Term
|
Definition
Operational Risk Management is a tool for making smart decisions regarding anticipated hazards and is usable by people at all levels |
|
|
Term
|
Definition
Identify the Hazards Assess the Hazards Make Risk Decisions Implement Controls Supervise |
|
|
Term
Categories of hazard severity |
|
Definition
|
|
Term
|
Definition
Loss of ability to accomplish mission, Death, permanent disability, major facility damage, severe environmental damage |
|
|
Term
|
Definition
Significant degraded mission, permanent partial disability, extensive damage to equipment or systems. |
|
|
Term
|
Definition
Degraded mission capability, minor damage to equipment, systems, property, environment |
|
|
Term
|
Definition
Little or no adverse impact on mission. Slight equipment damage but fully functional and serviceable. |
|
|
Term
Categories of mishap probablility |
|
Definition
|
|
Term
|
Definition
Likely to occur, immediately or within a short |
|
|
Term
|
Definition
Probably will occur in time. Expected to occur several times to an individual item or person |
|
|
Term
|
Definition
May occur in time. Can reasonably be expected to occur some time to an individual item or person, or several times over a service life for an invetory of items. |
|
|
Term
|
Definition
Unlikely to occur, but not impossible |
|
|
Term
|
Definition
|
|
Term
Purpose of a HAZREP message |
|
Definition
submitted when the elimination and control of a given hazard has community-wide implication in reducing mishaps. Providing information on problems with widespread relevance will help reduce mishaps. |
|
|
Term
Three primary tasks for first aid |
|
Definition
Maintain breathing Stop Bleeding Prevent or Treat Shock |
|
|
Term
Three methods to control bleeding |
|
Definition
Direct Pressure Pressure Points Tourniquet |
|
|
Term
|
Definition
Wash hands Check individuals breathing and circulation Calm and reassure victim. Insulate victim from cold and maintain body temperature. Elevate the legs 8-10 inches. |
|
|
Term
Three signs of Heat Exhaustion |
|
Definition
Moist Clammy Skin Pupils Dilated Normal or Subnormal Temperature |
|
|
Term
Three signs of heat stroke |
|
Definition
Dry Hot Skin Pupils constricted Very High Body Temperature |
|
|
Term
|
Definition
Hazards of Electromagnetic Radiation to Ordnance |
|
|
Term
|
Definition
Hazards of Electromagnetic Radiation to Personnel |
|
|
Term
|
Definition
Hazards of Electromagnetic Radiation to Volatile Substances |
|
|
Term
Things listed on the MSDS |
|
Definition
Identity hazardous ingredients Physical and chemical characteristics Physical hazards Health hazards First aid procedures for exposure etc. etc. etc. |
|
|
Term
|
Definition
I Critical II Serious III Moderate IV Minor V Negligible |
|
|
Term
Three objectives of first aid |
|
Definition
Maintain breathing Stop bleeding Prevent or Treat Shock |
|
|
Term
|
Definition
Move to a cool dry area, immersion method, fever-reducing drugs |
|
|
Term
How to treat Heat Exhaustion |
|
Definition
victim to shady area, remove clothing, cool water, ice packs under armpits and groin |
|
|
Term
State the six areas of Naval Doctrine |
|
Definition
I. Naval Warfare II. Naval Intelligence III. Naval Operations IV. Naval Logistics V. Naval Planning VI. Naval Command and Control |
|
|
Term
State the seven Principles of Naval Logistics |
|
Definition
I. Responsiveness II. Simplicity III. Flexibility IV. Economy V. Attainability VI. Sustainability VII. Survivability |
|
|
Term
First Navy ship named after an enlisted man, and why. |
|
Definition
UUS Osmond Ingram (DD 255). It was launched 28 Feb 1919. Ingram was the first enlisted man killed in action in WWI, lost when destroyer Cassin (DD43) was torpedoed in October 1917. |
|
|
Term
Birth of U.S. Navy, date, first cmdr, date went to sea? |
|
Definition
The U.S. Navy has its birth on 13 October 1775. On this date the Second Continental Congress authorized the purchase of two vessels. The first commander in chief was Esek Hopkins, who put the first squadron of the Continental Navy to sea in February 1776. |
|
|
Term
Three classes of naval vessels existed at the inception of the U.S. Navy? |
|
Definition
I. Ships of the line II. Frigates III. Sloops of war |
|
|
Term
|
Definition
7-8 May 1942. The breaking of the Japaneses Navy code alerted the U.S. to a Japanese force moving to the Coral Sea to seize Port Moresby on the southwest coast of New Guinea. It was the first step of a plassed invasion of Australia. May 7 japanese planes sand two minor ships. Us planes sank an isolated enemy carrier. May 8 both sides launched all their planes against the other. The aircraft passed each other unseen in the clouds, in the world's first carrier verses carrier battle. One Japanese carrier was damaged. The U.S. carrier Lexinton was sunk, and the carrier Yorktown was damaged. After this action, both sides withdrew. Although a tactical victory, Coral Sea was a strategic set back for the Japaneses who never again threatened Australia. |
|
|
Term
Voyage of the Great White Fleet |
|
Definition
December 16, 1907 President Theodore Roosevelt ordered the fleet to leave Hampton Roads, Virginian for a round-the-world cruise show. |
|
|
Term
|
Definition
Largest amphibious operation in history took place on June 6, 1944. |
|
|
Term
|
Definition
4-7 June 1942, Midway was the turning point of the Pacific war. U.S. broke the Japanese code. Took place a month after Coral Sea. Admiral Nimitz positioned carriers out of Japanese reconnaissance range. Aircraft Carriers used where Hornet, Enterprise, and Yorktown. |
|
|
Term
|
Definition
13-15 November 1942, Japanese naval forces retreated and U.S. Marines were able to secure the island of Guadalcanal. the Japanese lost 2 cruisers and 6 destroyers. With the fall of the island, the southern Solomons came under Allied control and Australia was in less danger of attack. |
|
|
Term
Ship and Battle of Sullivan brothers |
|
Definition
U.S.S. Juneau, Battle of Guadal Canal |
|
|
Term
|
Definition
Final blow to the Japanese navy October 23, 1944. Tried last ditch effort to maintain control of the philippines. After the battle the japanese navy was not able to recover. |
|
|
Term
|
Definition
05 May 1961. First U.S. manned space flight - Alan Shepard, USN |
|
|
Term
|
Definition
23 Mar 1965. First U.S. 2 man space flight - first spacecraft to maneuver from one orbit to another. - LCDR John Young, USN |
|
|
Term
|
Definition
16 - 24 July 1969. First manned moon landing. - Neil Armstrong |
|
|
Term
|
Definition
7-19 December 1972. Seventh and final lunar landing mission. - Eugene A. Cernan, USN, and Ronald E. Evans, USN |
|
|
Term
|
Definition
12-14 April 1981. First orbital test flight of Space Shuttle. - John W. Young, USN, Robert L. Crippen, USN |
|
|
Term
|
Definition
shack on top of the navy building in DC 176 Navy and Marine radio ops trained Foundation of CT community |
|
|
Term
|
Definition
Japanese cipher used by the Japanese Foreign Office named for the color binder decrypts were kept in Germany-Tokyo comms |
|
|
Term
|
Definition
attacked by Israelis June 8, 1967 in the Mediterranean Sea, off the Sinai Peninsula 34 dead, 174 injured |
|
|
Term
|
Definition
Captured by N Korea in 1968 Lack of communication w/ higher commands Not informed of N Korean Hostilities Emergency Destruct |
|
|
Term
|
Definition
06 June 1944 2 years of planning 1,200 Navy ships, 4,100 landing craft |
|
|
Term
|
Definition
Communists had poured across the 38th parallel into South Korea in an attempt to take Seoul 1950 Macarthur devised plan to cut the north korean army off via Inchon, a strategic port Plan required mass intelligence and planning Plan succeeded-North Korean army was routed |
|
|
Term
Hainan Island EP-3 incident |
|
Definition
01April 2001 EP-3 collided with Chinese J-811 interceptor and was forced down Crew detained for 10 days |
|
|
Term
|
Definition
Britains crypto center ENIGMA decipher |
|
|
Term
|
Definition
Extremely complex language no alphabet or symbols One estimate indicates that less than 30 non Navajos could understand language at outbreak of war Never Broken |
|
|
Term
|
Definition
17 March, 1987 Iraqi Mirage F-1 attacked USS Stark fired two exocet missiles no indication of attack 37 sailors died |
|
|
Term
|
Definition
April 1969- Attacked without warning by north korian migs while fliying its last mission with a double crew for training |
|
|
Term
4 terms that characterize the Navy/Marine Corps team |
|
Definition
Readiness Flexibility Self-sustainability Mobility |
|
|
Term
|
Definition
Tactical Operational Strategic |
|
|
Term
What does the National Security Act of 1947 establish (4) |
|
Definition
Establishes NSC Establishes CIA Merged DON and DOW into one DOD under the SecDef Establish a clear line between domestic and foreign intelligence |
|
|
Term
Who adopted navy core values? |
|
Definition
CNO ADM Frank B Kelso in 1992 |
|
|
Term
Who started the Sailor's Creed? |
|
Definition
CNO Admiral Frank Kelso 1993 |
|
|
Term
What did the Sailor's Creed established? |
|
Definition
All personnel in uniform are Sailors first and then they are officers, chiefs, petty officers etc. |
|
|
Term
Four things acredited to RADM Grace Hopper |
|
Definition
Computer pioneer Programmer for the Mark I Credited with coining the term computer bug Created first programming language using words, that led to COBOL |
|
|
Term
location of first computer and where it was located |
|
Definition
ENIAC-Electronic Numerical Integrator and Computer Created 1945 at the University of Pennsylvania |
|
|
Term
|
Definition
Advanced Research Projects Agency- Precursor to the modern internet initial purpose was to communicate with and share computer resources among scientific users at institutions |
|
|
Term
|
Definition
Massive espionage case Spy for Russians starting in 1968 Led to the appointment of the first Director of Counterintelligence on the national Security Council staff Soviet union made significant gains in naval warfare |
|
|
Term
Oldest intelligence organization in U.S. Navy and who established it |
|
Definition
Office of Intelligence-1882 William H. Hunt, Secretary of the Navy |
|
|
Term
|
Definition
|
|
Term
Two departments that were combined to form the ONI |
|
Definition
Department of Library combined with the Office of Intelligence |
|
|
Term
State the U.S. Navy mission |
|
Definition
The mission of the Navy is to maintain, train and equip combat ready Naval forces capable of winning wars, deterring aggression and maintaining freedom of the seas. |
|
|
Term
Who is the lawful source of military orders and who can authorize use of nuclear weapons? |
|
Definition
National Command Authority POTUS SecDEF |
|
|
Term
Component commands of U.S. Pacific Command |
|
Definition
U.S. Pacific fleet U.S. Pacific Air Forces U.S. Army Pacific U.S. Marine Corps Forces, Pacific |
|
|
Term
Components of the US European Command |
|
Definition
U.S. Army Europe US Air Forces Europe US Naval Forces Europe US Marine Corps Forces Europe U.S. Special Operations Command Europe |
|
|
Term
|
Definition
U.S. Army South 12 AF US naval Forces southern Command U.S 4th Fleet U.S. Marine Cops forces, south Special operations command South |
|
|
Term
|
Definition
Army forces central command naval forces central command Marine forces central command Air Forces Central command Special Operations command central |
|
|
Term
|
Definition
Joint Force headquarters National Capital Region joint Task Force Alaska JTF Civil Support JTF north Standing Joint Force headquarters Army North Air Force North US Fleet Forces Command |
|
|
Term
|
Definition
US Army Special Operations Command US Naval Special Warfare Command US AirForce Special Operations Command US Marines corps forces special operations command |
|
|
Term
US Transportation Command |
|
Definition
Surface Deployment and distribution command Military Sealift command Air Mobility Command |
|
|
Term
|
Definition
US Army forcess strategic command fleet forces command marine corps forces air force space command |
|
|
Term
|
Definition
17th Air Force US Marine Corps Forces Africa Special Operations Command Africa AFRICOM section of the army's southern european task force |
|
|
Term
|
Definition
Army Forces Cyber Command Fleet Cyber command/US 10th Fleet 24th Air Force United States marine Corps Forces Cyberspace Command |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Caribbean, and central and south america |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
to provide secure and reliable classified and unclassified, voice, messaging, video, and data, telecommunications to surface, subsurface, air and ground forces in support of the command, control, computer, communications for real world operations. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Concept of command , control, communications, computers, intelligence, surveillance and reconnaissance |
|
|
Term
|
Definition
Defence Information Systems Agency- Provide C2 capabilities and enterprise infrastructure continuously operating and assuring a global net-centric enterprise in direct support to joint warfighters. |
|
|
Term
|
Definition
National Air and Space Intelligence Center-Conducts inteligence collection from space |
|
|
Term
|
Definition
National Geospatial Intelligence Agency-map makers, masint |
|
|
Term
|
Definition
National Reconnaissance Office- integrating unique and innovative space based reconnaissance technologies and engineering development support I&W operations |
|
|
Term
Fleet Commander in Charge |
|
Definition
Admiral in command of a numbered fleet. |
|
|
Term
|
Definition
performs administration, personnel and operational training functions for a "type" of weapon system ie. submarines, suface ships, |
|
|
Term
|
Definition
Command Cyber Readiness Inspection. |
|
|
Term
|
Definition
Enlisted Distribution Verification Report. account on a monthly basis of enlisted stationed at a command |
|
|
Term
|
Definition
Officer Distribution Control Report. account on a monthly basis of officers stationed at a command |
|
|
Term
|
Definition
Activity Manpower Document. provides manpower and authorizations provided to a Naval activity to perform the assigned mission. |
|
|
Term
|
Definition
Dependence Application/Record of Emergency Data |
|
|
Term
|
Definition
Enlisted Qualifications History |
|
|
Term
|
Definition
Service Members Group Life Insurance |
|
|
Term
|
Definition
Administrative remarks serves as a chronological record of significant miscellaneous entries |
|
|
Term
Three Categories of SITREPs |
|
Definition
OPREP-3 PINNACLE OPREP-3 NAVY BLUE UNIT SITREP |
|
|
Term
Four officer assension programs? |
|
Definition
USNA/NAPS(Naval Academy Prep School) OCS MECP(Medical Enlisted Commissioning Program) MSCIPP(Medical Service Corps in-service procurement program) LDO/CWO STA-21 |
|
|
Term
Six programs outlined in Brilliant on the Basics |
|
Definition
Career Development Boards Sponsorship Mentorship Sailor Recognition Command Indoctrination Command Ombudsmen Support |
|
|
Term
|
Definition
Camp H.M Smith, Salt Lake, Hawaii |
|
|
Term
|
Definition
EUCOM, US European Command, Stuttgart, Germany |
|
|
Term
|
Definition
|
|
Term
|
Definition
MacDill AFB, Florida (FOB Camp As Sayliyah) |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
Six programs of Brilliant on the Basics |
|
Definition
Sponsorship Assign a Mentor Indoctrination Career Development boards Ombudsman program Recognition |
|
|
Term
|
Definition
This system provides maintenance and material managers throughout the Navy with a process for planning, acquiring, organizing, directing, controlling and evaluating the manpower and Material resources used to support maintenance. |
|
|
Term
|
Definition
standardized method for planning, scheduling and accomplishing preventive maintenance by ship's force. |
|
|
Term
|
Definition
Defense Property Accountability System is a DoD property management system. Fully web enabled system which tracks the lifecycle of an asset from receipt to disposition. |
|
|
Term
|
Definition
Material Obligation Validation is the reconciliation of the RPPO and the SUADAPS stores. It contains the Julian date, serial #, nomenclature, and running balance. |
|
|
Term
|
Definition
Depot Level Repair program. DLR manages high level items which cannot be repaired nor reused. |
|
|
Term
Difference between Turn-In and RIP |
|
Definition
Turn-In The part that needs to be replaced is turned in to supply then the process is initiated to replace the part.
Remain in Place- Although the part may be degraded, it is required to remain in use until the new item arrives. |
|
|
Term
|
Definition
Maintenance Assist Module-replaceable assemblies needed to perform an approved maintenance plan which calls for identifying the fault of failed module through progressive and selective module substitution. |
|
|
Term
|
Definition
Casualty Report equipment malfunction of deficiency which cannot be corrected within 48 hours. |
|
|
Term
|
Definition
used only at training command does not cause a break in training |
|
|
Term
|
Definition
Minor degradation in any primary mission |
|
|
Term
|
Definition
Causes major degradation but not loss of primary mission |
|
|
Term
|
Definition
causes a loss of at least on primary mission |
|
|
Term
|
Definition
|
|
Term
|
Definition
two character symbol that designates the stores account in which a type of material is carried |
|
|
Term
|
Definition
Allawance Parts List technical document prepared for individual equipment/components which are on board. |
|
|
Term
|
Definition
Allowance Equipage List a technical document prepared for various categories of equipage for mechanical, electrical, electronic and ordnance systems. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Selected Item Maintenance parts that are always needing to be replaced |
|
|
Term
|
Definition
Consolidated Hazardous Material Reutilization and Inventory Management Program |
|
|
Term
|
Definition
DoD agency dedicated to the disposition of excess and surplus military equipment and supplies. |
|
|
Term
|
Definition
a warehouse designed to store NSN items to be bought with a government purchase card. |
|
|
Term
|
Definition
International Merchant Perchase Authorization Card Visa card used by commands |
|
|
Term
|
Definition
Operating Target is an estimate of the amount of money that will be required by an operating unit to perform tasks and fuctions assigned. |
|
|
Term
Key words associated with levels of classification? Top Secret Secret Confidential |
|
Definition
exceptionally grave damage serious damage damage |
|
|
Term
Investigation needed at different levels? Top Secret Secret Confidential |
|
Definition
Single Scope Background Investigation (SSBI) every 5 years National Agency Check with Local Agency and Credit Checks(NACLC) - Every 10 years |
|
|
Term
|
Definition
Security Access Eligibility Report |
|
|
Term
|
Definition
Foreign Disclosure Office |
|
|
Term
|
Definition
Top Secret Control Officer - assures the integretory of the TS inventory |
|
|
Term
Key terms of THREATCON levels: Alpha Bravo Charlie Delta |
|
Definition
General readiness Somewhat predictable threat - maintains for weeks or months known terrorist treat - short periods Specific target known - limited time |
|
|
Term
|
Definition
Random Antiterrism Measures |
|
|
Term
Who gives order to initiate Emergency Destruction? |
|
Definition
Highest ranking person on station |
|
|
Term
EAP priority what is destroyed? |
|
Definition
one-all cryptographic equipment two-all SCI Three-less sensitive admin SCI material and collateral classified material not included above. |
|
|
Term
Difference between practice dangerous to security and compromise? |
|
Definition
Practice Dangerous to Security is a failure to comply with security regulations causing a potential compromise of classified information. |
|
|
Term
Difference between security violation and compromise. |
|
Definition
Security Violation is a compromise of classified information to persons not authorized to receive it or a serious failure to comply with security regulations and is likely to result in compromise. |
|
|
Term
|
Definition
Describes a situation where there is no apparent hostile activity against computer networks. |
|
|
Term
|
Definition
describes an increased risk of attack. |
|
|
Term
|
Definition
describes when a risk has been identified. |
|
|
Term
|
Definition
describes when an attack has taken place but the Computer Network Defense system is not at its highest alertness. |
|
|
Term
|
Definition
describes when attacks are taking place and the Computer Network Defense system is at maximum alertness. |
|
|
Term
|
Definition
Assurance that information is not disclosed to unauthorized individual, processes or devices. |
|
|
Term
|
Definition
Protection against unauthorized modification or destruction of information. |
|
|
Term
|
Definition
Timely, reliable access to data and information services for authorized users. |
|
|
Term
|
Definition
Assurance the sender of data is provided with proof of delivery and the recipient is provided with proof of the sender's identity, so neither can later deny having processed the data. |
|
|
Term
|
Definition
|
|
Term
|
Definition
The comprehensive evaluation of the technical and non technical security features of an IS and other safeguards, made as part of and in support of the accreditation process, to establish the extent to which a particular design and implementation meet a specified set of securtity requirements. |
|
|
Term
|
Definition
The official management decision to perit operation of an IS in a specified environment at an acceptable level of risk. |
|
|
Term
What is Designated Approving Authority (DAA)? |
|
Definition
The official with the authority to formally assume responsibility for operating a system at an acceptable level of risk. |
|
|
Term
What is System Security Plan (SSP)? |
|
Definition
A formal document that fully describes the planned security tasks required to meet sytem or network security requirements. |
|
|
Term
|
Definition
System Security Authorization Agreement. A living document that represents the formal agreement between the Designated Approving Authority, the Certification Authority, the Program Manager, and the user representative. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Interim Authority to Operate. |
|
|
Term
What is Configuration Management? |
|
Definition
Identifies, controls, accounts for, and audits all changes to a site or information system during its design, development, and operational lifecycle. |
|
|
Term
What is Vulnerability Assessment? |
|
Definition
A testing process used to evaluate the network infrastructure for weaknessess. |
|
|
Term
|
Definition
Information Assurance Vulnerability Alert. An anouncement of a high risk computer software or operating system, vulnerability in the form of an alert. |
|
|
Term
|
Definition
Information Assurance Vulnerability Bulletin. An announcement of a medium risk computer software, or operating system, vulnerability in the form of a bulletin. |
|
|
Term
|
Definition
Information Assurance Vulnerability Technical Advisory. An announcement of a low risk computer software, or operating system, vulnerability in the form of an advisory. |
|
|
Term
|
Definition
Communications Tasking Order. instruction that promulgates mandatory changes in standing instructions on how communications are handled. |
|
|
Term
|
Definition
Navy Telecommunications Directive. naval message giving an order or direction about a certain IT function that needs to be complied with. |
|
|
Term
|
Definition
A collection of updates, fixes and enhancements to a software program delivered in the form of a single installable package. |
|
|
Term
|
Definition
A single update, fix for a program. |
|
|
Term
|
Definition
information Assurance Manager. The person appointed in writing who is responsible for establishing and implementing and maintaining the DoD information system IA program. |
|
|
Term
Who is responsible for cross domain security? unclass-secret-top secret |
|
Definition
|
|
Term
Difference between Vulnerability and Threat? |
|
Definition
a real weakness is a vulnerability a threat is a circumstance or event with the potential to adversely impact organizational operations |
|
|
Term
What is Root Level Intrusion? |
|
Definition
Unauthorized privileged access to a DoD system. |
|
|
Term
What is User Level Intrusion? |
|
Definition
Unauthorized non-privileged access to a DoD system. |
|
|
Term
What is Denial of Service? |
|
Definition
Activity that denies, degrades or disrupts normal functionality of a system or network. |
|
|
Term
|
Definition
Installation of software designed and or deployed by adversaries with malicious intentions for the purpose of gaining access to resources or information without the consent or knowledge of the user. |
|
|
Term
What is unsuccessful Activity Attempt |
|
Definition
Deliberate attempts to gain unauthorized access to a DoD system that are defeated by normal defensive mechanisms. |
|
|
Term
What is non-Complliance Activity? |
|
Definition
Activity that potentially ezposes a DoDsystems to increased risk as a result of the action or inaction of authorized users. |
|
|
Term
|
Definition
Activity that seeks to gather information used to characterize DoD systems, applications, networks, and users that may be useful in formulating an attack. |
|
|
Term
|
Definition
Events that are potentially malicious or anomalous activity deemed suspicious and warrant or are udergoing further review. |
|
|
Term
What is an Explained Anomaly? |
|
Definition
Suspicious events that, after further investigation, are determined to be non-malicious activity and do not fit the criteria for any other categories. This includes events such as system malfunctions and false alarms. |
|
|
Term
|
Definition
host is main computer connected to other computers (clients) |
|
|
Term
|
Definition
Connects devices for the network. |
|
|
Term
|
Definition
A smart HUB which routes packets of information. |
|
|
Term
|
Definition
a physical device that joins multiple wired or wireless networks together. |
|
|
Term
|
Definition
Wireless access protocol is an open international standard for application-layer network communications in a wireless communication environment. |
|
|
Term
|
Definition
Concentrator built for creating remote access. |
|
|
Term
Three layers of routing information? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Metropolitan Area Network |
|
|
Term
|
Definition
|
|
Term
|
Definition
Non-Classified Internet Protocol Router network |
|
|
Term
|
Definition
Secret Internet Protocol Router Network |
|
|
Term
|
Definition
Joint Worldwide Intelligence Communications System? |
|
|
Term
|
Definition
Defense Information Systems Network Data Video Voice |
|
|
Term
What is Machine Language? |
|
Definition
machine code lowlevel binary code executed by the processor |
|
|
Term
What is Assembly Language? |
|
Definition
Low Level programming laguage using the human readable instructions of the CPU. |
|
|
Term
What is High Level Language? |
|
Definition
Language that can be used by different type of computers. close to human language ie C, Python, C++ |
|
|
Term
|
Definition
self-replicating virus that does not alter files but resides in active memory and duplicates itself causes the system to slow. |
|
|
Term
|
Definition
appears legitimate but performs some illicit activity when it is run. |
|
|
Term
|
Definition
remote administration utility that once installed on a commputer, allows a user acces and control it over a network or the internet. |
|
|
Term
What is Network Enumeration? |
|
Definition
is a computing activity in which user names, and info on groups, shares and services of networked computers are retrieved. |
|
|
Term
|
Definition
is an anomaly where a process stores data in a vuffer outside the memory the programmer set aside for it. |
|
|
Term
|
Definition
is an attack in which malicious code is inserted into strings that are later passed to an instance of SQL server for parsing and execution. |
|
|
Term
|
Definition
breaking into a computer system by using every word in the dictionary |
|
|
Term
What is Privilege Escalation? |
|
Definition
is the act of exploiting a bug or design flaw in a software application to gain access to resources which normally would have been protected from an application or user. |
|
|
Term
What is Social Engineering? |
|
Definition
the practice of tricking a user into giving, or giving access to, sensitive information, thereby bypassing most or all protection. |
|
|
Term
|
Definition
Domain name System translates domain names meaningful to humans into the numberical identifiers associated with networking equipment for the purpose of locating and addressing these devices worldwide. |
|
|
Term
|
Definition
Automated Digital Networking System. ships can pass digital information. sort of like connecting to the internet. |
|
|
Term
|
Definition
Common User Digital Information Exchange System. provides a 2400 baud full duplex interface, over a satellite link with mobile platforms, for the receipt and transmission of GENSER message traffic used by mobile platforms. |
|
|
Term
|
Definition
VLF Digital Information Network. is a broadcast system that provides a highly reliable and secure system for worldwide delivery of operational, tactical, and administrative messages from the fleet submarine broadcast system and minimum essential emergency communications network. |
|
|
Term
|
Definition
switching hub to relay messages between commands |
|
|
Term
|
Definition
integrated Broadcast System. severlal existing intelligence and information dissemination systems into a single system of broadcasts that will allow for the receipt of data via a single receiver (the joint tactical terminal) |
|
|
Term
|
Definition
Defense Message System navy Regional Enterprise Message system Automatic Message Handling System |
|
|
Term
|
Definition
defence connect online is a webbased virtual meeting room. |
|
|
Term
What does GINGERBREAD mean? |
|
Definition
Warns that "Voice imitative deception is suspected on the network" |
|
|
Term
What does RIVERCITY mean? |
|
Definition
Communications is cut - severing the ship, command or tactical squad from the outside world. |
|
|
Term
|
Definition
is a real-time procedure which brings to the immediate attention of circuit operators the fact that an EEFI disclosure has occurred. |
|
|
Term
|
Definition
01 Position 02 Capabilities 03 Operations |
|
|
Term
|
Definition
04 Electronic Warfare 05 Personnel 06 COMSEC 07 Wrong Circuit |
|
|
Term
List 08-10, 11-29, 30-49, 50-69 |
|
Definition
08-10 NATO assignment 11-29 Reserved for COMUSNAVEUR 30-49 Reserved for COMUSFLTFORCOM 50-69 Reserved for COMPACFLT |
|
|
Term
What is Joint Spectrum Interference Resolution? |
|
Definition
standardizes techniques and procedures for spectrum interference resolution throughout the DOD. |
|
|
Term
|
Definition
The intentional transmission of false signals like drawing acft over a border by broadcasting a false VHF Omni Radio Range signal. |
|
|
Term
|
Definition
intentional insertion of EM energy into transmission paths. |
|
|
Term
|
Definition
The deliberate radiation of EM to prevent someone from using the spectrum. |
|
|
Term
What is Spectrum Management? |
|
Definition
Ensure various combat units use good RF hygiene. |
|
|
Term
|
Definition
Plain Language Address. The component used to denote the command short title and sometimes geographic location used in message addressing. |
|
|
Term
Message Prority Codes what are the five codes? |
|
Definition
R - Routine P - Priority O - Immediate Z - Flash W - Flash Override |
|
|
Term
|
Definition
ASW Anti Sub Warfare SUW Surface Warfare IW Information Warfare AW Air Warfare STW Strike Warfare NSW Special Warfare |
|
|
Term
|
Definition
Meteorological and Oceanographic |
|
|
Term
What is a Mine Warfare UUV Platoon? |
|
Definition
Consists of remote environmental monitoring units conducting oceanographic surveys designed to integrate new sensors into current programs. |
|
|
Term
What is Naval Oceanography ASW team? |
|
Definition
Provide environmental support to ASW forces worldwide at various Fleet and COCOM echelons. |
|
|
Term
What is Strike Group Oceanography Team. |
|
Definition
Provide timely comprehensive and tactically relevant meteorological and oceanographic products and services in direct support of Numbered Fleets etc. |
|
|
Term
What is a fleet survey team? |
|
Definition
A rapid responce team capable of performing quick-turnaround hydrographic surveys anywhere in the world. |
|
|
Term
What is a Mobile Environmental Team? |
|
Definition
These teams carry with them all of the equipment needed to accomplish their forecast mission to ships at sea or shore commands forward. |
|
|
Term
|
Definition
DOD planned operations to convey selected information to target audiences to affect their behavior, emotions etc. |
|
|
Term
|
Definition
Military deception guides an enemy into making a mistake by presenting false information, images or statements. |
|
|
Term
What is a red team and blue team? |
|
Definition
A red team tries to detect vulnerabilities of a system.
Blue team assists an organisation to meet system configuration compliance. |
|
|
Term
|
Definition
fleet electronic support installs and maintains specialized equipment for permanent and ad-hoc missions. |
|
|
Term
What does USC Title 10 consist of? |
|
Definition
Outlines the role of the armed forces in the United States Code. |
|
|
Term
What does USC Title 50 consist of? |
|
Definition
Outlines the role of War and National Defense in the United States Code. |
|
|
Term
|
Definition
Cryptologic carry on program. Provides specializes equipment for Fleet Cryptologic Requirements. |
|
|
Term
|
Definition
Navy Integrated Environmental Support Subsystem. tactical weather prediction. |
|
|
Term
|
Definition
Joint Deployable Intelligence Support System. Provides a family of hardware and software capabilities that allow connectivity and interoperability with intelligence systems supporting forces, in garrison, and deployed during peace, crisis and war. |
|
|
Term
|
Definition
Maritime domain Awareness. Defined as the effective understanding of anything associated with the maritime domain that could impact the security, safety, economy, or environment. |
|
|
Term
|
Definition
A maritime operations center is a critical support center for the execution of the nation's maritime strategy. |
|
|
Term
|
Definition
In 1988, Ronald Reagan signed the NSDD 298 establishing a OPSEC program. All federal agencies or organizations supporting national security missions with classified or sensitive activities to establish an OPSEC program. |
|
|
Term
What are the five step planning OPSEC process? |
|
Definition
1 Identify critical information 2 Threat assessment Threat = Intent + Capability 3 Vulnerability analysis 4 Risk Assessment 5 Measures/Countermeasures |
|
|
Term
State the purpose of Naval Intelligence. (4) |
|
Definition
Supporting the commander Identifying center of gravity and critical vulnerabilities Supporting planning and execution of operations protecting the force |
|
|
Term
Define the five steps of intelligence. |
|
Definition
Planning and Direction Collection Processing and Exploitation Analysis and Production Dissemination and Integration Evaluation and Feedback |
|
|
Term
What are the three categories of Intelligenc? |
|
Definition
Strategic Intelligence Operational Intelligence Tactical Intelligence |
|
|
Term
|
Definition
Priority Intelligence Requirement. |
|
|
Term
|
Definition
Commander Critical Information Requirement. |
|
|
Term
|
Definition
A citizen of the United States an alien lawfully admitted for permanent residence an unicorporated association with a substantial number of members who are citizins of the U.S or are aliens lawfully admitted for permanent residence a corporation that is incorporated in the U.S. |
|
|
Term
|
Definition
Joint intelligence preparation of the operational environment. |
|
|
Term
|
Definition
HUMINT OSINT MASINT SIGINT COMINT FISINT ELINT IMINT ACINT CI |
|
|
Term
What are the 11 bands in the EM spectrum and what are the freq ranges? |
|
Definition
ELF 3-30HZ SLF 30-300 ULF 300-3000 VLF 3-30KHZ LF 30-300KHZ MF 300-3000KHZ HF 3-30MHz VHF 30-300MHz UHF 300-3000 SHF 3-30GHZ EHF 30-300GHz |
|
|
Term
|
Definition
A method for simultaneous transmission of two or more signals over a common carrier wave. FDM TDM |
|
|
Term
|
Definition
The difference between the highest usable frequency and the lowest usable frequency. |
|
|
Term
|
Definition
Used to represent values of electrical current or voltage. |
|
|
Term
|
Definition
The ability to impress intelligence upon a transmission medium, such as radio waves. |
|
|
Term
|
Definition
The removal of intelligence from a transmission medium. |
|
|
Term
|
Definition
The movement of RF through a medium. |
|
|
Term
What is amplitude modulation? |
|
Definition
Amplitude of the modulated wave varies with the amplitude of the modulating signal whereas its frequency is the same as the carrierwave. |
|
|
Term
What is pulse modulation? |
|
Definition
Represents information as a train of pulses, wherein one or more characteristics of each pulse change with the input signal's variation. |
|
|
Term
What is Angular modulation? |
|
Definition
Carrier wave is varied according to the baseband signal and amplitude of the carrier wave is kept constant, there are two forms...FM and Phase Modulation PM |
|
|
Term
What are the three atmospheric layers? |
|
Definition
Troposphere, Stratosphere, Ionosphere |
|
|
Term
What are the three transmission modes? |
|
Definition
Simplex Full Duplex Half Duplex |
|
|
Term
|
Definition
Radio Detection and Ranging |
|
|
Term
What is Pulse Repetition Frequency? |
|
Definition
The rate at which pulses are transmitted, given in hertz or pulses per second; the reciprocal of pulse repetition time. |
|
|
Term
|
Definition
Duration of time between the leading and trailing edges of a pulse. |
|
|
Term
What is Pulse repetition Interval? |
|
Definition
Duration of time between the point on the pulse to the identical point on the next pulse. |
|
|
Term
|
Definition
Movement of the radar beam |
|
|
Term
|
Definition
Angle measured clockwise from true north in the horizontal plance. |
|
|
Term
|
Definition
Angular measurement in the horizontal plane in a clockwise direction. |
|
|
Term
|
Definition
The angle between the horizontal plane and the line of sight. |
|
|
Term
How does Naval Oceanography support the Information Dominance Mission? |
|
Definition
Ocean environment states and forecasts accurate and up to date charts accurate weather forecasting exact position of the north pole Accurate time keeping |
|
|
Term
|
Definition
Space Force Enhancement Space Support Space Control Space Force Application |
|
|
Term
|
Definition
A 11 year cycle. Generally there is a 4 year rise to a solar maximum, followed by a gradual 7 year decline to solar minimum. |
|
|
Term
What are the Van Allen Radiation Belts? |
|
Definition
An outer and inner belt where radiated particles can have effects on communications. |
|
|
Term
What is atmospheric drag? |
|
Definition
Energy is deposited in the earth's upper atmosphere this can have an effect of slowing down sattelites. |
|
|
Term
|
Definition
altitudes approximately 150-800 miles above the earths surface. Sattelites period will be around 90 minutes. |
|
|
Term
What is Semi-Synchronous orbit? |
|
Definition
altitude of approximately 10,800 miles. The period is about 12 hours. |
|
|
Term
What is Sun-Synchronous Orbit? |
|
Definition
|
|
Term
What is an Highly Elliptical Orbit? |
|
Definition
North to south spends more time in one hemisphere than another. |
|
|
Term
What is geosynchronous orbit? |
|
Definition
approximately 19,300 miles. period equal to one day. |
|
|
Term
|
Definition
Passes over the entire surface of the earth over a period of a few days used for imagery satelites. |
|
|
Term
What is Apogee and Perigee? |
|
Definition
Apogee point on the orbit farthest from the center of the Earth Perigee point on the orbit closest to the center of the Earth. |
|
|
Term
What are the two main sattelite launch facilities? |
|
Definition
Kennedy Space Center, FL Vandenberg AFB, CA |
|
|
Term
The purpose of the Adjunct Faculty Program? |
|
Definition
To utilize sme's to meet global training needs. |
|
|
Term
What is the commands mission statement? |
|
Definition
Provides cryptologic direct support to CENTCOM combat operations and to CUSNC/C5F for the safe positioning of naval forces in the Arabian Gulf. Participates in Operations ENDURING FREEDOM (OEF) and Maritime Security Operations (MSO). |
|
|
Term
|
Definition
|
|
Term
|
Definition
Material Safety Data Sheet |
|
|
Term
Acrynym to remember the six areas of Naval Doctrine? |
|
Definition
|
|
Term
What are the six areas of Naval Doctrine? |
|
Definition
Naval Command and Control Naval Operations Naval Warfare Naval Logistics Naval Intelligence Naval Planning |
|
|
Term
Acrynym to remember the seven principles of Naval Logistics? |
|
Definition
|
|
Term
What are the seven principles of Naval Logistics? |
|
Definition
Simplicity Attainability Flexibility Economy Responsiveness Sustainability Survivability |
|
|
Term
Number of Guns on each of the naval vessel types at the USN's inception? |
|
Definition
Ships of the Line 64-100 Frigates 28-44 Sloops of war 10-20 |
|
|
Term
Name and date of the first ever carrier only battle. |
|
Definition
|
|
Term
Name the battle that was the first to use ELINT? |
|
Definition
Battle of Leyte Gulf 23OCT1944 Largest naval battle in history |
|
|
Term
What was the first compartment of intell? |
|
Definition
TOP SECRET MAGIC because code breakers were often known as magicians |
|
|
Term
|
Definition
|
|
Term
|
Definition
Material Safety Data Sheet |
|
|
Term
Acrynym to remember the six areas of Naval Doctrine? |
|
Definition
|
|
Term
What are the six areas of Naval Doctrine? |
|
Definition
Naval Command and Control Naval Operations Naval Warfare Naval Logistics Naval Intelligence Naval Planning |
|
|
Term
Acrynym to remember the seven principles of Naval Logistics? |
|
Definition
|
|
Term
What are the seven principles of Naval Logistics? |
|
Definition
Simplicity Attainability Flexibility Economy Responsiveness Sustainability Survivability |
|
|
Term
Number of Guns on each of the naval vessel types at the USN's inception? |
|
Definition
Ships of the Line 64-100 Frigates 28-44 Sloops of war 10-20 |
|
|
Term
Name and date of the first ever carrier only battle. |
|
Definition
|
|
Term
Name the battle that was the first to use ELINT? |
|
Definition
Battle of Leyte Gulf 23OCT1944 Largest naval battle in history |
|
|
Term
What was the first compartment of intell? |
|
Definition
TOP SECRET MAGIC because code breakers were often known as magicians |
|
|
Term
When and who developed IMINT? |
|
Definition
1942 President FDR's son Elliott paved the way with the Army Air photographic unit. |
|
|
Term
What was operation FORITUDE? |
|
Definition
The mildec operation which had Patton invading with the made up First US Army Group to invade france by way of the Pas de Calais |
|
|
Term
What is the BRUSA agreement? |
|
Definition
An agreement between the US and Britain on information sharing. |
|
|
Term
Who and what year were the Navy core values developed? |
|
Definition
|
|
Term
What does ENIAC stand for? |
|
Definition
Electronic Numerical Integrator and Computer |
|
|
Term
What does ARPANET stand for? |
|
Definition
Advanced Research Projects Agency Network |
|
|
Term
When and Who established ONI? |
|
Definition
23MAR1882 Secretary of the Navy William H. Hunt |
|
|
Term
Who is the first CIO/DNI? |
|
Definition
|
|
Term
Stopped second review at 103 |
|
Definition
|
|