Test Flashcards
6 categories for brilliant of the basics?
Sponsorship Assign a mentor Indoctrination Leadership/CDB Ombudsman Recognition
Eval/fitrep instruction?
Bupersinst 1610.10D
Tool used to measure the subsurface temperature of the water?
Bathythermograph
DAA?
NCTSSD?
Navy’s?
Designated approving authority
NCTSSD- nctampac
Navy’s- netwarcom
On the roof gang?
School established to instruct radio men how to intercept operations. Class took place on roof of wood building and students were not allowed to discuss class work with others so they acquired this nickname.
IAVT
Information assurance vulnerability technical advisory
2 types of cyber security workforce?
Technical and management
COMSEC?
Communication security
Measurements to deny unauthorized persons access to info derived from telecommunications.
3M?
Maintenance material management
7 principles of naval logistics?
Flexibility Economy Attainability Responsiveness Simplicity Survivability Sustainability
FPCON NORMAL
No threat
FPCON alpha
General threat
FPCON bravo
Increased threat
FPCON Charlie
Threat is imminent
FPCON delta
Threat has occurred in immediate area
Who established the office of naval intelligence?
William hunt
SSR-1
Broadcast antenna
SAPR instruction?
Secnavinst 1752.4a
3 admin forms used for manpower?
EDVR-enlisted distribution verification report
ODCR- officer distribution control report
AMD- activity manpower document
How many categories of mishaps are there?
4
Port 20
Ftp data
Port 21
Ftp control
Port 22
Ssh
Port 23
Telnet
Port 25?
SMTP
Port 53?
DMS
Port 80?
Http
Port 110?
Pop3
Port 443?
HTTPS
IEEE?
Institution of electrical and electronics engineers
3 types of consecutive incidents
Physical- loss of crypto
Personnel- espionage
Cryptographic- late/early destruction
Spillage?
Classified material transmitted over unclassified network.
Disconnect from network Notify COC complete unit info sheet Complete immediate action checklist Document all action
SSA?
Satcom signal analyzer
2 methods of procurement?
Standard stock purchase
Open market purchase
NIIN?
National item identification number
DPAS?
Defense property accountability system
Barcode system used to track command assets
Provides accountability for military property and asset management capabilities and property financial report information
JPAS
Joint personnel adjudicated system
Types of supercession?
Regular
Irregular
Emergency
EAP
Emergency action plan
Complete- enemy attack
Protection- riot outside
Removal- fire/natural disaster
DD FORM 2875
SAAR FORM
SYSTEM ACCESS AUTHORIZATION REQUEST
AESOP?
Afoat electromagnetic spectrum operation program
Utilized for messaging radar and comma frequency of shipboard equipment
ADMS
Auto digital multiplexing system
CUDIXS
Common user digital information exchange system
Zes
Message received garbled/incomplete
Zue
Affirmative
Zug
Negative
Zev
Message acknowledgement
Zuj
Stand by
Zbz
How do you read my signal
Apogee
Farthest from the earth
SST
Sea surface temperature
POES
Polar operational environmental satellite
Continuous wave
On/off signal to send intelligence
LSB
Lower side band
Difference of frequency below carrier
USB
Upper side band
Sum of frequency above carrier
Azimuth
True bearing
Difference clockwise from true north
Propagation
Atmosphere waves that are reflected, refracted or diffracted
Types of Intel
Human Intel -HUMINT open source - OSINT Measurement/signature signals - SIGINT Communications - COMINT foreign instrumentation signals - FISINT electronic Intel - ELINT Image Intel - IMINT Acoustic Intel - ACINT
6 steps of intelligence
Planning and direction Collection Processing and exploitation Analysis and production Dissemination and integration Evaluation and feedback
5 step plan in process of OPSEC
Identify critical info Threat assessment Vulnerability analysis Ricks assessment Measures/counter measures
Title 50
Outlines tiles of war and national defense
Title 10
Role of armed forces. The legal basis for roles and missions and organizations
Primary warfare areas?
Anti submarine warfare - Asw Surface warfare - suw Information warfare - iw Air warfare - aw Strike warfare - stw Naval special warfare - nsw
EEFI
Essential elements of friendly information
Pki
Public key infrastructure
Manages digital certificate
Router
Device that interconnects 2 or more computers or networks
IAVA
Information assurance vulnerability alert
IAVB
Information assurance vulnerability bulletin
Accreditation
Official management decision to operators an IS in a specific environment
Certification
Evaluation to determine that a particular subject meets a set of specified security requirements
DCS
Defense courier service
Expeditious, cost effective secure transmission of classified material
Optional form 89
Maintenance record for security containers
Sf 312
Classified information and non disclosure agreement
Sf 153
Comsec material sheet
Hand receipt Destruction Inventory Transfer Other
Sf 386
Quality of deficiency
Sf 364
Report of discrepancy
3 objectives of first aid
Save life
Prevent further injury
Prevent infection
5 attributes of information assurance
Confidentiality Integrity Availability Non repudiation Authentication
LMUL broadcast node
Node 77
Danger tag
Red
Prohibit operation or removal of equipment
Caution tag
Yellow
Precautionary measures are taken to provide temporary instruction to operate equipment
BLII
Base level information infrastructure
Provides Nipr and sipr services
If a perimeter door is access improperly who is notified?
Security office and CWO
COs standing orders?
To provide secure and reliable classified and unclassified voice, messaging, video and data telecommunications to surface, subsurface, air and ground forces in support of command, control communications.
Solar cycle?
Solar max?
Solar decline?
11 year cycle
4 year max
7 year decline
ANCC
Automated network control center
EHF TERMINALS
Legacy and NMT
How often does the CO conduct a counter intelligence brief?
Annually
3 levels of war
Strategic
Operational
Tactical
Who is in change of SCIF
SSO
How often should a combo be changed
Every 2 years Compromised Transfer of personal Initially placed Maintence
10th fleet
Global
Ft Meade Maryland
7th fleet
Indian Ocean
Japan
6th fleet
Mediterranean Sea
5th fleet
Arabian gulf
4th fleet
South America/ Caribbean Sea
Mayport Florida
3rd fleet
Eastern pacific
HSGR
High speed global ring
Sf 703
Top secret cover sheet
Sf 702
Security container check sheet
Open/closure log
SF 701
Activity security checksheet
Daily checklist located on doors
Sf 700
Security container info
Combos
Battle of Leyte gulf
October 23, 1944
Last chance to salvage the Philippines. Japan sent navy to Leyte gulf to attack US
Battle of Guadalcanal
13-15 November 1942
The 5 Sullivan brothers onboard USS Juneau died which formed the policy of family members not being able to serve on the same ship.
Battle of midway
3-5 June 1942
Turning point of the pacific war against Japan.
Battle of Normandy
June 6, 1944
D day
Largest amphibious assault in history
Voyage of the great white fleet
December 16, 1907
Global cruise to display our Navy’s strength
Navy’s bday?
October 13, 1775
13 original colonies
Taxation without representation
Battle of coral sea
7-8 May 1942
First carrier vs carrier battle where neither fleet saw each other
3 classes f naval ships that existed during the inception of the navy
Sloops of war
Ships of line
Frigates
2 types of local element?
Issuer
User
6 areas of naval doctrine?
Command and control Operations Warfare Logistics Intelligence Planning
1st ship named after an enlisted man?
Osmond ingram
DD 255
Feb 28, 1919
OSI model?
Application Presentation Session Transport Network Data link Physical
NREMS
Navy regional enterprise messaging system
Uses an AMHS back end to send secure organizational messages via a web interface to naval commands
Format line 1
Routing info
Format line 2
Precedence, classification, Julian date, SSN, ect
Format line 4
Security classification
Format line 5
Precedence, DTG
Format line 6
Originator
Format line 7
To address
Format line 8
Info address
Format line 9
Exempt address
Format line 11
Break
Format line 12
Text/body
Format line 13
Break
Format line 14
Confirmation
Format line 15
End if message. #SSN