EIDWS Test Flashcards

(50 cards)

0
Q

What instruction governs safety and mishap reporting?

A

OPNAVINST 5102.1D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What are the steps in ORM process in correct order?

A
Identify hazards
Assess hazards
Make risk decisions
Implement controls
Supervise
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is RAC? And what are the different RAC’s?

A

Risk Assessment Codes - combines severity with probability to determine risk.

  1. Critical
  2. Serious
  3. Moderate
  4. Minor
  5. Negligible
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is MSDS?

A

Material Safety Data Sheet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the six areas that compromise Naval Doctrine?

A
Warfare
Intelligence 
Planning
Operations 
Logistics 
Command and Control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What three classes of ship existed at the inception of the Navy?

A

Ships of the line
Sloops of war
Frigates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the significance of the Battle of Coral Sea?

A

The two ships never saw each other, battle fought entirely by aircraft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What was the Purple Code

A

The name used by U.S. military to identify the most secure diplomatic cryptographic system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the qualities that characterize the Navy/Marine Corps team as instruments to support national policies?

A

Ready force
Flexible force
Mobile force
Self sustaining force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What was RADM Grace Hoppers primary contribution to the U.S. navy?

A

COBOL AND FORTRAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What was ARPANET?

A

Worlds first packet switching network, predecessor of the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is NCA?

A

National Command Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the five different Type Commands?

A
AIRPAC
SUBPAC
AIRLANT
SUBLANT
SURFLANT
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

2nd Fleet?

A

Atlantic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

3rd Fleet

A

Pacific

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

4th Fleet

A

South America and Caribbean

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

5th Fleet?

A

Red Sea and Persian Gulf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

6th Fleet?

A

Mediterranean

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

7th Fleet?

A

East Asian-Pacific

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

10th Fleet

A

Full Spectrum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is C5I?

A
Command
Control
Communications
Computer
Collaboration 
Intelligence
21
Q

What is section 1 of the EDVR?

A

Prospective Gains

22
Q

When are E-9 evaluations due?

23
Q

What information is contained in the NAVPERS 1070/613?

A

Administrative Remarks

24
What is DLPT?
Defense Language Proficiency Test
25
What are the 6 areas of Brilliant On the Basics?
``` Indoc Ombudsman Sponsorship Mentors hip Career development boards Sailor recognition ```
26
What is a SAER, and what is its purpose?
Security Acces Eligibility Report | -States all facts pertaining to an incident
27
What is the SF312 used for?
Classified information non-disclosure agreement
28
What are RAMs?
Random Anti-Terrorism Measures
29
What is the difference between a security violation and a practice dangerous to security?
Security violations are intentional
30
What are the 5 attributes of IA?
``` Confidentiality Integrity Availability Non repudiation Authentication ```
31
What is a self replicating malware that does not require user interaction?
Worn
32
What is river city?
An IPSec measure to secure communications to prevent leaking sensitive info.
33
What is used in format line 9 of a standard naval message?
XMT- Exempt
34
What are the core pillars of IO?
``` Computer Network Defense Computer Network Attack Military Deception OPSEC Psychological Operations Electronic Warfare ```
35
What are the 5 steps of OPSEC process in the correct order?
``` Identify critical information Identify the threat Identify the vulnerability Assess the risk Apply countermeasures ```
36
Define the 5 steps of the Intelligence Cycle?
``` Planning and Direction Collection Processing Analysis and production Dissemination ```
37
What is CCIR?
Commanders Critical Information Requirements- Intel that requires immediate attention of the commander
38
What is the period of a solar cycle?
11 year cycle 4 year rise 7 year decline
39
What is the difference between apogee and perigee?
Apogee - a point furthest away | Perigee - a point closest to
40
What is the RI assigned to an invalid PLA?
A message RUBDPLA
41
What is the governing instruction for IP services?
GCIB 3A
42
Define MOSS and give an example?
Microsoft Office SharePoint Server | Exp: Command Portal
43
What is HSGR?
High Speed Global Ring
44
What is AESOP?
Afloat Electromagnetic Spectrum a operations Program
45
Which port is used for SMTP?
25
46
Who is NCTS Far East's ISIC?
COMTENTHFLT
47
What are 2 modes of operation for AN/WSC-3?
Satellite and line of sight
48
Define DAMA and explain its purpose?
A network that takes a single 25 KHz channel and breaks it up into a time division
49
What are two modes of operations for DAMA?
AC - Automatic Control | DC - Distributed Control