1/88
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Skill level
_____ Specifies the degree of experience an individual obtained within a particular AFSC.
General Military knowledge (PFE) and Hands on job knowledge (SKT)
What does PFE and SKT measure?
NVRAM
Category of RAM that retains its stored data even when the power is switched off.
Scripting/Powershell
Is designed to automate system tasks and create system management tools for implementing processes?
ROM
Memory not directly accessible by the computer.
PFE 100, SKT 100, Awards/Decorations 25, and EPR 250
What are the WAPS factors? How many points for each?
Mission Defense Team
Is responsible for mission assurance at the base-level and focuses on defensive cyber operations of Air Force weapons systems.
Time Compliance Technical Orders
Are used to change or modify AF network equipment to meet security standards or protect information systems from threats identified by network security intrusion and restoration tools (deters, detect, isolate and recover).
Boundary Protection
Main focus of this job/team is to allow traffic to flow in and out of a specific boundary while also keeping that traffic and network safe.
Infrastructure
Employs defensive security policies on networking components physically and virtually from the AF gateway service delivery point to the base boundaries.
Syntax
The way symbols, words and characters are formed within each programming language.
Low level languages
Code is easily and readily executed by the computer without any assistance from any other program.
Server Oriented Architecture
Following relies on a business process to link and sequence services (known as orchestration) to meet a new or existing business system requirement?
Cyberspace Vulnerability Assessment / Hunter
Which weapon system is designed to identify vulnerabilities and provide commanders with a comprehensive assessment of the risk of existing vulnerabilities on critical mission networks.
Common Access Card
Device holds your digital certificates allowing you to log into military networks.
NoSQL
These types of databases are optimized specifically for applications that require large data volume, low latency, and flexible data models, which are achieved by relaxing some of the data consistency.
CLI
Is a text-based interface allowing a user to type commands directly to the operating system and the system responds by carrying out those commands.
Static Ram
Is a memory chip within the computer system responsible for storing data on a temporary basis so it can be promptly accessed by the CPU.
UEFI
Offers secure boot preventing the computer from booting from unauthorized applications which prevents rootkits.
Markup Language: XML and HTML
Is a modern system for annotating a document in a way syntactically
C3MS
The single Air Force weapon system providing overarching 24/7 situation awareness, management and control of the Air Force portion of the cyberspace domain. It ensures unfettered access, mission assurance, and join warfighter use of networks and information processing systems to accomplish worldwide operations.
Server
Powerful computer providing specific resources or services to other computers
LAN
A group of computers and/or other devices connected within a single physical location or within a small geographical area.
Router
Learns which computer (node is connected to what port saving the information in an internal table.
Symmetric
Allows the key to accomplish both encryption and decryption. Therefore, each user must possess the same key to send and open encrypted messages.
certification authority
Serves as the root of trust to authenticate the identity of individuals, computers and other entities in the network.
Middleware
A general term for computer software providing services to software applications beyond those available from the operating system.
TCP
Provides reliable data delivery services. A connection must be established between communicating nodes before data is transmitted.
Client
Computer or device on the network requesting resources or services from another computer or device within the network.
DHCP
Designed to reduce configuration time by automatically assigning each computer an IP address from the list of available addresses.
WLAN
Use modulation technologies based on radio waves permitting communications with other wireless nodes within a limited geographical area.
Router X2
Internetworking device used to connect networks of different types.
Certificate Database
Saves certificate requests issued and revoked certificates from the RA or CA
Something you know
This authentication factor is the most common form.
Something you are
This factor uses a physical attribute to verify somebody.
Password History
This will identify the policy on reusing a password such as how many different passwords must be used before you can reuse one you use previously.
Network Address
This address is the designation used in routing to send packets to a remote network.
TCP/IP
The most popular networking protocol utilized on modern networks today.
Host/Device/Node
Any connected network device
Subnet mask
Is used to determine the part of the address used for the network and the part of the address used for the host.
Cyberspace Defense Analysis (CDA)
This Cyber weapon system supports OPSEC and conducts defensive cyberspace operations. Through monitoring, collecting, analyzing, and reporting on sensitive information released from friendly unclassed systems.
Air Force Intranet Control (AFINC)
This cyber weapons system is the top-level boundary and entry point into the Air Force Information Network, and controls the flow of all external and inter-base traffic through standard, centrally managed gateways.
Air Force Cyberspace Defense (ACD)
This cyber weapons system is designed to prevent, detect, respond to, and provide forensics of intrusions into unclassified and classified networks.
Cyber Security and Control System (CSCS)
This cyber weapon system is designed to provide 24/7 network operations and management functions and enable key enterprise services within Air Force unclassified and classified networks.
Directory Services
This provides basic authentication and accessibility to clients in a domain and provides other domain services such as control, security policies & settings, and software updates.
Vulnerability Management
This Improves security posture of AFIN by conducting rapid, positive ID and notification to mitigate network and information system vulnerabilities and denies adversary access to friendly terrain.
Sandbox
This type of language allows for testing and is provided for applications running in an independent _________ environment.
Join Publication 1-02
Defines a weapon system as “a combination of one or more weapons with all related equipment, materials, services, personnel, and means of delivery and deployment (if applicable) required for self-sufficiency”.
BIOS
The collective name for the hundreds of tiny programs telling your CPU everything.
CMOS
Contains the computer’s inventory list and advanced setup options.
IRQ
The _____ causes the main program to stop what it is doing and to prepare for a new task.
Cross Domain Solutions
Offers information assurance while providing the ability to manually or automatically access or transfer information between two or more differing security domains.
Controlled Interface
The system operated between two different network enclaves, but they have the same security classficiation.
Transfer
This type of CDS is used to move data from one security domain to another, must go from lower to higher.
Access
This type of CDS allows a user to login to their choice of security domain.
Internetworking
The capability to share data over different networks.
Multi-level
This type of CDS allows a user to initiate multiple simultaneous login sessions to differing security domains.
Flat model
This type of database schema organizes data in a single, two-dimensional array.
Normalization
The process of analyzing how to make databases more efficient by using separate tables to reduce redundant data.
Relational database
This type of database allows data to be separated and connected across several tables.
Reusability, Interoperability, Scalability/Flexibility, and Cost Efficiency
Benefits of Service Oriented Architecture
High-level languages
More user-friendly and offer a larger portability across various platforms, not limited by computer hardware.
Semantics
Deal with the meaning each set of characters convey when arranged in a particular way.
AFQTP
Instructional course designed for use at the unit to qualify or aid qualification in a duty position, program or on a piece of equipment.
AFJQS
Comprehensive task list describing a particular job type or duty position. Supervisors use the ______ to document task qualification.
Bounded (guided) and Unbounded (wireless)
The two different categories of media
PKI
Uses a combination of symmetric and asymmetric algorithms to generate keys necessary to ensure authentication and protection of encrypted messages.
asymmetric
Consists of a public key, which is freely available, and a private key, which is kept secret.
Registration Authority
Certified by a root CA to issue certificates for uses permitted by the CA
Key Archival Server
Saves encrypted private keys in a certificate database for disaster recovery purposes in case the Certificate Database is lost.
Certificate Revocation List
This designates revoking a certificate which invalidates a certificate before its expiration date.
Somewhere you are
Location based authentication factor.
Something you do
Performance-based version of authentication.
Identity credential, e-mail encryption, and Digital signature
Three types of credentials on our CACs
CAC Management
______ _______ is the set of functions necessary to manage the card and middleware environment, such as PIN changes and PIN timeouts.
Password guidelines
Defines Password complexity, history, duration, protection, and consequences.
Storage and Virtualization
Manage virtual environments within datacenters. Create virtual machines and perform the tasks of backups, recovery and archiving.
Monitoring
Provides situation awareness to all components, systems and network devices.
Information Assurance
Ensures the security posture of the AF network enabling CIA, non-repudiation and authentication.
System and User Accounts Services
Responsible for managing system accounts, including SAM, GPO, SSLA’s, MOUs, PKI, etc…
Security
Maintains and implements security fixes, updates, operating system patches and antivirus software.
Classified Message Incidents
Caused when classified information was inadvertently placed on unclassified systems.
Time Compliance Network Orders (TCNO)
The AF deploys updates and patches as a ______ against any weaknesses or vulnerabilities discovered on the network.
Contingency Operations
Identify and analyze targets as well as exploits of the adversary’s network operations and systems based on rules of engagements (ROEs).
Strategic and Budget Planning
Manages, supervises, and performs planning and implementation activities for the network.
Proactive Defense
Conducts continuous monitoring of AF network traffic for response time, throughput and performance to ensure timely delivery of critical information.
Network Standardization
Creates and maintains standards and policies to protect networks, systems and databases reducing maintenance complexity, down-time, costs, and training requirements.
Interpreted Language
Code is saved in the same format entered and does not need to be compiled before execution
Compiled Lanaguage
Translates the program directly into machine code specific to the target computers CPU