• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/200

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

200 Cards in this Set

  • Front
  • Back

(True or False)


A fracture where the bone has protruded from the skin is called a closed compound

False

How many pressure points do we discuss in common core?

11

What is the timeline in which on-duty DoD civilian and on/off-duty military Class A mishap reports must be reported?

8 hours

(True or False)


PPE stands for Personal Preemptive Equipment?

False

(True or False)


The US Navy's Hearing Conservation Program is to prevent occupational hearing loss and assure auditory fitness for duty of all Navy personnel.

True

What instruction governs safety mishap and reporting?

OPNAVINST 5102.1D

(True or False)


A HAZREP is intended to be submitted when the elimination and control of a given hazard has a community-wide implication in reducing mishaps.

True

Which one is NOT a method for controlling bleeding?


Direct Pressure


Indirect Pressure


Make decision


Constricting Band

Make decision

What space mission took place 07-19 Dec 1979?

Apollo 17

What battle in November of 1942 was where the Sullivan brothers were lost on board the USS Juneau?

Battle of Guadalcanal

What was the name of the first computer?

ENIAC

Of the 6 areas that comprise the Naval Doctrine, which one below is incorrect?


Naval Operations


Naval Planning


Naval Intelligence


Naval Command and Computers


Naval Logistics


Naval Warfare

Naval Command and Computers

(True or False)


The first US warfare submarine was named the Turtle.

True

What space mission took place 16-24 July 1969?

Apollo 11

What was the first navy ship named after an enlisted man?

USS Osmond Ingram

This class of naval vessel carried 64-100 guns of various sizes at the inception of the US Navy.

Ships-of-the-line

(True or False)


The mission of NCTAMS LANT is to provide classified and unclassified voice, messaging, data and video to ships, submarines, aircraft and ground forces operation from the west coast and pacific region in support of Naval and joint operation.

False

This organization's primary responsibility is Counter Intelligence and Counter-terrorism operations conducted in the United States.

FBI

This COCOM is Headquartered in Illinois

TRANSCOM

This COCOM is Headquartered in Miami, FL

SOUTHCOM

This COCOM is Headquartered in Hawaii

PACOM

This COCOM is Headquartered in Colorado

NORTHCOM

This COCOM is Headquartered in Tampa, FL

CENTCOM

This COCOM is Headquartered in Nebraska

STRATCOM

This COCOM is Headquartered in Germany

EUCOM

(True or False)


The MCIN has the mission of providing tailored intelligence support to the Marine Corps operation forces with contingency planning and other requirements for intelligence products not satisfied by other theater or national assets.

False

What is 10th Fleet's AOR?

Cyber

What is 4th Fleet's AOR?

Caribbean Central and South America

What is 7th Fleet's AOR?

Western Pacific (Japan)

What is 6th Fleet's AOR?

Mediterranean Sea

What is 3rd Fleet's AOR?

Eastern Pacific

What is 5th Fleet's AOR?

Persian Gulf Red Sea and Arabian Sea

What type of report is a series of messages that are used to inform the operational commander, or appropriate higher authority?

UNIT SITREP

What lists all personnel assigned and provides an account of enlisted crew members?

EDVR

This page of your service record contains miscellaneous administrative remarks.

Page 13

Who perform administrative, personnel, and operational training functions for a "type" of weapon system within a fleet organization?

Type Commander

Who is Command of a numbered fleet and responsible for all naval operations with the fleet's AOR?

Fleet Commander

What test is used to evaluate language abilities of service members and DoD civilians?

DLPT

What form is used to purchase parts that do not have an NSN?

DD Form 1348-6

What streamlines payment procedures, reduces paperwork processing purchase orders by improving cash mgmt practices, and provides procedural feedback to improve management control and decision making?

IMPAC

What form is the financial liability investigation of property loss (FLIPL)?

DD Form 200

(True or False)


Operating Target is an estimate of the amount of money that will be required by an operating ship, staff, squadron, or other unit to perform assigned tasks and functions.

True

What DoD system is used to connect security personnel with their Central Adjudication Facility?

JPAS

Who can give the order to initiate Emergency Destruction?

Highest ranking person on station for SCI

(True or False)


A Security Access Eligibility Report is submitted when there is a potential adverse impact on continued SCI eligibility to include administrative or disciplinary acts against an individual.

True

What INFOCON level describes when an attack has taken place but the Computer Network Defense system is not at its highest alertness. Non-essential networks may be taken offline.

INFOCON2

In regards to Security, what does RAM stand for?

Random Antiterrorism Measure

What THREATCON/FP level is conducted when a known terrorist threat has been made?

Charlie

How often is a CONFIDENTIAL clearance updated?

15 years


What THREATCON/FP level is considered "somewhat predictable threat"?

Bravo

Of the items listed below which one does not have to be reported to the SSO?


Foreign influence concerns


Excessive indebtedness


Alcohol abuse


Buying a new car

Buying a new car

How many THREATCON/FP levels are there?

5

What form is the Security Contain Information form?

SF700

During Emergency Destruction, what priority number does all operation SCI codeword material that may divulge intelligence fall under?

Priority Two

(True or False)


ICDs are the principle means by which the DNI provides guidance, policy, and direction to the Intelligence Community.

True

What computer incident category does the following fall under: An unauthorized non-privileged access to a DoD system.

User Level Intrusion

Define Authentication

Security measure designed to establish the validity of a transmission, message, or originator, or means of verifying an individual's authorization to receive specific categories of information.

What is the assurance that information is not disclosed to unauthorized persons, processes, or devices?

Confidentiality

In immediate order, usually by the regional commander, to perform a specific task on their networks.

CTO

What is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates?

PKI

IPv6 will use how many bits for its address?

128 bits

Application Layer of OSI Model

Network process to application

Session Layer of OSI Model

Interhost communication

Presentation Layer of OSI Model

Data representation and encryption

Transport Layer of OSI Model

End-to-end connections and reliability

Data Link Layer of OSI Model

Physical addressing (MAC & LLC)

Physical Layer of OSI Model

Media, signal and binary transmission

Network Layer of OSI Model

Path determination and logical addressing

What is a hierarchical naming system built on a distributed database for computers, services, or any resource connected to the internet or a private network?

DNS

Which codeword is used when an intruder is suspected on the net?

GINGERBREAD

How many levels of River City are there?

4

What will be submitted by all ships and shore facilities at any time when unusual communications difficulties are encountered?

COMSPOT

(True or False)


EKMS generates and distributes electronic key material for all NSA encryption systems whose keys are loaded using standard fill devices, and directs the distribution of NSA produced key material.

True

Speed of service for priority code Routine

6 hours

Speed of service for priority code Priority

3 hours

Speed of service for priority code Immediate

30 minutes

Speed of service for priority code Flash

As fast as possible

Speed of service for priority code Flash Override

Overrides all other codes

What was the first ship in the navy?

Sloop Katy was taken into service by the Rhode Island colonial navy on 3DEC and renamed USS Providence

What is the Navy's birthday?

13 October 1775

Who represent the following tiers: Tier 1, Tier 2, Tier 3, Tier 4?

Tier 1 - Helpdesk (ESD)


Tier 2 - Hardware (field services)


Tier 3 - Engineers (naso)


Tier 4 - NETWARCOM

What does TU stand for?

Task Unit

Who is responsible for the pier router?

N8

What was the importance of the battle of Midway?

Effectively destroyed Japan's naval strength. Destroyed 4 aircraft carriers.

What does CIA stand for in regards to network security?

Confidentiality, Integrity, Availability

What is ORM?

Operational Risk Management which is a risk decision making tool

What is the study methods of obtaining the meaning of encrypted information, without access to the secret information work center is normally required to do so?

Crypto analysis

What was RADM Grace Hopper's contributions to the navy

She is one of the pioneers in the development of the electronic computer

What is the frequency range of UHF?

300MHz - 3 GHz

What is a sf-312 used for?

Classified information non-disclosure agreement

What program is used to create EDS trouble tickets?

Remedy

Define CUDIXS?

Common User Digital Information Exchange System

What is the FLTNOC location of UARNOC?

(Unified Atlantic Region NCTAMS LANT) Norfolk, VA

What is the FLTNOC location of PRNOC?

(Pacific Region NCTAMS PAC) Wahiawa, HI

What is the FLTNOC location of ECRNOC?

(European Central Region NCTS) Naples, Italy

What are the 5 steps of ORM?

1) Identify Hazards


2) Assessing Hazards


3) Making Risk Decisions


4) Implementing Controls


5) Supervising

What was the most devastating spy ring ever unmasked?

1967-1985 CWO John Walker

What IP address is used for loop-back testing?

127.0.0.0/24

What is a SF-703 used for?

Top secret cover sheet

In the inception of the navy, what were the 3 classes of naval vessels?

Ships-of-the-line


Frigates


Sloops of War

What are the primary satellite controllers?

LOC/LGC - Landstuhl, Germany


BOC - Fort Buckner, Japan

What is DLR, and what does it do?

Depot Level Repairable - Fixes high cost items that cannot be repaired onboard

What are MAMs and what does it mean?

Maintenance Assistance Modules - Test module used to isolate faults in a system

What are the three levels of war?

Tactical


Operational


Strategic

What governs safety and mishap reporting?

OPNAVINST 5102.1D

What is SF-702 used for?

Open, close, and check log

What are the Risk Assessment Codes?

Critical Risk


Serious Risk


Moderate Risk


Minor Risk


Negligible Risk

What is the purple code?

Electromechanical cipher used to identify the most secure diplomatic cryptographic material

What command does NCTS Bahrain report to operationally?

COMUSNAVCENT

Data rate of OC12?


622 mbps


What are the categories of Hazard Severity?

CAT 1. May cause death


CAT 2. May cause serious injury


CAT 3. May cause minor injury


CAT 4. Minimal threat to personnel

What is the objective first aid?


Save lives


Prevent further injury


Prevent infections


What is the function of the environmental control unit?

Provides cooling to the HPAs

What does INMARSAT stand for?

International Maritime Satellite

What are the methods of controlling bleeding?

Direct pressure
Pressure points
Tourniquet


When are evals due for E-5?

March

What does DKET provide?

Deployable Ku Band Earth Terminal provides secure, reliable comms for deployed units to establish network connectivity

Define EEFI?

Essential elements of friendly information

What happens when the SL-100 does a cold restart?

All calls drop

What are the symptoms of shock?

Weak/rapid pulse, sweating, dilated pupils

What message is used when concerning the death or serious illness of a family member?

Red Cross message

What is the difference between open and closed fractures?

Closed Fracture - skin intact


Open Fracture - bone protrudes

What does TNCCENT stand for?

Theater network operations center central command

What day did the largest amphibious operation in history take place?

Battle of Normandy 6 June 1944

Which restart of the SL-100 phone switch least impacts the users?

Warm restart

How often must a SIPRNET ATO be resubmitted?

Every 12 months

Who can authorize a class B vehicle to travel over 100 miles?

CO

Type of routers the navy mostly uses?

Cisco

What does perigee mean?

The point in a satellite's orbit when it's closest to the center of the earth

What is the importance of the battle of Leyte Gulf?

Japan lost the Philippines and was cut off from supplies

What is essential protective measure to obtain reliable operation in a cluttered electromagnetic environment?

Shielding

Define IATO and how long is it good for?

Interim Authority to Operate - is only good for 6 months

What does Apogee mean?

A point in the satellite's orbit when it's farthest from the center of the earth

What does RAM stand for (in terms of security) and what does it do?

Random Anti-Terrorism Measures - a method of deterrence of terrorist attacks

What is SF-701 used for?

Daily check sheet

How often are CMS A&A visits mandatory?

Every 18 months

What is the 10th fleet location and AOR?

Fort Meade, MD - cyber/global

What numeral system uses "1" and "0" to represent a numeric value?

Binary

What is the 4th fleet location and AOR?

Mayport, FL - South Atlantic

What is the frequency range for UHF?

300 mhz - 3 ghz

What is categorized as minor property?

Property acquired for immediate use

What is the range of a low earth orbit?

Altitudes between 150 and 800 miles above the earth's surface

How many pressure points can be utilized for providing first aid?

22, eleven on each side of the body

What circuits are not patchable to the ATC IDNX CIRCUITS?

EHF circuits

What is what's up Gold?

A desktop application used to monitor up/down status of NOC hardware and afloat units

What does FOT stand for?

Follow on terminal

What does NREMS stand for?

Navy Regional Enterprise Message System

What is the purpose of fitreps?

Evaluate performance for officers

Safe net is used for what?

Bulk encryption

What is a security incident that occurs whenever classified data is placed onto a system of a lower classification?

Spillage

What number system uses "0-9" and "A-F" to represent a numerical value?

Hexadecimal

How often must a CMS inspection be performed?

24 months

What does DAMA stand for, what is its nomenclature?

TD - 1271


4 x DAMAs

What was the first flight that landed a man on the moon?

Apollo 11

What precedence is represented with an "O"?

Immediate 30 min time restraint

What is the method to treat for shock?

Raise and support the legs

What is the minimum time required to resolve a VIP trouble ticket?

24 hours

This is a show of respect with both shore and ship gun batteries firing volleys

Gun salute

What is the 5th fleet location and AOR?

Manama, Bahrain - Middle East

What devices are used to tunnel unclassified data through a DNS?

TACLANEs

What service does EHF TIP provide?

SIPR


NIPR


Chat

What does JWICS stand for?

Joint Worldwide Intelligence Communication System

What does ATO stand for?

Authority to Operate

What is the NCA, who does it, comprised of, and what is its function?

National Command Authority is composed of the President and SECDEF. They can authorize the use of nuclear weapons.

What does STW stand for?

Strike warfare

What department is responsible for maintaining the readiness of all electronic equipment under control of NCS?

N6

What does PSTN stand for?

Public switched telephone network

What form is used to record when personnel open, closed and check safe?

SF-702

What is the purpose of the krone black copper?

Connectivity

All sum frequencies above the carrier frequency?

Upper Sideband

What does SIPRNET stand for?

Secret Internet Protocol Router Network

What does ATM stand for?

Asynchronous Transfer Mode

What does AW stand for?

Air Warfare

What are two types of practices dangerous to security?

Reportable and Non-Reportable

Any frequency of electromagnetic energy capable of propagation into space

Radio Frequency

Abbreviation used to reduce the length of a name while maintaining reasonable interpretation of an activities identity

Plain Language Address

What is the purpose of the Center for Information Dominance?

Develop war fighter by providing the right training at the right time

How long is a solar cycle?

11 years

Half duplex is:

To transmit and receive comms only in ONE direction at a time (ie: walkie-talkies)

Full duplex is:

To transmit and receive BOTH directions simultaneously (ie: phones)

Elevation angle is:

The angle at which the radio wave travels from the antenna to the atmosphere

Name the languages associated with Category 4:

Arabic, Chinese, Korean, Pashto (PACK)

Land-based, long range anti-submarine warfare patrol aircraft

P-3C Orion

EW jamming system, data links, and communication capabilities. Designed for carriers or forward base ops.

EA-6B Prowler

EW jamming system, data links, and communication capabilities. Designed for carriers or forward base ops.

EA-6B Prowler

Carrier based tactical airborne warning and control system. Maintain surveillance or both airborne and surface, hostile and friendly.

E-2C Hawkeye

Real-time tactical electronic reconnaissance capabilities

EP-3E

Code word for EEFI disclosed on non-secure line

BEADWINDOW

What is the role of SURREY?

NSA's collection requirement database

This USSID provides support to the IC, military, and US Government partners, Technical and Serialized SIGINT Reporting, Time-sensitive Non-serialized Reporting formats and dissemination

USSID CR Series

Reflection of the original sound wave as it bounces off a distant surface

Echo

An interactive technology used to run programs over the internet. If you allow a control to execute on your system, it has full access.

ActiveX

This type of message should be handled within 6 hours, or next business day

Routine (R)

This type of message should be handled within 3 hours

Priority (P)

This message should be handled within 0-30 minutes

Immediate (O)

This type of message should be handled within 10 minutes

Flash (Z)

This type of message should be handled within 10 minutes, and override all others

Flash Override (W)

This type of ticket should be resolved in LESS than 10 minutes

Emergency (YY)

What are the contents of DOI-101

DSSDS Address Groups

What are the contents of DOI-102

Routing indicators in DSSCS