Book 1 Flashcards

1
Q

State the location, mission, and component commands for the following: CNO N2/N6:

A

Director of Naval Intelligence/ Deputy Chief Naval operations (communications networks). A critical link to the inteligence community.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

State the location, mission, and component commands for the following: CNMOC

A

Commander Naval Meteorology and Oceanography command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

State the location, mission, and component commands for the following: NNWC

A

Naval Network warfare command- Norfolk, Virginia- Operations and Security of the Global Interface Grid (GIG)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

State the location, mission, and component commands for the following: JSOC

A

Joint Space Operations Center- Vandenberg AFB, California

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

State the location, mission, and component commands for the following: NOAA

A

National Oceanic and atmospheric Administration- Silver Spring, Maryland

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

State the location, mission, and component commands for the following: NAVSOC Naval Sattelite Operations Center

A

Point Mugu, CA- provides Highly efficent, low cost, reliable suport to critical Navy and DOD sattelite systems, all in support of the joint warfighter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

State the location, mission, and component commands for the following: NAVIFOR

A

Suffolk, Virginia. Commander, nval information forces. Resposible for Navy IW force generation and delivery to naval and joint operational commanders; IW doctrine, policy and goverance; training requirements; and community management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

State the location, mission, and component commands for the following: ONI

A

Office of Naval Intelligence- Suitland, Maryland and produces meaningful maritime intelligence and moves that intelligence rapidly to key strategic, operational, and tactical decision-makers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

State the location, mission, and component commands for the following: Office of the Oceanographer/ Navigator of the navy

A

provides naval, joint, and coalition war fighters with environmental understanding of the air, surface, and subsurface maritime battle space- Washington, D.C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

State the location, mission, and component commands for the following: USCYBERCOM

A

US Cyber command and is located at fort meade, Maryland

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

2nd Fleet Location

A

Norfolk, VA. Western North Atlantic Ocean

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

3rd Fleet Location

A

San Diego, CA. Eastern Pacific Ocean

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

4th Fleet Location

A

Africa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

5th Fleet Location

A

Middle East. Persian Gulf, Red Sea and partially the Indian Ocean.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

6th Fleet Location

A

Gaeta, Italy. Eastern North Atlantic and mediterranean

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

7th Fleet Location

A

Yokosuka, Japan. Western Pacific and Indian Ocean

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

10th Fleet Location

A

Cyber space and Space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

TF

A

Task force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

TG

A

Task Group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

TU

A

Task Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

TE

A

Task Element

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Aerographers Mate (AG)

A

collect, measure, and analyze the elements of the physical environment (land, sea, air, space) and land/ sea interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Cryptologic Technicians Interprative

A

conduct Infromation Operations (IO) using foreign language skills and advanced computer systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Cryptologic Technicans Maintenance

A

perform preventative and corrective maintenance on electrical and electronic cryptological equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Cryptologic technicians Networks (CTN) Superseded by CWT Cyber warfare Tech
monitor, identify, collect and analyze information, provide data for digital network products, and conduct computer network operations
26
Cryptologic Technicians Collection (CTR)
operate state-of-the-art computer systems to conduct information operations; collect, analyze and exploit signals of interest to identify, locate and report worldwide threats.
27
Cryptologic Technicians Technical (CTT)
operate and maintain electronic sensors and computer systems; collect, analyze, exploit, and disseminate Electronic Intelligence (ELINT) all in accordance with fleet and national tasking.
28
Intelligence Specialist (IS)
assist in every phase of the planning, collectionm processing, analysis, and idssemination of intelligence information; assemble and analyze multi-source operational intelligence in support of all warfare areas.
29
Information System Technicians (IT)
perform core and specialty functions of Communications Operations, message processing, and network administration and security.
30
Define NCTAMS LANT
Norfolk, VA. Provides secure and reliable, classified and unclassified, voice, messaging, video, and data, telecommunications to surface, subsurface, air and ground forces in support of Command, Control, Computer, Communications, and Intelligence (c4I) for real-world operations and exercises and to US Naval, Joint and Coalition operating forces worldwide.
31
Define NCTAMS PAC
Wahiawa, HI. Provides similar infrastructure support mainly for PACFLT Aswell as a backup to NCTAMS LANT.
32
Define NCTS Bahrain
Provides multi-spectral connectivity, network operations and information assurance to navy, joint and coalition forces in support of operations
33
Define NCTS Guam
(NCTS Guam) is a United States Navy communications facility on the U.S. territory of Guam. NCTS Guam is under 10th Fleet and NCTAMS PAC
34
Define NCTS NAPLES
The Naval Computer and Telecommunications Station Naples (NCTS Naples) provides voice, video and data services to the U.S. Navy joint, allied and coalition customers.
35
Define NCTS San Diego
NCTS San Diego is a regional communication office that provides quality, integrated tactical and non-tactical telecommunications connectivity to local and regional customers, both afloat and ashore
36
DEFINE C5I
COMMAND, CONTROL, COMMUNICATION, COMPUTERS, COLLABORATION, AND INTELLIGENCE.
37
EXPLAIN THE MISSION OF DISA
TO PROVIDE COMMAND AND CONTROL CAPABILITIES AND ENTERPRISE INFRASTRUCTURE TO ASSURE GLOBAL NET-CENTRIC ENTRPRISE ACROSS FUL SPECTRUM OF OPERATIONS.
38
EXPLAIN THE MISSION OF THE NASIC
NAVAL AIR AND SPACE INTELLIGENCE CENTER- PROVIDSE INTEL DIRECTLY TO MILITARY UNITS DEVELOPMENT AND SUSTAINMENT OF US AIR, SPACE AND CYBERSPACE CAPABILITIES.
39
STATE THE MISSION OF NCDOC
TO COORDINATE, MONITOR AND OVERSEE THE DEFENSE OF THE NAVY COMPUTER NETWORKS AND SYSTEMS; TO EXECUTE COMPUTER NETWORK DEFENSE MISSIONS AS ASSIGNED BY COMMANDER, TENTH FLEET AND COMMANDER, US CYBER COMMAND.
40
ODNI
OFFICE OF DIRECTOR OF NATIONAL INTELLIGENCE
41
DIA
DEFENSE INTELLIGENCE AGENCY
42
NSA
NATIONAL SECURIT AGENCY
43
CIA
CENTRAL INTELLIGENCE AGENCY
44
NGA
NATIONAL GEOSPATIAL INTELLIGENCE AGENCY
45
DHS
DEPARTMENT OF HOMELAND SECURITY
46
FBI
FEDERAL BUREAU OF INVESTIGATION
47
DEA
DRUG ENFORCEMENT AGENCY
48
DOE
DEPARMENT OF ENERGY
49
DOS
DEPARTMENT OF STATE
50
DOT
DEPARTMENT OF TRANSPORTATION
51
NASA
NATIONAL AERONAUTICS AND SPACE ADMINISTRATION
52
NMEC
NATIONAL MEDIA EXPLOITATION CENTER
53
NRO
NATINOAL RECONNAISSANCE OFFICE
54
USAF
USAIRFORCE
55
USA
US ARMY
56
USMC
US MARINE CORP
57
USN
US NAVY
58
USCG
US COAST GUARD
59
THREE LEVELS OF LEADERSHIP
DIRECT, SENIOR, EXECUTIVE.
60
COMMANDER IN CHIEF
PRESIDENT OF THE UNITED STATES, DONALD J. TRUMP IS THE OVERALL HEAD OF THE US ARMED FORCES.
61
SECRETARY OF DEFENSE
PETE HEGSETH. HEAD OF THE US DOD CONCERNED WITH THE ARMED SERVICES AND MILITARY MATTERS, THIS POSITION ROUGHLY OCRRESPONDS TO MINISTER OF DEFENSE IN OTHER COUNTRIES.
62
SECRETARY OF THE NAVY.
CARLOS DEL TORO WAS THE PREVIOUS. SUBORDINATE TO THE SECRETARY OF DEFENSE, THE SECRATARY OF THE NAVY IS RESPONSIBLE FOR, AND HAS STATUTORY AUTHORITY (TITLE 10 OF THE UNITED STATES CODE SECTION 5013) TO "CONDUCT ALL THE AFFAIRS OF THE DEPARTMENT OF THE NAVY"
63
Chairman of the Joint Chiefs of Staff:
Currently General Charles Q. Brown, Jr is the principal military adviser to the President, Secretary of Defense, and the National Security Council (NSC), also the highest-ranking military officer
64
Chief of Naval Operations
Admiral Lisa Marie Franchetti. Reports directly to the Secretary of the Navy for the command, utilization of resources and operating efficiency of the operating forces of the Navy and of the Navy shore activities assigned by the Secretary. Under the authority of the Secretary of the Navy, the CNO also designates naval personnel and naval resources to the commanders of Unified Combatant Commands.
65
Numbered Fleet Commander:
Each fleet is led by a three-star vice admiral, except Fourth Fleet is led by a rear admiral. These seven fleets are further grouped under Fleet Forces Command (the former Atlantic Fleet), Pacific Fleet, Naval Forces Europe, and Naval Forces Central Command, whose commander also doubles as Commander Fifth Fleet; the first three commands being led by four-star full Admirals
66
Type Commander:
COMNAVAIRFOR is responsible for modernization needs, training initiatives, and operational concept development for the naval aviation community throughout the U.S. Navy's operational fleet.
67
Master Chief Petty Officer of the Navy:
James Honea. The senior enlisted leader of the Navy and reports directly to the CNO.
68
Fleet Master Chief
responsible for larger fleet commands: e.g., U.S. Pacific Fleet. There are Five Fleet Master Chief positions in the Navy
69
Force Master Chief
Force Master Chief: responsible for larger force commands: e.g., Submarine Force U.S. Atlantic Fleet. There are ten Force Master Chief positions in the Navy.
70
COMMAND MASTER CHIEF
Command Master Chief: Is the senior enlisted person at a command and as such works as a liaison between the Commanding Officer and the enlisted ranks, serving as the senior enlisted leader.
71
BBD
Billet Based Distribution – 10 Section document that gives a command all the pertinent information concerning
72
ODCR
The Officer Distribution Control Report – is similar to the BBD, except is utilized for the placement of officers.
73
AMD
Activity Manpower Document – contains the manpower requirements for the Navy.
74
Evaluation report:
is an evaluation of a Sailor’s performance in the last year and is used for personnel E-6 and below
75
Fitness report
Fitness reports are similar to the Evaluation reports but are designed for Officers W2-W5 and O1-O9.
76
Concurrent report:
Concurrent reports are filed when Sailors are away from their parent command such as IA or TAD for a period greater than 90 days
77
Page 2
SGLI and dependents page.
78
Page 13
Administrative comments in a Sailor’s record can be a local record or be added to their permanent record.
79
NAVPERS 1070/880 and 881
A listing of qualifications, awards earned, Schools attended and the history of assignments.
80
SGLI
$400,000 life insurance policy for all active-duty service members.
81
OPREP-3 NAVY BLUE:
any incident military, political, or media interests that are of high Navy, vice national level, interest; may include murder, rape, forcible sodomy, aggravated sexual assault, armed robbery, aggravated assault, assault with a deadly weapon, kidnapping, carjacking, and burglary of an occupied dwelling. Sent to CNO.
82
The OPEREP-3 NAVY PINNACLE:
used to report any event or incident that could attract national-level interest, are sent to the Pentagon.
83
OPREP-3 NAVY UNIT SITREP:
reported to the Operational Commander, and includes lesser misconduct to include domestic violence, domestic abuse, child abuse/neglect, child sexual abuse, indecent assault, assault with intent to commit rape or forcible sodomy, sexual harassment, DUI, suicide-related behavior, EO incidents, unlawful discrimination, and hazing.
84
Discuss the importance of the IG
The Office of the Inspector General of the Department of Defense was established as an independent and objective unit within the Department of Defense to conduct and supervise audits and investigations relating to the programs and operations of the Department of Defense.
85
State the purpose of the Navy Correspondence Manual.
The correspondence manual provides the user with the proper means of drafting Navy Messages from formatting to proper titles and spacing.
86
Explain the C-WAY program.
It is used for retention purposes to determine whether an individual was eligible to re-enlist and the manning volumes for each rating.
87
List the officer accession programs that are available to enlisted personnel.
1. US Naval Academy and Naval Academy Preparatory School 2. Selection and Training Program (BOOST) 3. Officer Candidate School (OCS) Program 4. Limited Duty Officer (LDO) and Chief Warrant Officer (CWO) Programs 5. Seaman to Admiral-21 (STA-21) Program 6. Medical Enlisted Commissioning Program 7. Medical Service Corps In-service Procurement Program
88
Explain what the DLPT is.
The Defense Language Proficiency Test: is a battery of foreign language tests produced by the Defense Language Institute and are intended to assess the general language proficiency of native English speakers in a specific foreign language, in the skills of reading and listening.
89
104.12 State the duties and responsibilities of the Command ESO.
Education Service Officer: assists the Executive Officer in administering education programs and oversees the command’s training program.
90
Explain the purpose of the U. S. Navy’s Drug Screening Program.
Assists the local command with administering urinalysis testing to reduce or eliminate illicit drug use in the Navy.
91
Describe the six programs of Brilliant on the Basics.
1. Career Development Board 2. Sponsorship 3. Mentorship 4. Sailor Recognition 5. Command Indoctrination 6. Command Ombudsmen
92
104.15 Explain the CNO’s four core attributes.
1. Integrity 2. Accountability 3. Initiative 4. Toughness
93
Explain the purpose of the PAO.
The Public Affairs Officer: Their function is to coordinate between media outlets and the command’s OPSEC officer to prevent sensitive material from being disclosed to the public
94
Discuss the purpose of the 3-M/PMS System.
1. 3M: Maintenance and Material Management is a program designed for commands to conduct maintenance on a specific schedule to achieve maximum equipment operational readiness. 2. PMS: Preventive Maintenance System: is a standardized method for planning, scheduling, and accomplishing preventive maintenance.
95
Discuss the purpose and components of NTCSS
Naval Tactical Command Support System (NTCSS) is a logistics command and control support information system.
96
RADM
Relational Administration; Used for muster, PQS input, role assignments, and recall information.
97
R-SUPPLY
Relational Supply; Used to order tools/parts
98
OMMS-NG
Organizational Maintenance Management System-Next Generation, Job submission on ship’s equipment
99
Explain how DPAS is used to track equipment.
Defense Property and Accountability System: is software developed to standardize property accountability, asset management and financial reporting across all of the DoD.
100
Discuss the purpose of the MOV program.
Material Obligation Validation: is a system used to verify the unfilled quantity of a requisition that is not immediately available for issue (backorder).
101
Discuss the DLRs program.
Depot Level Repairable: are repaired at the organizational or intermediate level based on the cost and need for repair
102
Explain the procedures for NRFI DLRs in regard to the following situations. a. Turn-in:
DOD components shall physically turn in their property to the nearest DRMO when economically feasible and permitted by Hazardous Waste regulations.
103
Explain the procedures for NRFI DLRs in regard to the following situations. b. RIP (Receipt in Place or Remain in Place):
occurs when a command cannot remove the current part until a replacement can be made available for install.
104
Maintenance Assistance Modules (MAMs)
is a system recording, reporting and evaluating the maintenance requirements of the fleet.
105
Bulkhead mounted spares
spare parts located near or within a work center to provide easy access to replacement parts for items that require frequent repair.
106
Define the term CASREP
Casualty reporting – A system for requisitioning emergency replacement parts for equipment or components out of commission that are essential to the command’s mission.
107
CASREP CAT1
Non-sufficient impact on command.
108
CASREP CAT3
major degradation of secondary mission or minor degradation of a primary mission.
109
CASREP CAT2
minor degradation of secondary mission
110
COG
Cognizance Symbol
111
CASREP CAT4
loss of at least one primary mission (i.e. DIW).
112
NSN
National Stock Number
113
APL
Allowance Parts List
114
AEL
Allowance Equipage List
115
NC
Not Carried
116
NIS
Not in Stock
117
DD Form 1348-6
DOD Single Line-Item Requisition System Document
118
SIM
Selected Item Management
119
NAVCOMPT 2276
Contractual procurement
120
DD Form 448
Military interdepartmental purchase request
121
SF 44
On the spot, over-the-counter purchase request ($2,500 MAX for supplies, $25,000 for Aviation Fuel)
122
SF 1449
Solicitation Contract Order for commercial items
123
SF 30
Modification of contract
124
DD Form 1155
shipment invoice
125
DD Form 200
Survey Form - for missing or non-repairable electronic test equipment
126
SF 364
Report of Deficiency - for shipping or packing discrepancies
127
SF 386
Quality Deficiency Report - to report deficiencies in materials received
128
DD Form 1149
Requisition and invoice/shipping document
129
CHRIMP
The Consolidated Hazardous Material Reutilization and inventory Management Program serves as a fundamental element of the Navy’s life cycle control and management of hazardous materials.
130
DRMO
Defense Reutilization and Marketing Office. A service that is designed to save valuable ships resources by providing an inventory or excess material that has been turned into through the Defense Reutilization and Marketing Service (DRMS)
131
GSA Acquisitions
A self-service store operated by an ashore supply activity. Provides a ready supply of relatively low-cost items frequently required by customers in the area.
132
Explain OPTAR and its components.
Operational Target: is an estimated amount of money that will be required by an operating unit to perform tasks and functions that are assigned.
133
Discuss the uses of the Government commercial purchase Card (IMPAC VISA).
Is used as a payment vehicle for commercial invoices valued at or below the micro-purchase threshold ($3,000)
134
Normal Power
Power supplied by the power company.
135
Emergency Power
Backup or generator power if normal power fails
136
Uninterrupted Power
Assures continued performance during a power outage or allow time to transfer of function to an alternate power source.
137
Discuss the purpose of personnel security.
Purpose of personnel security is to authorize initial and continued access to classified information and/or initial and continued assignment to sensitive duties to those persons whose loyalty, reliability and trustworthiness are such that entrusting them with classified information or assigning them to sensitive duties is clearly consistent with the interests of national security. Additionally, the PSP ensures that no final unfavorable personnel security determination will be made without compliance with all procedural requirements.
138
TOP SECRET
(ORANGE) highest level, compromise would cause “exceptionally grave damage” to national security.
139
SECRET
(RED) compromise would cause “serious damage” to national security.
140
CONFIDENTIAL
(BLUE) lowest level, would cause “damage” to national security.
141
UNCLASSIFIED
(GREEN) can be released without clearance, but is sometimes restricted—SBU (Sensitive, But Unclassified), FOUO (For Official Use Only), or NOFORN (No Foreign Officials).
142
Explain what is meant by ‘need to know’.
Limits materials to personnel who have the appropriate clearance and a necessity for the information to perform their duties.
143
State the type of investigation and how often it is updated for access to the following classification levels. (TOP SECRET)
SSBI – 5 years
144
State the type of investigation and how often it is updated for access to the following classification levels. (SECRET)
NACLC – 10 and 15 years
145
State the type of investigation and how often it is updated for access to the following classification levels. (CONFIDENTIAL)
NACLC – 10 and 15 years
146
State the type of investigation and how often it is updated for access to the following classification levels. (SCI)
SSBI – 5 years
147
Identify what a (SAER) is and its purpose.
Security Access Eligibility Report is used to identify changes in a person’s eligibility for a security clearance.
148
Identify the events that should be reported to the SSO.
Any unlawful or criminal acts, foreign travel, changes in marital status, financial difficulties, and, but not limited to, any contact with foreign peoples or officials.
149
Identify who has overall authority of, and controls access to, a SCIF.
Special Security Officer (SSO).
150
SF700
security container information.
151
SF701
activity security checklist.
152
SF702
container checklist.
153
SF703
Top Secret Cover Sheet (SF704-Secret Cover Sheet & SF705-Confidential Cover Sheet)
154
SF153
COMSEC (CMS) Report.
155
SF312
classified information Non-Disclosure Agreement (NDA).
156
State when safe combinations should be changed.
1. When first placed in use. 2. When someone transfers out of the facility. 3. When subjected to compromise. 4. When taken out of service.
157
State the responsibilities of the DDA
The DDA has the authority and responsibility to control disclosures of Classified Military Information (CMI) and Controlled Unclassified Information (CUI) to foreign governments and international organizations and their representatives or persons sponsored by them.
158
State the purpose of the DCS.
Defense Courier Service: tasked with establishment, staffing, maintaining and operating an international network of couriers for secure transmission of classified documents and materials (USPS).
159
Describe the procedures for preparing hard copy classified material for transportation via (DCS)
classified documents and material shall be addressed with the standardized DCS two-line address. Envelopes, labels, or tags with visible "postage and fees paid" indicia shall not be used. Security classification markings, special security caveats, and other extraneous markings must not appear on the outer wrapper. Nickname and/or special project markings previously approved by the DCS must be placed on the outer wrapper.
160
Describe the procedures for preparing hard copy classified material for transportation via (Handcarry)
when transferring information inside a facility, use a coversheet. If it must be carried outdoors, double-wrap the item.
161
State the THREATCON recognition and Force Protection levels and discuss what each represents.
1. NORMAL: general threat of terrorist activity is possible. 2. ALPHA: threat of possible terrorist activity is unpredictable. 3. BRAVO: a predictable terrorist activity exists. 4. CHARLIE: a terrorist attack is imminent. 5. DELTA: terrorist attack is occurring or just occurred.
162
Random Antiterrorism Measures (RAM)
used to deter possible terror plot by changing force protection posture (i.e. gate changes, hour changes, shift rotation changes, etc.).
163
PSP
Physical Security Program, provides authorized access to classified material.
164
ATFP
Anti-Terrorism Force Protection, provides a safe and secure environment for and deter acts of terrorism against DOD personnel, assets, and facilities.
165
Explain and state the purpose of an EAP.
Emergency Action Plan: establishes procedures to protect classified information and communications security materials during emergency situations such as abandoning ship or natural disasters. Can only be initiated by the Commanding Officer or the highest ranking official
166
Explain and state the purpose of Emergency Destruction Procedures.
Prescribes policy and procedures for planning, protecting, and destroying COMSEC material during emergency conditions
167
State who can give the order to initiate Emergency Destruction.
The Commanding Officer or other responsible official must be aware of and approve the emergency plan as outlined in the CO’s battle orders.
168
Explain how, and in what order, material is destroyed during Emergency Destruction.
Items are destroyed in the following order by burning, shredding, destroying, sinking, or physically smashing equipment. 1. Priority One-- Top Secret information 2. Priority Two--Secret information 3. Priority Three--Confidential information
169
Define SCI.
Sensitive Compartmented Information. Classified information concerning or derived from intelligence sources, methods, or analytical processes that is required to be handled within formal access control systems
170
Describe the Items that are PROHIBITED EXCEPT FOR OFFICIAL DUTY In a SCIF
1. PROHIBITED EXCEPT FOR OFFICIAL DUTY: a. Two-way transmitting equipment. b. Recording equipment (audio, video, optical). Associated media will be controlled. c. Test, measurement, and diagnostic equipment.
171
Describe the Items that are explicitly PROHIBITED IN SCIFs
2. PROHIBITED IN SCIFs: a. Personally owned photographic, video, and audio recording equipment. b. Personally owned computers and associated media.
172
explain differences between PDS vs Security Violation
1. PDS: A failure to comply with the provisions of security regulations causing a potential compromise of classified information 2. Security Violation: A compromise of classified information to persons not authorized to receive it or a serious failure to comply with the provisions of security regulations which is likely to result in compromise.
173
Explain the security requirements for a SCIF
a solid, permanent facility that is sound-proof, one primary entrance with an automatic closing door, vents/ducts that are protected with bars, as well as opaque windows or no windows.
174
Explain the security requirements for a T-SCIF
Tactical SCIF has physical barriers like a facilities SCIF, but also has physically armed sentries standing guard over the space.
175
Explain vault recertification and recurring inspections.
For Secret and above, recertification and inspections occur every six months. For Confidential and below, every nine months.
176
Discuss the need for access lists, required documentation logs, and two-person integrity.
All of these are required for accountability purposes and to prevent the loss or theft of materials.
177
Explain the DOD escort policy.
The movement of all visitors shall be controlled to ensure that access to classified information is deliberate and consistent with the purpose of the visit.
178
Discuss the procedures for sanitizing an area.
The removal of information from the media or equipment such that data recovery using any known technique or analysis is prevented.
179
Discuss each of the following, giving their definition and the purpose of each: a. COMSEC: b. INFOSEC: c. COMPUSEC:
a. COMSEC: Communications Security, protects classified and unclassified voice, video, and data systems. b. INFOSEC: Information Security, protects US information and information systems. c. COMPUSEC: Computer Security, protects computing systems against compromise.
180
State the purpose of the ICD system.
Principal means by which the DNI provides guidance, policy, and direction, and instruction to the Intelligence Community.
181
Identify SSO Navy
Special Security Officer for the Navy has been designated as the Cognizant Security Authority (CSA), and is responsible for implementing SCI security policy and procedures.
182
106.31 List the duties and responsibilities of the SSO
The SSO is responsible for the operation (i.e. security, control, use, etc.) of all command Sensitive Compartmented Information Facilities (SCIFs).
183
Identify who can be a CSM
The command security manager must be an officer or a civilian employee, GS-11 or above, with sufficient authority and staff to manage the program for the command.
184
State the duties and responsibilities of a CSM.
The CSM ensures that the security programs are coordinated and inclusive of all requirements as outlined in SECNAVINST-M-5510.36. (See section 204 for more information)
185
Explain and state the purpose of JPAS.
Joint Personnel Adjudication System: provides centralized, integrated system to assist verification of a person’s security clearance status and eligibility.
186
106.35 Explain and state the responsibilities of DODCAF.
Department of the Navy Central Adjudication Facility reports directly to DIRNCIS and conducts clearance verification to enhance national security and protect government information.
187
106.36 Discuss how long a Commanding Officer can administratively suspend access before DODCAF revokes a clearance.
30 days.
188
106.37 Discuss the security rules and procedures for magnetic and electronic media.
1. Must be properly stored and labeled 2. Must be degaussed and/or properly destroyed 3. Records of materials and their destruction must be maintained
189
Define Information Assurance (IA)
Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation.
190
Define Defensive Cyberspace Operations (DCO)
Missions are executed to defend the DODIN, or other cyberspace DOD cyberspace forces have been ordered to defend, from active threats in cyberspace
191
Define Offensive Cyberspace Operations (OCO)
Missions intended to project power in and through foreign cyberspace through actions taken in support of CCDR or national objectives.
192
107.2 Define Certification
comprehensive evaluation of the technical and non-technical security safeguards of an information system that establishes the extent to which a particular design and implementation meets a set of specific security requirements.
193
107.2 Define Accreditation
a process in which certification of competency, authority, or credibility is presented.
194
107.2 Define DAA
the Designated Approving Authority, is the official with the authority to formally assume responsibility for operating a system at an acceptable level of risk.
195
107.2 Define System Security Plan
the purpose of the system security plan (SSP) is to provide an overview of the security requirements of the system and describe the controls in place or planned responsibilities and expected behavior of all individuals who access the system.
196
107.2 Define ATO
Authorization to Operate, the official management decision issued by a DAA or authorize operation of an information system and to explicitly accept the residual risk to agency operations.
197
107.2 Define IATO
an Interim Authorization to Operate (IATO), is the temporary authorization granted by a DAA for an information system to process information based on preliminary results of a security evaluation of the system.
198
107.2 Define Configuration Management
management of security features and assurances through control of changes made to hardware, software, firmware, and documentation, test, test fixtures, and test documentation throughout the life cycle of an information system.
199
107.3 Discuss security procedures involved when performing cross-domain transfers.
In addition to command specified required training, transferring of files from a lower classification to a higher classification requires malware scanning of the source files, but is not limited to the type of file being transferred. From higher classification down however, the files MUST be converted to a .txt document and ran through a buster tool designed to look for key words to enable the user to safely transfer information without leaking potentially classified documents. Also, the user and a subject matter expert need to go through any document being transferred down to ensure that no potentially dangerous material is spilled onto an unclassified host.
200
107.4 Discuss Risk Management
Process of managing risks to agency operations (including mission, functions, image, or reputation), agency assets, or individuals resulting from the operation of an information system. The process considers effectiveness, efficiency, and constraints due to laws, directives, policies, or regulations.
201
107.5 Define the five attributes of IA
a. Confidentiality: is assurance that information is not disclosed to unauthorized individuals, processes, or devices. b. Integrity: is assurance that information is not modified by unauthorized parties or in an unauthorized manner. c. Availability: is assurance of timely, reliable access to data and Information Systems by authorized users. Availability-focused IA controls protect against degraded capabilities and denial of service conditions. d. Non-repudiation: is assurance that the sender of data is provided with proof of delivery and the recipient is provided with proof of the sender's identity, so neither can later deny having processed the data. e. Authentication: is assurance of the identity of an e-mail message sender or receiver is who they claim they are.
202
9 categories of computer incidents: CAT1
Root-Level Intrusions – Unauthorized privileged access (administrative or root access) to a DOD system
203
9 categories of computer incidents: CAT2
User-Level Intrusions – Unauthorized non-privileged access (user-level permissions) to a DOD system. Automated tools, targeted exploits, or self-propagating malicious logic may also attain these privileges.
204
9 categories of computer incidents: CAT3
Unsuccessful Activity Attempt – Attempt to gain unauthorized access to the system, which is defeated by normal defensive mechanisms. Attempt fails to gain access to the system (i.e., attacker attempt valid or potentially valid username and password combinations) and the activity cannot be characterized as exploratory scanning. Can include reporting of quarantined malicious code.
205
9 categories of computer incidents: CAT4
Denial of Service – Activity that impairs, impedes, or halts normal functionality of a system or network
206
9 categories of computer incidents: CAT5
Non-Compliance Activity – Occurs when a system is not compliant with appropriate Navy or DOD regulations (i.e. block list not applied, command not up-to-date, etc.).
207
9 categories of computer incidents: CAT6
An activity (scan/probe) that seeks to identify a computer, an open port, an open service, or any combination for later exploits. This activity does not directly result in a compromise.
208
9 categories of computer incidents: CAT7
Malicious Code – Installation of malicious software (i.e. trojan, backdoor, virus, or worm).
209
9 categories of computer incidents: CAT8
Investigating – Events that are potentially malicious or anomalous activity deemed suspicious and warrants, or is undergoing, further review. No event will be closed out as a Category 8. Category 8 will be re-categorized to appropriate Category 1-7 or 9 prior to closure.
210
9 categories of computer incidents: CAT9
Events that are initially suspected as being malicious but after investigation are determined not to fit the criteria for any of the other categories (e.g., system malfunction or false positive). *Category 0 (zero) events are for training purposes only.*
211
107.7 Describe the DON World Wide Web Security Policy.
Provides primary governing policy for all unclassified DOD WWW sites to prevent the release of classified information.
212
Define: Information Assurance Vulnerability Alerts (IAVA)
address severe network vulnerabilities resulting in immediate and potentially severe threats to DON systems and information.
213
Define: Information Assurance Vulnerability Bulletins (IAVB)
address new vulnerabilities that do not pose an immediate risk to DON systems but are significant enough that noncompliance with the corrective action could increase the risk.
214
Define: Computer Tasking Order (CTO)
a formal tasking order that contains detailed guidance and missions for each component to accomplish.
215
Define: NTD (Navy Telecommunications Directive)
a formal tasking order that contains guidance for official Navy communication circuits.
216
Define: NIA/NIB/OIA/OIB
NMCI Information Advisory, NMCI Information Bulletin, Overseas Navy Enterprise Network Advisory, Overseas Navy Enterprise Network Bulletin
217
Define: Patch
Updates, fixes and/or enhancements to a software program delivered in the form of a single installable package.
218
107.9 Define vulnerability assessment
Systematic examination of an information system or product to determine the adequacy of security measures, identify security deficiencies, provide data from which to predict the effectiveness of proposed security measures, and confirm the adequacy of such measures after implementation.
219
107.10 Explain the difference between vulnerability and threat
1. Vulnerability: Weakness in an IS, system security procedures, internal controls, or implementation that could be exploited. 2. Threat: Any circumstance or event with the potential to adversely impact an IS through unauthorized access, destruction, disclosure, modification of data, and/or denial of service.
220
107.11 State the duties and responsibilities of the ISSM and ISSO.
The Information Systems Security Manager/Officer: Is the individual responsible to the Commanding Officer for the proper execution of an effective IA program for their system or site. The ISSM is designated in writing by the CO and is overall in charge of and responsible for the network, its security, as well as any training requirements to ensure the safety of the network, its systems, and its users.
221
107.12 Explain CSWF Specialty Codes and responsibilities
Personnel must meet and maintain the minimum qualification standards of their assigned Specialty Area/Work Role and proficiency level.
222
107.13 Discuss the role and responsibilities of Navy Blue Team
a. Blue Team Operations: uses a team specifically constructed for the Inter-Deployment Training Cycle charged with assisting in the protection of the targeted assets and conducting training to local personnel.
223
107.13 Discuss the role and responsibilities of Navy Red Team
b. Red Team Operation: is an independent and threat-based effort by an interdisciplinary, simulated opposing force, which after proper safeguards are established, uses both active and passive capabilities on a formal, time-bounded tasking to expose and exploit IA vulnerabilities of friendly forces.
224
107.14 Define CCRI and NAVIFOR role during the process (NOW CORA) (Command Operational Readiness Assessment)
Command Cyber Readiness Inspection (CCRI) – quick look methodology for compliance validations for COCOMs. NAVIFOR is the Office of the Designator Approving Authority and is the overall authority for operating a network.
225
107.15 Explain what constitutes PII
1. PII is any information which can be used to distinguish or trace an individual's identity, such as their name, social security number, biometric records, etc. alone, or when combined with other personal or identifying information which is linked or linkable to a specific individual, such as date and place of birth, mother’s maiden name, etc.
226
Explain the importance of Safeguarding
2. Safeguarding is protective measures to prevent compromise or unauthorized disclosure of personally identifiable information (PII) The loss of PII can result in substantial harm to individuals, including identity theft or other fraudulent use of the information.
227
107.16 Explain why the U.S. Navy only uses “.mil” email addresses on government systems.
Official government email system restricts access to official users providing CIANA requirements as well as meeting IA and accreditation requirements.
227
Define and uses Host/Client:
any node that can be connected to a network, and allow users to interact with it and utilize its resources (i.e. a computer or other networking device).
227
Define and uses Application Server:
a server with the specific purpose of providing services to users from a centralized source.
228
Define and uses Hub:
a layer 1 network device that allows for computers to be connected to share data. This device does not separate collision domains.
229
Define and uses Switch:
layer 2 network device that allows for computer to be connected to share data. This device separates each host onto its own collision domain allowing for fast, reliable communication between hosts.
229
Define and uses Router:
layer 3 network device that interconnects two or more computer networks together. A router is a networking device whose software and hardware are customized to the tasks of routing and forwarding information and has two or more network connections to allow cross-network communication to occur.
230
Define and uses WAP:
Wireless Access Point, a layer 2 network device that functions similarly to a switch.
231
Define and uses Proxy Server:
allows for multiple hosts to share a single internet connection. Has the ability to filter web traffic, as well as cache commonly used internet pages to speed up internet activity.
232
Define and uses Firewall:
can be either layer 4 or layer 7, and can be comprised of either hardware or software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets.
233
Define and uses VPN Concentrator:
built specifically for creating a remote-access VPN. They provide high availability, high performance and scalability and include components, called scalable encryption processing (SEP) modules that enable users to easily increase capacity and throughput.
234
Define and uses Back-up:
refers to making copies of data so that these additional copies may be used to restore the original after a data loss event (i.e. natural disaster or compromise).
235
Define and uses Repeater:
a layer 1 device used to amplify signals transmitted between network nodes.
236
Define the following layers of routing and common devices associated with each. ACCESS
consists of hubs, repeaters, switches and bridges (layer 1 and layer 2).
237
Define the following layers of routing and common devices associated with each. DISTRIBUTION
LAN-based routers and layer 3 switches to interconnect separate networks.
238
Define the following layers of routing and common devices associated with each. CORE
the network back-bone. Designed to be fault tolerant, have high data transfer rates, and low latency periods.
239
a. Topology (Bus/Star/Ring/Mesh):
the logical layout of the network.
240
b. LAN:
Local Area Network, a computer network covering a small area and contained behind a router.
241
c. WAN:
Wide Area Network, a computer network that covers a broad area or services multiple groups of people by linking LANs together.
242
d. MAN:
Metropolitan Area Network, a large computer network that usually spans a city or a large campus. Utilizes multiple access point to allow users over a large geographical area or location to connect to the same network and use its resources.
243
e. GAN:
Global Area Network, a computer network that spans the globe.
244
a. OSI Model: a logical layout of the interoperability of devices, systems, and applications. (From layer 1 to layer 7)
1. Physical – media, signal, binary 2. Data-Link – physical addressing (Media Access Control or Logical Link Control) 3. Network – logical addressing 4. Transport – end-to-end connections 5. Session – inter-host communications 6. Presentation – data presentation and encryption 7. Application – network process to application
245
b. TCP/IP Model: a logical layout of the interoperability of devices, systems, and applications that utilize networking
Link Layer: Frame Header | Frame Data | Frame Footer Internet Layer: IP Header | IP Data Transport Layer: TCP Header | TCP Data Application Layer: Data
246
a. NIPRNET:
Non-classified Internet Protocol Router Network, is used to exchange sensitive but unclassified information between "internal" users as well as providing user’s access to the Internet.
246
108.5 State the difference between IPv4 and IPv6.
1. IPv4 uses only 32 bits and has no unique identifiers; IPv6 uses a 128-bit address where the last 48 bits is the device’s full MAC address 2. IPv4 uses numeric addresses (205.x.x.x); IPv6 uses hexadecimal address (2001:0D45:FF00::0) 3. IPv4 octets are separated by a dot(.); IPv6 octets are separated by a colon(:)
246
b. SIPRNET:
Secret Internet Protocol Router Network, is a system of interconnected computer networks to transmit classified information up to and including SECRET.
247
c. JWICS:
Joint Worldwide Intelligence Communications System, is a system of interconnected computer networks cleared up to Top Secret and SCI.
247
d. CENTRIXS:
Combined Enterprise Regional Information Exchange System is a collection of classified coalition networks, called enclaves, that enable information sharing using email and Web services, instant messaging or chat, the Common Operational Picture service, and Voice over IP. CENTRIXS supports combatant commands throughout the world, including the U.S. Pacific, Central and European commands. Also known as Secret Releasable
248
a. CANES:
Consolidated Afloat Networks and Enterprise Services (CANES) provide a common computing network and common operating system for command, control, communications, computers, and intelligence (C4I) systems onboard Navy ships.
249
b. DoDIN (GIG):
Department of Defense Information Network, is defined as a "globally interconnected, end-to-end set of information capabilities for collecting, processing, storing, disseminating, and managing information.”
250
c. DISN:
Defense Information Systems Network, has been the United States Department of Defense's enterprise network for providing data, video and voice services for 40 years.
250
d. NMCI:
Navy/Marine Corps Intranet, is an Information System provided by a contracting company (HP) to allow interoperability between CONUS Navy and Marine commands.
251
e. ONENET:
OCONUS Navy Enterprise Network; OCONUS version of NMCI.
251
f. IT21/ISNS:
Shipboard network. Legacy has been getting replaced by canes
252
a. Machine Language:
is a system of instructions and data executed directly by a computer's central processing unit. Machine code may be regarded as a primitive programming language or as the lowest-level representation of a compiled and/or assembled computer program.
253
b. Assembly Language:
is a type of low-level language for programming computers, microprocessors, microcontrollers, and other integrated circuits. They implement a symbolic representation of the numeric machine codes and other constants needed to program a particular CPU architecture.
254
c. High-Level Language:
is a programming language with strong abstraction from the details of the computer. In comparison to low-level programming languages, it may use natural language elements, be easier to use, or be more portable across platforms.
255
d. Operating System:
is a set of system software programs in a computer that regulate the ways application software programs use the computer hardware and the ways that users control the computer.
256
e. Application:
is computer software designed to help the user to perform singular or multiple related specific tasks.
256
a. Virus
: is a computer program that can copy itself and infect a computer using a host (typically benign looking) file. Requires user interaction to propagate across systems.
257
b. Worm:
is a self-replicating malware program that uses a computer network to send copies of itself to other nodes. Unlike a virus, it does not need to attach itself to an existing program.
258
c. Trojan:
is malware that appears to perform a desirable function for the user prior to executing, but instead facilitates unauthorized access of the user's computer system.
259
d. Backdoor:
is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected.
260
e. Phishing:
is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.
261
b. Buffer Overflow:
is a Denial-of-Service attack that overloads a system’s input capacity, thereby crashing the program, system, or preventing the user from accessing its resources.
262
a. Network Enumeration:
is the process of scanning and compiling pertinent information of the layout of a network, its users, and its resources.
263
c. SQL Injection:
overloads the input sector of an SQL database and allows the ability to execute arbitrary code forcing the database to divulge its contents or access privileges.
264
d. Dictionary Attack:
attempts to crack passwords based on a list of words or values.
265
e. Privilege Escalation:
the ability to escalate privileges to a level allowing the intruder to access or execute programs or data higher than the original intrusion perspective.
266
f. Brute Force Attack:
physically inputting a user’s PII until access is granted to a system when credentials are unknown.
267
g. Social Engineering:
the ability to get a user to divulge their credentials or other useful information about themselves or their organization by impersonating someone of authority.
268
h. Rainbow Table:
precomputed table for caching the output of cryptographic hash functions, usually for cracking password hashes. Usually through brute force or dictionary attack.
269
i. Denial of Service (DOS):
cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
270
j. Distributed Denial of Service (DDOS):
malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.
271
108.11 Describe the functionality of PKI.
Public Key Infrastructure is a set of hardware, software, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates to provide encryption and data security in computer networks.
272
a. Domain controllers -
On Microsoft Servers, a domain controller (DC) is a server that responds to security authentication requests (logging in, checking permissions, etc.) within a Windows domain. A domain is a concept introduced in Windows NT whereby a user may be granted access to a number of computer resources with the use of a single username and password combination.
273
b. Exchange -
Microsoft Exchange Server is a calendaring and mail server developed by Microsoft that runs exclusively on the Microsoft Windows Server product line.
274
c. Domain Name System or (SERVICE) -
translates URLs to IP addresses, and vice versa. It allows users to input an easy to remember domain name and be directed to the appropriate website.
275
a. FTP -
PORT 20/21- File transfer Protocol
276
b. SSH -
PORT 22- Secure Shell
277
c. Telnet-
PORT 23 - Unsecure
278
d. SMTP
PORT 25 – Simple Mail Transfer
279
e. DNS
PORT 53 - Translates Domain name to IP
280
f. DHCP
PORT 67/ 68 - Dynamic Host Configuration, used to assign IPs
281
g. HTTP
PORT 30- Hypertext Transfer, used for internet connection
282
h. HTTPS
PORT 443- HTTP combined with SSL ot TLS
283
i. POP3
PORT 110- Retrieve Mail
284
j. IMAP
PORT 143- POP3 with more support for remote mailboxes
285
a. TCP:
It is a connection-oriented protocol. Reads data as streams of bytes, and the message is transmitted to segment boundaries.
286
b. UDP:
It is a connectionless protocol. Messages contain packets that were sent one by one. It also checks for integrity at the arrival time.
287
a. Mandatory Access Controls (MAC):
The operating system or database constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target.
288
b. Discretionary Access Controls (DAC):
Defined by the Trusted Computer System Evaluation Criteria "as a means of restricting access to objects based on the identity of subjects and/or groups to which they belong.
289
c. Role Based Access Controls (RBAC):
restricting system access to only authorized users
290
d. Separation of Duty:
divides critical functions among different staff members in an attempt to ensure that no one individual has enough information or access privilege to perpetrate damaging fraud.
291
108.16 Define/Discuss VOIP and VOSIP
Voice over Internet Protocol, also called IP telephony, is a method and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol networks
291
e. Least Privilege:
must be able to access only the information and resources that are necessary
292
a. Network Address Translation (NAT):
the translation of private IP address to a public IP address
293
b. Port Address Translation (PAT):
an extension of Network Address Translation (NAT) that permits multiple devices on a LAN to be mapped to a single public IP address to conserve IP addresses.
294
c. Demilitarized Zone (DMZ):
demilitarized zone is a perimeter network that protects an organization's internal local-area network (LAN) from untrusted traffic
294
d. Virtualization:
: process of creating a software-based, or virtual, representation of something, such as virtual applications, servers, storage and networks. It is the single most effective way to reduce IT expenses while boosting efficiency and agility
295
108.18 State the purpose of Active Directory.
Provides Domain Services, Rights Management Services, Federation Services, Certificate Services, and Lightweight Directory Services. Integrated with Windows Server, gives out-of-the-box functionality needed to centrally configure and administer system, user, and application settings  
296
109.1 Discuss the purpose of a Red Cross message.
Is used to notify a service member of an emergency or other important event such as the birth of a child or serious illness or death of a family member.
297
a. ADNS:
Automated Digital Networking System connects Navy shipboard networks to other ship and shore networks for transferring IP data of various classification levels.
298
b. CUDIXS:
Common User Digital Information Exchange Subsystem has the capability to both send and receive narrative shipboard message traffic.
299
c. VERDIN:
VLF Digital Information Network is a broadcast system that provides a highly reliable and secure system for worldwide delivery of operational, tactical, and administrative messages from the Fleet Submarine Broadcast System (FSBS) and Minimum Essential Emergency Communications Network (MEECN).
299
d. NOVA:
Automated Message Store and Forward is a switching system that provides automated readdressed and quote functions for authorized users.
300
e. IBS:
INTEGRATED BROADCAST SYSTEM disseminates threat avoidance, targeting, maneuvers, force protection, target tracking, and target/situation awareness information, and will be continuously refined by data from national, theater, and tactical sensors.
301
g. DMS (DEFENSE MESSAGE SYSTEM):
(DEFENSE MESSAGE SYSTEM): Employs the messaging and directory services using internationally recognized COTS-based X.400 and X.500 messaging and directory products.
301
f. INMARSAT:
International Maritime Satellite is a critical communications path for SIPRNET, NIPRNET, and POTS (plain-old telephone system) ship-to-shore communication for all Navy ships less the CV/CVN/LHA/LHD/AGF and LCC classes. This multipurpose SATCOM system provides both simultaneous voice and IP data up to 128 Kbps.
302
NREMS (NAVY REGIONAL ENTERPRISE MESSAGE SYSTEM):
(NAVY REGIONAL ENTERPRISE MESSAGE SYSTEM): Provides web-based messaging capability that allows users to send and receive DMS messages using a web browser or via SMTP.
303
AMHS (AUTOMATED MESSAGE HANDLING SYSTEM):
(AUTOMATED MESSAGE HANDLING SYSTEM): Implements on-site redundancy and full Continuity of Operations Planning (COOP) capability between NCTAMS LANT and NCTAMS PAC.
304
h. VTC:
Video Teleconferencing Service is an extension of traditional telephony technologies with the added feature of being able to see the person or persons with whom one is talking.
305
i. DCO:
Defense Coordinating Officer, will help provide war fighters and supporting elements with some of the tools required for collaboration during engagements.
306
109.3 Discuss GINGERBREAD and explain the procedures involved.
Gingerbread indicates that an unauthorized person is present on a circuit. The only proper response to this is "Roger out" and communications are to cease on that circuit
307
109.4 Discuss BEAD WINDOW and explain the procedures involved.
Occurs when the previous transmission may have disclosed unauthorized EEFI information and uses a code word and a number combination which is transmitted immediately by any net member to the unit disclosing the EEFI. Proper response for a net member receiving a BEADWINDOW will be "ROGER OUT" using proper net call signs.
308
109.5 Discuss types of disclosures afforded protection by the EEFI list.
Essential Elements of Friendly Information – designed to protect friendly intelligence by granting it the same classification level of our own corresponding intelligence to include: position, capabilities, operations, personnel, COMSEC, and inappropriate transmissions (Wrong Circuit) of friendly and enemy combatants and their systems.
308
109.6 Define RIVER CITY and state when it is utilized.
River City is an OPSEC countermeasure. There are various levels that further restrict the outbound transmission/radiation of communication systems and RADAR.
309
109.7 Discuss JSIR (Joint Spectrum Interference Resolution) to include the following: Meaconing:
a system of receiving radio beacon signals and rebroadcasting them on the same frequency to confuse navigation.
310
109.7 Discuss JSIR (Joint Spectrum Interference Resolution) to include the following: Intrusion:
The intentional insertion of EM energy into transmission paths in any manner, with the objective of deceiving or confusing operators.
311
109.7 Discuss JSIR (Joint Spectrum Interference Resolution) to include the following: Jamming/Inference:
The deliberate radiation, re-radiation, or reflection of EM energy for the purpose of preventing or reducing an enemy’s effective use of the EM spectrum with the intent of degrading or neutralizing the enemy’s combat capability.
312
109.7 Discuss JSIR (Joint Spectrum Interference Resolution) to include the following: Spectrum management:
the fine-tuning of RF to reduce crosstalk and converging of different communication systems to maintain COMSEC.
313
1. Format line 2:
Repeated routing indicators of station who is responsible for delivery
314
2. Format line 4:
Special Handling Designators
315
3. Format line 5:
DTG and Precedence
316
4. Format line 6:
FROM
317
5. Format Line 7:
TO
318
6. Format Line 8:
INFO
319
7. Format Line 12:
Subject, References, Subject Body and Declassification Instructions
320
a. R:
Routine (6hrs)
321
c. O:
Immediate (30 minutes)
321
b. P:
Priority (3hrs)
322
d. Z:
Flash (As fast as possible with an objective of less than 10 minutes)
323
e. W:
Pinnacle (As fast as possible) (WW is used for CRITIC, which must be routed to DIRNSA in <5 minutes)
324
109.10 State the purpose of an OPTASK COMMS
Operational Tasking Communications are a means used by which the United States Navy and Allied Navies distribute afloat communications plans.
325
109.11 State the purpose of a COMMPLAN.
A Communications Plan provides the communications planner with an automated method of drafting the OPTASK COMMS message.
325
109.12 State the purpose of a TSO.
A Telecommunications Service Order is the authorization from Headquarters, DISA, a DISA area, or DISA-DSC to start, change, or discontinue circuits or trunks and to effect administrative changes.
325
109.13 State the purpose of a TSR.
A Telecommunications Service Request requires additions, deletions or changes in existing Defense Communication System circuits.
325
109.14 State the purpose of a COMSPOT/ Communications service advisory.
A COMSPOT is a report indicative of issues, expected outages, or an outage of a circuit(s) lasting more than 30 minutes. Report is made to NCTAMS and DISA.
325
109.16 State the purpose of OTAT
1. Over-the-Air Key Transfer (OTAT): Electronically distributing key without changing the traffic encryption key used on the secured communications path over which the transfer is accomplished. (Transmitting electronic key mat for new day, month, etc.)
326
109.15 State the purpose of Key Management Infrastructure (KMI).
Prescribes the minimum policies for issuing, accounting, handling, safeguarding, disposing of COMSEC (Communications Security) material, and the application of cryptographic/physical security measures to COMSEC material and facilities.
327
109.16 State the purpose of OTAR
2. Over-the-Air Rekeying (OTAR): Changing traffic encryption key or transmission security key in remote crypto-equipment by sending new key directly to the remote crypto-equipment over the communications path it secures. (The reception of the new key mat for new day, month, etc.)
328
109.18 State the purpose of Emissions Control (EMCON).
Prevents an enemy from detecting, identifying, and locating friendly forces and is used to minimize electromagnetic interference from friendly systems.
328
109.17 Describe TEMPEST.
Transient Electromagnetic Pulse Emanation Standard is the code name given to the investigation, study, and control of compromising emissions from telecommunications and automated information processing systems.
328
a. ASW (Anti-Submarine Warfare):
is a branch of naval warfare that uses surface warships, aircraft, or other submarines to find, track and deter damage or destroy enemy submarines.
329
c. IW (Information Warfare):
activities are conducted daily in peace, crisis, or conflict. As the country enters crisis, existing IO plans can be used as a starting point for supporting a commander’s war fighting mission.
329
b. SUW (Surface Warfare)
core missions, derived from the tenets of Sea Power 21, guide the preparation and focus of joint and naval forces to achieve SUW objectives
329
110.2 Explain how the Reserve Component integrates with the Active Component.
The Naval Reserve supports the mission of Navy by providing trained personnel available for active duty when the need arises.
330
d. AW (Air Warfare):
mission analysis is to determine restrictions and constraints, number of aircraft required to accomplish mission whether it’s air-to-air or air-to-ground combat.
330
f. NSW (Naval Special Warfare):
forces conduct special operations (SO) in any environment, and are uniquely trained and equipped to operate from, around, and in maritime environments.
331
110.3 Explain the purpose of a mobile detachment.
Allows for strategic placement of necessary forces in a peacetime or wartime theater.
331
e. STW (Strike Warfare):
is the destruction or neutralization of enemy targets ashore by conventional or nuclear weapons.
332
a. Mine Warfare UUV Platoon:
conduct port/harbor shallow water mine warfare utilizing unmanned underwater vehicles (UUVs) operated by small, rapidly deployable teams.
332
b. Naval Oceanography ASW Team (NOAT):
provide detailed tactical weather data to the ASW team.
333
c. Strike Group Oceanography Team (SGOT):
Provide timely, comprehensive, and tactically relevant meteorological and oceanographic (METOC) products and services in direct support of Numbered Fleet / Navy Component Commanders, deploying Carrier and Expeditionary Strike Group Commanders, assigned units/staff, and other U.S. and Joint / Coalition forces as directed.
334
d. Mobile Environmental Team (MET):
are the primary users of the Navy's mobile equipment assets. They are deployable, portable environmental analysts.
335
1. Blue Team Operations
uses a team specifically constructed for the Inter-Deployment Training Cycle charged with assisting in the protection of the targeted assets and conducting training to local personnel.
335
e. Fleet Survey Team (FST):
is a rapid-response Navy command that excels at conducting quick turnaround hydrographic surveys in locations around the world using air-transportable rigid hull inflatable boats.
336
110.5 Discuss the IO Core Capabilities.
1. MISO – Military Information Support Operations (Formerly PSYOP) 2. MILDEC – Military Deception 3. OPSEC – Operations Security 4. EW – Electronic Warfare 5. CNO – Computer Network Operations
337
a. United States Code (USC) Title 10:
outlines the role of the armed forces. It provides the legal basis for the roles, missions and organizations of each of the services as well as the Department of Defense.
337
2. Red Team Operation:
is an independent and threat-based effort by an interdisciplinary, simulated opposing force, which after proper safeguards are established, uses both active and passive capabilities on a formal, time-bounded tasking to expose and exploit IA vulnerabilities of friendly forces.
338
110.7 Explain the purpose of FES (Fleet Electronics Support).
Maintains operational readiness of Electronic Warfare equipment.
339
b. USC Title 50:
outlines the role of War and National Defense. Allows each department of the armed forces to have their own Secretary and work under the direction of the Secretary of Defense.
340
110.9 Define CRITIC.
Critical Information that is reported in a short, specially formatted message.
340
a. CCOP (Cryptologic Carry-On Program):
provides direct support systems worldwide to support Navy, NSA, and DOD national and theater level missions and perform installation and maintenance of organizational level cryptographic and ancillary equipment and communication devices associated with fleet cryptologic systems and antenna maintenance while deployed.
340
b. Naval Integrated Tactical Environmental Subsystems (NITES):
is a set of meteorology and oceanography forecast, database, and decision aids tailored for specific platforms and uses.
341
c. JDISS (Joint Deployable Intelligence Support System):
program provides a family of hardware and software capabilities that allow connectivity and interoperability with intelligence systems supporting forces, in garrison, and deployed during peace, crisis and in war.
342
110.11 Discuss Maritime Domain Awareness
Is the effective understanding of anything associated with the maritime domain that could impact the security, safety, economy, or environment.
343
110.12 State the purpose of a MOC.
Maritime Operation Centers are in each numbered fleet and allow the Navy to maintain a steady level of readiness. Also known as NTCS.
344
b. Surface Search:
Short range, 2-dimensional surface search and navigation radar.
344
a. Air Search:
The primary function of air search radar is to provide 360 degree from the surface to high altitudes and determine ranges and bearings to aircraft targets.
345
c. Fire Control:
Provides information to ships fire control systems for use in tracking and destroying enemy targets.
346
111.1 Define OPSEC.
Operations Security is a systematic, proven process that identifies, controls generally sensitive but unclassified information about a mission, operation or activity.
346
111.2 Discuss the 5-step planning process. (IT v. RM)
1. Identify – pinpoints critical information about friendly activities, intentions and capabilities. 2. Threat assessment – includes the process of identifying potential adversaries and their associated capabilities, limitations and intentions. 3. Vulnerability analysis – Works with other security elements in the organization. Searching for weaknesses that reveal CI through collected and analyzed indicators which create vulnerabilities. 4. Risk assessment – Measuring the level of risk has two components, which are analyzing vulnerabilities and identifying countermeasures. 5. Measures/Counter Measures – Preserve military capabilities by preventing adversarial exploitation of CI. Countermeasures mitigate or remove vulnerabilities that divulge CI. 6.
346
110.14 Explain the difference between OPELINT and TECHELINT.
1. Operational Electronic Intelligence: intelligence that is required for planning and conducting campaigns. 2. Technical Electronic Intelligence: is intelligence derived from the collection, processing, analysis and exploitation of data and information pertaining to foreign equipment and material to prevent technical surprise.
346
111.4 Describe the OPSEC considerations regarding public affairs.
Essential to ensure the PA maintains its credibility. The public affairs officer and OPSEC officer should be coordinating the release of data relative to the mission or to impending potentially sensitive activity.
347
111.3 Discuss the responsibilities of the command OPSEC Officer.
Administers the Command’s OPSEC Program and is responsible for the development, organization, and administration of an OPSEC program. Provides guidance and oversight for all OPSEC Programs and coordinates OPSEC actions under the Command’s OPSEC Program.
347
a. EEFI:
Essential Elements of Friendly Information.
347
111.5 Define WRA (Web Risk Assessment).
Application of the 5 stop OPSEC process is imperative. Self-assessments are helpful in determining if potential CI is on a command’s web site.
347
b. Critical Information:
Information about friendly US, allied and/or coalition activities, intentions, capabilities, or limitations an adversary seeks in order to gain a military, political, diplomatic, economic, or technological advantage.
348
111.7 Describe the components and functions of the command OPSEC Program.
The OPSEC Officer is appointed in writing and runs the program. OPSEC Team ensures that command and family maintain an acute OPSEC awareness.
349
112.2 Define the five steps of Intelligence.
There are five general steps in the force assignment process: 1. Planning and Direction 2. Collection 3. Processing 4. Production 5. Dissemination
349
112.1 State the purpose of Naval Intelligence.
To support all aspects of naval operations, to inform the commander of risk factors associated with, objectives, plan and direct operations, and evaluate the effects of their actions.
350
1. Strategic Intelligence (Three categories of intelligence)
is required for the formation of policy and military plans at national and international levels.
350
3. Operational Intelligence (Three categories of intelligence)
is required for planning operations within regional theaters or areas of operations.
350
2. Tactical Intelligence: (Three categories of intelligence)
is required for planning and conducting tactical operations at the component or unit level.
350
112.4 Define National, Theater, and Fleet Level Intelligence Organizations.
1. National Level: is of a wider scale based on intelligence that can affect the nation. 2. Theater Level: is specific to an AOR. 3. Fleet Level: constitutes any Intel that can be disseminated across the Naval AORs.
350
112.6 Define CCIR (Commander’s Critical Information Requirements).
A comprehensive list of information requirements identified by the commander as being critical in facilitating timely information management and the decision-making process that affect successful mission accomplishment.
351
112.5 Define PIR
Priority Intelligence Requirements, intelligence requirements for which a commander has an anticipated and stated priority in the task of planning and decision making.
352
112.7 Explain Intelligence Oversight and state the publications that govern it.
The heads of departments and agencies with organizations in the Intelligence Community or the heads of such organizations, as appropriate, shall report to the Intelligence Oversight Board, and keep the Director of Central Intelligence appropriately informed, concerning any intelligence activities of their organizations that they have reason to believe may be unlawful or contrary to Executive order or Presidential directive.
352
112.8 Define the difference between a US citizen and a US person with regards to US Intelligence Oversight. (US CITIZENS)
native-born or naturalized citizens, permanent residents with a Green Card, or persons born on US Military Installations abroad by a U.S. Citizen. It also includes an unincorporated association made up mostly of U.S. citizens and/or permanent resident aliens, an activity incorporated in the U.S. EXCEPT for a corporation directed and controlled by a foreign government(s).
353
112.8 Define the difference between a US citizen and a US person with regards to US Intelligence Oversight. (US PERSONS)
foreign nationals who are lawfully in the US and who are permanent resident aliens are US Persons. An alien in the U.S. is not a U.S. Person unless there is specific information to the contrary. Persons who are in the U.S. on a VISA are not U.S. persons.
353
112.10 Describe the National Intelligence Leadership Structure.
The Director of Naval Intelligence exercises staff supervision over the Office of Naval Intelligence (ONI), which provides the intelligence necessary to plan, build, train, equip, and maintain US naval forces.
353
112.9 Define intelligence preparation of the battle space environment.
Used to signify a unified military strategy to integrate and combine armed forces for the military theatre of operations, including air, information, land, sea and space to achieve military goals.
353
112.11 Explain ISR mission requirements and fundamentals.
Force assignment is primarily an operations function, but requires considerable intelligence support to ensure intelligence, surveillance, and reconnaissance (ISR) assets are integrated into the operation plan.
354
c. MASINT (Measurement and Signature Intelligence):
refers to intelligence gathering activities that bring together disparate elements that do not fit within the definitions of the major disciplines mentioned above.
354
a. HUMINT (Human Intelligence):
refers to intelligence gathering by means of interpersonal contact.
354
112.12 Explain the function of an Intelligence Fusion Cell.
A fusion cell combines, in real time, national strategic intelligence, which we gather around the world, with local or tactical intelligence.
355
b. OSINT (Open-Source Intelligence):
is a form of intelligence collection management that involves finding, selecting, and acquiring information from publicly available sources and analyzing it to produce actionable intelligence.
356
d. SIGINT (Signals Intelligence):
is intelligence-gathering by interception of signals between people, electronic signals, or EM radiation not directly used in communication.
357
e. COMINT (Communications Intelligence):
is intelligence-gathering by interception of signals between people, involving electronic signals that are directly used in communication.
358
f. FISINT (Foreign Instrumentation Signals Intelligence):
from the intercept of foreign electromagnetic emissions associated with the testing and operational deployment of non-US aerospace, surface, and subsurface systems.
359
g. ELINT (Electronic Intelligence):
is intelligence-gathering by interception of signals.
360
i. ACINT (Acoustical Intelligence):
is an intelligence gathering discipline that collects and processes acoustic phenomena.
361
h. IMINT (Imagery Intelligence):
Is an intelligence gathering discipline which collects information via satellite and aerial photography.
361
112.15 Define the role of intelligence on the watch floor.
To provide subscribers with real-time updates on intelligence as it is made available. 
362
112.14 Give 3 examples of intelligence briefs.
a. Operations and planning b. Logistics c. Communications
363
113.1 Define each band of the Electromagnetic spectrum and describe what communications are commonly used in each.
See physical card
364
b. Wavelength:
The distance in space occupied by one cycle of a radio wave in a given amount of time.
364
a. Frequency:
The number of vibrations, or cycles, of a wave train in a unit of time.
364
d. Refraction:
The changing of direction of a wave as it leaves one medium and enters another medium of different density.
364
c. Ducting:
Trapping of an RF wave between two layers of the Earth’s atmosphere or between an atmospheric layer and the Earth.
365
f. Bandwidth:
The difference between the highest useable frequency of a device (upper frequency limit) and the lowest usable frequency of the device (lower frequency limit) measured at the half-power points.
365
Multiplexing:
: A method for simultaneous transmission of two or more signals over a common carrier wave.
365
113.4 Discuss/describe the following layers of the atmosphere and how each effect communication.
Layers: Regions of the atmosphere. 1. Troposphere: Sea level to 3.7 miles 2. Stratosphere: 3.7 miles to 250 miles 3. Ionosphere: 250 miles to space.
366
h. Azimuth Angle:
The 360-degree angle at which the radio wave travels. Can have some effect on the angle of incidence at which a radio wave intersects the atmosphere layers.
366
g. Keying:
: Relays used in radio transmitter where the ordinary hand key cannot accommodate the pate current without excessive arcing.
366
i. Elevation Angle:
The angle at which the radio wave travels from the antenna to the atmosphere. This affects the angle of incidence at which a radio wave intersects the atmosphere layers.
366
a. Frequency:
The number of vibrations, or cycles, of an EM wave in a unit of time.
366
b. Radio Waves:
An electromagnetic wave generated by a transmitter.
367
a. USB (Upper Sideband):
When modulated by voice or music signals, all of the sum frequencies above that of the carrier.
367
c. Propagation Paths:
Waves traveling through a medium.
367
c. CW (Continuous Wave):
Modulation by on/off keying—Morse code. (Can also be Carrier Wave – which carries multiple frequencies over one channel.)
367
b. LSB (Lower Sideband):
When modulated by voice or music signal, all difference frequencies below that of the carrier.
368
d. AM (Amplitude Modulation):
Any method of modulating an electromagnetic carrier frequency by varying its amplitude in accordance with message intelligence. Used diode detectors (rectifiers)
369
e. FM (Frequency Modulation):
the variation of the instantaneous frequency of the carrier, either above or below the frequency.
370
113.7 Define the following terms as they apply to radar. a. PRI or PRT (Plan Position Indicator):
is the most common radar display used for (Pulse Repetition Rate is same as PRF) in which range is indicated by the distance of a bright spot or blip from the center of the screen and the bearing is indicated by the radial angle of the spot.
370
113.7 Define the following terms as they apply to radar. b. PRF (Pulse Repetition Frequency):
The rate at which pulses are transmitted, given in hertz or pulses per second. Reciprocal of pulse - repetition time.
371
113.7 Define the following terms as they apply to radar. c. RF (Radio Frequency):
the modulated carrier wave from a transmitter.
372
113.7 Define the following terms as they apply to radar. d. BW (Beam Width):
angular width of the beam’s curvature.
373
113.7 Define the following terms as they apply to radar. e. CW (Curve Width):
the width of the pulse arc.
373
113.7 Define the following terms as they apply to radar. f. PW (Pulse Width):
The duration of the pulse.
373
a. Half Duplex:
Provides communications in both directions, but only in one at a time.
373
113.7 Define the following terms as they apply to radar. g. Scan:
Systematic movement of a radar beam to cover a definite pattern or area in space.
373
b. Duplex:
Provides communications in both directions simultaneously.
374
c. Simplex:
Communication that occurs in one direction only
374
a. Modulation –
the ability to impress intelligence upon a transmission medium such as radio waves.
374
114.1 Explain how Naval Meteorology and Oceanography supports the Information Dominance mission?
Develops and delivers dominant meteorological/oceanographic capabilities in support of U.S. Navy, Joint and national warfighting requirements.
374
a. True Bearing:
the angle between true north and a line pointed directly at the target. Relative Bearing: The bearing angle to the radar target is measured from the centerline of your own ship or aircraft.
375
b. Demodulation –
the removal of intelligence from a Transmission medium.
376
b. Azimuth:
Angular measurement in the horizontal plane in a clockwise direction.
376
c. Elevation:
Used by height finding radars, Uses a very narrow beam in both horizontal and vertical search planes.
377
114.2 Discuss the general mission of the Naval Meteorology and Oceanography Command.
NMOC provides the preponderance of oceanographic and hydrographic survey capabilities for the Department of the Navy (DoN) and the Department of Defense (DoD).
377
114.4 Define Battle Space on Demand (BOND) WRT decision superiority.
Battle space on Demand (BonD) supports the long-range Naval Oceanography strategy for linking environmental data to timely and informed decisions – a key aspect of decision superiority.
377
a. The Data Layer (Tier 0)
Consists of data collected while observing the atmosphere and the ocean using a vast range of in-situ sensors and remote sensors, including satellites, altimeters, gliders, buoys, and master clocks, assimilated and fused to provide initial and boundary conditions that accurately describe the current ocean and atmosphere environment, as well as the celestial and temporal reference frames. The output is a collection of raw observation data on the state of the physical environment.
378
The Environment Layer (Tier 1)
In Tier 1, the Tier 0 data are analyzed, processed, and merged into databases and/or prediction systems or numerical models operated on High Performance Computing (HPC) systems to forecast the future state of the environment. The output is a set of predictions, in space and time, of the expected physical environn1ent for whatever operation is under consideration. The output can also contain a 'confidence factor'.
378
The Performance Layer (Tier 2)
In Tier 2, the predicted environment is used in conjunction with information about the operational environment to predict how forces, sensors, weapons systems, and platforms will perform over time in a given operational situation. This information is analyzed to provide meaning with respect to implications for the operation, such as influences on planning, force structure, targeting, timing, maneuver, tactics, techniques and procedures. The output of this fusion of information about the predicted environment and the friendly and enemy situation is an impact assessment in terms the operator understands, again with a confidence factor if appropriate. Situational awareness is the desired outcome at this level.
379
The Decision Layer (Tier 3)
In Tier 3, the situational awareness gained in Tier 2 is applied to specific situations to quantify risk and opportunity at strategic, operational, and tactical levels. Here, actionable recommendation are made to the decision-maker regarding force allocation and employment that directly enhance safety and warfighting effectiveness. In Tier 3, the performance predictions made in Tier 2 are considered with alternative scenarios to develop optimal solutions, i.e., courses of action (COAs), and to understand probabilities of success and elements of risk. The intent is to make recommendations that take maximum advantage of asymmetric opportunities in the changing physical environment, to provide the most advantage to our forces, and the most disadvantages to the enemy. The output is a decision recommendation with compelling rationale, based on our best understanding of the physical environment. The decision-maker cor1bines knowledge of the present and future situation with their judgment into situational understanding to facilitate superior decision-making.
380
114.6 Define the Navy Enterprise Portal (NEP-Oc).
The Navy Enterprise Portal - Oceanography (NEP-Oc) has been created as the Naval Oceanography mission extension to the Navy Enterprise Portal. NEP-Oc will serve as a single access point for all METOC web-accessible information on the NIPRNet and SIPRNet.
381
a. Mixed Fleet Weather Center
(FWC), Norfolk, VA
382
b. Fleet Weather Center
(FWC), San Diego, CA
383
c. Joint Typhoon Warning Center
(JTWC), Pearl Harbor, HI
383
384
384
384
384
385
386
386
387
387
387
387
388
388
388
388
388
388
389
390
391
391
391
391
391
391
391
392