Board Flashcards

(408 cards)

1
Q

Solar Cycle

A

11 year cycle which has a 4 year rise and 7 year decline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Van Allen Radiation Belts

A

2 concentric, donut shaped regions of stable, trapped charged particles that exist because the geomagnetic field near the earth is strong and field lines are closed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Atmospheric Drag

A

Affects low orbiting objects, less than 1000 km. Energy deposited in the earth’s upper atmosphere by charged particle bombardment heats the atmosphere, causing it to expand outward over a period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Geosynchronous Orbit

A

Satellite with an average altitude of approximately 19,300 nautical miles. Satellite rotates once around earth in as long as it takes for earth to rotate around once

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

FSM

A

Fleet SIPR Messaging System. Point to point connection between ship and NOC. Faster, more reliable record message traffic delivery to ships.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

MUA

A

Master Update Authority. NCTAMS PAC. The single point for directory updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is RI

A

Routing Indicators. GENSER RI’s, Begin with the letter R and are seven characters in length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is OSRI

A

Originating Station Routing Indicator. Ships derive by using the first 4 letters of the routing indicator of the Fleet NARC assigned to the servicing NCTAMS/NCTS system to which they will transmit, suffixed by FRI assigned to the fleet/mobile unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is NARC

A

*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

FRI

A

Fleet Routing Indicator. Three letter designator assigned to the fleet/mobile unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

FL 1

A

Start of Message and Sequence Number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

FL 2

A

Routing Indicator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

FL 4

A

Security Label

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

FL 5

A

DTG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

FL 6

A

Originator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

FL 7

A

Action Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

FL 8

A

Info Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

FL 9

A

Exempt Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

FL 11

A

Break

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

FL 12

A

Text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

FL 13

A

Break

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

FL 14

A

Confirmation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

FL 15

A

End of message validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

ZBZ

A

Corrupt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
ZUJ
Stand by
26
ZEV
Acknowledged
27
ZUG
Negative
28
ZUE
Affirmative
29
ZES
Incomplete
30
What are the unique four letter designators that identify broadcasts
PMUL - NCTAMS PAC LMUL - NCTAMS LANT IMUL - NCTAMS PAC (ALTERNATE) -First letter identifies naval communication area and second letter identify single or multiple channel broadcast.
31
BCA
Broadcast Control Authority. Central hub where all message traffic sent to or received by submarines and shore stations gets disseminated.
32
BKS
Broadcast Keying Stations. Introduces message or facsimile traffic into the Fleet Broadcast Network by generating a key stream of broadcast-bound information to the BCS for specific channel allocation before being forwarded to the BRS for broadcast transmission.
33
BCS
Provides all the technical aspects of affecting a Fleet Broadcast, which include assembling key streams received from the various broadcast keying stations into specific broadcast channels and delivering a composite key stream to the Broadcast Radiating Station for transmission
34
ORM
Operation Risk Management. Decision making tool used to minimize risk
35
ORM Steps
``` Identifying Hazards Assessing Hazards Making Risk Decisions Implementing Controls Supervising ```
36
Instruction that governs safety and mishap reporting
OPNAVINST 5102.D | Navy & Marine Corp Mishap & Safety Investigation, Reporting, & Record keeping manual
37
Hazard severity and the 4 categories
Assessment of the expected consequence, defined by degree of injury or occupational illness that could occur - Category I - may cause death or loss of asset or grave damage - Category II - severe injury, or property damage - Category III - minor injury or property damage - Category IV - minimal threat to personnel safety or property
38
Mishap Probability and subcategories
Assessment of the likelihood that given exposure to a hazard an accident will result - Sub-Category A - Like to occur immediately - Sub-Category B - Probably will occur in time - Sub-Category C - May occur in time - Sub-Category D - Unlikely to occur
39
RAC
Risk Assessment Code. Structured process to identify and assess hazards - Critical Risk - Serious Risk - Moderate Risk - Minor Risk - Negligible Risk
40
How long do SITREPs have to be kept
5 years
41
3 objectives of first aid
Save lives, prevent further injury, prevent infection
42
Methods of controlling bleeding
Direct pressure, pressure point, tourniquet
43
Methods of clearing an obstructed airway
- Standing abdominal thrust - Reclining abdominal thrust - Standing chest thrust - Reclining abdominal thrust
44
HERO
Hazards of Electromagnetic Radiation to Ordnance
45
HERP
Hazards of Electromagnetic Radiation to Personnel
46
HERF
Hazards of Electromagnetic Radiation to Fuels
47
Types of PPE
Respirators, Hand protection, Foot protection, Eye protection, Face protection, Skin/Body protection, Hearing protection
48
Naval Doctrine
WIPLOC - Naval Warfare - Naval Intelligence - Naval Planning - Naval Logistics - Naval Operations - Naval Command and Control
49
Seven Principles of Naval Logistics
``` FEARSSS Responsiveness Simplicity Flexibility Economy Attainability Sustainability Survivability ```
50
First navy ship named after an enlisted man
Osmond Ingram DD 255 First enlisted man killed in WWI
51
Navy Birthday
13 October 1775
52
Three classes of naval vessels that existed an inception of the navy
Ship of the line Frigates Sloops of war
53
Hand Salute origin
The hand salute was done because most palms were dirty from handling lines. It was hands down as it was it was considered insulting to present a dirty palm
54
Battle Coral Sea
Aircraft passed each other in the clouds in the worlds first carrier versus carrier battle
55
Voyage of the Great White Fleet
Left Hampton Roads, Virginia, for a round the world cruise to show the flag and demonstrate the strength of the U.S. Navy
56
Battle of Normandy
Largest amphibious operation in history
57
Midway
Turning point of the Pacific war
58
Guadalcanal
After three days of bitter fighting, the Japanese naval forces retreated and US Marines were able to secure the island of guadalcanal
59
Battle of Leyte Gulf
Final blow to the Japanese navy on October 23, 1944
60
Mercury 3
Alan B Shepard
61
Gemini 3
John W Young
62
Apollo 11
Neil Armstrong
63
Apollo 17
Eugene Cernan and Ronald Evens
64
STS-1
All navy crew
65
On-the-roof-gang
A total of 176 enlisted radio operators were specially trained at a unique school located on the roof of the old Navy Dept building
66
Purple code
Japanese Cipher Machine. Code named purple because of the binders used by Japan
67
USS Liberty
Mistakenly attacked by Israeli forces in "six day war"
68
USS Pueblo
While off Wonsan,North Korea, Pueblo was attacked by local forces and seized
69
Landing at Inchon
Secured by Marines in less than 24 hours
70
Hainan Island EP-3 Incident
A mid-air collision between a USN EP-3 ARIES II signals surveillance aircraft and a People's Liberation Army Navy J-Bll interceptor fighter jet resulted in an international dispute between the US and China
71
USS Stark
Two Iraqi missiles struck the Side. 37 sailors were killed
72
State the qualities that characterize the Navy/Marine Corps team as instruments to support national policies
Readiness, Flexibility, Self sustainability, Mobility
73
Levels of war
Tactical, operational, strategic
74
National Security Act of 1947
Created the CIA. Serves as the primary civilian intelligence gathering organization in the government
75
RADM Hopper
Worked on the Mark I and Mark II electromechanical computing machine
76
First computer
ABC was the first computer in 1937
77
John Walker
Convicted of selling classified information to the Soviets. Reason we have TPI today
78
Oldest Intelligence Organization
General Order 292 established the Office of Intelligence in the Bureau of Navigation
79
When was ONI established and by who
Established in 1880s by LT Mason
80
First CIO/DNI
Chief Information Officer/Director of National Intelligence. | John Negroponte on April 21, 2005
81
Two departments combined to form ONI
Department Library and Office of Intelligence
82
OPCON and ADCON
Operational Control - commander in charge of the overall operation of forces Administrative Control - Commander in charge of the individual unit's administrative needs
83
FLTCOM
Fleet Commander. Overall responsible for the operations in the Fleet in their AOR
84
TYCOM
Type Commander. Responsible for the operation of their specific platform, such as surface, air, sub, expeditionary
85
PACOM
Pacific Command. Camp Smith, HI.
86
EUCOM
European Command. Stuttgart, Germany
87
JFCOM
Joint Forces Command. Norfolk and Suffolk, VA
88
SOUTHCOM
Southern Command. Miami, FL
89
CENTCOM
Central Command. Tampa, FL
90
NORTHCOM
Northern Command, Paterson AFB, CO
91
SOCOM
Special Operations Command. MacDill AFB, FL
92
TRANSCOM
Transportation Command. Scott AFB, IL
93
STRATCOM
Strategic Command. Offutt AFB, NE
94
AFRICOM
Africa Command. Stuttgart, Germany
95
CYBERCOM
Created in 2009. Naval Network Warfare Command was recognized to fill the role
96
2nd Fleet
Atlantic Ocean
97
3rd Fleet
Pacific Ocean, East Pac
98
4th Fleet
Africa and South America
99
5th Fleet
Central Command AOR waters
100
6th Fleet
Med, North Atlantic
101
7th Fleet
Western Pacific and Indian Oceans
102
10th Fleet
Cyber Command
103
TF
Task Force. A temporary grouping of units, under one commander formed for the purpose of carrying out a specific operation or mission.
104
TG
Task Group. A component of a naval task force organized by the commander of a task force or higher authority
105
TU
Task Unit. A component of a naval task group organized by the commander of a task group or higher authority
106
TE
Task Element. A component of a naval task unit organized by the commander of a task unit or higher authority
107
AG
Aerographer's Mates. Navy's meteorological and oceanographic experts
108
CTI
Linguists.
109
CTM
Maintenance technicians
110
CTN
Monitor, identify, collect and analyze information, provide data for digital network products
111
CTR
Crypto Technicians Collections Operate state of the art computer systems to conduct information operations, and collect analyze and exploit signals of interest to report worldwide threats
112
CTT
Electronic Intelligence | Operate electronic sensors and computer systems to collect, analyze, and disseminate Electronic Intelligence
113
IS
Intelligence Specialists. Analyze intelligence data
114
IT
Perform core and specialty functions of Communications Operations, message processing, network administration and security
115
DISA
Defense Information Systems Agency. Engineers and provides command and control capabilities and enterprise infrastructure to assure a global net-centric enterprise
116
NCDOC
Navy Cyber Defense Operations Command. | Over see entire navy network
117
NSA
National Security Agency. Provide for the signals intelligence mission of the US
118
Secretary of the Navy
Ray Mabus #75
119
Commander in Chief
President Obama #44
120
Secretary of Defense
Mr. Hagel. #24
121
CNO
ADM Greenert #30
122
MCPON
MC Stevens #13
123
ODCR
Officer Distribution Control Report
124
Command Master Chief
Total enlisted must be 250 or greater
125
AMD
Activity Manpower Document | -Total force manpower requirements
126
Evaluation report
Enlisted E-1 to E-9
127
Fitness report
All officers
128
Page 2
Dependant Infor, SGLI, emergency information
129
Page 4
Qualifications, education, training
130
Page 13
Administrative remarks
131
OPREP-3 PINACLE
Used to notify the National Command Authority. Events that could result in local, national, or international public reaction
132
OPREP-3 NAVY BLUE
Used to provide the CNO and other appropriate commands with information concerning incidents of military, political or press interest which are of high Navy, vice national interest
133
OPREP-3 NAVY BLUE UNIT SITREP
Used to provide higher authority or other potentially interested senior with notification of an incident not meeting oprep-3 special interests
134
SGLI
Servicemans Group Life Insurance
135
Officer accession programs for enlisted personnel
STA-21, LDO/CWO, MECP, OCS, Flying Warrant Officer
136
Purpose of 3M/PMS System
Maintenance and Material Management/Planned Maintenance System. Provides efficient and uniform methods of conducting and recording preventative and corrective maintenance
137
DPAS
Defense Property Accounting System. Used to track physical accountability of personal property
138
DLR Program
Depot Level Repairable. Repairable items for which the condemnation should be made at the depot level
139
NRFI DLR
Not Ready For Issue Depot Level Repairable - Turn-in - requires turn-in to a repair facility - RIP- Remain in Place, repairable components that cannot be removed until receipt of a replacement item
140
MAM
Maintenance Assistance Module. | -Parts used for isolating faults within an avionics system or test set
141
NSN
National Stock Number. Has 13 digits
142
APL
Allowance Parts List.
143
AEL
Allowance Equipage List. | -Durable items that are not consumed in use and are essential to the ships mission
144
NC
Not Carried
145
NIS
Not In Stock
146
DD Form 200
Survey Form
147
CHRIMP
Consolidated Hazardous Material Reutilization and Inventory Management Program. -Serves as a fundamental element of the Navy's lifecycle control and management of hazardous material
148
DRMS
Defense Reutilization Marketing Service. | -Provides services in the reuse, transfer, donation, sale or disposal of excess property
149
ServMart
A self service store operated by an ashore supply activity. It provides a ready supply of relativity low cost items frequently required by customers in the area
150
OPTAR
Operating Target. The estimate of the amount of money that will be required by an operating unit to perform assigned tasks
151
Red Cross
Immediate Precedence may be assigned. Also called an AMCROSS.
152
ADNS
Automated Digital Networking System. -Primary function is to connect Navy shipboard networks to other ship and shore networks for transfering IP data of various classification levels
153
CUDIXS
UHF SatCom - Up to 60 subscribers - Narrative message traffic
154
INMARSAT
-Used as a last means -International Maritime Satellite -
155
GINGERBREAD
Intruder on the line
156
EEFI
Essential Elements of Friendly Information. -IIdentify specific items of information which if acquired by an adversary would degrade the security of military operations
157
BEADWINDOW
Real-time procedure which brings to the immediate attention of circuit operators that EEFI disclosure has or may have occurred
158
River City
- Used to secure all communications off the ship. - 4 different levels - Level 1 is the most restrictive and level 4 is the least restrictive
159
Routine
R | 6 hours
160
Priority
P | 3 hours
161
Immediate
O | 30 minutes
162
Flash
Z | 10 minutes
163
CRITIC
W | 3 minutes
164
OPTASK COMMS
The means by which the Navy and Allied navies distribute afloat communications plans. -Used to build your com plan
165
COMSPOT
Submitted by all ships and shore facilities any time communication outages or degradations are encountered
166
CASREP
Submitted once troubleshooting has exceeded 48 hours
167
OTAT
Over the Air Transfer.
168
OTAR
Over The Air Rekey
169
TEMPEST
Code name given to the investigation, study, and control of compromising emanation from telecommunications and automated information systems
170
Purpose of EMCON
Emissions Control is the control of all electromagnetic and acoustic radiations, including communications, radar, EW, and sonar
171
ASW
Anti Submarine Warfare
172
SUW
Anti Surface Warfare
173
IW
Information Warfare
174
AW
Air Warfare
175
STW
Strike Warfare
176
NSW
Special Warfare
177
Blue Team
Defend/Analyze/Training
178
Red Team
Attack
179
JDISS
Joint Deployable Intelligence Support System -Provides a family of hardware and software capabilities that allow connectivity and interoperability with intelligence systems supporting forces
180
Frequency Spectrum
``` E V V L M High 3mhz - 30mhz Very high 30mhz - 300mhz Ultra high 300mhz - 3ghz Super high 3ghz - 30ghz Extremly High 30ghz -300ghz ```
181
FCC-100
Multiplexer -Used for SHF, voice, pots 128k channels
182
Aggregate
Combined signals/frequencies
183
Frequency
Number of cycles per unit of time, expressed in hertz
184
Wavelength
Distance in space occupied by one cycle of a radio wave
185
Ducting
Trapping of an RF wave between two layers of the earth atmosphere or between atmospheric layer and earth
186
Refraction
Occurs when the wave travels through two different mediums and bends toward or away from the normal
187
Multiplexing
Simultaneous transmission of a number of intelligible signals in either or both directions using only one RF carrier -Two methods: Time-Division and Frequency-Division
188
Modulation/Demodulation
The ability to impress intelligence upon a transmission medium, such as a radio wave
189
Bandwidth
Frequency range occupied by a modulated carrier wave
190
Keying
Carrier is shifted between two differing frequencies by opening and closing a key
191
Radio Waves
Form of radiant energy that can neither be seen nor felt or an electromagnetic wave generated by a transmitter - Ground wave - Sky wave - Space wave
192
Azimuth Angle
Angular measurement in the horizontal plane in a clockwise direction
193
Elevation Angle
Angle between the horizontal plane and the line of sight
194
AM
Amplitude modulation - refers to any method of varying the amplitude of an electromagnetic carrier frequency in accordance with the intelligence to be transmitted by the carrier frequency
195
FM
Frequency Modulation - the instantaneous frequency of the radio frequency wave is varied in accordance with the modulating signal
196
Air Search
300 miles in 360 degree circle
197
Operational Electronic Intelligence
Concerned with operationally relevant information such as location, movement, employment, tactics, and activity of foreign non-communications emitters and the associated weapons systems
198
Technical Electronic Intelligence
Concerned with the technical aspects of foreign non-communications emitters such as signal characteristics, modes, functions, associations, capabilities, limitations, vulnerabilities, and technology levels.
199
Half Duplex
One way flow of information at one time, but can go either way, just not at the same time
200
Full Duplex
Simultaneous communications in both directions
201
Simplex
Communications in only one direction
202
NCDOC
Navy Computer Defense Operations Command. -Coordinate monitor and oversee the defense of Navy computer networks and systems and to be responsible for accomplishing computer network defense missions as assigned by Navy Cyber Forces Command
203
GNOC
Global Network Operations Center | -Watch center for NETWARCOM. Direct operations and security of the Navy's portion of the Global Information Grid.
204
Purpose of FLTNOC
Provide a number of critical IP services to the Fleet.
205
UARNOC
Hampton Roads, VA
206
PRNOC
Waiahaiwa, HI
207
ECRNOC
Naples, Italy
208
IORNOC
Manama, Bahrain
209
Purpose of CAS
Collaboration at Sea -Set of tools that allow replication of information. Allows users to share knowledge and information around the world using minimum bandwidth for sound decision making
210
JCA
Joint Service Imagery Processing -Client server based architecture with web like browsing features and capabilities for fleet imagery subscribers that is scalable up to 8mbps
211
HSGR
High Speed Global Ring - OC3 or OC12 - Terrestrial connectivity between shore communications stations
212
EHF FOT
EHF Follow On Terminal - 512k to T1 speed - Provides IP Services
213
LDR
Low Data Rate, No voice
214
MDR
Medium Data Rate
215
EHF TIP
EHF TDMA Interface Processor - Provides ethernet connection between ADNS and MDR terminal - Includes phone services
216
CWSP
Commercial Wideband Satellite Program | -Provides world wide full duplex data rates to the fleet using a family of COTS/NDI satcom terminals and services
217
DSCS
Defense Satellite Communication System - Military satellite constellation place in geosynchronous orbit to provide high-volume, secure voice and data communications - Also provides SHF - Anti-jam
218
DS-0
64k
219
T-1
1.544mbps
220
E-1
2.048 mbps
221
OC-3
155.52 mbs
222
Purpose of Iridium
Provide satellite phone services to mobile units down on all other means of connectivity
223
ANWSC-3 v6
LOS UHF transceiver - 225 to 400 mhz - used for voice, data, and teletype
224
AN/WSC-3 v11
Havequick Transceiver - 225 to 400 mhz - Frequency Hopping - Anti-jamming
225
AN/USC 61C / DMR
Digital Modular Radio - Software defined radio - Frequencies ranging from 2 mhz to 2 ghz - HF, VHF, UHF, and SATCOM
226
DAMA
Demand Assigned Multiple Access -Access scheme in which a SATCOM channel is assigned for multiple access through the DAMA control system in accordance with demand
227
DAMA operation modes
AC- Automatic Control, allows communications slots within the waveform to by dynamically assigned to terminals requiring access to the slots DC - Distributed Control, a terminal's access to a communications slot is pre-assigned
228
APTS
Afloat Personal Telecommunications Systems | -"Sailor Phones"
229
KAM/SAM
Maintenance Manuals - 3 classes, depot, full, and limited - depot and full are only issued to crypto repair facilities - limited are available to limited maintenance technicians
230
KAO
equipment operating instructions and is provided during the initial issue of the equipment
231
LMM
unclassified manuals replacing limited maintenance KAMs
232
Contractor Account
Account begins with "87" - governed by OPNAVISNT 2221.5C - repair and return transfers have a maximum of 90 days - all other transfers have a maximum duration of 1 year
233
Local CRF or maintenance facility transfers
transfers less than 180 days do not require NCMS approval. Use a hand receipt
234
CRF locations
San Diego, Norfolk, and Japan
235
Loans to contractors governed by what
OPNAVY 2221.5C
236
Authorized shipping methods for KOK
DCS, Defense Courier Service
237
Authorized shipping methods for CCI
``` DCS FedEx Registered Mail Hand Carry AMC ```
238
Mission of A&A teams
conduct periodic training visits, training to all DON account personnel,
239
Publications that detail inspections and periodic visit requirements
EKMS 1B Art 320-330 | EKMS 3C Chapter 2
240
KP operating guide
EKMS 704C
241
Primary Function of Key Manager
Manage assigned key, aid short title profiles, maintain their attributes and distribution requirements and coordinate ordering/generation of electronic key
242
Responsibility of a Controlling Authority
Responsible for directing the creation, distribution, and maintenance of the key from "birth to death"
243
What is required for reissue of electronic key after kp failure
Manual destruction report must be submitted to NCMS and processed
244
KP rekey
Annually
245
KG Rules
USKAD BU71260 | Used to produce locally generated key
246
KP changeover
3 months
247
Types of incidents
Physical, Cryptographic, Personnel
248
Non-reportable PDS
- missing signatures - material not listed on account inventory - late destruction - failing to perform kp rekey
249
Reportable PDS
- Premature use of keying material - Inadvertent destruction - Chainging password parameters on LMD
250
NCMS COMSEC publications
EKMS 1B EKMS 2 EKMS 3C EKMS 5
251
How do you transfer and receive COMSEC from another service
CNO can authorize | -must have justification
252
MRC
Master Reference Catalog - Located on Tier 1 and NSA SIPR site - Lists all equipment and key information by short title
253
Where are the retention periods for EKMS documentation located
EKMS 1B Annex T
254
What types of SF-153s require 3 signatures
Destruction, Relief of accountability, possession reports, inventories, and conversions
255
SF 700
Security Container Information
256
SF 701
Activity Security Checklist
257
SF 702
Security Container Check Sheet
258
SF 703
TS Cover Sheet
259
SF 704
S cover sheet
260
COR
Central Office of Records
261
IT
In Transit
262
PI
Pending Investigation
263
IS
In Stock
264
RL
Relief of accountability
265
CAD
Common Account Data - RA controlled fields can be changed by RA's - Account managers can change other information
266
Tier O account
begins with "88"
267
Type "0"
Semi Annual or IRST
268
ALC 1
Physical material continuously accountable to the COR by register or serial number
269
ALC 2
Physical Material continuously accountable to the COR by quantity
270
ALC 4
Physical material locally accountable by quantity
271
ALC 6
Electronic material continuously accountable to the COR by register
272
ALC 7
Electronic material locally accountable by quantity
273
Transaction Type 1
Destruction Report
274
Transaction Type 9
Possession Report
275
Transaction Type 11
Relief from Accountability Report
276
Transaction Type 13
Transfer Report Initiating
277
Transaction Type 14
Transfer Report Receipt All
278
Transaction Type 15
Transfer Report Receipt Exception
279
Transaction Type 16
Transfer Report Receipt Individual
280
Transaction Type 17
Inventory Reconciliation Status
281
Transaction Type 18
Request Inventory
282
Transaction Type 1-99
Pending Investigation
283
Host/Client
User workstation
284
Application Server
Hosts an application for users to use
285
Hub
Dumb switch
286
Switch
Forwards information based on MAC address. OSI layer 2
287
Router
forwards packets between networks | OSI layer 3
288
WAP
Wireless Application Protocol. | -Mobile devices such as phones and PDA
289
Proxy Server
Secondary way to get to another location. Acts as an intermediary
290
Firewall
Helps to eliminate undesired access
291
Backup
Stores copy of data | -Full, Differential, Incremental, Partial
292
Repeater
Receives a signal and cleans it and regenerates it to so it can be sent to its destination
293
Bus Topology
All are connected to a single cable backbone
294
Star
Central hub
295
Ring
Circle
296
Mesh
all nodes are connected to one another
297
LAN
Local Area Network.
298
WAN
Wide Area Network
299
MAN
Metropolitan Area Network
300
GAN
Global Area Network
301
OSI Model
``` Application Presentation Session Transport Network Data Link Physical ```
302
TCP/IP Model
``` "A TIN" Application Transport Internet Network Access ```
303
Difference between IPv4 and IPv6
4 has 32 bits and 6 has 128 bits
304
NIPRNET
Unclassified but sensitive Internet Protocol Router Network
305
SIPRNET
Secret IP Router Network
306
JWICS
Joint Worldwide Intelligence Communications System
307
DoDN
GIG
308
DISN
Defense Information System Network
309
NMCI
Navy Marine Corp Intranet
310
ONENET
Overseas Network
311
IT21
Shipboard network, such as OneNet or NMCI | -Being replaced by CAINES
312
Machine Language
Binary
313
Assembly Language
Scripting | C
314
High-Level Language
Java | C++
315
Virus
Malicious code that attaches to files
316
Worm
Self replicating
317
Trojan
Looks as if the program works correctly, but has malware attached
318
Phishing
Criminally fraudulent
319
Network Enumeration
Lists all equipment and ports and connections | -Whats up Gold
320
Buffer Overflow
Program writes data beyond the buffer space allocated in memory
321
SQL Injection
Convinces the application to run SQL code that was not intended
322
PKI
Is something you have and something you know
323
DNS
Domain Name System | The name resolution system that translates alphabetic domain names into numeric ip addresses
324
OPSEC
Operational Security
325
OPSEC Steps
5 steps 1. Identify critical information 2. Threat assessment 3. Vulnerability analysis 4. Risk assessment 5. Measures/Countermeasures
326
WRA
Web Risk Assessment. | Self assessments to determine whether potential critical information is on a commands web site
327
Critical Information
Information about friendly activities, intentions, capabilities, or limitations an adversary seeks
328
NMOC
Naval Meteorology and Oceanography Command
329
GOES
Geostationary Operational Environmental Satellite | -Weather forecasting
330
POES
Polar Operational Environmental Satellite | -14.1 times around the earth a day
331
DMSP
Defense Meteorological Satellite Program
332
TRMM
Tropical Rainfall Measuring Mission
333
Ambient air
outdoor air in which humans and other organisms live and breathe
334
Tropical Depression
Winds 33 knots of less
335
Tropical Storm
winds 34-63 knots
336
Hurricane/typhoon
winds greater than 63 knots
337
Ocean Eddies
Independent circulations or rings of cold or warm water - Cold eddies are counter clockwise - Warm eddies are clockwise rotation
338
Small Craft Advisory
Winds of 18-33 knots
339
Gale
Winds of 34-47 knots
340
Storm
Winds of 48 knots or greater
341
Local wind advisory
18-33 knots or gusts 25 knots or greater
342
Cyclone COR 5
Destructive winds in 96 hours
343
Cyclone COR 4
Destructive winds in 72 hours
344
Cyclone COR 3
Destructive winds in 48 hours
345
Cyclone COR 2
Destructive winds in 24 hours
346
Cyclone COR 1
Destructive winds in 12 hours
347
Premise Router
Perimeter router
348
OSSR
Outer Security Screening Router
349
ISSR
Inner Security Screening Router
350
VSCAN
Virus scanner scans inbound and outbound email and attachments for viruses
351
DNSMail Server
SMTP store and forwarding services
352
Fleet Router
Router at NCTAMS of NCTS in your AOR
353
IT21 Tier 1
24/7 help desk watch station
354
IT21 Tier 2
System Administrators
355
IT21 Tier 3
Fleet Systems Engineering Team
356
IT21 Tier 4
SPAWAR
357
Port 20
FTP
358
Port 21
FTP
359
Port 22
SSH
360
Port 23
Telnet
361
Port 25
SMTP
362
Port 53
DNS
363
Port 80
HTTP
364
Port 110
POP
365
Port 443
HTTPS
366
IEEE
Organization that develops new communication and network standards -RFC - Request For Comment
367
Routing
Process of selecting paths in a network along which to send network traffic
368
CANES
Consolidated Afloat Networks and Enterprise Services | -Replacing IT21
369
Spillage
Data placed on on information system low than the classification of the data
370
Procedures for correcting spillage
Contact and report to security manager and IAM
371
SAAR-N
System Authorization Access Request - Navy
372
CTR
Contract Technical Representative | -Shelia Mehr
373
NREMS
Navy Regional Enterprise Messaging System
374
Strong Password requirements
14 characters, 2 upper, 2 lower, 2 number, and 2 special characters
375
Certification
Process you have to go through to be accrediated
376
Accrediation
Good for 3 years | -NCDOC can shutdown if command fails
377
SSAA
System Security Authorization Agreement | -Agreement between two networks to keep both of their standards at the same level
378
ATO
Authorization To Operate | -Good for 3 years
379
IATO
Interim Authorization to Operate | -Good for 6 months
380
Five attributes of IA
1. Confidentiality - keeping secret as secret and TS as TS 2. Integrity - Ensuring that nothing was changed, use Encryption 3. Availability - Making resures available 4. Non-repudiation - Proves sender really sent the email, uses PKI 5. Authentication - established validity of an originator, such as a pin
381
9 categories of computer incidents
1. Root level intrusion 2. User level intrusion 3. Denial of service 4. Malicious logic 5. Reconaissance 6. Non-compliance activity 7. explain anomoly 8. unsuccessful activety 9. Investigating
382
IAVA
Information Assurance Vulnerability Alert - Sent out by NCDOC - Changes must be completed immediately
383
IAVB
Information Assurance Vulnerability Bulletin | -Medium Risk
384
CTO
Computer Tasking Order | -Immediate order by regional commander
385
Vulnerability and threat
Vulnerability is a weakness in the system, while a threat tries to exploit the vulnerability
386
Responsibilities of an IAM
the 5 attributes of IA on our network
387
JFTOC
Joint Fleet Telecommunication Operations Center. | -NCTAMS has a 24/7 watch officer
388
TIP
TDMA Interface Processor | -Time Division Multiple Access
389
SAR-GAR
Satellite Access Request-Gateway Access Request
390
GCIB
Global Communications Information Bulletin | -GCIB 7
391
ASI
Authorized Service Interruption
392
AESOP
Afloat Electromagnetic Spectrum Operation Program | -Frequency planning for radar and weapon systems as well as the process of generating communication plans
393
CCS
Command and Control Ship | -CCS is in charge of establishing TIP for all ships in that battle group
394
5 Steps of Intelligence
1. Planning and Direction 2. Collection 3. Processing 4. Production 5. Dissemination
395
Categories of Intelligence
Strategic, Operational, Tactical
396
HUMINT
Human Intelligence | -gathering information from human sources
397
OSINT
Open Source Intelligence | -News media
398
MASINT
Measurement and Signature Intelligence | -Radar signatures
399
SIGINT
Signals Intelligence | -intercepted signals
400
COMINT
Communications Intelligence | -messages or voice information
401
FISINT
Foreign Instrumentation Signals Intelligence | -
402
ELINT
Electronic Intelligence | -gathering intelligence by electronic sensors
403
IRINT
Infrared Intelligence | -
404
ACINT
Acoustic Intelligence | -acousting phenomena
405
Mission of NCMS
Manages Communications Security Material for the DON. PKI. Training Team
406
Specific NCMS functions
- Publishes COMSEC policy | - CMIO. Comsec Material Issuing Office
407
CMIO
Comsec Material Issuing Office | -receives, stores, and ships ekms material
408
CMCS
Comsec Material Control System -comsec material is that material used to protect us government transmissions, communications and the processing of classified or sensitive unclassified information