• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/56

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

56 Cards in this Set

  • Front
  • Back
DISCUSS THE CONCEPT OF ORM
A DECISION MAKING TOOL USED BY PERSONNEL AT ALL LEVELS TO INCREASE EFFECTIVENESS BY IDENTIFYING, ASSESSING, AND MANAGING RISK.
EXPLAIN THE FOLLOWING AS THEY APPLY TO ORM 7 PRINCIPLES
IDENTIFYING HAZARDS, ASSESSING HAZARDS, MAKE RISK DECISIONS, IMPLEMENT CONTROLS, SUPERVISE
DESCRIBE THE MISSION OF THE CENTER FOR INFORMATION DOMINANCE
TO DELIVER FULL SPECTRUM CYBER INFORMATION WARFARE AND INTELLIGENCE TRAINING TO ACHIEVE DECISION SUPERIORITY.
DESCRIBE THE CENTER FOR INFORMATION DOMINANCE ORGANIZATIONAL STRUCTURE AND TRAINING
CID CORRY STATION, NMITC, FITC, CID UNIT, CID DET, CID LS
DESCRIBE THE ROLE AND RESPONSIBILITIES OF THE CRYPTOLOGIC RESOURCE COORDINATOR
MANAGE DIRECT SUPPORT ELEMENTS WITHIN THE TASK FORCE; COORDINATES COVERAGE PLANS DIRECTS REPORTING RESPONSIBILITIES FOR ALL CRYTOLOGIC RESOURCES ASSIGNED TO THE OPERATIONAL COMMANDER.
COMPUTER NETWORK DEFENSE
ACTIONS TAKEN TO PROTECT, MONITOR, ANALYZE, DETECT AND RESPOND TO UNAUTHORIZED ACTIVITY WITHIN THE DOD
COMPUTER NETWORK ATTACK
ACTIONS TAKEN THROUGH THE USE OF COMPUTER NETWORKS TO DISRUPT, DENY, DEGRADE, OR DESTROY INFORMATION RESIDENT IN COMPUTER AND COMPUTER NETWORKS, OR THE COMPUTERS AND NETWORKS THEMSELVES
COMPUTER NETWORK EXPLOITATION
ENABLING OPERATIONS AND INTELLIGENCE COLLECTION CAPABILITIES CONDUCTED THROUGH THE USE OF COMPUTER NETWORKS TO GATHER DATA FROM TARGET OR ADVERSARY AUTOMATED INFORMATION SYSTEMS OR NETWORKS
GIG
GLOBAL INFORMATION GRID
THE GLOBALLY INTERCONNECTED END TO END SET OF INFORMATION CAPABILITIES AND ASSOCIATED PROCESSES FOR COLLECTING PROCESSING, STORING, DISSEMINATING AND MANAGING INFORMATION ON DEMAND TO WARFIGHTERS, POLICYMAKERS AND SUPPORT PERSONNEL
INFORMATION SECURITY
THE PROTECTION OF INFORMATION AND INFORMATION SYSTEMS AGAINST UNAUTHORIZED ACCESS OR MODIFICATION OF INFORMATION, WHETHER IN STORAGE, PROCESSING, OR TRANSIT, AND AGAINST DENIAL OF SERVICE TO AUTHORIZED USERS
DEFENSE IN DEPTH
IS THE DON PREFERRED SECURITY STRATEGY WHEREBY LAYERS OF PROTECTION ESTABLISH AN ADEQUATE SECURITY POSTURE FOR A SYSTEM
INCIDENT
IN INFORMATION OPERATIONS AN ASSESSSED EVENT OF ATTEMPTED ENTRY, UNAUTHORIZED ENTRY, OR AN INFORMATION ATTACK ON AN AUTOMATED INFORMATION SYSTEM
3 TIERS AND DEFINE
TIER ONE (GLOBAL)-PROVIDE DOD-WIDE CND OPERATION DIRECTION OR SUPPORT TO COMBATANT COMMAND, SERVICE, AGENCY, AND FIELD ACTIVITIES.
TIER TWO (REGIONAL/THEATER)
PROVIDE DOD COMPONENT-WIDE OPERATIONAL DIRECTION OR SUPPORT AND RESPOND TO DIRECTION FROM TIER ONE. INCLUDES COMBATANT COMMAND, SERIC, AGENCY, AND FIELD ACTIVITY CND SERVICE PROVIDERS.
TIER THREE(LOCAL)
PROVIDE LOCAL OPERATIONAL DIRECTION OR SUPPORT AND RESPONDS TO DIRECTION FROM A DESIGNATED TIEER TWO ENTITY.
LIST THE 3 SERICE PROVIDED BY CND
PROTECT; MONITOR, ANALYZE AND DETECT; REPOND
NAME THE NAVY'S COMPUTER NETWORK DEFENSE SERVICE PROVIDER
NCDOC NAVY CYBER DEFENSE OPERATIONS COMMAND IS THE NAVY'S COMPUTER NETWORK DEFENSE SERVICE PROVIDER (CNDSP) AND IS GOVERNED UNDER POLICY AS OUTLINED IN THE DOD 8530.1M.
LIST THE 3 FIREWALL TYPES USED TO PROTECT NAVY NETWORKS
PACKET FILTERING; STATEFUL PACKET FILTERING; APPLICATION PROXIES
EXPLAIN WHAT AN INTRUSION DETECTION SYSTEM IS
A DEVICE THAT ATTEMPTS TO DETECT INTRUSION INTO A COMPUTER OR NETWORK BY OBSERVATION OR AUDIT
EXPLAIN AN INTRUSION PREVENTION SYSTEM IPS
GOES ONE STEP FURTHER THAN AN IDS AND ONLY DETECTS ATTACKS BUY ATTEMPTS TO PREVENT THEM AS WELL
RC-4
RIVEST CIPHER 4
A POPULAR STREAMING SYMMETRIC-KEY ALGORITHM
RSA
RIVEST SHAMIR ADLEMAN
AN IMPROVED PUBLIC-KEY CRYPTOGRAPHY ALGORITHM THAT ENABLES SECURE DIGITAL SIGNATURES
BLOWFISH
A DERIVATIVE OF DES TO TRY TO ADDRESS SUSCEPTIBILITY TO BRUTE-FORCE ATTACKS
DES
DATA ENCRYPTION STANDARD
A SYMMETRIC-KEY ALGORITHM DEVELOPED BY THE US GOVERNMENT IN THE 1970s AND WAS FORMERLY IN USE IN VARIETY TCP/IP APPLICATIONS. DES US A 64 BIT BLOCK AND A 56 BIT KEY
DEFINE THE REPONSIBILITIES OF THE EKMS MANAGER
RESPONSIBLE TO THE STAFF COMSEC RESPONSIBILITY OFFICER (SCMSRO) FOR THE PROPER MANAGEMENT AND SECURITY OF ALL COMMUNICATIONS SECURITY(COMSEC) MATERIAL HELD AT THE COMMAND, AND SERVES AS THE SCMSRO'S PRIMARY ADVISOR ON EKMS ACCOUNT MANAGEMENT
DEFINE THE TERM ACCOUNT CLERK
DESIGNATED BY THE CO TO ASSIST EKMS MANAGER AND ALT WITH ROUTINE ADMINISTRATIVE ACCOUNT MATTERS
STATE THE FUNCTION OF THE EKMS CENTRAL FACILITY
FUNCTIONS PRIMARILY AS A HIGH VOLUME KEY GENERATION AND DISTRIBUTION CENTER
STATE THE FUNCTIONS OF THE FOLLOWING IN REGARDS TO COMMUNICATIONS SECURITY DON
DON ADMINISTERS ITS OWN CMCS WHICH INCLUDES NAVY MARINE CORPS, COAST GUARD, AND MILITARY SEALIFT COMMAND (MSC) EKMS ACCOUNTS, IMPLEMENTS NATIONAL POLICY, PUBLISHES PROCEDURES, ESTABLISHES ITS OWN EKMS ACCOUNT AND SERVES AS SERVICE AUTHORITY FOR COMSEC MATERIAL
CNO COMSEC
HAS OVERALL RESPONSIBILITY AND AUTHORITY FOR IMPLEMENTATION OF NATION COMSEC POLICY WITHIN THE DON
COMNAVNETWARCOM
IMPLEMENTS THE DON COMSEC PROGRAM
DCMS DIRECTOR COMMUNICATIONS SECURITY MATERIAL SYSTEM
ADMINISTERS THE DON COMSEC PROGRAM IS THE SERAUTH FOR DON
3 TYPES OF COMSEC INCIDENTS
CRYPTOGRAPHIC, PERSONNEL, PHYSICAL
DEFINE TWO PERSON INTEGRITY AND THE REQUIREMENTS ASSOCIATES WITH IT
A SYSTEM OF HANDLING AND STORING COMSEC, DESIGNED TO PREVENT SINGLE PERSON ACCESS...2 PERSONS, 2 COMBOS, CONSTANT VIEW
DEFINE ELECTRONIC SPILLAGE
AS DATA PLACED ON A IT SYSTEMS POSSESSING INSUFFICIENT INFORMATION SECURITY CONTROLS TO PROTECT THE DATA AT THE REQUIRED CLASSIFICATION
3 TYPES OF CONNECTION MEDIA
COPPER CABLING- USE ELECTRICAL SIGNALS TO TRANSMIT DATA BETWEEN DEVICES
FIBER-OPTIC CABLING-USES GLASS OR PLASTIC WIRE, ALSO CALLED FIBER, TO CARRY INFORMATION AS LIGHT PULSES
WIRELESS CONNECTION
USES RADIO SIGNALS, INFRARED TECHNOLOGY OR SATELLITE TRANSMISSIONS
CISCO IOS 3 COMMAND MODES
USER MODE: ALLOWS THE USER TO EXECUTE ONLY BASIC COMMANDS
PRIVELEGED MODE: VIEW THE SYSTEM CONFIGURATION, RESTART AND ENTER CONFIG MODE
CONFIGURATION MODE- MODIFY RUNNING SYSTEMS CONFIGURATION; SUBMODES
PRINT SERVER
ALLOW MULTIPLE COMPUTERS IN THE NETWORK TO ACCESS A SINGLE PRINTER THROUGH A NIC
FILE SERVER
IS A SERVER LOCATED ON THE NETWORK THAT PROVIDES A CENTRALIZED STORAGE ARE FOR SHARING
WEB SERVER
COMPUTER PROGRAM THAT DELIVERS CONTENT SUCH AS WEB PAGES, HTTP OVER THE WWW....
PORT 53
DNS
PORT
HTTP
PORT 110
POP
PORT 443
HTTPS
DIRECTED NET
WHEN OPERATING REQUIREMENTS DICTATE THE NET STATIONS OBTAIN NET CONTROL STATION PERMISSIOON PRIOR TO TRANSMITTING NECOS WILL CONTROL THE NET AS A DIRECTED NET
FREE NET
MEMBER STATIONS ARE THEREBY AUTHORIZED TO TRANSMIT TRAFFIC TO THE OTHER NET STATIONS WITHOUTH OBTAINING PRIOR PERMISSION FROM THE NECOS
RESPONSIBILITY OF A NET CONTROL STATION
EXPEDITE TRAFFIC FLOW ON THE NET MAINTAIN CIRCUIT DISCIPLINE LIMIT TRANSMISSIONS TO ESSENTIAL MINIMUM RESOLVING DISPUTES INCIDENT TO MESSAGE HANDLING DETERMIN PROCEDURES DISCREPANCIES; CONDUCT ROLL CALL; EMCON
CIA/CIB
COMMUNICATION INFORMATION ADVISORY
COMMUNICATION INFORMATION BULLETIN
THESE BULLETINS ARE PROMULGATED BY THE NCTAMS TO PROVIDE ACCUTE AND READILY ACCESSIBLE REFERENCE INFORMATION ON SPECIFIC TACTICAL COMMUNICATIONS SUBJECTS
FLEET TELECOMMUNICATION PROCEDURES
PUBLICATION ISSUED BY THE NCTAMS TO PROMULGATE STANDARD TELECOMMUNICATIONS PROCEDURES FOR USE BY THE COMMUNICATION PERSONNEL OPERATING IN A PARTICULAR OCEAN AREA
DEFINE PRIMARY MISSION AREAS OF CRYPTOLOGIC MAINTENANCE
TECHNICIANS PROVIDE TECHNICAL AND OPERATION SUPPORT TO CRYPTOLOGIC SYSTEMS IN ALL OPERATION THEATERS. TECHNICIAN ARE ASSIGNED TO THE FOLLOWING PRIMARY AREAS: PCS AFLOAT; FLEET ELECTRONIC SUPPORT, SUBMARINE DIRECT SUPPORT; SHORE BASED MISSION SUPPORT
LIST THE PCS AFLOAT PLATFORMS TECHNICIANS ARE ASSIGNED TO AND THE SYSTEMS THEY ARE RESPONSIBLE FOR
TECHNICIAN ARE ASSIGNED AS SHIPS COMPANY TO THE FOLLOWING PLATFORMS: CVN, LHD, LPD, CG, DDG.
DISCUSS CRYTOLOGIC SYSTEMS MAINTAINED BY THE CTM PERSONNEL SERVING IN SUBMARINE FLEET ELECTRONIC SUPPORT SITE
CLUSTER SNOOP SYTEM(ELINT) AN/USQ-149(V)2
INTEGRATED SUBMARING COMMUNICAITON RECEIVING SYSTEM(ISCRS) AN/ULR-21A(V)2 (COMINT)
LIST THE TACTICAL CRYTOLOGIC SYSTEMS TAUGHT WITHIN THE CID DOMAIN
1. SHIPS SIGNAL EXPLOITATION EQUIPMENT MAINTENANCE(INC"E")
2. TACTICAL EXPLOITATION SYSTEMS(TES)MAINTENANCE
3. COMBAT DIRECTION FINDING
4. CLUSTER SNOOP
5. INTEGRATED SUBMARINE COMMUNICATIONS RECEIVING SYSTEM
DISCUSS CRYPTOLOGIC SYSTEMS MAINTAINED BY THE CTM PERSONNEL SERVING IN SURFACE FLEET ELECTRONIC SUPPORT SITES
NIOC NORFOLK, SAN DIEGO, HAWAII, YOKOSUKA..THEATERS TO SUPPORT CRYPTOLOGIC CARRY-ON PROGRAM (CCOP), EQUIPMENT (ACCES, D4, HITS, DRT)
SYTEMS ASSOCIATED WITH THE FOLLOWING NEC'S
9224 TES
9225 SSEE
9229 SUBMARINE CARRY-ON EQUIPMENT TECHNICIAN
9289 COMBAT-DIRECTION FINDING SRS-1 MAINT TECH
WHAT IS PM
MAINTENANCE TO EQUIPMENT