Module 1

5.0(1)
studied byStudied by 76 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/88

flashcard set

Earn XP

Description and Tags

Module 1 <3

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

89 Terms

1
New cards

Skill level

_____ Specifies the degree of experience an individual obtained within a particular AFSC.

2
New cards

General Military knowledge (PFE) and Hands on job knowledge (SKT)

What does PFE and SKT measure?

3
New cards

NVRAM

Category of RAM that retains its stored data even when the power is switched off.

4
New cards

Scripting/Powershell

Is designed to automate system tasks and create system management tools for implementing processes?

5
New cards

ROM

Memory not directly accessible by the computer.

6
New cards

PFE 100, SKT 100, Awards/Decorations 25, and EPR 250

What are the WAPS factors? How many points for each?

7
New cards

Mission Defense Team

Is responsible for mission assurance at the base-level and focuses on defensive cyber operations of Air Force weapons systems.

8
New cards

Time Compliance Technical Orders

Are used to change or modify AF network equipment to meet security standards or protect information systems from threats identified by network security intrusion and restoration tools (deters, detect, isolate and recover).

9
New cards

Boundary Protection

Main focus of this job/team is to allow traffic to flow in and out of a specific boundary while also keeping that traffic and network safe.

10
New cards

Infrastructure

Employs defensive security policies on networking components physically and virtually from the AF gateway service delivery point to the base boundaries.

11
New cards

Syntax

The way symbols, words and characters are formed within each programming language.

12
New cards

Low level languages

Code is easily and readily executed by the computer without any assistance from any other program.

13
New cards

Server Oriented Architecture

Following relies on a business process to link and sequence services (known as orchestration) to meet a new or existing business system requirement?

14
New cards

Cyberspace Vulnerability Assessment / Hunter

Which weapon system is designed to identify vulnerabilities and provide commanders with a comprehensive assessment of the risk of existing vulnerabilities on critical mission networks.

15
New cards

Common Access Card

Device holds your digital certificates allowing you to log into military networks.

16
New cards

NoSQL

These types of databases are optimized specifically for applications that require large data volume, low latency, and flexible data models, which are achieved by relaxing some of the data consistency.

17
New cards

CLI

Is a text-based interface allowing a user to type commands directly to the operating system and the system responds by carrying out those commands.

18
New cards

Static Ram

Is a memory chip within the computer system responsible for storing data on a temporary basis so it can be promptly accessed by the CPU.

19
New cards

UEFI

Offers secure boot preventing the computer from booting from unauthorized applications which prevents rootkits.

20
New cards

Markup Language: XML and HTML

Is a modern system for annotating a document in a way syntactically

21
New cards

C3MS

The single Air Force weapon system providing overarching 24/7 situation awareness, management and control of the Air Force portion of the cyberspace domain. It ensures unfettered access, mission assurance, and join warfighter use of networks and information processing systems to accomplish worldwide operations.

22
New cards

Server

Powerful computer providing specific resources or services to other computers

23
New cards

LAN

A group of computers and/or other devices connected within a single physical location or within a small geographical area.

24
New cards

Router

Learns which computer (node is connected to what port saving the information in an internal table.

25
New cards

Symmetric

Allows the key to accomplish both encryption and decryption. Therefore, each user must possess the same key to send and open encrypted messages.

26
New cards

certification authority

Serves as the root of trust to authenticate the identity of individuals, computers and other entities in the network.

27
New cards

Middleware

A general term for computer software providing services to software applications beyond those available from the operating system.

28
New cards

TCP

Provides reliable data delivery services. A connection must be established between communicating nodes before data is transmitted.

29
New cards

Client

Computer or device on the network requesting resources or services from another computer or device within the network.

30
New cards

DHCP

Designed to reduce configuration time by automatically assigning each computer an IP address from the list of available addresses.

31
New cards

WLAN

Use modulation technologies based on radio waves permitting communications with other wireless nodes within a limited geographical area.

32
New cards

Router X2

Internetworking device used to connect networks of different types.

33
New cards

Certificate Database

Saves certificate requests issued and revoked certificates from the RA or CA

34
New cards

Something you know

This authentication factor is the most common form.

35
New cards

Something you are

This factor uses a physical attribute to verify somebody.

36
New cards

Password History

This will identify the policy on reusing a password such as how many different passwords must be used before you can reuse one you use previously.

37
New cards

Network Address

This address is the designation used in routing to send packets to a remote network.

38
New cards

TCP/IP

The most popular networking protocol utilized on modern networks today.

39
New cards

Host/Device/Node

Any connected network device

40
New cards

Subnet mask

Is used to determine the part of the address used for the network and the part of the address used for the host.

41
New cards

Cyberspace Defense Analysis (CDA)

This Cyber weapon system supports OPSEC and conducts defensive cyberspace operations. Through monitoring, collecting, analyzing, and reporting on sensitive information released from friendly unclassed systems.

42
New cards

Air Force Intranet Control (AFINC)

This cyber weapons system is the top-level boundary and entry point into the Air Force Information Network, and controls the flow of all external and inter-base traffic through standard, centrally managed gateways.

43
New cards

Air Force Cyberspace Defense (ACD)

This cyber weapons system is designed to prevent, detect, respond to, and provide forensics of intrusions into unclassified and classified networks.

44
New cards

Cyber Security and Control System (CSCS)

This cyber weapon system is designed to provide 24/7 network operations and management functions and enable key enterprise services within Air Force unclassified and classified networks.

45
New cards

Directory Services

This provides basic authentication and accessibility to clients in a domain and provides other domain services such as control, security policies & settings, and software updates.

46
New cards

Vulnerability Management

This Improves security posture of AFIN by conducting rapid, positive ID and notification to mitigate network and information system vulnerabilities and denies adversary access to friendly terrain.

47
New cards

Sandbox

This type of language allows for testing and is provided for applications running in an independent _________ environment.

48
New cards

Join Publication 1-02

Defines a weapon system as “a combination of one or more weapons with all related equipment, materials, services, personnel, and means of delivery and deployment (if applicable) required for self-sufficiency”.

49
New cards

BIOS

The collective name for the hundreds of tiny programs telling your CPU everything.

50
New cards

CMOS

Contains the computer’s inventory list and advanced setup options.

51
New cards

IRQ

The _____ causes the main program to stop what it is doing and to prepare for a new task.

52
New cards

Cross Domain Solutions

Offers information assurance while providing the ability to manually or automatically access or transfer information between two or more differing security domains.

53
New cards

Controlled Interface

The system operated between two different network enclaves, but they have the same security classficiation.

54
New cards

Transfer

This type of CDS is used to move data from one security domain to another, must go from lower to higher.

55
New cards

Access

This type of CDS allows a user to login to their choice of security domain.

56
New cards

Internetworking

The capability to share data over different networks.

57
New cards

Multi-level

This type of CDS allows a user to initiate multiple simultaneous login sessions to differing security domains.

58
New cards

Flat model

This type of database schema organizes data in a single, two-dimensional array.

59
New cards

Normalization

The process of analyzing how to make databases more efficient by using separate tables to reduce redundant data.

60
New cards

Relational database

This type of database allows data to be separated and connected across several tables.

61
New cards

Reusability, Interoperability, Scalability/Flexibility, and Cost Efficiency

Benefits of Service Oriented Architecture

62
New cards

High-level languages

More user-friendly and offer a larger portability across various platforms, not limited by computer hardware.

63
New cards

Semantics

Deal with the meaning each set of characters convey when arranged in a particular way.

64
New cards

AFQTP

Instructional course designed for use at the unit to qualify or aid qualification in a duty position, program or on a piece of equipment.

65
New cards

AFJQS

Comprehensive task list describing a particular job type or duty position. Supervisors use the ______ to document task qualification.

66
New cards

Bounded (guided) and Unbounded (wireless)

The two different categories of media

67
New cards

PKI

Uses a combination of symmetric and asymmetric algorithms to generate keys necessary to ensure authentication and protection of encrypted messages.

68
New cards

asymmetric

Consists of a public key, which is freely available, and a private key, which is kept secret.

69
New cards

Registration Authority

Certified by a root CA to issue certificates for uses permitted by the CA

70
New cards

Key Archival Server

Saves encrypted private keys in a certificate database for disaster recovery purposes in case the Certificate Database is lost.

71
New cards

Certificate Revocation List

This designates revoking a certificate which invalidates a certificate before its expiration date.

72
New cards

Somewhere you are

Location based authentication factor.

73
New cards

Something you do

Performance-based version of authentication.

74
New cards

Identity credential, e-mail encryption, and Digital signature

Three types of credentials on our CACs

75
New cards

CAC Management

______ _______ is the set of functions necessary to manage the card and middleware environment, such as PIN changes and PIN timeouts.

76
New cards

Password guidelines

Defines Password complexity, history, duration, protection, and consequences.

77
New cards

Storage and Virtualization

Manage virtual environments within datacenters. Create virtual machines and perform the tasks of backups, recovery and archiving.

78
New cards

Monitoring

Provides situation awareness to all components, systems and network devices.

79
New cards

Information Assurance

Ensures the security posture of the AF network enabling CIA, non-repudiation and authentication.

80
New cards

System and User Accounts Services

Responsible for managing system accounts, including SAM, GPO, SSLA’s, MOUs, PKI, etc…

81
New cards

Security

Maintains and implements security fixes, updates, operating system patches and antivirus software.

82
New cards

Classified Message Incidents

Caused when classified information was inadvertently placed on unclassified systems.

83
New cards

Time Compliance Network Orders (TCNO)

The AF deploys updates and patches as a ______ against any weaknesses or vulnerabilities discovered on the network.

84
New cards

Contingency Operations

Identify and analyze targets as well as exploits of the adversary’s network operations and systems based on rules of engagements (ROEs).

85
New cards

Strategic and Budget Planning

Manages, supervises, and performs planning and implementation activities for the network.

86
New cards

Proactive Defense

Conducts continuous monitoring of AF network traffic for response time, throughput and performance to ensure timely delivery of critical information.

87
New cards

Network Standardization

Creates and maintains standards and policies to protect networks, systems and databases reducing maintenance complexity, down-time, costs, and training requirements.

88
New cards

Interpreted Language

Code is saved in the same format entered and does not need to be compiled before execution

89
New cards

Compiled Lanaguage

Translates the program directly into machine code specific to the target computers CPU