Upgrade to remove ads
Block 1 Study Guide - Client Systems
Terms in this set (79)
3D1X1 is a relatively new career field and was established in?
An AFSC is a code consisting of five distinct positions what are they in order?
1.Career Group , 2.Career Field , 3.Career Field Subdivision , 4.Skill Level , 5.Specialty Code
What are some day to day task done as a client systems technician?
• Performing client-level information technology support functions, and managing
hardware and software.
• Performing configuration, management, and troubleshooting.
• Removing and replacing components and peripherals to restore system operation.
• Installing and configuring software operating systems and applications.
• Providing service to end-users for operation, restoration, and configuration of
• Reporting security incidents and executing corrective security procedures.
• Remove and replaces telephone instruments. • Plan, organize, and direct sustainment activities.
• Establish work standards, methods, and controls for preventative, scheduled, and
unscheduled maintenance actions.
• Determine extent and economy of repair of malfunctioning equipment.
• Ensure compliance with technical data, instructions, and work standards.
• Develop and enforce safety standards.
• Interpret malfunctions and prescribe corrective actions.
• Serve on or direct inspection teams organized to evaluate base or command sustainment
• Manage or perform research and development projects for assigned systems.
• Coordinate and document repairs.
• Manage, administer, control, and evaluate contracts
• Manage, supervise, and preform planning and implementation activities. • Manage implementation and project installation and ensure architecture, configuration
and integration conformity.
• Develop, plan, and integrate base communications systems.
• Serve as advisor at meetings for facility design, military construction programs and minor
• Evaluate base comprehensive plan and civil engineering projects.
• Monitor status of base civil engineer work requests.
• Perform mission review with customers.
• Control, manage, and monitor project milestones and funding from inception to
• Determine adequacy and correctness of project packages and amendments.
• Monitor project status and completion actions.
• Manage and maintain system installation records, files, and indexes.
• Evaluate contracts, wartime, support, contingency and exercise plans to determine impact
on manpower, equipment, and systems.
What is the term for each skill level 1,3,5,7,9 .
What is the earliest rank you can take on those skill levels?
1.BMT Helper (AB) 3.Apprentice (Amn) 5.Journeyman (A1C) 7.Craftsman (Ssgt) 9.Superintendant (SmSgt)
What is a decision-making process to systematically evaluate possible courses
Risk Management (RM)
The prevailing AFOSH standard is?
What is designed to minimize the loss of Air Force resources and to protect
Air Force personnel from occupational deaths, injuries, or illnesses?
The AFOSH program
The AFOSH program was build off of its related counterpart ___________.
True or False? Your job as a Client System Technician (CST) will place you in some potentially dangerous
There are the three factors that are measured when considering human factors in safety , what are they?
psychological, physical, and organizational
IAW AFI 48-145
Occupational and Environmental Health Program
True or False? Falls are the greatest office hazard.
If you see a sign or label depicting "DANGER HIGH
VOLTAGE", it is an indication that the voltage in that
600 volts or more
Air Force Consolidated Occupational Safety
A general term used to represent new and significant technological developments that in effect,
broach new territory in some significant way within a particular field.
A technology that remains the same but improves over time.
A technology that causes another technology to become redundant.
Law that states microprocessor technology doubles
every 18 months.
Why must you stay up to date as a (CST)?
You may be called upon to implement or test a new technology
and provide feedback to a project manager for feasibility.
How can you stay up to date on new technology?
Reading and Research
organization wholly dedicated
to leading the discovery, development, and integration of war fighting technologies for our air, space, and
Air Force Research Laboratory (AFRL),
AF Standard Installation Practice Technical
Complex installations are
Air Force Engineering & Installation (E&I)
Simple installations are normally accomplished at?
the base level using generic
Communications Squadron resources.
______ teams provide installation of cyberspace capabilities on DOD and other government
locations. They also design, engineer, and install the full range of cyberspace equipment and
components typically found at a fixed site and other specialty systems unique to expeditionary
forces. They also provide engineering expertise to document and design projects. Also they insure installations are accomplished in accordance with military standards,
applicable commercial standards, and AF SIPTOs. Compliance with these standards is enforced
by an active Quality Assurance (QA) program and E&I Evaluation Program.
The functional and/or physical characteristics of hardware and software as set
forth in technical documentation and achieved in a product.
The orderly evaluation coordination as well as the approval or
disapproval of all approved changes in the configuration of a base-lined configuration item (CI).
It is also the implementation of approved changes.
The current approved or conditionally approved technical
documentation for a configuration item as set forth in specifications, drawings and associated
lists, and documents referenced therein.
Is a combination of hardware and/or software, or any portion
thereof, which satisfies a function and is designated for configuration control, and items that
reflect the current approved configuration of military systems and/or commodities currently in
the Air Force operational inventory. CIs require the use of the latest T.O. information listed in
the appropriate T.O. Index.
Configuration Item (CI)
Configuration management is the process of maintaining a piece of equipment in the same
configuration throughout its life-cycle, as originally procured, to perform the mission intended of
The physical linking of a carrier's
network with equipment or facilities not belonging to that network.
Why are wires coated with different colors?
Wires are coated with insulation in different colors to help identify each wire
Cables will be marked at both ends with two separate identification markings. How will they be marked and where will they be marked?
The first marker
(label) will be placed nearest to the connector (within 12 inches) and will be marked "TO" and
will indicate the bay, equipment shelf, terminal block, and plug or jack to which the connector
will mate. The second marker will be placed within two inches of the first and will be marked
"FROM". It will indicate the same information such as the bay, equipment shelf, and jack or
plug at the originating source.
There are two categories for cable labeling what are they?
permanent and temporary
markings are done for the benefit of operations and maintenance personnel
and will be applied by either heat transfer method or adhesive labels?
marking of a cable is done for use during the installation process and is
normally accomplished using cable tags, which are removed once the cables are
What do you use for basic testing to verify connectivity and
test for faults like opens, shorts and reversed, crossed, or
LOCAL AREA NETWORK TESTER
What is used to measure the fiber optic loss for both single mode and
multimode fiber cables?
What induces a warbling tone through the copper conductor,
and the inductive amplifier is used to locate the sound
of the tone on the particular pair or wire the tone
generator is connected to.
TONE GENERATOR KIT
What magnifies the sound sent from the tone generator.
What is used for stripping insulated Ethernet cables such as CAT5 and CAT6
and terminating or "crimping "on connectors like the RJ45.
What connector is probably best known for
its use in Ethernet applications.
What is the provision of a low-impedance conductive path between the earth and the
The establishment of a low-impedance path between two metal surfaces.
The use of conductive enclosures or sheaths to reduce radiating electromagnetic
Is the system of carriers (conduits, ducts, etc.) that are
used to distribute National Security Information (NSI) between two or more controlled areasand Offers physical security
to classified information versus electronic security, such as cryptography.
Protected Distribution Systems (PDS)
There are two categories of PDS they are?
Hardened Distribution Systems, and Simple Distribution
There are three different carrier forms they are?
Hardened Carrier, Alarmed Carrier, and Continuously Viewed
In a _________ Carrier, the data cables are installed in a carrier constructed
of electrical metallic tubing (EMT), ferrous conduit or pipe, or ridged sheet steel ducting.
An _________ Carrier
may be constructed to automate the inspection process through electronic monitoring with an
A __________ Carrier is one that is under continuous
observation, 24 hours per day (including when operational).
are afforded a reduced level of physical security protection and use
a Simple Carrier System.
Simple Distribution Systems
RED data or voice lines are lines that carry ___________
unencrypted classified traffic
BLACK data or voice
lines are lines that carry either ________________
encrypted classified or unclassified traffic
The RED/BLACK concept has two parts __________ and ___________ separation.
Physical separation and electrical Separation
the minimum guidance established to decrease the probability that electromagnetic emissions from RED devices will couple to BLACK systems.
ensures every signal conductor from a RED device is routed to another RED device or
is encrypted before connection to a BLACK device.
an unclassified term and a US government code word that identifies a classified set
of standards for limiting electric or electromagnetic radiation emanations from electronic
The discipline under Information Assurance (IA) that results from measures and
controls taken to deny unauthorized persons information derived from telecommunications, and
to ensure the authenticity of such telecommunications.
The part of COMSEC that results from using all physical measures
necessary to safeguard COMSEC material from access by unauthorized persons.
The component of COMSEC resulting from the provision and proper use of
technically sound crypto systems.
An occurrence involving failure to follow established COMSEC
instructions, procedures, or standards.
The individual within an office or area responsible for
COMSEC Responsible Officer (CRO)
The individual responsible for managing the COMSEC resources of a
The principle of
safeguarding and accounting for all COMSEC material must be strictly adhered to in order to
ensure COMSEC material does not fall into the wrong hands. True or False?
Form used for the transfer,
inventory, destruction, or hand-receipt of COMSEC material.
Standard Form (SF) 153
Form used to inventory the contents of your security container.
AFCOMSEC Form 16
Form used to annotate the opening and closing of the secure storage container.
The SF 702
Form for Top Secret Cover
AF Form 144
Form for Secret Cover Sheet
SF Form 704
Form for Confidential Cover
SF Form 705
Classified material not under the personal control and observation of an authorized person must
be stored in a
General Services Administration (GSA) approved container
1.This material, when compromised, could cause exceptionally grave damage to the mission and
2.What Could cause serious damage to the mission and national security?
3. What could cause damage to the mission and national security?
1.Top Secret Material
2. Secret Material
3. Confidential Material
Top Secret Material may NOT be sent through the mail under any circumstances. True or False?
The destruction of COMSEC material must be completed
within __ hours of expiration date.
Comsec material must be destroyed by pulping , burning or cross - shredding.
What is encryption?
Encryption refers to algorithmic schemes that turns ordinary data
(plaintext) into a coded format (cipher text).
The key used by the receiver to decrypt the message must
be a mirror image of the key that was used to encrypt the message by the transmitter.
Symmetric or Secret-Key Systems
Unlike the secret-key system, which uses the same keys
for encryption/decryption, the public-key system uses two different keys: a public-key for
encryption and the private-key for decryption.
Asymmetric or Public-Key Systems
What makes one encryption algorithm better than another one?
YOU MIGHT ALSO LIKE...
ISSEP IA Governance
CH. 2 Systems Integration
ISSEP - Large Set
MIS chapters 10, 11, 12
OTHER SETS BY THIS CREATOR
block 4 ports
Block 3 Unit 1
Security + Chapter 3 "Darrel Gibson" Part 1
Block 2 OBJ 1A