• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/37

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

37 Cards in this Set

  • Front
  • Back
What is meant by the term TPI?
Two Person Integrity
Security measure taken to prevent single-person access to COMSEC keying material and cryptographic maintenance manuals
What are the 3 types of clearances?
Confidential
Secret
Top Secret
What are the frequencies of HF, VHF, and UHF?
HF- 3MHZ to 30MHZ
VHF- 30MHZ to 300MHZ
UHF- 300MHZ to 3GHZ
Name factors that affect the range of radio equipment?
Weather
Terrain
Power
Antenna
Location of the Radio
What is meant by the term "minimize"?
To drastically reduce normal message and telephone traffic so that vital messages connected with the situation at hand will not be delayed - "Silence on the Net"
What is meant by the term "beadwindow"?
Used to alert the operators that an unauthorized disclosure has occured over a NON-SECURE circuit
What does one short blast of the whistle mean?
Attention to Orders
What does one long blast of the whistle mean?
Cease Firing
What does three long blast repeated mean?
Hostile Aircraft
What is the exercise of authority and direction by a properly designated commander over assigned and attached forces in the accomplishment of the mission?
Command and Control
What is definition of intelligence?
Product resulting from collection, exploitation, processing, integration, analysis, and evaluation of information concerning foreign countries
What are some principles of intelligence?
Know the adversary
The CDR's needs
Unity of Intelligence
Plan for Combat
Use an all source approach
How many steps to the intelligence cycle are there?
5
What are the step to the intelligence cycle?
Planning and direction
Collection
Processing
Production
Dissemination
Maximum transmission range for LO?
200m - 400m
Maximum transmission range for M?
400m - 5km
Maximum transmission range for HI?
5km - 10km
Maximum transmission range for PA (Power Amplifier)?
10km - 40km
Who is responsible for managing the CMS account?
COMSEC Custodian
Definition of ACCESS?
Ability to obtain knowledge of classified information
Definition of CLASSIFICATION?
Information required to specific degree of protection against unauthorized disclosure
Definition of COMPROMISE?
Security violation in which classification information has been exposed to someone
Definition of NEED TO KNOW?
Determination that an individual nees access to specific classified information
Definition of CLEARANCE?
Person meets the security standards to gain access to classified information
What is EEFI?
Essential Elements of Friendly Information
If revealed, would degrade the unit disclosing the EEFI
What are some EEFI codes?
Position
Capabilities
Operations
Electronic Warfare
Personnel
COMSEC
Wrong Circuit
When you hear "Beadwindow", what do you do?
Roger Out
Can prowords be substituted for text?
NO
What are the 3 methods of communication where oral communication is not reliable?
Arm and Hand Signals
Whistle Signals
Special Signals
What is the nature and purpose of command and control?
To enable the Naval Commander to understand the situation in his/her battle space
Who drives the command and control?
The Commander
Who has the final responsibilitiy and accountability for success of the mission?
The Commander
What are the 3 forms of intelligence?
Strategic
Operational
Tactical
What is the cornerstone of the Naval Intelligence?
To support the operating forces (at sea, from sea, and shore)
What are the key attributes of Naval Intelligence?
Timeliness
Objectivity
Availability
Usability
Thoroughness
Accuracy
Relevance
What does the acronym COMSEC stand for?
Communicaitons Security
What is COMSEC?
The Navy's system for providing safeguards on telecommunications via encryption