IDW
What COMSEC area is defined as "The component of COMSEC that results from all measures designed to protect transmission for interception and exploitation"?
Transmission security.
According to instruction, there are no difference between offensive and defensive IO
True
All personnel who come in contact with collection data is required to take the OVSC1800 course.
True
Surrey is NSA's collection requirement database?
True
What USC title outlines the role of war and national defense in the US code?
USC Title 50
What USSID provides direction and guidance to all shore units, direct support, navy reserve and marine units.
USSID SE 2000 Series.
Who is Fleet Commander in Charge of 10th Fleet?
VADM Michael Rogers
The purpose of this malicious logic is to infect, destroy, modify, or cause other problems with your computer or software programs.
Virus.
7th fleet
Western Pacific (Japan)
When should a safes combo be changed?
When its installed, when compromised or suspected to be compromised, when deemed necessary.
IPV6 will use how many bits for its address.
128bitz
Network enumeration
A computing activity in which user names and info on groups, shares and services of nwetworked computers are retrieved.
APL
A technical document prepared for individual equipment/components which are on board.
What info exhange system, tool, or database's purpose is to function as a multi database search and tertieval by keywords?
ANCHORY
4th Fleet
Caribbean, Central and south America.
What tropical COR is set when Destructive winds of the force indicated are anticipated within 24 hours?
Cat 2 or Cat II
What catagory is French?
Catagory 1
Primary responsibilities fo the IO officer
Central point of contact on the combatant command staff for IO. Ensure IO is integrated and sybchronized in all planning processes. Ensures IO portions eflect the combatant commanders guidance.
What term or element is defined as "the temp of the surroundings"?
Ambient Air
Buffer overflow
An anomaly where a process stores data in a buffer outside the memory the programmer set aside for it.
SQL injection
An attack in which malicious code is inserted into strings and are later passed to an instance for parsing and execution.
Variances in temp, salinity, and pressure will significantly afect what of the following warfare areas?
Anti-submarine warfare
What are the 7 layers of the OSI model.
Application, Presentation, Session, Transport, Network, Datalink, Physical.
2nd Fleet
Atlantic
What technical fundamental is defined as the reduction of signal strength during transmission?
Attenuation
What attribute of IA is defined as "Timely, reliable access to data and information services for authorized users"
Availability
What space mission area is defiend as combat op's in, through, and from space to influence the course and outcome of conflict by holding terrestrial targets at risk.
Space force application.
What is the angle measured clockwise from rue north in the horizontal plane.
Bearing.
What are kept in the work center due to size or cost resulting on the parent department head to be responsible for upkeep on them.
Bulkhead mounted spares
Task Group
Component of Naval task force organized by the commander of a task force or higher authority.
JFCC-Space
Conducts planning, execution, and force management of the assigned missions of space operations.
What classification's color code is Blue?
Confidential
CI
Counter intel
10th Fleet
Cyber
Web based virtual meeting room
DCO
What day did the Voyage of the Great White fleet set sail?
DEC 16 1907
Which of the followings purpose is to ID a HFDF within the CORSSHAIR NET?
DF Station ID.
Which of the following is used for short duration req's which require specalists not normally included in a commands PCS comp.
DIRSUP assets
What test is used to evaluate language abilities of service memebrs and DoD civilians.
DLPT
What department is responsible for determining who within the DoN is eligible to hold a security clearance?
DONCAF
What space mission area includes space lfit operations, satellite ops, and reconstitution of space forces.
Space support.
Some directives that govern personnel security?
DoD 5200.2-R SECNAV M-5510.36 ICD 704
Stuttgart, Germany component Command.
EUCOM
3rd Fleet
Eastern Pac
Salinity in seawater - sound transmission
Effect on sound speed when there is a significant influx of fresh water.
What is the angle between the horizontal plane and the line of sight?
Elevation
Navy's organization structure as defined by annexes A&J of FLTCYBERCOM / COMTENTHFLT OPORD 2000
FLYCYBERCOM ADCON - CNO FLTCYBERCOM OPCON -USCYBERCOM
The purpose of the intel oversight program is to ensure that agencies within the intel communicy collect, retail, and disseminate info concerning a US. Person.
False
What is used to ensure that various cmbatant units and AOR's practice good RF hygiene?
Spectrum management.
What are the categories of intelligence?
Strategic, Operational, tactical
What are the purposes of Naval Intelligence.
Supporting the commander, Supporting Planning and execution of oeprations. Idenifying Center of Gravity and Critical Vulnerabilities. Protecting the Force.
What can be found on the Navy Oceanography Portal webpage?
GPS, Loran-C Timing, Telephone time, NTP.
What technical fundamental is defined as "The return from geographical land mass"?
Ground Clutter
What frequency ranges primary use is the most commonly used for medium and long range terrestrial radio communications.
HF
Whats the Five step planning process for OPSEC
ID Critical Info Threat assessment Vulnerability Assessment Risk Assessment Measures/Countermeasures
Five steps in the planning process for OPSEC
ID critical info, Threat assessment, vulnerability assessment, risk assessment, measure/counter measures.
What INFOCON level describes when an attack has taken place but the Computer Network Defense System is not at its highest alertness. Non-essential networks may be taken offline.
INFOCON 2
Warfare community: IW Warfare community: AW Warfare community: STW Warfare community: NSW
INFORMATION WARFARE AIR WARFARE STRIKE WARFARE SPECIAL WARFARE
Not for profit international organization which established a satellite comms network for the maritime community
INMARSAT
What step of the SIGINT IN process is the IN levied up the USA to be handled and satisfied?
Implement
What step of the SIGINT IN process is the IN levied upon the UCS to be handled and satisfied?
Implement
Events that should be reported to SSO
Involvement with those who try to overthrow the government by unconstituional means. foreign influence concerns close personal association with foreign nationals foreign citizenship foreign monetary interests sexual deviancy etc...
What is the analytical process used by join intelligence organizations to produce intelligence assessments, estimates, and other intel products in support of the join force commanders decision making process.
JIPOE
What Orbit's altitude is between approx 150 to 800 miles above the earths surface
Low Earth Orbit.
NIS
Material normally stocked in the storeroom but is temporarily exhausted.
Which of the following effects on military operations is not caused by wind?
May make a closed vehicle un-inhabitible.
MASINT
Measurement and signature intel
6th Fleet
Mediterranean Sea
Who da MCPON
Michael Stevens
SSBI is required for access to what classification level.
TOP SECRET
What database is a set of METOC forecast, database, and decision aid tools tailored for specific platforms and uses.
NITES.
In regards to Info Op's, what is defined as "a list of geographic areas, complexes, or installations not planned for capture or destruction"?
NO-Strike List
What messaging system is an automated message store and forward system?
NOVA
Unified organization structured to provide for the SIGINT mission of the US.
NSA
Does DOD REGULATION 5420.1.1Q govern intelligence Oversight?
Naw
Select the categories of SITREPs
OPREP-3 Pinnacle OPREP-3 Navy Blue UNIT SITREP
Who's da Commander in Chief?
Obama
JPAS
Official personnel security clearance database management system.
What is the emergency destruction priority assigned to cryptologic equipment and documents?
PRI 1
Difference between PSYOP and MILDEC
PSYOP is civilians, MILDEC is military
What point of orbit si the closest to the center of the earth.
Perigee
5th Fleet
Persian, Red sea, Arab Sea.
What are the basic characteristics of sound
Pitch, Intensity, Quality.
What are the 5 steps of intelligence
Planning and direction collection Processing and Exploitation Analysis and Production Dissemination and Integration
CYBERCOM
Plans, coordinates, integrates, synchronizes, and conducts activities in military cyberspace ops
JIOWC
Plans, integrates, and synchronized IO in direct support of Joint Force Commanders.
What orbit passes over the entire surface of the Earth at a 90 degree inclination?
Polar Orbit.
What antenna characteristics are defined as "the orientation of the electric field vector of the electromagnetic wave produced by the antenna"?
Polarization
USSTRATCOM
Provide the nation with global deterrence capabilites to combat adversary weapons of mass destruction.
What is the rate at which pulses are transmitted, given in hertz or pulses per second; reciprocal of pulse-repetition time.
Pulse repetition Frequency.
JFCC-ISR
Responsible for coordination global intel colletion to address worldwide op's ad national intel req's
What form is the Security Contain Information Form?
SF700
What technical fundamental is defined as "target echoes created from radar strike when the energy is reflected off the waves at various angles away from the ship"?
Sea Return
What is the definition of authentication.
Security measure designed to establish the vailidity of a transmission, message, or originator, or means of veryfying an individual's authorization to receive specific categories of information.
PRivilege escalation
The act of exploiting a bug or design flaw in a software application to gain access to resources which normally would have been protected from an application or user.
Pressure in seawater - sound transmission
The dominant controller of sound speed below 300 meters.
Temperature in seawater - sound transmission
The primary controller of sound speed and direction in the upper 300 meters.
Risk management
The process that allows IT managers to balance the operatonal and economic costs of protective measures and achieve gains in mission capability by protecting the IT systems and that support their organizations' missions.
Match the following classifications as they relate to potential damage done to national security.
Top Secret -- GRAVE Secret - Serious Confidential - Minor Unclass - None
Messages are sent in which time format
ZULU