EIWS Common Core

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Battle of the Coral Sea

7-8 May 1942: Worlds first carrier vs. carrier battle. Thanks to the breaking of the Japanese navy code.

The Attack on the USS LIBERTY

8 June 1967- Israel mistakenly attacked USS Liberty by Jet fighters and torpedo boats.

Discuss how long a Commanding Officer can administratively suspend access before DONCAF revokes a clearance.

90 Days

Define HAZMAT

A hazardous material is any item or agent (biological, chemical, physical) which has the potential to cause harm to humans, animals, or the environment, even by itself or through interaction with other factors.

Discuss GINGERBREAD and explain the procedures involved.

A term advising-net participants that there may be a possible intruder on the radio net. — When an operator recognizes or suspects that net is being subject to ICD, they will: — Announce GINGERBREAD on the net — Give the call sign of the suspected deception station — Authenticate the stations on the net — Notify the radio supervisor and make an entry on the circuit log — Notify the Communications Officer and request further instructions — Secure voice nets are normally exempt from GINGERBREAD, however, GINGERBREAD may be used if necessary.

Chief of Naval Operations

Responsible to the Secretary of the Navy and Chairman of the Joint Chiefs of Staff for operational commitments and readiness of the Navy. Issues Navy-wide order relating to Navy Operations and Administrative functions of the Navy.

Strike Group Oceanography Team (SGOT)

Provide timely, comprehensive, and tactically relevant meteorological and oceanographic (METOC) products in direct support of Numbered Fleet / Navy Component Commanders.

Mobile Environmental Team (MET)

Provides (METOC) information and forecasts for current operational use, forecast tactical decision-making, and climatological (statistical) information for long-range planning and design purposes.

State the purpose of a HAZREP message

Provides a means for a unit discovering a hazardous condition or experiencing a near-mishap.

Explain the purpose of the PAO.

Provides correspondence for the military to the media and community.

Role of NSC

Provides operating surveillance, navigation, communication, environmental transportation and information systems

State the goal of the Navy's Hearing Conservation Program

The goal of the hearing conservation program (HCP) is to prevent occupational hearing loss and assure auditory fitness for duty of all Navy personnel

Explain the purpose of FES.

Responsible for the installation, removal, maintenance and repair of Cryptologic Direct Support Element (CDSE) electronic equipment on surface and subsurface combatants.

TYCOM

Responsible for the operations of their specific platform. for example, Surface, Air, Submarine, and Expeditionary

Secretary of the Navy

Responsible to the President for all matters pertaining to the operations and readiness of Navy Forces.

a. ADNS/CUDIXS

i. Automated Digital Networking System. The primary function of the ADNS is to connect Navy shipboard networks to other ship and shore networks for transferring Internet Protocol (IP) data of various classification levels. ii. CUDIXS - COMMON USER DIGITAL INFORMATION EXCHANGE SUBSYSTEM provides a 2400 baud full duplex interface, over a UHF satellite link with mobile platforms, for the receipt and transmission of narrative message traffic between FMX and mobile platforms equipped with afloat automated systems. Classified as Top Secret High.

Explain Intelligence Oversight and state the publications that govern it

o Intelligence oversight involves a balancing of two fundamental interests: obtaining the intelligence information required to protect national security and protecting individual rights guaranteed by the Constitution and the laws of the United States. -EO 12333: United States Intelligence Activities -DOD 5240.1-R: Procedures Governing the Activities of DoD -Intelligence Components That Affect United States Persons -SECNAVINST 3820.3E: Oversight of Intelligence Activities within the Department of the Navy -USFF 5041 9C

State the name of the first submarine used in Naval Warfare

Turtle in 1776.

Define the roles of the U. S. Navy Blue and Red teams.

Red Team: Conduct adversarial assessments on their own networks. These red teams are certified by the National Security Agency and accredited by the United States Strategic Command. This certification and accreditation allows these red teams to conduct the adversarial assessments on DoD operational networks, testing implemented security controls and identifying vulnerabilities of information systems. These cyber red teams are the "core of the cyber OPFOR". Blue Team: Refers to the internal security team that defends against both real attackers and Red Teams.

List the duties and responsibilities of the SSO.

Supervises the operation of the special security office and administers the SCI security program to include SCI security oversight for other local SCIFs under the organizational SCI security cognizance. Maintains applicable SCI directives, regulations, manuals, and guidelines to adequately discharge SSO duties and responsibilities. Serves as the official channel for certifying and receiving SCI visitor clearances/accesses. Conducts or otherwise manages SCI personnel, information, physical, and technical security actions and procedures according to the M-1. Provides guidance and assistance for processing SCI position and eligibility requests. Conducts SCI security briefings, indoctrinations, and debriefings; obtains signed Nondisclosure Agreements; and performs other related personnel security actions. Investigates SCI security infractions, making recommendations and preparing required reports.

Discuss the responsibilities of the command OPSEC Officer.

The OPSEC Officer is responsible for administering the OPSEC Program. Advise the Commanding Officer on all OPSEC matters. Conduct and coordinate OPSEC surveys, education and training Coordinate the development of the OPSEC related portions of operations, plans and orders Maintain a compilation of OPSEC lessons learned Coordinate intelligence and counterintelligence support, as necessary Provide guidance to Public Affairs Officers for maintaining operations security Lead monthly OPSEC working group meetings to coordinate department action and support Caution personnel on what should or should not be posted on DON publicly accessible web sites and their own personal web sites.

Discuss the National Security Act of 1947

* Established the National Security Council (NSC) * Created the CIA and established its roles * Merged the War and Navy departments into the Dod headed by the secretary of defense, and * Recognized the US Air Force as an independent service from the Army.

Define vulnerability assessment.

- An examination of the ability of a system or application, including current security procedures and controls, to withstand assault. -A vulnerability assessment may be used to: - Identify weaknesses that could be exploited; - Predict the effectiveness of additional security measures in protecting information resources from attack.

Define CCRI and NAVIFOR's role during the process.

- Command Cyber Readiness Inspection: A formal inspection conducted under the direction of USCYBERCOM's Enhanced Inspection Program. Making sure all NIPR and SIPR systems work. - NAVIFORs role: Office of Designation Approving Authority (ODAA) for all cyber networks

Explain the CNO's four core attributes.

- Integrity - Accountability - Initiative - Toughness

Explain the difference between vulnerability and threat.

- Vulnerability: A real weakness in a system or security procedure that could be exploited. - Threat: Any circumstance with the potential to adversely impact through an information system - via unauthorized access, etc.

State RADM Grace Hopper's contributions to the U.S. Navy

-COBOL made it possible for computers to respond to words rather than numbers. -Coined the term debugging.

State the responsibilities of the DDA.

-Designated Disclosure Authority -The DDA has the authority and responsibility to control disclosures of CMI and CUI to foreign governments and international organizations and their representatives or persons sponsored by them.

State the responsibilities of the TSCO.

-Top Secret Control Officer. -Maintain a system of accountability to record the receipt, reproduction, transfer, transmission, downgrading, declassification and destruction of command Top Secret information. -Ensure that inventories of Top Secret information are conducted at least once annually.

State when safe combinations should be changed.

-When a combination lock is first installed or used -Combination has been subjected, or believed to have been subjected to compromise -At other times when considered necessary by the CSA (mainly when an individual has detached from the command or moved out of the office)

Hainan Island EP-3 incident

01 Apr 2001: U.S. recon plane carrying a crew of 24 collided with a Chinese fighter, forcing EP-3 to emergency land in the People's Republic of China.

Define the six steps of Intelligence cycle.

1) Planning and Direction: 2) Collection: 3) Processing and Exploitation: 4) Analysis and Production: 5) Dissemination: 6) Evaluation:

Define the National Intelligence Leadership Structure

1) The DNI: Has overall responsibility for intelligence support to the President and the day-to-day management of the IC. 2) The Under Secretary of Defense for Intelligence (USD[I]): The principal staff assistant and advisor to SecDef on all intelligence. 3) The Director of the DIA: Advices SecDef and Deputy Secretary of Defense, CJCS, CCDRs, and USD[I] on all matters concerning military and military-related intelligence and is the principal DOD intelligence representative in the national foreign intelligence process. 4) The CJCS: Provides direction to the Joint Staff Director for Intelligence, J-2, to ensure that adequate, timely, and reliable intelligence and CI support is available to the JCS and the CCMDs. 5) The Joint Staff Directorate for Intelligence, J-2: a unique organization, in that is both a major component of DIA (a CSA) and a fully integrated element of the Joint Staff.

TCP/IP Model

1. Application Layer - Telnet, FTP, SMTP 2. Transport Layer - TCP, UDP 3. Internet Layer - IP 4. Network Access Layer - Ethernet, Token Ring

Discuss some of the products and services provided by US Naval Observatory to the DOD

1. Astronomy 2. Astronomical 3. Earth Orientation 4. Precise Time

CTG 80.7 Commands

1. Fleet Weather Center (FWC)- Norfolk and San Diego 2. FWC Nofolk- USFF (C2F after 01JUL2018), C4f, and C6f AORs 3. FWC SD - C3F, C5F, and C7F AORs

Discuss Aviation Support products.

1. Flight Weather Briefing (DD175-1 ) 2. Terminal Aerodrome Forecast (TAF) 3. Meteorology Aviation Report (METAR)

Identify the events that should be reported to the SSO.

1. Involvement in activities or sympathetic association with persons which/who unlawfully practice or advocate the overflow or alteration of the United States Government by unconstitutional means. 2. Foreign influence concerns/close personal association with foreign nationals, foreign citizenships, or foreign monetary interests. 3. Sexual behavior that is criminal or reflects a lack of judgment or discretion 4. Unwillingness to comply with rules and regulations or to cooperate with security processing 5. Change of Marital Status or Marriage/Cohabitation with a foreign national.

What are the Maritime Support Products?

1. OTSR Route surveillance message 2. OTSR Route and Divert recommendation 3. Special weather Advisory 4. WEAX 5. OPAREA forecast

What three classes of naval vessels existed at the inception of the navy

1. Ships-of-the-line 64-100 guns 2. Frigates 28-44 guns 3. Sloops-of-war 10-20 guns

Discuss JTWC Tropical support products

1. Significant Tropical Weather Advisory (ABPW/ABIO) 2. Tropical Cycle formation Alert 3. Tropical Cyclone Warning

Identify the 11 pressure points

1. Temples 2. Below jaw 3. Neck (jugular) 4. Between shoulder and neck 5. Upper arm (bicep) 6. Lower arm (inner elbow) 7. Inside wrist 8. Pelvic region 9. Inner thigh 10. Behind Knee 11. Ankle

Discuss Resource Protection products

1. Thunderstorm Watch (T2) 2. Thunderstorm Warning (T1) 3. Severe Thunderstorm Watch (T2) 4. Severe Thunderstorm Warning (T2) 5. Small Craft Warning 6. Gale Warning 7. Storm Warning

Battle of Guadalcanal

13-15 November 1942. 5 Sullivan brothers KIA on USS Juneau. Navy family separation policy reinstated.

The Attack on the USS STARK

17 May 1987, Stark attacked by Iraqi Fighter.

Discuss when and why the Sailor's Creed was developed

1993 at the direction of Chief of Naval Operations Admiral Frank Kelso. This is an important point impacting unity and esprit de corps.

Battle of Midway

4-7 June 1942: Midway was the turning point of the Pacific war

Explain the mission of the DISA

A Combat Support Agency, engineers and provides command and control capabilities and enterprise infrastructure to continuously operate and assure a global net-centric enterprise in direct support to joint war fighters, National level leaders, and other mission and coalition partners across the full spectrum of operations.

GAN

A Global Area Network is a network used for supporting mobile communications across an arbitrary number of wireless LANs, satellite coverage areas, etc. The key challenge in mobile communications is handing off the user communications from one local coverage area to the next. In IEEE Project 802, this involves a succession of terrestrial WIRELESS local area networks (WLAN).

LAN

A Local Area Network is a privately-owned network(s) within a single building or campus of up to a few kilometers.

MAN

A Metropolitan Area Network is a slightly larger LAN expanding its coverage to a group of buildings or a city and may be publicly or privately owned.

State the purpose of Active Directory.

A Microsoft trademarked directory service, it is a centralized and standardized system that automates network management of user data, security, and distributed resources, and enables interoperation with other directories.

Trojan

A Trojan horse, or Trojan, is malware that appears to perform a desirable function for the user prior to run or install but instead facilitates unauthorized access of the user's computer system. "It is a harmful piece of software that looks legitimate. Users are typically tricked into loading and executing it on their systems", as Cisco describes.

WAN

A Wide Area Network is a publicly owned group of networks a large geographical area, often a country or continent.

Backdoor

A backdoor is a program or a set of related programs that a hacker installs on a target system to allow access to the system at a later time.

COCOM (Combatant Commander)

A commander of one of the unified or specified combatant commands established by the President

Worm

A computer worm is a self-replicating malware computer program. It uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. This is due to security shortcomings on the target computer. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

Discuss Spreading in relation to sound traveling through the water

A decrease in the intensity of a wave as it spreads out from a source

Describe what an SDS is and the information it provides

A document that lists. -Hazards of product -Safe use -Chemical properties -What to do if accidents occur -Symptoms of chemical overexposure

Type of investigation for Secret. How often is it updated?

A favorably completed NACLC or ANACI. 10 and 15 year, 10 respectively.

Type of investigation for Confidential. How often is it updated?

A favorably completed NACLC or ANACI. 15 years respectively.

Type of investigation for Top Secret or SCI. How often is it updated?

A favorably completed SSBI Single Scope Background Investigation, SSBI PR (periodic investigation) or PPR (phased PR). 7 years

Discuss Scattering in relation to sound traveling through the water

A name given to a layer in the ocean consisting of a variety of marine animals. It was discovered through the use of sonar, as ships found a layer that scattered the sound and was thus sometimes mistaken for the seabed.

Mesh Topology

A network where all the nodes are connected to each other and are a complete network. In a Mesh Network every node is connected to other nodes on the network through hops. Some are connected through single hops and some may be connected with more than one hop. While the data is traveling on the Mesh Network it is automatically configured to reach the destination by taking the shortest route which means the least number of hops.

Rainbow Table

A precomputed table for reversing cryptographic hash functions, usually for cracking password hashes.

Telnet

A protocol used on the internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection. Port: TCP port number 23

Buffer Overflow

A situation where a program writes data beyond the buffer space allocated in memory. This can result in other valid memory being overwritten. Buffer overflows can occur as a consequence of bugs, improper configuration, and lack of bounds checking when receiving program input.

Discuss the purpose of personnel security:

A system of policies and procedures which seek to manage the risk of staff (permanent, temporary or contract staff) exploiting, or intending to exploit, their legitimate access to an organization's assets or premises for unauthorized purposes.

Discretionary Access Controls (DAC)

A type of access control that is a means of restricting access to objects based on the identity of subjects and/or groups to which they belong.

Explain the purpose of a mobile detachment.

A unit that is not stationary in its operations whose purpose is to deploy in support of a tasked requirement.

State the name of the first computer and where was it located

ABC in 1937 at Iowa State College.

Discuss ARPANET and when it was developed

ARPA ( Advanced Research Projects Ageny) Computer Network (ARPANET).

Modulation

Ability to impress intelligence upon a transmission Medium, such as radio waves.

ACINT

Acoustic Intelligence is intelligence derived from the collection and processing of acoustic phenomena.

AMD

Activity Manpower Document. Lists what billets and how many should be in your specific command. Any changes to this document must be requested from the CO to the Navy Manpower Facility (EPMAC)

SF 701

Activity Security Checklist

Page 13

Administrative remarks

Identify the following types of RADAR, their functions, and give examples of each.

Air Search Surface Search Fire Control

AW

Air Warfare is the action required to destroy or reduce an enemys air and missile threat. It includes the use of interceptors, bombers, antiaircraft guns, surface-to-air missiles (SAMs), air-to-air missiles (AAMs), and electronic attack (EA) procedures. It also includes the destruction of the missile threat before and after launch. Other measure to reduce the effects of hostile air actions include cover, concealment, dispersion, deception (including electronic), and mobility.

Name the first US flagship and who was in command of the flotilla

Alfred 1775-1778. Captain John Paul Jones was in command when commissioned.

Discuss the principles for Multinational Intelligence Sharing

Align with national disclosure policy Maintain unity of effort Make adjustments Plan early and concurrently Share all necessary information Conduct complementary operations

Describe the DoN World Wide Web Security Policy.

All DON Web sites must have a purpose, approved by the commander, and supporting the command's core competency mission. Only unclassified material that is approved for public release may appear on a Web site. All Web sites under the aegis of Navy/Marine Corps commands are considered official sites.

USB - Upper Sideband

All of the sum frequencies above the carrier wave.

Stratosphere

Also known as the ozone layer and is about 22 miles thick. Trapping and reflecting can happen in this layer.

Role Based Access Controls (RBAC)

An approach to restricting system access to authorized users. Can implement MAC or DAC.

CW - Continuous Wave

An electromagnetic wave of constant amplitude and frequency.

Hub

common connection point for devices in a network. Used to connect segments of a LAN.

VPN Concentrator

creates remote access VPNs w/ high availability and performance

State the difference between an open and closed fracture

An open fracture is one in which the bone protrudes from the skin. A closed fracture is one in which the skin remains intact.

Define IAVA

Announces a high risk vulnerability as an alert. Provides corrective actions.

Define IAVB

Announces a medium risk vulnerability in the form of a bulletin.

ASW

Anti-Submarine Warfare is the destruction or neutralization of enemy submarines. It includes the action taken by aircraft, surface ships, and other submarines. The goal of ASW is to deny the enemy the effective use of its submarine.

SUW

Anti-Surface Warfare is the destruction or neutralization of enemy surface combatants and merchant ships. The aim of SUW is to deny the enemy the effective use of its surface warships and cargo-carrying vessels.

ATFP

Antiterrorism Force Protection - defensive measures used to reduce the vulnerability of individuals and property to terrorists acts

AM - Amplitude Modulation.

Any method of modulating an electromagnetic carrier frequency by varying its amplitude in accordance with the message intelligence that is to be transmitted.

STS-1

April 12-14, 1981 Naval Astronauts John W. Young and Robert L. Crippen were on the first orbital test flight of the Space Shuttle.

Radio Waves

Are a form of radiant energy, similar to light and heat. Although they can neither be seen nor felt, their presence can be detected through the use of sensitive measuring devices. The speed at which both forms of waves travel is the same; they both travel at the speed of light

Discuss Convergence Zone in relation to sound traveling through water

Are surface or near-surface regions where "focusing" of sound rays occurs, resulting in very high sound levels.

Define ATO

Authority to Operate

Page 4

Awards, Quals, Advancement, College Courses, and navy Courses

Azimuth and Elevation Angle

Azimuth - Angular measurement in the horizontal plane in a clockwise direction. Elevation - The angle between the horizontal plane and the line of sight.

Discuss BEAD WINDOW

BEADWINDOW is a real-time procedure which brings to the immediate attention of circuit operators the fact that an EEFI (Essential Elements of Friendly Information) disclosure has (or may have) occurred. The BEADWINDOW technique uses a code word and a number combination which is transmitted immediately by any net member to the unit disclosing the EEFI. At no time will the validity of the BEADWINDOW be discussed on the net. Proper response for a net member receiving a BEADWINDOW will be "ROGER OUT" using proper net call signs.

BBD

Billet Based Distribution. Has an automatic alignment process which will align Sailors to billets based on a number of factors (rating, paygrade, all NECs held in inventory.

Confidential's color code and define its unauthorized disclosure effects.

Blue. Expected to cause damage to the national security

Critical Information

CI is defined as information about friendly (U.S., allied and/or coalition) activities, intentions, capabilities, or limitations an adversary seeks in order to gain a military, political, diplomatic, economic, or technological advantage.

The Purple Code

Cipher system used by the Japanese in the 1930's for communications. US led a team effort to decrypt. Great benefit to US to help them understand Japanese policy prior to WWII.

COG

Cognizance symbol. This code identifies the inventory manager.

Describe the rate CTR

Collect, analyze and report signals of interest to fleet and national customers.

Describe the rate AG

Collect, measure, and analyze the elements of the physical environment

Describe the rate CTI

Collect, translate, interpret, and analyze foreign languages.

COMINT

Communications Intelligence is intelligence gained through the interception of foreign communications, excluding open radio and television broadcasts. It is a subset of SIGINT.

State the purpose of a COMMPLAN.

Communications Plan is a multi-step process of developing and implementing voice and data communications in support of unit and fleet missions.

Definition and purpose of COMPUSEC

Computer Security. Measures and controls that ensure confidentiality, integrity, and availability of the information processed and stored by a computer.

Separation of Duty

Concept of having more than one person required to complete a task.

SF 312

Confidential Cover Sheet (Blue)

Mine Warfare UUV Platoon

Consist of Remote Environmental Monitoring Units (REMUS) conducting oceanographic surveys, integrating new sensors into current programs.

NAVCOMPT 2276

Contractual procurement, NAVCOMPT form.

FM -Frequency modulation

Conveys information over a carrier wave by varying its frequency (contrast this with amplitude modulation, in which the amplitude of the carrier is varied while its frequency remains constant).

Define CRITIC.

Critical Intelligence Communications: A reporting vehicle used to notify POTUS and the national Security Council of critical information. They are sent at the highest messaging precedence by the most rapid means available to ensure delivery within 10 minutes.

CCOP

Cryptologic Carry-On Program. IO systems must respond to technological landscape to deliver tactically relevant data to the COTP. Carry-on capabilities rely heavily on government furnished software loaded on commercial-off-the-shelf (COTS) hardware and scaled to rapidly deploy on a wide range of platforms.

Naval Satellite Operations Center

Dahlgren, Virginia

Apollo 17

December 7-19, 1972 Naval Astronauts Eugene A. Cernan and Ronald E. Evans were on the seventh and final lunar landing mission

State the three methods of controlling bleeding

Direct Pressure, Pressure Point, Elevation, Tourniquet

Define CTO

DoD instruction that promulgates mandatory changes in standing instructions on how communications are handled.

DNS

Domain name system. A hierarchical decentralized naming system for computers, services, or other resources connected to the Internet or private network. Port: 53

DEA

Drug Enforcement Agency. To enforce the controlled substances laws and regulations of the United States and bring to the criminal and civil justice system of the United States, or any other competent jurisdiction, those organizations and principal members of organizations, involved in the growing, manufacture, or distribution of controlled substances appearing in or destined for illicit traffic in the United States; and to recommend and support non-enforcement programs aimed at reducing the availability of illicit controlled substances on the domestic and international markets.

Discuss Planning Intelligence Support to the Joint Targeting Cycle.

During Intelligence Planning (IP), the JFC should assess organic capabilities to support joint force selected COAs, determine related target intelligence shortfalls, and federate analytic tasks required to support he joint targeting cycle. The target development process applies analysis and intelligence products developed through the joint intelligence preparation of the operational environment (JIPOE) process to evaluate relevant target systems and identify potential targets.

State the purpose of Emissions Control (EMCON).

EMCON is control of all electromagnetic and acoustic radiations, including communications, radar, EW and sonar. During its imposition, no electronic emitting device within designated bands, including personal communications devices, will be operated unless absolutely essential to the mission. The OTC or his designated subordinate commander is responsible for imposing EMCON.

State the duties and responsibilities of the Command ESO.

Educational Services Officer responsible to the CO for all educational programs. Ensures advancement exams are administered and is a direct representative with the Navy College Program.

Describe the OPSEC considerations regarding public affairs.

Effective planning and execution of PA operations and IO, the latter of which OPSEC is a core element, are critical to accomplishing the commander's mission. The success of both depends on sound leadership and guidance. Successful PA operations are important in order to fulfill the public's right to know and maintain trust and confidence. Credible PA operations are necessary to support the commander's mission and keep the public informed throughout the spectrum of conflict.

ELINT

Electronic Intelligence is technical and geolocation intelligence derived from foreign non-communications electromagnetic radiation emanating from detonations or radioactive sources.

The On-the-Roof Gang

Enlisted radio operators were specially trained at a unique school located on the roof of the old Navy Department Building in D.C. during 1928-1941.

Evaluation report

Evaluate the performance of Enlisted Personnel and determine advancement or special program eligibility.

Heat Stroke

Fatigue, Headache. Decreased sweating, warm, flush, dry skin. Rapid heartbeat. Pupils may be constricted.

FISINT

Foreign Instrumentation Signals Intelligence is technical information and intelligence derived from the intercept of foreign electromagnetic emissions associated with the testing and operational deployment of non-US aerospace, surface and subsurface systems. Foreign instrumentation signals intelligence is a subcategory of signals intelligence. Foreign instrumentation signals include but are not limited to telemetry, beaconry, electronic interrogators, and video data links.

USCYBERCOM

Fort Meade, Maryland

Unclassified's color code and define its unauthorized disclosure effects.

Green. Expected to cause no damage to the national security.

Define the following modes of operations

Half Duplex Duplex Semi Duplex Simplex Broadcast

AN/WSC-3 (V) 11

Havequick Transceiver A modification of several existing tactical UHF radios for use in providing ECCM capability in the 225 to 400 MHz frequency range.

HERF

Hazards of Electromagnetic Radiation to Fuels

HERO

Hazards of Electromagnetic Radiation to Ordinance

HERP

Hazards of Electromagnetic Radiation to Personnel

Azimuth

Horizontal angular distance from true north measured clockwise from true north. Correct azimuth is important to proper radar function.

HTTP/HTTPS

Hypertext Transfer Protocol (Secure). An application protocol for distribution, collaborative, and hypermedia information systems. Port: 80

IMINT

Imagery Intelligence is intelligence derived from the exploitation of collection by visual photography, infrared sensors, lasers, electro-optics, and radar sensors such as synthetic aperture radar wherein images of objects are reproduced optically or electronically on film, electronic display devices, or other media.

Discuss the purpose of a Red Cross message.

In order to ensure rapid delivery, up to IMMEDIATE precedence may be assigned to AMCROSS messages concerning death or serious illness. Additionally, EFTO markings should not be applied to AMCROSS traffic, because such action incurs excessive delays and results in needless manual handling. AMCROSS messages contain information very personal to the intended recipient. Therefore, communications personnel will not discuss the contents of such a message with anyone and will limit the message distribution to the executive officer or an appointed alternate only. Local command policy will dictate filing procedures for AMCROSS messages.

Heat Stress

Increased body temperature causing fatigue, severe headache, nausea, reduced physical and mental performance

Define NIA/NIB/OIA/OIB

Information Advisories/Bulletins. Overseas Navy Enterprise Network Advisories/Bulletins.

IA

Information Assurance measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This includes providing for restoration of information systems by incorporating protection, detection, and reaction capabilities.

State the purpose of the ICD system.

Intelligence Community Directive. The Director of National Intelligence (DNI) established Intelligence Community Directives (ICDs) as the principal means by which the DNI provides guidance, policy, and direction to the Intelligence Community.

Explain why the U.S. Navy only uses ".mil" email addresses in government systems.

It is DOD policy to: Conduct DODgo publicly-accessible and access-controlled, internet-based communications (e.g., electronic mail and web operations) under the Internet domain established for the Department of Defense, the .MIL TLD. Enclosure 2 describes the delegation of this TLD to the department and the purpose of other major TLDs. Enclosure 3 lists exceptions and situations that may warrant special approval for the use of other TLDs. Use the .MIL domain to provide names only for IP addresses allocated or assigned to the Department of Defense by the American Registry for Internet Numbers. Use the .MIL and other acquired domains only on networks that meet DoD information assurance certification and accreditation requirements DoD Instruction 8510.01 and are approved to operate by the responsible Designated Approving Authority, as defined by DoD Directive 8500.1 Not use .MIL domain names that redirect to non-.MIL domain named hosts (e.g., name.mil will not redirect to name.com)

Define and state the role of the JIAC.

Joint Information Analysis Centre: Men and women in the U.S. European Command's Joint Analysis Center (JAC) process, analyze and consolidate data to produce fused intelligence information focusing on an area of responsibility consisting of more than 77 countries across Europe, Africa and the Middle East. They support mission planning and operations by U.S., Allied and NATO commanders during peace, crisis and war. Military commanders and decision-makers at all levels rely on data produced at the JAC. Major recent operations include monitoring events in the former Yugoslavia, Rwanda, and Northern Iraq. Personnel from all four U.S. military services are assigned to the Joint Analysis Center and contribute to the intelligence mission

JWICS

Joint Worldwide Intelligence Communications Systems: A system of interconnected computer networks used by the U.S. Department of Defense and the U.S. Department of State to transmit classified information by packet switching over TCP/IP in a secure environment.

Apollo 11

June 16-24, 1969 Civilian Astronaut (former Naval Aviator) Neil A. Armstrong was on the first manned lunar landing

D-Day Landing

June 6, 1944 invasion of Normandy

Battle of Normandy

June 6, 1944, invasion of Normandy-the largest amphibious operation in history

State the purpose of KMI

KMI: Key Management Infrastructure. A unified, scalable, interoperable, and trusted infrastructure that provides net-centric key management services to systems that rely on cryptography, serving DOD and the broader cryptographic community.

Discuss Maritime Domain Awareness.

MDA - the effective understanding of anything associated with the maritime domain that could impact the security, safety, economy, or environment.

Assembly Language

Machine-language programming was simply too slow and tedious for most programmers. Instead of using the strings of numbers that computers could directly understand, programmers began using English-like abbreviations to represent elementary operations. These abbreviations formed the basis of assembly languages. Translator programs called assemblers were developed to convert assembly-language programs to machine language at computer speeds.

Discuss the purpose of the 3-M/PMS System.

Maintenance and Material management/Planned Maintenance System. Management system for preventative and corrective maintenance.

Virus

Malicious code written with an intention to damage the user’s computer. Viruses are parasitic and attach to other files or boot sectors. They need the movement of a file to infect other computers.

Star Topology

Many home networks use the star topology. A star network features a central connection point called a hub that may be a hub, switch or router. Devices typically connect to the hub with Unshielded Twisted Pair (UTP) Ethernet.

Gemini 3

March 23rd, 1965 Naval Astronaut John W. Young was on the first U.S. two-man space mission

Discuss the purpose of the MOV program.

Material Obligation Validation represents that unfilled quantity of a requisition that is not immediately available for issue. The program allows for the periodic validation of all outstanding requisitions. If the requisition is no longer required a cancellation request is generated and if received a receipt is processed.

Mercury 3

May 5th 1961 Naval Astronaut Alan B. Shepard was on the first U.S. manned space flight.

MASINT

Measurement and Signature Intelligence is scientific and technical intelligence information obtained by quantitative and qualitative analysis of data (metric, angle, spatial, wavelength, time dependence, modulation, plasma, and hydromagnetic) derived from specific technical sensors for purpose of identifying any distinctive features associated with the source, emitter, or sender and to facilitate subsequent identification and/or measurement of the same.

Oceanography

Measuring, understanding & predicting to improve decision-making.

DD Form 448

Military In departmental Purchase Request.

Define mishap probability and describe the 4 subcategories of mishap probability.

Mishap Probability - An assessment of the likelihood that, given exposure to a hazard, an accident will result. Sub-category A - Likely to occur immediately or within a short period of time. Sub-category B - Probably will occur in time. Sub-category C - May occur in time. Sub-category D - Unlikely to occur.

Meteorlogy

Modeling & characterizing to ensure Fleet safety and effectiveness.

Describe the rate CTT

Monitor, identify and report on radar signals of interest and conduct electronic Warfare (EW).

Describe the rate CTN

Monitor, identify, collect analyze and report information in regards to computer network operations in support of Navy and Department of Defense national and theater level missions.

Identify who can be a CSM.

Must be a GS-11 or Officer, be appointed by the CO, and have a SSBI within the last 5 years.

Name the NCTS commands

NCTS Bahrain NCTS Guam NCTS Naples NCTS San Diego

NASIC

National Air and Space Intelligence Center

NNWC

Naval Network Warfare Program - Suffolk, Virginia

Define NOMWC and name its components.

Naval Oceanography Mine Warfare Center. 1. Bahrain 2. San Diego, CA 3. Norfolk, VA 4. Sasebo, Japan

Discuss the purpose and components of NTCSS.

Naval Tactical Command Support System - Clarified billet specific responsibilities for accuracy of aircraft status and readiness reporting.

State the purpose of Naval Intelligence.

Naval intelligence provides insights into this uncertain world, both in peace and in war. Properly employed, intelligence can give us an accurate estimate of the situation, forecast likely adversary courses of action, and allow us to apply selective but decisive combat power throughout the battle space. The fog of war precludes us from having a complete picture of the battle space, but naval intelligence can lessen the unknowns and reduce risk for friendly forces.

Navy COCOM

Navy Combatant Commander.

NCDOC

Navy Cyber Defense Operations Command

Define NTD

Navy Telecom Directive: A Naval Message giving an order about a certain IT functions that needs compliance.

Elevation Angle

Number of degrees the beam is transmitted above the horizon.

Discuss Bottom Bounce in relation to sound traveling through the water

Occurs when a sound ray strikes the bottom and is reflected back to the surface of the water. From the surface, it is again reflected back to the bottom and continues to bounce until its energy is dissipated.

Refraction

Occurs when a wave traveling through two different mediums passes through the BOUNDARY of the mediums and bends toward or away from the NORMAL.

OCO

Offensive Cyberspace Operations. Cyberspace operations intended to project power by the application of force in or through cyberspace.

ONI

Office of Naval Intelligence - Suitland, Maryland

ODNI

Office of the Director of Naval intelligence. Produces meaningful maritime intelligence and moves that intelligence rapidly to key strategic, operational, and tactical decision-makers.

ODCR

Officer Distribution Control Report. Listing of all officers and their assigned billets within the command.

OIX

Official Information Exchange. Replaced DMS (Defense Messaging System). All unclassified message traffic from BUPERS and NPS, including permanent change of station orders are sent through this.

OSINT

Open Source Information is derived from newspapers, journals, radio and television, and the internet.

5th Fleet

Operates in the Arabian Gulf/Indian Ocean/Persian Gulf and is located in Manama, Bahrain

2nd Fleet

Operates in the Atlantic Ocean and located in Norfolk, Virginia

4th Fleet

Operates in the Caribbean, Central and South America, and surrounding waters and is located in May port, Florida

3rd Fleet

Operates in the Eastern Pacific Ocean area and is located in San Diego, California

6th Fleet

Operates in the Mediterranean Sea and Black Sea areas and is located in Gaeta, Italy

7th Fleet

Operates in the Western Pacific/Indian Ocean areas and is located in Yokosuka, Japan

Explain OPTAR and its components.

Operating Target is defined as an estimate of the amount of money that will be required by an operating ship, staff, squadron, or other unit to perform assigned tasks and functions. Repair/Repairable and Consumables.

Top Secret's color code and define its unauthorized disclosure effects.

Orange. Expected to cause exceptionally grave damage to the national security.

State the first navy ship named after an enlisted man, and why

Osmond Ingram (DD 255) it was launched 28 Feb 1919. Ingram was the first enlisted man killed in action in WWI, lost when the destroyer CASSIN (DD 43) was torpedoed in October 1917. He was posthumously awarded the Medal of Honor for his actions on that day.

Numbered Fleet Commander

Overall responsible for assets within their respective AOR.

FLTCOM

Overall responsible for the operations of the Fleet in their AOR.

Define the following terms as they apply to RADAR

PRI - Pulse Repetition Interval PRF - Pulse-Repetition Frequency RF - Radio Frequency BW - Band Width CW - Continuous Wave PW - Pulse Width Scan

CNO N2/N6

Pentagon, Arlington County, Virginia

Target Intelligence

Portrays and locates the components of a target complex, networks, and support infrastructure, and includes its vulnerability and relative importance to the adversary. Target intelligence also includes battle damage assessment (BDA) composed of physical damage/change assessment, functional damage/change assessment, and functional assessment of the higher level target system resulting from the application of lethal or nonlethal military force.

POP 3

Post Office Protocol 3. The most recent version of a standard protocol for receiving email. Port: Using TLS or SLL on well-known TCP port number 995.

Commander in Chief

President of the United States

Define PIR

Priority intelligence requirements

Privilege Escalation

Privilege escalation means a user receives privileges they are not entitled to. These privileges can be used to delete files, view private information, or install unwanted programs such as viruses. It usually occurs when a system has a bug that allows security to be bypassed or, alternatively, has flawed design assumptions about how it will be used.

SF 386

Product Quality Deficiency Report

Propagation Paths

Propagation means "movement through a medium."

Naval Oceanography ASW Team (NOAT)

Provide environmental support to ASW forces worldwide at various Fleet and COCOM echelons.

Metoc provides support Information Dominance Mission

Provide services that include analyzed imagery, frocasts for ISR sensors, and fused products.

RAM

Random Antiterrorism Measures. To maximize the effectiveness and deterrence value, RAM should be implemented without a set pattern, either in terms of the measure selected, time, place, or other variables. RAM, at a minimum, shall consist of the random implementation of higher FPCON measures in consideration of the local terrorist capabilities. Random use of other physical security measures should be used to supplement FPCON measures.

Secret's color code and define its unauthorized disclosure effects.

Red. Expected to cause serious damage to the national security.

Mandatory Access Controls (MAC)

Refers to a type of access control by which the operating system constrains the ability of a subject or initiator to access or general perform some sort of operation on an object or target.

List the officer accession programs that are available to enlisted personnel.

STA-21, MECP, LDO, CWO, MSC-IPP, Naval Academy, OCS

Discuss security procedures involved when performing cross-domain transfers.

Scan all information storage media and e-mail attachments introduced prior to its use on any SCI system. - If the media cannot be scanned, it is considered high risk and cannot be used on any SCI system without approval from the Service Certifying Organization (SCO). - The IAM, and/or IASO are responsible for ensuring that all local procedures are complied with.

SF 153

Secret Cover Sheet (Red)

SF 702

Security Container Check Sheet

SF 700

Security Container Information

Command Master Chief

Senior Enlisted Sailor in the Command who is the direct representative to the CO on all enlisted matters.

Fleet Master Chief

Senior Enlisted Sailor in the Fleet who is the direct representative to the Fleet Admiral on all enlisted matters.

Master Chief Petty Officer of the Navy

Senior Enlisted Sailor in the Navy the direct representative to the CNO on all enlisted matters.

Force Master Chief

Senior Enlisted Sailor who is the direct representative to the Force Admiral on all enlisted matters.

Secretary of Defense

Senior advisor on military affairs

Define SCI.

Sensitive Compartmented Information. Information and material that requires special controls for restricted handling within compartmented intelligence systems and for which compartmentation is established.

SIGINT

Signals Intelligence is a category of intelligence that includes transmissions associated with communications, radars, and weapons systems used by our adversaries.

SMTP

Simple Mail Transfer Protocol. An internet standard for email transmission. Ports: 25/ 465/ 587

Access

Small Office Home Office (SOHO) routers. They are optimized for low cost and are located at customer sites such as branch offices that do not need hierarchical routing of their own.

SF 1449

Solicitation/Contract/Order for Commercial Items.

Discuss Direct Path in relation to sound traveling through water

Sound Waves that travel directly from the source to the receiver without interacting with the sea surface or bottom

NSW

Special Warfare is distinguished by unique objectives, weapons, and forces, and is characterized by the following: i. Principally offensive, involving high physical and political risk ii. Directed at high-value, critical, and often perishable targets iii. Principally politico-military in nature and subject to oversight at the national level iv. Frequently covert or clandestine It includes special mobile operations, unconventional warfare, coastal and river interdiction, each and coastal reconnaissance, and tactical intelligence operations.

Describe the methods for clearing an obstructive airway

Standing abdominal thrust Reclining abdominal thrust Standing chest thrust Reclining chest thrust

Give 3 examples of intelligence briefs.

Strategic Operational Tactical

Describe the three categories of Intelligence.

Strategic Intelligence Operational Intelligence Tactical Intelligence

STW

Strike Warfare is the destruction or neutralization of enemy land-based targets with conventional or nuclear missiles. This includes targets assigned to nuclear strategic forces, building yards, and operating bases from which an enemy is capable of conducting or supporting air, surface, or subsurface operations.

Tactical intelligence organizations

Such as NAVCENT (US Navy CENTCOM), fulfill tactical intelligence requirements at the request of the COCOM

Theater intelligence organizations

Such as PACOM JIOC (Joint Intelligence and Operations Center), handle operational intelligence to ensure security and execution of campaigns and major operations.

National intelligence organizations

Such as the Office of Naval Intelligence or the other 16 agencies, are responsible for executive, strategic intelligence

NAVIFOR

Suffolk, Virginia

Describe the symptoms and treatment for shock

Symptoms include vacant or lackluster eyes, shallow or irregular breathing, cold pale skin, nausea, and a weak or absent pulse. Treatment is to lay the victim down with the feet elevated 6-12 inches. Cover them to maintain body heat.

Describe TEMPEST.

TEMPEST is the code name given to the investigation, study, and control of compromising emanations from telecommunications and automated information processing systems. Used to analyze and measure unwanted signal leakage do to equipment radiation.

Define the term CASREP and explain the four categories.

The Casualty Report is designed to support the Chief of Naval Operations (CNO) and fleet commanders in the management of assigned forces, the CASREP system contains four types of reports: o Initial o Update o Correction o Cancellation

State who can give the order to initiate Emergency Destruction.

The Commanding Officer/OIC or official responsible for safeguarding COMSEC material.

CHRIMP

The Consolidated Hazardous Material Reutilization and Inventory Management Program serves as a fundamental element of the Navys life-cycle control and management of Hazardous Material.

DoDIN (GIG)

The Defense Information Systems Agency's (DISA) Global Information Grid Enterprise Services Engineering (GE) directorate plans, engineers, acquires and integrates joint, interoperable, secure global net-centric solutions satisfying the needs of the warfighter and develops and maintains a first-class engineering workforce to support the needs of DISA's programs. GE's core competencies include disciplined IT end-to-end systems engineering, security expertise for the Global Information Grid, leveraging commercial-off-the shelf products and services to solve joint and coalition needs and provide value added, trustworthy global net-centric solutions.

Name the two departments that were combined to form the ONI

The Department Library was combined with the "Office of Intelligence"

Identify SSO Navy.

The Director, Security and Corporate Services (ONI-05) as Special Security Officer for the DON (SSO Navy) have been designated as the Cognizant Security Authority (CSA). As CSA, SSO Navy is responsible for implementing SCI security policy and procedures and performs management and oversight of the Department's SCI security program

Discuss the uses of IMPAC.

The IMPAC VISA card (International Merchant Purchase Authorization Card - I.M.P.A.C.) is a government credit card issued for the purpose of streamlining government procurement and eliminating bureaucracy and red tape.

State the purpose of a MOC.

The Maritime Operations Center provides critical support in the execution of the nation's Maritime Strategy, giving commanders the processes, enabled by interoperable, networked systems, to enhance maritime capabilities. There are 8 MOCs.

Discuss the NCA, its members and functions

The National Command Authority is a term used by the United Sates government to refer to the ultimate lawful force of military orders. The term refers collectively to the President of the United States (as commander-in chief) and the United States Secretary of Defense.

State the oldest intelligence organization in the U.S. Navy

The Office of Naval Intelligence (ONI) was established in the United States Navy in 1882. ONI was founded by the Secretary of the Navy, William H. Hunt with General Order 292, dated March 23, 1882.

VERDIN

The VLF Digital Information Network (VERDIN) broadcast system provides a highly reliable and secure system for worldwide delivery of operational, tactical, and administrative messages from the Fleet Submarine Broadcast System (FSBS) and Minimum Essential Emergency Communications Network (MEECN).

Modulation/Demodulation

The ability to impress intelligence upon a transmission medium, such as radio waves

Define Certification

The comprehensive evaluation of the technical and non-technical security features of an IS and other safeguards, made as part of and in support of the accreditation process, to establish the extent to which a particular design and implementation meet a specified set of security requirements.

Network Enumeration

The creation of a list or inventory of items.

Wavelength

The distance in space occupied by one cycle of a radio wave at any given instant. If the wave could be frozen in place and measured, the wavelength would be the distance from the leading edge of one cycle to the corresponding point on the next cycle

Voyage of the Great White Fleet

The exercise demonstrated the strength of the U.S. Navy December 16, 1907

Battle of Leyte Gulf

The final blow to the Japanese Navy came October 23, 1944

Bandwidth

The frequency range occupied by a modulated carrier wave.

Frequency

The number of cycles per unit of time, usually expressed in hertz.

Define Accreditation

The official management decision to operate an IS in a specified environment.

SQL Injection

The purpose of SQL injection is to convince the application to run SQL code that was not intended. SQL Server injection vulnerabilities are caused by the same issue: invalid parameters that are not verified by the application.

Discuss the procedures for sanitizing an area.

The removal of information from the media or equipment such that data recovery using any known technique or analysis is prevented. Sanitizing shall include the removal of data from the media, as well as the removal of all classified labels, markings, and activity logs. Properly sanitized media may be subsequently declassified upon observing the organization's respective verification and review procedures.

Bletchley Park

The secret British code breaking site during WWII

IT21/ISNS

The security posture for each IT-21 FLTNOC is independently administered but centrally governed by the Chief of Naval Operations (CNO)/NETWARCOM Unclassified Trusted Network Protect (UTN Protect) firewall policy. Use and enforcement of this policy is mandated by CNO and NETWARCOM security policies. IT-21FLTNOCs are also tasked with implementing IP block lists and DNS black hole lists as promulgated by Navy Cyber Defense Operations Center (NCDOC).

Multiplexing

The simultaneous transmission of a number of intelligible signals (messages) in either or both directions using only a single RF carrier. You may use two methods of multiplexing. These are TIME-DIVISION and FREQUENCY-DIVISION.

AN/WSC-3(V) 6

The standard Navy shipboard LOS UHF transceiver (225 to 400 MHz) used for voice, data, and teletype (TTY)

Discuss how to store HAZMAT

The storeroom should be neat, clean, cool, and dry. Make sure a label appears on the door of the space to show the space contains flammable liquids. Properly Labeled.

State the first CIO/DNI

Theodorus Bailey Myers Mason

GSA Acquisitions

To deliver on a timely basis the best value product or service to the customer, while maintaining the public's trust and fulfilling public policy objectives. Participants in the acquisition process should work together as a team and should be empowered to make decisions within their area of responsibility.

Discuss the importance of the IG

To inspect, investigate, and inquire into any and all matters of importance to the Department of the Navy (DON) - Fraud - Waste - Abuse

State the mission of the U. S. Navy

To maintain, train and equip combat-ready Naval forces capable of winning wars, deterring aggression and maintaining freedom of the seas.

SF 703

Top Secret Cover Sheet (Orange)

Ducting

Trapping of an RF wave between two layers of the earths atmosphere or between an atmospheric layer and the earth.

CENTCOM

US Central Command Location: Tampa Bay, Florida

USAF

United States Air Force. To defend the United States and protect its interests through aerospace power.

USA

United States Army. To organize, train, equip, and provide forces for appropriate air and missile defense and space operations unique to the Army, including the provision of forces as required for the strategic defense of the United States, in accordance with joint doctrines.

USCG

United States Coast Guard. Collection, analysis, processing, and dissemination of intelligence in support of Coast Guard operational missions.

USN

United States Navy. Produces meaningful maritime intelligence and moves that intelligence rapidly to key strategic, operational, and tactical decision-makers.

Hand carry

Use a classified material cover sheet, file folder, or other covering to prevent inadvertent disclosure when hand carrying classified information within the command. Double-wrap the classified information when hand carrying outside the command. A locked briefcase may serve as the outer cover, except when hand carrying aboard commercial aircraft.

Concurrent report

Used for deployed personnel to ensure continuity in their eval/fitrep Cycle.

Joint Space Operations Center

Vandenberg AFB, CA

Explain how, and in what order, material is destroyed during Emergency Destruction.

Various methods and equipment may be used to destroy classified information that includes burning, cross-cut shredding, wet-pulping, mutilation, chemical decomposition, or pulverizing. Priority One - Top Secret Priority Two - Secret Priority Three - Confidential

VTC

Video Teleconferencing Service is an extension of traditional telephony technologies with the added feature of being able to see the person or persons with whom one is talking.

Explain Alan Turing's contributions to the Information Warfare field

WWII Developed machine called the Bombe which help break the German Enigma machine code.

Warning Intelligence

Warning provides a distinct communication to a decision maker about threats against US security, interests, or citizens. Warning analysis focuses on the opportunities to counter and alter only those threats that have detrimental effects for the US. This included US military or political decision cycles, infrastructure, COA, or loss of governance

Define WRA.

Web Risk Assessment - Web site self-assessments are a useful tool in determining whether potential critical information is on a command's Web site.

WGS

Wideband Gapfiller System. The DOD’s most capable and powerful communication satellite. Provides flexible, high-capacity communications for the nation’s warfighters through procurement and operation for the satellite constellation and the associated control systems. Composed of three principal segments: Space segment (satellites), Control Segment (operators) and Terminal Segment (users). Each WGS satellite is digitally channelized and transponded.

CENTRIX

a collection of classified coalition networks, that enable information sharing through the use of email and Web services, instant messaging or chat, the Common Operating Picture service and VOIP.

Define a patch

a set of changes to a computer program or its supporting data designed to update, fix, or improve it.

FPCON NORMAL

a situation or no current terrorist activity.

FPCON ALPHA

a situation where there is a small and general terrorist activity that is not predictable

FPCON BRAVO

a situation with somewhat predictable terrorist threat

Define the five attributes of IA

a. Confidentiality - Assurance that information is not disclosed to unauthorized individual, processes or devices. b. Integrity - Quality of information system is reflecting the logical correctness and reliability of the operating system; the logical completeness of the hardware and software implementing the protection mechanisms; and the consistency of the data structures and occurrence of the stored data. Note that, in a formal security mode, integrity is interpreted more narrowly to mean protection against unauthorized modification or destruction of information. c. Availability - Timely, reliable access to data and information services for authorized users. d. Non-repudiation - Assurance the sender of data is provided with proof of delivery and the recipient is provided with proof of the sender's identity, so neither can later deny having processed the data. e. Authentication - Security measure designed to establish the validity of a transmission, message, or originator, or means of verifying an individual's authorization to receive specific categories of information.

Define the following levels of leadership

a. Direct: face-to-face, first line leadership b. Senior: Chief - Master Chief, O5-O6 c. Executive: TRIAD level

Describe the effects of the following burns

a. First Degree: Mildest. i.e Sunburn. b. Second Degree: More Serious. Inner skin damage, blistering. c. Third Degree: Worst of all. Destroyed nerve endings.

Explain the following directives.

a. ICD 203: Establishes the Intelligence Community (IC) Analytic that govern the productions and evaluation of analytic products; articulates the responsibility of intelligence analysts to strive for excellence, integrity, and rigor in their analytic thinking and work practices; and delineates the role of the Office of the Director of National Intelligence (ODNI) Analytic Ombudsman. b. ICD 204: This directive promulgates policy and establishes responsibilities for setting national intelligence priorities and translating them into action. c. ICD 206: This directive establishes the requirements for sourcing information in disseminated analytic products.

Discuss the steps of ORM and describe its key concept

a. Identifying hazards b. Assessing Hazards c. Making risk decisions d. Implementing controls e. Supervising

Define the purpose of the following:

a. MAMs - Maintenance Assistance Modules are parts used for isolating faults within an avionics system or test set, normally located in the operating space of a Division. b. Bulkhead mounted spares Material authorized for stowage in other departments.

Discuss the following principles of intelligence.

a. Perspective: b. Synchronization: c. Integrity: d. Unity of Effort: e. Prioritization: f. Excellence: g. Prediction: h. Agility: i. Collaboration: j. Fusion:

Define the following message precedences

a. R - Routine (6hrs) b. P - Priority (3hrs) c. O - Immediate (30mins) d. Z - Flash (<10mins) e. W - Overrides all other codes, including Flash. (Immediately)

Explain the difference between the following documents:

a. USC Title 10 [ref. j] - It provides the legal basis for the roles, missions and organization of each of the services as well as the United States Department of Defense. b. USC Title 50 [ref. k] - Title 50 of the United States Code outlines the role of War and National Defense in the United States Code.

Denial of Service

an interruption in an authorized users access to a computer network, typically one cause with malicious intent.

Hypothermia

body exposed to subnormal temperatures

Firewall

device configured to permit or deny computer applications upon a set of rules

Fleet Survey Team (FST)

gathers the needed information via timely, self-contained hydrographic surveys in response to combatant commanders' requests.

Core

interconnects the distribution tier routers from multiple buildings. Optimized for high BW. In enterprise solutions you will usually see all 3 layers of routing. When an enterprise is widely distributed with no central location(s), the function of core routing may be subsumed by the WAN service to which the enterprise subscribes, and the distribution routers become the highest tier.

Proxy Server

internet server that controls client access to the internet

Application

is any program designed to perform a specific function directly for the user or a program

Host/Client

main computer connected to clients to which it provides data services via a network.

Back-up

making copies of data so that other copies may be used to restore the original

Distributed Denial of Service

occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more servers.

Switch

only forwards the packet to the intended recipient port.

WAP

open international standard for app-layer network comms in a wireless comm environment.

Router

physical device that joins multiple wired or wireless networks together

Social Engineering

refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access.

Application Server

software framework that enables applications to run.

SF 364

supply discrepancy report

Brute Force Attack

systematically checking all possible keys or passwords until the correct one is found. In the worst case, this would involve traversing the entire search space.

FPCON DELTA

terrorist attack is taking place or has just occurred

Chairman Joint Chiefs of Staff

the Chairman of the Joint Chiefs of Staff is the principal military adviser to the President

Distribution

traffic from multiple access routers to a major enterprise location often enforce quality of service across a WAN.

Bus Topology

uses a common backbone to connect all devices. A single cable, the backbone functions as a shared communication medium that devices attach or tap into with an interface connector. A device wanting to communicate with another device on the network sends a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes the message.

Dictionary Attack

uses a targeted technique of successively trying all the words in an exhaustive list called a dictionary.

FPCON CHARLIE

when an instance occurs or when intelligence reports that there is terrorist activity imminent.

Discuss the difference between OPCON and ADCON

· Operational Control is the command or commander in charge ensure the assigned mission is achieved · Administrative Control is the commander in charge of the individual unit's administrative needs. - Orders - Pay and personnel - Directives and awards. - Will have the duties of logistical support as well as personnel support.

Explain the purpose of Q and Z signals/codes.

· Q signals/codes: A Standardized collection of three-letter codes all of which start with the letter Q. It is an operating signal initially developed for commercial radiotelegraph and later adopted by other radio services, especially amateur radio. · Z signals/codes: Developed for commercial communications, later adopted by NATO forces for military needs and use.

Define intelligence preparation of the battle space environment.

Intelligence Preparation of the Battlespace (IPB): Systematic and continuous analysis of the adversary, terrain, and weather in the assigned or potential battlespace; goals include understanding the adversary's forces, doctrine, tactics, and probable courses of action, together with the physical and environmental characteristics of the target area. It consists of the following elements: o Define the Battlespace Environment: Defines the area of operations and focuses intelligence assets on the battlespace. o Describe the Battlespace's Effects: Evaluates physical characteristics of the battlespace and their effects on friendly and adversary capabilities to maneuver, attack, employ sensors, and communicate. o Evaluate the threat: Encompasses a detailed study of the threat, identifying adversary capabilities and vulnerabilities. o Determine Threat Courses of Action: Ties the previous steps together providing a predictive analysis of probable adversary courses of action -and friendly force survivability in each case.

State the duties and responsibilities of a CSM.

Responsible for implementing the Information Security Program (ISP) and shall have direct access to the commanding officer. Serve as the principal advisor and representative to the commanding officer in matters pertaining to the classification, safeguarding, transmission, and destruction of classified information. Develop a written command security instruction, to include provisions for safeguarding classified information during military operations or emergency situations. Ensure that personnel in the command who perform security duties are kept abreast of changes in policies and procedures, and provide assistance in problem solving. Formulate, coordinate, and conduct the command security education program. Ensure that threats to security and other security violations are reported, recorded, and when necessary investigated. Ensure that all security violations or incidents involving the possible compromise of classified information, to include those involving information technology (IT) systems, are investigated and reported. Maintain liaison with the command Public Affairs Officer (PAO) to ensure that proposed press releases and information intended for public release are subjected to a security review. Develop security measures and procedures regarding visitors who require access to classified information.

The Capture of the USS PUEBLO

23 Jan 1968: While in international waters off of the Korean Coast, N. Koreans attacked. Pueblo remains in N. Korea to this day, constituted as the largest single loss of sensitive material.

Discuss the role and responsibilities of Navy Red and Blue teams.

- Red Team: Conduct adversarial assessments on their own networks. These red teams are certified by the National Security Agency and accredited by the United States Strategic Command. This certification and accreditation allows these red teams to conduct the adversarial assessments on DoD operational networks, testing implemented security controls and identifying vulnerabilities of information systems. These cyber red teams are the "core of the cyber OPFOR". - Blue Team: Refers to the internal security team that defends against both real attackers and Red Teams.

Describe the six programs of Brilliant on the Basics.

- Sponsorship - Indoctrination - Career Development Boards - Mentorship - Ombudsman - Recognition

Explain the purpose of the U. S. Navy's Drug Screening Program.

- Provides comprehensive drug abuse prevention and control policy and procedures for all Navy Military personnel, and to establish regulations to enforce that policy. - Help enforce the Navy's Zero Tolerance policy

List and define 9 categories of computer incidents.

1) Root Level Intrusion (Incident): Unauthorized administrative access to a DOD system. 2) User Level Intrusion (Incident): Unauthorized user-level d access to a DOD system. 3) Unsuccessful Activity Attempted (Event): Failed attempt to gain unauthorized access. 4) Denial of Service (Incident): Activity that impairs normal functionality of a system. 5) Non-Compliance Activity (Event): Activity makes DOD systems potentially vulnerable. 6) Reconnaissance (Event): Activity seeks to id a computer, port, or service to later exploit. 7) Malicious Logic (Incident): Installation of malicious software (e.g., Trojan, virus, or worm). 8) Investigating (Event): Potentially malicious activity deemed suspicious and warrants review. 9) Explained Anomaly (Event): Suspected as malicious but determined not to fit the criteria.

OSI Model

1. Application layer Network Process to application 2. Presentation Layer Data Representation and Encryption 3. Session Layer Interhost Communication 4. Transport Layer End-to-End Connections and Reliability 5. Network Layer Path determination and logical addressing (IP) 6. Data Link Layer Physical Addressing (MAC & LLC) 7. Physical layer Media, Signal and Binary Transmission

Dicuss Tropical Cyclone Conditions or Readiness (COR) and who it is set by.

1. Condition V 2. Condition IV 3. Condition III 4. Condition II 5. Condition I Set by Local Regulations

ONENET

A Navy-wide initiative to install a common and secure IT infrastructure to OCONUS navy locations. It is based on the navy-Marine Corps Intranet architecture and is designed to be interoperable with IT-21, NMC, and the Global information Grid in the near future.

SITREP

A SITREP is a message transmitted by any unit CO, officer in charge, or other commander to notify appropriate operational commanders and seniors in the chain of command of a significant event or incident Navy Blue- Provides CNO and other naval commanders notifications of incidents that are of navy high. Unit SITREP- Inform Operational Commander Pinnacle- National incidents

LSB - Lower Sideband

All the difference frequencies below the carrier wave.

Discuss the need for access lists, required documentation logs, and two-person integrity.

Access List: - A verified and approved list of personnel authorized to gain access to classified material or a classified space. Even though personnel may possess the applicable security clearance required to view material or enter a space those personnel must also have the "need to know". The Access List is a way of proving "need to know" and ensuring the right persons access the right material. Required Documentation Logs: - Utilized to account for personnel actions and material transactions which are later maintained and archived for historical account. Two-Person Integrity (TPI): - Requires the participation of two people to provide a means of restricting access to sensitive material. When dealing with CRYPTO it requires at least two people, with authorized access to keying material. They must be in constant view of each other and the COMSEC material requiring TPI whenever the material is accessed and handled. Each person must be capable of detecting incorrect or unauthorized security procedures with respect to the task being performed.

AEL

Allowance Equipage List. Durable items that are not consumed in use and that are essential to the ships mission. Some examples are typewriters and portable power tools.

APL

Allowance Parts List. List that supports the equipment.

SF 30

Amendment of Solicitation/Modification of Contract.

Operating System

An operating system (OS) is software that controls a computer. It manages hardware, runs applications, provides an interface for users, and stores, retrieves, and manipulates ï¬les. In general, you can think of an operating system as the middleman between applications and hardware, between the user and hardware, and between the user and applications.

Explain the function of an Intelligence Fusion Cell.

Analyzing all source intelligence information to produce assessments, reports, articles, threat analysis, special studies etc., responsive to user needs.

Machine Language

Any computer can directly understand only its own machine language. Machine language is the “natural language†of a particular computer, defined by the computer’s hardware design. Machine languages generally consist of strings of numbers (ultimately reduced to 1s and 0s) that instruct computers to perform their most elementary operations one at a time. Machine languages are machine dependent (i.e., a particular machine language can be used on only one type of computer).

Frostbite

Body parts turn stiff, pale, and numb.

Explain the C-WAY program.

Career Waypoints. Long-term force shaping tool that aids in leveling rating manning between overmanned and undermanned ratings, while managing quality of reenlist applicants by controlling the authority for enlistment.

CIA

Central Intelligence Agency. Primary areas of expertise are in HUMINT collection, all-source analysis, and the production of political and economic intelligence.

Space Control

Combat and combat support operations to ensure freedom of action in space for the United States and its allies and, when directed, deny an adversary freedom of action in space

Space Force Application

Combat operations from space against terrestrial targets to influence the course and outcome of conflict

Space Support

Combat service support operations to deploy and sustain military and intelligence systems in space

Describe Space Force Enhancement

Combat support operations to improve the effectiveness of military forces as well as support other intelligence, civil, and commercial users

CNMOC

Commander, Naval Meteorology and Oceanography Command in Mississippi

Describe the role of the Ombudsman in a command OPSEC program

Commanding officers correspond with their ombudsman to exchange information. Their communiques are sources of morale boosters while deployed or separated. Similarly, this communication can dispel rumors or clarify information heard through the grapevine. It is critically important that the ombudsman understands and practices OPSEC and serves as an advocate on the topic to family members. The compromise of one or more elements of sensitive, unclassified information or data could damage a ships or activity's security through the process of aggregation. Just because information is not classified does not mean that it would not be useful to our adversaries. Seemingly insignificant pieces of information put together can often reveal capabilities or intentions that could possibly endanger a mission or lives. On line, it could be what one says over the course of weeks or months being pieced together.

Define C5I

Commands, Control, Communications, Computers, Collaboration, and Intelligence Encompasses the gathering, processing, and distribution of information vital to the conduct of military planning and operations

Definition and purpose of Comsec

Communications Security. Protective measures taken to deny unauthorized persons information derived from telecommunications of the U.S. Government concerning national security, and to ensure the authenticity of such telecommunications. [NOTE: COMSEC includes crypto-security, emission security, transmission security, and physical security of COMSEC material and COMSEC information.

State the purpose of a COMSPOT/Communications service advisory.

Communications Spot (COMSPOT) reports will be submitted by all ships and shore facilities at any time communication outages or degradations are encountered. Submit the COMSPOT to the servicing NCTAMS and communications station respectively, info to the appropriate numbered fleet commander and ISIC. Timely submissions of COMSPOT reports are required, within thirty minutes of outage. Updates will be provided every hour or upon significant change in status. If systems cannot be restored within 48 hours, submission of a CASREP will be sent in accordance with Joint Force Maintenance Manual. Do not delay CASREP submission because the cause of the outage is unclear (e.g., transport versus network). Intermittent outages should be considered for CASREP as well once the troubleshooting has exceeded the 48 hour window. Communications Service Advisory - reports will be submitted by shore facilities at any time communication outages or degradations are encountered. Advisories are sent out anytime more than one unit has experienced an outage on a particular communications system.

Define RIVER CITY and state when it is utilized.

Communications are cut - severing the ship, command or tactical squad from the outside world. Used when electronic emissions need to be reduced. Conditions provide procedures to control outgoing paths from ships and shore systems (e-mail, web browsing, POTS, cell phones) for the purpose of OPSEC and force protection.

CANES

Consolidated Afloat Network and Enterprise Services. The Navys next generation tactical afloat network. Consolidates five legacy networks and combines them into one, which enhances operational effectiveness and provides better quality of life for deployed Sailors. The Navy owns the data rights to this network and has an adaptable IT platform that can meet rapidly changing warfighting requirements.

Describe the core components of an IW professional

Cryptology/SIGINT, Cyber, electronic warfare, information operations, intelligence, networks, and space disciplines.

DCO/CBSP

Defense Connect Online A Web-based virtual meeting room.

DCS

Defense Courier Service

State the purpose of the DCS.

Defense Courier Service is used for the transportation of sensitive classified materials which cannot be transported through public or private means. This is to include SCI and other sensitive material. DCS is operated by the U.S. Transportation Command.

DISN

Defense Information System Network is a composite of DoD owned and leased telecommunications subsystems and networks. It is DoD's worldwide enterprise level telecommunications infrastructure providing end-to-end information transfer in support of military operations. The DISN facilitates information resource management and supports national security as well as DoD needs. As a critical portion of the GIG, the DISN furnishes network services to DoD installations and deployed forces.

DIA

Defense Intelligence Agency. Provide timely, objective, and cogent military intelligence to warfighters, defense planners, and defense and national security policymakers.

Explain what the DLPT is.

Defense Language Proficiency Test is a test designed to test the proficiency of foreign language ranked from 0+ to 4. 0+ being a basic knowledge and 4 being fluent.

Explain how DPAS is used to track equipment.

Defense Property Accounting System is used to track physical accountability of personal property and provides data to the DON Financial Statements for inclusion into the Plant, Property, and Equipment (PP&E).

DRMS

Defense Reutilization Marketing Service is part of the Defense Logistics Agency. Our mission is to provide the DODs best value services and deliver great performance to our customers for the reuse, transfer, donation, sale or disposal of excess/surplus property.

DCO

Defensive Cyberspace Operations are passive and active cyberspace defense activities that allow us to outmaneuver an adversary. The ultimate goal of DCO is to change the current paradigm where the attacker enjoys significant advantage. DCO provide the ability to discover, detect, analyze, and mitigate threats, to include insider threats.

DOE

Department of Energy. Has stewardship of vital national security capabilities, from nuclear weapons to leading edge research and development projects. These capabilities, and related Energy programs, are important not only to the strength of our Nation, but within the framework of international cooperation, to the lessening of global threats.

DHS

Department of Homeland Security. Secure the nation from the many threats we face. This requires the dedication of more than 240,000 employees in jobs that range from aviation and border security to emergency response, from cybersecurity analyst to chemical factory inspector. Our duties are wide-ranging, but our goal is clear keeping America safe.

DOS

Department of State. Advance freedom for the benefit of the American people and the international community by helping to build and sustain a more democratic, secure, and prosperous world composed of well-governed states that respond to the needs of their people, reduce widespread poverty, and act responsibly within the international system.

DOT

Department of Transportation. Serve the United States by ensuring a fast, safe, efficient, accessible and convenient transportation system that meets our vital national interests and enhances the quality of life of the American people, today and into the future.

Explain and state the responsibilities of DONCAF.

Department of the Navy Central Adjudication Facility. Using SECNAV m-1550.30, the Personnel Security Program manual, and associated executive orders and directives, DoN CAF adjudicators, who receive both formal and recurring training throughout their careers, apply national adjudicative guidelines to background information gathered mainly in investigations conducted by the Office of Personnel Management (OPM).

Page 2

Dependency Data Information

Bearing resolution

Depends on the radar beam width and range of targets.

Discuss the DLRs program.

Depot Level Repairable is repairable items for which the condemnation should be made at the depot level. These items may also be repaired at the organizational or intermediate level.

Define DAA

Designated Approving Authority d. System Security Plan [ref. a, e and i] - Describes the Contractor's approach to ensuring that the system (including all network components under the control of the Contractor, either by ownership or through contractual agreements) meets the security standards required by the Project. e. System Security Authorization Agreement [ref. a, e and i] - A living document that represents the formal agreement between the Designated Approving Authority, the Certification Authority, the Program Manager, and the user representative. The SSAA is initiated in the Concept and Technology Development life cycle phase and updated in each subsequent phase as the system development progresses and new information becomes available.

SF 44

Designed for on the spot, over the counter purchase of supplies and services while away from the purchasing office Purchase of materials and services, limit of $2500, exception aviation fuel $25,000.

DD Form 1155

Designed to encourage faster delivery of materials or services from contractors.

Define the role of an Intelligence watch floor

Determined by the JFC Capabilities - order of battle analysis, ID of adversary COGs, analysis of adversary C4, targeting support, collection management, and maintenance a watch.

Explain the relationship between intelligence and information requirements.

During mission analysis, the joint force staff identified significant information gaps about the adversary and other relevant aspects of the OE. After gap analysis, the staff formulates intelligence requirements, which are general or specific subjects upon which there is a need for the collection of information or the production of intelligence. .All staff sections may recommend intelligence requirements for designation as priority intelligence requirements (PIR).

DHCP

Dynamic Host Configuration Protocol. A network management protocol used on UPD/IP networks whereby a DHCP server dynamically assigns an IP address and other network configuration parameters to each device on a network so that can communicate with other IP networks. Port: UDP port 67 is the destination port of a server, UDP port number 68 is used by the client.

Describe how the OPSEC and Public Affairs programs interact.

Effective planning and execution of public affairs (PA) operations and IO, the latter of which OPSEC is a core element, are critical to accomplishing the commander's mission. The success of both depends on sound leadership and guidance. Successful PA operations are important in order to fulfill the public's right to know and maintain trust and confidence. Credible PA operations are necessary to support the commander's mission and keep the public informed throughout the range of military operations

Explain and state the purpose of an EAP.

Emergency Action Plan. A plan for destroying classified material, due to its potential effect on national security should holdings fall into hostile hands. The purpose of an EAP is to ensure safety of personnel and security of cryptologic material in any emergency

Discuss types of disclosures afforded protection by the EEFI list.

Essential Elements of Friendly Information. Standardized EEFI are established to identify specific items of information which, if acquired by an adversary, would degrade the security of military operations, special projects, etc. As a means to rapidly identify an EEFI violation on an uncovered radio telephone circuit, the BEADWINDOW code was developed to provide a means for immediate notification of insecure practices. The EEFI list will be posted in clear sight of operators at all insecure voice positions for rapid reference:

Estimative Intelligence

Estimates are forecasts of current or potential situations with implications for planning and executing military operations. Estimative intelligence includes a description of relevant actors capabilities, and reporting of their activities, and it analyzes known factors using techniques such as pattern analysis, inference, and statistical probability to address unresolved variables.

Fitness report

Evaluate the performance of officer Personnel.

Ring Topology

Every device has exactly two neighbors for communication purposes. All messages through a ring in the same direction (either clockwise or counterclockwise). A failure in any cable or device breaks the loop and can take down the entire network.

Scientific and Technical Intelligence

Examines foreign developments in basic and applied sciences and technologies with warfare potential, particularly enhancements to weapon systems.

Heat Exhaustion

Fatigue, headache. Excessive sweating, cold, and clammy skin. Slow or weak heartbeat. Pupils may be dilated.

FBI

Federal Bureau of Investigation. counterintelligence (CI) and counterterrorism operations conducted in the United States. FBI CI operations overseas are coordinated with the CIA.

FTP

Fire Transfer Protocol. A standard network protocol used for transfer of computer files between a client and a server on a computer network. Port: server command port 21.

State the seven principles of Naval Logistics

Flexibility Economy Attainability Responsiveness Simplicity Sustainability Survivability

General Military Intelligence

Focuses on the military capabilities of foreign countries and organizations, to include non-state actors, and other topics that could affect potential US or multinational military operations. This broad category of intelligence is normally associated with long-term planning, and attempts to identify and monitor trends affecting national security to facilitate the efficient application of finite resources

High-Level Language

From the programmer’s standpoint, obviously, high-level languages are much more desirable than either machine languages or assembly languages. C, C++ and Java are among the most powerful and most widely used high-level programming languages. Compiling a high-level language program into machine language can take a considerable amount of computer time. Interpreter programs were developed to execute high-level language programs directly without the need for compiling them into machine language.

HUMINT

Human Intelligence is the gathering of information through human contact. It is, along with signals intelligence and imagery intelligence (SIGINT and IMINT respectively), one of the three traditional means of intelligence gathering.

Discuss the IO Core Capabilities.

IO consists of five core capabilities which are: PSYOP, MILDEC, OPSEC, EW, and CNO. Of the five, PSYOP, OPSEC, and MILDEC have played a major part in military operations for many centuries. In this modern age, they have been joined first by EW and most recently by CNO. Together these five capabilities, used in conjunction with supporting and related capabilities, provide the JFC with the principal means of influencing an adversary and other target audiences (TAs) by enabling the joint forces freedom of operation in the information environment.

State the difference between IPv4 and IPv6.

IPv4 utilizes 4 bytes to express an address, it has only 32 bits that can be used for its address. This allows for a maximum combination of addresses that can be supported of 232, or 4,294,967,296 unique addresses. Since some of the addresses are within reserved address space, the total space is not available as public Internet addresses. IPv4 addresses are mostly expressed in what is referred to as dot-decimal notation, for example: 192. 168.15. 85 The address notation used in IPv6 is quite different from that of IPv4. IPv6 addresses consist of eight groups of four hexadecimal numbers (124 bits), where each field is separated by a colon. For example: 113A: 00AB: 8900: 0000: 0000: 7EA3: 0034: 3347. The real intent of IPv6 is to increase the efficiency of network management and routing.

State the duties and responsibilities of the ISSM and ISSO.

ISSM: The Information System Security Manager provides input to the program manager regarding the appointment decision. If requested, the ISSM may provide technical assistance in the development of appointment memos or letters. - ISSO: The Information System Security Officer assists the ISSMs in meeting their duties and responsibilities - Coordinate with the Command Security Manager to ensure that all users have the requisite security clearances and access authorization, and are aware of their cybersecurity responsibilities for DOD IS and PIT systems under their purview before being granted access to those systems. - Fulfill both the ISSM and ISSO roles when circumstances warrant - Be a U.S. citizen. Non U.S. citizens and contractors may not serve as ISSO.

Definition and purpose of INFOSEC

Information Security. The system of policies, procedures, and requirements established under the authority of E.O. 12958, as Amended, to protect information that, if subjected to unauthorized disclosure, could reasonably be expected to cause damage to the national security.

IW

Information Warfare is the action taken to achieve information superiority over the adversary by influencing his information and information-based processes, systems, and computer-based networks, while defending our own. IW capitalizes on the growing sophistication, connectivity, and reliance on information technology. The ultimate target of IW is the information-dependent process, human or automated. Intelligence and communications support are critical to conducting offensive and defensive IW.

Counterintelligence

Information gathered and activities conducted to identify, deceive, exploit, disrupt, or protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf or foreign powers, organizations, or persons, or their agents, or international terrorist organizations or activities. CI also includes conducting strategic CI analysis to identify and produce finished intelligence on the foreign intelligence entities threat to DOD.

IBS

Integrated Broadcast System - IBS has integrated several existing intelligence and information dissemination systems into a single system of broadcasts that will allow for the receipt of data via a single receiver (the joint tactical terminal). IBS will disseminate threat avoidance, targeting, maneuvers, force protection, target tracking, and target/situation awareness information, and will be continuously refined by data from national, theater, and tactical sensors.

Explain ISR mission requirements and fundamentals.

Intelligence , Surveillance and Reconnaissance requirements generally focus on meeting the commander's intelligence needs in order to prevent surprise, support war gaming and planning, support decisions related to friendly COAs, engage high payoff targets in support of friendly COA. Fundamentals: Commanders integrate ISR missions into a single plan that capitalizes on the different capabilities of each element and other information-gathering assets. They synchronize reconnaissance and surveillance missions that employ maneuver units with both the ISR plan and scheme of maneuver. The battalion uses intelligence products developed at higher echelons to identify gaps in the intelligence process. The battalion conducts reconnaissance and surveillance operations to fill the battalion CCIR.

Describe the rate IS

Intelligence Specialists (IS) Assist in every phase of the planning, collection, processing, analysis, and dissemination of intelligence information

Describe the role of intelligence in military operations

Intelligence assets monitor foreign states, volatile regions, and transnational issues to identify threats to US interests in time for senior military leaders to respond effectively. Intelligence support is equally critical throughout the range of military operations.

Discuss the relationship of data, information and intelligence.

Intelligence is not an exact science; intelligence analysts will have some uncertainty as they assess the operational environment (OE), as should the commander and staff as they plan and execute operations. It is therefore important that intelligence analysts communicate the degree of confidence they have in the analytic conclusions. Such communication of analytic confidence helps intelligence consumers in deciding how much weight to place on intelligence assessments when making a decision.

Define IATO

Interim Authority to Operate. Configuration Management [ref. a and i] â€" Identifies, controls, accounts for, and audits all changes to a site or information system during its design, development, and operational lifecycle. Proper configuration management is essential to the maintenance of a system accreditation status. For each change or modification to an information system or site configuration, assess the security impact of the change against the accreditation conditions issued by the DAA.

INMARSAT

International Maritime Satellite. Multipurpose commercial SATCOM system providing both simultaneous voice and IP data up to 128 Kbps.

IMAP 4

Internet Message Access Protocol. A programming interface from the IETF that enables a user’s email program to access the mail server. Port: Port number 143

State the purpose of the Navy Correspondence Manual.

Issued to prescribe uniform standards for the management and preparation of correspondence and is applicable to all commands and activities of the Department of the Navy.

Explain and state the purpose of JPAS.

Joint Personnel Adjudication System is the Department of Defense(DoD) personnel security migration system for: - The virtual consolidation of the DoD Central Adjudication Facility (CAFs) - Use by non-SCI security program managers and Special Security Officers - Special Access Program (SAP) program managers - DoD contractors Security officers

EEFI

Key information adversaries likely will inquire about regarding our intentions, capabilities, and activities, in order to obtain answers critical to their own operational effectiveness. The answers to EEFI can potentially lead to CI.

Troposphere

Layer closest to Earth and it between 5 and 9 mile thick. - Radio wave absorption and noise due to atmospheric gases. Radio waves are absorbed and attenuated due to the rotation of gas molecules in the atmosphere

NOVA

NOVA UNIX based, base-level Mode 1 store and forward terminal to relay messages to other commands outside the immediate area of responsibility, services and agencies. For message accountability purposes, the system assigns a unique Processing Sequence Number (PSN) to each message received. NOVA provides duplicate checking and First-In First-Out (FIFO) by precedence processing. Received messages are sorted by routing indicator and delivered to the DTH and backside terminals, using Mode 1 protocol. NOVA performs validation of format lines 2 through 4, 12a, 12b, 15 and 16 of ACP 128 messages.

NASA

National Aeronautics and Space Administration. Perform flight research and technology integration to revolutionize aviation and pioneer aerospace technology. Validate space exploration concepts. Conduct airborne remote sensing and science missions. Support operations of the Space Shuttle and the International Space Station -- for NASA and the nation.

NMEC

National Exploitation Center acts as a DOMEX (document and media exploitation) service of common concern and ensures prompt and responsive DOMEX support to meet the needs of intelligence, defense, homeland security, law enforcement, and other US Government Consumer's, to include provision of timely and accurate collection, processing, exploitation, and dissemination consistent with the protection of intelligence sources and methods.

NGA

National Geospatial-Intelligence Agency. Provides timely, relevant, and accurate geospatial intelligence (GEOINT) support to include imagery intelligence, geospatial information, national imagery collection management, commercial imagery, imagery-derived MASINT, and some meteorological and oceanographic (METOC) data and information. NGA creates tailored, customer specific, geospatial and METOC intelligence, analytic services, and solutions to support USG activities across the range of military operations.

NOAA

National Oceanic and Atmospheric Administration - Silver Spring, Maryland

NRO

National Reconnaissance Office. Innovative Overhead Intelligence Systems for National Security.

NSN

National Stock Number. Used to requisition items in the supply system.

NSA

National security Agency. A unified organization structured to provide for the signals intelligence (SIGINT) mission of the United States and to ensure the protection of national security systems for all departments and agencies of the United States Government (USG).

The Navajo Code talkers

Native Americans from the Navajo tribe used their own language to make a code for the U.S. military that the Japanese could not decipher

State and discuss the six areas that comprise Naval Doctrine

Naval Combat and Control Naval Operations Naval Warfare Naval Logistics Naval Intelligence Naval Planning

NCTAMS LANT

Naval Computer and Telecommunications Area Master Station Atlantic o Location: Norfolk, Virginia o Mission: To provide classified and unclassified voice, messaging, data and video to ships, submarines, aircraft and ground forces operating worldwide in support of Naval and joint missions.

NCTAMS PAC

Naval Computer and Telecommunications Area Master Station Pacific o Location: Wahiawa, Hawaii o Mission: Provide vital Command, Control, Communications, Computer, and Intelligence (C4I) Warfighting services for afloat/ashore Naval, Joint, Agency, and Coalition Forces in the Pacific and Indian Ocean areas of operation.

Identify the role of NCIS in OPSEC and resources available to commands.

Naval Criminal Investigative Service provides AT/FP support and services to the U.S. Navy and Marine Corps from 140 worldwide field locations. In addition to organic intelligence assets, NCIS provides invaluable data for making OPSEC considerations for a variety of evolutions. NCIS mission priorities are as follows: 1. Prevent terrorism and other hostile attacks against DON forces and installations. 2. Protect against compromise of DON sensitive information and critical systems. 3. Reduce criminal activities that impact DON operations. The NCIS AT/FP program leverages investigations, collection, operations, analysis, law enforcement, and physical security to inform and advise Navy and Marine Corps commanders concerning threats and vulnerabilities at permanent/transient locations and transit chokepoints.

NITES

Navy Integrated Tactical Environmental Subsystem is the portable tactical environmental support system used by the U.S. Navy Mobile Environmental Teams operating aboard unit-level ships and at undeveloped shore sites. The NITES IV subsystem is also used by the U.S. Marine Corps weather service personnel assigned to Fleet Marine Force units. The main purpose of NITES IV is to enhance the automated capabilities of these teams/units to provide meteorology and oceanography (METOC) support at remote locations, which are often in harsh environments. The system is portable, lightweight, rugged, flexible and independent and allows deployment of the minimal hardware and software configuration needed to support each mission. NITES IV serves as the replacement system for the Interim Mobile Oceanographic Support System (IMOSS) and the METOC Integrated Data Display System-Tactical (MIDDS-T). Procurement, installation and training are provided by NAVOCEANO Systems Integration Division.

List the items prohibited in a SCIF and the security risks associated with them.

No devices that transmits, receives, records or stores data is authorized into a SCIF without prior approval (i.e CO or SSO or ISSM). Also, no photography in or around a SCIF without CO approval. The ISSM must approve ALL IT software prior to its use in a SCIF.

NIPRNET

Non-classified Internet Protocol Router Network: used to exchange sensitive but unclassified information between internal users as well as providing users access to the internet.

NC

Not Carried

NIS

Not In Stock

Explain the procedures for NRFI DLRs in regard to the following situations:

Not Ready for Issue Depot Level Repairable a. Turn-in - A not ready for issue repairable component that requires turn-in to a repair facility or designated overhaul point. b. RIP - Remain In Place are items that are repairable components that cannot be removed until receipt of a replacement item.

State the instruction that governs safety and mishap reporting

OPNAVINST 5102.1D - Navy and Marine Corps Mishap and Safety Investigation, Reporting and Record Keeping Manual

Define OPSEC.

OPSEC is a systematic, proven process that identifies, controls, and protects generally sensitive but unclassified information about a mission, operation, or activity. When effectively employed, it denies or mitigates an adversary's ability to compromise or interrupt a mission, operation, or activity. Without a coordinated effort to maintain the essential secrecy of plans and operations, our enemies can forecast, frustrate or defeat major military operations. Good OPSEC helps to blind our enemies, forcing them to make decisions with insufficient information.

Describe the components and functions of the command OPSEC Program.

OPSEC officer assigned in writing- Continuity folder (Instructions & supporting documents) - CO advocates, supports, and implements OPSEC- OPSEC program-plans, OPORDs, and exercises- Adversary threat assessment - Relationships with COMSEC, COMPUSEC, physical security, and information security- Liaise with higher headquarters- OPSEC training.

State the purpose of OTAT/OTAR.

Over-the-air key transfer (OTAT) - Electronically distributing key without changing the traffic encryption key used on the secured communications path over which the transfer is accomplished. Over-the-air rekeying (OTAR) Changing traffic encryption key or transmission security key in remote crypto-equipment by sending new key directly to the remote crypto-equipment over the communications path it secures. Over-the-Air Rekeying (OTAR): NCSs and Circuit Control Officers are authorized to conduct OTAR with key that is obtained through normal channels or is locally generated, and rekey remote circuits under their control that employ crypto systems designated for OTAR. Key cannot be extracted from the far end for use on other equipment, only rekeys equipment on the circuit it is sent over.

Type Commander

Overall responsible for the operations of their specific platform.

Ionosphere

Overlaps the mesosphere, thermosphere, and exosphere. In this layer, charged particles are affected by the magnetic fields of both the Earth and the sun. This layer can cause scattering of the signal, problems with reception, and can interrupt satellite communications. - Faraday rotation: The phenomena whereby the polarization plane of radio waves rotates due the interaction between radio waves and the earth, especially magnetic flux lines and electrons in the ionosphere. - Ionospheric scintillation: Arises from spatial and temporal fluctuations in the ionosphere's electrical characteristics, and is normally observed as irregular transient fluctuations in the received signal strength.

Describe the rate IT

Perform core and specialty functions of Communications Operations, Message Processing, Network Administration and Security.

Describe the rate CTM

Perform troubleshooting and maintenance on electrical and electronic equipment assigned.

Explain what constitutes PII and the importance of safeguarding.

Personal Identifiable Information: Information about an individual that identifies, links, relates, or is unique to, or describes him or her, e.g., a social security number; age; military rank; civilian grade; marital status; race; salary; home phone numbers; other demographic, biometric, personnel, medical, and financial information, etc. Such information is also known as personally identifiable information (i.e., information which can be used to distinguish or trace an individual's identity, such as their name, social security number, date and place of birth, mother's maiden name, and biometric records, including any other personal information which is linked or linkable to a specified individual). Safeguarding this information protects agencies from "reasonably anticipated threats."

State the following as applied to electrical shock

Personnel Rescue- Shut off power source.

PSP

Personnel Security Program. To authorize initial and continued access to classified information and/or initial and continued assignment to sensitive duties to those persons whose loyalty, reliability and trustworthiness are such that entrusting them with classified information or assigning them to sensitive duties is clearly consistent with the interests of national security. Additionally, the PSP ensures that no final unfavorable personnel security determination will be made without compliance with all procedural requirements.

Explain the DoD escort policy.

Personnel visiting a secure space that has not been granted access to the level of classified material in the space shall be escorted at all times. The visitor will remain in view of the escort at all times. Only command personnel, either military or civilian may be designated s escorts for a visitor. At no time will a visitor cleared for access is designated as an escort for an uncleared person.

Explain and state the purpose of Emergency Destruction Procedures.

Planning must consider natural disasters (e.g., fire, flood, tornado, and earthquake) and hostile actions (e.g., terrorist attack, rioting, or civil uprising). For deployable commands' emergency plan must also include Emergency Destruction procedures (EDPs) which will vary depending on the commands mission and the COMSEC material they hold. For example, by what means of destruction does the command have available to them and what levels of classification does material hold to determine the priority of which it will be destroyed.

Demodulation

Process of recreating original modulation frequencies from the rf carrier

Current Intelligence

Provides updated support for ongoing operations. It involves the integration of time-sensitive, all-source intelligence and information into concise, objective reporting on the current situation in a particular area. The term “current†is relative to time sensitivities of the decision maker and the context of the type of operation being supported.

Precise Time and Astrometry

Providing the foundational standard for navigation, targeting, communications & assure.

State the purpose of Minimize.

Reduction in transmission of message traffic in an emergency. When an actual or simulated emergency arises or is anticipated, it may become necessary to reduce the volume of record and/or voice communications by imposing minimize on all military circuits. This action is designed to reduce message traffic during high tempo operations. Only traffic directly related to mission accomplishment or safety of life is considered essential and therefore appropriate for electronic transmission. This determination must be made for messages at all precedence levels, i.e., assignment of a high precedence level to a message not meeting this condition does not qualify it for electronic transmission during MINIMIZE.

Topology

Refers to the physical arrangement of a LANs components.

Discuss the security rules and procedures for magnetic and electronic media.

Removable storage media include magnetic tape reels, disk packs, diskettes, CD-ROMS, removable hard disks, disk cartridges, optical disks, paper tape, reels, magnetic cards, tape cassettes and micro-cassettes, and any other device on which data is stored and which normally is removable from the system by the user or the operator. All such devices bearing classified information must be conspicuously marked with the highest level of classification stored on the device and any special control notices that apply to the information using one of the labels specified in paragraph C5.4.10. As an exception, in the case of CD-ROMs, the label may be affixed to the sleeve or container in which the CD-ROM is stored. System managers shall ensure that AISs, including word processing systems, provide for classification designation of data stored in internal memory or maintained on fixed storage media.

Least Privilege

Requires that in a particular abstraction layer of a computing environment, every module must be able to access only the information and resources that are necessary for its legitimate purpose.

DD Form 1149

Requisition and Invoice/Shipping Document

DD Form 1348-6

Requisition material that cannot be identified by a national stock number.

Describe the general characteristics of the following PPE

Respirators Hand Protection Foot Protection Eye Protection Face Protection Skin/Body Protection Hearing Protection

Identity Intelligence

Results from the fusion of identity attributes (biologic, biographic, behavioral, and reputational information relate to the individuals) and other information and intelligence associated with those attributes collected across all intelligence disciplines.

Define RAC and list the five RAC's

Risk Assessment Code (RAC) - risk associated with a hazard that combines the hazard severity and mishap probability into a single Arabic numeral.RAC Definitions: 1 - Critical risk 2 - Serious risk 3 - Moderate risk 4 - Minor risk 5 - Negligible risk

Discuss risk management.

Risk management is the process that allows IT managers to balance the operational and economic costs of protective measures and achieve gains in mission capability by protecting the IT systems and data that support their organizations' missions. In a networked environment, a risk to one system is a risk to all systems; therefore, effective risk management reduces risk assumed by all systems to an acceptable level for operational use.

Identify who has overall authority of, and controls access to, a SCIF.

SSO - Special Security Officer will be responsible for the operation of the Sensitive Compartmented information Facility

State the three objectives of first aid

Save life Prevent further injury Prevent infection

SIPRNET

Secret Internet Protocol Router Network: A system of interconnected computer networks used by the United States Department of Defense and the U.S. Department of State to transmit classified information (up to and including information classified SECRET) via the TCP/IP protocol suite in a completely secure environment. Is also provides services such as hypertext document access and electronic mail.

SSH

Secure Shell. A cryptographic network protocol for operating network services securely over an unsecured network. Best known example application is for remote login to computer systems by users. Port: TCP port number 22

Identify what a SAER is and its purpose.

Security Access Eligibility Report - Used to identify an incident or any change in eligibility if an employee is still eligible for the security clearance.

Define the difference between a security violation and a practice dangerous to security.

Security Violation — Compromise of classified information to persons not authorized to receive it or a serious failure to comply with the provisions of security regulations and likely to result in a compromise. A security violation requires investigation. Practices Dangerous to Security (PDS): — Practices which have the potential to jeopardize the security of COMSEC Material if allowed to continue. — There are two types: - Reportable: The action must be reported outside of command. - Non-Reportable: The action must be reported to the Commanding Officer.

SIM

Selected Item Management. Frequently requested material.

Landing at Inchon

September 10-19, 1950. Was an amphibious invasion and battle of the Korean War that resulted in a decisive victory and strategic reversal in favor of the United Nations

SGLI

Serviceman’s Group Life Insurance. Beneficiaries.

Security requirements for T-SCIF

Shall be located within a defensive perimeter. - Clearly marked using a physical barrier. - The perimeter shall be guarded. - Area shall be restricted to a single gate/entrance.

10th Fleet

Suitland, MD

DD Form 200

Survey Form.

Hydrography

Surveying & charting the oceans for safety of navigation & tactical superiority.

State the three levels of war

Tactical Operational Strategic

TE

Task Element is a component of a naval task unit organized by the commander of a task unit or higher authority.

TF

Task Force is a component of a fleet organized by the commander of a task fleet or higher authority for the accomplishment of a specific task or tasks

TG

Task Group is a component of a naval task force organized by the commander of a task force or higher authority.

TU

Task Unit is a component of a naval task group organized by the commander of a task group or higher authority.

What is TCPED

Tasking, Collection, Processing, Exploitation and Analysis and Dissemination.

State the purpose of a TSO.

Telecommunications Service Order (TSO). The authorization from Headquarters, DISA, a DISA area, or DISA-DSC to start, change, or discontinue circuits or trunks and to effect administrative changes.

State the purpose of a TSR.

Telecommunications Service Request (TSR). A valid, approved, and funded telecommunications requirement prepared in accordance with the format in chapter C3 and submitted to DISA or DISA activities for fulfillment. A TSR may not be issued except by a specifically authorized TCO.

JDISS

The Joint Deployable Intelligence Support System (JDISS) program provides a family of hardware and software capabilities that allow connectivity and interoperability with intelligence systems supporting forces, in garrison, and deployed during peace, crisis, and war. It provides the Joint Intelligence Center (JIC), Joint Task Forces (JTF) and operational commanders with on-site automation support and the connectivity necessary to execute the intelligence mission. JDISS and the Joint Worldwide Intelligence Communications System (JWICS) together comprise the joint standard and foundation for commonality among intelligence support systems. JDISS provides joint intelligence centers, joint task forces, and operational commanders with on-site automation support and the connectivity to make the best use of the Intelligence Community's resources. JDISS is also the technical baseline for DODIIS client-server environment (CSE).

NMCI

The Navy/Marine Corps Intranet (NMCI) was developed to procure and manage information technologies (IT) for the Navy at the enterprise level. NMCI is a partnership between the Navy and industry whereby industry provides IT services purchased by individual Navy commands. The key point is that the Navy does not own or manage the hardware, software, or communications infrastructure. Rather, a command purchases the IT services it requires from a catalog of standard services, and industry will then provide the necessary hardware and infrastructure to deliver those services.

Discuss the five step planning process.

The OPSEC process, also known as the OPSEC five-step process, is the enabling vehicle for OPSEC planning. It provides the required information for the OPSEC portion of any plan or activity. IDENTIFY CRITICAL INFORMATION THREAT ASSESSMENT VULNERABILITY ANALYSIS RISK ASSESSMENT MEASURES/COUNTERMEASURES

State the purpose of an OPTASK COMMS.

The OPTASK COMMS message is the means used by which the United States Navy and Allied Navies distribute afloat Communications plans.

Keying

The carrier is shifted between two differing frequencies by opening and closing a key

Explain the impact of the John Walker espionage case

The concept of TPI was established due to CWO Walker spying for the soviet union almost 20 years.

Phishing

The criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.

Explain how the Reserve Component integrates with the Active Component

The mission of the Reserve component is, as defined in Section 10102 of Title 10 U.S.C., to "provide trained units and qualified persons available for active duty in the armed forces, in time of war or national emergency and at such other times as the national security may require. .." Throughout the Cold War this meant training and structuring the Naval Reserve for full mobilization in support of a global conflict. References (a) through (f) direct a new strategy which demands the Selected Reserve (SELRES) be prepared to respond to the entire spectrum of requirements, including war or national emergency, contingency operations, military operations other than war (MOOTW) , Peacetime Contributory Support (PCS), humanitarian operations, full or partial mobilization (including pre and/or post mobilization) and at such other times as the national security may require.

AFRICOM

US Africa Command Location: Stuttgart, Germany Mission: United States Africa Command, in concert with interagency and international partners, build defense capabilities, responds to crisis, and deters & defects transnational threats in orders to advance U.S. national interests and promote regional security, stability, and prosperity. Component Commands: Special Operations Command Africa (SOCAF) U.S. Naval Forces Africa (NAVAF) U.S. Marine Forces Africa (MARFORAF) U.S. Army Africa (USARAF) U.S. Air Force Africa (AFAFRICA) Combined Task Force-Horn of Africa (CJTF-HOA)

EUCOM

US European Command Location: Stuttgart, Germany

EC-121 Shoot down

US Navy Lockheed EC-121 M shot down by North Korean MiG-17. Killing all 31 Americans on board.

NORTHCOM

US Northern Command Location: Colorado Springs, Colorado

PACOM

US Pacific Command Location: Camp Smith, Hawaii

SOUTHCOM

US Southern Command Location: Miami, Florida

SOCOM

US Special Operations Command Location: Tampa Bay, Florida

STRATCOM

US Strategic Command Location: Offutt Air Force Base, Nebraska

TRANSCOM

US Transportation Command Location: Scott Air Force Base, Illinois

Define the difference between a US citizen and a US person with regards to US Intelligence Oversight.

United States person - Any US citizen or alien admitted for permanent residence in the US, and corporation, partnership, or other organization organized under the laws of the US. United States citizen- Any person that have been born in the US or certain territories or outlying possessions of the US, and subject to the jurisdiction of the US; OR, had a parent or parents who were citizen at the time of your birth (if board abroad) and meet other requirement.

USMC

Unites States Marine Corps. To provide equipment, forces, procedures, and doctrine necessary for the effective prosecution of electronic warfare operations and, as directed, support of other forces.

VLAN

Virtual LAN is any broadcast domain that is partitioned and isolated in a computer network at the data link layer.

Discuss JSIR to include the following

a. Meaconing - The intentional transmission of signals designed to deceive users of navigational aids (tactical air navigation, GPS, no directional beacon, instrument landing system, etc.). Example: Attempting to draw aircraft across an international border by transmitting false VHF Omnidirectional Radio Range signals. b. Intrusion - The intentional insertion of EM energy into transmission paths in any manner, with the objective of deceiving operators or causing confusion. c. Jamming - The deliberate radiation, reradiation, or reflection of EM energy for the purpose of preventing or reducing an enemy's effective use of the EM spectrum and with the intent of degrading or neutralizing the enemy's combat capability. d. Spectrum management - ensures that combatant units and AORs practice good RF hygiene.

Define/Discuss the following terms.

a. Network Address Translation (NAT): A method of remapping one IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device. b. Port Address Translation (PAT): An extension to NAT that permits multiple devices on a local area network to be mapped to a single public IP address. c. Demilitarized Zone (DMZ): A physical or logical subnetwork that contains and exposes an organization's external-facing services to an untrusted network, usually a larger network such as the internet. d. Virtualization: An act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms, storage devices, and computer network resources.

Security requirements for a SCIF

closed storage, open storage, continuous operations, and secure working area.

Repeater

regenerates incoming signals & preserves signal integrity and extend the distance.

Define CCIR.

· Command Critical Intelligence Requirements. A comprehensive list of information requirements identified by the commander as being critical in facilitating timely information management and the decision-making process that affect successful mission accomplishment. · In the course of mission analysis, the intelligence planner identifies the intelligence required to answer the CCIRs

State the purpose of a Domain Controller, Exchange Server, and DNS.

· Domain controller a serve computer that responds to security authentication requests (i.e. logging in, checking permissions, etc.) · Exchange Server Email sever · DNS Domain name system. A hierarchical decentralized naming system for computers, services, or other resources connected to the Internet or private network.

Explain the different between OPELINT and TECHLINT

· OPELINT: Operational Intelligence. Determines the locations and readiness of target emitters. · TECHLINT: Technical Intelligence. Determines the capabilities and limitations of target emitters.

Define/Discuss VOIP and VOSIP.

· VOIP: Voice Over Internet Protocol. A methodology and group of technologies for the delivery of voice communications and multimedia sessions over IP networks, such as the internet. · VOSIP: Voice Over Secure Internet Protocol.

Explain TCP and UDP internet protocols.

·TCP: Transmission Control Protocol. A suite of communication protocols used to interconnect network devices on the internet. Can also be used as a communications protocol in a private network. · UDP: User Datagram Protocol. An alternative communications protocol to TCP used primarily for establishing low-latency and loss tolerating connections between applications on the internet.

Describe the functionality of PKI.

— Set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. — In cryptography, a PKI is an arrangement that binds public keys with respective user identities by means of a certificate authority (CA). The binding is established through the registration and issuance process. The PKI role that assures this binding is called the Registration Authority (RA). — For each user, the user identity, the public key, their binding, validity conditions and other attributes are made unforgivable in public key certificates issued by the CA.


Kaugnay na mga set ng pag-aaral

IST447 - NTFS File System Suarez F

View Set

CS 2: Dyspnea and Shortness of Breath

View Set

MKT 1001 Chapters 15 and 16 Quiz

View Set

Marketing Chapter 6 Quiz Questions

View Set

Module 27: Leadership and Change Management

View Set

United States History A Lesson 3 UNIT 5

View Set

Les chiffres de 1 à 20 en lettres

View Set