Term
| What Act supports the public's right to information concerning the activities of the government? |
|
Definition
| The Freedom of Information Act. |
|
|
Term
| On what basis does the success or failure of an organization in industry, government, or military often depend? |
|
Definition
| Quality of information only |
|
|
Term
| Which Freedom of Information Act exemption includes information that is properly and currently classified in the interest of national defense or foreign policy? |
|
Definition
|
|
Term
| Which Freedom of Information Act exemption includes information in personnel and medical files? |
|
Definition
|
|
Term
| Which Freedom of information Act exemption includes information compiled for law enforcement purposes? |
|
Definition
|
|
Term
| What term do we use for neither confirming nor denying, or nonexistence, of a record being requested under the provisions of the Freedom of Information Act? |
|
Definition
|
|
Term
| What Act requires the DoD to establish goals for improving the efficiency and effectiveness of using information technology? |
|
Definition
|
|
Term
| When did the maturing role of the Joint Task Force-Computer Network Defense become evident? |
|
Definition
| During the Melissa virus incident. |
|
|
Term
| What specific process must information managers ensure complies with Federal laws internal policies? |
|
Definition
|
|
Term
| What is critical to making correct operational command and control decisions? |
|
Definition
|
|
Term
| What are the types of sets of customers an information manager always has? |
|
Definition
|
|
Term
| What is defined under cognitive hierarchy as "useless alone," unless you can make sense of it? |
|
Definition
|
|
Term
| What class under cognitive hierarchy includes analyzing and filtering? |
|
Definition
|
|
Term
| What class under cognitive hierarchy includes assessing meaning through the application of cognition? |
|
Definition
|
|
Term
| What class under cognitive hierarchy includes applying judgement to fill in the gaps to arrive at a complete image of the situation? |
|
Definition
|
|
Term
| Approximately what percentage of Information Management personnel are outside of their functional area? |
|
Definition
|
|
Term
| From whom do group IM points of contact seek assistance, when IM training deficiencies are identified? |
|
Definition
|
|
Term
| What program involves managing manpower resources allocated to your unit in support of approved mission and levels of service within organizational and resource constraints? |
|
Definition
|
|
Term
| What document reflects the status of required and authorized manpower strenghs for field units within a MAJCOM? |
|
Definition
|
|
Term
| What is the job title assigned to each position number? |
|
Definition
|
|
Term
| In an Extended Unit Manning Document, what is used for manning and assignment purposes? |
|
Definition
|
|
Term
| Which tool is used to folder information management personal growth, as well as obtain a breadth of experience? |
|
Definition
|
|
Term
| With what individual from the affected units do you coordinate personnel moves in support of Information Management job rotations? |
|
Definition
|
|
Term
| As a functional manager, what specific term do we use to identify hightly qualified Information Management individuals from which to collect career field knowledge and information? |
|
Definition
|
|
Term
| As a functional manager, what is the key in selecting the right person to be a subject matter expert? |
|
Definition
|
|
Term
| Who administers the installation records management program? |
|
Definition
|
|
Term
| How often should the functional area records manager ensure each office of record receives a staff assistance visit? |
|
Definition
| At least once every 24 months |
|
|
Term
| As a minimum, how often must a records custodian receive refressher records management training? |
|
Definition
|
|
Term
| For how long is an individual appointment to a records custodian position? |
|
Definition
|
|
Term
| What is the goal of the Utilization and Training Workshop? |
|
Definition
| Establish a viable CFETP. |
|
|
Term
| What is an effort to determine the most effective and efficient way to ensure training standards and skill level requirements of the IM career field are accurate and being met? |
|
Definition
|
|
Term
| What are the results of a Utilization and Training Workshop? |
|
Definition
| Updated and/or revised training materials. |
|
|
Term
| What are conducted to ensure all IM personnel are kept abreast of career field changes, local policies, training opportunities, and other related information? |
|
Definition
|
|
Term
| Who do you work with to initiate a home page for enlisted Information Management issues? |
|
Definition
|
|
Term
| What is an efficient way to reach all wing and associated IM personnel to communicate IM related information? |
|
Definition
|
|
Term
| What can be a useful tool to assess the status quo of an Information Management functional area? |
|
Definition
|
|
Term
| Who acts as the advocate to ensure information Managers have every opportunity to attend training classes and trade shows? |
|
Definition
|
|
Term
| Where is the Information Management Seminar held? |
|
Definition
|
|
Term
| Who should attend the IM Seminar? |
|
Definition
|
|
Term
| Where do most information managers work? |
|
Definition
| Staff support functions only. |
|
|
Term
| Who should you contact if you are having programs with funding or justifying your attendance for the Information Management Seminar? |
|
Definition
| MAJCOM functional manager |
|
|
Term
| Where do most information managers work? |
|
Definition
| Staff support functions only. |
|
|
Term
| Which of the following has an overriding goal of ensuring their co-workers and commanders have the information they need, when they need it, to accomplish the Air Force warfighting mission? |
|
Definition
| Information Management community. |
|
|
Term
| Who functionally manages IM personnel at a deployed location? |
|
Definition
|
|
Term
| Who acts as the advocate to ensure info managers have every opportunity to attend training classes and trade shows? |
|
Definition
|
|
Term
| Where is the Information Management Seminar held? |
|
Definition
|
|
Term
| Who should attend the IM Seminar? |
|
Definition
|
|
Term
| Who should you contact if you are having problems with funding or justifying your attendance for the Information Management Seminar? |
|
Definition
| MAJCOM functional manager. |
|
|
Term
| Where do most information managers work? |
|
Definition
| Staff support functions only. |
|
|
Term
| Which of the following has an overriding goal of ensuring their co-workers and commanders have the information they need, when they need it, to accomplish the AF warfighting mission. |
|
Definition
| Information Management Community. |
|
|
Term
| Who functionally manages IM personnel at a deployed location? |
|
Definition
|
|
Term
| Which of the following provides the data formats and instruction-processing specifications required to represent and manipulate data to meet information technology mission needs? |
|
Definition
| Information Processing Standards |
|
|
Term
| What is the most common local area network technology in use with Transmission Control Protocol/ Internet Protocol. |
|
Definition
|
|
Term
| Which Institute of Electrical and Electronics Engineers standard covers CSMA/CD? |
|
Definition
|
|
Term
| Which Protocol provides a reliable connection-oriented service? |
|
Definition
|
|
Term
| Which Institute of Electrical and Electronics Engineers standard provides a common set of operational rules for airwave interoperability? |
|
Definition
|
|
Term
| Which protocol is normally used with networked printers? |
|
Definition
|
|
Term
| According to the commercial building wiring standard, what are the 2 ways of terminating the ends of twisted pair cable? |
|
Definition
|
|
Term
| What specific type of computer interface is preferred due to its flexibility and is also more responsive to user needs? |
|
Definition
|
|
Term
| What has a core mission to achieve info superiority by affecting adversary info, info-based processes, info systems, and computer-based networks while defending one's own info system? |
|
Definition
|
|
Term
| Which of the following is the degree of dominance in the info domain which allows friendly forces the ability to collect, control, exploit, and defend info without effective oppositions? |
|
Definition
|
|
Term
| As info managers, what can we do to help the NCC better assist with our networking problems? |
|
Definition
| Providing them w/ reliable info. |
|
|
Term
| How do we identify nodes on a physically connected network? |
|
Definition
|
|
Term
| What is the official addressing method for the internet? |
|
Definition
|
|
Term
| What type of address identifies both the indv. node and the network to which the node is attached? |
|
Definition
|
|
Term
| What year has DoD established as a goal for all DoD networking to transition to the next generation of the Internet Protocol? |
|
Definition
|
|
Term
| What type of addressing provides the translation between a computer's internet protocol (IP) address and the computer's host name? |
|
Definition
|
|
Term
| To which group do TCP ports 0-1023 belong? |
|
Definition
|
|
Term
| Which TCP port is used to download files through file transfer protocol? |
|
Definition
|
|
Term
| What type of address identifies both the indv. node and the network to which the node is attached? |
|
Definition
|
|
Term
| Which transmission control protocol port is used for HTTPS? |
|
Definition
|
|
Term
| Which of the following is a standard first step in resolving a network problem? |
|
Definition
| Eliminate the user as the source of the problem. |
|
|
Term
| what are the most common TCP/IP diagnostics commands? |
|
Definition
|
|
Term
| What is the formal declaration by the Designated Approving Authority that an automated info system is approved to operate in a particular security mode using a prescribed set of safeguards and should be strongly based on the residual risks identified duri |
|
Definition
|
|
Term
| What is the measure of confidence security features, attributes, and fucntions enforced through security policy provide? |
|
Definition
|
|
Term
| which of the following is a standardized phase of the DoD Information Technology Security Certification and Accreditation Process? |
|
Definition
|
|
Term
| What is the major key to the World Wide Web's popularity? |
|
Definition
|
|
Term
| From which of the following languages does HTML form its roots? |
|
Definition
|
|
Term
| What main sections do all Hypertext Markup Language files contain? |
|
Definition
|
|
Term
| WHat are the 2 main types of graphics files used on web pages? |
|
Definition
|
|