• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/105

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

105 Cards in this Set

  • Front
  • Back

What 2 departments were combined to form ONI

Office of intelligence


Department Library

Define SAER

Security Access Eligibility Report


-report to DoNCAF any info which might effect someone's continued access to SCI

Procedures for unclear visitor

-store classified material


-power down or hide screen


-announce unclear visitor


-escort 100% of the time

What is FVEY

Five Eyes


US, AUS, CAN, GRB, NZL

Purpose of SF86

Questionnaire for security clearance purposes

What form do you use to record local elements destruction

CMS-25

What is SKL

Simple Key Loader (PYQ-10)


-store and transfer electronic keymat

What is IPS

Intrusion Prevention System


-detects and tries to stop Intrusion activity

What is ACAS

Automates and quickly scales and organizations vulnerability and compliance scanning infrastructure

What is JWICS

Joint Worldwide Intelligence Comm


-operated by DIA


-secure global network


Exchange server

Mail server, calendaring software and contact manager by Microsoft


-runs of windows

Letter for Flash Override

W


3-5min

COMMSHIFT

To shift traffic from one medium to another

Antenna that is used for UHF LOS

AS-1735

What antennas are used for EHF

OE-564 EHF ops



OE-581 GBS ops

HUMINST

Human intelligence

OSINT

Open source intelligence

MASINT

Measurement and signature intelligence

SIGINT

Signal intelligence

COMINT

Communication intelligence

FISINT

Foreign instrumentation signals intelligence

Why was Intelligence oversight was established

US persons involved in the civil rights and anti-vietnam war movements

NEC 3924

OPINTEL analyst

SUPPLOT

Indications and warnings of threat activity for strike group

SIAC

Strike intelligence analysis cell


-supports targeting and intelligence support to Air groups

Air/distress frequency

243.0


121.5

6th fleet

Mediterranean sea

7th fleet

Yokosuka, Japan


Units near south Korea and japan


NATO

National Allied Treaty Organization

CMFC

Combined Maritime Forces Central


-compilation of international naval forces

ACGU

AUS, CAN, GRB, US

FOUO

For Official Use Only


-DOD info exempted from public under the freedom of information act

PII

Personally Identifiable Information

How many AL codes are there

5

Define IA

Info ops that protect and defend data&info ensuring their:


-availability


-integrity


-authentication


-confidentiality


-non-repudiation

What is IATO

Interim Authorization To Operate


-good 6months

What does GIG stand for

Global Information Grid

Who sets rivercity

ISA

7 layers of OSI model

Application


Presentation


Session


Transporters


Network


Data link


Physical

What is VTC

Video Teleconference


-two way video and audio transmission

Who writes COMMPLAN

GHWB

Who writes OPTASKCOMMS for the ship

CSG2

What is gingerbread

Warns that a voice imitative deception is suspected on the network


-intruder on the net

How many tools are used in ACAS

4


Security scanner


Nessus scanner


Passive vulnerability scanner


3D tool

What is FTP

Fleet telecommunications publication

What is dual routing

A way for units to have traffic sent to two different routing indicators

OPREP 5

Daily operational message for ships status

LOGREP

Logistics report stating ships need for port assistance for arrival or departure

MOVREP

Ships intended movement

CASREP

Casualty Report to Gear


-tech assistance or part requisition

What is DSCS controlled by

DOD

What is CBSP controlled by

Commercial provider

What is GCCS-M used for

Display positional data of the common operating picture

Purpose of tear line

Removing info that would cause intelligence to be classified at a higher level

What are the NECS for IS

3923


3924


3910

What rates work in SSES

CTM


CTR


IT

Small craft warning is how many knots

18-33

Gale warning is how many nots

34-47

Electromagnetic radiation

Energy radiated from the sun over the entire electromagnetic spectrum

What does CASE stand for

Cryptologic Asset Support Elements

A program that seems useful or harmless but contains hidden code to damage computer

TROJAN

What is Brute force

Technique used to break an encryption or authentication by trying all possibilities

How many hours is Priority

3hrs

What does USSID stand for

United States Signal Intelligence Directive

Where is the EMCON station

EW module

Who manages the GCCS workstation

RDBM


Red Database Manager



What does FIWO Stand for

Flag Intelligence Watch officer

What is XJ / who is in charge

Maritime interdiction operations


Maritime security officer

What is XA

Fleet Commander

What does SSES stand for

Ship signal exploitation Space

What does RADMERC stand for

Radiant Mercury

What does MSI stand for

Multi sensor interpretation

What are the 2 by products of the fussion process that impacts space

Electromagnetic radiation


Electrically charged particles

Tactical application used to determine set and drift during man overboard

WEBSAR

A request that asks for intelligence resources to complete requirements of SIGINT and operational tasking

JISST

What is layer 7 OSI model

Application

What is ducting

Trapping of RF wave between 2 layers of earth's atmosphere

What is multiplexing

Method for simultaneous transmission of two or more signal over a common carrier wave

What does CCP stand for

Cryptologic Coverage Plan

3 types of COMSEC suppression

Regular


Irregular


Emergency

3 types of COMSEC incidents

Physical


Personnel


Cryptographic

CMS-25 is held for how long

2 years

What does SSES stand for

Ships signal exploitation Space

OE 404 typically used for link operations

True

What is JTT

A receiver for the IBS feedback which provides data into multiple systems including GALE-Lite

Who is responsible for deceptive lighting

EW MODULE

3 basic components of RADAR

Transmitter


Antenna


Receiver

What does FES stand for

Fleet electronic support

What is OPSEC used for

Denying info from enemy regarding planning, processing or operations

What is penetration for IA

Method of evaluating the security of a computer system or network by simulating an attack from malicious

What is ELNOT

ELINT NOTATION

What is low earth orbit

Altitudes between 150 and 800 miles above earth's surface

What is TPI

Two person integrity


-requirement of 2 authorized persons, access to COMSEC keying material, whenever accessed or handled

Difference between OPELINT and TECHELINT

OPELINT is movement, location or employment


TECHELINT is our capabilities, limitations or vulnerabilities

What year was Gemini 3

1965

What year was mercury 3

1961

What is PKI

Public Key Infrastructure


-two key encryption system where messages are encrypted with private key and decrypted with public key

Port 20

FTP data transfer

Port 21

FTP control

Port 22

Secure shell


-secure logins, file transfer and port forwarding

Port 25

Simple mail transfer protocol


-email routing

Accreditation

Formal declaration by DAA that an info system is approved to operate

DAA

Designated approving authority


System security plan

Planned security tasks required to meet network or system requirements

SSAA

System security authorization agreement