Term
This PUBLICATION governs EKMS |
|
Definition
|
|
Term
This INSTRUCTION governs Safety and Mishap reporting. |
|
Definition
|
|
Term
This INSTRUCTION governs the SAPR Program. |
|
Definition
|
|
Term
This INSTRUCTION governs the Equal Opportunity policy. |
|
Definition
|
|
Term
This INSTRUCTION governs the IA Workforce |
|
Definition
|
|
Term
This INSTRUCTION governs the IA Workforce. |
|
Definition
|
|
Term
|
Definition
Identify HazardAssess HazardMake Risk DecisionsImplement ControlsSupervising |
|
|
Term
6 Areas that comprise Naval Doctrine |
|
Definition
CommunicationsOperationsWarfareLogisticsIntelCommand and Control |
|
|
Term
|
Definition
TacticalOperationalStrategic |
|
|
Term
7 Principles of Naval Logistics. |
|
Definition
ResponsivenessSimplicityFlexibilityEconomyAttainabilitySustainabilitySurvivability |
|
|
Term
|
Definition
ConfidentialityIntegrityAvailabilityNon-repudiationAuthentication |
|
|
Term
How many BCO sites fall under NCTSSD. |
|
Definition
|
|
Term
What does ANCC stand for and what is its purpose? |
|
Definition
Automated Network Control Center. Virtual Patch Panel. |
|
|
Term
What is the purpose of SSR-1? |
|
Definition
De-modulator and De-multiplexer for broadcast, and NOW terminal. |
|
|
Term
What antenna is on the roof of NCTSSD? |
|
Definition
|
|
Term
What is the difference between IDNX and ADNX? |
|
Definition
ADNX is a nest we cannot access physically and IDNX is a modem we can run loops on. |
|
|
Term
What does HBSS stand for? |
|
Definition
Host Base Security System |
|
|
Term
How often is OCRS checked and what does OCRS stand for? |
|
Definition
Daily and Online Compliance Reporting System |
|
|
Term
What is the function of HBSS? |
|
Definition
Monitor, Detects, and Counter against known cyber threats of DoD. |
|
|
Term
What does DAA stand for and what is the responsibility? |
|
Definition
Designated Accrediting Authority and Assumes overall responsibilities of Information System. |
|
|
Term
Three valid asset types in VMS and what does VMS stand for? |
|
Definition
ComputingNon- ComputingCNDSVulnerability Management System |
|
|
Term
What are the 3 ways to control bleeding? |
|
Definition
Pressure PointDirect PressureElevationTourniquet (last resort |
|
|
Term
|
Definition
C2 Capabilities and enterprise infrastructures |
|
|
Term
Define the following OPSIGSZBZ, ZUJ, ZEV, & ZUE? |
|
Definition
How do you see me?Stand byRequest acknowledgmentYes |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
SECURITY CONTAINER CHECK SHEET |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
List all the Fleets with their area of Responsibility. 2ND, 3RD, 4TH, 5TH, 6TH, 7TH, 10TH |
|
Definition
2nd Norfolk, VA. Atlantic3rd San Diego, CA. E Pac4th Mayport, FL. Caribbean, Central, S America5th Bahrain. Indian Ocean6th Italy. Mediterranean and Black Sea7th Japan. W Pac and Indian Ocean10th Ft Meade MD. World Wide |
|
|
Term
Discuss the CONCEPT of ORM |
|
Definition
ORM is a tool used to make informed decisions by providing the best baseline of knowledge and experience available. |
|
|
Term
HAZARD SEVERITY CATAGORIES |
|
Definition
Category I - The hazard may cause death, loss of facility/asset or result in grave damage to national interests.
Category II - The hazard may cause severe injury, illness, property damage, damage to national or service interests or degradation to efficient use of assets. Category III - The hazard may cause minor injury, illness, property damage, damage to national, service or command interests or degradation to efficient use of assets.
Category IV - The hazard presents a minimal threat to personnel safety or health property, national, service or command interests or efficient use of assets. |
|
|
Term
Discuss the timeliness and means for filing mishap investigations reports. |
|
Definition
All mishap reports must be submitted within 30 days of mishap occurrence. OR Notify their chain of command and COMNAVSAFECEN, of all on duty DoD civilian and all on and off-duty military Class A mishaps, and any mishaps that result in the hospitalization of three or more personnel, within eight hours of the mishap by telephone or electronic means. |
|
|
Term
Purpose of a HAZREP message |
|
Definition
discovering a hazardous condition or experiencing a near-mishap to alert COMNAVSAFECEN |
|
|
Term
State the three objectives of first aid. |
|
Definition
Save Life Prevent further injury Prevent Infection |
|
|
Term
three methods of controlling bleeding. |
|
Definition
Direct Pressure Elevation Pressure Points Tourniquet (LAST RESORT!!) |
|
|
Term
How many pressure points? |
|
Definition
|
|
Term
|
Definition
Hazards from electromagnetic radiation to ordinance |
|
|
Term
|
Definition
Hazards from electromagnetic radiation to personnel |
|
|
Term
|
Definition
Hazards from electromagnetic radiation to fuels |
|
|
Term
|
Definition
, may pose a substantial hazard to human health or the environment |
|
|
Term
Seven Principles of Naval Logistics |
|
Definition
Responsiveness: Simplicity: Flexibility:Economy: Attainability: Sustainability: Survivability: |
|
|
Term
First Navy Ship named after an Enlisted man |
|
Definition
|
|
Term
Conditions that led to the Formation of the U.S. Navy |
|
Definition
The U.S. Navy was born on 13 October 1775. On this date the Second Continental Congress authorized the purchase of two vessels because of the English passing tax laws on the states. "Taxation without representation" |
|
|
Term
What 3 Classes of Naval Vessels existed at inception of the U.S. Navy |
|
Definition
Ships-of-the-line
Frigates Sloops-of-war |
|
|
Term
|
Definition
21 guns is fired on Washington's Birthday, Memorial Day, and Independence Day, and to honor the President of the United States and heads of foreign states. Salutes are fired at intervals of 5 seconds, and always in odd numbers. |
|
|
Term
|
Definition
world's first carrier verses carrier battle. |
|
|
Term
|
Definition
The largest amphibious operation in history. |
|
|
Term
|
Definition
The U.S. sank 3 Japanese carriers. The next day the fourth carrier was sunk. Japanese planes sank the Yorktown. |
|
|
Term
|
Definition
U.S. secured the island of Guadalcanal from the Japanese. With the fall of the island, the southern Solomons came under Allied control and Australia was in less danger of attack. |
|
|
Term
Attack on the USS LIBERTY |
|
Definition
Isreali Air Force jet fighter aircraft and motor torpedo boats of the Israeli Navy attacked USS Liberty in international waters. |
|
|
Term
The Attack on the USS PUEBLO |
|
Definition
Attacked and still held by north Korea |
|
|
Term
Hainan Island EP-3 Incident |
|
Definition
April 1, 2001, a mid-air collision between a US Navy EP-3E surveillance aircraft and a J-8II interceptor fighter jet resulted in an international dispute between the United States and China. 24 crew members held. |
|
|
Term
|
Definition
WWII, Bletchley Park was the site of the United Kingdom’s main decryption establishment, the Government Code and Cypher School. |
|
|
Term
|
Definition
Code talkers transmitted messages over military telephone and radio nets using their native language during WWII; a code that the Japanese never broke. |
|
|
Term
|
Definition
1987 during the Iran-Iraq war, an Iraqi jet fighter fired missiles at the USS Stark; killing 37, wounding 21. |
|
|
Term
State the qualities that characterize the Navy/Marine Corps team |
|
Definition
Readiness Flexibility Self-sustainability Mobility |
|
|
Term
State the Three Levels of War |
|
Definition
Tactile, Operational, Strategic |
|
|
Term
State when and why the Navy Core Values were developed |
|
Definition
Admiral Kelso (1992) adopted the Navy Core Values to provide principles to guide our Sailors. |
|
|
Term
Discuss when and why the Sailor’s Creed was developed |
|
Definition
The “Sailor’s Creed” was written in 1993 at the direction of CNO Admiral Frank Kelso. |
|
|
Term
: State RADM Grace Hopper’s contributions to the U.S. Navy |
|
Definition
Her work on compilers and on Making machines understand Ordinary language instructions led Ultimately to the development of the Business language COBOL. |
|
|
Term
State the name of The First Computer and where it was located |
|
Definition
ENIAC, University of Pennsylvania |
|
|
Term
|
Definition
World's first operational packet switching network, and the predecessor of the contemporary global Internet. |
|
|
Term
John Walker espionage case |
|
Definition
retired United States Navy Chief Warrant Officer and communications specialist convicted of spying for the Soviet Union, |
|
|
Term
State the Oldest Intelligent Organization in the U.S. Navy |
|
Definition
|
|
Term
: Name the two Departments that were combined to form the ONI |
|
Definition
Department Library was combined with the “Office of Intelligence |
|
|
Term
State the mission of the U. S. Navy. |
|
Definition
Maintain, train and equip combat-ready Naval forces capable of winning wars |
|
|
Term
|
Definition
Direct the operations and security of the Navy's portion of the Global Information Grid (GIG). |
|
|
Term
|
Definition
Little Creek, VA, To organize and prioritize, training, modernization, and maintenance, requirements, and Capabilities of command and control architecture/networks, cryptologic and space-related systems and intelligence and information operations activities, |
|
|
Term
|
Definition
Navy's meteorological and oceanographic experts |
|
|
Term
|
Definition
Conduct Information Operations (IO) using foreign language skills |
|
|
Term
|
Definition
Preventive and corrective maintenance on electrical and electronic cryptologic and ancillary systems |
|
|
Term
|
Definition
Monitor, identify, collect and analyze information |
|
|
Term
|
Definition
Collect, analyze and exploit signals of interest to identify, locate and report worldwide threats; |
|
|
Term
|
Definition
Operate and maintain electronic sensors and computer systems |
|
|
Term
|
Definition
Analyze intelligence data |
|
|
Term
|
Definition
Perform core and specialty functions of Communications Operations, Message Processing, Network Administration and Security |
|
|
Term
How many NCTAMS and where. |
|
Definition
2, NCTAMS LANT (Norfolk, VA) NCTAMS PAC (Wahiawa, HI) |
|
|
Term
|
Definition
Command, control, and surveillance |
|
|
Term
State the mission of the NCDOC |
|
Definition
Naval Cyber Defense Operations Command(NCDOC) - Little Creek, Va. Provide Twenty-four seven security and defend Navy networks worldwide |
|
|
Term
DIA-Defense Intelligence Agency- |
|
Definition
oversight of the Department of Defense Intelligence Production Program (DODIPP), under which all-source intelligence is produced for use by both policymakers and commanders. |
|
|
Term
NSA-National Security Agency- |
|
Definition
Unified organization structured to provide for the signals intelligence (SIGINT) mission of the United States |
|
|
Term
CIA-Central Intelligence Agency- |
|
Definition
Primary areas of expertise are in HUMINT collection |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
NCTS COMMAND MASTER CHIEF |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
NCTS INFO ASSURANCE MANGR |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Principal defense advisor to President. Formulation of general defense policy (Robert Gates) |
|
|
Term
Secretary of the Navy (SECNAV). |
|
Definition
Maintains the policies and control of DON. (Ray Mabus) |
|
|
Term
Chief of Naval Operations (CNO). |
|
Definition
|
|
Term
Master Chief Petty Officer of the Navy (MCPON) |
|
Definition
Serves as senior enlisted representative of the Navy. (Master Chief Petty Officer Rick D. West) |
|
|
Term
|
Definition
DISA’s Command Cyber Readiness Inspection Holds commanders accountable for their respective security posture |
|
|
Term
|
Definition
A monthly statement of an activity’s enlisted personnel account. It lists all individuals assigned to the activity |
|
|
Term
|
Definition
Activity Manpower Document (AMD) lists in one document all the Requirements and Authorizations in a specific Activity. |
|
|
Term
|
Definition
Dependency application/record of emergency data. |
|
|
Term
|
Definition
Navy Occupation/Training and Awards History. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Message required if the incident is considered to be "major."
*** If not major it is a OPREP# UNIT SITREP |
|
|
Term
List of Enlisted to Officer Programs |
|
Definition
Seaman to Admiral (STA-21 Program) Limited Duty Officer (LDO) Chief Warrant Officer Program (CWO) Navy Officer Candidate School (OCS) Medical Enlisted Commissioning Program (MECP) Medical Service Corps In-Service Procurement (MSC IPP) |
|
|
Term
Explain what the DLPT is: |
|
Definition
Defense Foreign Language Program provides determination of the most effective means of fulfilling total Department of Defense (DOD) foreign language training requirements. |
|
|
Term
Describe the six programs of Brilliant on the Basics: |
|
Definition
Career Development Boards
Sponsorship
Mentorship
Sailor Recognition
Command Indoctrination
Command Ombudsmen support |
|
|
Term
Discuss the purpose of the 3-M/PMS System |
|
Definition
MAINTAIN EQUIPMENT AT ITS MAXIMUM OPERATING EFFICIENCY BY REDUCING DOWNTIME |
|
|
Term
|
Definition
DEFENSE PROPERTY ACCOUNTABILITY SYSTEM |
|
|
Term
|
Definition
MATERIAL OBLIGATION VALIDATION PURPOSE IS TO ENSURE OVERAGED MATERIAL OBLIGATIONS REFLECTED IN THE INVENTORY. |
|
|
Term
|
Definition
REMAIN-IN-PLACE),PART HAS TO REMAIN IN THE EQUIPMENT UNTIL THE RFI PART HAS BEEN RECEIVED. |
|
|
Term
|
Definition
MAINTENANCE ASSIST MODULES ARE USED FOR TROUBLESHOOTING OF EQUIPMENT |
|
|
Term
Define the term CASREP and explain the four categories. |
|
Definition
(CASUALTY REPORT), REPORT DESIGNED TO IDENTIFY THE PARTS REQUIRED TO BE REPAIRED FOR FAULTY EQUIPMENT.
4 CATEGORIES: CAT 1 CAT 2 CAT 3 CAT 4 |
|
|
Term
Define the following Terms: NSN: COG: APL: AEL: NC: NIS: SIM: |
|
Definition
NSN: NATIONAL STOCK NUMBER B. COG: COGNIZANCE OF NAVY MATERIAL C. APL: ALLOWANCE PARTS LIST D. AEL: ALLOWANCE EQUIPAGE LIST E. NC: NOT CARRIED F. NIS: NOT IN STOCK G. SIM: SELECTED ITEM MANAGEMENT |
|
|
Term
|
Definition
DEFENSE REUTILIZATION MARKETING SERVICE, DISPOSING SITE OF EXCESS MATERIAL PURCHASED FOR MILITARY SERVICES |
|
|
Term
|
Definition
OPERATING TARGET: FISCAL YEAR FUNDS GRANTED BY THE TYPE COMMANDER FOR EACH COMMAND TO OBTAIN MATERIALS AND SERVICES NECESSARY FOR OPERATIONS COMPONENTS: |
|
|
Term
Dicuss Normal Power; Emergency Power, Uniterupted power |
|
Definition
NORMAL POWER – PRIMARY SOURCE OF POWER. EMERGENCY POWER – BACKUP SOURCE OF POWER. UNINTERUPTED POWER – TEMPORARY SOURCE OF POWER WHILE SWITCHING FROM PRIMARY TO BACKUP OR TO ALLOW TIME TO SAFELY SHUT DOWN EQUIPMENT DURING A LOSS OF POWER. |
|
|
Term
DISCUESS TYPES OF INVESTIGATIONS FOR CLEARANCES: |
|
Definition
Top Secret. The investigative basis for Top Secret clearance eligibility is a favorably completed SSBI: EVERY 5 YEARS Secret/Confidential. The investigative basis for Secret or Confidential clearance eligibility is a favorably completed NACLC or ANACI. (10 YEARS) Sensitive Compartmented Information (SCI). The investigative requirement for access to SCI is a favorably adjudicated SSBI. (5 YEARS) |
|
|
Term
WHAT LIFE EVENTS SHOULD BE MENTIONED TO THE SECURITY OFFICER |
|
Definition
Financial issues. Legal issues. U/A. Mental Illness. Marriage to a foreign national.. Anything that could question your character, integrity, physical and mental health needs to be reported. |
|
|
Term
State when safe combinations should be changed |
|
Definition
A combination lock is first installed or used b. A combination has been subjected, or believed to have been subjected to compromise; and when considered necessary by the CSA. c. Every 2 years safe and container combinations should be changed at a minimum |
|
|
Term
State the responsibilities of the TSCO. |
|
Definition
Maintain a system of accountability (e.g., registry) to record the receipt, reproduction, transfer, transmission, downgrading, declassification and destruction of command Top Secret information. E-7 OR ABOVE. |
|
|
Term
Who can give the order for Emergency Destruction |
|
Definition
|
|
Term
State the duties and responsibilities of a CSM. (Command Security Manager) |
|
Definition
Serve as the principal advisor and representative to the commanding officer in matters pertaining to the classification, safeguarding, transmission, and destruction of classified information. |
|
|
Term
difference between a security violation and a practice dangerous to security. |
|
Definition
Security Violation – a compromise of classified info to persons not authorized to receive it or a serious failure to comply with the provisions of security regulations on this manual which is likely to result in a compromise. A security violation requires investigation.
PDS – A failure to comply with the provisions of security regulations or this manual which causes a potential compromise of classified information |
|
|
Term
|
Definition
Measures and controls that ensure confidentiality, integrity, and availability of the information processed and stored by a computer. |
|
|
Term
How long a Commanding Officer can administratively suspend access before DONCAF revokes a clearance. |
|
Definition
|
|
Term
|
Definition
device for connecting multiple twisted pair or fiber optic Ethernet devices together and making them act as a single network segment. |
|
|
Term
|
Definition
Is a computer networking device that connects network segments. |
|
|
Term
|
Definition
Is a device that interconnects two or more computer networks, |
|
|
Term
What does NIPRNET stand for? |
|
Definition
Non-classified Internet Protocol Router Network (NIPRNet) |
|
|
Term
What does SIPRNET stand for? |
|
Definition
Secret Internet Protocol Router Network (SIPRNet) |
|
|
Term
What does JWICS stand for? |
|
Definition
Joint Worldwide Intelligence Communications System. TOP SECRET Network |
|
|
Term
|
Definition
initiative to install a common and secure IT infrastructure to OCONUS Navy locations. |
|
|
Term
Describe the functionality of PKI. |
|
Definition
Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. |
|
|
Term
|
Definition
2400 baud full duplex interface, over a satellite link with mobile platforms, for the receipt and transmission of narrative message traffic between FMX and mobile platforms |
|
|
Term
|
Definition
(Automated Message Store and Forward ) EAMs, FIFO |
|
|
Term
|
Definition
a real-time procedure which brings to the immediate attention of circuit operators the fact that an EEFI (Essential Elements of Friendly Information) disclosure has (or may have) occurred. |
|
|
Term
|
Definition
River City conditions provide procedures to control outgoing paths from ships and shore systems (e-mail, web browsing, POTS, cell phones) for the purpose of OPSEC and forceprotection. |
|
|
Term
|
Definition
a. R - Routine (6 hours) b. P - Priority (3 hours) c. O - Immediate (30 Minutes) d. Z - Flash (As fast as possible with an objective of less than 10 minutes) e. W - Flash Override (3 Minutes |
|
|
Term
the purpose of an OPTASK COMMS. |
|
Definition
The OPTASK COMMS message is the means used by which the United States Navy and Allied Navies distribute afloat communications plans. |
|
|
Term
|
Definition
Control of compromising emanations from telecommunications |
|
|
Term
State the purpose of Emissions Control (EMCON). |
|
Definition
EMCON is control of all electromagnetic and acoustic radiations, including communications, radar, EW and sonar. |
|
|
Term
|
Definition
ASW(Anti-Submarine Warfare |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
(Strike Warfare): Naval operations to destroy or neutralize enemy targets ashore |
|
|
Term
Define the roles of the U.S. Navy Blue |
|
Definition
The group responsible for defending an enterprise’s use of information systems by maintaining its security posture against a group of mock attackers (i.e., the Red Team). |
|
|
Term
Define the roles of the U.S. Navy Red Teams. |
|
Definition
A group of people authorized and organized to emulate a potential adversary’s attack or exploitation capabilities against an enterprise’s security posture. |
|
|
Term
Explain the purpose of FES (Fleet Electronic Support). |
|
Definition
Responsible for the installation, removal, maintenance and repair of Cryptologic Direct Support Element (CDSE) electronic equipment |
|
|
Term
|
Definition
The Joint Deployable Intelligence Support System (JDISS) program provides a family of hardware and software capabilities that allow connectivity and interoperability with intelligence systems supporting forces, in garrison, and deployed during peace, crisis, and war. |
|
|
Term
|
Definition
systematic, proven process that identifies, controls, and protects generally sensitive but unclassified information about a mission, operation, or activity. |
|
|
Term
Five step planning process for OPSEC. |
|
Definition
IDENTIFY CRITICAL INFORMATION- THREAT ASSESSMENT – STEP THREE: VULNERABILITY ANALYSIS- STEP FOUR: RISK ASSESSMENT- STEP FIVE: MEASURES/COUNTERMEASURES- |
|
|
Term
|
Definition
Web Risk Assessment:
Scan a website a determine if there are any OPSEC related vulnerabilities. |
|
|
Term
State The Purpose of INTEL |
|
Definition
- Identifying Centers of Gravity and Critical Vulnerabilities: Provide an accurate picture of the battle space from which we can identify clear and attainable objectives |
|
|
Term
Six Steps of Intelligence |
|
Definition
STEP 1:Planning and Direction: Identification and need for intelligence by the commander’s PIRs(Priority Intelligence Requirements)
STEP 2: Collection: Tasking appropriate collection assets and/or resources to acquire the data and information required to satisfy collection objectives
STEP 3: Processing and Exploitation: Raw data is transformed into information, used by analysts to produce multidiscipline intelligence products
STEP 4: Analysis and Production: Integrating, evaluating, analyzing, and interpreting information from single or multiple sources into a finished intelligence product
STEP 5: Dissemination and Integration: Intelligence is integrated into the decision-making and planning processes; intelligence may be immediately communicated if situations warrant
STEP 6: Evaluation and Feedback: Continuous evaluation streamlines the process to improve performance |
|
|
Term
|
Definition
concerns plans and intentions of foreign entities, and serves as the basis for the national military strategy. |
|
|
Term
Operational Intelligence: |
|
Definition
Intelligence required for planning and conducting campaigns and major operations |
|
|
Term
|
Definition
Intelligence required for the planning and conduct of tactical operations. |
|
|
Term
|
Definition
is an individual born in the US; an individual whose parent is a US citizen |
|
|
Term
|
Definition
an alien lawfully admitted for permanent residence; |
|
|
Term
|
Definition
Human intelligence is derived from information collected and provided by human sources |
|
|
Term
|
Definition
Signals Intelligence is derived from communications, electronic, and foreign instrumentation signals |
|
|
Term
|
Definition
magery Intelligence is technical, geographic, and intelligence information derived through the interpretation or analysis of imagery |
|
|
Term
Define each band of the electromagnetic spectrum |
|
Definition
30 GHZ - 300 GHZ extremely high frequency 3 GHZ - 30 GHZ superhigh frequency 300 MHZ - 3 GHZ ultrahigh frequency 30 MHZ - 300 MHZ very high frequency 3 MHZ - 30 MHZ high frequency 300 KHZ - 3 MHZ medium frequency 30 KHZ - 300 KHZ low frequency 3 KHZ - 30 KHZ very low frequency 300 HZ - 3 KHZ voice frequency Up to 300 HZ extremely low frequency |
|
|
Term
|
Definition
process where multiple analog message signals or digital data streams are combined into one signal over a shared medium |
|
|
Term
|
Definition
The difference between the highest usable frequency of a device (upper frequency limit) and the lowest usable frequency of the device |
|
|
Term
|
Definition
Keying - Inserting noise or data onto a frequency |
|
|
Term
Name the layers of the Ionosphere |
|
Definition
The ionosphere is composed of three layers designated D, E, and F, from lowest level to highest level. |
|
|
Term
|
Definition
operationally relevant information such as the location, movement, employment, tactics, and activity of foreign non-communications emitters and their associated weapon systems. |
|
|
Term
|
Definition
concerned with the technical aspects of foreign non-communications emitters such as signal characteristics, modes, functions, associations, capabilities, limitations, vulnerabilities, and technology levels. |
|
|
Term
|
Definition
one-way flow of information between terminals. |
|
|
Term
|
Definition
The full-duplex (fdx) mode is a method of operation in which telecommunications between stations takes place simultaneously in both directions |
|
|
Term
|
Definition
Communications is in one direction only. |
|
|
Term
Naval Oceanographic Office (NAVO) |
|
Definition
maximizes sea power by applying relevant oceanographic knowledge in support of National Security. |
|
|
Term
|
Definition
low atmospheric pressure, originating over tropical waters, which blows counter-clockwise around a center at speeds less than 34-knots. |
|
|
Term
|
Definition
low atmospheric pressure, originating over tropical waters, which blows counter-clockwise around a center at speeds 34-63-knots. |
|
|
Term
|
Definition
low atmospheric pressure with numerous thunderstorms that produce strong winds and heavy rain. Originates over tropical waters, which blows counter-clockwise around a center at speeds greater than 63-knots. |
|
|
Term
Ocean Eddies (hot & cold) Explain: |
|
Definition
Cold: Occurs when a pocket of cold water breaks off from a cold current and travels counter-clockwise into warmer ocean waters. Warm: Occurs when a pocket of warm water breaks off from a warm current and travels clockwise into the colder ocean waters. |
|
|
Term
Name the 4 types of tides: |
|
Definition
Ebb: currents that flow away from the shore. Flood: currents that flow toward the shore. High: When the sea level is at its highest point. Low: When the sea level is at its lowest point. |
|
|
Term
How does Temp affect sound in water? |
|
Definition
An increase in water temperature increases the speed of sound through water and vice versa. |
|
|
Term
|
Definition
Harbor and inland waters warning for sustained winds of 34 to 47 knots |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Operations to ensure freedom of action in space for the US and its allies. |
|
|
Term
What has the biggest effect on space environment? |
|
Definition
|
|
Term
|
Definition
Solar wind is electrically charged particles that stream continuously from the Sun. |
|
|
Term
How many year cycle does the sun have? |
|
Definition
|
|
Term
How far above is a Low Earth Orbit. |
|
Definition
Between approximately 100 and 420 miles above the Earth's surface. |
|
|
Term
How far above is a Medium Earth Orbit |
|
Definition
Between approximately 450 and 10,000 miles above the Earth’s surface. |
|
|
Term
|
Definition
°. A satellite in this type of highly eccentric elliptical orbit slows down at apogee in the Northern Hemisphere (providing longer duration over its greatest field of view) and whips through perigee (smallest field of view) in the Southern Hemisphere. |
|
|
Term
|
Definition
Stated more simply, the satellite would have a period approximately equal to one day (24 hours.) This is the typical orbit of most communications satellites, (i.e. MILSTAR, UFO-E/EE, CWSP, DSCS) |
|
|
Term
|
Definition
Due to the ability to pass over the entire surface of the earth throughout the course of several days, the polar orbit is used extensively by imagery satellites. |
|
|
Term
|
Definition
point on the orbit farthest from the center of the Earth |
|
|
Term
|
Definition
The point closest to the center of the Earth |
|
|
Term
Defense Satellite Communications System: |
|
Definition
(DSCS) is a high capacity, SHF satellite based subsystem of the Defense Communications System (DCS). The DCS provides worldwide, jam-resistant, secure voice and high data rate communications for command and control, crises management, and intelligence data transfer service |
|
|
Term
|
Definition
A branch of astronomy that deals with measurements (as of positions and movements) of celestial bodies. |
|
|
Term
Each invalid PLA will receive a RI of: |
|
Definition
|
|
Term
|
Definition
Code identifying the station |
|
|
Term
DSRI (Destination Routing Indicator): |
|
Definition
Consists of a six or seven character code identifying the station or system the message will be delivered to upon receipt by Autodin |
|
|
Term
Each of these four sites has at least three CUDIXS suites and the capability to operate two full and one "mini" configuration simultaneously: |
|
Definition
NCTAMS PAC NCTAMS LANT NCTS GUAM NCTS Naples |
|
|
Term
|
Definition
Broadcast Control Authority – Administers Broadcast |
|
|
Term
|
Definition
|
|
Term
|
Definition
Broadcast Controlling Station |
|
|
Term
|
Definition
Broadcast Radiating Station |
|
|
Term
|
Definition
UARNOC – Unified Atlantic Network Operations Center NCTAMS LANT, Norfolk, Virginia PRNOC – Pacific Region Network Operations Center –NCTAMS PAC, Wahiawa, Hawaii ECRNOC – Eastern Central Network Operations Center NCTS Naples, Naples, Italy IORNOC – Indian Ocean Region Network Operations Center NCTS Bahrain, Manama, Bahrain |
|
|
Term
Name a few services provided by the NOC: |
|
Definition
Premise Router Outer Security Screening Router Firewall Inner Security Screening Router Service Switch Virus Scanners DNS Mail Servers Fleet Router Tunnel Router |
|
|
Term
If a FLTNOC is unable to utilize their DISN connection, their outbound network traffic will automatically be diverted to where? |
|
Definition
across the HSGR to another FLTNOC to utilize their DISN path. |
|
|
Term
Who is the controlling authority for Navy Firewall Policies. |
|
Definition
Naval Network Warfare Command ( NAVNETWARCOM) |
|
|
Term
Collaboration at Sea, CAS: |
|
Definition
CAS is a tool set that allows users to share knowledge and information around the world using minimum bandwidth |
|
|
Term
|
Definition
Joint Fleet Telecommunications Operations Center. 24-7 One Stop Shop for C5I Needs. (C5I = Command, Control, Communications, Computers, Collaboration, Intelligence). |
|
|
Term
Communications Assist Team (CAT) |
|
Definition
A group of listed technical experts (both military and civilians) routinely perform on-site communications training |
|
|
Term
NCTS – Naval Computer Telecommunications Station: |
|
Definition
They are subordinate to their corresponding area master station and provide support services in their corresponding local area and work to inter-connect the NCTAMS to the global communications grid. |
|
|
Term
|
Definition
|
|
Term
SAR in days for INMARSAT: |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Connection point for each NOC to the DISN network |
|
|
Term
|
Definition
Scans inbound and outbound emails and attachments for viruses. |
|
|
Term
|
Definition
DNS and Email (SMTP) store and forwarding services. |
|
|
Term
Institute of Electrical & Electronics Engineers IEEE: |
|
Definition
International non-profit, professional organization for the advancement of technology related to electricity. |
|
|
Term
|
Definition
Network tool used to show the route taken by packets across an IP network |
|
|
Term
CANES Consolidate Afloat Network and Enterprise Services: |
|
Definition
A program that consolidates the ever-expanding number of non-tactical networks aboard Navy ships. |
|
|
Term
Describe the 3 types of EKMS incidents: |
|
Definition
Cryptographic (Use of COMSEC keying material that is compromised, superseded, defective, or previously used and not authorized for reuse) Personnel (Defection, espionage, capture by enemy) Physical (Physical loss of COMSEC material, unauthorized access to COMSEC material, COMSEC material found outside of required accountability or physical control, failure to maintain TPI) |
|
|
Term
State how often ISIC COMSEC inspections are required: |
|
Definition
ISICs must conduct unannounced EKMS Inspections of their subordinate commands and units every 24 months. |
|
|
Term
State how often CMS Advise and Assist visits are required: |
|
Definition
CMS A&A Visits are required every 18 months. |
|
|
Term
State how often a CO is required to conduct a CMS inspection. |
|
Definition
The CO is required to conduct a CMS inspection Quarterly. |
|
|
Term
|
Definition
US Navy‘s standard UHF satellite terminal and Line-Of-Sight (LOS) transceiver. |
|
|
Term
DAMA – Demand Assigned Multiple Access: |
|
Definition
The TD-1271B/U Multiplexer (DAMA) is used in the DAMA subsystem and provides time-division multiplexing of several digital data sources over one satellite channel. |
|
|
Term
DRSN – Defense Red Switched Network. |
|
Definition
This global, secure voice service provides the President, Secretary of Defense, Joint Chiefs of Staff, combatant commanders and selected agencies with command and control secure voice and voice-conferencing capabilities up to the Top Secret SCI level. |
|
|
Term
NCTS Operational COC: NCTS Admin COC: |
|
Definition
CNO, FLTFORCOM, NAVNETWARCOM, NCTAMSPAC CNO, FLTFORCOM, NAVNETWARCOM, NCTAMSPAC, COMNAVREG SW |
|
|
Term
|
Definition
To provide secure and reliable, classified and unclassified voice, messaging, video and data telecommunications to surface, subsurface, air and ground forces in support of command, control, communications |
|
|
Term
Enlisted commissioned Program: |
|
Definition
Program is an undergraduate education program that offers the opportunity to complete requirements for a baccalaureate degree and become a commissioned officer. |
|
|
Term
Who sets the guidelines for the number and type of personnel at each command? |
|
Definition
|
|
Term
Any changes to the manpower at a command must be requested by submitting what form? |
|
Definition
|
|
Term
Two documents used for Manning at a command: |
|
Definition
Activity Manning Document
Enlisted Distribution Verification Report |
|
|
Term
Information that can be found on an EDVR: |
|
Definition
NAME RATE RANK NEC SSN ADSD EAOS |
|
|
Term
|
Definition
Officer Distribution Control Report |
|
|
Term
What instruction covers Evals? |
|
Definition
|
|
Term
What dates are evals due to E1-E6: |
|
Definition
E6 – NOVEMBER 15 E5 – MARCH 15 E4 – JUNE 15 E3 AND BELOW – JULY 15 |
|
|
Term
Highest award a CO can give: |
|
Definition
|
|
Term
Overseas screening has to be completed in how many days? |
|
Definition
|
|
Term
Explain the roles of Logistics Support Division to NCTS: |
|
Definition
N45 Supply is responsible for the procurement, tracking, expediting, receipt, shipping and transfer of excess materials. |
|
|
Term
What are the two ways of procurement? |
|
Definition
Standard Stock Purchase Open Market Purchase |
|
|
Term
What does MILSTRIP stand for? |
|
Definition
Military Standard Requisitioning & Issue Procedures. MILSTRIP is used for ordering all material from the Navy Supply System. |
|
|
Term
What does it mean when your NIIN starts with 00 & 01? |
|
Definition
United States codes as per the standardization agreement with NATO. |
|
|
Term
Discuss the Depot Level Repairable (DLR) program? |
|
Definition
DLRs are those Navy managed items which, based on unit cost, annual demand, difficulty of repair, or other economic considerations, have been selected by cognizant inventory managers for special inventory control. |
|
|
Term
|
Definition
A RIP chit is to be signed by Department Head and Commanding Officer. An approved copy will is to be posted to the PRF together with the NSN, unit price, standard price, and COG. |
|
|
Term
Explain the components of the nation Stock Number format? |
|
Definition
The first four digits are called FSC (Federal Supply Classification) The nine digits there on are called NIIN (National Item Identification Number) 13 digits total |
|
|
Term
|
Definition
|
|
Term
Describe equipment on watchfloor of immediate concern to Technical Support Division. |
|
Definition
EHF Terminals AN/SSR-1 AN/FCC-100(V)9 Automated Network Control Center (ANCC) |
|
|
Term
The Navy’s standard SATCOM broadcast receiver system consists of: |
|
Definition
AS-2815/SSR-1 receiving antenna. AM-6534/SSR-1 Amplifier-Converter. (1 for each antenna) MD-900/ SSR-1 Combiner-Demodulator. TD-1063/SSR-1 Demultiplexer. |
|
|
Term
2 tag outs, describe each: Yellow: Red: |
|
Definition
A yellow tag used as a precautionary measure to provide temporary special instruction. A red tag prohibiting operation or removal of equipment that could jeopardize safety |
|
|
Term
What is the Maintenance Data System (MDS)? |
|
Definition
MDS is the means by which maintenance personnel can report applicable maintenance requirements and configuration changes on all categories of equipment. |
|
|
Term
What is the lead time you need prior to visiting NCTS: |
|
Definition
|
|
Term
There are five different types of alarms at NCTSSD. |
|
Definition
Manual Pull Alarms Zone (4) Alarm on the fire Alarm Control Panel Zone (14) Halon Panel Alarm Moisture Alarm UPS Alarm |
|
|
Term
HOW MANY DOORS IN BLDG 1482 |
|
Definition
There are 16 interior doors and 6 exterior doors at NCTS. |
|
|
Term
3 types of Supersession of EKMS: |
|
Definition
REGULAR: based on specific, pre-determined dates IAW the Controlling Authority.
IRREGULAR: NOT pre-determined but occurs as a result of use. Destroy when used operationally or when the Controlling Authority directs.
EMERGENCY: unplanned change; usually a result of compromise directed by the Controlling Authority. |
|
|
Term
IAM (Information Assurance Manager): |
|
Definition
principal advisor on information and personnel security within the command. |
|
|
Term
|
Definition
5510.36A(Information Security Program)- establishes uniform Information Security Program policies and procedures. |
|
|
Term
Discuss the significance of having the training and certification program for IA workforce: |
|
Definition
IA certification programs are intended to produce IA personnel with the demonstrated ability to perform the functions of their assigned position. |
|
|
Term
Online Compliance Reporting System (OCRS) |
|
Definition
reporting tool to document the compliance of corporate and POR assets with released vulnerabilities. |
|
|
Term
IAVA – Information Assurance Vulnerability Advisory: |
|
Definition
Addresses sever network vulnerabilities resulting in immediate and potential severe threats to DOD systems and information. |
|
|
Term
IAVB – Information Assurance Vulnerability Bulletin |
|
Definition
New vulnerabilities that do not pose an immediate risk to DOD systems |
|
|
Term
IAVTA – Information Assurance Vulnerability Technical Advisory |
|
Definition
Addresses new vulnerabilities that are generally categorized as low risk to DOD systems. |
|
|
Term
CTO – Computer Tasking Order |
|
Definition
Address immediate threats extremely critical to the overall security of the GIG. |
|
|
Term
|
Definition
Formal declaration by a Designated Approving Authority (DAA) that an IT system is compliant with establish security requirements |
|
|
Term
|
Definition
Measure of confidence that the security features, practices, procedures and architecture of an IS accurately mediates and enforces the security posture. |
|
|
Term
|
Definition
Comprehensive evaluation of the technical and non-tactical security features of an IS and other safeguards made in support of the accreditation process |
|
|
Term
Certification Test and Evaluation (CT&E)– |
|
Definition
Software and hardware security tests conducted during the development of the IS. |
|
|
Term
DoD Information Technology Security Certification and Accreditation Process (DIACAP)– |
|
Definition
The standard DoD process for identifying information security requirements, providing security solutions, and managing IS security activities. |
|
|
Term
|
Definition
Authorization granted by a DAA for a site or system to process, store, or transmit information. |
|
|
Term
|
Definition
A collection of updates, fixes and/or enhancements to a software program delivered in the form of a single installable package. |
|
|
Term
|
Definition
Refers to a weakness in a system’s security scheme |
|
|
Term
|
Definition
Circumstances, events, or people with the potential to cause harm to a system. |
|
|