Naval aviation platforms And missions Flashcards
Core capabilities
Foreword presences
Deterrence
Sea control
Power projection
Maritime security
Humanitarian assistance/disaster relief
Helicopter sea combat (HSC)
Perform rescue ,logistics, mine countermeasures, and eventually combat search and rescue missions
Helicopter maritime strike (HSM)
Anti-submarine and anti-surface warfare, And secondary roles of logistics and rescue
Helicopter training (HT)
Training of student naval aviators in rotary wing aircraft
Tactical electronic warfare (VAQ)
Fixed wing squadrons that tactically exploit, suppresses,degrade and deceive enemy electromagnetic Defenses and offensive systems
Carrier airborne early warning (VAW)
Early warning against weather, missiles, shipping and aircraft
Fleet composite (VC)
Provide our services for the fleet such as simulations and target towing
Strike fighter (VFA)
Used for both fighter and attack missions
Patrol (VP)
Perform anti-submarine warfare, anti-surface, Reconnaissance and mining
Fleet air reconnaissance (VQ)
Provide electronic warfare support to include search, interception, recording, and analysis of radiated electromagnetic energy
Aircraft logistics support (VR)
Fixed wing squadrons for the transport of personnel and supplies
Carrier logistics support (VRC)
Transport personal and supplies for carrier on board delivery
Training (VT)
Provide basic and advanced training for student naval aviators and flight officers.
Air test and evaluation (VX/VXE)
Test and evaluate the operational capabilities of new aircraft and equipment.
What is COMSEC
Communication security
What is TPI
Two person integrity
What is too personal integrity used for
Turn sure no single person can access certain COMSEC material
What is Encryption
Electronica data, called Seifert text, which cannot be easily understood by anyone except authorized parties
A security measure designed to protect communication systems against acceptance of false transmissions
Authentication
The ability and opportunity to obtain knowledge of classified information
Access
Classification
A specific degree of protection against onauthorized disclosure
A security violation that has resulted in confirmed or suspected exposure of classified information is called what
Compromise
Need to know
A determination made by an authorized holder of classified information that a prospective recipient can be give access to specific classified information
Clearance
A formal determination that a person meets the personal security eligibility standards and is this offered access to classified information
What are the classification categories
Confidential
secret
top-secret
NOFORN
FOUO