class A fore extinguisher is... |
Water |
|
You use a the A fire extinguisher to put out.. |
Wood, cloth, rubber, or plastic fires. |
|
Class B fire extinguishers use what to put out fires? |
Carbon Dioxide, takes the oxygen away from the fire. |
|
What is the range of a class B extinguisher? |
3-8 ft. |
|
Class B fire extinguishers are used to remove fires from what materials? |
Gasoline, oil, lacquers, mineral spirits, and alcohol fires |
|
What is the first step when battling a fire that can be put out using a Type C extinguisher? |
Remove power high voltage circuit then treat as class A or B |
|
Class C extinguishers are used for... |
Electrical fire's, known as multipurpose |
|
The is no extinguisher with a class ______ |
A, C rating |
|
What two methods of labeling can be used to identify class A, B, and C extinguisher |
Color Geometric shapes and picture symbols |
|
Which class of extinguisher works by interrupting the chain reaction that jeeps a fire burning |
Class D |
|
_______ based extinguishers are used for class D fires |
Sodium powder |
|
Class D is used to put out what kind of fires? |
Burning metals |
|
Class D only has what one identifier? |
Colored geometric shape. |
|
What chemical and class of fire extinguisher is used to knock out flames in seconds, and to cool and seal the fire? |
Wet potassium acetate based, low pH agent, Class K |
|
Class K uses what two identifiers? |
colored geometric and picture symbol |
|
What does the acronym SPEED stand for? |
Sound the alarm Phone the fire department Evacuate the building Extinguish the fire if possible Direct the fire fighters to the fire. |
|
What is an easy way to remember how to use a fire extinguisher and what does each letter stand for? |
PASS Pull Aim Squeeze Swipe |
|
Four principles of of Risk Management |
* Accept no unnecessary risk * Make risk decisions at the appropriate level * Integrate RM into operations and planning at all levels Apply the process cyclically and continuously |
|
What are the five steps in the risk management process? |
1. Identify the hazards 2. Assess the hazards 3. Develop Controls and Make Decisions 4. Implement Controls 5. Supervisor and Evaluate |
|
Which principal of risk management is used best by integrating the principLes as early as possible and provides decisions makers the greatest opportunity to apply them? |
Integrate RM into operations and planning at all levels. |
|
What are the two levels of Risk Management? |
Real time Deliberate |
|
The severity of electric shock is determined by... |
The amount of current flowing through the body, the time of duration of exposure, and the body's physical condition. |
|
What is traumatic shock? |
A depressed condition of body functions due to lack of adequate blood circulation which may occur following a serious injury. |
|
The most dangerous shocks are those that involve... |
The brain or vital organs in the chest and abdominal area. |
|
What is the first step involved with helping someone attached to an electrical power source? |
Turn of the power |
|
If you can't locate the power of what is shocking someone what should you do? |
Warn others |
|
When somebody is being shocked what should you never do? |
Touch them |
|
What are the three steps of CPR |
C-A-B Chest compressions Clear the airway Breathing |
|
How to prevent traumatic shock |
* Keep victims lying down * Elevate feet and legs * keep victim warm; cover over and under. * Do not move victim * Do not leave victim unattended * Do not give fluids |
|
What are four methods to control bleeding |
1. Direct pressure 2. Elevation 3. Pressure points 4. Tourniquet |
|
What is the major risk with burns? |
Infection |
|
How do you prevent infection with a burn? |
Remove excess clothing from the wound and cover with gauze or a clean cloth |
|
What should an individual have ready prior to the chance of a terrorist attack? |
* Family Readyness pLan * Assemble an emergency supply kit * prepare for the possibility of a terrorists incident in your area? * use caution when you travel by locating stairways and emergency exits and develop plans for evacuating buildings, subways, and crowded public areas * Adapt, as appropriate, the same technique used to prepare for tornadoes, fires, and other emergencies |
|
What are the three factors for protecting oneself from radiation and fallout? |
Time, Distance, shielding |
|
ISO |
International Organization for Standardization is the worlds largest developer of standards |
|
The big thing that ISO defined is the... |
Open Systems Interconnection (OSI) |
|
IEEE |
Institute of Electrical and Electronics Engineers. The world's leading professional association for the advancement of technology. |
|
EIA |
Electronic Industries Alliance - Organization of electronics manufacturers |
|
TIA |
Telecommunications Industry Associations |
|
ICANN |
Internet Corporation for Assigned Names and Number - Responsible for IP address space allocation, protocoL parameter assignment, domain name system management and root server system management functions. |
|
So ICANN for profit or non-profit |
Non-profit |
|
EIA/TIA made which standard? |
Commercial Building Telecommunications Wiring Standards, which define hierarchical wiring systems in network environments using data-grade twisted-pair wire |
|
IANA |
Internet Assigned Numbers Authority - allocates and maintains unique codes and numbering systems that are used in the technical standards (protocols) that drive the internet |
|
IANA's role is to... |
Distribute IP addresses from the pools of unallocated address to the Regional Internet Registries |
|
RIR |
Regional Internet Regestries |
|
ARIN |
American Registry for Internet Numbers. |
|
ARIN covers the geometric region of... |
United States, Canada, and many Caribbean and N. American Islands |
|
What Air Force document defines cyberspace? |
Air Force Doctrine AFDD 3-12 |
|
How does the Air Force define cyberspace? |
A domain characterized by the use if electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated infrastructures. |
|
What is the ultimate goal of communications? |
Right information in the right right format to the right person and the right time |
|
Cyberspace operations |
The employment of cyber capabilities where the primary purpose is to achieve military objectives in it through the use of the cyberspace domain. |
|
What are the three core competencies of the Communications and Information career fields according to the Strategic Vision of the Cyberspace Command |
* Use the Domain * Control the Domain * Establish the domain |
|
Use the domain |
Leverage friendly operations across the electromagnetic spectrum and counter any adversary operating in the domain. |
|
CO |
Cyberspace Operations |
|
OCO |
Offensive Cyberspace Operations |
|
Offensive Cyberspace Operstiobs are authorized by.. |
Executive Order |
|
The specific actions of cyberspace attack operations are: |
Deny, Degrade, Disrupt, destroy |
|
Deny |
To degrade, disrupt, or destroy access to, operation of, it availability if a target by a specified level for a specified time. Denial prevents adversary use of resources. |
|
Degrade |
To deny access +function of amount) to, or operation of, a target to a level represented as a percentage of capacity. L |
|
Disrupt |
To completely but. Temporarily deny (a function if time) access to, or operation of, a target for a period of time. |
|
Defensive Cyberspace Operations |
Intended to defend DoD or other friendly cyberspace |
|
List the three operations that can be used under establishing the domain |
* Global expeditionary cyberspace operations. * Command and Co trial of Network Security Operations * Cyberspace Civil Support Operations |
|
US Code |
The official subject matter order, compilation of laws. |
|
The US code is prepared by who? |
Office of Law Revision Counsel |
|
Title 10 |
Outlines the role of the Arned forces |
|
Code 15 |
Outlines terrible of commerce and trade |
|
Code 18 |
Criminal and penal code |
|
Code 32 |
Outlines the National Guard |
|
Code 50 |
The role of War and National Defense. |
|
Defines how joint forces use information operations to support our national military strategy |
Doctrine for Information Operation (Joint Pub 3-13) |
|
AFDD 3-13 |
Explains the Air Force perspective in information superiority |
|
Information Operations |
The integrated use of capabilities of influence operations, electronic warfare operations, and network warfare operations, in concert with specified integrated control enablers, influence, disrupt, corrupt or usurp adversial human and automated decision making systems while protecting our own |
|
IO provides what predominantly? |
None kinetic capabilities to the warfighter |
|
Integrated Control Enablers (ICE) |
A new term used to define what was formerly expressed as information in warfare. |
|
Five general types of policies for network usage |
* Network Usage policy * internet usage policy * email usage policy * personal software policy * user account policy |
|
All military Information Users sign what document? |
AF Form 4394 (Air Force User Agreement Status - Notice and Consent Provision |
|
What form is used to request IS access and specific authorizations within the system? |
DD 2875 System Authorization Access Request (SAAR) |
|
Network Usage Policy |
Dictates who can use network resources such as computer, printer, scanners and remote connections |
|
Internet Usage Policy |
Rule for Internet use on the job. |
|
Email Usage Policy |
Code of conduct. Emails are government property and can be accessed by government agencies |
|
Personal Softwaee Policy |
No outside software installed on the network |
|
User Account Policy |
Users are responsible for passwords/pin. Log off daily in order to facilitate pushes and to restart their system weekly. |
|
00-5-1 |
TO that describes the TO system. |
|
Technical Order |
Provides clear and concise instructions for the safe and effective operation and maintenance of centrally acquired and managed Air Force military systems |
|
Communications-Electronics Manuals |
Used with specialized equipment or when TOs gave not been developed |
|
Revision |
A second or subsequent edit of a TO that supersedes the preceding edition |
|
The official listing of active TOs |
Air Force TO catalog |
|
New TOs are ordered on... |
ETIMS |
|
ETIMS |
Enhanced Technical Information System |
|
TODO |
TO Distribution Office - provides TO account administrative services for the Unit. |
|
TO library |
One of more current TOs with all the changes, revisions, and supplements maintained. |
|
Rules of Engagement involve what activities related to information gathering and what is the information integrated into |
Planning, execution, coordination, targeting, monitoring, adjustment, and assessment of information and are integrated into the information warfare flight |
|
The IO team provides what information to AOC prior to the initiation of hostilities |
Expertise to pLan, empLoy, and and assess information capabilities |
|
Federal Information Secureith Management Act of 2002 (FISMA) |
Federal Las enacted on 2002 to boLster completed and network security within the government. |
|
System Monitoring |
Air force networks are constantly surveilled to detect and defend against criminal and malicious activity |
|
IDS |
Intrusion Detection System - monitors network traffic, monitors for suspicious activities and alerts thr system or networkj administrator to any such activity |
|
Who is responsible for testing and replying IDS? |
Homeland Security |
|
What is the IDS used to monitor US government network activity? |
Einstein. |
|
GIG |
Global Information Grid |
|
Air force cyber command is under what command? |
24th Air Force |
|
Port scanning |
Connects to each device on the network and takes note |
|
What documents define cyber ethics |
RFC 1087 and The Ckde of Fair Information Practices |
|
Unethical behavior includes |
* seek to gain unauthorized access to the resources of the internet * disrupt the intended use of the internet * waste resources through these actions * compromise the privacy of users |
|
What laws protect people personal privacy information? |
Freedom of Information Act and (FOIA) and Privacy Act of 1974 |
|
PII is defined as |
Name, address, or telephone number combines with SS or tax ID, credit or debit number, financial/salary data, drivers license number, DoB, HIPPA |
|
Privacy Act of 1974 |
Prescribes the management, access, handling, and denial of access to records within a system of records. |
|
Air Force Privacy Act |
AFI 33-332 |
|
Control Area |
Requires some form of ID to get acces |
|
Restricted Area |
Requires special access badge and purpose to be there. |
|
No Lone Zone |
Require personal to not be alone with systems/equipment. |
|
OPSEC vulnerabilitwz |
Critical info, social media, open conversations, and, family/friends |
|
Information Assurance |
Measures to protect and defend j fk won computer systems |
|
IA protective measures |
ID and authentication Access control Controlling maintenance activities Configuration management Malicious logic protection User awareness training |
|
Comsec is the combination of what two things? |
Cryptosecity and transmission securith |
|
Compusec vulnerabilities |
Unauthorized access, malicious logic, fraud waste, and abuse |
|
Infocon 5 |
Normal operations |
|
Infocon 1 |
Maximum readyness |
|
DISN |
Long haul |
|
DSN |
Phones |