• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/45

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

45 Cards in this Set

  • Front
  • Back
Explain the procedures for the transmission and handling of Privacy Act Information.
Individuals or organizations may seek a "routine use" disclosure of info from a DoN Privacy Act (PA) system of records if the system is available. The request must be in writing.
Explain the adjudication process:
Investigation
Personal security investigations (PSI), are conducted to meet OPM and Executive Branch requirements for employment suitability and personnel security eligibility
SAER (Security Access Eligibility Report)
Report submitted through JPAS to DONCAF to get the adjudication process started. Also used through JPAS when an incident occurs and additional time is needed to provide more info
Appeals
Used to dispute the findings of an unfavorable PSI. DoN will convene an appeals board for such cases
LOI (Letter of Intent)
Issued to deny or revoke eligibility for assignment to sensitive security positions or access to classified info
LOD (Letter of Denial)
Issued to DoN for individuals denied clearances based on their security eligibility
JCAVS (Joint Clearance and Access Verification System)
System where Security Manager ensures that personnel security investigations, clearances, and accesses are properly recorded
State the purpose of SF86
Document used as a basis for current and future investigations, security clearance investigations, and determinations for your suitability for employment
State the purpose of DD Form 1847-1
SCI Nondisclosure Statement. It identifies people when it is necessary to certify their access to SCI
State the purpose of the Adjunct Faculty Program
To utilize subject matter expertise to meet global training needs
State the minimum DLPT score standard for CTI
2/2(Listening/Reading) or higher except for:
Arabic, Persian-Farsi, and Chinese which require 1+/2 or 2/1+
Name the language associated with the following category:
Category 1
French, Italian, Portuguese, and Spanish
Name the language associated with the following category:
Category 2
German
Name the language associated with the following category:
Category 3
Hebrew, Persian-Farsi and Dari, Russian, Serb-Croatian, Tagalog, Thai, and Urdu
Name the language associated with the following category:
Category 4
Arabic, Chinese, Korean, Pashto
State the emergency destruction priority assigned to cryptologic equipment and documents
Priority ONE (total destruction priority assigned to cryptologic equipment and documents
Describe the Navy's organization structure as defined by annexes A&J of OPORD 2000
FLTCYBERCOM OPCON to USCYBERCOM
FLTCYBERCOM ADCON to CNO

Provides operational support to commanders world-wide, serves as Navy Component commander to USCYBERCOM, and assumes OPCON of cryptologic, cyber networks, space and IO
Describe the functions of the following command:
USSTRATCOM
(US Strategic Command)
Provides nation with global deterrence capabilities to combat adversary WMD worldwide. Space and global strike ops; IO; integrated missile defense
Describe the functions of the following command:
CYBERCOM
(Cyber Command)
Plans, coordinates, integrates, synchronizes, and conducts activities to prepare for and conduct full spectrum military cyberspace ops, ensure US/Allied freedom of action in cyberspace, and deny the same to adversaries
Describe the functions of the following command:
JFCC-ISR
(Joint Functional Component Command-ISR)
Responsible for coordinating global intel collection; key enabler to achieving global situational awareness. The commander also serves as the Director, DIA.
Describe the functions of the following command:
JFCC-Space
(Joint Functional Component Command-Space)
Conducts planning, execution, and force management, as directed by USSTRATCOM, of assigned missions for space ops; Commander 14th Air Force
Describe the functions of the following command:
JIOWC
(Joint IO Warfare Center)
Plans, integrates, and synchronizes IO in direct support of Joint Force Commanders; located at Lackland AFB, Texas
Define the following in relation to CSGs:
Three formal categories
Permanent, Service Component, and Expeditionary
Define the following in relation to CSGs:
Customer relationship functions
Facilitate Ins
Provide expertise
Educate
Reachback support
Stand watch as needed
Define the following in relation to CSGs:
SIGINT production functions
If granted- production chain, sanitize, and collateral level support
SIGINT operational relationships
SIGINT LNOs(Liason Officer), 2nd and 3rd party LNOs, DNI LNOs, or site specific needs
Rules of Engagement
directives that dictate circumstances for starting or continuing combat engagement
Law of war (armed conflict)
Part of international law that regulates the conduct of armed hostilities.
No-strike list (NSL)
List of geographic areas, complexes, or installations not planned for capture or destruction; Safe zone
Restricted target list (RTL)
List of restricted targets nominated by elements of the joint force and approved by the joint force commander
Battle Damage Assessment (BDA)
Timely and accurate estimate of damage from the application of military force against a predetermined objective
Information Operations
The integrated employment of EW, CNO, PSYOP, MILDEC, and OPSEC to influence, disrupt, corrupt, or usurp adversarial human and automated decision making while protection our own
Information Warfare
use and management of information technology, may involve collection of tactical information
Describe Target Development
To produce from the approved targets a target nomination list (TNL) that identifies those elements within an adversary's power base that most closely support the JFC's objectives
Define Time Sensitive Targeting and its six phases
Targets requiring immediate response because they pose or will pose a danger to friendly forces: 1) Detect 2) Locate 3) Identify 4) Decide 5) Strike 6) Assess
SSN
Nuclear powered attack submarines; USS Seawolf, USS Los Angeles
SSGN
Nuclear powered guided missle submarine; USS Ohio
EA-6B Prowler
EW jamming system, data links, and communication capabilities. Designed for carriers or forward base ops.
E-2C Hawkeye
Carrier based tactical airborne warning and control system. Maintain surveillance of both airborne and surface, hostile and friendly
P-3C Orion
Land based, long range anti submarine warfare patrol aircraft
EP-3E
Real-time tactical electronic reconnaissance capabilities
RC-135
near real-time on-scene collection, analysis and dissemination capabilities
RQ-1A Predator
medium altitude remotely operated aircraft designed to conduct recon and target acquisitions within a 400 nautical mile radius
EC-130H Compass Call
modified C-130 Hercules configured to use noise and modulated jamming to prevent comms or degrade transfer of info essential to enemy systems and resources
U-2
provides high altitude all weather, day and night intelligence gathering. Also used for electronic sensor research and development and satellite calibration/data validation.