Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
287 Cards in this Set
- Front
- Back
Discuss the purpose of the 3-M/PMS system.
|
A management tool that is used when conducting preventative maintenance onboard a ship, used for planning, scheduling, and accomplishing PMS onboard ships.
|
|
Explain DPAS.
|
Defense Priorities Allocations systems. Ensure timely delivery of industrial items is met and items are on approved list according to DOD 4400.1M.
|
|
NSN
|
National Stock Number, 13 digit code assigned by Defense Logistic Agency to ID an item of material.
|
|
DD Form 1348-6
|
Non-NSN items used when the CAGE code and part number exceed 15 digits.
|
|
SF-44
|
pocket sized voucher designed for on the spot over the counter purchase of supplies while away from purchasing officer.
|
|
Explain the uses of the government purchase card (IMPAC) Visa.
|
used to make purchases for commercial invoices not exceeding $3,000.
|
|
OPTAR
|
Operational Target, estimated amount of money each command recieved to perform their tasks each quarter.
|
|
Normal Power
|
power provided by city
|
|
Emergency Power
|
power provided by generator
|
|
Uninterrupted Powers
|
UPS, used for safe shutdown of equipment
|
|
ELF
|
Up to 300 hertz, used for one way sub comm's at deep depths
|
|
SLF
|
30 Hertz to 300 hz, used to sub comms and medium depths.
|
|
ULF
|
300 hz - 3 khz. Comms in mines, can penetrate the Earth.
|
|
VLF
|
3 khz - 30 khz. Fleet comm's and navigation.
|
|
LF
|
30 khz - 300 khz, comms at sea via telegraph transmission, atmospheric noice degrades signal.
|
|
MF
|
300 khz - 3 mhz. Long distance comm's over sea, distress.
|
|
HF
|
3mhz - 30 mhz. used for 4 types of comm's.P2P, ship 2 shore, ground 2 air, and flt brcst.
|
|
VHF
|
30 mhz - 300 mhz. Amphibious op's.
|
|
UHF
|
300 mhz - 3 ghz. tactical voice for ship's together.
|
|
SHF
|
3 ghz - 30 ghz. radar and sat comm's.
|
|
EHF
|
30 ghz - 300 ghz. sat comm's.
|
|
frequency
|
number of vibrations, or cycles, of a wave train in a unit of time.
|
|
wavelength
|
distance in space occupied by one cycle of a radio wave at any given instant.
|
|
ducting
|
trapping of an RF wave between 2 layers of the Earth's atmosphere or between an atmospheric layer and Earth.
|
|
multiplexing
|
method for simultaneous transmission of two or more signals over a common carrier wave.
|
|
Modulation/demodulation
|
ability to impress intel upon a transmission medium such as radio waves. removal of intel from a wave.
|
|
Layers
|
3 layers of the Earth's atmosphere.
|
|
Troposphere
|
Sea level to 3.7 miles
|
|
Stratosphere
|
3.7 miles - to 250 miles
|
|
Ionosphere
|
250 miles - space
|
|
Radio Waves
|
a form of radiant energy that can be neither seen nor felt.
|
|
Propogation
|
waves traveling through a medium
|
|
azimuth
|
angular measurement in the horizontal plane in a clockwise direction.
|
|
Air Search
|
provide 360 degree protection from surface to high altitudes.SPS-49 (2D), and SPS-48 (3D, altitude, range, and bearing).
|
|
Surface Search
|
short range 2 D surface and navigational radar. SPS-67.
|
|
Fire Control
|
Provides info to fire control system. NATO (MK-95), SPG-62 (AEGIS)
|
|
Difference between OPELINT and TECHELINT
|
OP- intel gathering required to complete mission. TECH - pubs, analysis, limitations and capabilities of system.
|
|
half duplex
|
comm's in both directions, one at a time
|
|
full duplex
|
comm's in both direction simultaneously
|
|
simplex
|
comm's in one direction
|
|
What form is used for the purchase of NON-NSN items?
|
DD Form 1348-6
|
|
What form is used to purchase Servart material?
|
NAVSUP Form 1314
|
|
What form is used for the transfer of material from one command to another?
|
DD 1149
|
|
How many characters are in an NSN?
|
13
|
|
What is the name of the first four digits of the NSN?
|
Federal Supply Group and Class
|
|
What individual is not allowed to sign for credit card purchases?
|
Card holder
|
|
What are the pay and confirm purchases?
|
When the cardholder has been billed and purchased but not received material, cardholder will confirm with the vendor the status of purchase.
|
|
Why was the Purchase Card program developed?
|
provide fast and convenient method to procure and pay for all requirements under the micro-purchase threshold.
|
|
What is the threshold for construction related purchases?
|
$2,000
|
|
What is the threshold for training related purchases?
|
#25,000
|
|
What is the threshold for JWOD/Servmart related purchases?
|
$100,000
|
|
What is the difference between IPv4 and IPv6
|
IPv4 is 32 bit, IPv6 is 128 bit, IPv6 will not run out of addresses, uses HEX, the 2 protocols are not interoperable.
|
|
Name the different Networks in the Navy
|
GIG, DISN, NMCI, ONENET, IT21.
|
|
What is a self replicating malware computer program?
|
Worm
|
|
computer program that can copy itself and infect a computer?
|
Virus
|
|
Malware that appears to peform a desired function for the user prior to run or install but instead facilitates unauthorized access of the system.
|
trojan
|
|
a method of bypassing normal authentication, securing remote access to a computer.
|
Backdoor
|
|
while writing data, it overruns the boundaries, and overwrites the memory.
|
buffer overflow
|
|
exploits a security vulnerability occuring in the database layer of the application
|
SQL injection
|
|
technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase.
|
dictionary attack.
|
|
design flaw in system to gain access to resources normally that would been protected.
|
priviledge escalation
|
|
strategy used to break the encyption of data, Involves traversing the search space of possible keys until the correct key is found.
|
brute force attack.
|
|
Explain PKI
|
Public Key Infrastructure. set of hw,sw, people, policies, and procedures used to create, manage, revoke, distribute digital certificates.
|
|
3 types of firewalls
|
host, network, hybrid
|
|
IDS
|
detection system, passive, operates in promiscous mode.
|
|
IPS
|
Prevention system, active, operates in inline mode.
|
|
3 common IP address ranges
|
A 1.0.0.1- 126.255.255.254
B 128.1.0.1 - 191.255.255.254 C 192.0.1.1 - 223.255.255.254 |
|
CIA
|
confidentiality, integrity, availability
|
|
Defense in depth
|
best practices, layed security
|
|
current reporting system for IAVM
|
OCRS and VMS (vulnerability management system)
|
|
Overall responsibility of IAVM program
|
USCYBERCOM, Assitant SecDef (Networks and Information Integration)
|
|
Components of a computer
|
CPU, motherboard, monitor, ram, nic, power supply, HD, fan, video card, OS, Keyboard, peripherals
|
|
Windows servers
|
proxy, print, exchange, file server, DC, HBSS, Zenworks, SUS, Ghost, ISA, NETMON, ?Mark, What's up Gold.
|
|
2 circuits
|
768J, primary, 72KK, secondary
|
|
7 layers of OSI
|
physical, data link, network, transport, session, presentation, and application
|
|
4 layers of TCP/IP
|
network interface, interface, host-to-host, application
|
|
What layer(s) do the packets fall in?
|
Network
|
|
What layer(s) do the frames fall in?
|
data link
|
|
What layer(s) do the bits fall in?
|
physical
|
|
What layer(s) do the segments fall in?
|
transport
|
|
What layer(s) do the data fall in?
|
application, presentation, session
|
|
What layer does encryption take place?
|
Presentation
|
|
CUDIXS
|
Common User Digital Information Exchange Subsystem, used to send and receive narrative message traffic
|
|
GINGERBREAD
|
indicates that an unauthorized person is present on a circuit. The only proper response to this is "Roger Out" and comms are to cease on that circuit
|
|
EEFI Cap's List 01
|
Position
|
|
EEFI Cap's List 02
|
Capabilities
|
|
EEFI Cap's List 03
|
Operations
|
|
EEFI Cap's List 04
|
Electronic Warfare
|
|
EEFI Cap's List 05
|
Personnel
|
|
EEFI Cap's List 06
|
COMSEC
|
|
EEFI Cap's List 07
|
Wrong Circuit
|
|
EEFI Cap's List 08
|
NATO
|
|
EEFI Cap's List 09
|
NATO
|
|
EEFI Cap's List 10
|
NATO
|
|
EEFI Cap's List 11-29
|
COMUSNAVEUR
|
|
EEFI Cap's List 30-49
|
COMUSFLTFORCOM
|
|
EEFI Cap's List 50-69
|
COMPACFLT
|
|
PLA
|
Plain Language Address, command short title
|
|
DTG
|
Date Time Group, 5 digits, 140001ZFEB12, first two digits is day of month, next 4 is time, Z is time zone, month, year.
|
|
UTC
|
Universal Time, greenwich mean time, or zulu
|
|
Purpose of OPTASK COMMS
|
way to distribute comm's plan to all involved ships
|
|
Purpose of Comspot/comm's service advisory
|
Comspot is a report sent from command when comm's is in an outage. Service Advisory comes from NCTAMS when a system needs to be down or is disgraded.
|
|
Purpose of EKMS
|
electronic key management system, minimum policies for issuing, accounting, handling, safeguarding, disposing of COMSEC material, and the application of cypto and physical security measures to COMSEC and facilities.
|
|
Purpose of OTAT/OTAR
|
Over the air key transfer/over the air rekeying. OTAT-electronically distributing key without changing the traffic encyption key used on the secured comm's pathover which the transfer is accomplished. OTAR- changing traffic encyption key or transmission security key in remote cypto-equipment by sending new key directly to the remote cypto-equipment over the comm's path it secures.
|
|
Purpose of a mobile detachment
|
Our total force must be correctly shaped, trained, equipped, and optimized to respond to the full range of military operations and requirements from peacetime contributory Support, small scale contingencies, to major theater war.
|
|
Purpose of Direct Support Assets.
|
should be maintained ready for deployment at all times. The inability to support a DSA within 48 hours constitutes a CASREP situation.
|
|
What 2 criteria are met when a CASREP is needed when a DSA sent within 48 hours?
|
1. equipment failures are a preclude to deployment. 2. when a team is not ready to redeploy within 48 hours.
|
|
What is the role of Blue Team?
|
specifically constructed for the inter deployment training cycle charged with assisting in the protection of the targeted assets and conducting training to local personnel.
|
|
What is the purpose of the Red Team?
|
independent team used to simulate opposing threats and expose and exploit IA vulnerabilities.
|
|
Explain the difference between the US Title 10 and the US Title 50.
|
10- outlines role of the armed forces. 50- outlines role of war and national defense. used to ensure each department of the armed forces has their own secretary and works for the DoD.
|
|
CRITIC?
|
critical information that must be made in short, specially formatted messages, transmitted the fastest means necessary.
|
|
COOP
|
Continuity of Operations Plans.
|
|
Purpose of a MOC.
|
Maritime Operations Centers. located in each numbered fleet and allow the Navy to maintain a state of readiness, providing commanders with all the necessary resources constantly manage operations and be able to smoothly transition from peacetime op's to disaster relief and major combat operations.
|
|
What are the different Computer Network Incident Phases (CNI)?
|
Initial Preperation - Secure/Patch Network
Detection and Analysis - Scans, virus software. Containment, Eradication, and Recovery - Safely quarantine, delete, restore Post Incident Activity - Lessons learned |
|
3 Mission Assurance Categories.
|
Mac 1 - mission critical
Mac 2 - Slows Operations, but not mission critical Mac 3 - workstation |
|
Identify what information the automated notification sent through NCD.
|
All pertinent information such as PLA, IP address, POC.
|
|
Virus
|
attached to a program
|
|
worm
|
self replicating
|
|
logic bomb
|
set to go off at a set time or after a set event
|
|
trojan horse
|
hidden in other applications
|
|
rootkit
|
grants admin priviledges
|
|
spear phishing
|
social engineering
|
|
DOS
|
stops network usage
|
|
buffer overflow
|
overloads memory causing crashes
|
|
Explain the difference between a virus and a worm.
|
virus requires a program to execute, worm is self replicating
|
|
polymorphism
|
changes characteristics to avoid detection
|
|
metamorphism
|
change their code to an equivalent one, but never remains constant.
|
|
macro virus
|
embedded within scripts
|
|
companion virus
|
replaces a program is executed when the user executes the program
|
|
explain what a media based vulnerability is.
|
USB, external HD
|
|
explain what a network device vulnerability is.
|
IDS, routers, firewalls.
|
|
List the report generated by the IM/Trends division at NCDOC and state where they can be found.
|
Weekly/Monthly Tech report, Weekly trends report, Daily Operations repot
|
|
List the steps necessary after receiving the final report from a command.
|
Review target IP, source IP, Host, seek required info, updates, and virus update with the last 7 days. Make ready for lead, lead QC's, ready for QC, QC closes or fixes tickets.
|
|
SCI
|
sensitive compartmented information, info derived from intelligence sources. used with TS. Yellow.
|
|
TS
|
Top Secret, cause exceptionally grave damage to the national security. Orange.
|
|
CONFEDENTIAL
|
could be expected to cause damage to national security. Blue.
|
|
SECRET
|
could be expected to cause serious damage to national security. Red.
|
|
UNCLASS
|
unclassified information. Green.
|
|
ID who has the overall authority of, and controls access to, a SCIF.
|
SSO, all SCI maters are referred to the SSO.
|
|
SF700
|
form that contains vital information about the security container in which it is located.
|
|
SF701
|
checklist that is filled out at the end of the each day to insure that classified materials are secured properly and allows for employee accountability in the event that irregularities are discovered.
|
|
SF702
|
record of names and times that persons have opened, closed, and checked a particular container that holds classified information.
|
|
SF703
|
Top Secret Cover Sheet
|
|
SF704
|
Secret Cover Sheet
|
|
SF705
|
Confidential Cover Sheet
|
|
SF153
|
Audit trail for Comsec material
|
|
SF312
|
non disclosure agreement
|
|
When are safe combo's changed?
|
when first placed in use, when an individual knowing the combo no longer requires access, when subjected to compromise, when taken out of service.
|
|
DCS
|
defense courier service, no security classification should be seen on outside, no paid sticker shall be seen,
|
|
Handcarry of classified data.
|
should have a cover sheet, and courier should have a courier card, double wrap the material.
|
|
FP A
|
general threat of terrorist attack.
|
|
FP B
|
increased threat and more predictable threat of terrorism.
|
|
FP C
|
applies when an incident occurs or intel is received indicating some form of terrorist action against personnel or facilities is imminent.
|
|
FP D
|
immediate area of terrorist attack has occured or when intel has been received indicating that terrorist action may occur at that local area.
|
|
RAM
|
random antiterrorism measures.
|
|
EAP
|
emergency action plan. provides protection of classified material in a way that will minimize the risk of personnel injury or loss of life.
|
|
In what order should classified material be destroyed in case of Emergency Destruction.
|
1. TS
2. S 3. Confidential |
|
Responsibilities of DONCAF.
|
reports directly to DIRNCIS and is the personnel security adjudacative determination authority for all individuals affiliated with the DON.
|
|
INFOCON 5
|
Normal readiness
|
|
INFOCON 4
|
Increased Military Vigilence
|
|
INFOCON 3
|
Enhanced Readiness
|
|
INFOCON 2
|
Greater Readiness
|
|
INFOCON 1
|
Maximum Readiness
|
|
Purpose of Naval Intelligence
|
supports the commander, id centers of gravity and critical vulnerabilitie, supporting planning and execution of op's, and protecting the force.
|
|
Define the 5 steps of intelligence.
|
1, Planning and direction. 2. Collection. 3. Processing 4. Production 5. Dissemination
|
|
3 categories of intelligence
|
Strategic, Operational, Tactical.
|
|
CCIR
|
commanders critical intelligence requirement, list of information requirements identified by the commander as being critical in facilitating timely info management and the decision making process that affect successful mission accomplishment.
|
|
Define the difference between a us citizen and a us person with regards to US intelligence oversight.
|
US person may include permanent resident alien, unincorporated association substantially composed of us citizens or perment resident controlled or directed by a foreign gov't or gov't's.
|
|
HUMINT
|
human intelligence, gathers info from human's.
|
|
OSINT
|
Open Souce intel, info derived from newspapers, journals, radio, tv, and the internet.
|
|
MASINT
|
measurement and signature intel.
|
|
SIGINT
|
signals intelligence, interception of signals comm's, radars, and weapon systems.
|
|
COMINT
|
communications intelligence, intercept of foreign comm's.
|
|
FISNT
|
foreign instrumentation signals intelligence
|
|
ELINT
|
electronic intelligence, derived from foriegn non communications electromagnetic radiation
|
|
IMINT
|
imagery intelligence
|
|
ACINT
|
intelligence derived from the collection and the processing of accoustic phenomena.
|
|
Page 2
|
dependency information/record of emergency data
|
|
page 4
|
enlisted qualifications history
|
|
page 13
|
administrative remarks
|
|
Navpers 1626/7
|
Report and disposition of Offense, report of offenses.
|
|
Deconfliction as it applies to CND.
|
Unsure if realworld or exercise.
|
|
List the 4 phases of CNDS Certification Accredidation
|
registration, verfication, validation, and post accredidation.
|
|
What is a NAR, and what department creates and maintains.
|
Network Analysis Report, TANF
|
|
4 steps in created a NAR
|
assessment, research, analysis, reporting
|
|
Explain what a CA is.
|
Cyber Alert. initial analysis of unusual activity or threats to the GRID.
|
|
Name where all NARs, CAs, and CCIR be found.
|
SIPR, NCDOC site.
|
|
SCCVI
|
Secure Compliance Configuration Validation Initiative, Uses Retina
|
|
SCRI
|
Secure Configuration Remediation Initiative, Hercules.
|
|
Purpose of OCRS, who is responsible for it.
|
Vulnerability Compliance tracking within Navy, VAAP.
|
|
where does NCDOC obtain info for their initial IAVA/B messages?
|
USCYBERCOM
|
|
POR
|
Program of Record, who owns the system.
|
|
CMP
|
Centralized management program. (A group of POR's)
|
|
Explain the purpose of VMS and who it is managed by.
|
Vulnerability Management System, managed by DISA.
|
|
List the different record message types that are used by VAAP.
|
initial, reminder, DINQ, SCCVI, ALCND's.
|
|
What are the 4 space mission areas?
|
space force enhancement, space support, space control, and space force application
|
|
Explain Space Force Enhancement
|
increase joint force effectiveness by increasing the combat potential of that force, enhancing operational awareness, and providing needed joint force support.
|
|
What are the 5 force enhancement missions?
|
ISR, missile warning, environmental monitoring, sat comm's, and PNT.
|
|
Explain space support.
|
space lift op's (launching and deploying sattelites), sat op's (maintaining, sustaining, and rendezvous and proximity Op's), and reconsitution of space forces (replenishing lost or diminished Satelites).
|
|
Explain space control
|
provides freedom of action in space for friendly forces, and when directed, denies it to an adversary.
|
|
Explain space force application.
|
combat operations in, through, from space to influence the course and outcome of conflict by holding terrestrial targets at risk.
|
|
How does the van allen radiation belt affect communications?
|
2 concentric donut shaped regions of stable, trapped charged particles that exist because the geomagnetic field near the Earth is strong and field lines are closed.
|
|
How does the atmospheric drag affect comm's?
|
atmospheric drag makes the sattelites move.
|
|
Low Earth Orbit
|
100 to 1200 miles above the Earth's surface.
|
|
Medium Earth Orbit
|
1,243 miles to 22,236 miles
|
|
Highly elliptical orbit
|
used to obtain sattelite comm's in the northern and southern hemisphere. Above 22,000 miles.
|
|
Geosynchronous orbit
|
Sattelite will not move, 19,300 miles
|
|
Polar orbit
|
90 degrees to the equator
|
|
Define apogee.
|
a point on the orbit farthest from the center of the Earth. (away)
|
|
Define Perogee.
|
a point closest to the center of the earth will be halfway around the orbit. (closest)
|
|
2 main space launch facilities.
|
Vanderburg AFB, California
Kennedy space center |
|
GBS
|
Global Broadcast service. high volume data, and video information to tactical terminals.
|
|
WGS
|
World geodetic system. standard for use in cartography, geodesy, and navigation.
|
|
Describe GPS.
|
Global positioning system. navigational system, 2 types, SPS - civilian (tomtom, garmin), PPS - military, accuracy can be encrypted.
|
|
Discuss the role of synchronized time for GPS.
|
must have accurate UTC time or will not work. Must use the master clock and not internal.
|
|
Geo-location
|
Same as GPS but provides more precise location such as address.
|
|
Network Synchronization
|
USNO provides master time for all NIPR and SIPR computers.
|
|
Who has TACON of NCDOC watch floor personnel and is responsible to the CO, OPS, C10F?
|
CNDWO
|
|
Who is tasked with handling electronic spillages?
|
NNWC
|
|
Who should be contacted in order if Electronic spillages occur?
|
Command Sec Mgr, IAM, IAO, OPS.
|
|
What form is required to be with any piece of evidence before it is accepted?
|
DD Form 1149
|
|
Proper packing procedures for shipping SECRET hd or evidence.
|
USPS registered, no information left on outside, double wrapped, put classification on the first wrapping, then wrap again.
|
|
What does imaging a device mean in terms of media forensics?
|
entire drive is copied over in 1's and 0's.
|
|
State how the integrity of an image file is verified.
|
via a hash verification, MD5 and SHA1.
|
|
3 hardware devices used to image a HD or other type of evidence.
|
write blocker, talon/quest, image master.
|
|
Purpose of a write blocker.
|
the original evidence can't be tampered with. The write blocker allows for one way traffic.
|
|
Name the "Big Three"
|
hkey_local\security, software, system.
|
|
What are virtual machines, why are they important when working with malware analysis?
|
software implementation of the machine, executes like a physical machine, Isolates the malware.
|
|
Explain what hashing is.
|
verfies integrity of drive.
|
|
difference between unallocated space and slack space.
|
unallocated space is space left available after deletion of a file, slack space is space left over at end of cluster.
|
|
Difference between wiping and formatting.
|
wiping is completing purging and clearing data, formatting is only removing file system (book keeping).
|
|
Difference between a sector and cluster
|
sector is 512 bytes, smallest unit.. Cluster is a group of sectors.
|
|
Difference between EFS and bitlocker.
|
EFS encrypts files, Bitlocker encypts entire HD.
|
|
Describe digital certificates.
|
pair of electronic keys used to sign/encrypt data, used to trust others.
|
|
Difference between hardware and software certificates.
|
software - public/private keys, can be transferred. Hardware - public/private keys - can't be transferred. CAC.
|
|
What is thinnet
|
coax cable, with BNC connectors, 10mbit/s, IEEE 802.3.
|
|
2 types of fiber?
|
single mode, multimode
|
|
Meaconing?
|
intentional transmission of signals to decieve the adversaries.
|
|
Intrusion?
|
Intentional insertion of EM energy into transmission paths.
|
|
Jamming?
|
deliberate radiation, re-radiation or reflection of EM energy for the purpose of preventing or reducing an enemy's effective use of the EM spectrum.
|
|
spectrum management?
|
planning and coordinating use of the electromagnetic spectrum.
|
|
Components of naval message.
|
Format Line 2 - routing indicators, line 4 - special handling, line 5, DTG and precedence, line 6 - from, line 7 - to, line 8 - info, line 12 - subject, references, body, declass.
|
|
TEMPEST
|
investigation, study, and control of compromising emanations from telecommunications and automated information processing systems.
|
|
6 areas that comprise Naval Doctrine
|
warfare, intel, op's, logistics, planning, and command and control.
|
|
7 principles of Naval logistics
|
responsiveness, simplicity, flexibility, economy, attainability, sustainability, and survivability
|
|
First shipped named after an enlisted man.
|
USS OSMOND INGRAM DD-255, spotted approaching torpedo, realized it would strike soon so he started jettisoning all the amunition, he was blown overboard when struck being the first enlisted man killed in action in WW1.
|
|
Conditions that led to formation of the US navy.
|
2nd continental congress realized for the colonies to survive they needed a Navy to protect them.
|
|
3 classes of ship's upon formation of navy.
|
ships of the line, frigates, and sloops of war.
|
|
Battle of Coral Sea
|
4-8 May 1942, fought by aircraft launched by carriers. saved australia from being attacked by Japan. Lost USS LEXINGTON.
|
|
Great White Fleet
|
16 Dec 1907 - 22 Feb 1909. Projected naval power world wide.
|
|
Battle of Normandy
|
6 june 44, largest amphib operation in history.
|
|
Battle of Midway
|
4-7 June 42, turning point of the war in the pacific. cryptoanalysts broke the JP-25 code, telling us when/where the japanese were going to attack.
|
|
Guadalcanal
|
August 7, 1942 - feb 9, 1943, solomon islands came under allied control, which lessened the danger of the Japanese attacking Australia. The sullivan brothers all passed onboard the USS JUNEAU during this time.
|
|
Battle of Leyte Gulf
|
23-26 October, 1944, deciding blow to the Japanese Navy, cut off supply lines. Lost control of the Phillipines.
|
|
Mercury 3
|
May 5, 1961, first US manned space flight, alan shepard.
|
|
Gemini 3
|
Mar 23, 1965, First US 2 man mission, John Young.
|
|
Apollo 11
|
July 20, 1969, first lunar landing, Neil Armstrong.
|
|
Apollo 17
|
Dec 7, 1972, 7th and last lunar landing, Eugene Cernan and Ronald Evans.
|
|
STS-1
|
April 12, 1981, John Young, Robert Crippen, first orbital test of shuttle, all Navy crew.
|
|
On the Roof Gang
|
First class was held, Oct 1, 1928, 176 total students, on the roof of the old navy department building.
|
|
Attack on the USS LIBERTY
|
June 8, 1967, Israel was at war with Arab Nations, USS LIBERTY never received message saying to stay out of way, and Israeli Air Force jets attacked ship accidentally, killing 34 Sailors.
|
|
Capture of USS PUEBLO
|
captured by North Korea and they still have the ship, ship was loaded down with classified material, never practiced Emergency destruction, poor comm's between Captain and cryto crew.
|
|
D-Day Landing
|
June 6, 1944,
|
|
Hainan Island EP-3 incident
|
April 1, 2001, midair collision with Chinese jet, the crew spent 26 minutes destroying all classified materials.
|
|
Navajo code talkers
|
took part in every marine division from 42-45, they transmitted messages in the Navajo language which was never broken.
|
|
attack on the USS Stark
|
critical information was never passed from CO/XO.
|
|
EC-121 Shootdown
|
April 15, 1969, shot down by North Korean MIG, killing 31 Americans.
|
|
3 levels of war
|
Tactical, Strategic, Operational
|
|
National Security Act of 1947
|
President Truman signed the act July 26, 1947, The act merged the Dept of War and the Dept of the navy into the national military establishment ran by the Sec of Def.
|
|
When and Why the Navy Core Values were created?
|
1992, Adm Kelso created bc of Tailhook scandal.
|
|
When and why was the Sailors creed created?
|
1993, Adm kelso created blue ribbon recruit training panel.
|
|
when was ONI established and by whom?
|
March 23, 1882, william hunt, sec of navy.
|
|
Host Based IDS
|
software on a workstation
|
|
Network Based IDS
|
monitors traffic on all types of devices on entire network
|
|
Signature based IDS
|
filters on known malicious
|
|
Anomoly based IDS
|
filters based on baseline
|
|
Limitations of signature based IDS
|
can't detect zero day attack, lag time between detection of new attack and implementation of new signature, limited to signatures already deployed
|
|
Limitations of anomaly based IDS
|
accuracy of baseline, prone to false positives
|
|
What is a false positive
|
alert that is normal traffic
|
|
What is a false negative
|
alert that was not seen that shouldve been seen
|
|
Inline
|
reads all traffic on network segment
|
|
span
|
views all traffic being seen on that spaning port.
|
|
Internet registry for Asia
|
APNIC
|
|
Internet registry for North America?
|
ARIN
|
|
Internet Registry for Europe?
|
RIPE
|
|
Internet Registry for Africa?
|
AFNIC
|
|
Internet Registry for Latin America?
|
LATNIC.
|