Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
332 Cards in this Set
- Front
- Back
Activity where a hacker is operating from an outside location by using some network and he/she is not physically resident at the location where the activity is being observed
|
External Hacker Activity
|
|
Activity where a hacker is operating from within the site where the activity is being observed
|
Internal Hacker Activity
|
|
Any action taken intentionally or unintentionally by a user that violates established security classification guidelines
|
User Violation
|
|
Any individual or group of individuals found to be monitoring an IS without written authority from security officials
|
Unauthorized Monitoring
|
|
Are there exceptions to USSID SP00018 and SP0009?
|
Attorney General
|
|
Assurance of the identity of a message sender or receiver.
|
Authentication or non repudiation
|
|
Assurance of timely"" reliable access to data and information systems by authorized users.
|
Availability
|
|
Assurance that information is not disclosed to unauthorized persons" processes" or devices.
|
Confidentiality
|
|
Assurance that information is not modified by unauthorized parties or in an unauthorized manner
|
Integrity
|
|
At which level of war do actual engagements take place?
|
Tactical
|
|
Can a spot check be performed on a deferred maintenance check?
|
No
|
|
CFMA is supported by which N8 program?
|
Special projects
|
|
Define apogee.
|
The point in a satellite’s orbit that is furthest away from the earth.
|
|
Define Naval Command and Control.
|
Provides the basic concepts to fulfill the information needs of commanders" forces" and weapon systems.
|
|
Define perigee.
|
The point in a satellite’s orbit that is closest the earth.
|
|
Define Vulnerability assessment
|
Process of identifying" quantifying" and prioritizing (or ranking) the vulnerabilities in a system
|
|
Describe a Buffer Overflow attack
|
occurs when a program" while writing data to a buffer overruns the buffer's boundary and overwrites adjacent memory. This may result in erratic program behavior including memory access errors incorrect results program termination (a crash)" or a breach of system security. (command line access with admin priveledges)
|
|
Describe the IN process.
|
Created by the originator, Is reviewed, Sponsored by parent organization, Submitted to NSIAPS.(National SIGINT Intelligence Analysis Production Subcommitee), Levied upon UCS. (Unified Cryptologic System)
|
|
Discuss Maritime Domain Awareness (MDA).
|
The effective understanding of anything associated with the maritime domain that could impact the security", safety economy" or environment.
|
|
Draw the following topologies.
|
Bus, Star, Ring, Mesh (All nodes should connect to each other)
|
|
During which battle in WWII did the Japanese first use kamikaze attacks?
|
Battle of Leyte Gulf
|
|
Explain Air Search RADAR?
|
primary function is to maintain a 360 degree surveillance from the surface, to high altitudes and to detect and determine ranges and bearings of, aircraft targets over relatively large areas
|
|
Explain Fire Control RADAR?
|
Provides bearing" elevation " range AND velocity to a fire control system to calculate a firing solution. Uses a narrow intense beam.
|
|
Explain Surface Search RADAR?
|
Detects surface objects and low flying objects.
|
|
Explain the difference between vulnerability and threat.
|
A vulnerability is a weakness or flaw found in software and operating systems that threats try to exploit. Threats are malicious files or programs that attack an application's or operating system's vulnerability to gain access to your computer.
|
|
How are Mishap reports submitted and by whom?
|
Through ESAMS by the Dept or Div LCPO
|
|
How can a spot check be marked?
|
Accomplished or Not Accomplished
|
|
How do you dreate a Command account?
|
1 Complete the SAAR, 2 Complete Information Assurance courses
|
|
How do you recognize frostbite?
|
First and second degree frostbite are superficial and symptoms include burning" numbness, tingling itching cold sensations and should appear white and frozen.,, Third degree is deep frostbite with swelling blood filled blisters" over white or yellow skin that is, waxy and turns purplish blue if warmed. Also may appear blackened and dead.
|
|
How do you serialize a KL?
|
One up by platform
|
|
How do you validate an MRC?
|
Verify the last FR on Change Page to the FR number on the LOEP., Find MIP number on LOEP and compare it to the MIP., Find MRC on MIP and verify MRC syscom number with the syscom on the MRC.
|
|
How is a maintenance check marked deferred or moved?
|
Circled or circled with an arrow
|
|
How is a maintenance check marked for completion?
|
X
|
|
How many 13 Week Reports is each work center required to maintain?
|
14"" past 13 weeks and current week.
|
|
How many and what are the boards used to track preventative maintenance?
|
3, Cycle, Quarterly, Weekly
|
|
How many criticalities are there for an IN?
|
Three
|
|
How many sections does the EDVR have?
|
12
|
|
How many steps are in the ORM process and what are they?
|
5, Identify Hazards, Assess Hazard, Make risk decision, implement controls, supervising
|
|
How many types of CASREPs are there and what are they?
|
Initial, Update, Correct, Cancel,
|
|
How many types of FBRs are there and what are they?
|
3, Category A, Category B, Urgent
|
|
How many types of inactive equipment maintenace are there and what are they?,
|
2, - Status I – equipment inactive for 30 days or more" remaining on board, - Status II – equipment inactive for 30 days or more" sent off ship.,
|
|
How many validations are required for each work center per week?
|
Depends on the number of pieces of equipment owned by the work center and how many, are necessary to be completed each work in order validate all in five years.
|
|
How many versions are there of the AN/TSQ-265?
|
2, Version two is smaller and sets up faster
|
|
How much can be listed on an EGL?
|
8 man hours worth.
|
|
If both atlantic and pacific NCTAMS are experiencing an outage who takes over for them?
|
USS MT Whitney
|
|
In regards to Networking"" what does OSI stand for?
|
Open systems interconnect
|
|
In regrds to IN's"" what is a level of effort?
|
Statement of capability and answer to questions asked in an IN
|
|
In the space environment"" what has the biggest affect on communications?
|
The Sun
|
|
Is a cover story required at our Command?
|
Cover story not required. SAP is an acknowledged.
|
|
Is the Rate listed on an MRC the only one able to perform the MRC?
|
No
|
|
List three officer programs available for enlisted personnel.
|
LDO, STA-21, MECAPP
|
|
N8 is divided into what programs?
|
Ground, Sub-surface, Special Projects
|
|
Name 4 mishap reportable items.
|
- Class A" B or C government property damage mishaps, - Class A B or C on-duty DoD civilian mishaps and military on/off-duty mishaps., - Any other work-related illness or injury that involves medical treatment beyond first aid., - Other incidents of inter
|
|
Name a protocol at the Data Link Layer?
|
802.3 or 802.11
|
|
Name a protocol at the Network layer?
|
IP
|
|
Name a protocol at the Transport layer?
|
TCP or UDP
|
|
Name four categories of computer incidents and their purposes.
|
Virus’s, Worms, Trojan horses, Attacker tools, Malicious mobile code, Tracking cookies, Non malware threats
|
|
Name some sections of the EDVR.
|
Prospective gains, Prospective losses, Personnel on board for temporary duty"" in a deserter status, Total personnel on board in distribution community , Personnel status summary (numeric summary of authorized personnel)
|
|
Name the five Information Operations core capabilities.
|
1.	Psyops, 2.	OPSEC, 3.	MILDEC, 4.	Computer Network Operations (CNO), 5.	Electronic Warfare,
|
|
Name the two main space launch facilities in the U.S.
|
Cape Canaveral Air Force Station(CCAFS), Vandenburg Air Force Base
|
|
Name two Military Satellite Communication systems.
|
Navy UHF Follow-on, Defense Satellite Communications System , Global Broadcast Service (GBS), Wideband Global SATCOM system (WGS),
|
|
Nation’s eyes and ears in space. They design" build" and operate the nation’s signals and imagery reconnaissance satellites.
|
NRO – National Reconnaissance Office
|
|
Occurs whenever classified data is placed onto an unclassified IS or an IS with a lower security policy
|
Data Spill
|
|
Process of identifying" quantifying" and prioritizing (or ranking) the vulnerabilities in a system.
|
vulnerability assessment
|
|
Protect the government’s information systems and produce foreign signals intelligence information.
|
National Security Agencey
|
|
Responsible for merging law enforcement and intelligence information relating to terrorist threats within US borders.
|
DHS – Department of Homeland Security
|
|
Self-replicating"" malicious code that attaches itself to an application program or other executable system component and leaves no obvious signs of its presence
|
Virus
|
|
Software obtained through unofficial channels
|
Unauthorized Software
|
|
Software or firmware intended to perform an unauthorized process that will have adverse impact on the CIA of an IS
|
Malicious Code
|
|
State some advantages of space based ISR.
|
Enhances the joint force’s ability to observe areas of interest (AOIs) which Increases its situational awareness., , Access intelligence behind enemy lines"" no threat to human life.,
|
|
State the purpose of DD Form 1847-1.
|
Non disclosure agreement. Binding for life.
|
|
State the purpose of Title 10"" United States Code?
|
It provides the legal basis for the roles"" missions and organization of each of the services as well as the United States Department of Defense.,,
|
|
State the three levels of war:
|
Operational" strategic" and tactical
|
|
State two things the CDO is responsible for doing during his watch?
|
?
|
|
This IO core capability involves actions taken to attack the adversary with the intent of degrading", neutralizing" or destroying adversary combat capability to prevent or reduce an adversary’s, effective use of the electromagnetic spectrum.
|
Electronic Warfare
|
|
This is a stream of charged particles ejected from the upper atmosphere of the sun., It can also adversely affect satellites at altitudes to 600 miles"", to include polar orbiting satellites.
|
Solar Wind
|
|
This orbit is an elliptic orbit characterized by a relatively low-altitude perigee and, an extremely high-altitude apogee.,
|
Highly Elliptical Orbit (HEO)
|
|
This ship got underway in January 1968 with specific orders to intercept and conduct surveillance of Soviet naval activity, to gather signal and electronic intelligence from North Korea and was captured by North Korea.
|
USS Pueblo
|
|
This system is a U.S. space-based global navigation satellite system. It provides reliable positioning" navigation" and timing services to worldwide users.
|
The Global Positioning System (GPS)
|
|
This team provides war fighters who support naval ASW exercises and operations, with oceanographic expertise and access to products and services of the, Naval Oceanographic Office.
|
Naval Oceanography ASW Team (NOAT)
|
|
This was a group of enlisted radio operators were specially trained at a unique school located on the roof of the, old Navy Department Building during 1928-1941. They were trained to intercept and analyze foreign radio communications., What were they called?
|
On-The-Roof-Gang
|
|
Through which office are inquiries to confirm program access visits to program facilities coordinated in advance?
|
Program Security Office (PSO)
|
|
Unauthorized access/disclosure of information, Weak security policy of a system, Improper sanitization of systems or components, Intentional or unintentional actions of an individual,
|
Compromise
|
|
We have an On-The-Roof-Gang Award reciepient at NIOC-S"" who is it?
|
CTRCM Bass
|
|
What are 3 methods of controlling bleeding?
|
Direct Pressure, Pressure Point, Tourniquet,
|
|
What are Category B FBRs used for?
|
Category B FBRs are technical requests"" for instance changes to MRC steps.
|
|
What are HERO"" HERP and HERF?
|
Hazard of Electromagnetic Radiation to Ordnance, Hazard of Electromagnetic Radiation to Personnel, Hazard of Electromagnetic Radiation to Fuel,
|
|
What are MAMs?
|
Maintenance Assistance Modules provide assistance to troubleshooting.
|
|
What are six areas that comprise Naval Doctrine?
|
1. Naval Warfare, 2. Naval Intelligence:, 3. Naval Operations, 4. Naval Logistics, 5. Naval Planning, 6. Naval Command and Control,
|
|
What are the 3 objectives of first aid.
|
Save life, Prevent further injury, Prevent infection,
|
|
what are the 3 pillars of SIGINT?
|
COMINT, FISINT, ELINT
|
|
What are the 5 RACs?
|
1 – Critical, 2 – Serious, 3 – Moderate, 4 – Minor, 5 - Negligible,
|
|
What are the categories of mishap probability?
|
A – likely to occur immediately, B – probably will occur in time, C – may occur in time, D – unlikely to occur,
|
|
What are the classified networks that N6 maintains?
|
SAP TS//SCI, TS//SCI, NSA NSA//SCI, SIPER-secret, unclass-NMCI
|
|
What are the exceptions to anyone performing maintenance?
|
NEC"" DSPO and DCPO
|
|
What are the five core capabilities of Information Operations (IO)?
|
Electronic warfare (EW), psychological operations (PSYOP), operations security (OPSEC), military deception (MILDEC), Computer Network Operations (CNO)
|
|
What are the four categories of hazard severity and what do they entail?
|
I - Catastrophic – death" >$500000 equipment or facility damage., II - Critical – disfiguring injury or lost time greater than three months$50 000 - $500000 equipment or facility damage., III - Marginal – Lost time greater than one day$10 000 -$50000 equipment or facility damage., IV - Safe – No lost time injuries equipment or facility damage <$10"000.,
|
|
What are the four N3 mission areas?
|
Technical Research Target Development (TRTD), Global Signals Analysis Laboratory (G-SAL), Signal Descriptor File Configuration Management Authority (SCMA), MCS-21 Planning Optimization and Tasking Services (MPOTS)
|
|
What are the layers of the atmosphere?
|
Ionosphere, Stratosphere, Troposphere,
|
|
What are the layers of the Ionosphere?
|
D layer reflects vlf waves; is important for long range vlf communications, E layer refracts hf waves during the day up to 20 megahertz, F1 layer absorb hf waves passing through to the F2 layer, F2 layer is the most important layer for long distance hf communications,
|
|
What are the procedures for performing High to low transfers?
|
1 Call helpdesk, 2 Send file to N6 via intranet, 3 Complete the checklist, 4 Bring completed check list and they move it
|
|
What are the reasons to submit a SAER?
|
Financial issues, Security violations, foreign contacts
|
|
What are the seven layers of the OSI model?
|
Applicatio, Presentation, Session, Transport, Network, Data Link, Physical
|
|
What are the seven principles of Naval Logistics?
|
1.	Responsiveness, 2.	Simplicity, 3.	Flexibility, 4.	Economy, 5.	Attainability, 6.	Sustainability, 7.	Survivability,
|
|
What are the six phases of time sensitive targeting?
|
Find, Fix, Track, TargetEngage, Assess
|
|
What are the symptoms of shock?
|
Profuse sweating, Moist" clammy skin, Unconsciousness, Rapid shallow breathing", Agitation or confusion, Blue lips and fingernails,
|
|
What are the three types of IN?
|
Research, Limited duration, Standing
|
|
What are the two parts of 3M and what program is used for each?
|
Preventative Maintenance – SKED, Corrective Maintenance – OMMS-NG/MICRO-SNAP,
|
|
What are the types of IN's?
|
Research, Limited duration, Standing
|
|
What are the Van Allen Radiation Belts?
|
Two concentric" donut-shaped regions of stable" trapped charged particles that exist, because the geomagnetic field near the Earth is strong and field lines are closed., They can adversely affect satellite communications.
|
|
What are Urgent FBRs used for?
|
Urgent FBRs are changes that involve safety.
|
|
What checks can be spot checked?
|
Any accomplished in the past 13 weeks or scheduled for the current week.
|
|
What classification could cause serious damage to National security if compromised?
|
Secret
|
|
What classification is associated with the color blue?
|
Confidential
|
|
What classification is associated with the color green?
|
Unclass
|
|
What classification is associated with the color orange?
|
Top Secret
|
|
What classification is associated with the color red?
|
Secret
|
|
What Dept at Suitland deals with nRFIs?
|
N2
|
|
What do APL and AEL stand for and what is the difference?
|
Allowance Part List, Allowance Equipment List, AEL is the identifying code for whole systems"" APL’s are identifying codes for parts within systems.,
|
|
What do the following mean IRT DLR; Turn-in and RIP?
|
Turn-in requires a turn in to get the part. RIP" Remain in place" requires the part to be given, before the broken can be turned in.
|
|
What does 3M stand for?
|
Maintenance and Materials Management
|
|
What does a red badge issued at quarter deck mean?
|
Uncleared
|
|
What does CFMA stand for?
|
Combined Function Mast Antenna.
|
|
What does CUDIXS stand for and what is its purpose?
|
Common User Digital Information eXchange System. It is what ships use to, communicate with NCTAMS to send and receive message traffic.
|
|
What does DLR stand for?
|
Depot Level Repair
|
|
What does ISCRS provide?
|
A configurable and upgradeable hardware platform of commercial of the shelf (COTS) equipment.
|
|
What does MOV stand for and what is its purpose?
|
Material Obligation Verification. Provides a validation of supply need and reconciles supply requisition, documents with records of requisitioning activities.
|
|
What does N51 work on?
|
Wireless
|
|
What does N52 do?
|
Testing
|
|
What does N53 do?
|
Developing
|
|
What does N54 do?
|
Performs analysis and development of telecommunication and network systems.
|
|
What does N55 do?
|
Performs analysis and development of telecommunication and network systems
|
|
What does N56 do?
|
Counter IED. Improvised explosive devise.
|
|
What does N57 do?
|
Provides CNO tool support for another organization.
|
|
What does N61 do?
|
Help desk
|
|
What does N62 do?
|
Maintain networks
|
|
What does N63 do?
|
Network Security. Updates and patches.
|
|
What does N64 do?
|
Knowledge and Database management. Runs sharknet.
|
|
What does NSN stand for?
|
National Stock Number
|
|
What does SAER stand for?
|
Security Access Elegibility Report
|
|
What does SCMA stand for?
|
Signal Descriptor File Configuration Management Authority.
|
|
What does SDF stand for?
|
Signal Descriptor File, (they are put into MCS-21.)
|
|
What does the acronym RADAR mean?
|
Radio Detection And Ranging
|
|
What does the green badge issued at Quarter deck mean?
|
Cleared
|
|
What does the National Security Council do?
|
President's principal forum for considering national security and foreign policy matters with his senior national security advisors and cabinet officials
|
|
What does the presenation layer do?
|
Encrpyt
|
|
What does the session layer do?
|
Establishes connections between applications
|
|
What does the ¢ used for in PMS?
|
Accomplished by the higher authority.
|
|
What form is completed to account for the completion of maintenance and who is required to sign it?
|
13 Week Report. Maintenance member for each check completed"" Work center supervisor and Division Officer.
|
|
What instruction covers critic?
|
CR-1501
|
|
What instruction governs EVALS/FITREPS?
|
BUPERINST 1610.10B, Navy Performance Evaluation and Counseling System
|
|
What instruction governs Recreational and Off Duty Safety?
|
OPNAVINST 5100.25B
|
|
What instruction governs safety ashore?
|
OPNAVINST 5100.8G
|
|
What instruction governs the submission of mishap reports?
|
OPNAVINST 5102D
|
|
What is a Backdoor?
|
A backdoor in a computer system is a method of bypassing normal authentication" securing remote access to a computer obtaining access to plaintext and so on" while attempting to remain undetected.
|
|
What is a EA-18 Growler?
|
EA-18G Growler is a carrier-based electronic warfare aircraft"" radar warning and jamming.
|
|
What is a EC-130H Compass Call?
|
Compass Call system employs offensive counter information and electronic attack capabilities. Conducts PSYOP and Jamming.
|
|
What is a firewall?
|
part of a computer system or network that is designed to block unauthorized access while, permitting authorized communications. It is a device or set of devices which is configured, to permit or deny computer applications based upon a set of rules and other criteria.
|
|
What is a hoax virus?
|
a message warning the recipient of a non-existent computer virus threat.,,
|
|
What is a hub?
|
hub is a multiport device for connecting multiple devices together and, making them act as a single network segment. ,
|
|
What is a KL?
|
Kleightlite report"" anything SIGINT related
|
|
What is a macro virus?
|
make up the majority of mobile code attacks by using a macro language to manipulate itself and other files. They target Microsoft applications such as Work and Excel.
|
|
What is a natural horizon?
|
The line-of-sight horizon.
|
|
What is a No Strike List (NSL)?
|
A list of geographic areas" complexes" or installations not planned for capture or destruction.
|
|
What is a P-3c Orion?
|
Anti-submarine and maritime surveillance aircraft.
|
|
What is a PDDG?
|
Something Diagraph
|
|
WHat is a PLA?
|
Plain Language address
|
|
What is a PLA?
|
Plain Language address?
|
|
What is a radio horizon?
|
A form of radiant energy that surpasses natural horizon and waves are no longer propagated . (huh?)
|
|
What is a RC-135?
|
Modified C-135 with on-board sensors which enable the crew to detect"" identify and geolocate signals throughout the electromagnetic spectrum
|
|
What is a repeater?
|
electronic device that receives a signal and retransmits it at a higher level and/or higher power
|
|
What is a Restricted Target List?
|
A list of restricted targets nominated by elements of the joint force and approved by the joint force commander.
|
|
What is a router?
|
A router is an electronic device that interconnects two or more computer networks"", and selectively interchanges packets of data between them.
|
|
What is a STRUM?
|
Standard Technical report using modules. 24 hour collect from platform. Released at 0300.
|
|
What is a web based (JWICS) software to improve utilization of the MCS-21 family of systems?
|
MPOTS, MCS-21 Planning Optimization and Tasking Services
|
|
What is an AN/TSQ-265?
|
It is a DF system for HF spectrum.
|
|
What is an EGL?
|
Equipment Guide List is a list of similar equipment that a maintenance check is required on.
|
|
What is an example of a protocol at the application layer?
|
HTTP port 80
|
|
What is an IPv4 address?
|
32 bit address consisting of 4 sections of 8 bits called an octet. Seperated by a period., Example: 60.20.45.12,
|
|
What is an IPv6 address?
|
128 bit address consisting of 8 sections of 16 bits seperated by colons. Uses hexidecimal., Example: 2001:0dbb:ac10:fe01::::: (:: denotes the number zero),
|
|
What is an MSDS and what does it do?
|
Material Safety Data Sheets are used for hazardous materials to list all safety precautions for the, each specific hazardous material.
|
|
What is an SF 702?
|
Security container check sheet.,, Logs open and close
|
|
What is an SF86?
|
Questionaire for National security positions. Form for back ground investigations.
|
|
What is Antisubmarine Warfare?
|
Operations conducted to destroy or neutralize enemy submarine forces.
|
|
What is attenuation?
|
reduction in the strength of a signal generated by a transmitter.
|
|
What is battle damage assessment?
|
The timely and accurate estimate of damage resulting from the application of military force" either lethal or nonlethal" against a predetermined objective
|
|
What is BEADWINDOW and how many are in the navy?
|
Beadwindow is the code word used when someone passes sensitive information over an unsecure, network. 69. 7 are used by everyone in the Navy.
|
|
What is C4ISR?
|
Command" Control Communications Computers Intelligence Surveillance Reconnaissance. , Provides capabilities that enable forces to generate use" and share the information, necessary to survive and succeed on every mission.
|
|
What is Category A FBR?
|
Category A FBRs are used for administrative requests. For instance if missing documentation, needs to be replaced"" like classified MRCs.
|
|
What is CNA?
|
Actions taken through the use of computer networks to disrupt"deny degrade or destroy information resident in computers and computer networks" or the computers and networks themselves.
|
|
What is CND?
|
Actions taken through the use of computer networks to protect" monitor analyze" detect and respond to unauthorized activity within Department of Defense information systems and computer networks.
|
|
What is computer security?
|
Maintaining the confidentiality"" integrity and availability.
|
|
What is diffraction?
|
#NAME?
|
|
What is ducting?
|
occurs when a channel of cool air that forms between the warm air can help radio waves travel further and clearer
|
|
What is duplex?
|
Full Duplex- is a system composed of two connected parties or devices that can communicate with one another in both directions simultaneously
|
|
What is E layer for?
|
refracts hf waves during the day up to 20 megahertz
|
|
What is F2 layer for?
|
the most important layer for long distance hf communications
|
|
What is frequency?
|
The number of cycles that occur in one second. Usually expressed in hertz.
|
|
What is GCCS-M?
|
Global Crypto logic Communication System"" Maritime
|
|
What is half duplex?
|
Half Duplex- system provides for communication in both directions"" but only one direction at a time,
|
|
What is heat exhaustion"" how to do you recognize and treat it?
|
Heat Exhaustion is the body’s response to excessive loss of water through sweating., Symptoms include heavy sweating" extreme fatigue dizziness confusion nausea clammy, moist skin pale or flushed complexion muscle cramps or fast and shallow breathing. , Should be treated by drinking water moving to shade" or taking a cool bath.
|
|
What is heat stroke"" how to do you recognize and treat it?
|
- Heat Stroke is when the body is unable to control its temperature" can’t sweat and cool down., Symptoms include hot dry skin hallucinations chills throbbing headaches high body temperature, confusion dizziness and slurred speech. Should be treated by
|
|
What is hypothermiat?
|
Hypothermia is when your body temperature drops so low your heart"", nervous system and other organs can’t function.
|
|
What is IEM?
|
Inactive Equipment Maintenance.
|
|
What is Information Warfare?
|
Actions taken to affect adversary information and information systems while defending, one’s own information and information systems.
|
|
What is INTELINK?
|
Higher classification thatn typically found on NSA net
|
|
What is Machine Code?
|
system of instructions and data executed directly by a computer's central processing unit. Machine code may be regarded as a primitive (and cumbersome) programming language.
|
|
What is MILDEC?
|
Actions executed to deliberately mislead adversary military decision makers about military capabilities" intentions and operations" thereby causing the adversary to take specific actions or inactions.
|
|
What is multiplexing?
|
sending multiple signals or streams of information on a carrier at the same time in the form of a single"" complex signal
|
|
What is N8 Department?
|
Programs and Acquisitions Department
|
|
What is OneNet?
|
ONENET- ONE-NET is a Navy-wide initiative to install a common and secure IT infrastructure, to OCONUS Navy locations. It is based on the Navy Marine Corps Intranet.
|
|
What is OPELINT?
|
Operational ELINT determines the locations and readiness of target emitters., (disposition" location movement employment tactics" and activity levels of known foreign noncommunications),
|
|
What is OPSEC?
|
Controling unclas information to deny adversaries intentions
|
|
What is ORM?
|
Operational Risk Management
|
|
What is popular nickname for Admiral Grace Hopper?
|
Amazing Grace
|
|
What is primary reason for a service member to have a Family Care Plan?
|
To be sure a members dependants will be taken care of in the event of a deployment
|
|
What is propagation?
|
any of the ways in which a wave travels through a medium
|
|
What is PSYOPS?
|
Psychological operations are planned operations to convey selected information and indicators to foreign audiences to influence their emotions" motives objective reasoning and ultimately the behavior of foreign governments organizations groups" and individuals., The purpose of United States psychological operations (PSYOP) is to induce or reinforce behavior favorable to U.S. objectives,
|
|
What is RAC?
|
RACs of 1-5 are assigned by matching the hazard severity to the mishap probability.
|
|
What is refraction?
|
The changing of direction as a wave leaves one medium and enters another medium of a different density.
|
|
What is relationship between the atlantic and pacific NCTAMS?
|
They cover for each other in the event of an outage.
|
|
What is simplex?
|
Simplex- refers to communication that occurs in one direction only
|
|
What is situation maintenance and what is it’s periodicity code?
|
Maintenance performed which a certain situation occurs like underway" prior to flight deck operations" etc. R
|
|
What is stratoshere known for?
|
UV Rays are propagated
|
|
What is TECHELINT?
|
determines the capabilities and limitations of target emitters., (signal characteristics" modes functions associations capabilities limitations vulnerabilities" and technology levels )
|
|
What is the Battle of Midway and what impact did intelligence have on the outcome of the battle?
|
June 1942: The turning point of the World War II in the Pacific. The battle was won by the U.S. because of CT types on Midway Island that broke the Japanese code., This enabled Admiral Nimitz to place his forces in such a way that would give him the tactical advantage and defend the island"", keeping the Japanese from gaining control of the Pacific and putting them in striking distance of the United States
|
|
What is the close out date for CPO evals?
|
Sept 16th
|
|
What is the CR series USSID used for?
|
Customer Relations
|
|
What is the D layer known for?
|
reflects vlf waves; is important for long range vlf communications
|
|
What is the Defense Meteorological Satellite program?
|
monitors meteorological" oceanographic" and solar-terrestrial physics for the United States Department of Defense., The program is now run by the National Oceanic and Atmospheric Administration. They provide cloud cover imagery, from polar orbits that are sun-synchronous at nominal altitude of 450 nautical miles.
|
|
What is the diff between a TACREP and KL?
|
KL contains COMINT and TACREP does not. AKA tear line
|
|
What is the difference between an open and closed fracture?
|
In open fracture the bone protrudes from the skin.
|
|
What is the difference between information and intelligence?
|
Information is gathered and Intelligence is reported as a product.
|
|
What is the difference between OPCON and ADCON?
|
OPCON is who you answer to for operational matters. ADCON is who you answer to for administrative issues.
|
|
What is the difference between the 2000 and 5000 series?
|
2000 is for Maritime, 5000 is for NSA/Joint" NSA/SCE-Combined" NSA collaberating
|
|
What is the Doppler Effect?
|
The apparent change in frequency or pitch whensound source moves either toward or away from a listener.
|
|
What is the doppler effect?
|
Change in frequencey due to relativity of a fixed point and moving object.
|
|
What is the F1 layer for?
|
absorb hf waves passing through to the F2 layer
|
|
What is the First step in OPSEC?
|
Identify critical information
|
|
What is the horse forthe freq ranges?
|
Extremely ELF, Sensitive SLF, Unusually ULF, Very VLF, Little LF, Men MF, Have HF, Very VHF, Unusual UHF, Sexual SHF, Experiences EHF,
|
|
What is the IEEE 802.11 standard?
|
A set of standards carrying out Wireless Local Area Network (WLAN) computer communications in the 2.4"" 3.6 and 5 GHZ frequencey bands.
|
|
What is the instruction number for the Family Care Plan (FCP)?
|
OPNAVINST 1740.4C
|
|
What is the instruction number that is referred to as the correspondance manual
|
SECNAV 5216.5
|
|
What is the MCS-21 system used on a submarine?
|
ISCRS, Integrated Submarine Communications Receiving System
|
|
What is the MCS-21 system used on surface ships?
|
SSEE Inc E, Ships Signals Exploitation Equipment
|
|
What is the minimum DLPT score for CTIs?
|
L2/R2
|
|
What is the mission of N1?
|
N1 is responsible for all admin requirments including travel" security" correspondance and military/civilian personnel matters.
|
|
What is the mission of N33 and N34?
|
Work together to meet fleet and national intelligence requirements for MCS-21 systems. They make the SCMA for MCS-21 systems Navy wide.
|
|
What is the mission of N5?
|
Advanced concepts and demonstartions. Department is responsible for long term CNO.
|
|
What is the mission of N6?
|
Provide AIS support to NIOC Suitland.
|
|
What is the mission of NCDOC?
|
Navy Cyber Defense Operations Command (NCDOC) mission is to coordinate, monitor and oversee the defense of Navy computer networks and systems and, to be responsible for accomplishing computer network defense missions
|
|
What is the mission of NCDOC?
|
Responsible for around-the-clock protection of the Navy’s computer networks
|
|
What is the mission of NCTAMS?
|
Naval Computer and Telecommunications Area Master Station, The mission of NCTAMS is to provide classified and unclassified voice" messaging data and video to ships submarines" aircraft and ground forces operating worldwide in support of Naval and joint missions.,
|
|
What is the mission of NORTHCOM and where are they located?
|
Located at Paterson AFB in Colorado. Mission is to provide command and control of Department of Defense (DOD) homeland defense efforts and to coordinate defense support of civil authorities.
|
|
What is the mission on N64?
|
Knowledge and Database management. Run sharknet
|
|
What is the oldest intelligence organization in the U.S. Navy?
|
ONI
|
|
What is the only ship with the article “the” in the name?
|
USS The Sullivans
|
|
What is the OPNAV 4790/2K
|
Maintenance action request
|
|
What is the OPNAV/CK?
|
Configuration Changed request
|
|
What is the periodicity code for a PMS check that should be performed Daily?
|
D
|
|
What is the periodicity code for a PMS check that should be performed Every 24 months?
|
24M
|
|
What is the periodicity code for a PMS check that should be performed Semiannually?
|
S
|
|
What is the periodicity code for a PMS check that should be performed Twice a month?
|
2M
|
|
What is the primary purpose of the Mine UUV Platoon?
|
Develop all the tactics and technique relating to the operation of unmanned underwater vehicles (UUV) in mine warfare
|
|
What is the purpose of a Cryptologic Cary-On Program?
|
Provide state of the art carry-on cryptologic exploitation capabilities t, USN/USCG surface"" subsurface and air platforms
|
|
What is the purpose of a Maritime Operations Center?
|
Develop" activate" man and equip to support Maritime Headquarters requirements.
|
|
What is the purpose of a mobile detachment?
|
Provide expeditionary support to Navy operations world-wide.
|
|
What is the purpose of an OPTASK Comms?
|
Used to direct communications for an operation" deployment or exercise. Each Fleet has there own., Information provided will be frequencies" comm. circuits and controlling authority for each circuit.
|
|
What is the purpose of Direct Support Assets?
|
Provide deployable cryptologic support to Navy assets
|
|
What is the purpose of DRMS?
|
Defense Reutilization and Marketing Service in charge of the disposal or reutilization of, abandoned personnel property.
|
|
What is the purpose of DTS?
|
Defense travel System:, Personalized online reservations and itinerary changes for airline" lodging and rental cars, Detailed pre-travel entitlement computations, Electronic routing and approvals, Merges authorizations arrangements" payment and reconciliation of travel, Supports charge card split disbursement
|
|
What is the purpose of ORM?
|
Prevent mishaps through risk management.
|
|
What is the purpose of SP00018?
|
Implements minimization requirements in regards ti information collected" processed" retained or disseminated on US persons by US SIGINT systems.
|
|
What is the purpose of SP0009?
|
Used to collect when ships pull into foreign ports.
|
|
What is the purpose of the CO Writer?
|
Provide good customer service., Manage/Executive staff and Command calendar., Coordinate executive staff travel, Edit/route correspondance
|
|
What is the purpose of the OPNAV 4790/2L?
|
Supplemental information form is used to provide supplemental information such as a diagram of something needed to be created or repaired.
|
|
What is the purpose of USC Title 10?
|
Outlines the role of U.S. Armed Forces. It provides legal basis for the roles and organization of, each of the services as well as the U.S. Department of Defense.
|
|
What is the purpose of USSID SP00018 Annex A?
|
Procedures for inadvertent collect on US persons.
|
|
What is the purposer of intell oversite?
|
Ensure all DoD intelll agenciea activities are conducted in accordance with all regulations
|
|
What is the role of the Command mentorship coordinator?
|
Resposible to the CO/XO for establishing and maintaining effective program, Oversee Dept mentor coordinators, Maintain records, Faciliitate training. Indoc and annual refresher
|
|
What is the SE series USSID for?
|
SIGINT enterprise.
|
|
What is the Single Line Item Requisition form?
|
DD Form 1348-6
|
|
What is the SP series USSID used for?
|
SIGINT fundamental Policy
|
|
What is the time a Flash Z goes out?
|
10 minutes
|
|
What is the time a Priority P goes out?
|
3 Hours
|
|
What is the time a Routine -R- goes out?
|
12 hours
|
|
What is the time an Immediate O goes out?
|
30 minutes
|
|
What is the timeline for submitting a voucher for a TAD claim?
|
5 days
|
|
What is the treatment for shock?
|
Lay the person flat on their back" raise their legs" keep them warm
|
|
What is the U.S. Navy’s birthday?
|
October 13"" 1775
|
|
What is Troposhere known for?
|
Weather
|
|
What is Vintage harvest?
|
Signal analysis website on high side
|
|
What maintenance is required during IEM"" give examples of the periodicity codes for each?
|
- Lay-up maintenance – before going into IEM" LU, - Start-up maintenance – after coming out of IEM SU, - Preventative maintenance – performed while in IEM PM, - Operational Test – performed after coming out of IEM" OT,
|
|
What month are E3 and below evaluations due?
|
July 15th
|
|
What month are E4 evaluations due?
|
June 15th
|
|
What month are E5 evaluations due?
|
, March 15th
|
|
What orbit travels approximately 1""243 miles from the earth?
|
Low Earth Orbit (LOE)
|
|
What should be done for fractures? Is there a difference between open and closed?
|
Immobilize limb with fracture with a brace. No differences between open and closed., Do NOT attempt to reinsert protruding bone.
|
|
What should you as the maintenance person do when there is a problem with an MRC?
|
Report it to the WCS who will put in a FBR.
|
|
What steps should be taken for electrical shock?
|
Secure power, Perform CPR if necessary,
|
|
What system does N33 and N34 use for SDF development?
|
Shockwave
|
|
What system is supported by N8 ground?
|
AN/TSQ-265
|
|
What system is supported by N8 sub-surface?
|
ISCRS/Troll, (Integrated Submarine Comminications Receiving System)
|
|
What takes precedence over Critic?
|
Flash over ride
|
|
What two organizations were combined to support establishment of Fleet Cyber Command?
|
On October 1"2009" The Naval Intelligence (N2) and Communications (N6) directorates merged
|
|
What type of data units are found at the Data Link Layer layer?
|
Frames
|
|
What type of data units are found at the Network layer?
|
Packets
|
|
What type of data units are found at the Physical layer?
|
Bits
|
|
What type of data units are found at the Transport layer?
|
Segmnet
|
|
What type of network device is found at the Data link Layer?
|
Swith or Bridge
|
|
What type of network device is found at the Network layer?
|
Router
|
|
What vis a SIGAD?
|
SIGINT Address
|
|
What was established by the National Security Act of 1947
|
National Security Council (NSC)
|
|
What was the codename for the Landings at Inchon in N. Korea?
|
Operation Chromite
|
|
What was the codename for the Naval aspect of the Battle of Normandy?
|
Operation Neptune
|
|
What was the first ship named after an enlisted man and why?
|
Osmond Ingram (DD 255) – The first enlisted man killed in action during World War I ., He received the Medal of Honor for his actions that day in trying to save his ship and his shipmates.
|
|
What was the Japanese name for kamikaze attacks?
|
The Divine Wind
|
|
What was the largest amphibious invasion in history?
|
D-day landings at Normandy
|
|
What was the name of the space flight that landed the first humans on Earth's Moon on July 20"" 1969 and, which former Naval aviator participated in the mission?
|
Apollo 11 with Neil Armstrong
|
|
When is an SSBI updated?
|
5 years from the previous close out date
|
|
When were the core values changed to Honor" Courage" and Commitment and by whom?
|
1992"" Admiral Kelso
|
|
Where are the Command files centrally located?
|
In N1 front office
|
|
Which board is used to assign maintenance to personnel?
|
Weekly
|
|
Who are the members of the National Security Council?
|
chaired by the President, Vice President, Secretary of State, Secretary of the Treasury, Secretary of Defense, Assistant to the President for National Security Affairs
|
|
Who assigns preventative maintenance?
|
Work Center Supervisor
|
|
Who is credited with popularizing the term “debugging” for fixing computer glitches?
|
Admiral Grace Hopper
|
|
Who is responsible for the 3M program in a command?
|
CO
|
|
Who is the Government Program Manager (GPM) of our SAP with responsibility for executing all aspects of the compartmented effort?
|
NIOC S Commanding Officer
|
|
Who is the reporting senior for E5s?
|
XO
|
|
Who monitors TS material at NIOC S?,
|
TSCO Keith Cochran
|
|
Who performs spot checks?
|
CO" XO 3MC Department Head" Division Officer and LCPO.
|
|
Why was N2 and N6 combined?
|
The newly aligned N2/N6 will be responsible for Maritime Domain Awareness (MDA)" a central point of command for the synchronization of development of MDA hardware networks" and international cooperation.[2]
|