• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/286

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

286 Cards in this Set

  • Front
  • Back

Discuss the concept of ORM.

1. Is a decision-making tool to increase effectiveness by identifying, assessing, and managing risks.


2. Increases ability to make informed decisions


3. Minimizes risks to acceptable levels

Explain "IAMIS" and how it applies to Operational Risk Management (ORM)

I-Identifying hazards- Outline all steps in the operations and identify their hazards.



A- Assessing hazards-Determine the degree of each risk in terms of probability and severity.



M- Making risk decisions- Determine whether the benefits outweigh the risks of each step.



I- Implementing controls- Implement engineering, administrative, and PPE controls to reduce/eliminate risks.



S- Supervising- Conduct evaluations of controls to ensure they are effective; take corrective actions when necessary.

State the instruction that governs safety and mishap reporting.

OPNAVINST 5102.1D

Define Hazard severity.
Assessment of worst credible consequence that can occur as a result of a hazard.

Discuss the four categories of hazard severity.

1- may cause death, loss of property
2- may cause severe injury, illness, property damage
3- may cause minor injury
4- presents a minimal threat to personnel safety or health, or property

Define mishap probability.

Probability that a hazard will result in a mishap or loss

Describe the four subcategories of mishap probability.

CAT A- Likely to occur immediately.
CAT B- Probably will occur in time.
CAT C- May occur in time.
CAT D- Unlikely to occur.

Define RAC.

an expression of risk that combines the elements of hazard severity and mishap probability.

List the 5 RAC's.

1. Critical
2. Serious
3. Moderate
4. Minor
5. Negligible

Discuss the timeliness and means for filing mishap investigation reports.

Report all Class A mishaps within 8 hrs

telephone or electronic

Name the four required mishap reportable items.
- government property damage mishaps;
- on-duty DoD civilian mishaps and military on/off-duty mishaps.
- any other work-related illness or injury that involves medical treatment beyond first aid
- other incidents of interest to the Navy and Marine Corps for mishap prevention purposes.

State the purpose of a HAZREP message.

To report on significant hazardous conditions or near-mishaps that have the potential to affect other commands.

State the three objectives of first aid.



(how NIOC Yoko teaches you the wrong way; not like the BMR tells you...)

1. Save Life
2. Prevent further injury
3. Prevent infection

State the three methods of controlling bleeding.

1. Direct pressure
2. Pressure points
3. Tourniquet

Identify the eleven pressure points.

1. temple
2. jaw
3. neck


4. collar bone
5. bicep
6. elbow
7. wrist
8. groin


9. upper thigh
10. knee
11. ankle

Describe the symptoms and treatment for shock.

Symptoms: Dilated pupils, shallow breathing, clammy skin, nausea, weak and rapid pulse.

Treatment: Lay victim down, keep warm, and reassure/calm them if conscious.

Describe the procedures for electrical shock (personnel rescue).

- Secure power
- Don't touch victim's body, wire, or any other conductive object; terminate current or remove victim from situation with nonconductive object

Describe the procedures for electrical shock (treatment).

Start artificial ventilation immediately if needed



Check for a pulse. If you do not feel a pulse, immediately start CPR



Get the victim to a medical facility as soon as possible.

Describe the methods for clearing an obstructed airway.

1.Standing/reclining abdominal thrusts
2. Standing/reclining chest thrusts

Describe the effects and treatment of Hypothermia.



Symptoms


-may appear pale and unconscious, or taken for dead.


-Breathing is slow and shallow


-pulse faint oreven undetectable


-body feels semi-rigid




First aid


-bring the bodytemperature to normal


-the patientshould be wrapped in warm blankets


-Do not give the victim hot drinks or otherstimulants until he has regained consciousness.


-Get medical attention immediately.

Describe the effects and treatment of Frostbite.

Two types:


Superficial - ice crystals forming in upper skin layers.
Deep - ice crystals forming in deeper tissues.

Treatment:


get victim indoors to a warm area by placing them in warm water.


Place warm water under the armpits, against the abdomen, or between legs.

Describe the effects and treatment of Heat Exhaustion.
Heat Exhaustion- when there is a serious disturbance of blood to the brain, heart, and lungs.

Effects: Moise, clammy skin, dilated pupils, normal or subnormal temperature.

Treatment: Get out of heat, keep cool, and get victim to medical care.
Describe the effects and treatment of Heat Stroke.
Heat Stroke- VERY SERIOUS condition caused by a breakdown in the sweating mechanism of body. Victim is unable to remove excess heat from the body.

Effects: Dry, hot skin, constricted pupils; very high blood pressure.

Treatment: Remove victim from heat, keep cool, and seek medical attention.
Define HERO
Hazardous Electromagnetic Radiation to ORDINANCE.


Define HERP

Hazardous Electromagnetic Radiation to PERSONNEL.

Define HERF
Hazardous Electromagnetic Radiation to FUELS.
Define HAZMAT.

Any material because of its quantity, concentration, or physical/chemical characteristics, pose hazards to human health or environment.

Discuss how to store HAZMAT.
Flammable – Stow in approved flammable storerooms or NAVSEA approved flammable storage lockers.



Poison – Stow all toxic materials in cool, dry, well-ventilated spaces with acids, caustics, and oxidizers separated.




Corrosive – Stow corrosive materials in their original containers in an approved designated chest/locker. Ensure corrosive materials are cushioned against shock.




Oxidizers – Stow oxidizers in cool spaces where maximum temperature does not exceed 100 degrees Fahrenheit.




Marine Pollutants – Stow marine pollutants below deck or on the weather deck if equivalent protection from release to the environment is provided.

Describe potential risks of improperly labeled and stored HAZMAT.
A fire or explosion can result in millions ofdollars of damage and claim workers’ lives.
Describe what an MSDS is and the information it provides.
Material Safety Data Sheet is a form with dataregarding the properties of a particular substance.
List the types of Personal Protective Equipment (PPE)
Respirators
Hand Protection
Foot Protection
Eye Protection
Face Protection
Skin/Body Protection
Hearing Protection
State the goal of the U.S. Navy's Hearing Conservation Program.
To prevent occupational hearing loss for all sailors.
State the six areas that make up the Naval Doctrine.
"COWLIP"
C- Command and Control
O- Operations
W- Warfare
L- Logistics
I- Intelligence
P- Planning
State the seven principles of Naval Logistics.
"FEARSSS"
F-Flexibility
E- Economy
A- Attainability
R- Responsiveness
S- Simplicity
S- Sustainability
S- Survivability
State the first Navy ship names after an enlisted man, and why.
USS OSMOND INGRAM
Ingram was the first enlisted man killed in WWI, when the USS CASSIN was torpedoed
What three classes of naval vessels existed at the inception of the U.S. Navy?
Ships of the Line- Battleships - 64 to over 100 guns.



Frigates - Cruisers - 28-44 guns



Sloops of War- Small sailing warship - 10to 20 guns

Describe the importance of the Battle of the Coral Sea.
7-8 MAY 1942

-The battle was fought entirely with carrier-launched aircraft.


-U.S broke Japanese Navy Code

Describe the importance of the Voyage of the Great White Fleet.
16 DEC 1907- 22 FEB 1909
U.S. completed a round-the-world cruise to show the flag; lasting a year and two months. The exercise demonstrated the strength of the U.S. Navy.
Describe the importance of the Battle of Normandy.
6 JUN 1944
Invasion of Normandy, the largest amphibious Assault in World History.
Describe the importance of the Battle of Midway.
3-5 JUN 1942
Turning point in the Battle of the Pacific War, The U.S. breaking of the Japanese Naval Code was again the key element.
Describe the importance of Guadalcanal.
13-15 NOV 1942
U.S. Navy had a policy at the time to place members of th same family on different ships, the U.S. Navy made an exception to allow the five Sullivan brothers to all serve on the USS Juneau. The USS Juneau was torpedoed and all five of the Sullivan brothers, along with 700 others were lost.

Because of this tradegy, Navy Policy concerning family member separation was reinstated.

Describe the importance of the Battle of the Leyte Gulf.

23 OCT 1944
In a last-chance effort to salvage the Philippines, the Japanese sent a naval force to attack the U.S. Fleet. Their plan backfired and the operation was a complete failure: It was the deciding catastrophe for theirNavy.

Discuss, state the impact on history, and the sailors involved with Mercury 3.

05 MAY 1961
NASA's first manned spaceflight program. Demonstrated ability to achieve manual control under weightlessness.
Naval Astronaut- CDR Alan Shepard.

Discuss, state the impact on history, and the sailors involved with Gemini 3.

23 MAR 1965
First two-person space flight; first spacecraft to maneuver from one orbit to another; 3 earth orbits.
Naval Astronaut- LCDR John W. Young

Discuss, state the impact on history, and the sailors involved with Apollo 11.

16-24 JUL 1969
Frist-ever manned lunar landing.
Neil Armstrong (former naval aviator) & Buzz Aldrin.

Discuss, state the impact on history, and the sailors involved with Apollo 17.

7-19 DEC 1972
The 7th and final lunar landing mission.
Naval Astronuats- Eugene A. Cernan, USN and Ronald E. Evans, USN.
Discuss, state the impact on history, and the sailors involved with STS-1.

12-14 APR 1981 (Space Shuttle Columbia)
First orbital flight of space shuttle, All Navy crew.
Naval Astronuats- John W. Young, USN and Robert L. Crippen, USN

STS- Space Transportation System of space shuttle.

Describe the historical significance of The On-The-Roof Gang and how it relates to Information Dominance.

176 enlisted radio operators were specially trained at a unique school located on the roof of the old Navy Deparment Building during 1928-1941. The on-the-roof gang laid the cornerstone of Naval Cryptology.

Describe the historical significance of The Purple Code and how it relates to Information Dominance.

-Most secure diplomatic cryptographic cipher used by the Japanese Foreign Office during, and just before, WWII.

Describe the historical significance of The Battle of Midway and how it relates to Information Dominance.

-Turning point in the Pacific war.


-Cryptanalystsbroke the JN-25 code.


-Admiral Nimitz positioned his 3 carriers, the Hornet, Enterprise, and Yorktown, out of Japanese reconnaissance range.

Describe the historical significance of The Attack on the USS Liberty and how it relates to Information Dominance.

-Liberty was sent to collect electronic intelligence in the eastern Mediterranean


-several messages were sent to increase her closest point of approach (CPA) due to safety concerns.


-Due to ineffective message handling and routing, the ship did not receive the CPA change messages until after the attack.

Describe the historical significance of The USS PUEBLO and how it relates to Information Dominance.

23 JAN 1968
USS Pueblo was off the coast of North Korea when it was attacked and captured by North Korean patrol boats. After eleven months of captivity the USS Pueblo's crew was released.

The USS Pueblo is still U.S. Navy property but has been on display at a museun in Pyongyang, North Korea.
Describe the historical significance of the D-Day Landing and how it relates to Information Dominance.
6 JUN 1944

-Commandedby U.S. Army General Dwight D. Eisenhower


-Code name “Neptune” was launched when weather reports predictedsatisfactory conditions for landing day.

Describe the historical significance of the Landing at Inchon and how it relates to Information Dominance.
15-17 SEP 1950

Intelligence efforts allowed Amphibious invasion of U.S. Army to land in a small time window on normally inhospitable shores to route the North Korean Army.
Describe the historical significance of the Hainan Island EP-3 Incident and how it relates to Information Dominance.
01 APR 2001

-Chinese J-811 Interceptor collided with an EP-3 which was forced down


-poorly implemented emergency destruct occurred on EP-3.


-Chinese claimed a lot of intel.

Describe the historical significance of Bletchley Park and how it relates to Information Dominance.

-Deciphered German ENIGMA cipher


-The site of United Kingdom's main government code and cypher school.

Describe the historical significance of The Navajo Code talkers and how it relates to Information Dominance.
-"Windtalkers"
-Used Navajo language to transmit battle messages in the Pacific.

-The Navajo code talkers took part in every Marine assault in the Pacific from 1942-1945.


-They served in all six Marine divisions.


-The Japanese were never able to break the code.

Describe the historical significance of The USS Stark and how it relates to Information Dominance.
-17 MAY 1987
-Attack by Iraqi Mirage F1 fighter while outside Iraqi and Iranian declared warzones.
-There was no indication of attack as Early Warning Failed
Describe the historical significance of the EC-121 Shoot-down and how it relates to Information Dominance.
-15 APR 1969
-The EC-121 was attacked without warning by North Korean MIG while flying its last mission with a double crew. Everyone on board died.

Prompted U.S. Navy to adopt new procedures to provide reconnaissance aircraft with higher degree of protection.
State the qualities that characterize the Navy/Marine Corps team as instruments to support national policies.
Readiness
Flexibility
Mobility

Self-sustainability

State the three levels of war.
1. Strategic-supports national goals
2. Operational- supports theater
3. Tactical- involves indicidual engagements
Discuss the National Security Act of 1947.
-Signed by President Truman in 1947
-Established the CIA
-War Department and Navy Department merged into DoD under SECDEF
-Created Department of the Air Force
State when and why the current Navy Core Values were developed.
Adopted in 1992
Service wide effort aimed to strengthen the Navy as a values community.
Discuss when and why the Sailor's Creed was developed.
Developed in 1993
-Directed by ADM Frank Kelso

-To instill a clear understanding of Navy virtues into every Navy Recruit.


-Developed by the Blue Ribbon Recruit Training Panels


-Later amended, by Admiral Boorda, to encompass all ranks in the Navy.

State RDML Grace Hopper's contributions to the U.S. Navy.

(not RADM, that's a two-star)

-One of the first programmers of the Harvard Mark I Computer

-She developed the first compiler for a computer programming language.


-She invented the COBOL language


-First female Admiral


-The destroyer USS Hopper (DDG-70) was named for her.

State the name of the first computer and where it was located.
ENIAC (Electronic Numerical Integrator and Computer)
Created in 1942 at the University of Pennsylvania.
Discuss ARPANET and when it was developed.
-1968: DARPA contacts with BBN to create Advanced Research Products Agency Network (ARPANET)

-World's first operational packet switching network and predecessor of the Internet.
-1970: Connected – First fivenodes: UCLA, Stanford, UC Santa Barbara, U of Utah and BBN.

Explain the impact of the John Walker espionage case.
Retired Warrant Officer
Spied for the Russians from 1968-1985
Comprised U.S. Navy crypto information to the Soviet Union for over a decade.
Allowed Soviet Union to make significant gains in naval warfare.

State the oldest intelligence organization of the U.S. Navy.
Office of Naval Intelligence (ONI)
Established to "seek out and report" on advancements in other naton navies.
Explain when ONI was established and by whom it was founded.
Established in 1882
SECNAV William H. Hunt
State the first CIO/DNI
LT Theodorus Bailey Myers Mason
Name the two departments that were combined to from ONI.
Department Library
Office of Intelligence
State the mission of the U.S. Navy.
To train, maintain, and equip combat-ready naval forces capable of winning wars, deterring aggression, and maintaining freedom of the seas.
Discuss the NCA, its members, and its functions.
National Command Authority (NCA)
term used by the U.S. military and U.S. government to refer to the ultimate lawful source of military orders.
-Power to authorize the use of U.S. military forces
-Power to authorize the use of nuclear weapons
Discuss the difference between OPCON and ADCON.
OPCON- Operational Control; having operation responsibility for a given task, mission, or region.
ADCON-Administrative Control; having demisistrative responsibility for forces assigned to a given task, mission, or region.
Describe the function of COCOM.
Combatant Command; command with a broad continuing mission under a single commander and composed of significant components of two or more Military departments.
Describe the function of Navy COCOM.
Naval combatant command with a raritime mission under a single commander, composed of significant components of two or more naval commands.
Describe the function of FLTCOM.
Fleet Command, parent command for all naval units subordinate to a specific fleet (operational control)
Describe the function of TYCOM.
Type Command; an administrative chain of command in which the warous ships report to the appropriate forward-area commanders.
State the location, mission, and component commands for PACOM.
Pacifice Command (Oahu) 3rd & 7th fleet
Promotes regional security and deters aggression
Asia-Pacific stability and security

State the location, mission, and component commands for EUCOM.

European Command (Stuttgart, Germany)


Europe/East Atlantic Ocean/Med


Conduct Military operations, international military engagement and interagency parterning to enhance trans-atlantics security and defend the U.S. forward

State the location, mission, and component commands for JFCOM.
Joint Forces Command (Norfolk)
Provide mission ready joint capable forces and supports development and integration of joint interagency and multinational capabilities to meet present and future operational need of joint forces.
State the location, mission, and component commands for SOUTHCOM.
Southern Command (Miami)
South America and Central America
Responsible for all U.S. activities in AOR.
State the location, mission, and component commands for CENTCOM.
Central Command (Bahrain) Middle East
Promotes cooperation among nations, respond to crises and deter or defeat state and non-state aggression and supports development and when necessary reconstruction in oder to establish condition for regional security, stability and prosperity.
State the location, mission, and component commands for NORTHCOM.
Northern Command (Peterson AFB, CO)
U.S. interests; plans, organizes and executes homeland defense and civil support missions.
State the location, mission, and component commands for SOCOM.
Special Operations Command (Tampa)
U.S. special operations activities; unifies command for worldwide use of special operations elements of Army, Navy, and Air Force
State the location, mission, and component commands for TRANSCOM.
Transportation Command (Scott AFB, IL)
Ensures timely, customer-focused global mobility in peace and wartime with efficient, effective and integrated transportation from end to end to war fighter.
State the location, mission, and component commands for STRATCOM.
Strategic Command (Offutt AFB, NE)
Detect, deter, and prevent attacks against U.S. and our allies.
State the location, mission, and component commands for AFRICOM.
Africa Command (Stuttgart, Germany)
Africa; Administrative HW responsible to secretary of defense for U.S. military relations with 53 African countries.
State the location, mission, and component commands for USCYBERCOM.
Cyber Command
Worldwide, an armed forces sub-unified command subordinates to U.S. strategic command.
Define the operating area of the 2nd Fleet.
East coast to mid-Atlantic including Gulf of Mexico
Define the operating area of the 3rd Fleet.
Point Loma, San Diego, California.



Eastern and Northern Pacific

Define the operating area of the 4th Fleet.
Mayport Naval Station, Jacksonville, Florida.



Caribbean Sea, Central/South America.

Define the operating area of the 5th Fleet.
Naval Support Activity, Bahrain.



Persian Gulf, Red Sea, Arabian Sea, and coast off East Africa as far south as Kenya.

Define the operating area of the 6th Fleet.
Naval Support Activity, Naples, Italy.



Eastern Atlantic and most of Africa

Define the operating area of the 7th Fleet.
Yokosuka, Japan.



Western Pacific to India

Define the operating area of the 10th Fleet.

Fort Meade, Maryland



maritime, cyberspace and information domains.
Define TF
Task Force; subdivision of a fleet.
Define TG
Task Group; division of a task force.
Define TU
Task Unit; division of a task group.
Define TE
Task Element division of a task unit.
Describe the IDC ratings.

1.AG-provides linguistic support to intelligence community
2. CT
a. CTI- provide linguistic support to intelligence community
b. CTM- provide maintenance support to intelligence-related equipment
c. CTN- provide network-related support to intelligence community
d. CTR- collects, analyzes, and disseminates information to intelligence community
e. CTT- collects, analyzes, exploits, and disseminates electronic intelligence (ELINT)
3. IS- Relays technical information to various levels of intelligence community.
4. IT- Provides technical support to intelligence and information systems.

State the location, mission, and component commands of the following Naval and Computer Telecommunication Area Master Stations (NCTAMS)

NCTAMS LANT – The mission is toprovide classified and unclassified voice, messaging, data and video to ships,submarines, aircraft and ground forces operating worldwide in support of Navaland joint missions.




NCTAMS PAC – Deliver and operate a reliable, secure andbattle-ready Navy Network, providing sustained information superiority to Navy,Joint and Coalition warfighters in the Pacific and Indian Ocean areas ofresponsibility.

Define C4ISR

Command


Control


Communications


Computers


Intelligence Surveillance Reconnaissance


The ability to gather, process, disseminate, evaluate and display real time, all source, fused intelligence and surveillance data.

Explain the mission of the DISA.

DISA-Defense Information System Agency


Engineers and provides C2 capabilities and an infrastructure to continuously operate and assure a global net centric enterprises in direct support to various levels.

Explain the mission of NASIC.

NASIC- National Air and Space Intelligence Center.


Produces foreign aerospace intelligence via surveillance and reconnaissance

State the mission of the NCDOC.

NCDOC- Navy Cyber Defense Operations Command


Provides 24/7 protection to Navy's Cyber Systems

Identify and discuss ODNI and their roles in the Intelligence Community.

ODNI- Office of the Director of National Intelligence; serves as the head of the U.S. IC and acts as the principle advisor to the President, NSC, and Homeland Security Council

Identify and discuss DIA and their roles in the Intelligence Community.

DIA- Defense Intelligence Agency


Provide timely, objective, and cogent military intelligence to warfighters, defense planners, and defense and national security policy makers.


Identify and discuss NSA and their roles in the Intelligence Community.

NSA- National Security Agency


Protect U.S. national security systems and to produce foreign signals intelligence information

Identify and discuss CIA and their roles in the Intelligence Community.

CIA- Central intelligence Agency


Focal point for the collection, analysis, and dissemination of all U.S. intelligence (HUMINT)

Identify and discuss NGA and their roles in the Intelligence Community.

NGA- National Geospatial Intelligence Agency


Provides timely, relevant, and accurate GEOINT in suppport of national security.

Identify and discuss DHS and their roles in the Intelligence Community.

DHS- Department of Homeland Security


Tasked with preventing terrorist attacks within the United States, reducing America's vulnerability to terrorism, and minimizing the damage from potential attacks and natural disasters.

Identify and discuss FBI and their roles in the Intelligence Community.

FBI- Federal Bureau of Investigation


Protects and defends the U.S. against terrorist and foreign intelligence threats, upholds and enforces criminal laws of U.S. and provides leadership and criminal justice services to federal, state, municipal, and international agencies and partners.

Identify and discuss DEA and their roles in the Intelligence Community.

DEA- Drug Enforcement Administration


Provides intelligence and operational support to combat the flow of narcotics.

Identify and discuss DOE and their roles in the Intelligence Community.

Department of Energy


– to advance the national, economic, and energy security of the US;


– to promote scientific and technological innovation in support of that mission;


– and to ensure the environmental cleanup of the national nuclear weapons complex.

Identify and discuss DOS and their roles in the Intelligence Community.

DOS- Department of State


–Advance freedom for the benefit of the American people and the internationalcommunity...

Identify and discuss DOT and their roles in the Intelligence Community.

DOT- Department of Treasury


Analyzes foreign intel related to U.S. economic policy and participate with DOS in overt collection of general foreign economic information

Identify and discuss NASA and their roles in the Intelligence Community.

NASA- National Aeronautics and Space Administration


Responsible fore education, research, and scientific discovery regarding aerospace

Identify and discuss NRO and their roles in the Intelligence Community.

NRO- National Reconnaissance Office


Provides innovative overhead intelligence systems for national security

Identify and discuss USAF and their roles in the Intelligence Community.

USAF- United States Air Force


Organizes, trains, equips, and presents assigned forces and capabilities to conduct intelligence, surveillance and reconnaissance (ISR) for combatant commanders and the national intelligence community.

Identify and discuss USA and their roles in the Intelligence Community.

USA- United States Army


Provides a wide range of unique capabilities to provide commanders and policymakers the support they need, when they need it, synchronized with their operations.

Identify and discuss USMC and their roles in the Intelligence Community.

USMC- United States Marine Corp


Provides tailored intelligence support to the Marine Corps operating forces with contingency planning and other requirements for intelligence products not satisfied by other theater or national assets.

Identify and discuss USN and their roles in the Intelligence Community.

– Serves as a seaborne branch of the Military of the United States.


– Three primary areas of responsibility:


1) The prepare naval forces necessary for the effective prosecution of War.


2) The maintenance of naval aviation and all air weapons and air techniques


3) The development of technology, tactics, technique, organization, and equipment of naval combat and service elements.

Identify and discuss USCG and their roles in the Intelligence Community.

USCG- United States Coast Guard


Serves as the central hub for collection, fusion, analysis, and dissemination of maritime intelligence and information to Coast Guard units, DHS, and the IC.

Discuss the responsibilities of the Commander in Chief (President)

Head of Armed Forces as mandated by the Constitution; responsible for initiating military action in support of national Interests; can submit to Congress "intent to declare war" which congress must approve in order to actually wage war.

Discuss the responsibilities of the Secretary of Defense

Principle defense advisor to President; responsible fore formulation of general defense policy

Discuss the responsibilities of the Secretary of the Navy

Conducts all the affairs of the DoN

Discuss the responsibilities of the Chief of Naval Operations

-Navy rep of Joint Chiefs of Staff;


-Keeps Secretary of the Navy informed of JCS activities and


-responsible to President and SECDEF for naval warfare.

Discuss the responsibilities of the Fleet Commander in Charge

Responsible for all naval operations within his;her fleet's AOR

Discuss the responsibilities of the Type Commander

Typecommanders primarily supervise personnel, training, logistics, maintenance, andother support to ships, aircraft and units.

Discuss the role of the Fleet Master Chief

Senior enlisted advisor to a fleet commander

Discuss the role of the Force Master Chief

Master Chiefs who have virtually the same responsibility as CMC's but are responsible for larger force commands (i.e. submarine force U.S. atlantic fleet)

Discuss the role of the Command Master Chief

The most senior enlisted sailor in a navy unit; liaison between enlisted personnel and CO

Define CCRI

CCRI- Command Cyber Readiness Inspection


A formal inspection process, which holds commanders accountable for their respective security posture

State NAVCYBERFOR's role in CCRI

Implementing rigorous grading criteria

State the purpose and contents of EDVR

EDVR- Enlisted Distribution Verification Report


Monthly statement of an activity's enlisted personnel account;


-announces present and future manning status of an activity


-a permanent historical record of the activity's enlisted personnel account;


12 sections,


Section 1 – Prospective Gains


Section 2 – Prospective Losses


Section 3 – Temporary duty, deserter status, alphabetical list off all members assigned


Section 4 – List of crew by rating.


Section 5 – Personnel Status Summary,


Sections 6-9 – CNO authorized billets, NEC billets, etc.


Section10 – DISCONTINUED


Section 11 – pay entry base date (PEBD), TIR, advancement date.


Section 12 – TAD/embarked personnel.

State the purpose and contents of ODCR

ODCR- Officer Distribution Control Report


Officer's version of EDVR

State the purpose and contents of AMD

AMD- Activity Manpower Document


The single official statement of funded and unfunded requirements (manpower authorizations or B/A) for each UIC

State the purpose of an Evaluation Report

To rank enlisted personnel amongst peer for promotion and duty assignments purposes

State the purpose of a Fitness Report

Evaluation report for Officers

State the purpose of a concurrent report

Provides a record of significant performance that was not directly observable by the regular reporting senior

State what is found on the Page 2 of a service record

Dependency application/record or emergency data

State what is found on the Page 4 of a service record

Enlisted qualification history, specialty codes, special skills, awards

State what is found on the SGLI portion of a service record

Servicemen's group life insurance election and certification

State what is found on a Page 13 in a service record

Administrative remearks serves as a chronological record of significant misc. entries not provided elsewhere

What is the purpose of a SITREP

SITREP- Situational Report


Used for reporting incidents which may attract national and or high level Navy interest

Explain OPREP -3 Navy unit SITREP

Used by a Unit Commanding Officer (CO), Officer-in-charge (OIC), or other commanders to notify appropriate operational commanders and other higher authority of incidents not meeting OPREP-3 Navy Blue reporting criteria

Explain OPREP-3 Navy Blue SITREP

Used to provide CNO and other naval commanders with immediate notification of incidents of military, political or press interest, which are of high Navy, vice national level, interest. The reports are submitted to provide "as it happens."

Explain OPREP-3 Pinnacle SITREP

Used to report incidents of national-level interest to National Military Command Center (NMCC)

Discuss the importance of the IG

IG- Inspector General


Serves as principle advisor to SECDEF on all audit and criminal investigative matters relating to prevention and detection of fraud, waste, and abuse in programs and operations of the Department of Defense.


The IG audits, evaluate, monitor, and reviews programs, policies, procedures, and functions of DoD Intelligence Community to ensure intelligence resources are properly managed

State the purpose of the Navy Correspondence Manual

Used to create uniform standards for the management and preparation of correspondence

Explain the PTS program

As of 29 SEP 2010 the PTS system has been merged into the Fleet Rating Identification Engine (Fleet Ride) Program.


The fleet ride program is a long range force shaping tool that aids in leveling rating manning between overmanned and undermanned ratings, while managing the quality of reenlistment applicats by controlling the authority for reenlistment


Commands shall submit fleet ride applications for all E-3-E-6 sailors with less than 14 years of service regardless of their career intentions.


Submit applications as early as 15 months, but NLT 12 months propr to the sailor's expiration of active obligated service (EAOS) as extended, also known as "Soft" EAOS

Explain what the DLPT is

DLPT- Defense Language Proficiency Test


Group of foreign language tests intended to assess the general language proficiency of native english speakers in a specific foreign language


Scoring is on a level from 0-5 in the following categories:


Speaking


Listening Comprehension


Reading Comprehension


Writing

State the duties and responsibilities of the Command ESO

Supervise the administration of the training office and training aids

Explain the purpose of the U.S. Navy's Drug Screening Program

Establishes a valid and reliable means of inspecting a command's personnel to assess the command's readiness to carry out its assigned mission; deterrent against drug use

Describe the six programs of Brilliant on the Basics (MICROS)

M-entorship


I-ndoc


C-areer Development Boards (CDB'S)


R-ecognition


O-mbudsmen


S-ponsorship

Explain the purpose of the PAO.

PAO- Public Affairs Officer


The Public and Media Affairs staff handles all inquiries from the media and general public on behalf of the National Security Agence. The goal is to provide accurate, relevant, and appropriate unclassified information about NSA within the requester's deadline. Our fully coordinated responses reflect NSA's corporate image as established by senior management.

Discuss the purpose of the 3-M/PMS System

3-M- Maintenance Material and Management


Provides efficient and uniform methods for conducting and recording preventive, alterative, and corrective maintenance.


PMS- Planned Maintenance System


Strandardized method for planning, scheduling, and accomplishing preventive maintenance by ship's force

Explain how DPAS is used to track equipment

DPAS- Defense Property Accountability System


Web-enabled system that tracks lifecycle of an asset from receipt to disposition

Discuss the purpose of the MOV program

– Material Obligation Validation


– Improves requisition validity


– Mandatory Monthly Internal MOVs conducted by individual departments


– Maximizes limited OPTAR funds.

Discuss the DLRs program

DLR- Depot Level Repair


Manages high-value (cost) items that cannot be repaired or reused

Explain the procedures for NRFI (Not Ready for Issue) DLRs in regard to the following situations

Turn-In


The part that needs to be replaced is turned into supply, then the process is initiated to replace the part (for exchange basis only)


RIP- Return in Place


although the part may be degraded, it is required to remain in use until the new item arrives; item is turned into supply when new item is in place. Commanding Officer must approve RIP chits

Define the purpose of MAMs

Maintenance AssistanceModules –


-Used as a troubleshooting aid.


-Normallyinstalled in equipment for brief periods as an aid to detecting faults.


-If a repair part is required to avoid a CASREPand is not immediately available, the DH may authorize temporary usage of theMAM to keep the equipment operating until a replacement is procured.

Define the purpose of Bulkhead Mounted Spares

Spares that are kept in the work center due to size or cost resulting on the parent department head to be responsible for upkeep on them

Define the term CASREP

CASREP- Casualty Report


Used in event of equipment malfunction or deficiency which cannot be corrected within 48 hours, reduces unit's ability to perform a primary mission, secondary mission, or a training command's ability to perform its mission

How many categories of CASREP are there?

4 Categories:


CAT I


CAT II


CAT III


CAT IV

Explain CAT I of CASREP

CAT I- Used ONLY at TRAINING COMMANDS. A casualty exists, but does not cause a break in training

Explain CAT II of CASREP

CAT II- A deficiency exists in mission essential equipment which causes a minor degradation in any primary mission, or a major degradation or total loss of a secondary mission

Explain CAT III of CASREP

CAT III- A defieiency exists in mission essential equipment which causes a major degradation but not the loss of a primary mission

Explain CAT IV of CASREP

CAT IV- A deficiency exists in mission essential equipment that is worse than category 3, and causes a loss of at least one primary mission

Define NSN

NSN- National Stock Number


13 digit number assigned by Defense Logistic Agency to identify an item of material in supply distribution system

Define COG

COG- Cognizance


A two character symbbol that designated the store's account in which a type of material is carried and the responsible inventory control point

Define APL

APL- Allowance Parts List


A technical document prepared for individual equipment/components which are on board. It lists all the repair parts installed on the equipment/component to which it applies, as well as other pertinent data

Define AEL

AEL- Allowance Equipage List


A technical document prepared for various categories of equipage for mechanical, electrical, electronic and ordance systems. Contains the onboard allowance of equipage and supplies to support the ship's mission

Define NC

NC- Not Carried


Material for which there is no storeroom allowance

Define NIS

NIS- Not in Stock


Material normally stocked in the storeroom but is temporarily exhausted

Define SIM

SIM- Selected Item Maintenance


Inventory control system by which maximum attention is given to those items experiencing a high rate of usage

State the purpose of DD FORM 1348-6

MILSTRIP requisitioning form for NON-NSN (anywhere)

State the purpose of NAVCOMPT 2276

Request for Contractual Procurement

State the purpose of NAVSUP 1250-2

MILSTRIP requisitioning form for NON-NSN (Navy Supply Source Only)

State the purpose of DD FORM 448

Military Interdepartmental Purchase Request (MIPR)

State the purpose of SF 44

Purchase Order Invoice Voucher.




Pocketsize form designed for on-the-spot, over-the-counter purchases of supplies andnon-personal services away from the purchasing office

State the purpose of DD FORM 1155

Order for supplies or services

State the purpose of SF 1449

Solicitation/contract/order for commercial items

State the purpose of SF 30

Amendment of Solicitation/Modification of contract

State the purpose of DD FORM 200

Financial Liability investigation of Property Loss (FLIPL)

State the purpose of SF 364

-Report of Discrepancy (ROD)


-Receivingactivity submits when there is a shipping or packaging discrepancy.

State the purpose of SF 386

Product Quality Deficiency Report (PQDR)

Discuss CHRIMP

CHRIMP-Consolidated hazardous Material reutilization and Inventory Management Program


A successful method to achieve lifecycle control and management of Hazardous Material (HM) and Hazardous Waste (HW)

Discuss DRMS

DRMS- Defense Reutilization and Marketing Service


Dedicated to the disposition of excess and surplus military equipment and supplies

Discuss ServMart

A warehouse designed store which carries NSN items to be bought with a government purchase card

Discuss the uses of the Government commercial purchase Card (IMPAC)

Streamlines payment procedures, reduces paperwork processing purchase orders improving cash management practices, and provides procedural feedback to improve management control and decision making


Micro-Purchases (Level 1) May be made without securing competitive quotations or any type of value analysis if the prices are considered reasonable


Micro-Purchase Threshold (Level II)


Must determine price reasonableness by comparing pricing or pricing factors. This action must be documented and approved prior to making the purchase.

Explain OPTAR and its components

OPTAR- Operating Target


An estimate of the amount o money that will be required by an operating unit to perform tasks and functions assigned. Also term used to refer to a "check book"

How many components does OPTAR have, and what are they?

OPTAR is broken down ino two components Repairable and Consumables


Repairable- parts required to fix/corect deficiency in ship or station


Consumables- toilet paper, paper, pens, etc

Define Normal Power

Standard power supplied for normal daily usage

Define Emergency Power

Secondary power supplied only to vital equipment/systems in the event of a casualty

Define UPS

UPS- Uninterrupted Power Supply


Minimal battery power provided to electronic equipment in order to properly power down a system

Identify the directives that govern personnel security

NAVSUP to DoD DIR 5105.21.M-1


SECNAV M5510-30


ICD 704

Define Top Secret and the color codes used to identify it

Could cause exceptionally grave damage to national security


Represented by ORANGE

Define Secret and the color codes used to identify it

Could cause serious damage to national security


Represented by RED

Define Confidential and the color codes used to identify it

Could cause damage to national security


Represented by BLUE

Define Unclassified and the color codes used to identify it

Technically not a classification level, but is used for documents that do not have other classifications. Such documents can sometimes be viewed by those without security clearances


Represented by GREEN

Explain what is meant by "need to know"

is a determination that an individual requires access to specific classifiedinformation in the performance of (or assist in the performance of) lawful andauthorized government functions and duties.


-not solely based on office, rank, position, or title, or clearance level held

State the type of investigation and how often it is updated for access to Top Secret

Top Secret


SSBI investigation


Updated every 5 years

State the type of investigation and how often it is updated for access to Secret

Secret


National Agency Check with Local Agency and Credit Checks (NACLC)


Updated every 10 years

State the type of investigation and how often it is updated for access to confidential

Confidential


National Agency Check with local agency and credit checks (NACLC)


Updated every 15 years

State the type of investigation and how often it is updated for access to SCI

SCI


SSBI


Updated every 5 years

Identify what SAER is and its purpose.

SAER- Security Access Eligibility Report


Used to report to DONCAF any information that mnight affect someone's continued eligibility for access to SCI

Identify the events that should be reported to the SSO

Unexplained affluence or excessive indebtedness


Alcohol Abuse


Illegal or improper drug use


Apparent mental or emotional disorder


Criminal conduct


Personal Conduct


Non compliance with security regulations


Misuse of technology systems


Foreign influence


Foreign citizenship or foreign monetary interest


Unofficial foreign travel


sexual behavior that is criminal


Identify who has overall authority of, and controls access to, a SCIF

The Commanding Officer (CO)

Identify the use of SF700

Security container envelope


Used to record safe and door lock combos

Identify the use of SF701

Activity security checklist


Used at end of day to ensure classified materials are secured properly and provides for accountability. Retained for at least 90 days

Identify the use of SF702

Security Container Checksheet


Open and Close form

Identify the use of SF703

Top Secret coversheet

Identify the use of SF153

COMSEC Material report


Acquisition/transfer of secure comms devices

Identify the use of SF312

Classified information nondisclosure agreement (DD 1847-1 SCI non disclosure agreement) a contractual agreement between the U.S. government and a cleared employee that must be executed as a condition of access to classified info

State when safe combinations should be changed

When lock is initially placed


Person that no longer requires access knows code


Combination compromise


Combination is out of service


Maintenance was performed on lock


When designated by the CSA/SIO or owner of the safe

What is an FDO and state their responsibilities

FDO- Foreign Disclosure Official


Approves the disclosure of classified and controlled unclassified military information to foreign representatives. Anything related to official interaction with foreigners

State the purpose of the DCS

DCS- Defense Courier Service


Provides safe transport of sensitive/classified material and equipment by authorized DoD personnel.

State the responsibilities of the TSCO

- Top Secret Control Officer


- CO designates in writing.


- accountable to record the daily activities dealing with command Top Secret information, SCI and other special types of classified information.


- Must also ensure inventories of TS information conducted at least once annually (or more often)

State the THREATCON recognitions and Force Protection levels and discuss what each represents

ALPHA- General Readiness (Increased general threat of possible terrorist activity)


BRAVO- Somewhat predictable threat (Increased or more predictable threat of terrorist activity)


CHARLIE- Known terrorist threat made (Incident occurs)


DELTA- Specific target known and declared or terrorist event has occurred (Applied to the immediate area where terrorist attack has occurred)

Explain what a RAM is

RAM- Random Antiterrorism Measure


The random implementation of higher FPCON measures in consideration of the local terrorist capabilities. Basically changes up normal routine so not to be predictable to terrorists or anyone else.

Explain and state the purpose of an EAP

EAP- Emergency Action Plan


Everycommand that holds classified COMSEC or CCI material must prepare and maintaina current, written emergency plan for safeguarding such material in the eventof an emergency.

Explain and state the purpose of Emergency Destruction Procedures

Prevent uncleared personnel from access to classified material in case of emergencies such as fire, natural disaster, civil disturbance, terrorist activities, or enemy attack. Destroy classified material to means where it cannot be re-constructed!

State who can give the order to initiate Emergency Destruction

Highest ranking person on station for SCI (CO/SIO)

Explain how, and in what order, material is destroyed during Emergency Destruction

All material/equipment shall be destroyed by any reasonable means available: burning, shredding, smashing, degaussing, magnets, jettison, etc.


Priority 1- All cryptographic equipment and documents


Priority 2- All operational SCI codeword material which might divulge targets and successes, documents dealing with US SCI activities and documents, TOP SECRET material, and other sensitive material.


Priority 3- Less sensitive administrative SCI material and collateral classified material not included above.

Define SCI

SCI- Sensitive Compartmented Information


Classified information concerning or derived from intelligence sources, methods, or analytical processes and required to be handled within a formal access control system

List the items prohibited in a SCIF and the security risks associated with them.

Personally owned photographic, video, and audio recording equipment


Personally owned computers and associated media


Any items that pose a risk of disclosure or transport of classified information


Explosives

Define the difference between a security violation and a practice dangerous to security

Practice dangerous to security- a failure to comply with security regulations that cause a potential compromise of classified information


Security violation- compromise of classified information to persons not authorized to receive it or a serious failure to comply with security regulation and it likely to result in compromise

Explain the security requirements for the following

SCIF- An accredited area, room, groups of rooms, buildings, or installations where SCI may be stored, used discussed and/or processed


T-SCIF- An accredited facility where SCI may be stored, used, discussed and/or processed determined for a limited time to meet tactical, emergency, or immediate operational requirements.

Explain vault recertification and recurring inspections.

vault recertification and recurring inspections are conducted to ensure SCIFs are meeting ICD 705 standards. SCI security officials will conduct self-inspections of SCIFs at least annually. Other inspections based on threat, physical modifications, etc

Discuss the need for access lists, required documentation logs, and two-person integrity

To ensure only properly authorized personnel access the classified material, annotate when documents were accessed for accountability, and to ensure material remains uncompromised during transit

Explain the DoD escort policy

The movement of all visitors shall be contolled to ensure that access to classified information is deliberate and consistent with the purpose of the visit


All persons must be escorted by qualified and cleared personnel throughout their visit

Discuss the procedures for sanitizing an areas

You first have to announce "Uncleared" and wait until all computer screens, paperwork and all other classified material is put away.

Discuss, define, and give the purpose of COMSEC

COMSEC- Communications Security (protecting our communications) Measures and controls taken to deny authorized persons information derived from telecommunications

Discuss, define, and give the purpose of INFOSEC

Information Security – protecting informationand information systems from unauthorized access, use, disclosure, disruption,modification or destruction.


- protection from compromise

Discuss, define, and give the purpose of COMPUSEC

COMPUSEC- Computer Security (ensuring our computers are secure) Information security as applied to computers

Discuss, define, and give the purpose of PSP

PSP- Personnel


Ensuring there is no unauthorized access to SCIFs or classified information

Discuss, define, and give the purpose of ATFP

ATFP- Antiterrorism


Force Protection; (defensive measures used to reduce the vulnerability of individuals and property to terrorist acts)

State the purpose of the ICD system

ICD- Intelligence Community Directives


The principle means by which the DNI provides guidance, policy, and direction to the IC

Identify SSO of Navy.

Director, Security and Corporate Services; oversees SSO operations for the DON

List the duties and responsibilities of the SSO

Responsible for maintaining the security of SCI material and providing advice to the CO or OIC on all matters pertaining to SCI (Personnel and Physical Security)

Identify who can be a CSM

CSM- Command Security Manager


Must be an officer or civillian employee (GS-11 or higher)


U.S. Citizen


Completed an SSBI

State the duties and responsibilities of a CSM

Responsible for the administration of the command's information and prsonnel security programs (not related to SCI, SAPs or IT programs)

Explain and state the purpose of JPAS

JPAS- Joint Personnel Adjudication System


The DoD managed, official personnel security migration database/system. Provides "real time" information regarding clearance, access, eligibility and investigative status to authorized DoD security personnel and other interfacing organizations

Explain and state the responsibilities of DONCAF

DONCAF- Department of the Navy Central Adjudication Facility


Responsible for determining who within the DON is eligible to hold a security clearance, to have access to SCI, or to be assigned to sensitive duties

Discuss how long a commanding officer can administratively suspend access before DONCAF revokes a clearance

90 Days

State the levels of INFOCON and what each signifies

INFOCON 1- Describes when attacks are taking place and the computer network defense system is at maximum alertness


INFOCON 2- Describes when an attack has taken place but the network defense system isn't at its highest alertness


INFOCON 3- Describes when a risk has been identified


INFOCON 4- Describes an increased risk of attack on computer networks


INFOCON 5- Describes a situation where there is no apparent hostile activity against computer networks

Discuss the security rules and procedures for magnetic and electronic media

All such devices bearing classified information must be conspicuously marked with highest level of classification stored on device and any special control notices that apply to the information

Explain why U.S. Navy only uses ".mil" email addresses on government systems

DoD has exclusive use of the ".mil" domain, which provides increased security

Define IA

IA- Imformation Assurance


Information operations that protect and defend data and information systems by ensuring their availability, integrity, authentication, confientiality, and non-repudiation

Define Certification

Certification- the comprehensive evaluation of the technical and non-technical security features of an IS and other safeguards, made as part of an in support of accrediation process, to establish extent to which a particular design and implementation meet a specified set of security requirements. The certification process validates that appropriate levels of concern for integrity and availability and an appropriate confidentiality protection level have been selected, and that the required safeguards have been implemented on the system as described in System Security Plan (SSP)

Define Accreditation

Accreditation




Formaldeclaration by a Designated AccreditingAuthority (DAA) or PrincipalAccrediting Authority (PAA) that an information system is approved tooperate at an acceptable level of risk.

Define DAA

DAA- Designated Approving Authority


Official with authority to formally assume responsibility for operating a system at an acceptable level of risk

Define System Security Authorization Agreement

System Security Authorization Agreement


Living document that represents formal agreement between DAA, certification Authority, Program Manager, and user rep

Define ATO

ATO- Authority to Operate


Formal declaration by DAA that info System is approved to operate in a particular security mode using a prescribed set of safeguards

Define IATO

IATO- Interim Authority to Operate


Temporary authorization granted by DAA, or SCO, for an IS to process classified info in its operational environment based on preliminary results of a security evaluation of the system. Can be granted for up to 180 days, and if necessary an extension can be granted for additional 180 days.

Define Configuration Management

Configuration Management


Identifies, controls, accounts for, and audits all changes to a site or info system during its design, development, and operational lifecycle

Discuss security procedures involved when performing cross-domain transfers.

Scan all info storage media and e-mail attachments introduced prior to its use on any SCI system. If media cannot be scanned, it is considered high risk and can't be used on SCI system without approval from Service Certifying Organization (SCO)

Discuss risk management

The process that allows IT managers to balance the operational and economic costs of protective measures and achieve gains in mission capability by protecting the IT systems and data that support their organizations missions

Define the five attributes of IA (CIANA)

C-Confidentiality(Assurance that information is not disclosed to unauthorized persons)


I- Integrity( Assurance that information is not modified by unauthorized parties or in an unauthorized manner)


A- Availability(Assurance of timely, reliable access to data and information systems by authorized users)


N- Non-repudiation( Assurance that the sender of date is provided with proof of delivery and the recipient is provided with proof of the sender's identity)


A- Authentication(Assurance of identity of a message sender or receiver. Authentication is the security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual's authorization to receive specific categories of information)

Define the computer incident: Root Level Intrusion

Root Level Intrusion- unauthorized (administrative) privileged access to a DoD system; includes access to info or unauthorized access to account credentials that could be used to perform admin functions.

Define the computer incident: User Level Intrusion

User Level Intrusion- unauthorized non-privileged access to DoD system. System is compromised with malicious code that provides remote interactive control.

Define the computer incident: Denial of Service

Denies, degrades, or disrupts normal functionality of a system or network

Define the computer incident: Malicious Logic

Installation of software designed and or deployed by adversaries with malicious intentions of gaining access to resources or information without consent or knowledge of user.

Define the computer incident: Unsuccessful Activity Attempt

Unsuccessful Activity Attempt- deliberate attempts to gain unauthorized access to DoD system, defeated by normal defensive mechanisms. Attacker fails to gain access to system.

Define the computer incident: Non-Compliance Activity

Non-Compliance Activity-potentially exposes DoD systems to increased risk as a result of action/inaction of authorized users.

Define the computer incident: Reconnaissance

Reconnaissance- seeks to gather information used to charazterize DoD systems, apps, networks, and users that may be useful in formulating an attack.

Define the computer incident: Investigating

Investigating- events that are potentially malicious or anomalous activity deemed suspicious and warrant/are undergoing further review.

Define the computer incident: Explained Anomaly

Explained Anomaly-suspicious events that are determined to be non-malicious acty and do not fit criteria for any other categories (MISC)

Describe the DoN World Wide Web Security Policy.

All DoN sites must have a clearly articulated purpose, approved by commander, and support command's core competency mission. Only contain unclassified materal approved for public release; no OPSEC violations.

Define IAVA

IAVA- Information Assurance Vulnerability Alert


An announcement of a high risk computer software or system vulnerability in form of an alert. Provides corrective actions

Define IAVB

IAVB-Information Assurance Vulnerability Bulletin- an announcement of a medium risk computer software or system vulnerability in the form of a bulletin

Define IAVT

IAVT- Information Assurance Vulnerability Technical Advisory- announcement of a low risk computer software or system vulnerability in the form of an advisory

Define CTO

CTO- Communications Tasking Order- DoD wide instruction that promulgates mandatory changes in standing instructions on how communications are handled.

Define NTD

NTD- Navy Telecommunications directive- a widely disseminated naval message giving an order or direction about a certain IT function that needs to be complied

Define Service Pack

Service Pack- collection of updates, fixes and /or enhancements to a software program delivered in the form of a single installable package.

Define vulnerability assessment

Vulnerability Assessment- A testing process used to evaluate the network infrastructure, software, and users in order to identify known weaknesses

Explain the difference between vulnerability and threat.

Vulnerability – any weakness, administrativeprocess, or act or physical exposure that makes an information assetsusceptible to exploit by a threat.


Threat – a potential cause of an unwantedimpact to a system or organization.=u$

State the duties and responsibilities of the IAM

Responsible for establishing, implementing, and maintaining DoD info system IA program


Must be designated in writing


Should not be a Collateral Duty


US Citizen


Hold highest clearance of highest classification of IS responsible for


Attend DAA Training

Define Host/Client

Computer connected to other computers, provides data services via a network

Define Application Server

Application Server- specialized server in a client network that runs only specific applications within the network.

Define Hub

Common connection point for devices in a network

Define Switch

Same as HUB but smarter. Only forwards packets to intended recipient port.

Define Router

Physical device that joins multiple networks together