Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
105 Cards in this Set
- Front
- Back
What 2 departments were combined to form ONI |
Office of intelligence Department Library |
|
Define SAER |
Security Access Eligibility Report -report to DoNCAF any info which might effect someone's continued access to SCI |
|
Procedures for unclear visitor |
-store classified material -power down or hide screen -announce unclear visitor -escort 100% of the time |
|
What is FVEY |
Five Eyes US, AUS, CAN, GRB, NZL |
|
Purpose of SF86 |
Questionnaire for security clearance purposes |
|
What form do you use to record local elements destruction |
CMS-25 |
|
What is SKL |
Simple Key Loader (PYQ-10) -store and transfer electronic keymat |
|
What is IPS |
Intrusion Prevention System -detects and tries to stop Intrusion activity |
|
What is ACAS |
Automates and quickly scales and organizations vulnerability and compliance scanning infrastructure |
|
What is JWICS |
Joint Worldwide Intelligence Comm -operated by DIA -secure global network |
|
Exchange server |
Mail server, calendaring software and contact manager by Microsoft -runs of windows |
|
Letter for Flash Override |
W 3-5min |
|
COMMSHIFT |
To shift traffic from one medium to another |
|
Antenna that is used for UHF LOS |
AS-1735 |
|
What antennas are used for EHF |
OE-564 EHF ops OE-581 GBS ops |
|
HUMINST |
Human intelligence |
|
OSINT |
Open source intelligence |
|
MASINT |
Measurement and signature intelligence |
|
SIGINT |
Signal intelligence |
|
COMINT |
Communication intelligence |
|
FISINT |
Foreign instrumentation signals intelligence |
|
Why was Intelligence oversight was established |
US persons involved in the civil rights and anti-vietnam war movements |
|
NEC 3924 |
OPINTEL analyst |
|
SUPPLOT |
Indications and warnings of threat activity for strike group |
|
SIAC |
Strike intelligence analysis cell -supports targeting and intelligence support to Air groups |
|
Air/distress frequency |
243.0 121.5 |
|
6th fleet |
Mediterranean sea |
|
7th fleet |
Yokosuka, Japan Units near south Korea and japan |
|
NATO |
National Allied Treaty Organization |
|
CMFC |
Combined Maritime Forces Central -compilation of international naval forces |
|
ACGU |
AUS, CAN, GRB, US |
|
FOUO |
For Official Use Only -DOD info exempted from public under the freedom of information act |
|
PII |
Personally Identifiable Information |
|
How many AL codes are there |
5 |
|
Define IA |
Info ops that protect and defend data&info ensuring their: -availability -integrity -authentication -confidentiality -non-repudiation |
|
What is IATO |
Interim Authorization To Operate -good 6months |
|
What does GIG stand for |
Global Information Grid |
|
Who sets rivercity |
ISA |
|
7 layers of OSI model |
Application Presentation Session Transporters Network Data link Physical |
|
What is VTC |
Video Teleconference -two way video and audio transmission |
|
Who writes COMMPLAN |
GHWB |
|
Who writes OPTASKCOMMS for the ship |
CSG2 |
|
What is gingerbread |
Warns that a voice imitative deception is suspected on the network -intruder on the net |
|
How many tools are used in ACAS |
4 Security scanner Nessus scanner Passive vulnerability scanner 3D tool |
|
What is FTP |
Fleet telecommunications publication |
|
What is dual routing |
A way for units to have traffic sent to two different routing indicators |
|
OPREP 5 |
Daily operational message for ships status |
|
LOGREP |
Logistics report stating ships need for port assistance for arrival or departure |
|
MOVREP |
Ships intended movement |
|
CASREP |
Casualty Report to Gear -tech assistance or part requisition |
|
What is DSCS controlled by |
DOD |
|
What is CBSP controlled by |
Commercial provider |
|
What is GCCS-M used for |
Display positional data of the common operating picture |
|
Purpose of tear line |
Removing info that would cause intelligence to be classified at a higher level |
|
What are the NECS for IS |
3923 3924 3910 |
|
What rates work in SSES |
CTM CTR IT |
|
Small craft warning is how many knots |
18-33 |
|
Gale warning is how many nots |
34-47 |
|
Electromagnetic radiation |
Energy radiated from the sun over the entire electromagnetic spectrum |
|
What does CASE stand for |
Cryptologic Asset Support Elements |
|
A program that seems useful or harmless but contains hidden code to damage computer |
TROJAN |
|
What is Brute force |
Technique used to break an encryption or authentication by trying all possibilities |
|
How many hours is Priority |
3hrs |
|
What does USSID stand for |
United States Signal Intelligence Directive |
|
Where is the EMCON station |
EW module |
|
Who manages the GCCS workstation |
RDBM Red Database Manager |
|
What does FIWO Stand for |
Flag Intelligence Watch officer |
|
What is XJ / who is in charge |
Maritime interdiction operations Maritime security officer |
|
What is XA |
Fleet Commander |
|
What does SSES stand for |
Ship signal exploitation Space |
|
What does RADMERC stand for |
Radiant Mercury |
|
What does MSI stand for |
Multi sensor interpretation |
|
What are the 2 by products of the fussion process that impacts space |
Electromagnetic radiation Electrically charged particles |
|
Tactical application used to determine set and drift during man overboard |
WEBSAR |
|
A request that asks for intelligence resources to complete requirements of SIGINT and operational tasking |
JISST |
|
What is layer 7 OSI model |
Application |
|
What is ducting |
Trapping of RF wave between 2 layers of earth's atmosphere |
|
What is multiplexing |
Method for simultaneous transmission of two or more signal over a common carrier wave |
|
What does CCP stand for |
Cryptologic Coverage Plan |
|
3 types of COMSEC suppression |
Regular Irregular Emergency |
|
3 types of COMSEC incidents |
Physical Personnel Cryptographic |
|
CMS-25 is held for how long |
2 years |
|
What does SSES stand for |
Ships signal exploitation Space |
|
OE 404 typically used for link operations |
True |
|
What is JTT |
A receiver for the IBS feedback which provides data into multiple systems including GALE-Lite |
|
Who is responsible for deceptive lighting |
EW MODULE |
|
3 basic components of RADAR |
Transmitter Antenna Receiver |
|
What does FES stand for |
Fleet electronic support |
|
What is OPSEC used for |
Denying info from enemy regarding planning, processing or operations |
|
What is penetration for IA |
Method of evaluating the security of a computer system or network by simulating an attack from malicious |
|
What is ELNOT |
ELINT NOTATION |
|
What is low earth orbit |
Altitudes between 150 and 800 miles above earth's surface |
|
What is TPI |
Two person integrity -requirement of 2 authorized persons, access to COMSEC keying material, whenever accessed or handled |
|
Difference between OPELINT and TECHELINT |
OPELINT is movement, location or employment TECHELINT is our capabilities, limitations or vulnerabilities |
|
What year was Gemini 3 |
1965 |
|
What year was mercury 3 |
1961 |
|
What is PKI |
Public Key Infrastructure -two key encryption system where messages are encrypted with private key and decrypted with public key |
|
Port 20 |
FTP data transfer |
|
Port 21 |
FTP control |
|
Port 22 |
Secure shell -secure logins, file transfer and port forwarding |
|
Port 25 |
Simple mail transfer protocol -email routing |
|
Accreditation |
Formal declaration by DAA that an info system is approved to operate |
|
DAA |
Designated approving authority |
|
System security plan |
Planned security tasks required to meet network or system requirements |
|
SSAA |
System security authorization agreement |