• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/332

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

332 Cards in this Set

  • Front
  • Back
Activity where a hacker is operating from an outside location by using some network and he/she is not physically resident at the location where the activity is being observed
External Hacker Activity
Activity where a hacker is operating from within the site where the activity is being observed
Internal Hacker Activity
Any action taken intentionally or unintentionally by a user that violates established security classification guidelines
User Violation
Any individual or group of individuals found to be monitoring an IS without written authority from security officials
Unauthorized Monitoring
Are there exceptions to USSID SP00018 and SP0009?
Attorney General
Assurance of the identity of a message sender or receiver.
Authentication or non repudiation
Assurance of timely"" reliable access to data and information systems by authorized users.
Availability
Assurance that information is not disclosed to unauthorized persons" processes" or devices.
Confidentiality
Assurance that information is not modified by unauthorized parties or in an unauthorized manner
Integrity
At which level of war do actual engagements take place?
Tactical
Can a spot check be performed on a deferred maintenance check?
No
CFMA is supported by which N8 program?
Special projects
Define apogee.
The point in a satellite’s orbit that is furthest away from the earth.
Define Naval Command and Control.
Provides the basic concepts to fulfill the information needs of commanders" forces" and weapon systems.
Define perigee.
The point in a satellite’s orbit that is closest the earth.
Define Vulnerability assessment
Process of identifying" quantifying" and prioritizing (or ranking) the vulnerabilities in a system
Describe a Buffer Overflow attack
occurs when a program" while writing data to a buffer overruns the buffer's boundary and overwrites adjacent memory. This may result in erratic program behavior including memory access errors incorrect results program termination (a crash)" or a breach of system security. (command line access with admin priveledges)
Describe the IN process.
Created by the originator, Is reviewed, Sponsored by parent organization, Submitted to NSIAPS.(National SIGINT Intelligence Analysis Production Subcommitee), Levied upon UCS. (Unified Cryptologic System)
Discuss Maritime Domain Awareness (MDA).
The effective understanding of anything associated with the maritime domain that could impact the security", safety economy" or environment.
Draw the following topologies.
Bus, Star, Ring, Mesh (All nodes should connect to each other)
During which battle in WWII did the Japanese first use kamikaze attacks?
Battle of Leyte Gulf
Explain Air Search RADAR?
primary function is to maintain a 360 degree surveillance from the surface, to high altitudes and to detect and determine ranges and bearings of, aircraft targets over relatively large areas
Explain Fire Control RADAR?
Provides bearing" elevation " range AND velocity to a fire control system to calculate a firing solution. Uses a narrow intense beam.
Explain Surface Search RADAR?
Detects surface objects and low flying objects.
Explain the difference between vulnerability and threat.
A vulnerability is a weakness or flaw found in software and operating systems that threats try to exploit. Threats are malicious files or programs that attack an application's or operating system's vulnerability to gain access to your computer.
How are Mishap reports submitted and by whom?
Through ESAMS by the Dept or Div LCPO
How can a spot check be marked?
Accomplished or Not Accomplished
How do you dreate a Command account?
1 Complete the SAAR, 2 Complete Information Assurance courses
How do you recognize frostbite?
First and second degree frostbite are superficial and symptoms include burning" numbness, tingling itching cold sensations and should appear white and frozen.,, Third degree is deep frostbite with swelling blood filled blisters" over white or yellow skin that is, waxy and turns purplish blue if warmed. Also may appear blackened and dead.
How do you serialize a KL?
One up by platform
How do you validate an MRC?
Verify the last FR on Change Page to the FR number on the LOEP., Find MIP number on LOEP and compare it to the MIP., Find MRC on MIP and verify MRC syscom number with the syscom on the MRC.
How is a maintenance check marked deferred or moved?
Circled or circled with an arrow
How is a maintenance check marked for completion?
X
How many 13 Week Reports is each work center required to maintain?
14"" past 13 weeks and current week.
How many and what are the boards used to track preventative maintenance?
3, Cycle, Quarterly, Weekly
How many criticalities are there for an IN?
Three
How many sections does the EDVR have?
12
How many steps are in the ORM process and what are they?
5, Identify Hazards, Assess Hazard, Make risk decision, implement controls, supervising
How many types of CASREPs are there and what are they?
Initial, Update, Correct, Cancel,
How many types of FBRs are there and what are they?
3, Category A, Category B, Urgent
How many types of inactive equipment maintenace are there and what are they?,
2, - Status I – equipment inactive for 30 days or more" remaining on board, - Status II – equipment inactive for 30 days or more" sent off ship.,
How many validations are required for each work center per week?
Depends on the number of pieces of equipment owned by the work center and how many, are necessary to be completed each work in order validate all in five years.
How many versions are there of the AN/TSQ-265?
2, Version two is smaller and sets up faster
How much can be listed on an EGL?
8 man hours worth.
If both atlantic and pacific NCTAMS are experiencing an outage who takes over for them?
USS MT Whitney
In regards to Networking"" what does OSI stand for?
Open systems interconnect
In regrds to IN's"" what is a level of effort?
Statement of capability and answer to questions asked in an IN
In the space environment"" what has the biggest affect on communications?
The Sun
Is a cover story required at our Command?
Cover story not required. SAP is an acknowledged.
Is the Rate listed on an MRC the only one able to perform the MRC?
No
List three officer programs available for enlisted personnel.
LDO, STA-21, MECAPP
N8 is divided into what programs?
Ground, Sub-surface, Special Projects
Name 4 mishap reportable items.
- Class A" B or C government property damage mishaps, - Class A B or C on-duty DoD civilian mishaps and military on/off-duty mishaps., - Any other work-related illness or injury that involves medical treatment beyond first aid., - Other incidents of inter
Name a protocol at the Data Link Layer?
802.3 or 802.11
Name a protocol at the Network layer?
IP
Name a protocol at the Transport layer?
TCP or UDP
Name four categories of computer incidents and their purposes.
Virus’s, Worms, Trojan horses, Attacker tools, Malicious mobile code, Tracking cookies, Non malware threats
Name some sections of the EDVR.
Prospective gains, Prospective losses, Personnel on board for temporary duty"" in a deserter status, Total personnel on board in distribution community , Personnel status summary (numeric summary of authorized personnel)
Name the five Information Operations core capabilities.
1.	Psyops, 2.	OPSEC, 3.	MILDEC, 4.	Computer Network Operations (CNO), 5.	Electronic Warfare,
Name the two main space launch facilities in the U.S.
Cape Canaveral Air Force Station(CCAFS), Vandenburg Air Force Base
Name two Military Satellite Communication systems.
Navy UHF Follow-on, Defense Satellite Communications System , Global Broadcast Service (GBS), Wideband Global SATCOM system (WGS),
Nation’s eyes and ears in space. They design" build" and operate the nation’s signals and imagery reconnaissance satellites.
NRO – National Reconnaissance Office
Occurs whenever classified data is placed onto an unclassified IS or an IS with a lower security policy
Data Spill
Process of identifying" quantifying" and prioritizing (or ranking) the vulnerabilities in a system.
vulnerability assessment
Protect the government’s information systems and produce foreign signals intelligence information.
National Security Agencey
Responsible for merging law enforcement and intelligence information relating to terrorist threats within US borders.
DHS – Department of Homeland Security
Self-replicating"" malicious code that attaches itself to an application program or other executable system component and leaves no obvious signs of its presence
Virus
Software obtained through unofficial channels
Unauthorized Software
Software or firmware intended to perform an unauthorized process that will have adverse impact on the CIA of an IS
Malicious Code
State some advantages of space based ISR.
Enhances the joint force’s ability to observe areas of interest (AOIs) which Increases its situational awareness., , Access intelligence behind enemy lines"" no threat to human life.,
State the purpose of DD Form 1847-1.
Non disclosure agreement. Binding for life.
State the purpose of Title 10"" United States Code?
It provides the legal basis for the roles"" missions and organization of each of the services as well as the United States Department of Defense.,,
State the three levels of war:
Operational" strategic" and tactical
State two things the CDO is responsible for doing during his watch?
?
This IO core capability involves actions taken to attack the adversary with the intent of degrading", neutralizing" or destroying adversary combat capability to prevent or reduce an adversary’s, effective use of the electromagnetic spectrum.
Electronic Warfare
This is a stream of charged particles ejected from the upper atmosphere of the sun., It can also adversely affect satellites at altitudes to 600 miles"", to include polar orbiting satellites.
Solar Wind
This orbit is an elliptic orbit characterized by a relatively low-altitude perigee and, an extremely high-altitude apogee.,
Highly Elliptical Orbit (HEO)
This ship got underway in January 1968 with specific orders to intercept and conduct surveillance of Soviet naval activity, to gather signal and electronic intelligence from North Korea and was captured by North Korea.
USS Pueblo
This system is a U.S. space-based global navigation satellite system. It provides reliable positioning" navigation" and timing services to worldwide users.
The Global Positioning System (GPS)
This team provides war fighters who support naval ASW exercises and operations, with oceanographic expertise and access to products and services of the, Naval Oceanographic Office.
Naval Oceanography ASW Team (NOAT)
This was a group of enlisted radio operators were specially trained at a unique school located on the roof of the, old Navy Department Building during 1928-1941. They were trained to intercept and analyze foreign radio communications., What were they called?
On-The-Roof-Gang
Through which office are inquiries to confirm program access visits to program facilities coordinated in advance?
Program Security Office (PSO)
Unauthorized access/disclosure of information, Weak security policy of a system, Improper sanitization of systems or components, Intentional or unintentional actions of an individual,
Compromise
We have an On-The-Roof-Gang Award reciepient at NIOC-S"" who is it?
CTRCM Bass
What are 3 methods of controlling bleeding?
Direct Pressure, Pressure Point, Tourniquet,
What are Category B FBRs used for?
Category B FBRs are technical requests"" for instance changes to MRC steps.
What are HERO"" HERP and HERF?
Hazard of Electromagnetic Radiation to Ordnance, Hazard of Electromagnetic Radiation to Personnel, Hazard of Electromagnetic Radiation to Fuel,
What are MAMs?
Maintenance Assistance Modules provide assistance to troubleshooting.
What are six areas that comprise Naval Doctrine?
1. Naval Warfare, 2. Naval Intelligence:, 3. Naval Operations, 4. Naval Logistics, 5. Naval Planning, 6. Naval Command and Control,
What are the 3 objectives of first aid.
Save life, Prevent further injury, Prevent infection,
what are the 3 pillars of SIGINT?
COMINT, FISINT, ELINT
What are the 5 RACs?
1 – Critical, 2 – Serious, 3 – Moderate, 4 – Minor, 5 - Negligible,
What are the categories of mishap probability?
A – likely to occur immediately, B – probably will occur in time, C – may occur in time, D – unlikely to occur,
What are the classified networks that N6 maintains?
SAP TS//SCI, TS//SCI, NSA NSA//SCI, SIPER-secret, unclass-NMCI
What are the exceptions to anyone performing maintenance?
NEC"" DSPO and DCPO
What are the five core capabilities of Information Operations (IO)?
Electronic warfare (EW), psychological operations (PSYOP), operations security (OPSEC), military deception (MILDEC), Computer Network Operations (CNO)
What are the four categories of hazard severity and what do they entail?
I - Catastrophic – death" >$500000 equipment or facility damage., II - Critical – disfiguring injury or lost time greater than three months$50 000 - $500000 equipment or facility damage., III - Marginal – Lost time greater than one day$10 000 -$50000 equipment or facility damage., IV - Safe – No lost time injuries equipment or facility damage <$10"000.,
What are the four N3 mission areas?
Technical Research Target Development (TRTD), Global Signals Analysis Laboratory (G-SAL), Signal Descriptor File Configuration Management Authority (SCMA), MCS-21 Planning Optimization and Tasking Services (MPOTS)
What are the layers of the atmosphere?
Ionosphere, Stratosphere, Troposphere,
What are the layers of the Ionosphere?
D layer reflects vlf waves; is important for long range vlf communications, E layer refracts hf waves during the day up to 20 megahertz, F1 layer absorb hf waves passing through to the F2 layer, F2 layer is the most important layer for long distance hf communications,
What are the procedures for performing High to low transfers?
1 Call helpdesk, 2 Send file to N6 via intranet, 3 Complete the checklist, 4 Bring completed check list and they move it
What are the reasons to submit a SAER?
Financial issues, Security violations, foreign contacts
What are the seven layers of the OSI model?
Applicatio, Presentation, Session, Transport, Network, Data Link, Physical
What are the seven principles of Naval Logistics?
1.	Responsiveness, 2.	Simplicity, 3.	Flexibility, 4.	Economy, 5.	Attainability, 6.	Sustainability, 7.	Survivability,
What are the six phases of time sensitive targeting?
Find, Fix, Track, TargetEngage, Assess
What are the symptoms of shock?
Profuse sweating, Moist" clammy skin, Unconsciousness, Rapid shallow breathing", Agitation or confusion, Blue lips and fingernails,
What are the three types of IN?
Research, Limited duration, Standing
What are the two parts of 3M and what program is used for each?
Preventative Maintenance – SKED, Corrective Maintenance – OMMS-NG/MICRO-SNAP,
What are the types of IN's?
Research, Limited duration, Standing
What are the Van Allen Radiation Belts?
Two concentric" donut-shaped regions of stable" trapped charged particles that exist, because the geomagnetic field near the Earth is strong and field lines are closed., They can adversely affect satellite communications.
What are Urgent FBRs used for?
Urgent FBRs are changes that involve safety.
What checks can be spot checked?
Any accomplished in the past 13 weeks or scheduled for the current week.
What classification could cause serious damage to National security if compromised?
Secret
What classification is associated with the color blue?
Confidential
What classification is associated with the color green?
Unclass
What classification is associated with the color orange?
Top Secret
What classification is associated with the color red?
Secret
What Dept at Suitland deals with nRFIs?
N2
What do APL and AEL stand for and what is the difference?
Allowance Part List, Allowance Equipment List, AEL is the identifying code for whole systems"" APL’s are identifying codes for parts within systems.,
What do the following mean IRT DLR; Turn-in and RIP?
Turn-in requires a turn in to get the part. RIP" Remain in place" requires the part to be given, before the broken can be turned in.
What does 3M stand for?
Maintenance and Materials Management
What does a red badge issued at quarter deck mean?
Uncleared
What does CFMA stand for?
Combined Function Mast Antenna.
What does CUDIXS stand for and what is its purpose?
Common User Digital Information eXchange System. It is what ships use to, communicate with NCTAMS to send and receive message traffic.
What does DLR stand for?
Depot Level Repair
What does ISCRS provide?
A configurable and upgradeable hardware platform of commercial of the shelf (COTS) equipment.
What does MOV stand for and what is its purpose?
Material Obligation Verification. Provides a validation of supply need and reconciles supply requisition, documents with records of requisitioning activities.
What does N51 work on?
Wireless
What does N52 do?
Testing
What does N53 do?
Developing
What does N54 do?
Performs analysis and development of telecommunication and network systems.
What does N55 do?
Performs analysis and development of telecommunication and network systems
What does N56 do?
Counter IED. Improvised explosive devise.
What does N57 do?
Provides CNO tool support for another organization.
What does N61 do?
Help desk
What does N62 do?
Maintain networks
What does N63 do?
Network Security. Updates and patches.
What does N64 do?
Knowledge and Database management. Runs sharknet.
What does NSN stand for?
National Stock Number
What does SAER stand for?
Security Access Elegibility Report
What does SCMA stand for?
Signal Descriptor File Configuration Management Authority.
What does SDF stand for?
Signal Descriptor File, (they are put into MCS-21.)
What does the acronym RADAR mean?
Radio Detection And Ranging
What does the green badge issued at Quarter deck mean?
Cleared
What does the National Security Council do?
President's principal forum for considering national security and foreign policy matters with his senior national security advisors and cabinet officials
What does the presenation layer do?
Encrpyt
What does the session layer do?
Establishes connections between applications
What does the ¢ used for in PMS?
Accomplished by the higher authority.
What form is completed to account for the completion of maintenance and who is required to sign it?
13 Week Report. Maintenance member for each check completed"" Work center supervisor and Division Officer.
What instruction covers critic?
CR-1501
What instruction governs EVALS/FITREPS?
BUPERINST 1610.10B, Navy Performance Evaluation and Counseling System
What instruction governs Recreational and Off Duty Safety?
OPNAVINST 5100.25B
What instruction governs safety ashore?
OPNAVINST 5100.8G
What instruction governs the submission of mishap reports?
OPNAVINST 5102D
What is a Backdoor?
A backdoor in a computer system is a method of bypassing normal authentication" securing remote access to a computer obtaining access to plaintext and so on" while attempting to remain undetected.
What is a EA-18 Growler?
EA-18G Growler is a carrier-based electronic warfare aircraft"" radar warning and jamming.
What is a EC-130H Compass Call?
Compass Call system employs offensive counter information and electronic attack capabilities. Conducts PSYOP and Jamming.
What is a firewall?
part of a computer system or network that is designed to block unauthorized access while, permitting authorized communications. It is a device or set of devices which is configured, to permit or deny computer applications based upon a set of rules and other criteria.
What is a hoax virus?
a message warning the recipient of a non-existent computer virus threat.,,
What is a hub?
hub is a multiport device for connecting multiple devices together and, making them act as a single network segment. ,
What is a KL?
Kleightlite report"" anything SIGINT related
What is a macro virus?
make up the majority of mobile code attacks by using a macro language to manipulate itself and other files. They target Microsoft applications such as Work and Excel.
What is a natural horizon?
The line-of-sight horizon.
What is a No Strike List (NSL)?
A list of geographic areas" complexes" or installations not planned for capture or destruction.
What is a P-3c Orion?
Anti-submarine and maritime surveillance aircraft.
What is a PDDG?
Something Diagraph
WHat is a PLA?
Plain Language address
What is a PLA?
Plain Language address?
What is a radio horizon?
A form of radiant energy that surpasses natural horizon and waves are no longer propagated . (huh?)
What is a RC-135?
Modified C-135 with on-board sensors which enable the crew to detect"" identify and geolocate signals throughout the electromagnetic spectrum
What is a repeater?
electronic device that receives a signal and retransmits it at a higher level and/or higher power
What is a Restricted Target List?
A list of restricted targets nominated by elements of the joint force and approved by the joint force commander.
What is a router?
A router is an electronic device that interconnects two or more computer networks"", and selectively interchanges packets of data between them.
What is a STRUM?
Standard Technical report using modules. 24 hour collect from platform. Released at 0300.
What is a web based (JWICS) software to improve utilization of the MCS-21 family of systems?
MPOTS, MCS-21 Planning Optimization and Tasking Services
What is an AN/TSQ-265?
It is a DF system for HF spectrum.
What is an EGL?
Equipment Guide List is a list of similar equipment that a maintenance check is required on.
What is an example of a protocol at the application layer?
HTTP port 80
What is an IPv4 address?
32 bit address consisting of 4 sections of 8 bits called an octet. Seperated by a period., Example: 60.20.45.12,
What is an IPv6 address?
128 bit address consisting of 8 sections of 16 bits seperated by colons. Uses hexidecimal., Example: 2001:0dbb:ac10:fe01::::: (:: denotes the number zero),
What is an MSDS and what does it do?
Material Safety Data Sheets are used for hazardous materials to list all safety precautions for the, each specific hazardous material.
What is an SF 702?
Security container check sheet.,, Logs open and close
What is an SF86?
Questionaire for National security positions. Form for back ground investigations.
What is Antisubmarine Warfare?
Operations conducted to destroy or neutralize enemy submarine forces.
What is attenuation?
reduction in the strength of a signal generated by a transmitter.
What is battle damage assessment?
The timely and accurate estimate of damage resulting from the application of military force" either lethal or nonlethal" against a predetermined objective
What is BEADWINDOW and how many are in the navy?
Beadwindow is the code word used when someone passes sensitive information over an unsecure, network. 69. 7 are used by everyone in the Navy.
What is C4ISR?
Command" Control Communications Computers Intelligence Surveillance Reconnaissance. , Provides capabilities that enable forces to generate use" and share the information, necessary to survive and succeed on every mission.
What is Category A FBR?
Category A FBRs are used for administrative requests. For instance if missing documentation, needs to be replaced"" like classified MRCs.
What is CNA?
Actions taken through the use of computer networks to disrupt"deny degrade or destroy information resident in computers and computer networks" or the computers and networks themselves.
What is CND?
Actions taken through the use of computer networks to protect" monitor analyze" detect and respond to unauthorized activity within Department of Defense information systems and computer networks.
What is computer security?
Maintaining the confidentiality"" integrity and availability.
What is diffraction?
#NAME?
What is ducting?
occurs when a channel of cool air that forms between the warm air can help radio waves travel further and clearer
What is duplex?
Full Duplex- is a system composed of two connected parties or devices that can communicate with one another in both directions simultaneously
What is E layer for?
refracts hf waves during the day up to 20 megahertz
What is F2 layer for?
the most important layer for long distance hf communications
What is frequency?
The number of cycles that occur in one second. Usually expressed in hertz.
What is GCCS-M?
Global Crypto logic Communication System"" Maritime
What is half duplex?
Half Duplex- system provides for communication in both directions"" but only one direction at a time,
What is heat exhaustion"" how to do you recognize and treat it?
Heat Exhaustion is the body’s response to excessive loss of water through sweating., Symptoms include heavy sweating" extreme fatigue dizziness confusion nausea clammy, moist skin pale or flushed complexion muscle cramps or fast and shallow breathing. , Should be treated by drinking water moving to shade" or taking a cool bath.
What is heat stroke"" how to do you recognize and treat it?
- Heat Stroke is when the body is unable to control its temperature" can’t sweat and cool down., Symptoms include hot dry skin hallucinations chills throbbing headaches high body temperature, confusion dizziness and slurred speech. Should be treated by
What is hypothermiat?
Hypothermia is when your body temperature drops so low your heart"", nervous system and other organs can’t function.
What is IEM?
Inactive Equipment Maintenance.
What is Information Warfare?
Actions taken to affect adversary information and information systems while defending, one’s own information and information systems.
What is INTELINK?
Higher classification thatn typically found on NSA net
What is Machine Code?
system of instructions and data executed directly by a computer's central processing unit. Machine code may be regarded as a primitive (and cumbersome) programming language.
What is MILDEC?
Actions executed to deliberately mislead adversary military decision makers about military capabilities" intentions and operations" thereby causing the adversary to take specific actions or inactions.
What is multiplexing?
sending multiple signals or streams of information on a carrier at the same time in the form of a single"" complex signal
What is N8 Department?
Programs and Acquisitions Department
What is OneNet?
ONENET- ONE-NET is a Navy-wide initiative to install a common and secure IT infrastructure, to OCONUS Navy locations. It is based on the Navy Marine Corps Intranet.
What is OPELINT?
Operational ELINT determines the locations and readiness of target emitters., (disposition" location movement employment tactics" and activity levels of known foreign noncommunications),
What is OPSEC?
Controling unclas information to deny adversaries intentions
What is ORM?
Operational Risk Management
What is popular nickname for Admiral Grace Hopper?
Amazing Grace
What is primary reason for a service member to have a Family Care Plan?
To be sure a members dependants will be taken care of in the event of a deployment
What is propagation?
any of the ways in which a wave travels through a medium
What is PSYOPS?
Psychological operations are planned operations to convey selected information and indicators to foreign audiences to influence their emotions" motives objective reasoning and ultimately the behavior of foreign governments organizations groups" and individuals., The purpose of United States psychological operations (PSYOP) is to induce or reinforce behavior favorable to U.S. objectives,
What is RAC?
RACs of 1-5 are assigned by matching the hazard severity to the mishap probability.
What is refraction?
The changing of direction as a wave leaves one medium and enters another medium of a different density.
What is relationship between the atlantic and pacific NCTAMS?
They cover for each other in the event of an outage.
What is simplex?
Simplex- refers to communication that occurs in one direction only
What is situation maintenance and what is it’s periodicity code?
Maintenance performed which a certain situation occurs like underway" prior to flight deck operations" etc. R
What is stratoshere known for?
UV Rays are propagated
What is TECHELINT?
determines the capabilities and limitations of target emitters., (signal characteristics" modes functions associations capabilities limitations vulnerabilities" and technology levels )
What is the Battle of Midway and what impact did intelligence have on the outcome of the battle?
June 1942: The turning point of the World War II in the Pacific. The battle was won by the U.S. because of CT types on Midway Island that broke the Japanese code., This enabled Admiral Nimitz to place his forces in such a way that would give him the tactical advantage and defend the island"", keeping the Japanese from gaining control of the Pacific and putting them in striking distance of the United States
What is the close out date for CPO evals?
Sept 16th
What is the CR series USSID used for?
Customer Relations
What is the D layer known for?
reflects vlf waves; is important for long range vlf communications
What is the Defense Meteorological Satellite program?
monitors meteorological" oceanographic" and solar-terrestrial physics for the United States Department of Defense., The program is now run by the National Oceanic and Atmospheric Administration. They provide cloud cover imagery, from polar orbits that are sun-synchronous at nominal altitude of 450 nautical miles.
What is the diff between a TACREP and KL?
KL contains COMINT and TACREP does not. AKA tear line
What is the difference between an open and closed fracture?
In open fracture the bone protrudes from the skin.
What is the difference between information and intelligence?
Information is gathered and Intelligence is reported as a product.
What is the difference between OPCON and ADCON?
OPCON is who you answer to for operational matters. ADCON is who you answer to for administrative issues.
What is the difference between the 2000 and 5000 series?
2000 is for Maritime, 5000 is for NSA/Joint" NSA/SCE-Combined" NSA collaberating
What is the Doppler Effect?
The apparent change in frequency or pitch whensound source moves either toward or away from a listener.
What is the doppler effect?
Change in frequencey due to relativity of a fixed point and moving object.
What is the F1 layer for?
absorb hf waves passing through to the F2 layer
What is the First step in OPSEC?
Identify critical information
What is the horse forthe freq ranges?
Extremely ELF, Sensitive SLF, Unusually ULF, Very VLF, Little LF, Men MF, Have HF, Very VHF, Unusual UHF, Sexual SHF, Experiences EHF,
What is the IEEE 802.11 standard?
A set of standards carrying out Wireless Local Area Network (WLAN) computer communications in the 2.4"" 3.6 and 5 GHZ frequencey bands.
What is the instruction number for the Family Care Plan (FCP)?
OPNAVINST 1740.4C
What is the instruction number that is referred to as the correspondance manual
SECNAV 5216.5
What is the MCS-21 system used on a submarine?
ISCRS, Integrated Submarine Communications Receiving System
What is the MCS-21 system used on surface ships?
SSEE Inc E, Ships Signals Exploitation Equipment
What is the minimum DLPT score for CTIs?
L2/R2
What is the mission of N1?
N1 is responsible for all admin requirments including travel" security" correspondance and military/civilian personnel matters.
What is the mission of N33 and N34?
Work together to meet fleet and national intelligence requirements for MCS-21 systems. They make the SCMA for MCS-21 systems Navy wide.
What is the mission of N5?
Advanced concepts and demonstartions. Department is responsible for long term CNO.
What is the mission of N6?
Provide AIS support to NIOC Suitland.
What is the mission of NCDOC?
Navy Cyber Defense Operations Command (NCDOC) mission is to coordinate, monitor and oversee the defense of Navy computer networks and systems and, to be responsible for accomplishing computer network defense missions
What is the mission of NCDOC?
Responsible for around-the-clock protection of the Navy’s computer networks
What is the mission of NCTAMS?
Naval Computer and Telecommunications Area Master Station, The mission of NCTAMS is to provide classified and unclassified voice" messaging data and video to ships submarines" aircraft and ground forces operating worldwide in support of Naval and joint missions.,
What is the mission of NORTHCOM and where are they located?
Located at Paterson AFB in Colorado. Mission is to provide command and control of Department of Defense (DOD) homeland defense efforts and to coordinate defense support of civil authorities.
What is the mission on N64?
Knowledge and Database management. Run sharknet
What is the oldest intelligence organization in the U.S. Navy?
ONI
What is the only ship with the article “the” in the name?
USS The Sullivans
What is the OPNAV 4790/2K
Maintenance action request
What is the OPNAV/CK?
Configuration Changed request
What is the periodicity code for a PMS check that should be performed Daily?
D
What is the periodicity code for a PMS check that should be performed Every 24 months?
24M
What is the periodicity code for a PMS check that should be performed Semiannually?
S
What is the periodicity code for a PMS check that should be performed Twice a month?
2M
What is the primary purpose of the Mine UUV Platoon?
Develop all the tactics and technique relating to the operation of unmanned underwater vehicles (UUV) in mine warfare
What is the purpose of a Cryptologic Cary-On Program?
Provide state of the art carry-on cryptologic exploitation capabilities t, USN/USCG surface"" subsurface and air platforms
What is the purpose of a Maritime Operations Center?
Develop" activate" man and equip to support Maritime Headquarters requirements.
What is the purpose of a mobile detachment?
Provide expeditionary support to Navy operations world-wide.
What is the purpose of an OPTASK Comms?
Used to direct communications for an operation" deployment or exercise. Each Fleet has there own., Information provided will be frequencies" comm. circuits and controlling authority for each circuit.
What is the purpose of Direct Support Assets?
Provide deployable cryptologic support to Navy assets
What is the purpose of DRMS?
Defense Reutilization and Marketing Service in charge of the disposal or reutilization of, abandoned personnel property.
What is the purpose of DTS?
Defense travel System:, Personalized online reservations and itinerary changes for airline" lodging and rental cars, Detailed pre-travel entitlement computations, Electronic routing and approvals, Merges authorizations arrangements" payment and reconciliation of travel, Supports charge card split disbursement
What is the purpose of ORM?
Prevent mishaps through risk management.
What is the purpose of SP00018?
Implements minimization requirements in regards ti information collected" processed" retained or disseminated on US persons by US SIGINT systems.
What is the purpose of SP0009?
Used to collect when ships pull into foreign ports.
What is the purpose of the CO Writer?
Provide good customer service., Manage/Executive staff and Command calendar., Coordinate executive staff travel, Edit/route correspondance
What is the purpose of the OPNAV 4790/2L?
Supplemental information form is used to provide supplemental information such as a diagram of something needed to be created or repaired.
What is the purpose of USC Title 10?
Outlines the role of U.S. Armed Forces. It provides legal basis for the roles and organization of, each of the services as well as the U.S. Department of Defense.
What is the purpose of USSID SP00018 Annex A?
Procedures for inadvertent collect on US persons.
What is the purposer of intell oversite?
Ensure all DoD intelll agenciea activities are conducted in accordance with all regulations
What is the role of the Command mentorship coordinator?
Resposible to the CO/XO for establishing and maintaining effective program, Oversee Dept mentor coordinators, Maintain records, Faciliitate training. Indoc and annual refresher
What is the SE series USSID for?
SIGINT enterprise.
What is the Single Line Item Requisition form?
DD Form 1348-6
What is the SP series USSID used for?
SIGINT fundamental Policy
What is the time a Flash Z goes out?
10 minutes
What is the time a Priority P goes out?
3 Hours
What is the time a Routine -R- goes out?
12 hours
What is the time an Immediate O goes out?
30 minutes
What is the timeline for submitting a voucher for a TAD claim?
5 days
What is the treatment for shock?
Lay the person flat on their back" raise their legs" keep them warm
What is the U.S. Navy’s birthday?
October 13"" 1775
What is Troposhere known for?
Weather
What is Vintage harvest?
Signal analysis website on high side
What maintenance is required during IEM"" give examples of the periodicity codes for each?
- Lay-up maintenance – before going into IEM" LU, - Start-up maintenance – after coming out of IEM SU, - Preventative maintenance – performed while in IEM PM, - Operational Test – performed after coming out of IEM" OT,
What month are E3 and below evaluations due?
July 15th
What month are E4 evaluations due?
June 15th
What month are E5 evaluations due?
, March 15th
What orbit travels approximately 1""243 miles from the earth?
Low Earth Orbit (LOE)
What should be done for fractures? Is there a difference between open and closed?
Immobilize limb with fracture with a brace. No differences between open and closed., Do NOT attempt to reinsert protruding bone.
What should you as the maintenance person do when there is a problem with an MRC?
Report it to the WCS who will put in a FBR.
What steps should be taken for electrical shock?
Secure power, Perform CPR if necessary,
What system does N33 and N34 use for SDF development?
Shockwave
What system is supported by N8 ground?
AN/TSQ-265
What system is supported by N8 sub-surface?
ISCRS/Troll, (Integrated Submarine Comminications Receiving System)
What takes precedence over Critic?
Flash over ride
What two organizations were combined to support establishment of Fleet Cyber Command?
On October 1"2009" The Naval Intelligence (N2) and Communications (N6) directorates merged
What type of data units are found at the Data Link Layer layer?
Frames
What type of data units are found at the Network layer?
Packets
What type of data units are found at the Physical layer?
Bits
What type of data units are found at the Transport layer?
Segmnet
What type of network device is found at the Data link Layer?
Swith or Bridge
What type of network device is found at the Network layer?
Router
What vis a SIGAD?
SIGINT Address
What was established by the National Security Act of 1947
National Security Council (NSC)
What was the codename for the Landings at Inchon in N. Korea?
Operation Chromite
What was the codename for the Naval aspect of the Battle of Normandy?
Operation Neptune
What was the first ship named after an enlisted man and why?
Osmond Ingram (DD 255) – The first enlisted man killed in action during World War I ., He received the Medal of Honor for his actions that day in trying to save his ship and his shipmates.
What was the Japanese name for kamikaze attacks?
The Divine Wind
What was the largest amphibious invasion in history?
D-day landings at Normandy
What was the name of the space flight that landed the first humans on Earth's Moon on July 20"" 1969 and, which former Naval aviator participated in the mission?
Apollo 11 with Neil Armstrong
When is an SSBI updated?
5 years from the previous close out date
When were the core values changed to Honor" Courage" and Commitment and by whom?
1992"" Admiral Kelso
Where are the Command files centrally located?
In N1 front office
Which board is used to assign maintenance to personnel?
Weekly
Who are the members of the National Security Council?
chaired by the President, Vice President, Secretary of State, Secretary of the Treasury, Secretary of Defense, Assistant to the President for National Security Affairs
Who assigns preventative maintenance?
Work Center Supervisor
Who is credited with popularizing the term “debugging” for fixing computer glitches?
Admiral Grace Hopper
Who is responsible for the 3M program in a command?
CO
Who is the Government Program Manager (GPM) of our SAP with responsibility for executing all aspects of the compartmented effort?
NIOC S Commanding Officer
Who is the reporting senior for E5s?
XO
Who monitors TS material at NIOC S?,
TSCO Keith Cochran
Who performs spot checks?
CO" XO 3MC Department Head" Division Officer and LCPO.
Why was N2 and N6 combined?
The newly aligned N2/N6 will be responsible for Maritime Domain Awareness (MDA)" a central point of command for the synchronization of development of MDA hardware networks" and international cooperation.[2]