100 Series Study List 106-110 Flashcards

1
Q

106- Identify the directives that govern personnel security.

A

BASIC POLICY: This regulation establishes the Department of the Navy (DON) Personnel Security Program (PSP) under the authority of Executive Order (EO) 12968.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

106- Define top-secret classification to include the color code.

A

Orange Classification - level applied to information whose unauthorized disclosure could reasonably be expected to cause exceptionally grave damage to the national security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

106- Define secret classification to include the color code.

A

Red Classification - level applied to information whose unauthorized disclosure could reasonably be expected to cause serious damage to the national security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

106- Define confidential classification to include the color code.

A

Blue Classification - level applied to information whose unauthorized disclosure could reasonably be expected to cause damage to the national security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

106- Define unclassified classification to include the color code.

A

Green Classification - level applied to information whose unauthorized disclosure would reasonably be expected to cause no damage to the national security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

106- Explain what is meant by “need to know.”

A

Describes the restriction of data, which is considered very sensitive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

106- Top Secret: State the type of investigation and how often it is updated for access to the following classification levels:

A

The investigative basis for Top Secret clearance eligibility is a favorably completed SSBI, SSBI-PR or PPR. Must be updated every 5 years by a PR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

106- Secret/Confidential: State the type of investigation and how often it is updated for access to the following classification levels:

A

The investigative basis for Secret or Confidential clearance eligibility is a favorably completed NACLC or ANACI. Is updated every 10 and 15-years, respectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

106- Sensitive Compartmented Information (SCI): State the type of investigation and how often it is updated for access to the following classification levels:

A

The investigative requirement for access to SCI is a favorably adjudicated SSBI. An SSBI-PR is required to be submitted every 5 years.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

106- What is a SAER is and its purpose

A

Security Access Eligibility Report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

106- What event should be reported to the SSO

A

Financial issues. - Legal issues. - U/A. - Mental Illness. - Marriage to a foreign national. - Anything that could question your character, integrity, physical and Mental health needs to be reported. - Sexual Misconduct-Criminal Conduct - Misuse of information technology systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

106- Who has overall authority of, and controls access to, a SCIF.

A

The Special Security Officer (SSO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

106- Identify the use of the SF-700

A

(Security Container Information): Form that contains vital information about the security container in which it is located.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

106- Identify the use of the SF-701

A

(Activity Security Checklist): Checklist that is filled out at the end of each day to ensure that classified materials are secured properly and allows for employee accountability in the event that irregularities are discovered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

106- Identify the use of the SF-702

A

(Security Container Check Sheet): Provides a record of the names and times that persons have opened, closed and checked a particular container (safe) that holds classified information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

106- Identify the use of the SF-703

A

Top Secret Cover Sheet - Cover sheets are placed on top of documents to clearly identify the classification level of the document and protect classified information from inadvertent disclosure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

106- Identify the use of the SF-153

A

(COMSEC Material Report) - Used to document the: Transfer; Inventory; Destruction; Hand Receipt; or Other conditions of Communications Security (COMSEC) material.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

106- Identify the use of the SF-312

A

(Classified Information Nondisclosure Agreement) - contractual agreement between the U.S. Government and a cleared employee that must be executed as a condition of access to classified information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

106- State when safe combinations should be changed.

A

Safe combinations should be changed: At least once every two years. Sooner, if the combination has been compromised. Sooner, if an individual who holds the combination transfers from the command or otherwise no longer requires it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

106- What is an FDO and state their responsibilities.

A

FOREIGN DISCLOSURE OFFICE (FDO) Military information is a national security asset which must be conserved and protected and may be shared with foreign representatives only when there is a clearly defined advantage to the United States

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

106- State the responsibilities of the TSCO

A

Top Secret Control Officer (TSCO): Reports directly to the Security Manager: - Must be an officer, senior non-commissioned officer E-7 or above, or a civilian employee, GS-7 or above. - Must be a U.S. citizen and have been the subject of a favorably adjudicated SSBI within the previous five years. Maintain a system of accountability to record the receipt, reproduction, transfer, transmission, downgrading, declassification and destruction of command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

106- State the THREATCON Levels and describe 105- them.

A

Normal: — No known threat indicated. - Alpha: — General threat of possible terrorist activity against installations and personnel. Bravo: — An increased and more predictable threat of terrorist action. - Charlie: — An incident has occurred or that intelligence has been received indicating that some form of terrorist action is imminent. - Delta: — A terrorist attack has occurred or that intelligence indicates that a terrorist action against a specific location is likely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

106- State the FPCON Levels and describe them.

A

Normal — applies when a general global threat of possible terrorist activity exists and warrants a routine Security posture. Alpha: — applies when there is an increased general threat of possible terrorist activity against Personnel or facilities, and the nature and extent of the threat are unpredictable. Bravo: — applies when an increased or more predictable threat of terrorist activity exists. Charlie: — applies when an incident occurs or intelligence is received indicating some form of terrorist action or targeting against Personnel or facilities is likely. Delta: — applies in the immediate area where a terrorist attack has occurred or when Intel has been received that terrorist action against a specific Location or person is imminent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

106- Explain what a RAM is.

A

Random Anti-Terrorism Measure (RAM): Purpose is to identify a set of protective measures in addition to those in effect through the current FPCON.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

106- Explain and state the purpose of an EAP.

A

Emergency Action Plan (EAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

106- Explain and state the purpose of Emergency Destruction Procedures.; Emergency Destruction Plan (EDP):

A

Two Types: — Precautionary Destruction: - Hostile action is possible/probable and this is a process to destroy keying material and non-essential manuals in an effort to reduce the amount of material on hand (to prepare for expected Complete destruction). — Complete Destruction: - Hostile action is imminent and all material must be destroyed in priority order. - Three categories of COMSEC material that may require destruction in hostile emergencies: — COMSEC keying material — COMSEC-related material (e.g., maintenance manuals, operating instructions, and general doctrinal publications) — Equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

106- State who can give the order to initiate Emergency Destruction.

A

ONLY THE COMMANDING OFFICER can give the order to commence emergency destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

106- Explain how, and in what order, material is destroyed during Emergency Destruction.

A

Emergency Destruction Priorities (in order from top to bottom): — Superseded keying material and secondary variables. — TOP SECRET primary keying material. — SECRET, CONFIDENTIAL, and Unclassified primary keying material. — Future (reserve on board) keying material for use one or two months in the future. — Non-essential classified manuals: — Maintenance manuals. — Operating manuals. — Administrative manuals. Destroy by any legal destruction method for the material.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

106- Define SCI.

A

Sensitive Compartmented Information (SCI): Classified information concerning or derived from intelligence sources, methods, or analytical processes, which is required to be handled within formal access control systems established by the Director of Central Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

106- List the items prohibited in a SCIF and the security risks associated with them.

A

Personally owned photographic, video, and audio recording equipment. Personally owned computers and associated media. Two-way transmitting equipment. Recording equipment (audio, video, optical). Associated media will be controlled. Test, measurement, and diagnostic equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

106- Define a security violation

A

Compromise of classified information to persons not authorized to receive it or a serious failure to comply with the provisions of security regulations and likely to result in a compromise. — A security violation requires investigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

106- Define practices dangerous to security (PDS).

A

Practices which have the potential to jeopardize the security of COMSEC Material if allowed to continue. — There are two types: — Reportable: The action must be reported outside of command. — Non-Reportable: The action must be reported to the Commanding Officer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

106- Explain the security requirements for a SCIF

A

SCIF (Sensitive Compartmented Information Facility)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

106- Explain the security requirements for a TSCIF

A

T-SCIF (Tactical-SCIF): An accredited area used for actual or simulated war operations for a specified period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

106- Explain vault recertification and recurring inspections.

A

Recurring inspections are required every 24 months.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

106- Explain and state the purpose of JPAS.

A

Joint Personnel Adjudication System (JPAS): — Automated system of record for personnel security management within the DoD, providing a means to record and document personnel security actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

106- Explain and state the responsibilities of DONCAF.

A

Department of the Navy Central Adjudication Facility (DONCAF): — A Naval Criminal Investigative Service (NCIS) organization responsible for determining who within the Department of the Navy is: — Eligible to hold a security clearance. — Eligible to have access to Sensitive Compartmented Information (SCI). — Eligible to be assigned to sensitive duties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

106- Discuss how long a Commanding Officer can administratively suspend access before DONCAF revokes a clearance.

A

“90 days.” The administrative withdrawal or downgrading of access is not authorized when prompted by developed derogatory information. Commands and activities must report all suspensions to the DON CAF no later than 10 working days from the date of the suspension action via JPAS, providing sufficient details to support adjudicative review.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

106- State the levels of INFOCON and what each signifies

A

Information Security Condition (5 levels): — INFOCON 5: — Describes a situation where there is no apparent hostile activity against computer networks. INFOCON 4: — Describes an increased risk of attack. INFOCON 3: — Describes when a risk has been identified. INFOCON 2: — Describes when an attack has taken place but the Computer Network Defense system is not at its highest alertness. INFOCON 1: — Describes when attacks are taking place and the Computer Network Defense system is at maximum alertness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

106- Explain why the U.S. Navy only uses “.mil” email addresses on government systems.

A

The Navy uses .MIL for its e-mail addresses because the U.S. Department of Defense has exclusive use of this domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

107- Define IA.

A

Information Assurance: Information Operations that protect and defend data and IS by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

107- Define Certification

A

Certification is a comprehensive evaluation of the technical and non-technical security features of an IT system and other safeguards, made in support of the Accreditation process, to establish the extent that a particular design and implementation meets a set of specified security requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

107- Define Accreditation

A

Accreditation is the formal declaration by the Designated Approving Authority (DAA) that an Information Technology (IT) system is approved to operate in a particular security mode using a prescribed set of safeguards at an acceptable level of risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

107- Define Designated Approving Authority (DAA)

A

The official with the authority to formally assume responsibility for operating a system (or network) at an acceptable level of risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

107- Define ATO

A

Authorization to Operate. Good for 3 years.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

107- Define IATO

A

Interim Authorization to Operate. Good for up to a maximum of 180 days.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

107- Discuss security procedures involved when performing cross-domain transfers

A

CROSS DOMAIN TRANSFERS Refers to moving files between different classifications of networks, so care must be taken to ensure that classified information is not “spilled” to networks with insufficient classification for the material.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

107- What are the five attributes of IA?

A

Confidentiality; Integrity; Availability; Non-repudiation; Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

107- Describe Confidentiality, how it pertains to IA

A

Authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

107- Describe Integrity, how it pertains to IA

A

Information and programs are changed only in a specified and authorized manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

107- Describe Availability, how it pertains to IA

A

Timely and reliable access to and use of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

107- Describe Non-repudtaion, how it pertains to IA

A

An authentication that with high assurance can be asserted to be genuine, and that cannot subsequently be refuted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

107- Describe Authentication, how it pertains to IA

A

a measure of confidence that users or processes that access information are who they say they are and have the appropriate rights to access that information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

107- List the 9 categories of computer incidents

A

Root Level Intrusion (Incident); User Level Intrusion (Incident); Denial of Service (Incident); Malicious Logic (Incident); Unsuccessful Activity Attempt (Event); Non-Compliance Activity (Event); Reconnaissance (Event); Reconnaissance (Event); Explained Anomaly (Event).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

107- Define Root Level Intrusion, in reference to computer incidents.

A

Root Level Intrusion (Incident) - an attacker gained root (administrative) level access to the system, could do anything they wished to the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

107- Define User Level Intrusion, in reference to computer incidents.

A

User Level Intrusion (Incident) - an attacker gained user level access to the system. Able to access data as your trusted users could, typically will attempt to escalate privileges to gain root access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

107- Define Denial of Service, in reference to computer incidents.

A

Denial of Service (Incident) - legitimate users are unable to access your network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

107- Define Malicious Logic, in reference to computer incidents.

A

Malicious Logic (Incident) - virus, worm, Trojan horse has infected a system or systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

107- Define Unsuccessful Activity Attempt, in reference to computer incidents.

A

Unsuccessful Activity Attempt (Event) - an attacker tried to gain root or user level access; though stopped this time, you’d want to know someone tried to break in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

107- Define Non-Compliance Activity, in reference to computer incidents.

A

Non-Compliance Activity (Event) - users or administrators not following procedures or policies, could weaken network defense against other attacks if not corrected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

107- Define Reconnaissance, in reference to computer incidents.

A

Reconnaissance (Event) probing by hackers to examine the network could be intending to attack soon and gaining what information is available prior to doing so, or even just looking to see who the weaker targets are to decide who they’d want to attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

107- Define Reconnaissance, in reference to computer incidents.

A

Investigating (Event) - assigned this category by NCDOC while determining the nature of an incident or event, will be reassigned to the most appropriate category once it is determined.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

107- Define Explained Anomaly, in reference to computer incidents.

A

Explained Anomaly (Event) - systems inside the network which have regular traffic necessary for the network but which sets off IDS alarms as possibly being hostile, used to filter out traffic known not to be hostile.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

107- Define IAVA

A

Information Assurance Vulnerability Alert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

107- Define IAVB

A

Information Assurance Vulnerability Bulletin

66
Q

107- Define IAVT

A

Information Assurance Vulnerability Technical Advisory

67
Q

107- Define vulnerability assessment:

A

An examination of the ability of a system or application, including current security procedures and controls, to withstand assault. A vulnerability assessment may be used to.

68
Q

107- Explain Vulnerability

A

Refers to a weakness in a system’s security scheme, which may include system security procedures, internal controls, or implementation.

69
Q

107- Explain Threat

A

Circumstances, events, or people with the potential to Exploit the weakness and cause harm to a system.

70
Q

107- State the duties and responsibilities of the IAM

A

The Information Assurance Manager (IAM): is responsible for the information assurance program within a command, site, system, or enclave.

71
Q

107- State the duties and responsibilities of the IAO

A

The Information Assurance Officer (IAO): are designated for each information system and network in the command, and are responsible for implementing and maintaining the command’s information technology systems and network security requirements

72
Q

108- Define Host/Client:

A

Describes the relationship between two computer programs in which one program, the client, makes a service request from another program, the server, which fulfills the request.

73
Q

108- Define Application Server.

A

A software framework dedicated to the efficient execution of procedures (programs, routines, scripts) for supporting the construction of applications.

74
Q

108- Define Hub

A

A common connection point for devices in a network.

75
Q

108- Define Switch

A

A small hardware device that joins multiple computers together within one LAN. Operates at Layer two (Data Link Layer) of the OSI model.

76
Q

108- Define router

A

Device that forwards data packets between networks, creating an overlay internetwork.

77
Q

108- Define Proxy Server

A

Server that acts as an intermediary for requests from clients seeking resources from other servers. It masks your IP Address from the Internet

78
Q

108- Define Firewall

A

Device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass.

79
Q

108- Define (Network) Repeater

A

Devices that regenerate incoming electrical, wireless or optical signals.

80
Q

108- Explain Topology: bus

A

A network architecture in which a set of clients are connected via a shared communications line, called a bus.

81
Q

108- Explain Topology: Star

A

One of the most common computer network topologies. In its simplest form, a star network consists of one central switch, hub or computer, which acts as a conduit to transmit messages.

82
Q

108- Explain Topology: Ring

A

A network architecture in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring.

83
Q

108- Explain Topology: Mesh

A

It allows for continuous connections and reconfiguration around broken or blocked paths by “hopping” from node to node until the destination is reached.

84
Q

108- Explain Local Area Network

A

A group of computers and associated devices that share a common communications line or wireless link.

85
Q

108- Explain Wide Area Network (WAN)

A

Spans a large geographic area, such as a state, province or country. WANs often connect multiple smaller networks.

86
Q

108- Explain Metropolitan Area Network (MAN)

A

Usually interconnects a number of Local Area Networks (LANs) using a high-capacity backbone technology, such as fiber-optical links, and provides up-link services to Wide Area Networks and the Internet.

87
Q

108- Explain Global Area Network (GAN)

A

Refers to any network that is composed of different interconnected computer networks (WANs) and also covers an unlimited geographical area.

88
Q

108- Explain the Physical layer of the OSI Model

A

Layer 1 (Physical Layer): Media, signal and binary transmission

89
Q

108- Explain the data link layer of the OSI Model

A

Layer 2 (Data Link Layer): Physical addressing

90
Q

108- Explain the Network layer of the OSI Model

A

Layer 3 (Network Layer): Path determination and logical addressing

91
Q

108- Explain the Transport layer of the OSI Model

A

Layer 4 (Transport Layer): End-to-end connections and reliability, flow control

92
Q

108- Explain the Session layer of the OSI Model

A

Layer 5 (Session Layer): Interhost communication.

93
Q

108- Explain the Presentation layer of the OSI Model

A

Layer 6 (Presentation Layer): Data representation, encryption and decryption, convert machine dependent data to machine independent data.

94
Q

108- Explain the Application layer of the OSI Model

A

Layer 7 (Application Layer): Network process to application.

95
Q

108- What is the OSI model

A

Open Systems Interconnection (OSI) Model (7 Layers): A way of sub-dividing a communications system into smaller parts called layers. Similar communication functions are grouped into logical layers. A layer provides services to its upper layer while receiving services from the layer below.

96
Q

108- Explain Internet Protocol version 4 (IPv4):

A

The fourth revision in the development of the Internet Protocol (IP) and it is the first version of the protocol to be widely deployed. — IPv4 defined an IP address as a 32-bit number (consisting of 4 octets). Due to the enormous growth of the Internet and the depletion of available addresses (occurred 03 Feb 2011), a new addressing system (IPv6) was developed in 1995.

97
Q

108- Explain Internet Protocol version 6 (IPv6)

A

IPv6 defined an IP address as a 128-bit number (consisting of 16 octets)

98
Q

108- Define Unclassified but Sensitive Internet Protocol (IP) Router Network (NIPRNet) and how is it used?

A

A global long-haul IP based network to support unclassified IP data communications services for combat support applications.

99
Q

108- Define Secret IP Router Network (SIPRNet) and how is it used?

A

DoD’s largest interoperable Command and Control (C2) data network, supporting: Global Command and Control System (GCCS), Defense Message System (DMS), Collaborative planning

100
Q

108- Define Joint Worldwide Intelligence Communications System (JWICS) and how is it used?

A

Operated by the Defense Intelligence Agency (DIA) as a secure global network designed to meet the requirements for TS/SCI multimedia intelligence communications worldwide. It provides users an SCI-level high-speed multimedia network using high-capacity communications to handle data, voice, imagery, and graphics. — Primary uses of JWICS by afloat users: Secure e-mail, Chat rooms, Point-to-point and multipoint VTCs, Broadcast of the DIN, Website access are the primary uses of JWICS by afloat users.

101
Q

108- Describe Machine language

A

A system of instructions and data executed directly by a computer’s central processing unit.

102
Q

108- Describe a virus and the risk associated

A

Computer program that can copy itself and infect a computer.

103
Q

108- Describe worms and the risk associated

A

Self-replicating stand-alone malware computer programs.

104
Q

108- Describe trojans and the risk associated

A

Malware that appears to perform a desirable function for the user prior to run or install.

105
Q

108- Describe a backdoor and the risk associated

A

In computer systems (or cryptosystems or algorithms) are a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected.

106
Q

108- Describe phishing and the risk associated

A

The criminally fraudulent process of attempting to acquire sensitive information by masquerading as a trustworthy entity in an electronic communication; information such as: Usernames; Passwords: Credit card details

107
Q

108- Describe the functionality of PKI

A

Public Key Infrastructure (PKI) Public key cryptographic systems are based on a pair of keys uniquely related to each entity

108
Q

108- State the purpose of DNS.

A

Domain Name System (DNS): It translates domain names (meaningful to humans) into the numerical (binary) identifiers associated with networking equipment.

109
Q

109- Discuss the purpose of a (Amcross) Red Cross message

A

Family members can use the Red Cross emergency communication system to notify service members of an emergency or other important event.

110
Q

109- Describe ADNS and state it function.

A

(Automated Digital Networking System) - The primary function of the ADNS is to connect Navy shipboard networks to other ship and shore networks for transferring Internet Protocol (IP) data of various classification levels.

111
Q

109- Describe CUDIXS and state it function.

A

(Common User Digital Information Exchange Subsystem) CUDIXS provides a 2400 baud full duplex interface, over a UHF satellite link with mobile platforms, for the receipt and transmission of narrative message traffic between FMX and mobile platforms equipped with afloat automated systems. Classified as Top Secret High.

112
Q

109- Describe VERDIN and state it function.

A

(VLF Digital Information Network) - Broadcast system provides a highly reliable and secure system for worldwide delivery of operational, tactical, and administrative messages from the Fleet Submarine Broadcast System and Minimum Essential Emergency Communications Network.

113
Q

109- Describe NOVA and state it function.

A

(Automated message store and forward) - UNIX based, base-level Mode 1 store and forward terminal to relay messages to other commands outside the immediate area of responsibility, services and agencies.

114
Q

109- Describe IBS and state it function.

A

(Integrated Broadcast System) - IBS has integrated several existing intelligence and information dissemination systems into a single system of broadcasts that will allow for the receipt of data via a single receiver (the joint tactical terminal).

115
Q

109- Describe INMARSAT and state it function.

A

(International Maritime Satellite) - Multipurpose commercial SATCOM system providing both simultaneous voice and IP data up to 128 Kbps.

116
Q

109- Describe DMS and state it function.

A

Defense Messaging System. DMS employs the messaging and directory services using internationally recognized COTS-based X.400 and X.500 messaging and directory products.

117
Q

109- Describe NREMS and state it function.

A

Navy Regional Enterprise Message System. NREMS provides web-based messaging capability that allows users (with accounts) to send and receive DMS messages using a web browser or via SMTP.

118
Q

109- Describe AMHS and state it function.

A

Automatic Message Handling System. AMHS provides simplified message drafting, coordination, and release of outgoing messages and a message internal distribution and delivery function for incoming messages. This is the web-based interface to NREMS.

119
Q

109- Describe VTC and state it function.

A

(Video Teleconferencing) - An extension of traditional telephony technologies with the added feature of being able to see the person or persons with whom one is talking.

120
Q

109- Describe DCO and state it function.

A

(Defense Connect Online) - DCO provides all of the benefits of the world’s best of breed collaboration capabilities in Adobe Connect and an XMPP chat service to the DoD.

121
Q

109- Discuss Gingerbread Procedures

A

(a) Warning sent over the net to alert operators that hostile forces are attempting to intrude on the net by Imitative Communications Deceptions (ICD) (b) When an operator recognizes or suspects that net is being subject to ICD, they will: - Announce - GINGERBREAD on the net - Give the call sign of the suspected deception station - Authenticate the stations on the net - Notify the radio supervisor and make an entry on the circuit log - Notify the Communications Officer and request further instructions - Kick to secondary freq. - (c) Secure voice nets are normally exempt from GINGERBREAD, however, GINGERBREAD may be used if necessary.

122
Q

109- Discuss types of disclosures afforded protection by the EEFI list

A

Standardized EEFI are established to identify specific items of information, which, if acquired by an adversary, would degrade the security of military operations, special projects, etc.

123
Q

109- Discuss BEADWINDOW and explain the procedures involved

A

BEADWINDOW: is a real-time procedure, which brings to the immediate attention of circuit operators the fact that an EEFI (Essential Elements of Friendly Information) disclosure has (or may have) occurred. The BEADWINDOW technique uses a code word and a number combination, which is transmitted immediately by any net member to the unit disclosing the EEFI.

124
Q

109- Define RIVER CITY and state when it is utilized

A

An OPSEC tool that limits communications is River City. River City conditions provide procedures to control outgoing paths from ships and shore systems (e-mail, web browsing, POTS, cell phones) for the purpose of OPSEC and force protection.

125
Q

109- Discuss JSIR (Joint Spectrum Interference Resolution)

A

The JSIR program was designed as a replacement for the Meaconing, Intrusion, Jamming, and Interference (MIJI) program, disestablished 30 June 1992.

126
Q

109- Discuss JSIR (Joint Spectrum Interference Resolution) – Meaconing

A

The intentional transmission of signals designed to deceive users of navigational aids (tactical air navigation, GPS, non-directional beacon, instrument landing system, etc.). Example: Attempting to draw aircraft across an international border by transmitting false VHF Omni-directional Radio Range signals.

127
Q

109- Discuss JSIR (Joint Spectrum Interference Resolution) – Intrusion

A

The intentional insertion of EM energy into transmission paths in any manner, with the objective of deceiving operators or causing confusion.

128
Q

109- Discuss JSIR (Joint Spectrum Interference Resolution) – Jamming

A

The deliberate radiation, re-radiation, or reflection of EM energy for the purpose of preventing or reducing an enemy’s effective use of the EM spectrum and with the intent of degrading or neutralizing the enemy’s combat capability.

129
Q

109- Discuss JSIR (Joint Spectrum Interference Resolution) – Spectrum management

A

Develop and maintain the JSIR database, interference resolution tools (e.g., SPECTRUM XXI), and direction finding and spectrum monitoring equipment. The JSC will maintain an automated database of interference incidents, resolutions, and lessons learned from the historical interference reports addressed to the JSC. This database will provide status tracking, support trend analysis, and facilitate interference analysis and will be accessible to DOD components.

130
Q

109- Define and state the purpose of PLA

A

Plain Language Address. The only designators authorized for use in Naval message addressing by Navy, Marine Corps and Coast Guard activities. Spelling and format accuracy when using a PLA in the action and information address format lines (format lines 7 and 8 respectively) is paramount. Non-conformance will result in message rejection and delay delivery of message traffic.

131
Q

109- Define and state the purpose of DTG

A

Date-Time-Group. Designed to prevent using duplicate DTGs on messages from the same originator. (DDHHMMZ MMM YY)

132
Q

109- Define and state the purpose of UTC (ZULU)

A

Coordinated Universal Time prevents confusion between the different zones and types of time. All time in UTC is suffixed with a Z for identification. Because of this, UTC is referred to as “Zulu” time.

133
Q

109- List the components of a standard navy message

A

/L Message Components: 1. Provides routing information that is automatically assigned once a message has been processed by an automated system, such as NAVMACS II. In JANAP 128, consists of handling instructions consisting of “V” (ensures the first char of following intelligence is not garbled), ZCZC (start of message), station/channel designator, & channel sequence number (VZCZCABC123) 2. Summarizes important information about a message, contains precedence (1st char), language media format (2nd & 3rd chars, usually TT [tape-to-tape] or AA [ASCII to ASCII]), classification (4th char), content indicator code (5th to 8th chars, use ZYUW for all narrative messages, CASREPS use NGCN), originating station routing indicator (OSRI, 7 chars assigned, unit sending message), station serial number (SSN, 4 digit serial of message), Julian Date (3 digits, day in year, range 001-366), Time of File (4 digits, HHMM), classification redundancy (after single -, 4 chars), & destination station routing indicator (DSRI, 7 chars, often use world-wide RI for MCS). F/L 2 ends with a period. (RTTUZYUW OSRI0001 XXXZULU-UUUU–RHMCSUU.) 3. Prosign DE, designation of station calling, transmission identification (station serial number) 4. Security warning, security classification code, transmission release code (TRC), special handling designator(s) (SHD) transmission instructions (ZNR UUUUU) 5. Precedence, originator’s date-time-group (DDHHMMZ MMM YY), message instructions (R 181230Z JUL 07) 6. Message originator (FM) 7. Action addressees (TO) 8. Information addressees (INFO) 9. Exempt addresses (XMT) when an AIG or CAD was used in lines 7 or 810. Accounting symbol, group count prosign 11. Prosign BT12A. Classification12. Message text 13. Prosign BT14. Confirmation, time group15. End-of-message (EOM) validation consisting of number sign (#) and 4-digit station serial number (SSN) (#1234) 16. EOM functions (NNNN)

134
Q

109- Define a “R” Message

A

R - Routine (6 hours)

135
Q

109- Define a “P” Message

A

P - Priority (3 hours)

136
Q

109- Define a “O” Message

A

O - Immediate (30 Minutes)

137
Q

109- Define a “Z” Message

A

Z - Flash (As fast as possible with an objective of less than 10 minutes)

138
Q

109- Define a “W” Message

A

W - Flash Override (3 Minutes) [“Y” per NTP 3 for Emergency Command Precedence]

139
Q

109- State the purpose of an OPTASK COMMS.

A

The OPTASK COMMS message is the means used by which the United States Navy and Allied Navies distribute afloat communications plans.

140
Q

109- State the purpose of a COMMPLAN

A

Communications Plan (COMMPLAN) is a multi-step process of developing and implementing voice and data communications in support of unit and fleet missions. Derived from OPTASK COMMS

141
Q

109- State the purpose of a COMSPOT.

A

Communications Spot (COMSPOT) - reports will be submitted by all ships and shore facilities at any time communication outages or degradations are encountered. Submit the COMSPOT to the servicing NCTAMS and communications station respectively, info to the appropriate numbered fleet commander and ISIC. Timely submissions of COMSPOT reports are required, within thirty minutes of outage. Updates will be provided every hour or upon significant change in status. If systems cannot be restored within 48 hours, submission of a CASREP will be sent in accordance with Joint Force Maintenance Manual. Do not delay CASREP submission because the cause of the outage is unclear (e.g., transport versus network). Intermittent outages should be considered for CASREP as well once the troubleshooting has exceeded the 48-hour window.

142
Q

109- State the purpose of a Communications service advisory.

A

Communications Service Advisory - reports will be submitted by shore facilities at any time communication outages or degradations are encountered. Advisories are sent out anytime more than one unit has experienced an outage on a particular communications system.

143
Q

109- State the purpose of Electronic Key Management System (EKMS)

A

EKMS-1B prescribes the minimum policies for issuing, accounting, handling, safeguarding, and disposing of COMSEC (Communications Security) material.

144
Q

109- State the purpose of OTAT

A

Over-the-Air Key Transfer (OTAT): Net Control Stations (NCSs), Circuit Control Offices, and Operational Commanders are authorized to transmit key, which is obtained through normal channels or is locally generated, over-the-air to interconnecting stations or supporting units. Does not rekey equipment on the circuit it is sent over.

145
Q

109- State the purpose of OTAR

A

Over-the-Air Rekeying (OTAR): NCSs and Circuit Control Officers are authorized to conduct OTAR with key that is obtained through normal channels or is locally generated, and rekey remote circuits under their control that employ crypto systems designated for OTAR. Only rekeys equipment on the circuit it is sent over.

146
Q

109- Describe TEMPEST

A

TEMPEST is the code name given to the investigation, study, and control of compromising emanations from telecommunications and automated information processing systems. Used to analyze and measure unwanted signal leakage do to equipment radiation.

147
Q

109- State the purpose of Emissions Control (EMCON).

A

EMCON is control of all electromagnetic and acoustic radiations, including communications, radar, EW and sonar. During its imposition, no electronic emitting device within designated bands, including personal communications devices, will be operated unless absolutely essential to the mission.

148
Q

110- Describe the mission of ASW

A

(Anti-Submarine Warfare): Operations conducted with the intention of denying the enemy the effective use of submarines.

149
Q

110- Describe the mission of AUW

A

(Surface Warfare): That portion of maritime warfare in which operations are conducted to destroy or neutralize enemy naval surface forces and merchant vessels.

150
Q

110- Describe the mission of IW

A

(Information Warfare): Information operations conducted during time of crisis or conflict to achieve or promote specific objectives over a specific adversary or adversaries.

151
Q

110- Describe the mission of AW

A

(Air Warfare): NWP 3-56 identifies this as AD (Air Defense). There is no mention of AW or Air Warfare in NWP 3-56. AD is defined as all defensive measures designed to destroy attacking enemy aircraft or missiles in the Earth’s envelope of atmosphere, or to nullify or reduce the effectiveness of such attack

152
Q

110- Describe the mission of STW

A

(Strike Warfare): Naval operations to destroy or neutralize enemy targets ashore, including attacks against strategic or tactical targets such as manufacturing facilities and operating bases from which the enemy is capable of conducting or supporting air, surface, or subsurface operations against friendly forces.

153
Q

110- Describe the mission of NSW

A

(Naval Special Warfare): A designated naval warfare specialty that conducts operations in the coastal, riverine, and maritime environments. Naval special warfare emphasizes small, flexible, mobile units operating under, on and from the sea. These operations are characterized by stealth, speed, and precise violent application of force.

154
Q

110- Discuss the IO (Information Operations) Core Capabilities

A

(1) Psychological Operations, (2) Military Deception, (3) Operational Security (4) Computer Network Operations, (5) Electronic Warfare Authorities.

155
Q

110- Define the role of the U.S. Navy Blue Team

A

The group responsible for defending an enterprise’s use of information systems by maintaining its security posture against a group of mock attackers (i.e., the Red Team). Typically the Blue Team and its supporters must defend against real or simulated attacks. — The term Blue Team is also used for defining a group of individuals that conduct operational network vulnerability evaluations and provide mitigation techniques to customers who have a need for an independent technical review of their network security posture.

156
Q

110- Define the role of the U.S. Navy Red Team

A

A group of people authorized and organized to emulate a potential adversary’s attack or exploitation capabilities against an enterprise’s security posture. The Red Team’s objective is to improve enterprise Information Assurance by demonstrating the impacts of successful attacks and by demonstrating what works for the defenders (i.e., the Blue Team) in an operational environment.

157
Q

110- Explain USC Title 10

A

US Code Title 10: Outlines the role of the armed forces in the Unites States code. It provides the legal basis for the roles, missions and organization of each of the services as well as the United States Department of Defense. Each of the five subtitles deals with a separate aspect or component of the armed services.

158
Q

110- Explain USC Title 50

A

US Code Title 50: Outlines the role of war and National Defense.

159
Q

110- Define CRITIC

A

Critical Intelligence Communication— Critical intelligence that is crucial and requires the immediate attention of NSA and Whitehouse situation room. It is required to enable the commander to make decisions that will provide a timely and appropriate response to actions by the potential or actual enemy. — It includes but is not limited to the following: — Strong indications of the imminent outbreak of hostilities of any type (warning of attack, i.e. assassination attempt of high ranking officials); — Aggression of any nature against a friendly country— Indications or use of nuclear, biological, and chemical weapons— Significant events within potential enemy countries that may lead to modification of nuclear strike plans.

160
Q

110- State the purpose of JDISS

A

JDISS: The Joint Deployable Intelligence Support System (JDISS) program provides a family of hardware and software capabilities that allow connectivity and interoperability with intelligence systems supporting forces, in garrison, and deployed during peace, crisis, and war. It provides the Joint Intelligence Center (JIC), Joint Task Forces (JTF) and operational commanders with on-site automation support and the connectivity necessary to execute the intelligence mission.