IDW: TechFundamentals/OPSEC/Security Flashcards

(50 cards)

0
Q

Wavelength

A

Physical distance of a wave or cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Frequency

A

Number of cycles that occur in one second; usually in hertz.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ducting

A

Temperature or moisture conditions in atmosphere that allow a greater bending of radio waves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Refraction

A

Waves that changes direction when passing from one medium to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Multiplexing

A

For simultaneous transmission of two or more signals over a common carrier wave.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Modulation

A

Impressing intelligence upon a transmission medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Demodulation

A

Removal of intelligence from a transmission medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Bandwidth

A

Space within the (RF) Radio Frequency spectrum that’s signal occupies; expressed in Hertz.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Keying

A

Inserting noise or data onto a frequency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Propagation

A

Movement through a medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Continuous Wave

A

Unmodulated frequency that doesn’t carry additional modulated intelligence and is transmitted for use in some radio transmissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Azimuth

A

Angular measurement in the horizontal plane used in reference to altitude.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define Operational Security.

A

Systematic, proven process that identifies, controls and protects generally sensitive, but unclassified information about a mission, operation or activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Air Search RADAR

A

Detect & determine position, course & speed of air targets; used as early warning devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Surface search RADAR

A

Used to detect presence of surface craft & low flying aircraft/navigational aid in coastal waters and poor weather conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fire Control RADAR has how many phases?

A

Three

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 3 phases of Fire Control RADAR?

A

Designation - Radar is directed to general location of desired target.

Acquisition - Radar searches small volume of space in a prearranged pattern until target is located.

Tracking - Once target is located, radar system automatically follows target motions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the 5 step planning process?

A

Identify Critical Information (CI)

Analyze the threat

Analyze the vulnerabilities

Assess the risk

Apply the countermeasures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

PAO

A

Target Audience - Public
Intent - Inform
Method - Public Release

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

OPSEC

A

Target Audience - Adversary
Intent - Deny
Method - Five-Step Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Define Critical Information

A

Information about friendly activities, intentions, capabilities, or limitations an adversary seeks in order to gain a military, political, diplomatic, economic or technical advantage.

21
Q

What directives govern personnel security?

A
  1. 30: Personnel Security Manual

5510. 36: Information Security Manual

22
Q

Top Secret

A

Orange; cause grave damage to the national security.

23
Q

Secret

A

Red; Cause serious damage to the national security.

24
Confidential
Blue; Could be expected to cause damage to national security.
25
SCI (Sensitive Compartmental Information)
Yellow; Requires a higher level of control (smaller group of ppl)
26
Unclassified
Green; Potential to the harmful.
27
What does "need to know" mean?
A determination that a recipient requires access to specific classified information in order to perform their job.
28
Top Secret Investigation
Favorably completed SSBI every 5 years
29
Secret Investigation
Favorably completed NACLC every 10 years.
30
Confidential Investigation
Favorably completed NACLC every 15 years.
31
Anti-Terrorism Force Protection (ATFP)
Adjustable defensive posture set for mitigation of potential threats.
32
Events to be reported to SSO.
Arrests and convictions. Adverse involvement with law enforcement. Bad credit Alcohol abuse Drug involvement Mental health issues Outside employment Security violations
33
Purpose of EAP
Plan for safeguarding classified material in the event of an emergency; ties into Emergency Destruction.
34
Procedures for hard copy classified material for Hand Carry
Must have courier card or courier letter Must go directly to destination If stopped or pulled over, show military ID and courier card/letter
35
FPCON Levels
Normal: General global threat of possible terrorist threat; routine security posture Alpha: Increased general threat of possible terrorist activity. Bravo: More predictable threat of terrorist activity exists. Charlie: Incident occurred or targeting personnel/facilities is likely. Delta: Applies in imminent area where a terrorist where attack has occurred or Intel that an attack is imminent.
36
SF700
Security Container Information
37
SF701
Activity Security Checklist
38
SF702
Security Container Check Sheet
39
SF703
Top Secret Coversheet
40
SF312
Classified Non-disclosure agreement
41
What is a RAM
Random Anti-Terrorism Measure: Random implementation of higher FPCON measures in consideration of local terrorist capabilities.
42
What is PED (Personal Electronic Devices)?
Personal Electronic Device are prohibited in all classified spaces.
43
Difference between a Security Violation and Practice Dangerous to Security.
Security Violation: A compromise of classified info to persons not authorized to receive it. PDS: Failure to comply with the provisions of security regulations which could cause a compromise of classified information.
44
Define an Access List
Personnel who need uninhibited access to a space to fully perform their duties.
45
Responsibilities of DONCAF
Authority on authorizing all clearances.
46
What is Two Person Integrity (TPI)
Ensures that no one person has complete access to sensitive information.
47
Procedures for sanitizing an area.
Removal of information from the media or equipment such that data recovery using any known technique or analysis is prevented.
48
What is Joint Personnel Adjudication System (JPAS)
Website used to hold personnel information involving security clearances.
49
Purpose of SF86
Approved method of requesting PSI products from OPM.