Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
Identify who can be a Command Security Manager.
|
1.) Naval Officer or GS-11 or higher
2.) US citizen with a favorable SSBI 3.) Within 5 years of assignment |
|
List the following forms:
SF 706 SF 707 SF 708 SF 710 SF 711 SF 712 |
SF 706: Top Secret (label)
SF 707: Secret (label) SF 708: Confidential (label) SF 710: Unclassified (label) SF 711: Data Descriptor SF 712: SCI (label) |
|
Bio-luminescence
|
The production/emission of light by a living organism.
Usually Blue-Green |
|
Spot-Beam
|
A narrow beam of satellite coverage, illuminating selected terrestrial areas.
Approx. 50 beam width or less |
|
Earth Coverage
|
The portion of the earth seen by a satellite, i.e. its entire range.
|
|
TACPLANS
|
Tactical Planning.
Provides Communications Cutover Planning for Carrier and Expeditionary Strike Groups transiting the Pacific AOR. |
|
CCS
|
Communications Control Ship.
Each Strike group is assigned a CCS- usually a Carrier or Amphib. |
|
CUDIXS
|
Common User Digital Info. Exchange Subsystem.
Shore-based, computer-controlled, message store and forward system. Automates messages between ship and shore. 60 Subscribers. Sat Link Resources of FLTSATCOM. |
|
First Computer
|
ENIAC
Feb.14,1946 Unniversity of Pennsylvania Designed to calculate artillery firing tables. |
|
CNO N-6
|
ADM Jack Dorsett
|
|
INFOCON levels
|
Describes a situation where...
5. There is no apparent hostile activity. 4. There is an increased risk of attack. 3. A threat has been identified. 2. An attack has taken place, but the CND System is not at its highest alertness. 1. Attacks are taking place, and the CND System is at its highest alertness. |
|
MOV
|
Material Obligation Validation.
Ensures proper financial management practices are in effect. |
|
Fleet Router
|
Provides Serial and IP connectivity to the ADNS Network, and IT-21 FLTNOC RF connectivity.
|
|
ISSR & OSSR
|
ISSR: Inner Security Screening Router.
Used for security filtering inside a firewall. OSSR: Outer Security Screening Router. User for security filtering outside a firewall. |
|
Proxy Server
|
Acts as an intermediary for Request Form Clients seeking resources from other servers.
|
|
Firewall
|
A device or set of devices configured to permit or deny network traffic between security domains.
|
|
C5I
|
Command
Control Communication Computers Collaboration Intelligence |
|
Trace Route
|
Troubleshooting technique utilizing ICMP echo requests to trace a path to a destination IP address.
|
|
Telnet
|
Protocol which allows for Remote Command Console Sessions.
|
|
Repeater
|
Device which amplifies and retransmits incoming electrical signals.
|
|
Application Server
|
Software framework dedicated to the efficient execution of procedures supporting the construction of applications.
|
|
INFOSEC
|
Information Security
Protecting information and information systems from unauthorized access, use, modification, disclosure, disruption and destruction. |
|
JPAS
|
Provides authorized DOD security personnel real-time information regarding security clearance, access and investigative status.
|
|
DONCAF
|
Department of the Navy Central Adjudication Facility.
NCIS organization responsible for determining who, within the DON, is eligible to hold a security clearance. |
|
Ocean Thermal Layers
|
3 Layers:
Mixed Layer Thermocline Deep Layer |