Term
| This PUBLICATION governs EKMS |
|
Definition
|
|
Term
| This INSTRUCTION governs Safety and Mishap reporting. |
|
Definition
|
|
Term
| This INSTRUCTION governs the SAPR Program. |
|
Definition
|
|
Term
| This INSTRUCTION governs the Equal Opportunity policy. |
|
Definition
|
|
Term
| This INSTRUCTION governs the IA Workforce |
|
Definition
|
|
Term
| This INSTRUCTION governs the IA Workforce. |
|
Definition
|
|
Term
|
Definition
| Identify HazardAssess HazardMake Risk DecisionsImplement ControlsSupervising |
|
|
Term
| 6 Areas that comprise Naval Doctrine |
|
Definition
| CommunicationsOperationsWarfareLogisticsIntelCommand and Control |
|
|
Term
|
Definition
| TacticalOperationalStrategic |
|
|
Term
| 7 Principles of Naval Logistics. |
|
Definition
| ResponsivenessSimplicityFlexibilityEconomyAttainabilitySustainabilitySurvivability |
|
|
Term
|
Definition
| ConfidentialityIntegrityAvailabilityNon-repudiationAuthentication |
|
|
Term
| How many BCO sites fall under NCTSSD. |
|
Definition
|
|
Term
| What does ANCC stand for and what is its purpose? |
|
Definition
| Automated Network Control Center. Virtual Patch Panel. |
|
|
Term
| What is the purpose of SSR-1? |
|
Definition
| De-modulator and De-multiplexer for broadcast, and NOW terminal. |
|
|
Term
| What antenna is on the roof of NCTSSD? |
|
Definition
|
|
Term
| What is the difference between IDNX and ADNX? |
|
Definition
| ADNX is a nest we cannot access physically and IDNX is a modem we can run loops on. |
|
|
Term
| What does HBSS stand for? |
|
Definition
| Host Base Security System |
|
|
Term
| How often is OCRS checked and what does OCRS stand for? |
|
Definition
| Daily and Online Compliance Reporting System |
|
|
Term
| What is the function of HBSS? |
|
Definition
| Monitor, Detects, and Counter against known cyber threats of DoD. |
|
|
Term
| What does DAA stand for and what is the responsibility? |
|
Definition
| Designated Accrediting Authority and Assumes overall responsibilities of Information System. |
|
|
Term
| Three valid asset types in VMS and what does VMS stand for? |
|
Definition
| ComputingNon- ComputingCNDSVulnerability Management System |
|
|
Term
| What are the 3 ways to control bleeding? |
|
Definition
| Pressure PointDirect PressureElevationTourniquet (last resort |
|
|
Term
|
Definition
| C2 Capabilities and enterprise infrastructures |
|
|
Term
| Define the following OPSIGSZBZ, ZUJ, ZEV, & ZUE? |
|
Definition
| How do you see me?Stand byRequest acknowledgmentYes |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| SECURITY CONTAINER CHECK SHEET |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| List all the Fleets with their area of Responsibility. 2ND, 3RD, 4TH, 5TH, 6TH, 7TH, 10TH |
|
Definition
| 2nd Norfolk, VA. Atlantic3rd San Diego, CA. E Pac4th Mayport, FL. Caribbean, Central, S America5th Bahrain. Indian Ocean6th Italy. Mediterranean and Black Sea7th Japan. W Pac and Indian Ocean10th Ft Meade MD. World Wide |
|
|
Term
| Discuss the CONCEPT of ORM |
|
Definition
| ORM is a tool used to make informed decisions by providing the best baseline of knowledge and experience available. |
|
|
Term
| HAZARD SEVERITY CATAGORIES |
|
Definition
Category I - The hazard may cause death, loss of facility/asset or result in grave damage to national interests.
Category II - The hazard may cause severe injury, illness, property damage, damage to national or service interests or degradation to efficient use of assets. Category III - The hazard may cause minor injury, illness, property damage, damage to national, service or command interests or degradation to efficient use of assets.
Category IV - The hazard presents a minimal threat to personnel safety or health property, national, service or command interests or efficient use of assets. |
|
|
Term
| Discuss the timeliness and means for filing mishap investigations reports. |
|
Definition
All mishap reports must be submitted within 30 days of mishap occurrence. OR Notify their chain of command and COMNAVSAFECEN, of all on duty DoD civilian and all on and off-duty military Class A mishaps, and any mishaps that result in the hospitalization of three or more personnel, within eight hours of the mishap by telephone or electronic means. |
|
|
Term
| Purpose of a HAZREP message |
|
Definition
| discovering a hazardous condition or experiencing a near-mishap to alert COMNAVSAFECEN |
|
|
Term
| State the three objectives of first aid. |
|
Definition
Save Life Prevent further injury Prevent Infection |
|
|
Term
| three methods of controlling bleeding. |
|
Definition
Direct Pressure Elevation Pressure Points Tourniquet (LAST RESORT!!) |
|
|
Term
| How many pressure points? |
|
Definition
|
|
Term
|
Definition
| Hazards from electromagnetic radiation to ordinance |
|
|
Term
|
Definition
| Hazards from electromagnetic radiation to personnel |
|
|
Term
|
Definition
| Hazards from electromagnetic radiation to fuels |
|
|
Term
|
Definition
| , may pose a substantial hazard to human health or the environment |
|
|
Term
| Seven Principles of Naval Logistics |
|
Definition
| Responsiveness: Simplicity: Flexibility:Economy: Attainability: Sustainability: Survivability: |
|
|
Term
| First Navy Ship named after an Enlisted man |
|
Definition
|
|
Term
| Conditions that led to the Formation of the U.S. Navy |
|
Definition
| The U.S. Navy was born on 13 October 1775. On this date the Second Continental Congress authorized the purchase of two vessels because of the English passing tax laws on the states. "Taxation without representation" |
|
|
Term
| What 3 Classes of Naval Vessels existed at inception of the U.S. Navy |
|
Definition
Ships-of-the-line
Frigates Sloops-of-war |
|
|
Term
|
Definition
| 21 guns is fired on Washington's Birthday, Memorial Day, and Independence Day, and to honor the President of the United States and heads of foreign states. Salutes are fired at intervals of 5 seconds, and always in odd numbers. |
|
|
Term
|
Definition
| world's first carrier verses carrier battle. |
|
|
Term
|
Definition
| The largest amphibious operation in history. |
|
|
Term
|
Definition
| The U.S. sank 3 Japanese carriers. The next day the fourth carrier was sunk. Japanese planes sank the Yorktown. |
|
|
Term
|
Definition
| U.S. secured the island of Guadalcanal from the Japanese. With the fall of the island, the southern Solomons came under Allied control and Australia was in less danger of attack. |
|
|
Term
| Attack on the USS LIBERTY |
|
Definition
| Isreali Air Force jet fighter aircraft and motor torpedo boats of the Israeli Navy attacked USS Liberty in international waters. |
|
|
Term
| The Attack on the USS PUEBLO |
|
Definition
| Attacked and still held by north Korea |
|
|
Term
| Hainan Island EP-3 Incident |
|
Definition
| April 1, 2001, a mid-air collision between a US Navy EP-3E surveillance aircraft and a J-8II interceptor fighter jet resulted in an international dispute between the United States and China. 24 crew members held. |
|
|
Term
|
Definition
| WWII, Bletchley Park was the site of the United Kingdom’s main decryption establishment, the Government Code and Cypher School. |
|
|
Term
|
Definition
| Code talkers transmitted messages over military telephone and radio nets using their native language during WWII; a code that the Japanese never broke. |
|
|
Term
|
Definition
| 1987 during the Iran-Iraq war, an Iraqi jet fighter fired missiles at the USS Stark; killing 37, wounding 21. |
|
|
Term
| State the qualities that characterize the Navy/Marine Corps team |
|
Definition
Readiness Flexibility Self-sustainability Mobility |
|
|
Term
| State the Three Levels of War |
|
Definition
| Tactile, Operational, Strategic |
|
|
Term
| State when and why the Navy Core Values were developed |
|
Definition
| Admiral Kelso (1992) adopted the Navy Core Values to provide principles to guide our Sailors. |
|
|
Term
| Discuss when and why the Sailor’s Creed was developed |
|
Definition
| The “Sailor’s Creed” was written in 1993 at the direction of CNO Admiral Frank Kelso. |
|
|
Term
| : State RADM Grace Hopper’s contributions to the U.S. Navy |
|
Definition
Her work on compilers and on Making machines understand Ordinary language instructions led Ultimately to the development of the Business language COBOL. |
|
|
Term
| State the name of The First Computer and where it was located |
|
Definition
| ENIAC, University of Pennsylvania |
|
|
Term
|
Definition
| World's first operational packet switching network, and the predecessor of the contemporary global Internet. |
|
|
Term
| John Walker espionage case |
|
Definition
| retired United States Navy Chief Warrant Officer and communications specialist convicted of spying for the Soviet Union, |
|
|
Term
| State the Oldest Intelligent Organization in the U.S. Navy |
|
Definition
|
|
Term
| : Name the two Departments that were combined to form the ONI |
|
Definition
| Department Library was combined with the “Office of Intelligence |
|
|
Term
| State the mission of the U. S. Navy. |
|
Definition
| Maintain, train and equip combat-ready Naval forces capable of winning wars |
|
|
Term
|
Definition
| Direct the operations and security of the Navy's portion of the Global Information Grid (GIG). |
|
|
Term
|
Definition
| Little Creek, VA, To organize and prioritize, training, modernization, and maintenance, requirements, and Capabilities of command and control architecture/networks, cryptologic and space-related systems and intelligence and information operations activities, |
|
|
Term
|
Definition
| Navy's meteorological and oceanographic experts |
|
|
Term
|
Definition
| Conduct Information Operations (IO) using foreign language skills |
|
|
Term
|
Definition
| Preventive and corrective maintenance on electrical and electronic cryptologic and ancillary systems |
|
|
Term
|
Definition
| Monitor, identify, collect and analyze information |
|
|
Term
|
Definition
| Collect, analyze and exploit signals of interest to identify, locate and report worldwide threats; |
|
|
Term
|
Definition
| Operate and maintain electronic sensors and computer systems |
|
|
Term
|
Definition
| Analyze intelligence data |
|
|
Term
|
Definition
| Perform core and specialty functions of Communications Operations, Message Processing, Network Administration and Security |
|
|
Term
| How many NCTAMS and where. |
|
Definition
| 2, NCTAMS LANT (Norfolk, VA) NCTAMS PAC (Wahiawa, HI) |
|
|
Term
|
Definition
| Command, control, and surveillance |
|
|
Term
| State the mission of the NCDOC |
|
Definition
| Naval Cyber Defense Operations Command(NCDOC) - Little Creek, Va. Provide Twenty-four seven security and defend Navy networks worldwide |
|
|
Term
| DIA-Defense Intelligence Agency- |
|
Definition
| oversight of the Department of Defense Intelligence Production Program (DODIPP), under which all-source intelligence is produced for use by both policymakers and commanders. |
|
|
Term
| NSA-National Security Agency- |
|
Definition
| Unified organization structured to provide for the signals intelligence (SIGINT) mission of the United States |
|
|
Term
| CIA-Central Intelligence Agency- |
|
Definition
| Primary areas of expertise are in HUMINT collection |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| NCTS COMMAND MASTER CHIEF |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| NCTS INFO ASSURANCE MANGR |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Principal defense advisor to President. Formulation of general defense policy (Robert Gates) |
|
|
Term
| Secretary of the Navy (SECNAV). |
|
Definition
| Maintains the policies and control of DON. (Ray Mabus) |
|
|
Term
| Chief of Naval Operations (CNO). |
|
Definition
|
|
Term
| Master Chief Petty Officer of the Navy (MCPON) |
|
Definition
| Serves as senior enlisted representative of the Navy. (Master Chief Petty Officer Rick D. West) |
|
|
Term
|
Definition
DISA’s Command Cyber Readiness Inspection Holds commanders accountable for their respective security posture |
|
|
Term
|
Definition
| A monthly statement of an activity’s enlisted personnel account. It lists all individuals assigned to the activity |
|
|
Term
|
Definition
| Activity Manpower Document (AMD) lists in one document all the Requirements and Authorizations in a specific Activity. |
|
|
Term
|
Definition
| Dependency application/record of emergency data. |
|
|
Term
|
Definition
| Navy Occupation/Training and Awards History. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Message required if the incident is considered to be "major."
*** If not major it is a OPREP# UNIT SITREP |
|
|
Term
| List of Enlisted to Officer Programs |
|
Definition
Seaman to Admiral (STA-21 Program) Limited Duty Officer (LDO) Chief Warrant Officer Program (CWO) Navy Officer Candidate School (OCS) Medical Enlisted Commissioning Program (MECP) Medical Service Corps In-Service Procurement (MSC IPP) |
|
|
Term
| Explain what the DLPT is: |
|
Definition
| Defense Foreign Language Program provides determination of the most effective means of fulfilling total Department of Defense (DOD) foreign language training requirements. |
|
|
Term
| Describe the six programs of Brilliant on the Basics: |
|
Definition
Career Development Boards
Sponsorship
Mentorship
Sailor Recognition
Command Indoctrination
Command Ombudsmen support |
|
|
Term
| Discuss the purpose of the 3-M/PMS System |
|
Definition
| MAINTAIN EQUIPMENT AT ITS MAXIMUM OPERATING EFFICIENCY BY REDUCING DOWNTIME |
|
|
Term
|
Definition
| DEFENSE PROPERTY ACCOUNTABILITY SYSTEM |
|
|
Term
|
Definition
MATERIAL OBLIGATION VALIDATION PURPOSE IS TO ENSURE OVERAGED MATERIAL OBLIGATIONS REFLECTED IN THE INVENTORY. |
|
|
Term
|
Definition
| REMAIN-IN-PLACE),PART HAS TO REMAIN IN THE EQUIPMENT UNTIL THE RFI PART HAS BEEN RECEIVED. |
|
|
Term
|
Definition
| MAINTENANCE ASSIST MODULES ARE USED FOR TROUBLESHOOTING OF EQUIPMENT |
|
|
Term
| Define the term CASREP and explain the four categories. |
|
Definition
(CASUALTY REPORT), REPORT DESIGNED TO IDENTIFY THE PARTS REQUIRED TO BE REPAIRED FOR FAULTY EQUIPMENT.
4 CATEGORIES: CAT 1 CAT 2 CAT 3 CAT 4 |
|
|
Term
Define the following Terms: NSN: COG: APL: AEL: NC: NIS: SIM: |
|
Definition
NSN: NATIONAL STOCK NUMBER B. COG: COGNIZANCE OF NAVY MATERIAL C. APL: ALLOWANCE PARTS LIST D. AEL: ALLOWANCE EQUIPAGE LIST E. NC: NOT CARRIED F. NIS: NOT IN STOCK G. SIM: SELECTED ITEM MANAGEMENT |
|
|
Term
|
Definition
| DEFENSE REUTILIZATION MARKETING SERVICE, DISPOSING SITE OF EXCESS MATERIAL PURCHASED FOR MILITARY SERVICES |
|
|
Term
|
Definition
| OPERATING TARGET: FISCAL YEAR FUNDS GRANTED BY THE TYPE COMMANDER FOR EACH COMMAND TO OBTAIN MATERIALS AND SERVICES NECESSARY FOR OPERATIONS COMPONENTS: |
|
|
Term
| Dicuss Normal Power; Emergency Power, Uniterupted power |
|
Definition
NORMAL POWER – PRIMARY SOURCE OF POWER. EMERGENCY POWER – BACKUP SOURCE OF POWER. UNINTERUPTED POWER – TEMPORARY SOURCE OF POWER WHILE SWITCHING FROM PRIMARY TO BACKUP OR TO ALLOW TIME TO SAFELY SHUT DOWN EQUIPMENT DURING A LOSS OF POWER. |
|
|
Term
| DISCUESS TYPES OF INVESTIGATIONS FOR CLEARANCES: |
|
Definition
Top Secret. The investigative basis for Top Secret clearance eligibility is a favorably completed SSBI: EVERY 5 YEARS Secret/Confidential. The investigative basis for Secret or Confidential clearance eligibility is a favorably completed NACLC or ANACI. (10 YEARS) Sensitive Compartmented Information (SCI). The investigative requirement for access to SCI is a favorably adjudicated SSBI. (5 YEARS) |
|
|
Term
| WHAT LIFE EVENTS SHOULD BE MENTIONED TO THE SECURITY OFFICER |
|
Definition
Financial issues. Legal issues. U/A. Mental Illness. Marriage to a foreign national.. Anything that could question your character, integrity, physical and mental health needs to be reported. |
|
|
Term
| State when safe combinations should be changed |
|
Definition
A combination lock is first installed or used b. A combination has been subjected, or believed to have been subjected to compromise; and when considered necessary by the CSA. c. Every 2 years safe and container combinations should be changed at a minimum |
|
|
Term
| State the responsibilities of the TSCO. |
|
Definition
| Maintain a system of accountability (e.g., registry) to record the receipt, reproduction, transfer, transmission, downgrading, declassification and destruction of command Top Secret information. E-7 OR ABOVE. |
|
|
Term
| Who can give the order for Emergency Destruction |
|
Definition
|
|
Term
| State the duties and responsibilities of a CSM. (Command Security Manager) |
|
Definition
| Serve as the principal advisor and representative to the commanding officer in matters pertaining to the classification, safeguarding, transmission, and destruction of classified information. |
|
|
Term
| difference between a security violation and a practice dangerous to security. |
|
Definition
Security Violation – a compromise of classified info to persons not authorized to receive it or a serious failure to comply with the provisions of security regulations on this manual which is likely to result in a compromise. A security violation requires investigation.
PDS – A failure to comply with the provisions of security regulations or this manual which causes a potential compromise of classified information |
|
|
Term
|
Definition
| Measures and controls that ensure confidentiality, integrity, and availability of the information processed and stored by a computer. |
|
|
Term
| How long a Commanding Officer can administratively suspend access before DONCAF revokes a clearance. |
|
Definition
|
|
Term
|
Definition
| device for connecting multiple twisted pair or fiber optic Ethernet devices together and making them act as a single network segment. |
|
|
Term
|
Definition
| Is a computer networking device that connects network segments. |
|
|
Term
|
Definition
| Is a device that interconnects two or more computer networks, |
|
|
Term
| What does NIPRNET stand for? |
|
Definition
| Non-classified Internet Protocol Router Network (NIPRNet) |
|
|
Term
| What does SIPRNET stand for? |
|
Definition
| Secret Internet Protocol Router Network (SIPRNet) |
|
|
Term
| What does JWICS stand for? |
|
Definition
| Joint Worldwide Intelligence Communications System. TOP SECRET Network |
|
|
Term
|
Definition
| initiative to install a common and secure IT infrastructure to OCONUS Navy locations. |
|
|
Term
| Describe the functionality of PKI. |
|
Definition
| Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. |
|
|
Term
|
Definition
| 2400 baud full duplex interface, over a satellite link with mobile platforms, for the receipt and transmission of narrative message traffic between FMX and mobile platforms |
|
|
Term
|
Definition
| (Automated Message Store and Forward ) EAMs, FIFO |
|
|
Term
|
Definition
| a real-time procedure which brings to the immediate attention of circuit operators the fact that an EEFI (Essential Elements of Friendly Information) disclosure has (or may have) occurred. |
|
|
Term
|
Definition
| River City conditions provide procedures to control outgoing paths from ships and shore systems (e-mail, web browsing, POTS, cell phones) for the purpose of OPSEC and forceprotection. |
|
|
Term
|
Definition
a. R - Routine (6 hours) b. P - Priority (3 hours) c. O - Immediate (30 Minutes) d. Z - Flash (As fast as possible with an objective of less than 10 minutes) e. W - Flash Override (3 Minutes |
|
|
Term
| the purpose of an OPTASK COMMS. |
|
Definition
| The OPTASK COMMS message is the means used by which the United States Navy and Allied Navies distribute afloat communications plans. |
|
|
Term
|
Definition
| Control of compromising emanations from telecommunications |
|
|
Term
| State the purpose of Emissions Control (EMCON). |
|
Definition
| EMCON is control of all electromagnetic and acoustic radiations, including communications, radar, EW and sonar. |
|
|
Term
|
Definition
| ASW(Anti-Submarine Warfare |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| (Strike Warfare): Naval operations to destroy or neutralize enemy targets ashore |
|
|
Term
| Define the roles of the U.S. Navy Blue |
|
Definition
| The group responsible for defending an enterprise’s use of information systems by maintaining its security posture against a group of mock attackers (i.e., the Red Team). |
|
|
Term
| Define the roles of the U.S. Navy Red Teams. |
|
Definition
| A group of people authorized and organized to emulate a potential adversary’s attack or exploitation capabilities against an enterprise’s security posture. |
|
|
Term
| Explain the purpose of FES (Fleet Electronic Support). |
|
Definition
| Responsible for the installation, removal, maintenance and repair of Cryptologic Direct Support Element (CDSE) electronic equipment |
|
|
Term
|
Definition
| The Joint Deployable Intelligence Support System (JDISS) program provides a family of hardware and software capabilities that allow connectivity and interoperability with intelligence systems supporting forces, in garrison, and deployed during peace, crisis, and war. |
|
|
Term
|
Definition
| systematic, proven process that identifies, controls, and protects generally sensitive but unclassified information about a mission, operation, or activity. |
|
|
Term
| Five step planning process for OPSEC. |
|
Definition
IDENTIFY CRITICAL INFORMATION- THREAT ASSESSMENT – STEP THREE: VULNERABILITY ANALYSIS- STEP FOUR: RISK ASSESSMENT- STEP FIVE: MEASURES/COUNTERMEASURES- |
|
|
Term
|
Definition
Web Risk Assessment:
Scan a website a determine if there are any OPSEC related vulnerabilities. |
|
|
Term
| State The Purpose of INTEL |
|
Definition
| - Identifying Centers of Gravity and Critical Vulnerabilities: Provide an accurate picture of the battle space from which we can identify clear and attainable objectives |
|
|
Term
| Six Steps of Intelligence |
|
Definition
STEP 1:Planning and Direction: Identification and need for intelligence by the commander’s PIRs(Priority Intelligence Requirements)
STEP 2: Collection: Tasking appropriate collection assets and/or resources to acquire the data and information required to satisfy collection objectives
STEP 3: Processing and Exploitation: Raw data is transformed into information, used by analysts to produce multidiscipline intelligence products
STEP 4: Analysis and Production: Integrating, evaluating, analyzing, and interpreting information from single or multiple sources into a finished intelligence product
STEP 5: Dissemination and Integration: Intelligence is integrated into the decision-making and planning processes; intelligence may be immediately communicated if situations warrant
STEP 6: Evaluation and Feedback: Continuous evaluation streamlines the process to improve performance |
|
|
Term
|
Definition
| concerns plans and intentions of foreign entities, and serves as the basis for the national military strategy. |
|
|
Term
| Operational Intelligence: |
|
Definition
| Intelligence required for planning and conducting campaigns and major operations |
|
|
Term
|
Definition
| Intelligence required for the planning and conduct of tactical operations. |
|
|
Term
|
Definition
| is an individual born in the US; an individual whose parent is a US citizen |
|
|
Term
|
Definition
| an alien lawfully admitted for permanent residence; |
|
|
Term
|
Definition
| Human intelligence is derived from information collected and provided by human sources |
|
|
Term
|
Definition
| Signals Intelligence is derived from communications, electronic, and foreign instrumentation signals |
|
|
Term
|
Definition
| magery Intelligence is technical, geographic, and intelligence information derived through the interpretation or analysis of imagery |
|
|
Term
| Define each band of the electromagnetic spectrum |
|
Definition
30 GHZ - 300 GHZ extremely high frequency 3 GHZ - 30 GHZ superhigh frequency 300 MHZ - 3 GHZ ultrahigh frequency 30 MHZ - 300 MHZ very high frequency 3 MHZ - 30 MHZ high frequency 300 KHZ - 3 MHZ medium frequency 30 KHZ - 300 KHZ low frequency 3 KHZ - 30 KHZ very low frequency 300 HZ - 3 KHZ voice frequency Up to 300 HZ extremely low frequency |
|
|
Term
|
Definition
| process where multiple analog message signals or digital data streams are combined into one signal over a shared medium |
|
|
Term
|
Definition
| The difference between the highest usable frequency of a device (upper frequency limit) and the lowest usable frequency of the device |
|
|
Term
|
Definition
| Keying - Inserting noise or data onto a frequency |
|
|
Term
| Name the layers of the Ionosphere |
|
Definition
| The ionosphere is composed of three layers designated D, E, and F, from lowest level to highest level. |
|
|
Term
|
Definition
| operationally relevant information such as the location, movement, employment, tactics, and activity of foreign non-communications emitters and their associated weapon systems. |
|
|
Term
|
Definition
| concerned with the technical aspects of foreign non-communications emitters such as signal characteristics, modes, functions, associations, capabilities, limitations, vulnerabilities, and technology levels. |
|
|
Term
|
Definition
| one-way flow of information between terminals. |
|
|
Term
|
Definition
| The full-duplex (fdx) mode is a method of operation in which telecommunications between stations takes place simultaneously in both directions |
|
|
Term
|
Definition
| Communications is in one direction only. |
|
|
Term
| Naval Oceanographic Office (NAVO) |
|
Definition
| maximizes sea power by applying relevant oceanographic knowledge in support of National Security. |
|
|
Term
|
Definition
| low atmospheric pressure, originating over tropical waters, which blows counter-clockwise around a center at speeds less than 34-knots. |
|
|
Term
|
Definition
| low atmospheric pressure, originating over tropical waters, which blows counter-clockwise around a center at speeds 34-63-knots. |
|
|
Term
|
Definition
| low atmospheric pressure with numerous thunderstorms that produce strong winds and heavy rain. Originates over tropical waters, which blows counter-clockwise around a center at speeds greater than 63-knots. |
|
|
Term
| Ocean Eddies (hot & cold) Explain: |
|
Definition
Cold: Occurs when a pocket of cold water breaks off from a cold current and travels counter-clockwise into warmer ocean waters. Warm: Occurs when a pocket of warm water breaks off from a warm current and travels clockwise into the colder ocean waters. |
|
|
Term
| Name the 4 types of tides: |
|
Definition
Ebb: currents that flow away from the shore. Flood: currents that flow toward the shore. High: When the sea level is at its highest point. Low: When the sea level is at its lowest point. |
|
|
Term
| How does Temp affect sound in water? |
|
Definition
| An increase in water temperature increases the speed of sound through water and vice versa. |
|
|
Term
|
Definition
| Harbor and inland waters warning for sustained winds of 34 to 47 knots |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Operations to ensure freedom of action in space for the US and its allies. |
|
|
Term
| What has the biggest effect on space environment? |
|
Definition
|
|
Term
|
Definition
| Solar wind is electrically charged particles that stream continuously from the Sun. |
|
|
Term
| How many year cycle does the sun have? |
|
Definition
|
|
Term
| How far above is a Low Earth Orbit. |
|
Definition
| Between approximately 100 and 420 miles above the Earth's surface. |
|
|
Term
| How far above is a Medium Earth Orbit |
|
Definition
| Between approximately 450 and 10,000 miles above the Earth’s surface. |
|
|
Term
|
Definition
| °. A satellite in this type of highly eccentric elliptical orbit slows down at apogee in the Northern Hemisphere (providing longer duration over its greatest field of view) and whips through perigee (smallest field of view) in the Southern Hemisphere. |
|
|
Term
|
Definition
| Stated more simply, the satellite would have a period approximately equal to one day (24 hours.) This is the typical orbit of most communications satellites, (i.e. MILSTAR, UFO-E/EE, CWSP, DSCS) |
|
|
Term
|
Definition
| Due to the ability to pass over the entire surface of the earth throughout the course of several days, the polar orbit is used extensively by imagery satellites. |
|
|
Term
|
Definition
| point on the orbit farthest from the center of the Earth |
|
|
Term
|
Definition
| The point closest to the center of the Earth |
|
|
Term
| Defense Satellite Communications System: |
|
Definition
| (DSCS) is a high capacity, SHF satellite based subsystem of the Defense Communications System (DCS). The DCS provides worldwide, jam-resistant, secure voice and high data rate communications for command and control, crises management, and intelligence data transfer service |
|
|
Term
|
Definition
| A branch of astronomy that deals with measurements (as of positions and movements) of celestial bodies. |
|
|
Term
| Each invalid PLA will receive a RI of: |
|
Definition
|
|
Term
|
Definition
| Code identifying the station |
|
|
Term
| DSRI (Destination Routing Indicator): |
|
Definition
| Consists of a six or seven character code identifying the station or system the message will be delivered to upon receipt by Autodin |
|
|
Term
| Each of these four sites has at least three CUDIXS suites and the capability to operate two full and one "mini" configuration simultaneously: |
|
Definition
NCTAMS PAC NCTAMS LANT NCTS GUAM NCTS Naples |
|
|
Term
|
Definition
| Broadcast Control Authority – Administers Broadcast |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Broadcast Controlling Station |
|
|
Term
|
Definition
| Broadcast Radiating Station |
|
|
Term
|
Definition
UARNOC – Unified Atlantic Network Operations Center NCTAMS LANT, Norfolk, Virginia PRNOC – Pacific Region Network Operations Center –NCTAMS PAC, Wahiawa, Hawaii ECRNOC – Eastern Central Network Operations Center NCTS Naples, Naples, Italy IORNOC – Indian Ocean Region Network Operations Center NCTS Bahrain, Manama, Bahrain |
|
|
Term
| Name a few services provided by the NOC: |
|
Definition
Premise Router Outer Security Screening Router Firewall Inner Security Screening Router Service Switch Virus Scanners DNS Mail Servers Fleet Router Tunnel Router |
|
|
Term
| If a FLTNOC is unable to utilize their DISN connection, their outbound network traffic will automatically be diverted to where? |
|
Definition
| across the HSGR to another FLTNOC to utilize their DISN path. |
|
|
Term
| Who is the controlling authority for Navy Firewall Policies. |
|
Definition
| Naval Network Warfare Command ( NAVNETWARCOM) |
|
|
Term
| Collaboration at Sea, CAS: |
|
Definition
| CAS is a tool set that allows users to share knowledge and information around the world using minimum bandwidth |
|
|
Term
|
Definition
Joint Fleet Telecommunications Operations Center. 24-7 One Stop Shop for C5I Needs. (C5I = Command, Control, Communications, Computers, Collaboration, Intelligence). |
|
|
Term
| Communications Assist Team (CAT) |
|
Definition
| A group of listed technical experts (both military and civilians) routinely perform on-site communications training |
|
|
Term
| NCTS – Naval Computer Telecommunications Station: |
|
Definition
| They are subordinate to their corresponding area master station and provide support services in their corresponding local area and work to inter-connect the NCTAMS to the global communications grid. |
|
|
Term
|
Definition
|
|
Term
| SAR in days for INMARSAT: |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Connection point for each NOC to the DISN network |
|
|
Term
|
Definition
| Scans inbound and outbound emails and attachments for viruses. |
|
|
Term
|
Definition
| DNS and Email (SMTP) store and forwarding services. |
|
|
Term
Institute of Electrical & Electronics Engineers IEEE: |
|
Definition
| International non-profit, professional organization for the advancement of technology related to electricity. |
|
|
Term
|
Definition
| Network tool used to show the route taken by packets across an IP network |
|
|
Term
CANES Consolidate Afloat Network and Enterprise Services: |
|
Definition
| A program that consolidates the ever-expanding number of non-tactical networks aboard Navy ships. |
|
|
Term
| Describe the 3 types of EKMS incidents: |
|
Definition
Cryptographic (Use of COMSEC keying material that is compromised, superseded, defective, or previously used and not authorized for reuse) Personnel (Defection, espionage, capture by enemy) Physical (Physical loss of COMSEC material, unauthorized access to COMSEC material, COMSEC material found outside of required accountability or physical control, failure to maintain TPI) |
|
|
Term
| State how often ISIC COMSEC inspections are required: |
|
Definition
| ISICs must conduct unannounced EKMS Inspections of their subordinate commands and units every 24 months. |
|
|
Term
| State how often CMS Advise and Assist visits are required: |
|
Definition
| CMS A&A Visits are required every 18 months. |
|
|
Term
| State how often a CO is required to conduct a CMS inspection. |
|
Definition
| The CO is required to conduct a CMS inspection Quarterly. |
|
|
Term
|
Definition
US Navy‘s standard UHF satellite terminal and Line-Of-Sight (LOS) transceiver. |
|
|
Term
| DAMA – Demand Assigned Multiple Access: |
|
Definition
| The TD-1271B/U Multiplexer (DAMA) is used in the DAMA subsystem and provides time-division multiplexing of several digital data sources over one satellite channel. |
|
|
Term
| DRSN – Defense Red Switched Network. |
|
Definition
| This global, secure voice service provides the President, Secretary of Defense, Joint Chiefs of Staff, combatant commanders and selected agencies with command and control secure voice and voice-conferencing capabilities up to the Top Secret SCI level. |
|
|
Term
NCTS Operational COC: NCTS Admin COC: |
|
Definition
CNO, FLTFORCOM, NAVNETWARCOM, NCTAMSPAC CNO, FLTFORCOM, NAVNETWARCOM, NCTAMSPAC, COMNAVREG SW |
|
|
Term
|
Definition
| To provide secure and reliable, classified and unclassified voice, messaging, video and data telecommunications to surface, subsurface, air and ground forces in support of command, control, communications |
|
|
Term
| Enlisted commissioned Program: |
|
Definition
| Program is an undergraduate education program that offers the opportunity to complete requirements for a baccalaureate degree and become a commissioned officer. |
|
|
Term
| Who sets the guidelines for the number and type of personnel at each command? |
|
Definition
|
|
Term
| Any changes to the manpower at a command must be requested by submitting what form? |
|
Definition
|
|
Term
| Two documents used for Manning at a command: |
|
Definition
Activity Manning Document
Enlisted Distribution Verification Report |
|
|
Term
| Information that can be found on an EDVR: |
|
Definition
NAME RATE RANK NEC SSN ADSD EAOS |
|
|
Term
|
Definition
| Officer Distribution Control Report |
|
|
Term
| What instruction covers Evals? |
|
Definition
|
|
Term
| What dates are evals due to E1-E6: |
|
Definition
E6 – NOVEMBER 15 E5 – MARCH 15 E4 – JUNE 15 E3 AND BELOW – JULY 15 |
|
|
Term
| Highest award a CO can give: |
|
Definition
|
|
Term
| Overseas screening has to be completed in how many days? |
|
Definition
|
|
Term
| Explain the roles of Logistics Support Division to NCTS: |
|
Definition
| N45 Supply is responsible for the procurement, tracking, expediting, receipt, shipping and transfer of excess materials. |
|
|
Term
| What are the two ways of procurement? |
|
Definition
Standard Stock Purchase Open Market Purchase |
|
|
Term
| What does MILSTRIP stand for? |
|
Definition
| Military Standard Requisitioning & Issue Procedures. MILSTRIP is used for ordering all material from the Navy Supply System. |
|
|
Term
| What does it mean when your NIIN starts with 00 & 01? |
|
Definition
| United States codes as per the standardization agreement with NATO. |
|
|
Term
| Discuss the Depot Level Repairable (DLR) program? |
|
Definition
| DLRs are those Navy managed items which, based on unit cost, annual demand, difficulty of repair, or other economic considerations, have been selected by cognizant inventory managers for special inventory control. |
|
|
Term
|
Definition
| A RIP chit is to be signed by Department Head and Commanding Officer. An approved copy will is to be posted to the PRF together with the NSN, unit price, standard price, and COG. |
|
|
Term
| Explain the components of the nation Stock Number format? |
|
Definition
The first four digits are called FSC (Federal Supply Classification) The nine digits there on are called NIIN (National Item Identification Number) 13 digits total |
|
|
Term
|
Definition
|
|
Term
| Describe equipment on watchfloor of immediate concern to Technical Support Division. |
|
Definition
EHF Terminals AN/SSR-1 AN/FCC-100(V)9 Automated Network Control Center (ANCC) |
|
|
Term
| The Navy’s standard SATCOM broadcast receiver system consists of: |
|
Definition
AS-2815/SSR-1 receiving antenna. AM-6534/SSR-1 Amplifier-Converter. (1 for each antenna) MD-900/ SSR-1 Combiner-Demodulator. TD-1063/SSR-1 Demultiplexer. |
|
|
Term
2 tag outs, describe each: Yellow: Red: |
|
Definition
A yellow tag used as a precautionary measure to provide temporary special instruction. A red tag prohibiting operation or removal of equipment that could jeopardize safety |
|
|
Term
| What is the Maintenance Data System (MDS)? |
|
Definition
| MDS is the means by which maintenance personnel can report applicable maintenance requirements and configuration changes on all categories of equipment. |
|
|
Term
| What is the lead time you need prior to visiting NCTS: |
|
Definition
|
|
Term
| There are five different types of alarms at NCTSSD. |
|
Definition
Manual Pull Alarms Zone (4) Alarm on the fire Alarm Control Panel Zone (14) Halon Panel Alarm Moisture Alarm UPS Alarm |
|
|
Term
| HOW MANY DOORS IN BLDG 1482 |
|
Definition
| There are 16 interior doors and 6 exterior doors at NCTS. |
|
|
Term
| 3 types of Supersession of EKMS: |
|
Definition
REGULAR: based on specific, pre-determined dates IAW the Controlling Authority.
IRREGULAR: NOT pre-determined but occurs as a result of use. Destroy when used operationally or when the Controlling Authority directs.
EMERGENCY: unplanned change; usually a result of compromise directed by the Controlling Authority. |
|
|
Term
| IAM (Information Assurance Manager): |
|
Definition
| principal advisor on information and personnel security within the command. |
|
|
Term
|
Definition
| 5510.36A(Information Security Program)- establishes uniform Information Security Program policies and procedures. |
|
|
Term
| Discuss the significance of having the training and certification program for IA workforce: |
|
Definition
| IA certification programs are intended to produce IA personnel with the demonstrated ability to perform the functions of their assigned position. |
|
|
Term
| Online Compliance Reporting System (OCRS) |
|
Definition
| reporting tool to document the compliance of corporate and POR assets with released vulnerabilities. |
|
|
Term
| IAVA – Information Assurance Vulnerability Advisory: |
|
Definition
| Addresses sever network vulnerabilities resulting in immediate and potential severe threats to DOD systems and information. |
|
|
Term
| IAVB – Information Assurance Vulnerability Bulletin |
|
Definition
| New vulnerabilities that do not pose an immediate risk to DOD systems |
|
|
Term
| IAVTA – Information Assurance Vulnerability Technical Advisory |
|
Definition
| Addresses new vulnerabilities that are generally categorized as low risk to DOD systems. |
|
|
Term
| CTO – Computer Tasking Order |
|
Definition
| Address immediate threats extremely critical to the overall security of the GIG. |
|
|
Term
|
Definition
| Formal declaration by a Designated Approving Authority (DAA) that an IT system is compliant with establish security requirements |
|
|
Term
|
Definition
| Measure of confidence that the security features, practices, procedures and architecture of an IS accurately mediates and enforces the security posture. |
|
|
Term
|
Definition
| Comprehensive evaluation of the technical and non-tactical security features of an IS and other safeguards made in support of the accreditation process |
|
|
Term
| Certification Test and Evaluation (CT&E)– |
|
Definition
| Software and hardware security tests conducted during the development of the IS. |
|
|
Term
| DoD Information Technology Security Certification and Accreditation Process (DIACAP)– |
|
Definition
| The standard DoD process for identifying information security requirements, providing security solutions, and managing IS security activities. |
|
|
Term
|
Definition
| Authorization granted by a DAA for a site or system to process, store, or transmit information. |
|
|
Term
|
Definition
| A collection of updates, fixes and/or enhancements to a software program delivered in the form of a single installable package. |
|
|
Term
|
Definition
| Refers to a weakness in a system’s security scheme |
|
|
Term
|
Definition
| Circumstances, events, or people with the potential to cause harm to a system. |
|
|