Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
286 Cards in this Set
- Front
- Back
Discuss the concept of ORM. |
1. Is a decision-making tool to increase effectiveness by identifying, assessing, and managing risks. 2. Increases ability to make informed decisions 3. Minimizes risks to acceptable levels |
|
Explain "IAMIS" and how it applies to Operational Risk Management (ORM) |
I-Identifying hazards- Outline all steps in the operations and identify their hazards.
|
|
State the instruction that governs safety and mishap reporting. |
OPNAVINST 5102.1D |
|
Define Hazard severity.
|
Assessment of worst credible consequence that can occur as a result of a hazard.
|
|
Discuss the four categories of hazard severity. |
1- may cause death, loss of property |
|
Define mishap probability. |
Probability that a hazard will result in a mishap or loss |
|
Describe the four subcategories of mishap probability. |
CAT A- Likely to occur immediately. |
|
Define RAC. |
an expression of risk that combines the elements of hazard severity and mishap probability. |
|
List the 5 RAC's.
|
1. Critical |
|
Discuss the timeliness and means for filing mishap investigation reports. |
Report all Class A mishaps within 8 hrs |
|
Name the four required mishap reportable items.
|
- government property damage mishaps;
- on-duty DoD civilian mishaps and military on/off-duty mishaps. - any other work-related illness or injury that involves medical treatment beyond first aid - other incidents of interest to the Navy and Marine Corps for mishap prevention purposes. |
|
State the purpose of a HAZREP message. |
To report on significant hazardous conditions or near-mishaps that have the potential to affect other commands. |
|
State the three objectives of first aid.
(how NIOC Yoko teaches you the wrong way; not like the BMR tells you...) |
1. Save Life |
|
State the three methods of controlling bleeding. |
1. Direct pressure |
|
Identify the eleven pressure points.
|
1. temple 4. collar bone 9. upper thigh |
|
Describe the symptoms and treatment for shock. |
Symptoms: Dilated pupils, shallow breathing, clammy skin, nausea, weak and rapid pulse. |
|
Describe the procedures for electrical shock (personnel rescue). |
- Secure power |
|
Describe the procedures for electrical shock (treatment). |
Start artificial ventilation immediately if needed
Check for a pulse. If you do not feel a pulse, immediately start CPR
Get the victim to a medical facility as soon as possible. |
|
Describe the methods for clearing an obstructed airway. |
1.Standing/reclining abdominal thrusts |
|
Describe the effects and treatment of Hypothermia. |
Symptoms -may appear pale and unconscious, or taken for dead. -Breathing is slow and shallow -pulse faint oreven undetectable -body feels semi-rigid First aid -bring the bodytemperature to normal -the patientshould be wrapped in warm blankets -Do not give the victim hot drinks or otherstimulants until he has regained consciousness. -Get medical attention immediately. |
|
Describe the effects and treatment of Frostbite. |
Two types: Superficial - ice crystals forming in upper skin layers. get victim indoors to a warm area by placing them in warm water. Place warm water under the armpits, against the abdomen, or between legs. |
|
Describe the effects and treatment of Heat Exhaustion.
|
Heat Exhaustion- when there is a serious disturbance of blood to the brain, heart, and lungs.
Effects: Moise, clammy skin, dilated pupils, normal or subnormal temperature. Treatment: Get out of heat, keep cool, and get victim to medical care. |
|
Describe the effects and treatment of Heat Stroke.
|
Heat Stroke- VERY SERIOUS condition caused by a breakdown in the sweating mechanism of body. Victim is unable to remove excess heat from the body.
Effects: Dry, hot skin, constricted pupils; very high blood pressure. Treatment: Remove victim from heat, keep cool, and seek medical attention. |
|
Define HERO
|
Hazardous Electromagnetic Radiation to ORDINANCE.
|
|
Define HERP
|
Hazardous Electromagnetic Radiation to PERSONNEL. |
|
Define HERF
|
Hazardous Electromagnetic Radiation to FUELS.
|
|
Define HAZMAT.
|
Any material because of its quantity, concentration, or physical/chemical characteristics, pose hazards to human health or environment. |
|
Discuss how to store HAZMAT.
|
Flammable – Stow in approved flammable storerooms or NAVSEA approved flammable storage lockers.
Poison – Stow all toxic materials in cool, dry, well-ventilated spaces with acids, caustics, and oxidizers separated. Corrosive – Stow corrosive materials in their original containers in an approved designated chest/locker. Ensure corrosive materials are cushioned against shock. Oxidizers – Stow oxidizers in cool spaces where maximum temperature does not exceed 100 degrees Fahrenheit. Marine Pollutants – Stow marine pollutants below deck or on the weather deck if equivalent protection from release to the environment is provided. |
|
Describe potential risks of improperly labeled and stored HAZMAT.
|
A fire or explosion can result in millions ofdollars of damage and claim workers’ lives.
|
|
Describe what an MSDS is and the information it provides.
|
Material Safety Data Sheet is a form with dataregarding the properties of a particular substance.
|
|
List the types of Personal Protective Equipment (PPE)
|
Respirators
Hand Protection Foot Protection Eye Protection Face Protection Skin/Body Protection Hearing Protection |
|
State the goal of the U.S. Navy's Hearing Conservation Program.
|
To prevent occupational hearing loss for all sailors.
|
|
State the six areas that make up the Naval Doctrine.
"COWLIP" |
C- Command and Control
O- Operations W- Warfare L- Logistics I- Intelligence P- Planning |
|
State the seven principles of Naval Logistics.
"FEARSSS" |
F-Flexibility
E- Economy A- Attainability R- Responsiveness S- Simplicity S- Sustainability S- Survivability |
|
State the first Navy ship names after an enlisted man, and why.
|
USS OSMOND INGRAM
Ingram was the first enlisted man killed in WWI, when the USS CASSIN was torpedoed |
|
What three classes of naval vessels existed at the inception of the U.S. Navy?
|
Ships of the Line- Battleships - 64 to over 100 guns.
|
|
Describe the importance of the Battle of the Coral Sea.
|
7-8 MAY 1942
-The battle was fought entirely with carrier-launched aircraft. -U.S broke Japanese Navy Code |
|
Describe the importance of the Voyage of the Great White Fleet.
|
16 DEC 1907- 22 FEB 1909
U.S. completed a round-the-world cruise to show the flag; lasting a year and two months. The exercise demonstrated the strength of the U.S. Navy. |
|
Describe the importance of the Battle of Normandy.
|
6 JUN 1944
Invasion of Normandy, the largest amphibious Assault in World History. |
|
Describe the importance of the Battle of Midway.
|
3-5 JUN 1942
Turning point in the Battle of the Pacific War, The U.S. breaking of the Japanese Naval Code was again the key element. |
|
Describe the importance of Guadalcanal.
|
13-15 NOV 1942
U.S. Navy had a policy at the time to place members of th same family on different ships, the U.S. Navy made an exception to allow the five Sullivan brothers to all serve on the USS Juneau. The USS Juneau was torpedoed and all five of the Sullivan brothers, along with 700 others were lost. Because of this tradegy, Navy Policy concerning family member separation was reinstated. |
|
Describe the importance of the Battle of the Leyte Gulf. |
23 OCT 1944
In a last-chance effort to salvage the Philippines, the Japanese sent a naval force to attack the U.S. Fleet. Their plan backfired and the operation was a complete failure: It was the deciding catastrophe for theirNavy. |
|
Discuss, state the impact on history, and the sailors involved with Mercury 3. |
05 MAY 1961
NASA's first manned spaceflight program. Demonstrated ability to achieve manual control under weightlessness. Naval Astronaut- CDR Alan Shepard. |
|
Discuss, state the impact on history, and the sailors involved with Gemini 3. |
23 MAR 1965 |
|
Discuss, state the impact on history, and the sailors involved with Apollo 11. |
16-24 JUL 1969 |
|
Discuss, state the impact on history, and the sailors involved with Apollo 17. |
7-19 DEC 1972
The 7th and final lunar landing mission. Naval Astronuats- Eugene A. Cernan, USN and Ronald E. Evans, USN. |
|
Discuss, state the impact on history, and the sailors involved with STS-1.
|
12-14 APR 1981 (Space Shuttle Columbia) |
|
Describe the historical significance of The On-The-Roof Gang and how it relates to Information Dominance.
|
176 enlisted radio operators were specially trained at a unique school located on the roof of the old Navy Deparment Building during 1928-1941. The on-the-roof gang laid the cornerstone of Naval Cryptology. |
|
Describe the historical significance of The Purple Code and how it relates to Information Dominance. |
-Most secure diplomatic cryptographic cipher used by the Japanese Foreign Office during, and just before, WWII. |
|
Describe the historical significance of The Battle of Midway and how it relates to Information Dominance. |
-Turning point in the Pacific war. -Cryptanalystsbroke the JN-25 code. -Admiral Nimitz positioned his 3 carriers, the Hornet, Enterprise, and Yorktown, out of Japanese reconnaissance range. |
|
Describe the historical significance of The Attack on the USS Liberty and how it relates to Information Dominance. |
-Liberty was sent to collect electronic intelligence in the eastern Mediterranean -several messages were sent to increase her closest point of approach (CPA) due to safety concerns. -Due to ineffective message handling and routing, the ship did not receive the CPA change messages until after the attack. |
|
Describe the historical significance of The USS PUEBLO and how it relates to Information Dominance. |
23 JAN 1968
USS Pueblo was off the coast of North Korea when it was attacked and captured by North Korean patrol boats. After eleven months of captivity the USS Pueblo's crew was released. The USS Pueblo is still U.S. Navy property but has been on display at a museun in Pyongyang, North Korea. |
|
Describe the historical significance of the D-Day Landing and how it relates to Information Dominance.
|
6 JUN 1944
-Commandedby U.S. Army General Dwight D. Eisenhower -Code name “Neptune” was launched when weather reports predictedsatisfactory conditions for landing day. |
|
Describe the historical significance of the Landing at Inchon and how it relates to Information Dominance.
|
15-17 SEP 1950
Intelligence efforts allowed Amphibious invasion of U.S. Army to land in a small time window on normally inhospitable shores to route the North Korean Army. |
|
Describe the historical significance of the Hainan Island EP-3 Incident and how it relates to Information Dominance.
|
01 APR 2001
-Chinese J-811 Interceptor collided with an EP-3 which was forced down -poorly implemented emergency destruct occurred on EP-3. -Chinese claimed a lot of intel. |
|
Describe the historical significance of Bletchley Park and how it relates to Information Dominance.
|
-Deciphered German ENIGMA cipher -The site of United Kingdom's main government code and cypher school. |
|
Describe the historical significance of The Navajo Code talkers and how it relates to Information Dominance.
|
-"Windtalkers"
-Used Navajo language to transmit battle messages in the Pacific. -The Navajo code talkers took part in every Marine assault in the Pacific from 1942-1945. -They served in all six Marine divisions. -The Japanese were never able to break the code. |
|
Describe the historical significance of The USS Stark and how it relates to Information Dominance.
|
-17 MAY 1987
-Attack by Iraqi Mirage F1 fighter while outside Iraqi and Iranian declared warzones. -There was no indication of attack as Early Warning Failed |
|
Describe the historical significance of the EC-121 Shoot-down and how it relates to Information Dominance.
|
-15 APR 1969
-The EC-121 was attacked without warning by North Korean MIG while flying its last mission with a double crew. Everyone on board died. Prompted U.S. Navy to adopt new procedures to provide reconnaissance aircraft with higher degree of protection. |
|
State the qualities that characterize the Navy/Marine Corps team as instruments to support national policies.
|
Readiness
Flexibility Mobility Self-sustainability |
|
State the three levels of war.
|
1. Strategic-supports national goals
2. Operational- supports theater 3. Tactical- involves indicidual engagements |
|
Discuss the National Security Act of 1947.
|
-Signed by President Truman in 1947
-Established the CIA -War Department and Navy Department merged into DoD under SECDEF -Created Department of the Air Force |
|
State when and why the current Navy Core Values were developed.
|
Adopted in 1992
Service wide effort aimed to strengthen the Navy as a values community. |
|
Discuss when and why the Sailor's Creed was developed.
|
Developed in 1993
-Directed by ADM Frank Kelso -To instill a clear understanding of Navy virtues into every Navy Recruit. -Developed by the Blue Ribbon Recruit Training Panels -Later amended, by Admiral Boorda, to encompass all ranks in the Navy. |
|
State RDML Grace Hopper's contributions to the U.S. Navy.
(not RADM, that's a two-star) |
-One of the first programmers of the Harvard Mark I Computer
-She developed the first compiler for a computer programming language. -She invented the COBOL language -First female Admiral -The destroyer USS Hopper (DDG-70) was named for her. |
|
State the name of the first computer and where it was located.
|
ENIAC (Electronic Numerical Integrator and Computer)
Created in 1942 at the University of Pennsylvania. |
|
Discuss ARPANET and when it was developed.
|
-1968: DARPA contacts with BBN to create Advanced Research Products Agency Network (ARPANET)
-World's first operational packet switching network and predecessor of the Internet. |
|
Explain the impact of the John Walker espionage case.
|
Retired Warrant Officer
Spied for the Russians from 1968-1985 Comprised U.S. Navy crypto information to the Soviet Union for over a decade. Allowed Soviet Union to make significant gains in naval warfare. |
|
State the oldest intelligence organization of the U.S. Navy.
|
Office of Naval Intelligence (ONI)
Established to "seek out and report" on advancements in other naton navies. |
|
Explain when ONI was established and by whom it was founded.
|
Established in 1882
SECNAV William H. Hunt |
|
State the first CIO/DNI
|
LT Theodorus Bailey Myers Mason
|
|
Name the two departments that were combined to from ONI.
|
Department Library
Office of Intelligence |
|
State the mission of the U.S. Navy.
|
To train, maintain, and equip combat-ready naval forces capable of winning wars, deterring aggression, and maintaining freedom of the seas.
|
|
Discuss the NCA, its members, and its functions.
|
National Command Authority (NCA)
term used by the U.S. military and U.S. government to refer to the ultimate lawful source of military orders. -Power to authorize the use of U.S. military forces -Power to authorize the use of nuclear weapons |
|
Discuss the difference between OPCON and ADCON.
|
OPCON- Operational Control; having operation responsibility for a given task, mission, or region.
ADCON-Administrative Control; having demisistrative responsibility for forces assigned to a given task, mission, or region. |
|
Describe the function of COCOM.
|
Combatant Command; command with a broad continuing mission under a single commander and composed of significant components of two or more Military departments.
|
|
Describe the function of Navy COCOM.
|
Naval combatant command with a raritime mission under a single commander, composed of significant components of two or more naval commands.
|
|
Describe the function of FLTCOM.
|
Fleet Command, parent command for all naval units subordinate to a specific fleet (operational control)
|
|
Describe the function of TYCOM.
|
Type Command; an administrative chain of command in which the warous ships report to the appropriate forward-area commanders.
|
|
State the location, mission, and component commands for PACOM.
|
Pacifice Command (Oahu) 3rd & 7th fleet
Promotes regional security and deters aggression Asia-Pacific stability and security |
|
State the location, mission, and component commands for EUCOM. |
European Command (Stuttgart, Germany) Europe/East Atlantic Ocean/Med Conduct Military operations, international military engagement and interagency parterning to enhance trans-atlantics security and defend the U.S. forward |
|
State the location, mission, and component commands for JFCOM.
|
Joint Forces Command (Norfolk)
Provide mission ready joint capable forces and supports development and integration of joint interagency and multinational capabilities to meet present and future operational need of joint forces. |
|
State the location, mission, and component commands for SOUTHCOM.
|
Southern Command (Miami)
South America and Central America Responsible for all U.S. activities in AOR. |
|
State the location, mission, and component commands for CENTCOM.
|
Central Command (Bahrain) Middle East
Promotes cooperation among nations, respond to crises and deter or defeat state and non-state aggression and supports development and when necessary reconstruction in oder to establish condition for regional security, stability and prosperity. |
|
State the location, mission, and component commands for NORTHCOM.
|
Northern Command (Peterson AFB, CO)
U.S. interests; plans, organizes and executes homeland defense and civil support missions. |
|
State the location, mission, and component commands for SOCOM.
|
Special Operations Command (Tampa)
U.S. special operations activities; unifies command for worldwide use of special operations elements of Army, Navy, and Air Force |
|
State the location, mission, and component commands for TRANSCOM.
|
Transportation Command (Scott AFB, IL)
Ensures timely, customer-focused global mobility in peace and wartime with efficient, effective and integrated transportation from end to end to war fighter. |
|
State the location, mission, and component commands for STRATCOM.
|
Strategic Command (Offutt AFB, NE)
Detect, deter, and prevent attacks against U.S. and our allies. |
|
State the location, mission, and component commands for AFRICOM.
|
Africa Command (Stuttgart, Germany)
Africa; Administrative HW responsible to secretary of defense for U.S. military relations with 53 African countries. |
|
State the location, mission, and component commands for USCYBERCOM.
|
Cyber Command
Worldwide, an armed forces sub-unified command subordinates to U.S. strategic command. |
|
Define the operating area of the 2nd Fleet.
|
East coast to mid-Atlantic including Gulf of Mexico
|
|
Define the operating area of the 3rd Fleet.
|
Point Loma, San Diego, California.
Eastern and Northern Pacific |
|
Define the operating area of the 4th Fleet.
|
Mayport Naval Station, Jacksonville, Florida.
Caribbean Sea, Central/South America. |
|
Define the operating area of the 5th Fleet.
|
Naval Support Activity, Bahrain.
Persian Gulf, Red Sea, Arabian Sea, and coast off East Africa as far south as Kenya. |
|
Define the operating area of the 6th Fleet.
|
Naval Support Activity, Naples, Italy.
Eastern Atlantic and most of Africa |
|
Define the operating area of the 7th Fleet.
|
Yokosuka, Japan.
Western Pacific to India |
|
Define the operating area of the 10th Fleet.
|
Fort Meade, Maryland |
|
Define TF
|
Task Force; subdivision of a fleet.
|
|
Define TG
|
Task Group; division of a task force.
|
|
Define TU
|
Task Unit; division of a task group.
|
|
Define TE
|
Task Element division of a task unit.
|
|
Describe the IDC ratings.
|
1.AG-provides linguistic support to intelligence community |
|
State the location, mission, and component commands of the following Naval and Computer Telecommunication Area Master Stations (NCTAMS) |
NCTAMS LANT – The mission is toprovide classified and unclassified voice, messaging, data and video to ships,submarines, aircraft and ground forces operating worldwide in support of Navaland joint missions. NCTAMS PAC – Deliver and operate a reliable, secure andbattle-ready Navy Network, providing sustained information superiority to Navy,Joint and Coalition warfighters in the Pacific and Indian Ocean areas ofresponsibility. |
|
Define C4ISR |
Command Control Communications Computers Intelligence Surveillance Reconnaissance The ability to gather, process, disseminate, evaluate and display real time, all source, fused intelligence and surveillance data. |
|
Explain the mission of the DISA. |
DISA-Defense Information System Agency Engineers and provides C2 capabilities and an infrastructure to continuously operate and assure a global net centric enterprises in direct support to various levels. |
|
Explain the mission of NASIC. |
NASIC- National Air and Space Intelligence Center. Produces foreign aerospace intelligence via surveillance and reconnaissance |
|
State the mission of the NCDOC. |
NCDOC- Navy Cyber Defense Operations Command Provides 24/7 protection to Navy's Cyber Systems |
|
Identify and discuss ODNI and their roles in the Intelligence Community. |
ODNI- Office of the Director of National Intelligence; serves as the head of the U.S. IC and acts as the principle advisor to the President, NSC, and Homeland Security Council |
|
Identify and discuss DIA and their roles in the Intelligence Community. |
DIA- Defense Intelligence Agency Provide timely, objective, and cogent military intelligence to warfighters, defense planners, and defense and national security policy makers.
|
|
Identify and discuss NSA and their roles in the Intelligence Community. |
NSA- National Security Agency Protect U.S. national security systems and to produce foreign signals intelligence information |
|
Identify and discuss CIA and their roles in the Intelligence Community. |
CIA- Central intelligence Agency Focal point for the collection, analysis, and dissemination of all U.S. intelligence (HUMINT) |
|
Identify and discuss NGA and their roles in the Intelligence Community. |
NGA- National Geospatial Intelligence Agency Provides timely, relevant, and accurate GEOINT in suppport of national security. |
|
Identify and discuss DHS and their roles in the Intelligence Community. |
DHS- Department of Homeland Security Tasked with preventing terrorist attacks within the United States, reducing America's vulnerability to terrorism, and minimizing the damage from potential attacks and natural disasters. |
|
Identify and discuss FBI and their roles in the Intelligence Community. |
FBI- Federal Bureau of Investigation Protects and defends the U.S. against terrorist and foreign intelligence threats, upholds and enforces criminal laws of U.S. and provides leadership and criminal justice services to federal, state, municipal, and international agencies and partners. |
|
Identify and discuss DEA and their roles in the Intelligence Community. |
DEA- Drug Enforcement Administration Provides intelligence and operational support to combat the flow of narcotics. |
|
Identify and discuss DOE and their roles in the Intelligence Community. |
Department of Energy – to advance the national, economic, and energy security of the US; – to promote scientific and technological innovation in support of that mission; – and to ensure the environmental cleanup of the national nuclear weapons complex. |
|
Identify and discuss DOS and their roles in the Intelligence Community. |
DOS- Department of State –Advance freedom for the benefit of the American people and the internationalcommunity... |
|
Identify and discuss DOT and their roles in the Intelligence Community. |
DOT- Department of Treasury Analyzes foreign intel related to U.S. economic policy and participate with DOS in overt collection of general foreign economic information |
|
Identify and discuss NASA and their roles in the Intelligence Community. |
NASA- National Aeronautics and Space Administration Responsible fore education, research, and scientific discovery regarding aerospace |
|
Identify and discuss NRO and their roles in the Intelligence Community. |
NRO- National Reconnaissance Office Provides innovative overhead intelligence systems for national security |
|
Identify and discuss USAF and their roles in the Intelligence Community. |
USAF- United States Air Force Organizes, trains, equips, and presents assigned forces and capabilities to conduct intelligence, surveillance and reconnaissance (ISR) for combatant commanders and the national intelligence community. |
|
Identify and discuss USA and their roles in the Intelligence Community. |
USA- United States Army Provides a wide range of unique capabilities to provide commanders and policymakers the support they need, when they need it, synchronized with their operations. |
|
Identify and discuss USMC and their roles in the Intelligence Community. |
USMC- United States Marine Corp Provides tailored intelligence support to the Marine Corps operating forces with contingency planning and other requirements for intelligence products not satisfied by other theater or national assets. |
|
Identify and discuss USN and their roles in the Intelligence Community. |
– Serves as a seaborne branch of the Military of the United States. – Three primary areas of responsibility: 1) The prepare naval forces necessary for the effective prosecution of War. 2) The maintenance of naval aviation and all air weapons and air techniques 3) The development of technology, tactics, technique, organization, and equipment of naval combat and service elements. |
|
Identify and discuss USCG and their roles in the Intelligence Community. |
USCG- United States Coast Guard Serves as the central hub for collection, fusion, analysis, and dissemination of maritime intelligence and information to Coast Guard units, DHS, and the IC. |
|
Discuss the responsibilities of the Commander in Chief (President) |
Head of Armed Forces as mandated by the Constitution; responsible for initiating military action in support of national Interests; can submit to Congress "intent to declare war" which congress must approve in order to actually wage war. |
|
Discuss the responsibilities of the Secretary of Defense |
Principle defense advisor to President; responsible fore formulation of general defense policy |
|
Discuss the responsibilities of the Secretary of the Navy |
Conducts all the affairs of the DoN |
|
Discuss the responsibilities of the Chief of Naval Operations |
-Navy rep of Joint Chiefs of Staff; -Keeps Secretary of the Navy informed of JCS activities and -responsible to President and SECDEF for naval warfare. |
|
Discuss the responsibilities of the Fleet Commander in Charge |
Responsible for all naval operations within his;her fleet's AOR |
|
Discuss the responsibilities of the Type Commander |
Typecommanders primarily supervise personnel, training, logistics, maintenance, andother support to ships, aircraft and units. |
|
Discuss the role of the Fleet Master Chief |
Senior enlisted advisor to a fleet commander |
|
Discuss the role of the Force Master Chief |
Master Chiefs who have virtually the same responsibility as CMC's but are responsible for larger force commands (i.e. submarine force U.S. atlantic fleet) |
|
Discuss the role of the Command Master Chief |
The most senior enlisted sailor in a navy unit; liaison between enlisted personnel and CO |
|
Define CCRI |
CCRI- Command Cyber Readiness Inspection A formal inspection process, which holds commanders accountable for their respective security posture |
|
State NAVCYBERFOR's role in CCRI |
Implementing rigorous grading criteria |
|
State the purpose and contents of EDVR |
EDVR- Enlisted Distribution Verification Report Monthly statement of an activity's enlisted personnel account; -announces present and future manning status of an activity -a permanent historical record of the activity's enlisted personnel account; 12 sections, Section 1 – Prospective Gains Section 2 – Prospective Losses Section 3 – Temporary duty, deserter status, alphabetical list off all members assigned Section 4 – List of crew by rating. Section 5 – Personnel Status Summary, Sections 6-9 – CNO authorized billets, NEC billets, etc. Section10 – DISCONTINUED Section 11 – pay entry base date (PEBD), TIR, advancement date. Section 12 – TAD/embarked personnel. |
|
State the purpose and contents of ODCR |
ODCR- Officer Distribution Control Report Officer's version of EDVR |
|
State the purpose and contents of AMD |
AMD- Activity Manpower Document The single official statement of funded and unfunded requirements (manpower authorizations or B/A) for each UIC |
|
State the purpose of an Evaluation Report |
To rank enlisted personnel amongst peer for promotion and duty assignments purposes |
|
State the purpose of a Fitness Report |
Evaluation report for Officers |
|
State the purpose of a concurrent report |
Provides a record of significant performance that was not directly observable by the regular reporting senior |
|
State what is found on the Page 2 of a service record |
Dependency application/record or emergency data |
|
State what is found on the Page 4 of a service record |
Enlisted qualification history, specialty codes, special skills, awards |
|
State what is found on the SGLI portion of a service record |
Servicemen's group life insurance election and certification |
|
State what is found on a Page 13 in a service record |
Administrative remearks serves as a chronological record of significant misc. entries not provided elsewhere |
|
What is the purpose of a SITREP |
SITREP- Situational Report Used for reporting incidents which may attract national and or high level Navy interest |
|
Explain OPREP -3 Navy unit SITREP |
Used by a Unit Commanding Officer (CO), Officer-in-charge (OIC), or other commanders to notify appropriate operational commanders and other higher authority of incidents not meeting OPREP-3 Navy Blue reporting criteria |
|
Explain OPREP-3 Navy Blue SITREP |
Used to provide CNO and other naval commanders with immediate notification of incidents of military, political or press interest, which are of high Navy, vice national level, interest. The reports are submitted to provide "as it happens." |
|
Explain OPREP-3 Pinnacle SITREP |
Used to report incidents of national-level interest to National Military Command Center (NMCC) |
|
Discuss the importance of the IG |
IG- Inspector General Serves as principle advisor to SECDEF on all audit and criminal investigative matters relating to prevention and detection of fraud, waste, and abuse in programs and operations of the Department of Defense. The IG audits, evaluate, monitor, and reviews programs, policies, procedures, and functions of DoD Intelligence Community to ensure intelligence resources are properly managed |
|
State the purpose of the Navy Correspondence Manual |
Used to create uniform standards for the management and preparation of correspondence |
|
Explain the PTS program |
As of 29 SEP 2010 the PTS system has been merged into the Fleet Rating Identification Engine (Fleet Ride) Program. The fleet ride program is a long range force shaping tool that aids in leveling rating manning between overmanned and undermanned ratings, while managing the quality of reenlistment applicats by controlling the authority for reenlistment Commands shall submit fleet ride applications for all E-3-E-6 sailors with less than 14 years of service regardless of their career intentions. Submit applications as early as 15 months, but NLT 12 months propr to the sailor's expiration of active obligated service (EAOS) as extended, also known as "Soft" EAOS |
|
Explain what the DLPT is |
DLPT- Defense Language Proficiency Test Group of foreign language tests intended to assess the general language proficiency of native english speakers in a specific foreign language Scoring is on a level from 0-5 in the following categories: Speaking Listening Comprehension Reading Comprehension Writing |
|
State the duties and responsibilities of the Command ESO |
Supervise the administration of the training office and training aids |
|
Explain the purpose of the U.S. Navy's Drug Screening Program |
Establishes a valid and reliable means of inspecting a command's personnel to assess the command's readiness to carry out its assigned mission; deterrent against drug use |
|
Describe the six programs of Brilliant on the Basics (MICROS) |
M-entorship I-ndoc C-areer Development Boards (CDB'S) R-ecognition O-mbudsmen S-ponsorship |
|
Explain the purpose of the PAO. |
PAO- Public Affairs Officer The Public and Media Affairs staff handles all inquiries from the media and general public on behalf of the National Security Agence. The goal is to provide accurate, relevant, and appropriate unclassified information about NSA within the requester's deadline. Our fully coordinated responses reflect NSA's corporate image as established by senior management. |
|
Discuss the purpose of the 3-M/PMS System |
3-M- Maintenance Material and Management Provides efficient and uniform methods for conducting and recording preventive, alterative, and corrective maintenance. PMS- Planned Maintenance System Strandardized method for planning, scheduling, and accomplishing preventive maintenance by ship's force |
|
Explain how DPAS is used to track equipment |
DPAS- Defense Property Accountability System Web-enabled system that tracks lifecycle of an asset from receipt to disposition |
|
Discuss the purpose of the MOV program |
– Material Obligation Validation – Improves requisition validity – Mandatory Monthly Internal MOVs conducted by individual departments – Maximizes limited OPTAR funds. |
|
Discuss the DLRs program |
DLR- Depot Level Repair Manages high-value (cost) items that cannot be repaired or reused |
|
Explain the procedures for NRFI (Not Ready for Issue) DLRs in regard to the following situations |
Turn-In The part that needs to be replaced is turned into supply, then the process is initiated to replace the part (for exchange basis only) RIP- Return in Place although the part may be degraded, it is required to remain in use until the new item arrives; item is turned into supply when new item is in place. Commanding Officer must approve RIP chits |
|
Define the purpose of MAMs |
Maintenance AssistanceModules – -Used as a troubleshooting aid. -Normallyinstalled in equipment for brief periods as an aid to detecting faults. -If a repair part is required to avoid a CASREPand is not immediately available, the DH may authorize temporary usage of theMAM to keep the equipment operating until a replacement is procured. |
|
Define the purpose of Bulkhead Mounted Spares |
Spares that are kept in the work center due to size or cost resulting on the parent department head to be responsible for upkeep on them |
|
Define the term CASREP |
CASREP- Casualty Report Used in event of equipment malfunction or deficiency which cannot be corrected within 48 hours, reduces unit's ability to perform a primary mission, secondary mission, or a training command's ability to perform its mission |
|
How many categories of CASREP are there? |
4 Categories: CAT I CAT II CAT III CAT IV |
|
Explain CAT I of CASREP |
CAT I- Used ONLY at TRAINING COMMANDS. A casualty exists, but does not cause a break in training |
|
Explain CAT II of CASREP |
CAT II- A deficiency exists in mission essential equipment which causes a minor degradation in any primary mission, or a major degradation or total loss of a secondary mission |
|
Explain CAT III of CASREP |
CAT III- A defieiency exists in mission essential equipment which causes a major degradation but not the loss of a primary mission |
|
Explain CAT IV of CASREP |
CAT IV- A deficiency exists in mission essential equipment that is worse than category 3, and causes a loss of at least one primary mission |
|
Define NSN |
NSN- National Stock Number 13 digit number assigned by Defense Logistic Agency to identify an item of material in supply distribution system |
|
Define COG |
COG- Cognizance A two character symbbol that designated the store's account in which a type of material is carried and the responsible inventory control point |
|
Define APL |
APL- Allowance Parts List A technical document prepared for individual equipment/components which are on board. It lists all the repair parts installed on the equipment/component to which it applies, as well as other pertinent data |
|
Define AEL |
AEL- Allowance Equipage List A technical document prepared for various categories of equipage for mechanical, electrical, electronic and ordance systems. Contains the onboard allowance of equipage and supplies to support the ship's mission |
|
Define NC |
NC- Not Carried Material for which there is no storeroom allowance |
|
Define NIS |
NIS- Not in Stock Material normally stocked in the storeroom but is temporarily exhausted |
|
Define SIM |
SIM- Selected Item Maintenance Inventory control system by which maximum attention is given to those items experiencing a high rate of usage |
|
State the purpose of DD FORM 1348-6 |
MILSTRIP requisitioning form for NON-NSN (anywhere) |
|
State the purpose of NAVCOMPT 2276 |
Request for Contractual Procurement |
|
State the purpose of NAVSUP 1250-2 |
MILSTRIP requisitioning form for NON-NSN (Navy Supply Source Only) |
|
State the purpose of DD FORM 448 |
Military Interdepartmental Purchase Request (MIPR) |
|
State the purpose of SF 44 |
Purchase Order Invoice Voucher. Pocketsize form designed for on-the-spot, over-the-counter purchases of supplies andnon-personal services away from the purchasing office |
|
State the purpose of DD FORM 1155 |
Order for supplies or services |
|
State the purpose of SF 1449 |
Solicitation/contract/order for commercial items |
|
State the purpose of SF 30 |
Amendment of Solicitation/Modification of contract |
|
State the purpose of DD FORM 200 |
Financial Liability investigation of Property Loss (FLIPL) |
|
State the purpose of SF 364 |
-Report of Discrepancy (ROD) -Receivingactivity submits when there is a shipping or packaging discrepancy. |
|
State the purpose of SF 386 |
Product Quality Deficiency Report (PQDR) |
|
Discuss CHRIMP |
CHRIMP-Consolidated hazardous Material reutilization and Inventory Management Program A successful method to achieve lifecycle control and management of Hazardous Material (HM) and Hazardous Waste (HW) |
|
Discuss DRMS |
DRMS- Defense Reutilization and Marketing Service Dedicated to the disposition of excess and surplus military equipment and supplies |
|
Discuss ServMart |
A warehouse designed store which carries NSN items to be bought with a government purchase card |
|
Discuss the uses of the Government commercial purchase Card (IMPAC) |
Streamlines payment procedures, reduces paperwork processing purchase orders improving cash management practices, and provides procedural feedback to improve management control and decision making Micro-Purchases (Level 1) May be made without securing competitive quotations or any type of value analysis if the prices are considered reasonable Micro-Purchase Threshold (Level II) Must determine price reasonableness by comparing pricing or pricing factors. This action must be documented and approved prior to making the purchase. |
|
Explain OPTAR and its components |
OPTAR- Operating Target An estimate of the amount o money that will be required by an operating unit to perform tasks and functions assigned. Also term used to refer to a "check book" |
|
How many components does OPTAR have, and what are they? |
OPTAR is broken down ino two components Repairable and Consumables Repairable- parts required to fix/corect deficiency in ship or station Consumables- toilet paper, paper, pens, etc |
|
Define Normal Power |
Standard power supplied for normal daily usage |
|
Define Emergency Power |
Secondary power supplied only to vital equipment/systems in the event of a casualty |
|
Define UPS |
UPS- Uninterrupted Power Supply Minimal battery power provided to electronic equipment in order to properly power down a system |
|
Identify the directives that govern personnel security |
NAVSUP to DoD DIR 5105.21.M-1 SECNAV M5510-30 ICD 704 |
|
Define Top Secret and the color codes used to identify it |
Could cause exceptionally grave damage to national security Represented by ORANGE |
|
Define Secret and the color codes used to identify it |
Could cause serious damage to national security Represented by RED |
|
Define Confidential and the color codes used to identify it |
Could cause damage to national security Represented by BLUE |
|
Define Unclassified and the color codes used to identify it |
Technically not a classification level, but is used for documents that do not have other classifications. Such documents can sometimes be viewed by those without security clearances Represented by GREEN |
|
Explain what is meant by "need to know" |
is a determination that an individual requires access to specific classifiedinformation in the performance of (or assist in the performance of) lawful andauthorized government functions and duties. -not solely based on office, rank, position, or title, or clearance level held |
|
State the type of investigation and how often it is updated for access to Top Secret |
Top Secret SSBI investigation Updated every 5 years |
|
State the type of investigation and how often it is updated for access to Secret |
Secret National Agency Check with Local Agency and Credit Checks (NACLC) Updated every 10 years |
|
State the type of investigation and how often it is updated for access to confidential |
Confidential National Agency Check with local agency and credit checks (NACLC) Updated every 15 years |
|
State the type of investigation and how often it is updated for access to SCI |
SCI SSBI Updated every 5 years |
|
Identify what SAER is and its purpose. |
SAER- Security Access Eligibility Report Used to report to DONCAF any information that mnight affect someone's continued eligibility for access to SCI |
|
Identify the events that should be reported to the SSO |
Unexplained affluence or excessive indebtedness Alcohol Abuse Illegal or improper drug use Apparent mental or emotional disorder Criminal conduct Personal Conduct Non compliance with security regulations Misuse of technology systems Foreign influence Foreign citizenship or foreign monetary interest Unofficial foreign travel sexual behavior that is criminal
|
|
Identify who has overall authority of, and controls access to, a SCIF |
The Commanding Officer (CO) |
|
Identify the use of SF700 |
Security container envelope Used to record safe and door lock combos |
|
Identify the use of SF701 |
Activity security checklist Used at end of day to ensure classified materials are secured properly and provides for accountability. Retained for at least 90 days |
|
Identify the use of SF702 |
Security Container Checksheet Open and Close form |
|
Identify the use of SF703 |
Top Secret coversheet |
|
Identify the use of SF153 |
COMSEC Material report Acquisition/transfer of secure comms devices |
|
Identify the use of SF312 |
Classified information nondisclosure agreement (DD 1847-1 SCI non disclosure agreement) a contractual agreement between the U.S. government and a cleared employee that must be executed as a condition of access to classified info |
|
State when safe combinations should be changed |
When lock is initially placed Person that no longer requires access knows code Combination compromise Combination is out of service Maintenance was performed on lock When designated by the CSA/SIO or owner of the safe |
|
What is an FDO and state their responsibilities |
FDO- Foreign Disclosure Official Approves the disclosure of classified and controlled unclassified military information to foreign representatives. Anything related to official interaction with foreigners |
|
State the purpose of the DCS |
DCS- Defense Courier Service Provides safe transport of sensitive/classified material and equipment by authorized DoD personnel. |
|
State the responsibilities of the TSCO |
- Top Secret Control Officer - CO designates in writing. - accountable to record the daily activities dealing with command Top Secret information, SCI and other special types of classified information. - Must also ensure inventories of TS information conducted at least once annually (or more often) |
|
State the THREATCON recognitions and Force Protection levels and discuss what each represents |
ALPHA- General Readiness (Increased general threat of possible terrorist activity) BRAVO- Somewhat predictable threat (Increased or more predictable threat of terrorist activity) CHARLIE- Known terrorist threat made (Incident occurs) DELTA- Specific target known and declared or terrorist event has occurred (Applied to the immediate area where terrorist attack has occurred) |
|
Explain what a RAM is |
RAM- Random Antiterrorism Measure The random implementation of higher FPCON measures in consideration of the local terrorist capabilities. Basically changes up normal routine so not to be predictable to terrorists or anyone else. |
|
Explain and state the purpose of an EAP |
EAP- Emergency Action Plan Everycommand that holds classified COMSEC or CCI material must prepare and maintaina current, written emergency plan for safeguarding such material in the eventof an emergency. |
|
Explain and state the purpose of Emergency Destruction Procedures |
Prevent uncleared personnel from access to classified material in case of emergencies such as fire, natural disaster, civil disturbance, terrorist activities, or enemy attack. Destroy classified material to means where it cannot be re-constructed! |
|
State who can give the order to initiate Emergency Destruction |
Highest ranking person on station for SCI (CO/SIO) |
|
Explain how, and in what order, material is destroyed during Emergency Destruction |
All material/equipment shall be destroyed by any reasonable means available: burning, shredding, smashing, degaussing, magnets, jettison, etc. Priority 1- All cryptographic equipment and documents Priority 2- All operational SCI codeword material which might divulge targets and successes, documents dealing with US SCI activities and documents, TOP SECRET material, and other sensitive material. Priority 3- Less sensitive administrative SCI material and collateral classified material not included above. |
|
Define SCI |
SCI- Sensitive Compartmented Information Classified information concerning or derived from intelligence sources, methods, or analytical processes and required to be handled within a formal access control system |
|
List the items prohibited in a SCIF and the security risks associated with them. |
Personally owned photographic, video, and audio recording equipment Personally owned computers and associated media Any items that pose a risk of disclosure or transport of classified information Explosives |
|
Define the difference between a security violation and a practice dangerous to security |
Practice dangerous to security- a failure to comply with security regulations that cause a potential compromise of classified information Security violation- compromise of classified information to persons not authorized to receive it or a serious failure to comply with security regulation and it likely to result in compromise |
|
Explain the security requirements for the following |
SCIF- An accredited area, room, groups of rooms, buildings, or installations where SCI may be stored, used discussed and/or processed T-SCIF- An accredited facility where SCI may be stored, used, discussed and/or processed determined for a limited time to meet tactical, emergency, or immediate operational requirements. |
|
Explain vault recertification and recurring inspections. |
vault recertification and recurring inspections are conducted to ensure SCIFs are meeting ICD 705 standards. SCI security officials will conduct self-inspections of SCIFs at least annually. Other inspections based on threat, physical modifications, etc |
|
Discuss the need for access lists, required documentation logs, and two-person integrity |
To ensure only properly authorized personnel access the classified material, annotate when documents were accessed for accountability, and to ensure material remains uncompromised during transit |
|
Explain the DoD escort policy |
The movement of all visitors shall be contolled to ensure that access to classified information is deliberate and consistent with the purpose of the visit All persons must be escorted by qualified and cleared personnel throughout their visit |
|
Discuss the procedures for sanitizing an areas |
You first have to announce "Uncleared" and wait until all computer screens, paperwork and all other classified material is put away. |
|
Discuss, define, and give the purpose of COMSEC |
COMSEC- Communications Security (protecting our communications) Measures and controls taken to deny authorized persons information derived from telecommunications |
|
Discuss, define, and give the purpose of INFOSEC |
Information Security – protecting informationand information systems from unauthorized access, use, disclosure, disruption,modification or destruction. - protection from compromise |
|
Discuss, define, and give the purpose of COMPUSEC |
COMPUSEC- Computer Security (ensuring our computers are secure) Information security as applied to computers |
|
Discuss, define, and give the purpose of PSP |
PSP- Personnel Ensuring there is no unauthorized access to SCIFs or classified information |
|
Discuss, define, and give the purpose of ATFP |
ATFP- Antiterrorism Force Protection; (defensive measures used to reduce the vulnerability of individuals and property to terrorist acts) |
|
State the purpose of the ICD system |
ICD- Intelligence Community Directives The principle means by which the DNI provides guidance, policy, and direction to the IC |
|
Identify SSO of Navy. |
Director, Security and Corporate Services; oversees SSO operations for the DON |
|
List the duties and responsibilities of the SSO |
Responsible for maintaining the security of SCI material and providing advice to the CO or OIC on all matters pertaining to SCI (Personnel and Physical Security) |
|
Identify who can be a CSM |
CSM- Command Security Manager Must be an officer or civillian employee (GS-11 or higher) U.S. Citizen Completed an SSBI |
|
State the duties and responsibilities of a CSM |
Responsible for the administration of the command's information and prsonnel security programs (not related to SCI, SAPs or IT programs) |
|
Explain and state the purpose of JPAS |
JPAS- Joint Personnel Adjudication System The DoD managed, official personnel security migration database/system. Provides "real time" information regarding clearance, access, eligibility and investigative status to authorized DoD security personnel and other interfacing organizations |
|
Explain and state the responsibilities of DONCAF |
DONCAF- Department of the Navy Central Adjudication Facility Responsible for determining who within the DON is eligible to hold a security clearance, to have access to SCI, or to be assigned to sensitive duties |
|
Discuss how long a commanding officer can administratively suspend access before DONCAF revokes a clearance |
90 Days |
|
State the levels of INFOCON and what each signifies |
INFOCON 1- Describes when attacks are taking place and the computer network defense system is at maximum alertness INFOCON 2- Describes when an attack has taken place but the network defense system isn't at its highest alertness INFOCON 3- Describes when a risk has been identified INFOCON 4- Describes an increased risk of attack on computer networks INFOCON 5- Describes a situation where there is no apparent hostile activity against computer networks |
|
Discuss the security rules and procedures for magnetic and electronic media |
All such devices bearing classified information must be conspicuously marked with highest level of classification stored on device and any special control notices that apply to the information |
|
Explain why U.S. Navy only uses ".mil" email addresses on government systems |
DoD has exclusive use of the ".mil" domain, which provides increased security |
|
Define IA |
IA- Imformation Assurance Information operations that protect and defend data and information systems by ensuring their availability, integrity, authentication, confientiality, and non-repudiation |
|
Define Certification |
Certification- the comprehensive evaluation of the technical and non-technical security features of an IS and other safeguards, made as part of an in support of accrediation process, to establish extent to which a particular design and implementation meet a specified set of security requirements. The certification process validates that appropriate levels of concern for integrity and availability and an appropriate confidentiality protection level have been selected, and that the required safeguards have been implemented on the system as described in System Security Plan (SSP) |
|
Define Accreditation |
Accreditation Formaldeclaration by a Designated AccreditingAuthority (DAA) or PrincipalAccrediting Authority (PAA) that an information system is approved tooperate at an acceptable level of risk. |
|
Define DAA |
DAA- Designated Approving Authority Official with authority to formally assume responsibility for operating a system at an acceptable level of risk |
|
Define System Security Authorization Agreement |
System Security Authorization Agreement Living document that represents formal agreement between DAA, certification Authority, Program Manager, and user rep |
|
Define ATO |
ATO- Authority to Operate Formal declaration by DAA that info System is approved to operate in a particular security mode using a prescribed set of safeguards |
|
Define IATO |
IATO- Interim Authority to Operate Temporary authorization granted by DAA, or SCO, for an IS to process classified info in its operational environment based on preliminary results of a security evaluation of the system. Can be granted for up to 180 days, and if necessary an extension can be granted for additional 180 days. |
|
Define Configuration Management |
Configuration Management Identifies, controls, accounts for, and audits all changes to a site or info system during its design, development, and operational lifecycle |
|
Discuss security procedures involved when performing cross-domain transfers. |
Scan all info storage media and e-mail attachments introduced prior to its use on any SCI system. If media cannot be scanned, it is considered high risk and can't be used on SCI system without approval from Service Certifying Organization (SCO) |
|
Discuss risk management |
The process that allows IT managers to balance the operational and economic costs of protective measures and achieve gains in mission capability by protecting the IT systems and data that support their organizations missions |
|
Define the five attributes of IA (CIANA) |
C-Confidentiality(Assurance that information is not disclosed to unauthorized persons) I- Integrity( Assurance that information is not modified by unauthorized parties or in an unauthorized manner) A- Availability(Assurance of timely, reliable access to data and information systems by authorized users) N- Non-repudiation( Assurance that the sender of date is provided with proof of delivery and the recipient is provided with proof of the sender's identity) A- Authentication(Assurance of identity of a message sender or receiver. Authentication is the security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual's authorization to receive specific categories of information) |
|
Define the computer incident: Root Level Intrusion |
Root Level Intrusion- unauthorized (administrative) privileged access to a DoD system; includes access to info or unauthorized access to account credentials that could be used to perform admin functions. |
|
Define the computer incident: User Level Intrusion |
User Level Intrusion- unauthorized non-privileged access to DoD system. System is compromised with malicious code that provides remote interactive control. |
|
Define the computer incident: Denial of Service |
Denies, degrades, or disrupts normal functionality of a system or network |
|
Define the computer incident: Malicious Logic |
Installation of software designed and or deployed by adversaries with malicious intentions of gaining access to resources or information without consent or knowledge of user. |
|
Define the computer incident: Unsuccessful Activity Attempt |
Unsuccessful Activity Attempt- deliberate attempts to gain unauthorized access to DoD system, defeated by normal defensive mechanisms. Attacker fails to gain access to system. |
|
Define the computer incident: Non-Compliance Activity |
Non-Compliance Activity-potentially exposes DoD systems to increased risk as a result of action/inaction of authorized users. |
|
Define the computer incident: Reconnaissance |
Reconnaissance- seeks to gather information used to charazterize DoD systems, apps, networks, and users that may be useful in formulating an attack. |
|
Define the computer incident: Investigating |
Investigating- events that are potentially malicious or anomalous activity deemed suspicious and warrant/are undergoing further review. |
|
Define the computer incident: Explained Anomaly |
Explained Anomaly-suspicious events that are determined to be non-malicious acty and do not fit criteria for any other categories (MISC) |
|
Describe the DoN World Wide Web Security Policy. |
All DoN sites must have a clearly articulated purpose, approved by commander, and support command's core competency mission. Only contain unclassified materal approved for public release; no OPSEC violations. |
|
Define IAVA |
IAVA- Information Assurance Vulnerability Alert An announcement of a high risk computer software or system vulnerability in form of an alert. Provides corrective actions |
|
Define IAVB |
IAVB-Information Assurance Vulnerability Bulletin- an announcement of a medium risk computer software or system vulnerability in the form of a bulletin |
|
Define IAVT |
IAVT- Information Assurance Vulnerability Technical Advisory- announcement of a low risk computer software or system vulnerability in the form of an advisory |
|
Define CTO |
CTO- Communications Tasking Order- DoD wide instruction that promulgates mandatory changes in standing instructions on how communications are handled. |
|
Define NTD |
NTD- Navy Telecommunications directive- a widely disseminated naval message giving an order or direction about a certain IT function that needs to be complied |
|
Define Service Pack |
Service Pack- collection of updates, fixes and /or enhancements to a software program delivered in the form of a single installable package. |
|
Define vulnerability assessment |
Vulnerability Assessment- A testing process used to evaluate the network infrastructure, software, and users in order to identify known weaknesses |
|
Explain the difference between vulnerability and threat. |
Vulnerability – any weakness, administrativeprocess, or act or physical exposure that makes an information assetsusceptible to exploit by a threat. Threat – a potential cause of an unwantedimpact to a system or organization.=u$ |
|
State the duties and responsibilities of the IAM |
Responsible for establishing, implementing, and maintaining DoD info system IA program Must be designated in writing Should not be a Collateral Duty US Citizen Hold highest clearance of highest classification of IS responsible for Attend DAA Training |
|
Define Host/Client |
Computer connected to other computers, provides data services via a network |
|
Define Application Server |
Application Server- specialized server in a client network that runs only specific applications within the network. |
|
Define Hub |
Common connection point for devices in a network |
|
Define Switch |
Same as HUB but smarter. Only forwards packets to intended recipient port. |
|
Define Router |
Physical device that joins multiple networks together |