IW Board Prep
101 - Describe the effects and treatment for heat exhaustion.
Effects: Cool, moist, pale, ashen or flushed skin, headache, dizziness, nausea, weakness or exhaustion, heavy sweating. Treatment: -Get out of the heat quickly. -Rest in a cool, shady place and drink small amounts of cool water or other replenishing fluids. -Loosen or remove clothing and apply wet cloths. -Have someone call the local emergency number if your condition does not improve, you are unable to drink water or you start vomiting.
101 - Describe the effects and treatment for heat stress.
Effects: Increased body temperature causing fatigue Severe headache Nausea Reduced physical and mental performance If not immediately and properly treated, these injuries can be life threatening. Treatment: Remove individual from heat source (i.e. sun) and allow for gradual adaptation/acclamation to heat environment.
102 - Guadalcanal
13-15 November 1942 After three days of bitter fighting, the Japanese naval forces retreated and U.S. Marines were able to secure the island of Guadalcanal. The Japanese lost 2 cruisers and 6 destroyers. The USS Juneau was damaged in a close-range night encounter. As it limped off for repairs, it was torpedoed. With the fall of the island, the southern Solomons came under Allied control and Australia was in less danger of attack.
109 - State the purpose of Emissions Control (EMCON).
EMCON is control of all electromagnetic and acoustic radiations, including communications, radar, EW and sonar. During its imposition, no electronic emitting device within designated bands, including personal communications devices, will be operated unless absolutely essential to the mission.
108 - State the difference between IPv4 and IPv6.
IPv4 uses only 32 bits. IPv6 uses a 128-bit address, a new packet format, designed to minimize packet-header processing. Since the headers of IPv4 packets and IPv6 packets are significantly different, the two protocols are not interoperable. The main driving force for the redesign of Internet Protocol was the foreseeable IPv4 address exhaustionIPv6 has a vastly larger address space than IPv4.
101 - Discuss the steps of ORM and describe its key concepts.
- A decision-making tool used by personnel at all levels to increase operational effectiveness by identifying, assessing, and managing risks. By reducing the potential for loss, the probability of a successful mission is increased. It increases the ability to make informed decisions by providing a formal operational risk management process. It minimizes risks to acceptable levels, commensurate with mission accomplishment. Identifying hazards - Outline major steps in the operation (operational analysis). Conduct a Preliminary Hazard Analysis by listing all of the hazards associated with each step in the operational analysis along with possible causes for those hazards. Assessing hazards - Determine the associated degree of risk in terms of probability and severity. Making risk decisions - Develop risk control options. Implementing controls - Eliminate hazards or reduce the degree of risk Supervising - Conduct follow-up evaluations of the controls to ensure they remain in place and have the desired effect. Monitor for changes, which may require further ORM. Take corrective action when necessary.
112 - Discuss Planning Intelligence Support to the Joint Targeting Cycle.
-Assess organic capabilities. -Develop support guidance. -Target system analysis. -Target development (must be validated through JIPOE).
106 - What events should be reported to the SSO?
-Involvement in activities or sympathetic association with persons which/who unlawfully practice or advocate the overthrow or alteration of the United States Government. -Foreign influence concerns. -Foreign citizenship or foreign monetary interests. -Sexual behavior that is criminal or reflects a lack of judgment. -Unwillingness to comply with rules and regulations. -Unexplained affluence or excessive indebtedness. -Alcohol abuse. -Illegal or improper drug use/involvement. -Apparent mental or emotional disorder(s). -Criminal conduct. -Noncompliance with security requirements. -Engagement in outside activities which could cause a conflict of interest. Misuse of information technology systems.
101 - What are the three objectives of First Aid?
-Save lives -Prevent further injury -Limit infection
201 - Discuss the two major specialties that comprise the Occupational Health program. (How do they relate to day-to-day operations while at home station, in a deployed environment, and during high risk training evolutions?)
1. Industrial Hygiene 2. Occupational & Environmental Medicine (OEM)
209 - What is the purpose of a demilitarized zone?
If there is a network that an organization manages that is not a part of the internal intranet but is in place between the intranet and the internet this is called the demilitarized zone or the DMZ. The main purpose of this zone is to act as an additional layer of security buffer between the intranet and the internet.
103 - What are the operating areas (AORs) for the numbered fleets?
3rd Fleet - 50 million sq miles of the eastern and northern Pacific ocean areas including the Bering Sea, Alaska, the Aleutian Islands, and a sector of the Arctic 4th Fleet - Naval ships, aircraft and subs operating in the Carribean, and Atlantic and Pacific Oceans around Central and South America 5th Fleet - naval forces in the Persian Gulf, Red Sea, Arabian Sea, and coast off East Africa as far south as Kenya 6th Fleet - half of the Atlantic Ocean, from the North Pole to Antarctica; as well as the Adriatic, Baltic, Barents, Black, Caspian, Mediterranean and North Seas 7th Fleet - more than 48 million square miles from the Kuril Islands in the north to the Antarctic in the south, and from the International Date Line to the 68th meridian east, which runs down from the India-Pakistan border. The area includes 35 maritime countries and the world's five largest foreign armed forces -People's Republic of China, Russia, India, North Korea and Republic of Korea. Five of the seven U.S. Mutual Defense Treaties are with countries in the area -Republic of the Philippines, Australia and New Zealand, Republic of Korea, Japan, and Thailand. 10th Fleet - Serves as the Number Fleet for Fleet Cyber Command and exercise operational control of assigned Naval forces; to coordinate with other naval, coalition and Joint Task Forces to execute the full spectrum of cyber, electronic warfare, information operations and signal intelligence capabilities and missions across the cyber, electromagnetic and space domains.
102 - Battle of Coral Sea
7-8 May 1942 Fought entirely by aircraft, all of which were launched from aircraft carriers. This battle saved Australia from being invaded by the Japanese.
109 - What is BEADWINDOW for and what is the proper response?
A real-time procedure which brings to the immediate attention of circuit operators the fact that an EEFI (Essential Elements of Friendly Information) disclosure has (or may have) occurred. The BEADWINDOW technique uses a code word and a number combination which is transmitted immediately by any net member to the unit disclosing the EEFI. At no time will the validity of the BEADWINDOW be discussed on the net. Proper response for a net member receiving a BEADWINDOW will be "ROGER OUT" using proper net call signs.
111 - Define OPSEC
A systematic, proven process that identifies, controls generally sensitive but unclassified information about a mission, operation or activity.
110 - Describe the mission of the primary warfare areas:
ASW - Anti Submarine Warfare SUW - Surface Warfare IW - Information Warfare AW - Air Warfare STW - Strike Warfare NSW - Special Warfare
205 - Define: amplitude, cycle, natural horizon, radio horizon, diffraction, reflection, absorption, attenuation, space wave, sky wave, and ground wave.
Amplitude - The portion of a cycle measured from a reference line to a maximum value above (or to a maximum value below) the line. Cycle - One complete alternation of a sine wave that has a maximum value above and a maximum value below the reference line. Natural Horizon - The line-of-sight horizon. Radio Horizon - The boundary beyond the natural horizon in which radio waves cannot be propagated over the earth's surface. Diffraction - The bending of the paths of waves when the waves meet some form of obstruction. Reflection - Radio waves may be reflected from various substances or objects they meet during travel between the transmitting and receiving sites. Absorption - The loss of energy of a radio wave and has a pronounced effect on both the strength of received signals and the ability to communicate over long distances. Attenuation - The decrease in intensity of a signal, beam, or wave as a result of absorption of energy and of scattering out of the path of a detector. Space Wave - A radio wave that travels directly from the transmitter to the receiver and remains in the troposphere. Sky Wave - Radio waves reflected back to earth from the ionosphere. Ground Wave - Radio waves that travel near the surface of the Earth.
209 - What is the purpose of an access control list?
An ACL is a table in an operating system or network device (such as a router) that denies or allows access to resources.
115 - Define Apogee and Perigee
Apogee - Point on the orbit farthest from the center of the Earth. Perigee - Point on the orbit closest to the center of the Earth
114 - Define Battle Space on Demand (BOND) and the capability it delivers to the warfighter.
Battlespace on Demand is an operational concept that describes how the Navy Operational Oceanography Program is aligned to provide the warfighter with superior knowledge of the physical maritime battlespace; in short, linking forecasts to decisions. BOND supports the long-range Oceanography strategy for linking environmental data to timely & informed decisions (1) Collection of Data (2) Processing of Data (3) Predicted Environmentals (4) Situational Awareness Gained & Applied to Mission
108 - Draw a Bus, Star, Ring, and Mesh topology.
Bus network architecture in which set of clients are connected via a shared communications line, called a bus. Star All devices are connected to a central Hub. Ring network topology in which each node connects to exactly two other nodes, forming a ring. Mesh the topology of a network whose components are all connected directly to every other component.
102 - State and discuss the six areas that comprise Naval Doctrine.
COWLIP Naval Command and Control: Provides the basic concepts to fulfill the information needs of commanders, forces, and weapon systems. Naval Operations: Develops doctrine to reaffirm the foundation of U.S. Navy and Marine Corps expeditionary maritime traditions. Naval Warfare: Describes the inherent nature and enduring principles of naval forces. Naval Logistics: Addresses the full range of logistical capabilities that are essential in the support of naval forces. Naval Intelligence: Points the way for intelligence support in meeting the requirements of both regional conflicts and operations other than war. Naval Planning: Examines force planning and the relationship between our capabilities and operational planning in the joint and multinational environment.
111 - What is critical information? (OPSEC)
Information about friendly (US, allied and/or coalition activities) intentions, capabilities, or limitations an adversary seeks in order to gain a military, political, diplomatic, economic, or technological advantage.
107 - Define Certification, Accreditation, DAA, System Security Plan, ATO, IATO, Configuration Management.
Certification Comprehensive evaluation of the technical and non-technical security safeguards of an information system to support the accreditation process that establishes the extent to which a particular design and implementation meets a set of specified security requirements. Accreditation Process in which certification of competency, authority, or credibility is presented. The accreditation process ensures that their certification practices are acceptable, typically meaning that they are competent to test and certify third parties, behave ethically and employ suitable quality assurance. DAA The Designated Approving Authority is the official with the authority to formally assume responsibility for operating a system at an acceptable level of risk. System Security Plan Provides an overview of the security requirements of the system and describe the controls in place or planned, responsibilities and expected behavior of all individuals who access the system. ATO Approval to Operate -The official management decision to authorize operation of an information system and to explicitly accept the residual risk to agency operations, agency assets, or individuals. IATO Interim Authorization to Operate (IATO) Temporary authorization granted by a DAA for an information system to process information based on preliminary results of a security evaluation of the system. (To be replaced by ATO and POA&M). Configuration Management Management of security features and assurances through control of changes made to hardware, software, firmware, documentation, test, test fixtures, and test documentation throughout the life cycle of an IS.
101 - The difference between an open and closed fracture.
Closed: the bone is broken but the skin remains intact. Open: the broken bone will protrude from the skin.
103 - Describe the function of the following: COCOM, Navy Component Command, FLTCOM, TYCOM
Combatant Command - A commander of one of the unified or specified combatant commands established by the President. Navy Component Command - A command consisting of the Service component commander and all those Service forces, such as individuals, units, detachments, organizations, and installations under the command, including the support forces that have been assigned to a combatant command, or further assigned to a subordinate unified command or joint task force. FLTCOM - Commander in charge of a specific Flt AOR, responsible to man, equip, train, support, and deter aggression within their respective AOR. TYCOM - Commander in charge of a specialty and all subordinate commands in support of that specialty.
112 - Define CCIR
Commander Critical Information Requirement A comprehensive list of requirements identified by the commander as being critical to facilitate timely information management and the decision-making process that affect successful mission accomplishment.
What are the 5 attributes of Cybersecurity?
Confidentiality Assurance that information is not disclosed to unauthorized individuals, processes, or devices. Integrity Assurance that information is not modified by unauthorized parties or in an unauthorized manner. Integrity supports the assurance that information is not accidentally or maliciously manipulated, altered, or corrupted. Additionally, integrity implies the ability to detect when information has been altered. Availability Assurance of timely, reliable access to data and information systems by authorized users. Availability-focused IA controls protect against degraded capabilities and denial of service conditions. Non-repudiation Assurance that the sender of data is provided with proof of delivery and the recipient is provided with proof of the sender's identity, so neither can later deny having processed the data. Authentication Assurance of the identity of an e-mail message sender or receiver. Authentication supports the validation of e-mail messages and information system access requests.
105 - CHRIMP
Consolidated Hazardous Material Reutilization and Inventory Management Program - A program that hazardous material control and management plan calling for all hazmat to be centrally controlled onboard ships.
105 - State the purpose of the following forms: DD Form 1348-6, NACCOMPT 2276, DD Form 448, SF 44, DD Form 1155, SF 1449, SF 30, DD Form 200, SF 364, SF 386
DD Form 1348-6 - when requisitioning non-NSN items NACCOMPT 2276 - request for contractual procurement DD Form 448 - military interdepartmental request SF 44 - over the counter purchases DD Form 1155 - requisition and invoice/shipping document SF 1449 - order for commercial items SF 30 - modification to change price, deliver, or terms & conditions of order DD Form 200 - missing or unservicable equipment SF 364 - report a discrepancy SF 386 - product quality deficiency report
103 - What organization is responsible for safeguarding nuclear weapons?
DOE - Department of Energy, has stewardship of vital national security capabilities, from nuclear weapons to leading edge research and development projects.
105 - Explain how DPAS is used to track equipment.
Defense Priorities and Allocations System - a DoD property management system (fully web-based) that tracks the lifecycle of an asset from receipt to disposition.
105 - DRMO
Defense Reutilization and Marketing Office. Designed to save valuable ships resources by providing an inventory of excess material that has been turned into the Defense reutilization and Marketing Offices.
105 - Discuss the DLRs program.
Depot Level Repairable - A repairable component, module, assembly or equipment determined to be economically repairable when it becomes unserviceable.
101 - Describe the effects and treatment for heat stroke.
Effects: Red skin that can either be dry or moist, changes in consciousness, rapid, weak pulse, rapid, shallow breathing. Treatment: -Call the local emergency number right away. -Move the person to a cool, shady place. -Loosen or remove any unnecessary clothing and help cool him or her down. -Apply wet cloths and fan the person. -If the person is conscious, give them small amounts of cool water to drink (about 4 ounces every 15 minutes)
111 - What is EEFI?
Essential Elements of Friendly Information Key information adversaries likely will inquire about regarding our intentions, capabilities, and activities, in order to obtain answers critical to their own operational effectiveness. The answers to EEFI can potentially lead to CI.
102 - State the seven principles of Naval Logistics.
FEARSSS Flexibility: Adapting logistics support to changing conditions. Economy: Employing logistic support assets effectively. Attainability: Acquiring the minimum essential logistic support begin combat operations. Responsiveness: Providing the right support at the right time, at the right place. This is the most important principle of logistics. Simplicity: Avoiding unnecessary complexity in preparing, planning and conducting logistic operations. Sustainability: Providing logistic support for the duration of the operation. Survivability: Ensuring that the logistic infrastructure prevails in spite of degradation and damage.
110 - Explain the purpose of FES.
Fleet Electronics Support Maintains operational readiness through installation, certification, maintenance, and removal of CCOP direct support equipment, also deploys maintenance personnel in support of fleet and national mission objectives.
113 - Define: frequency, wavelength, ducting, refraction, multiplexing, bandwidth, keying, azimuth, and elevation angle.
Frequency - The number of cycles that occur in one second. Usually expressed in hertz. Wavelength - (one 360 degree cycle) is the distance from the crest of one wave to the crest of the next, or between any two similar points on adjacent waves. Ducting - Trapping of an RF wave between two layers of the Earth's atmosphere or between and atmospheric layer and the Earth. Refraction - The changing of direction of a wave as it leaves one medium and enters another medium of different density. Multiplexing - A method for simultaneous transmission of two or more signals over a common carrier wave. Bandwidth - The difference between the highest useable frequency of a device (upper frequency limit) and the lowest usable frequency of the device (lower frequency limit) measured at the half-power points. Keying - Relays used in radio transmitter where the ordinary hand key cannot accommodate the pate current without excessive arcing. Azimuth - Angular measurement in the horizontal plane in a clockwise direction. Elevation Angle - The angle between the horizontal plane and the line of sight (altitude).
109 - What is GINGERBREAD for and what is the proper response?
Gingerbread indicates that an unauthorized person is present on a circuit. The proper response is "Roger out" and communications are to cease on the circuit.
112 - What are the different types of intelligence?
HUMINT - Human Intelligence OSINT - Open Source Intelligence MASINT - Measurement and Signature Intelligence SIGINT - Signals Intelligence COMINT - Communications Intelligence FISINT - Foreign Instrumentations Signals Intelligence ELINT - Electronic Intelligence MINT - Imagery Intelligence ACINT - Acoustic Intelligence
113 - Define: half duplex, full duplex, semi duplex, simplex, and broadcast.
Half Duplex - Provides communications in both directions, but only in one direction at a time. Full Duplex - Communications system composed of two connected devices that can communicate with one another in both directions. Semi Duplex - Uses an arrangement of equipment where one terminal is simplex and the other is full duplex. Simplex - Communication that occurs in one direction only. Broadcast - One station transmits information to one of more channels directed to more than one station or unit.
108 - Define Host/Client, Application Server, Hub, Switch, Router, WAP, Proxy Server, Firewall, VPN Concentrator, Back-up, and repeater.
Host/Client - A computer connected to the Internet - or more generically - to any type of data network. A host or client could be a ranging array of devices. Application Server - Specialized server in a client server network that has the sole responsibility of running specific applications within that network i.e. database servers, web servers, etc. Hub - a common connection point for devices in a network. Usually used to connect segments of a LAN. It broadcasts information to all nodes connected to it. (Layer 1 Device)(think collisions!) Switch - a computer networking device that connects network segments. It will only forward the packet to the intended recipient port. (Layer 2 Device)(switches based on MAC address). Router - a device that interconnects two or more computer networks together. (Layer 3 Device)(routes based on IP address). WAP - (Wireless Access Point*), a device that allows wired communication devices to connect to a wireless network using Wi-Fi, Bluetooth or other wireless standards. Most WAP's operate at layer 1, 2, and 3. This is referred to as a "network in a box". Proxy Server - internet server that controls client access to the internet. It can stop employees from accessing undesirable websites and it can hide the internal network's identity so monitoring is difficult for external users. Firewall - a device configured to permit or deny computer applications upon a set of rules or other criteria. Used to block unauthorized access while permitting authorized communications. VPN Concentrator - (Virtual Private Network) built for creating remote access VPN's with high availability, high performance and scalability. This is the termination point in the network that handles the tunneling and encryption of the connection. Back-up - the process of "backing up" refers to making copies of data so that these additional copies may be used to restore the original after a data loss event. Repeater - a telecommunications device that amplifies a signal (a hub can be used as a repeater). This device is normally used to increase the distance limitations imposed by signal loss.
107 - Define IA, DCO, and OCO.
IA - Information Assurance: measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and nonrepudiation. DCO - Defensive Cyberspace Operations: Passive and active cyberspace operations intended to preserve the ability to utilize friendly cyberspace capabilities and protect data, networks, net-centric capabilities, and other designated systems. OCO - Offensive cyberspace Operations: Cyberspace operations intended to project power by the application of force in or through cyberspace.
107 - What is the difference between IAVA and IAVB?
IAVA IA Vulnerability Alerts (IAVA) address severe network vulnerabilities resulting in immediate and potentially severe threats to DON systems and information. Corrective action is of the highest priority due to the severity of the vulnerability risk. IAVB IA Vulnerability Bulletins (IAVB) address new vulnerabilities that do not pose an immediate risk to DON systems, but are significant enough that noncompliance with the corrective action could escalate the risk.
102 - Battle of Normandy
June 6, 1944 The Navy's most notable Atlantic action may have been its part in the invasion of Normandy - the largest amphibious operation in history. The greatest armada ever assembled carried out minesweeping, shore-bombardment and amphibious operations and transported supplies and troops. Those operations enabled the Allies to complete D-Day landings successfully and eventually push on to Germany.
109 - State the purpose of KMI.
Key Management Infrastructure Prescribes the minimum policies for issuing, accounting, handling, safeguarding, disposing of COMSEC (Communications Security) material, and the application of cryptographic/physical security measures to COMSEC material and facilities.
108 - Explain LAN, WAN, MAN, GAN, and VLAN
LAN - or Local Area Network is a computer network covering a small physical area, like a home, office, or small group of buildings. WAN - Wide Area Network is a computer network that covers a broad area (any network whose communications links cross metropolitan, regional, or national boundaries, ie NMCI.) MAN - Metropolitan Area Network is a large computer network that usually spans a city or a large campus (dated concept). GAN - Global Area Network is a network that is composed of different interconnected computer networks and covers an unlimited geographical area, ie GIG, Internet. VAN - Virtual Local Area Network are logically segment switched networks regardless of the physical location. VLAN is a custom network which is created from one or more local area networks. It enables a group of devices available in multiple networks to be combined into one logical network. The result becomes a virtual LAN that is administered like a physical LAN. The full form of VLAN is defined as Virtual Local Area Network
115 - Identify the different orbit types.
Low Earth Orbit (LEO) -Approximately 150 - 800 miles above the Earth's surface. -90 minute period -Small field of view. Medium Earth Orbit (MEO): This orbit allows a user to receive signals from more than one satellite at any time. -GPS -Altitude of approximately 10,800 nm -Period of about 12 hours Highly Elliptical Orbit (HEO): Provides communications for the northern hemisphere and contains an apogee and perigee. -Commonly referred to as a Molniya orbit -Nearly equivalent to the geosynchronous altitude -Inclination of approximately 63° to 64° Geosynchronous Orbit (GEO) -average altitude of approximately 19,300 nautical miles -period about one day -70° N/S limitations. Polar Orbit: Passes over the entire surface of the Earth -has an inclination of 90° -usually circular
What are the purpose of MAMs and Bulkhead mounted spares?
Maintenance Assist Modules - replaceable modules that identify faults -bulkhead mounted spares are mounted on the wall until needed
105 - Discuss the purpose of the MOV program.
Material Obligation Validation - a system to verify unfulfilled orders and record as a committment (we don't have this right now but as soon as we do, it is allocated to you)
109 - What is the difference between meaconing, intrusion, and jamming/interference?
Meaconing - The intentional transmission of signals designed to deceive users of navigational aids (tactical air navigation, GPS, non directional beacon, instrument landing system, etc.). Intrusion - The intentional insertion of EM energy into transmission paths in any manner, with the objective of deceiving operators or causing confusion. Jamming / Interference - The deliberate radiation, re-radiation, or reflection of EM energy for the purpose of preventing or reducing an enemy's effective use of the EM spectrum and with the intent of degrading or neutralizing the enemy's combat capability.
Define the following acronyms: NSN, COG, APL/AEL, NC, NIS, SIM
NSN - national stock number (13 digits) COG - cognizance; two characters designating stores account/material type APL - allowance parts list; parts needed to support equipment maintenance AEL - allowance equipage list; onboard allowance of equip & supplies needed to support the mission NC - not carried (no storeroom allowance for item) NIS - not in stock (temporarily exhausted from stock) SIM - selected item maintenance; inventory control system which gives max attention to items experiencing high rate of use
115 - Discuss Military SATCOM for the following: UFO, DSCS, GBS, and WGS.
Navy UHF Follow-on (UFO) - constellation of satellites to replace the aging FLTSATs; features higher power transmitters designed to improve service, reliability, and dependability. The UFO satellites are mixed with the FLTSATCOM legacy system. Defense Satellite Communications System (DSCS) - a high capacity, SHF satellite based subsystem of the Defense Communications System (DCS). Provides worldwide, jam-resistant, secure voice and high data rate communications. GBS - Provides high-volume data and video information products to military tactical terminals. Wideband Global SATCOM (WGS) - Designed to replace aging DSCS satellites.
106 - What is meant by need to know?
Need-to-know is a determination that an individual requires access to specific classified information in the performance of (or assist in the performance of) lawful and authorized government functions and duties.
103 - What is the mission of ONI?
Office of Naval Intelligence - Washington DC, produces meaningful maritime intelligence and moves that intelligence rapidly to key strategic, operational, and tactical decision-makers.
103 - What is the difference between OPCON, ADCON, and TACON?
Operational Control - authority to organize commands and employ them as the Commander in operational control considers necessary to accomplish the mission at hand. Administrative Control - authority over subordinate or other organizations in administration and support, including organizations of Service Forces, control of resources and equipment, personnel management, unit logistics, individual and unit training, readiness, mobilization, demobilization, discipline, and other matters not included in the operational missions of the subordinate or other organizations. Tactical Control - the authority over forces that is limited to the detailed direction and control of movements or maneuvers within the operational area. necessary to accomplish missions or tasks assigned.
109 - State the purpose of OTAT/OTAR
Over-the-Air Key Transfer (OTAT) - Electronically distributing key without changing the traffic encryption key used on the secured communications path over which the transfer is accomplished. Over-the-Air Rekeying (OTAR) - Changing traffic encryption key or transmission security key in remote crypto-equipment by sending new key directly to the remote crypto-equipment over the communications path it secures.
112 - What are the six steps of the intelligence cycle?
Planning Direction Collection Processing Production Dissemination
108 - Identify the functions, by layer, of the OSI Model.
Please - Physical Layer : hardware Do - Data Layer : bits (language) 1's and 0's Not - Network Layer : connections Throw - Transport Layer : distribution Sausage - Session Layer : conversation Pizza - Presentation Layer : visual Away - Application Layer : allows you to see
114 - Explain how Naval Meteorology and Oceanography supports the Information Warfare mission.
Provides weather info to information dominance to support mission.
201 - Explain the difference between Quantitative Exposure Monitoring and Qualitative.
QEM - monitor workplace for toxic substances and/or harmful physical agents QED - exposure modeling, biological monitoring or determining an appropriate occupational exposure level
109 - Define the 5 message precedence and their time requirements.
R - Routine: For messages of all types that justify transmission by rapid means unless they are of sufficient urgency to require higher precedence. Speed of service - 6 hours. P- Priority: Reserved for messages containing essential information for the conduct of operations in progress. This is normally the highest precedence for administrative messages. Speed of service - 3 hours. O- Immediate: Reserved for messages relating to situations that gravely affect the national forces or populace, and require immediate delivery to the addressees. Speed of service - 30 minutes. Z - Flash: This precedence is reserved for initial enemy contact messages or operational combat messages of extreme urgency. Brevity is mandatory. Speed of service - As fast as possible! W - Flash Override: Overrides all other codes, including Flash.
110 - Define the roles of the US Navy Red and Blue Teams.
Red Team operation is an independent and threat based effort by an interdisciplinary, simulated opposing force, which after proper safeguards are established, uses both active and passive capabilities on a formal, time-bounded tasking to expose and exploit IA vulnerabilities of friendly forces. Blue Team operation uses a team specifically constructed for the Inter-Deployment Training Cycle charged with assisting in the protection of the targeted assets and conducting training to local personnel.
106 - Name and identify the use of the different SF 700 forms.
SF700 - Contains vital information about the security container in which it is located. This information includes location, container number, lock serial number, and contact information if the container is found open and unattended. SF701 - Checklist filled out at the end of each day to ensure that classified materials are secured properly and allows for employee accountability in the event of irregularities. SF702 - Record of the names and times that persons have opened, closed and checked a particular container that holds classified information. SF703 - Top Secret Cover Sheet SF153 - Audit trail for all accountable COMSEC material. Reports may be prepared manually or be computer-generated. SF312 - Contractual agreement between the U.S. Government and a cleared employee that must be executed as a condition of access to classified information. By signing the SF-312, the cleared employee agrees never to disclose classified information to an unauthorized person.
103 - What are the geo functional combatant commands and where are they located?
SOCOM - US Special Operations Command, Tampa Bay, FL: provide fully capable SOF to defend the US and its interests by synchronizing planning of global operations against terrorist networks. TRANSCOM - US Transportation Command, Scott Air Force Base, Illinois: Develop and direct the Joint Deployment and Distribution Enterprise to globally project strategic national security capabilities; accurately sense the operating environment; provide end-to-end distribution process visibility; and responsive support of joint, U.S. government and Secretary of Defense-approved multinational and non-governmental logistical requirements. STRATCOM - US Strategic Command, Offutt Air Force Base, NE, USSTRATCOM promotes global security for America by deterring attacks on US vital interests and defending the nation should deterrence fail; leading, planning, and executing strategic deterrence operations; ensuring US freedom of action in space and cyberspace. USCYBERCOM - United States Cyber Command, FT Meade, Maryland, USCYBERCOM plans, coordinates, integrates, synchronizes, and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full-spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.
106 - What is SAER and its purpose?
Security Access Eligibility Report Used to report to DONCAF any information which might effectan individual's continued eligibility for access to SCI.
102 - What three classes of naval vessels existed at the inception of the U.S. Navy?
Ships-of-the-line Frigates Sloops-of-war
110 - Explain the difference between Title 10 and Title 50.
USC Title 10 Outlines the role of armed forces in the United States Code. It provides the legal basis for the roles, missions and organization of each of the services as well as the United States Department of Defense. Subtitle A - General Military Law, including UCMJ Subtitle B - Army Subtitle C - Navy and Marine Corps Subtitle D - Air Force Subtitle E - Reserve Components USC Title 50 Outlines the role of War and National Defense in the United States Code (Ch. 36, Foreign Intelligence Surveillance, germane.)
115 - Describe the following Space Mission Areas: Space Force Enhancement, Space Support, Space Control, and Space Force Application.
Space Force Enhancement - Operations increase joint force effectiveness by increasing the combat potential of that force, enhancing operational awareness, and providing needed joint force support. There are five force enhancement missions: ISR, missile warning, environmental monitoring, satellite communications, and PNT. Space Support - The space support mission area includes space lift operations (launching and deploying satellites), satellite operations (maintaining, sustaining, and rendezvous and proximity operations), and reconstitution of space forces (replenishing lost or diminished satellites). Space Control - Provides freedom of action in space for friendly forces, and when directed, denies it to an adversary. It consists of offensive space control (OSC), defensive space control (DSC), and SSA. Space Force Application - Combat operations in, through, and from space to influence the course and outcome of conflict by holding terrestrial targets at risk. This mission area is incorporated into national space policy as well.
107 - Explain why the Navy uses only ".mil" address on govt. systems.
Sponsored top-level domain (sTLD) in the Domain Name System of the Internet for the United States Department of Defense and its subsidiary or affiliated organizations, which is encrypted and firewall protected and emails using that domain end in .mil
111 - Discuss the 5 step planning process. (OPSEC)
Step One: Identify critical information (CI) about friendly activities, intentions and capabilities. Step Two: Threat assessment. This step includes the process of identifying potential adversaries and their associated capabilities, limitations and intentions to collect analyze and use our knowledge against us. Step Three: Vulnerability analysis. Works with other security elements in the organization. Searching for weaknesses that reveal CI through collected and analyzed indicators which create vulnerabilities. Step Four: Risk assessment. Measuring the level of risk. Have two components, which are analyzing vulnerabilities and identify countermeasures. Step Five: Measures/Counter Measures. Preserver military capabilities by preventing adversarial exploitation of CI. Countermeasures mitigate or remove vulnerabilities that divulge CI.
209 - Explain the following network characteristics: Subnet, Subnet Mask, VLAN, General Network Architecture
Subnet - a logical subdivision of an IP network. The practice of dividing a network into two or more networks is called subnetting. Subnet Mask - a 32-bit number that masks an IP address, and divides the IP address into network address and host address. The Network ID and the Host ID are determined by a subnet mask. VLAN - virtual local area network; independent of physical location (a switch can create a broadcast domain) General Network Architecture - the design of a communication network. It is a framework for the specification of a network's physical components and their functional organization and configuration, its operational principles and procedures, as well as data formats use.
101 - Describe the symptoms and treatment for shock.
Symptoms: -The skin is cool and clammy. -The pulse is weak and rapid. -The person may be nauseated. He or she may vomit. -The eyes lack luster and may seem to stare. Sometimes the pupils are dilated. -The person may be conscious or unconscious. If conscious, the person may feel faint or be very weak or confused. Shock sometimes causes a person to become overly excited and anxious. Treatment: -Call 911 or your local emergency number. -Have the person lie down on his or her back with feet about a foot higher than the head. If raising the legs will cause pain or further injury, keep him or her flat. Keep the person still. -Check for signs of circulation (breathing, coughing or movement) and if absent, begin CPR. -Keep the person warm and comfortable by loosening any belts or tight clothing and covering the person with a blanket. -Turn the person on his or her side to prevent choking if the person vomits or bleeds from the mouth. -Seek treatment for injuries, such as bleeding or broken bones.
209 - Define TCP and UDP (IP suite protocols)
TCP - breaks data into manageable packets and tracks information such as source and destination of packets. It is able to reroute packets and is responsible for guaranteed delivery of the data. I sent you this, did you get it? UDP - A connectionless, datagram service that provides an unreliable, best-effort delivery. Here, have this.
103 - Define the following: TF, TG, TU, TE
TF - Task Force: A temporary grouping of units, under one commander, formed for the purpose of carrying out a specific operation or mission. TG - Task Group: Component of a naval task force. TU - Task Unit: Component of a naval task group. TE - Task Element: Component of a naval task unit.
106 - Outline the different classification categories, how they differ, and the color codes used to identify each one.
TOP SECRET - Orange Top Secret shall be applied to information the unauthorized disclosure of which reasonably could be expected to cause exceptionally grave damage to the national security that the original classification authority is able to identify or describe. SECRET - Red Secret shall be applied to information the unauthorized disclosure of which reasonably could be expected to cause serious damage to the national security that the original classification authority is able to identify or describe. CONFIDENTIAL - Blue Confidential shall be applied to information the unauthorized disclosure of which reasonably could be expected to cause damage to the national security that the original classification authority is able to identify or describe. UNCLASSIFIED - Green Unclassified information is not classified. All other categories must be classified by a classification authority.
102 - State the first navy ship named after an enlisted man, and why.
USS Osmond Ingram (DD-255) Gunner's Mate First Class Ingram spotted the approaching torpedo, realized it would strike close by the ship's depth charges, thus dooming the ship, and rushed to jettison the ammunition. He was blown overboard when the torpedo struck, thus becoming the United States' first enlisted man killed in action in World War I as he attempted to save his ship and shipmates. He was posthumously awarded the Medal of Honor.
205 - Discuss Satellite Communications theory:
Uplink - Frequency required to transmit to the satellite Downlink - Frequency required to receive from the satellite Orbit Types: -Low Earth Orbit -Molniya Orbit -Geosynchronous Orbit -Geostationary Orbit -Polar Orbit
115 - Describe the differences between GPS and Precise Positioning Service. (Discuss the role of precise time in the GPS.)
The Global Positioning System (GPS) is a space-based global navigation satellite system that provides reliable location and time information in all weather and at all times and anywhere on or near the Earth when and where there is an unobstructed line of sight to four or more GPS satellites Global Positioning system (GPS) GPS is a radio navigation system that allows land, sea, and airborne users to determine their exact location, velocity, and time 24 hours a day, in all weather conditions, anywhere in the world24 GPS satellites (21 active, 3 spare) are in orbit at 10,600 miles above the earth. The satellites are spaced so that from any point on earth, four satellites will be above the horizon Global Positioning System (GPS) and Geo-location - timing of one nanosecond can reduce GPS accuracy by one foot. Geo-location: Geo Location Geo-location is the wireless detection of the physical location of a remote device. Precise timing ensures the precise measurement of the difference of signal arrival from two different satellites. Network Synchronization: Network Synchronization GPS is transmitted in the GPS Signal in space and utilized globally. It keeps the computer networks on the exact time and is automatically updated. Incorrect timing between terminals and servers can create disruption of information interchange.
204 - What is the RANKIN Program?
The Retrieval and Analysis of Navy Classified Information (RANKIN) Program provides for the standardization, centralized management, and issuance of all DON security classification guides (SCGs) and maintenance of historical files for all DON SCGs.
103 - State the mission of the Navy.
The mission of the Navy is to maintain, train and equip combat-ready Naval forces capable of winning wars, deterring aggression and maintaining freedom of the seas.
111 - Describe the role of the Ombudsman in a command OPSEC program.
The ombudsman is an official representative of, and is personally selected by, the commanding officer and serves as the liaison between command families and the command. Most command leaders agree that an effective ombudsman is a priceless asset, linking commands and families to ensure accurate and timely communication.
101 - Define mishap probability and describe the four subcategories of mishap probability.
The probability that a hazard will result in a mishap or loss, based on an assessment of such factors as location exposure (cycles or hours of operation), affected populations, experience or previously established statistical information. Sub-category A - Likely to occur immediately or within a short period of time. Expected to occur frequently to an individual item or person or continuously to a fleet, inventory or group. Sub-category B - Probably will occur in time. Expected to occur several times to an individual item or person or frequently to a fleet, inventory or group. Sub-category C - May occur in time. Can reasonably be expected to occur sometime to an individual item or person or several times to a fleet, inventory or group. Sub-category D - Unlikely to occur.
110 - What is the purpose of a mobile detachment.
The purpose of a Mobile Detachment is to deploy in support of a tasked requirement.
114 - Define the following Resource Protection products:
Thunderstorm Watch (T2) - Destructive wind and accompanying thunderstorms are within 25 Nautical Miles (NM) or expected within 6 hours. Thunderstorm Warning (T1) - Destructive wind and accompanying thunderstorms are within 10 NM, or expected within 1 hour. Severe Thunderstorm Watch (T2) - Gusts of wind greater than 50 knots, hail with a diameter greater than 3/4" and/or tornadoes. Destructive wind accompanying severe thunderstorms are within 25 NM, or expected within 6 hours. Severe Thunderstorm Warning (T1) - Gusts of wind greater than 50 knots, hail with a diameter greater than 3/4" and/or tornadoes. Destructive wind accompanying severe thunderstorms are within 10 NM, or expected within 1 hour. Small Craft Advisory - Sustained wind of 18-33 knots are forecast for harbors and inland waters. Gale Warning - Sustained wind of 34-47 knots are forecast for harbors, inland waters, ocean areas, airfields and installations.
112 - Describe the considerations for Title 10 and Title 50 when planning operations.
Title 10 - the role of the armed forces Title 50 - armed forces employment during War & National defense
201 - What is the primary objective of the Navy Safety and Occupation Health Program?
To ensure a safe and healthful work environment for all Navy personnel
201 - What is the purpose of the Ergonomics Program?
To prevent injuries and illnesses by applying ergonomic principles and risk factors (identify, evaluate, and control risk factors)
106 - State the type of investigation and how often it is updated for access to the different classification levels.
Top Secret - SSBI - 6 years Secret - NACLC - 10 years Confidential - NACLC - 15 years SCI - Pre-nomination Interview
109 - Describe TEMPEST
Transient Electromagnetic Pulse Emanation Standard is the code name given to the investigation, study, and control of compromising emanations from telecommunications and automated information processing systems.
113 - Discuss the layers of the atmosphere and how each affect communications
Troposphere - Virtually all weather phenomena takes place in the troposphere. The temperature decreases rapidly with altitude, clouds form, and there may be a lot of turbulence due to variations in temperature, density, and pressure. These conditions have a great effect on the propagation of radio waves. Stratosphere - Located between the troposphere and ionosphere. The temperature is considered to be constant and there is little water vapor present. The stratosphere has relatively little effect on radio waves since it is a calm region with little or no temperature changes. Ionosphere - Contains four cloud-like layers of electrically charged ions, which enable radio waves to be propagated to great distances around the Earth. This is the most important region of the atmosphere for long distance point-to-point communications
108 - Define the following to include the risks associated: Virus, Worm, Trojan, Backdoor, Phishing
Virus - a computer virus is a computer program that can copy itself and infect a computer. (requires action) Worm - self-replicating virus that does not alter files but resides in active memory and duplicates itself this causes the system to slow or halt completely. Trojan - a program that appears legitimate, but performs some illicit activity when it is run. It may be used to locate password information or make the system more vulnerable to future entry or simply destroy data or programs on the hard drive. Backdoor - a remote administration utility that, once installed on a computer, allows a user access and control it over a network or the Internet. Usually able to gain control of a system because it exploits undocumented processes in the system's code. Phishing - Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Usually associated with ID theft and bank fraud.
107 - What is the difference between a vulnerability and a threat?
Vulnerability - A weakness in an IS, system security procedures, internal controls, or implementation that could be exploited. Threat - Any circumstance or event with the potential to adversely impact an IS through unauthorized access, destruction, disclosure, modification of data, and/or denial of service.
112 - Define the eight types of intelligence products.
Warning Intelligence - Provides communication to a decision maker about threats to US security, interest, or citizens. Current Intelligence - Provides updated support for ongoing operations. General Military Intelligence - Focuses on the military capabilities of foreign countries and organizations that could affect military operations. Target Intelligence - Portrays and locates the components of a target, networks, infrastructure, and characterizes it's vulnerability. Scientific and Technical Intelligence - Examines foreign Advances in science and technology and their warfare potential. Counter Intelligence - Info or activities to identify, deceive, exploit, disrupt, or protect against espionage, sabotage, or assassinations conducted by foreign powers, organizations, or persons. Estimative Intelligence - Forecasts of current or potential situations with implications for planning and executing military operations. Identity Intelligence - Resultant of the fusion of identity attributes and other information and intelligence associated with those attributes collected across all intelligence disciplines.
111 - Define WRA
Web Risk Assessment. Application of the OPSEC five-step process is imperative when placing information on the Web. Useful tool in determining whether potential CI is on a command's Web site. Operations Security officers should review their command's Web site through the eyes of the adversary, looking for CI that could reveal sensitive operations, movement of certain assets, personal information about U.S. citizens and employees, and technological data.
201 - What are the principles of hazard controls.
administrative control - mitigate hazards w/ effective SOP's and/or policy PPE - (least preferred) mitigate hazard exposures w/protective equipment isolation - barrier/limiter between hazard and individual ventilation - control hazard (airborne) by ventilating
204 - Discuss the following as they relate to security: deterrence, delaying, detection, assessment, response.
deterrence - fences, warning signs, security guards delaying - helps catch intruders by delaying them; locks, access controls detection - detects intruders: external/internal sensors assessment - security guard procedures, comms structure: calling tree response - emergency response forces & procedures: police, fire, medical
201 - Discuss the three categories of hazard controls.
engineering - physical changes to work environment to reduce or prevent exposure administrative - mitigate hazards with effective SOP's & policies PPE - reduce or eliminate personnel exposure to hazard
112 - Define National, Theater, and Fleet Intelligence Organization
national - wider scale based on intel that can affect the nation theater - specific to an area of operation fleet - any intel that can be disseminated accross the Naval AOR's