Term
|
Definition
DIRECTS OPS OF ASSIGNED NAVAL FORCES AND COORDINATES WITH OTHER TO EXE CYBER, EW, IO, SIGINT |
|
|
Term
COMMANDER US FCC TENTH FLT |
|
Definition
|
|
Term
DEP COMMANDER US FCC THENTH FLT |
|
Definition
|
|
Term
CHIEF OF STAFF US FCC TENTH |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
RESP FOR COLLECTION AND ANALYSIS OF FOREIGN COMMS |
|
|
Term
|
Definition
PROVIDE C2 CAPABILITIES AND ENTERPRISE INFRASTRUCTURE |
|
|
Term
|
Definition
CTF 1010 NETOPS &SPACE OPERATIONS |
|
|
Term
|
Definition
PROVIDE REGIONAL C4I CONNECTIVIETY |
|
|
Term
|
Definition
DEFENCE OF NAVAL NETWORKS |
|
|
Term
PRIM MISSION OF NUMBERD FLTS |
|
Definition
MAJOR TACTICAL UNITS OF NAVY |
|
|
Term
WHAT IS PRIM MISSION OF CTF 1000 |
|
Definition
RES FOR SERVICE CRYPTO UNIT RESP TO NSA/CSS AND NSA CRYPTOLOGIC CENTERS |
|
|
Term
WHAT IS PRIM MISSION / LOCATION OF CTF 1010 |
|
Definition
NETOPS / SPACE OPS (NNWC) |
|
|
Term
WHAT IS PRIM MISSION / LOCATION OF CTF 1010.1 |
|
Definition
|
|
Term
WHAT IS PRIM MISSION / LOCATION OF CTF 1010.2 |
|
Definition
|
|
Term
WHAT IS PRIM MISSION / LOCATION OF CTF 1010.3 |
|
Definition
|
|
Term
WHAT IS PRIM MISSION CTF 1020 |
|
Definition
|
|
Term
|
Definition
|
|
Term
WHAT IS PRIM MISSION / LOCATION OF CTF 1020.2 |
|
Definition
|
|
Term
WHAT IS PRIM MISSION OF CTF 1030 |
|
Definition
INFO OPERATIONS "IO" MARITIME INFLUENCE |
|
|
Term
WHAT IS PRIM MISSION / LOCATION OF CTF 1030.1 |
|
Definition
IO MARITIME INFLUENCE / NIOC NORFOLK |
|
|
Term
WHAT IS PRIM MISSION / LOCATION OF CTF 1030.2 |
|
Definition
IO MARITIME INFLUENCE / NIOC SANDIEGO |
|
|
Term
WHAT IS PRIM MISSION / LOCATION OF CTF 1030.3 |
|
Definition
AIRBORN / SERFACE EW & ISR MISSIONS / WHIDBEY ISLAND |
|
|
Term
|
Definition
Hardware, Firmware, or Software that is intentionally included or inserted in a system for a harmful purpose |
|
|
Term
Difference between an Anomaly and Signature for IDS attack detection. |
|
Definition
Anomaly- A compairesen between what is seen as normal activity considered against observed events.
Signature- based off of signatures agaisnt observed events. "Like a Fingerprint" |
|
|
Term
What is a Teardrop attack |
|
Definition
DOS attack in which fragmented packets are forged so they overlap eachother when the receiving host tries to reassemble them |
|
|
Term
|
Definition
Trojan whose purpose is to deliver an enclosed payload on to a destination host computer. |
|
|
Term
|
Definition
is a virus that exista in the collections of research and has never infected a real world computer. |
|
|
Term
|
Definition
signature that detect W32.Tibik IRC traffic communicating and request info from its controlling server. |
|
|
Term
|
Definition
- Establish system for eval readiness of each combatant comman
- Develop joint doctrine
- Intigrate space forces
- Provide guidence to CCDR's for planning employment of space capabilities. |
|
|
Term
4 mission areas of U.S. Space operations |
|
Definition
- Space force Enhancement
- Space Support
- Space Control
- Space Force Application |
|
|