• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/49

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

49 Cards in this Set

  • Front
  • Back

Describe the general purpose and content of the NTP 2.

The purpose of Naval Telecommunications Procedures 2 (NTP 2) is to promulgate information concerning direction, management, and control of super high frequency (SHF) satellite communications (SATCOM) systems operating in the Xband which are employed to support naval operations.
Provides a basic manual addressing C4I concepts and capabilities in the U.S. Navy.
Naval Telecommunication Procedures Fleet Communication, NTP 4
C4I Infrastructure, provides a complete description of the network composition and associated systems required for strike group command and control.
NTTP 6-02
Multi-Service tactics, techniques, and procedures (MTTP) to standardize and describe the use of internet tactical chat (TC) in support of operations.
NTTP 6-02.8
Core of what an IP officer supports and manages- directly or indirectly- on a regular basis.
Communication equipment and circuits (COMMS)

Means for the war-fighter to communicate tactical
information in real time.

Chat
To provide the war-fighter, at every echelon, with consistent and reliable information necessary to support a common picture of the tactical environment. Objectives include:
A. Rapid and accurate movement of the right information to the right person(s)
B. Standardized procedures for interoperability across Numbered Fleet AORs
C. Collaboration among geographically dispersed forces
D. Reduction of redundant reporting and compiling
E. Optimized bandwidth utilization
F. Optimized database structures that reduce redundancy
Information Management
Who performs organizational level maintenance on KY- 57/58, AN/WSC-43 and KG-84A/C including
inspections, servicing, removing and replacing faulty assemblies or chassis mounted components. Diagnosis faults by using prescribed procedures, Built-InTest Equipment (BITs}, Special and General Purpose Electronic Test Equipment (SPETE/GPETE) as required.
Limited COMSEC Maintenance Technician
Coordinates frequencies for use within area of responsibility. Maintains frequency employment files.
Initiates action as appropriate to prevent and/ correct harmful interference. Makes recommendations for changes in frequencies affected by propagation and unresolvable harmful interference.
Frequency Manager
Operates and performs system monitoring, fault isolation and circuit restoration of communications
suites in the HF, UHF, SHF, and EHF frequency spectrums afloat and ashore, to include; communication transmission paths, input/output devices, cryptographic devices, interface equipment
and patch panels, familiarization with signals, multiplexers, modulators/demodulators, and applicable
system transmitters, receivers, couplers and antenna subsystems
Transmission Systems Technician
NEC provides basic and in-depth levels of instruction in Local Area Networks (LAN) and Metropolitan Area Networks (MAN), with focus on system administration.
Journeyman Networking Core
Functions as an activity's accreditation action officer, focal point, and principal advisor for all command
INFOSEC matters in compliance with governing directives and instructions. Analyze and evaluate
system security technology, policy, and training requirements in support of National, DoD and DoN
INFOSEC policies.
ISSM
Recognizes microcomputer operating systems (i.e. MS-DOS, Windows NT, UNIX, and Novell Netware) vulnerabilities and performs corrective actions to ensure maximum system availability.
Network Security Vulnerability Technician
Manages network operating systems (i.e. Windows NT, UNIX, and Novell Netware} utilizing infrastructure (i.e. cabling, throughput, connectivity, 1/0 devices and topologies). Posses thorough knowledge of current technology trends. Implements a variety of connectivity solutions including but not limited to RAS, T1/T3, ISDN, ATM, X.25.
Advanced Network Analyst

Information security technicians serve as the primary functional proponent for cryptographic key
management infrastructure.

EKMS Manager

Defined as the operational framework consisting of three essential tasks, Situational Awareness (SA), and Command & Control (C2) that the Commander (CDR) of US Strategic Command (USSTRATCOM), in coordination with DoD and Global NetOps Community, employs to
operate, manage and defend the Global Information Grid (GIG) to ensure information superiority for
the United States.

NETOPS
Defined by the DoD as measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and nonrepudiation.
Information Assurance (IA)
Define the 7 layers of the OSI Model.
- Application
- Presentation
- Session
- Transport
- Network
- Data Link
- Physical
What are the central location for attachment of workstations that support many different networking modes?
Hub
What can increase network available bandwidth, reduce number of users per segment, and allow dedicated segments and the ability to interconnect those segments?
Switch
A specialized computer that connects other computers (mostly switches and other _______) together. On U.S. Navy ships, _______ mostly pass data to and from hosts that are “outside the lifelines”.
Router
Platform designed to attempt to provide customers with tools to protect intranet.
Firewall
A perimeter network segment that enforces the internal
networks information assurance policy for external information exchange.
De-militarized Zones (DMZ)
A computer connected to a computer network which may offer information resources, services, and applications to users or other nodes on the network.
Host
A server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers.
Proxy server
A computer attached to a network that has the primary purpose of providing a location for shared disk access, i.e. shared storage of computer files (such as documents, sound files, photographs, movies, images, databases, etc.) that can be accessed by the workstations that are attached to the computer network.
File server
The result of interconnecting computer networks with special gateways or routers to establish a global data communications system between computers.
Internet
A computer network that uses Internet Protocol technology to securely share any part of an organization's information or network operating system within that organization.
Intranet
Specification of which users or system processes are granted access to objects, as well as what operations are allowed on given objects.
Access Control List (ACL)
Assurance that information is not disclosed to unauthorized persons, processes, or devices. It includes both the protection of operational information and the protection of system information such as password or configuration files.
Confidentiality
Assurance that information is not modified by unauthorized parties or in an unauthorized
manner, supports the assurance that information is not accidentally or maliciously manipulated, altered, or corrupted, implies the ability to detect when information
has been altered.
Integrity
Assurance of the identity of an email message sender or receiver which supports the validation of e-mail messages and information system access requests.
Authentication
Assurance of timely, reliable access to data and information systems by authorized users. lA controls protect against degraded capabilities and denial of service conditions.
Availability
Assurance that the sender of data is provided with proof of delivery and the recipient is provided with proof of the sender's identity, so neither can later deny having processed the data.
Non-repudiation
Enforcement to maintain and transfer classified levels of different DoD/DoN resources and material.
Cross domain solution
Any type of computer network that is not connected by cables of any kind.
Wireless networking
The Internet Protocol Suite is the set of communications protocols used for the Internet and other similar networks. It is commonly also known as _______ named from two of the most important
protocols in it.
Transmission Control Protocol (TCP) and the Internet Protocol (IP) (TCP/IP)
A network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communications facility using a virtual terminal connection. User data is interspersed in-band with control information in an 8-bit byte oriented data connection over the Transmission Control Protocol (TCP).
Telnet
A standard network protocol used to transfer files from one host to another over a TCP-based network, such as the Internet.
File Transfer Protocol (FTP)
An application-layer Internet standard protocol used by
local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection.
Post Office Protocol (POP); The POP protocol has been
developed through several versions, with version 3 (POP3) being the current standard.
A networking protocol for distributed, collaborative,
hypermedia information systems and is the foundation of data communication for the World Wide Web.
Hypertext Transfer Protocol (HTTP)
An Internet standard for electronic mail (e-mail) transmission across Internet Protocol (IP) networks.
Simple Mail Transfer Protocol (SMTP)
A hierarchical naming system built on a distributed database for computers, services, or any resource connected to the Internet or a private network.
Domain Name System (DNS)
A combination of Hypertext Transfer Protocol (HTTP)
with SSL/TLS protocol. It provides encrypted communication and secure identification of a network
web server.
Hypertext Transfer Protocol Secure (HTTPS)
What is the process of measuring and controlling the communications (traffic, packets) on a network link, to avoid filling the link to capacity or overfilling the link, which would result in network congestion and poor performance of the network?
Bandwidth management
Refers to data that is not "moving."
Data at Rest (DAR)
This document outlines the vision for a robust and highly interconnected enterprise networking
capability in the 2016 timeframe to fully support the needs of our warfighters and warfighter-support
organizations and personnel.
NNE 2016 Roadmap
Relates to the delivery of services required by a business into live/operational use, and often encompasses the "project" side of IT rather than "BAU" (Business as usual).
Transition
Aims to align and realign IT Services to changing business needs by identifying and implementing
improvements to the IT services that support the Business Processes.
Continuous Service Improvement