Module 1

studied byStudied by 76 people
5.0(1)
Get a hint
Hint

Skill level

1 / 88

flashcard set

Earn XP

Description and Tags

Module 1 <3

89 Terms

1

Skill level

_____ Specifies the degree of experience an individual obtained within a particular AFSC.

New cards
2

General Military knowledge (PFE) and Hands on job knowledge (SKT)

What does PFE and SKT measure?

New cards
3

NVRAM

Category of RAM that retains its stored data even when the power is switched off.

New cards
4

Scripting/Powershell

Is designed to automate system tasks and create system management tools for implementing processes?

New cards
5

ROM

Memory not directly accessible by the computer.

New cards
6

PFE 100, SKT 100, Awards/Decorations 25, and EPR 250

What are the WAPS factors? How many points for each?

New cards
7

Mission Defense Team

Is responsible for mission assurance at the base-level and focuses on defensive cyber operations of Air Force weapons systems.

New cards
8

Time Compliance Technical Orders

Are used to change or modify AF network equipment to meet security standards or protect information systems from threats identified by network security intrusion and restoration tools (deters, detect, isolate and recover).

New cards
9

Boundary Protection

Main focus of this job/team is to allow traffic to flow in and out of a specific boundary while also keeping that traffic and network safe.

New cards
10

Infrastructure

Employs defensive security policies on networking components physically and virtually from the AF gateway service delivery point to the base boundaries.

New cards
11

Syntax

The way symbols, words and characters are formed within each programming language.

New cards
12

Low level languages

Code is easily and readily executed by the computer without any assistance from any other program.

New cards
13

Server Oriented Architecture

Following relies on a business process to link and sequence services (known as orchestration) to meet a new or existing business system requirement?

New cards
14

Cyberspace Vulnerability Assessment / Hunter

Which weapon system is designed to identify vulnerabilities and provide commanders with a comprehensive assessment of the risk of existing vulnerabilities on critical mission networks.

New cards
15

Common Access Card

Device holds your digital certificates allowing you to log into military networks.

New cards
16

NoSQL

These types of databases are optimized specifically for applications that require large data volume, low latency, and flexible data models, which are achieved by relaxing some of the data consistency.

New cards
17

CLI

Is a text-based interface allowing a user to type commands directly to the operating system and the system responds by carrying out those commands.

New cards
18

Static Ram

Is a memory chip within the computer system responsible for storing data on a temporary basis so it can be promptly accessed by the CPU.

New cards
19

UEFI

Offers secure boot preventing the computer from booting from unauthorized applications which prevents rootkits.

New cards
20

Markup Language: XML and HTML

Is a modern system for annotating a document in a way syntactically

New cards
21

C3MS

The single Air Force weapon system providing overarching 24/7 situation awareness, management and control of the Air Force portion of the cyberspace domain. It ensures unfettered access, mission assurance, and join warfighter use of networks and information processing systems to accomplish worldwide operations.

New cards
22

Server

Powerful computer providing specific resources or services to other computers

New cards
23

LAN

A group of computers and/or other devices connected within a single physical location or within a small geographical area.

New cards
24

Router

Learns which computer (node is connected to what port saving the information in an internal table.

New cards
25

Symmetric

Allows the key to accomplish both encryption and decryption. Therefore, each user must possess the same key to send and open encrypted messages.

New cards
26

certification authority

Serves as the root of trust to authenticate the identity of individuals, computers and other entities in the network.

New cards
27

Middleware

A general term for computer software providing services to software applications beyond those available from the operating system.

New cards
28

TCP

Provides reliable data delivery services. A connection must be established between communicating nodes before data is transmitted.

New cards
29

Client

Computer or device on the network requesting resources or services from another computer or device within the network.

New cards
30

DHCP

Designed to reduce configuration time by automatically assigning each computer an IP address from the list of available addresses.

New cards
31

WLAN

Use modulation technologies based on radio waves permitting communications with other wireless nodes within a limited geographical area.

New cards
32

Router X2

Internetworking device used to connect networks of different types.

New cards
33

Certificate Database

Saves certificate requests issued and revoked certificates from the RA or CA

New cards
34

Something you know

This authentication factor is the most common form.

New cards
35

Something you are

This factor uses a physical attribute to verify somebody.

New cards
36

Password History

This will identify the policy on reusing a password such as how many different passwords must be used before you can reuse one you use previously.

New cards
37

Network Address

This address is the designation used in routing to send packets to a remote network.

New cards
38

TCP/IP

The most popular networking protocol utilized on modern networks today.

New cards
39

Host/Device/Node

Any connected network device

New cards
40

Subnet mask

Is used to determine the part of the address used for the network and the part of the address used for the host.

New cards
41

Cyberspace Defense Analysis (CDA)

This Cyber weapon system supports OPSEC and conducts defensive cyberspace operations. Through monitoring, collecting, analyzing, and reporting on sensitive information released from friendly unclassed systems.

New cards
42

Air Force Intranet Control (AFINC)

This cyber weapons system is the top-level boundary and entry point into the Air Force Information Network, and controls the flow of all external and inter-base traffic through standard, centrally managed gateways.

New cards
43

Air Force Cyberspace Defense (ACD)

This cyber weapons system is designed to prevent, detect, respond to, and provide forensics of intrusions into unclassified and classified networks.

New cards
44

Cyber Security and Control System (CSCS)

This cyber weapon system is designed to provide 24/7 network operations and management functions and enable key enterprise services within Air Force unclassified and classified networks.

New cards
45

Directory Services

This provides basic authentication and accessibility to clients in a domain and provides other domain services such as control, security policies & settings, and software updates.

New cards
46

Vulnerability Management

This Improves security posture of AFIN by conducting rapid, positive ID and notification to mitigate network and information system vulnerabilities and denies adversary access to friendly terrain.

New cards
47

Sandbox

This type of language allows for testing and is provided for applications running in an independent _________ environment.

New cards
48

Join Publication 1-02

Defines a weapon system as “a combination of one or more weapons with all related equipment, materials, services, personnel, and means of delivery and deployment (if applicable) required for self-sufficiency”.

New cards
49

BIOS

The collective name for the hundreds of tiny programs telling your CPU everything.

New cards
50

CMOS

Contains the computer’s inventory list and advanced setup options.

New cards
51

IRQ

The _____ causes the main program to stop what it is doing and to prepare for a new task.

New cards
52

Cross Domain Solutions

Offers information assurance while providing the ability to manually or automatically access or transfer information between two or more differing security domains.

New cards
53

Controlled Interface

The system operated between two different network enclaves, but they have the same security classficiation.

New cards
54

Transfer

This type of CDS is used to move data from one security domain to another, must go from lower to higher.

New cards
55

Access

This type of CDS allows a user to login to their choice of security domain.

New cards
56

Internetworking

The capability to share data over different networks.

New cards
57

Multi-level

This type of CDS allows a user to initiate multiple simultaneous login sessions to differing security domains.

New cards
58

Flat model

This type of database schema organizes data in a single, two-dimensional array.

New cards
59

Normalization

The process of analyzing how to make databases more efficient by using separate tables to reduce redundant data.

New cards
60

Relational database

This type of database allows data to be separated and connected across several tables.

New cards
61

Reusability, Interoperability, Scalability/Flexibility, and Cost Efficiency

Benefits of Service Oriented Architecture

New cards
62

High-level languages

More user-friendly and offer a larger portability across various platforms, not limited by computer hardware.

New cards
63

Semantics

Deal with the meaning each set of characters convey when arranged in a particular way.

New cards
64

AFQTP

Instructional course designed for use at the unit to qualify or aid qualification in a duty position, program or on a piece of equipment.

New cards
65

AFJQS

Comprehensive task list describing a particular job type or duty position. Supervisors use the ______ to document task qualification.

New cards
66

Bounded (guided) and Unbounded (wireless)

The two different categories of media

New cards
67

PKI

Uses a combination of symmetric and asymmetric algorithms to generate keys necessary to ensure authentication and protection of encrypted messages.

New cards
68

asymmetric

Consists of a public key, which is freely available, and a private key, which is kept secret.

New cards
69

Registration Authority

Certified by a root CA to issue certificates for uses permitted by the CA

New cards
70

Key Archival Server

Saves encrypted private keys in a certificate database for disaster recovery purposes in case the Certificate Database is lost.

New cards
71

Certificate Revocation List

This designates revoking a certificate which invalidates a certificate before its expiration date.

New cards
72

Somewhere you are

Location based authentication factor.

New cards
73

Something you do

Performance-based version of authentication.

New cards
74

Identity credential, e-mail encryption, and Digital signature

Three types of credentials on our CACs

New cards
75

CAC Management

______ _______ is the set of functions necessary to manage the card and middleware environment, such as PIN changes and PIN timeouts.

New cards
76

Password guidelines

Defines Password complexity, history, duration, protection, and consequences.

New cards
77

Storage and Virtualization

Manage virtual environments within datacenters. Create virtual machines and perform the tasks of backups, recovery and archiving.

New cards
78

Monitoring

Provides situation awareness to all components, systems and network devices.

New cards
79

Information Assurance

Ensures the security posture of the AF network enabling CIA, non-repudiation and authentication.

New cards
80

System and User Accounts Services

Responsible for managing system accounts, including SAM, GPO, SSLA’s, MOUs, PKI, etc…

New cards
81

Security

Maintains and implements security fixes, updates, operating system patches and antivirus software.

New cards
82

Classified Message Incidents

Caused when classified information was inadvertently placed on unclassified systems.

New cards
83

Time Compliance Network Orders (TCNO)

The AF deploys updates and patches as a ______ against any weaknesses or vulnerabilities discovered on the network.

New cards
84

Contingency Operations

Identify and analyze targets as well as exploits of the adversary’s network operations and systems based on rules of engagements (ROEs).

New cards
85

Strategic and Budget Planning

Manages, supervises, and performs planning and implementation activities for the network.

New cards
86

Proactive Defense

Conducts continuous monitoring of AF network traffic for response time, throughput and performance to ensure timely delivery of critical information.

New cards
87

Network Standardization

Creates and maintains standards and policies to protect networks, systems and databases reducing maintenance complexity, down-time, costs, and training requirements.

New cards
88

Interpreted Language

Code is saved in the same format entered and does not need to be compiled before execution

New cards
89

Compiled Lanaguage

Translates the program directly into machine code specific to the target computers CPU

New cards

Explore top notes

note Note
studied byStudied by 25 people
... ago
5.0(1)
note Note
studied byStudied by 7375 people
... ago
4.6(5)
note Note
studied byStudied by 8 people
... ago
5.0(1)
note Note
studied byStudied by 34 people
... ago
5.0(1)
note Note
studied byStudied by 14 people
... ago
5.0(1)
note Note
studied byStudied by 5 people
... ago
5.0(1)
note Note
studied byStudied by 10 people
... ago
5.0(1)

Explore top flashcards

flashcards Flashcard (20)
studied byStudied by 10 people
... ago
5.0(1)
flashcards Flashcard (21)
studied byStudied by 18 people
... ago
5.0(2)
flashcards Flashcard (76)
studied byStudied by 9 people
... ago
5.0(1)
flashcards Flashcard (44)
studied byStudied by 7 people
... ago
5.0(1)
flashcards Flashcard (26)
studied byStudied by 52 people
... ago
5.0(2)
flashcards Flashcard (31)
studied byStudied by 4 people
... ago
5.0(1)
flashcards Flashcard (88)
studied byStudied by 6 people
... ago
5.0(1)
flashcards Flashcard (51)
studied byStudied by 6 people
... ago
5.0(1)
robot