Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
56 Cards in this Set
- Front
- Back
DISCUSS THE CONCEPT OF ORM
|
A DECISION MAKING TOOL USED BY PERSONNEL AT ALL LEVELS TO INCREASE EFFECTIVENESS BY IDENTIFYING, ASSESSING, AND MANAGING RISK.
|
|
EXPLAIN THE FOLLOWING AS THEY APPLY TO ORM 7 PRINCIPLES
|
IDENTIFYING HAZARDS, ASSESSING HAZARDS, MAKE RISK DECISIONS, IMPLEMENT CONTROLS, SUPERVISE
|
|
DESCRIBE THE MISSION OF THE CENTER FOR INFORMATION DOMINANCE
|
TO DELIVER FULL SPECTRUM CYBER INFORMATION WARFARE AND INTELLIGENCE TRAINING TO ACHIEVE DECISION SUPERIORITY.
|
|
DESCRIBE THE CENTER FOR INFORMATION DOMINANCE ORGANIZATIONAL STRUCTURE AND TRAINING
|
CID CORRY STATION, NMITC, FITC, CID UNIT, CID DET, CID LS
|
|
DESCRIBE THE ROLE AND RESPONSIBILITIES OF THE CRYPTOLOGIC RESOURCE COORDINATOR
|
MANAGE DIRECT SUPPORT ELEMENTS WITHIN THE TASK FORCE; COORDINATES COVERAGE PLANS DIRECTS REPORTING RESPONSIBILITIES FOR ALL CRYTOLOGIC RESOURCES ASSIGNED TO THE OPERATIONAL COMMANDER.
|
|
COMPUTER NETWORK DEFENSE
|
ACTIONS TAKEN TO PROTECT, MONITOR, ANALYZE, DETECT AND RESPOND TO UNAUTHORIZED ACTIVITY WITHIN THE DOD
|
|
COMPUTER NETWORK ATTACK
|
ACTIONS TAKEN THROUGH THE USE OF COMPUTER NETWORKS TO DISRUPT, DENY, DEGRADE, OR DESTROY INFORMATION RESIDENT IN COMPUTER AND COMPUTER NETWORKS, OR THE COMPUTERS AND NETWORKS THEMSELVES
|
|
COMPUTER NETWORK EXPLOITATION
|
ENABLING OPERATIONS AND INTELLIGENCE COLLECTION CAPABILITIES CONDUCTED THROUGH THE USE OF COMPUTER NETWORKS TO GATHER DATA FROM TARGET OR ADVERSARY AUTOMATED INFORMATION SYSTEMS OR NETWORKS
|
|
GIG
|
GLOBAL INFORMATION GRID
THE GLOBALLY INTERCONNECTED END TO END SET OF INFORMATION CAPABILITIES AND ASSOCIATED PROCESSES FOR COLLECTING PROCESSING, STORING, DISSEMINATING AND MANAGING INFORMATION ON DEMAND TO WARFIGHTERS, POLICYMAKERS AND SUPPORT PERSONNEL |
|
INFORMATION SECURITY
|
THE PROTECTION OF INFORMATION AND INFORMATION SYSTEMS AGAINST UNAUTHORIZED ACCESS OR MODIFICATION OF INFORMATION, WHETHER IN STORAGE, PROCESSING, OR TRANSIT, AND AGAINST DENIAL OF SERVICE TO AUTHORIZED USERS
|
|
DEFENSE IN DEPTH
|
IS THE DON PREFERRED SECURITY STRATEGY WHEREBY LAYERS OF PROTECTION ESTABLISH AN ADEQUATE SECURITY POSTURE FOR A SYSTEM
|
|
INCIDENT
|
IN INFORMATION OPERATIONS AN ASSESSSED EVENT OF ATTEMPTED ENTRY, UNAUTHORIZED ENTRY, OR AN INFORMATION ATTACK ON AN AUTOMATED INFORMATION SYSTEM
|
|
3 TIERS AND DEFINE
|
TIER ONE (GLOBAL)-PROVIDE DOD-WIDE CND OPERATION DIRECTION OR SUPPORT TO COMBATANT COMMAND, SERVICE, AGENCY, AND FIELD ACTIVITIES.
|
|
TIER TWO (REGIONAL/THEATER)
|
PROVIDE DOD COMPONENT-WIDE OPERATIONAL DIRECTION OR SUPPORT AND RESPOND TO DIRECTION FROM TIER ONE. INCLUDES COMBATANT COMMAND, SERIC, AGENCY, AND FIELD ACTIVITY CND SERVICE PROVIDERS.
|
|
TIER THREE(LOCAL)
|
PROVIDE LOCAL OPERATIONAL DIRECTION OR SUPPORT AND RESPONDS TO DIRECTION FROM A DESIGNATED TIEER TWO ENTITY.
|
|
LIST THE 3 SERICE PROVIDED BY CND
|
PROTECT; MONITOR, ANALYZE AND DETECT; REPOND
|
|
NAME THE NAVY'S COMPUTER NETWORK DEFENSE SERVICE PROVIDER
|
NCDOC NAVY CYBER DEFENSE OPERATIONS COMMAND IS THE NAVY'S COMPUTER NETWORK DEFENSE SERVICE PROVIDER (CNDSP) AND IS GOVERNED UNDER POLICY AS OUTLINED IN THE DOD 8530.1M.
|
|
LIST THE 3 FIREWALL TYPES USED TO PROTECT NAVY NETWORKS
|
PACKET FILTERING; STATEFUL PACKET FILTERING; APPLICATION PROXIES
|
|
EXPLAIN WHAT AN INTRUSION DETECTION SYSTEM IS
|
A DEVICE THAT ATTEMPTS TO DETECT INTRUSION INTO A COMPUTER OR NETWORK BY OBSERVATION OR AUDIT
|
|
EXPLAIN AN INTRUSION PREVENTION SYSTEM IPS
|
GOES ONE STEP FURTHER THAN AN IDS AND ONLY DETECTS ATTACKS BUY ATTEMPTS TO PREVENT THEM AS WELL
|
|
RC-4
|
RIVEST CIPHER 4
A POPULAR STREAMING SYMMETRIC-KEY ALGORITHM |
|
RSA
|
RIVEST SHAMIR ADLEMAN
AN IMPROVED PUBLIC-KEY CRYPTOGRAPHY ALGORITHM THAT ENABLES SECURE DIGITAL SIGNATURES |
|
BLOWFISH
|
A DERIVATIVE OF DES TO TRY TO ADDRESS SUSCEPTIBILITY TO BRUTE-FORCE ATTACKS
|
|
DES
|
DATA ENCRYPTION STANDARD
A SYMMETRIC-KEY ALGORITHM DEVELOPED BY THE US GOVERNMENT IN THE 1970s AND WAS FORMERLY IN USE IN VARIETY TCP/IP APPLICATIONS. DES US A 64 BIT BLOCK AND A 56 BIT KEY |
|
DEFINE THE REPONSIBILITIES OF THE EKMS MANAGER
|
RESPONSIBLE TO THE STAFF COMSEC RESPONSIBILITY OFFICER (SCMSRO) FOR THE PROPER MANAGEMENT AND SECURITY OF ALL COMMUNICATIONS SECURITY(COMSEC) MATERIAL HELD AT THE COMMAND, AND SERVES AS THE SCMSRO'S PRIMARY ADVISOR ON EKMS ACCOUNT MANAGEMENT
|
|
DEFINE THE TERM ACCOUNT CLERK
|
DESIGNATED BY THE CO TO ASSIST EKMS MANAGER AND ALT WITH ROUTINE ADMINISTRATIVE ACCOUNT MATTERS
|
|
STATE THE FUNCTION OF THE EKMS CENTRAL FACILITY
|
FUNCTIONS PRIMARILY AS A HIGH VOLUME KEY GENERATION AND DISTRIBUTION CENTER
|
|
STATE THE FUNCTIONS OF THE FOLLOWING IN REGARDS TO COMMUNICATIONS SECURITY DON
|
DON ADMINISTERS ITS OWN CMCS WHICH INCLUDES NAVY MARINE CORPS, COAST GUARD, AND MILITARY SEALIFT COMMAND (MSC) EKMS ACCOUNTS, IMPLEMENTS NATIONAL POLICY, PUBLISHES PROCEDURES, ESTABLISHES ITS OWN EKMS ACCOUNT AND SERVES AS SERVICE AUTHORITY FOR COMSEC MATERIAL
|
|
CNO COMSEC
|
HAS OVERALL RESPONSIBILITY AND AUTHORITY FOR IMPLEMENTATION OF NATION COMSEC POLICY WITHIN THE DON
|
|
COMNAVNETWARCOM
|
IMPLEMENTS THE DON COMSEC PROGRAM
|
|
DCMS DIRECTOR COMMUNICATIONS SECURITY MATERIAL SYSTEM
|
ADMINISTERS THE DON COMSEC PROGRAM IS THE SERAUTH FOR DON
|
|
3 TYPES OF COMSEC INCIDENTS
|
CRYPTOGRAPHIC, PERSONNEL, PHYSICAL
|
|
DEFINE TWO PERSON INTEGRITY AND THE REQUIREMENTS ASSOCIATES WITH IT
|
A SYSTEM OF HANDLING AND STORING COMSEC, DESIGNED TO PREVENT SINGLE PERSON ACCESS...2 PERSONS, 2 COMBOS, CONSTANT VIEW
|
|
DEFINE ELECTRONIC SPILLAGE
|
AS DATA PLACED ON A IT SYSTEMS POSSESSING INSUFFICIENT INFORMATION SECURITY CONTROLS TO PROTECT THE DATA AT THE REQUIRED CLASSIFICATION
|
|
3 TYPES OF CONNECTION MEDIA
|
COPPER CABLING- USE ELECTRICAL SIGNALS TO TRANSMIT DATA BETWEEN DEVICES
FIBER-OPTIC CABLING-USES GLASS OR PLASTIC WIRE, ALSO CALLED FIBER, TO CARRY INFORMATION AS LIGHT PULSES |
|
WIRELESS CONNECTION
|
USES RADIO SIGNALS, INFRARED TECHNOLOGY OR SATELLITE TRANSMISSIONS
|
|
CISCO IOS 3 COMMAND MODES
|
USER MODE: ALLOWS THE USER TO EXECUTE ONLY BASIC COMMANDS
PRIVELEGED MODE: VIEW THE SYSTEM CONFIGURATION, RESTART AND ENTER CONFIG MODE CONFIGURATION MODE- MODIFY RUNNING SYSTEMS CONFIGURATION; SUBMODES |
|
PRINT SERVER
|
ALLOW MULTIPLE COMPUTERS IN THE NETWORK TO ACCESS A SINGLE PRINTER THROUGH A NIC
|
|
FILE SERVER
|
IS A SERVER LOCATED ON THE NETWORK THAT PROVIDES A CENTRALIZED STORAGE ARE FOR SHARING
|
|
WEB SERVER
|
COMPUTER PROGRAM THAT DELIVERS CONTENT SUCH AS WEB PAGES, HTTP OVER THE WWW....
|
|
PORT 53
|
DNS
|
|
PORT
|
HTTP
|
|
PORT 110
|
POP
|
|
PORT 443
|
HTTPS
|
|
DIRECTED NET
|
WHEN OPERATING REQUIREMENTS DICTATE THE NET STATIONS OBTAIN NET CONTROL STATION PERMISSIOON PRIOR TO TRANSMITTING NECOS WILL CONTROL THE NET AS A DIRECTED NET
|
|
FREE NET
|
MEMBER STATIONS ARE THEREBY AUTHORIZED TO TRANSMIT TRAFFIC TO THE OTHER NET STATIONS WITHOUTH OBTAINING PRIOR PERMISSION FROM THE NECOS
|
|
RESPONSIBILITY OF A NET CONTROL STATION
|
EXPEDITE TRAFFIC FLOW ON THE NET MAINTAIN CIRCUIT DISCIPLINE LIMIT TRANSMISSIONS TO ESSENTIAL MINIMUM RESOLVING DISPUTES INCIDENT TO MESSAGE HANDLING DETERMIN PROCEDURES DISCREPANCIES; CONDUCT ROLL CALL; EMCON
|
|
CIA/CIB
COMMUNICATION INFORMATION ADVISORY COMMUNICATION INFORMATION BULLETIN |
THESE BULLETINS ARE PROMULGATED BY THE NCTAMS TO PROVIDE ACCUTE AND READILY ACCESSIBLE REFERENCE INFORMATION ON SPECIFIC TACTICAL COMMUNICATIONS SUBJECTS
|
|
FLEET TELECOMMUNICATION PROCEDURES
|
PUBLICATION ISSUED BY THE NCTAMS TO PROMULGATE STANDARD TELECOMMUNICATIONS PROCEDURES FOR USE BY THE COMMUNICATION PERSONNEL OPERATING IN A PARTICULAR OCEAN AREA
|
|
DEFINE PRIMARY MISSION AREAS OF CRYPTOLOGIC MAINTENANCE
|
TECHNICIANS PROVIDE TECHNICAL AND OPERATION SUPPORT TO CRYPTOLOGIC SYSTEMS IN ALL OPERATION THEATERS. TECHNICIAN ARE ASSIGNED TO THE FOLLOWING PRIMARY AREAS: PCS AFLOAT; FLEET ELECTRONIC SUPPORT, SUBMARINE DIRECT SUPPORT; SHORE BASED MISSION SUPPORT
|
|
LIST THE PCS AFLOAT PLATFORMS TECHNICIANS ARE ASSIGNED TO AND THE SYSTEMS THEY ARE RESPONSIBLE FOR
|
TECHNICIAN ARE ASSIGNED AS SHIPS COMPANY TO THE FOLLOWING PLATFORMS: CVN, LHD, LPD, CG, DDG.
|
|
DISCUSS CRYTOLOGIC SYSTEMS MAINTAINED BY THE CTM PERSONNEL SERVING IN SUBMARINE FLEET ELECTRONIC SUPPORT SITE
|
CLUSTER SNOOP SYTEM(ELINT) AN/USQ-149(V)2
INTEGRATED SUBMARING COMMUNICAITON RECEIVING SYSTEM(ISCRS) AN/ULR-21A(V)2 (COMINT) |
|
LIST THE TACTICAL CRYTOLOGIC SYSTEMS TAUGHT WITHIN THE CID DOMAIN
|
1. SHIPS SIGNAL EXPLOITATION EQUIPMENT MAINTENANCE(INC"E")
2. TACTICAL EXPLOITATION SYSTEMS(TES)MAINTENANCE 3. COMBAT DIRECTION FINDING 4. CLUSTER SNOOP 5. INTEGRATED SUBMARINE COMMUNICATIONS RECEIVING SYSTEM |
|
DISCUSS CRYPTOLOGIC SYSTEMS MAINTAINED BY THE CTM PERSONNEL SERVING IN SURFACE FLEET ELECTRONIC SUPPORT SITES
|
NIOC NORFOLK, SAN DIEGO, HAWAII, YOKOSUKA..THEATERS TO SUPPORT CRYPTOLOGIC CARRY-ON PROGRAM (CCOP), EQUIPMENT (ACCES, D4, HITS, DRT)
|
|
SYTEMS ASSOCIATED WITH THE FOLLOWING NEC'S
|
9224 TES
9225 SSEE 9229 SUBMARINE CARRY-ON EQUIPMENT TECHNICIAN 9289 COMBAT-DIRECTION FINDING SRS-1 MAINT TECH |
|
WHAT IS PM
|
MAINTENANCE TO EQUIPMENT
|