Term
|
Definition
| long-term force shaping tool that aids in leveling rating manning between overmanned and undermanned ratings. |
|
|
Term
List the officer accession programs that are available to enlisted personnel:
|
|
Definition
Seaman to Admiral (STA-21 Program)
Limited Duty Officer (LDO)
Chief Warrant Officer Program (CWO)
Navy Officers Candidate School (OCS)
Medical Enlisted Commissioning Program (MECP)
Medical Service Corps In-Service Procurement (MSC IPP) |
|
|
Term
| State the duties and responsibilities of the Command ESO |
|
Definition
| The Educational Services Officers assists the Executive Officer in administering educational programs. |
|
|
Term
| Describe the six programs of Brilliant on the Basics: |
|
Definition
Career Development Boards
Sponsorship
Mentorship
Sailor Recognition
Command Indoctrination
Command Ombudsmen support
|
|
|
Term
| Discuss the purpose of the 3-M/PMS System? |
|
Definition
| To maintain equipment at its maximum operating efficiency by reducing downtime and cost of maintenance and man-hours. |
|
|
Term
| Explain how DPAS is used to track equipment |
|
Definition
| Defense Property Accountability System - by recording sensitive information in an approved secure or non-secure system property system in away that national security is not compromised. |
|
|
Term
| Discuss the purpose of the MOV program |
|
Definition
| Material Obligation Validation - purpose is to ensure overaged material obligations reflected in the inventory. |
|
|
Term
|
Definition
| Depot Level Repairable - managed items based on the unit cost, annual demand, difficulty of repairs, or other economic considerations that have been selected for special inventory control. |
|
|
Term
Explain the procedures for NRFI DLRs in regard to the following situations:
Turn-in
RIP |
|
Definition
Turn-in: Accomplished on a one-for-one exchange basis to receive credit to the nearest stock point.
RIP: (Remain-in-place): NRFI Part has to remain in the equipment until the RFI part has been received. |
|
|
Term
| Define MAMS and Bulkhead Ready Spares |
|
Definition
Maintenance Assist Modules are used for troubleshooting of equipment held in the custody of assigned department head.
Bulkhead Ready Spares are bulky items stored in assigned spaces where they will be used. |
|
|
Term
| Define the term CASREP and explain the four categories |
|
Definition
Casualty Report - report designed to identify the parts required to be repaired for faulty equipment.
4 categories:
CAT 1, CAT 2, CAT 3, CAT 4 |
|
|
Term
Define the following acronyms:
NSN
COG
APL
AEL
NC
NIS
SIM |
|
Definition
National Stock Number
Cognizance of Navy Material
Allowance Parts List
Allowance Equipage List
Not Carried
Not in Stock
Selected Item Management |
|
|
Term
| What is a DD Form 1348-6? |
|
Definition
| Material that cannot be identified by NSN |
|
|
Term
|
Definition
| Request document for contractual procurement |
|
|
Term
|
Definition
| 7 part document for procuring non-nsn material |
|
|
Term
|
Definition
| (MIPR, Military Interdepartmental Purchase Request) - Request material from other branches/departments |
|
|
Term
|
Definition
| Invoice and public voucher for over-the-counter purchases of supplies |
|
|
Term
|
Definition
| Request for supplies and services from commercial vendors |
|
|
Term
|
Definition
| Request to buy, ship, and receive commercial products. |
|
|
Term
|
Definition
| Amendment of solicitation and modification of a contract |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Quality Deficiency Report |
|
|
Term
Discuss the following:
CHRIMP
DRMS
Servmart |
|
Definition
Consolidated hazardous material reutilization and inventory management program - Navy's life-cycle control and management of hazardous material
Defense reutilization marketing service - disposing site of excess material purchased for military services
Service Mart - direct purchase of consumable, retail items from commercial sources. |
|
|
Term
| Discuss the uses of the Government commercial purchase Card (IMPAC) (VISA) |
|
Definition
| Provide on the spot purchases of supplies and services for a more efficient, cost effective, process of micro-purchase items or services. |
|
|
Term
| What is an OPTAR and explain its components. |
|
Definition
Operating Target : Fiscal Year funds granted by the type commander for each command to obtain materials and services necessary for operations components:
OFC-20 Supplies and Services
OFC-50 Aviation
OFC-01 Flight Operations
|
|
|
Term
State the difference between the following:
Normal Power
Emergency Power
Uninterrupted Power |
|
Definition
Primary Source of power
Backup Source of power
Temporary Source of power while switching from primary to backup or to allow time to safety shut down equipment during a loss of power. |
|
|
Term
Define the following classification categories, how they differ, and the color codes used to identify each one.
Top Secret
Secret
Confidential
Unclassified |
|
Definition
TS (Orange) - cause exceptionally grave damage
Secret (Red) - cause Serious damage
Confidential (Blue) - cause damage
Unclassified (Green) - Example, pubs available on the internet. |
|
|
Term
| Explain what is meant by 'need to know' |
|
Definition
| is a determination that an individual requires access to specific classified information |
|
|
Term
| What eligibility is favorable for Top Secret, Secret, and SCI and how often are they updated? |
|
Definition
Top Secret is favorably completed SSBI, SSBI-PR or PPR and must be updated every 5 years.
Secret/Confidential is favorably completed by NACLC or ANACI and must be updated every 10 and 15 years.
Sensitive Compartmented Information (SCI) is favorably adjudicated SSBI. A SSBI-PR is required to be submitted every 5 years. |
|
|
Term
| Identify what a SAER is and its purpose? |
|
Definition
| Security Access Eligibility Report - used when trying to get a SCI clearance but have to explain something in detail (Negative remarks on a credit report) |
|
|
Term
| Identify the events that should be reported to the SSO? |
|
Definition
| Financial issues, legal issues, U/A, mental illness, marriage to a foreign national, anything that could question your character, integrity, physical, and mental health needs to be reported. |
|
|
Term
| Identify who has overall authority of, and controls access to, a SCIF |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Classified Information Nondisclosure Agreement |
|
|
Term
| State when safe combinations should be changed. |
|
Definition
A combo lock is first installed or used
A combo has been subjected, or believed to have been subjected to compromise; and when considered necessary by the CSA.
Every 2 years safe and container combinations should be changed at a minimum. |
|
|
Term
| What is an FDO and state their responsibilities: |
|
Definition
Foreign Disclosure Office (FDO)
Military information is a national security asset which must be conserved and protected. |
|
|
Term
| What is the purpose of the Defense Courier Service? |
|
Definition
| secure transmission of qualified classified documents and materials. |
|
|
Term
| Describe the procedures for preparing hard copy classified material for transportation via DCS: |
|
Definition
Shall not weigh over 300 pounds
Items shall be addressed with the standardized DCS two-line address
Security classification markings, special security caveats, and other extraneous markings must not appear on the outer wrapper.
U.S. Postal Service bags, pouches, or sacks shall not be used for DCS material. |
|
|
Term
| Who can serve as the TSCO? |
|
Definition
|
|
Term
| State the THREATCON recognition and discuss what each represents. |
|
Definition
Normal - No known threat indicated.
Alpha - A general threat is possible
Bravo - An increased and more predictable threat
Charlie - An incident has occurred or intelligence has been received indicating that some form of terrorist action is imminent.
Delta - A terrorist attack has occurred or that intelligence indicates that a terrorist action against a specific location is likely |
|
|
Term
State the Force Protection Levels and discuss what each represents.
|
|
Definition
Normal - a general global threat is possible
Alpha - increased general threat
Bravo - increased or predictable threat
Charlie- incident occurs or intelligence is received
Delta - Immediate area where a terrorist attack has occurred. |
|
|
Term
|
Definition
| Random Anti-Terrorism Measure - to maximize the effectiveness and deterrence value. |
|
|
Term
| Explain and state the purpose of an EAP. |
|
Definition
| Every command that holds classified COMSEC or CCI material must prepare and maintain a current, written emergency action plan for natural disasters. |
|
|
Term
| What are the 3 categories of COMSEC material that may require destruction in hostile emergencies? |
|
Definition
| COMSEC keying material, COMSEC-related material (maintenance manuals, operating instructions), and equipment |
|
|
Term
| What are the Emergency Destruction Lists called and what do they include? |
|
Definition
Precautionary Destruction (Priority List A & B) - destroy keying material and non-essential manuals
Complete Destruction Priority List (C) - assign different persons to destroy the material in each category by means of separate destruction facilities and follow the priorities. |
|
|
Term
| Explain how, and in what order, material is destroyed during Emergency Destruction. |
|
Definition
Emergency Destruction Priorities:
(1) Superseded keying material and secondary variables.
(a) Top Secret primary keying material.
(b) Secret, Confidential, and Unclas primary keying material
(2) Future (reserve on board) keying material for use one or two months in the future.
(3) Non-essential classified manuals:
(a) Maintenance manuals.
(b) Operating manuals.
(c) Administrative manuals. |
|
|
Term
|
Definition
| Sensitive Compartmented Information - classified information concerning or derived from intelligence sources, methods, or analytical processes, which is required to be handled within formal access control systems established by the Director of Central Intelligence. |
|
|
Term
List the items prohibited in a SCIF and the security risks associated with them.
|
|
Definition
| Cell phones, camera, removable HDD, USB, etc., 2 way radio, IPOD, Playstation, gameboy, PDA, Personal Electronic Devices |
|
|
Term
| Define the difference between a security violation and a practice dangerous to security. |
|
Definition
Security violation is a compromise of classified info to persons not authorized to receive it or a serious failure to comply with the provisions of security regulations.
PDS is a failure to comply with the provisions of security regulations. |
|
|
Term
| Explain vault re-certification and recurring inspections. |
|
Definition
By a person specifically trained and authorized by the GSA before it can be used to protect classified material.
Vault doors must have a GSA label affixed on the outside of the door. |
|
|
Term
| Explain the DoD escort policy. |
|
Definition
If you are an escort you are required to stay with that individual or group you are escorting until they leave.
The movement of all visitors shall be controlled to ensure that access to classified information is deliberate.
As a matter of convenience and courtesy, flag officers are not required to sign visitor records. |
|
|
Term
| Discuss the procedures for sanitizing an area |
|
Definition
| The removal of information from the media or equipment such that data recovery using any known technique or analysis is prevented. |
|
|
Term
|
Definition
| Communications Security - protective measures taken to deny unauthorized persons information derived from telecommunications of the U.S. Govt. concerning national security. (cryptosecurity, emission security, transmission security, & physical) |
|
|
Term
|
Definition
| Information Security is the protection of information and information systems against unauthorized access or modification. |
|
|
Term
|
Definition
| Computer Security are measures and controls that ensure confidentiality, integrity, and availability of the information processed and stored by a computer. |
|
|
Term
|
Definition
| Personnel Security Program is to authorize initial and continued access to classified information and/or initial and continued assignment to sensitive duties |
|
|
Term
| State the purpose of the ICD system |
|
Definition
| Intelligence Community Directives and subsidiary issuances shall serve as the principal means by which the Director of National Intelligence (DNI) provides guidance, policy, and direction to the Intelligence Community. |
|
|
Term
|
Definition
| Special Security Officer is responsible for implementing SCI security policy and procedures and performs management and oversight of the Department's SCI security program. |
|
|
Term
| What is the responsibilities of the SSO. |
|
Definition
| serves as the focal point for the receipt, control, and accountability of SCI and oversees SCI security functions for subordinate SCIFS. Must be a commissioned officer, warrant officer, or GS-9 or above |
|
|
Term
| Identify who can be a CSM |
|
Definition
| The Security Manager can be an Officer or GS-11 or above with sufficient authority and staff to manage the program for the command. |
|
|
Term
| What is the prime responsibility of the CSM? |
|
Definition
| for implementing the ISP and shall have direct access to the commanding officer. |
|
|
Term
| What does JPAS stand for? |
|
Definition
| Joint personnel adjudication system |
|
|
Term
| Discuss how long a Commanding Officer can administratively suspend access before DONCAF revokes a clearance. |
|
Definition
| Will determine immediately and suspend of SCI access for 90 days. |
|
|
Term
| State the levels of INFOCON and what each signifies. |
|
Definition
INFOCON 5 - no apparent hostile activity against cpu networks.
INFOCON 4 - an increased risk of attack.
INFOCON 3 - when a risk has been identified.
INFOCON 2 - when an attack has taken place but the Computer Network Defense
INFOCON 1 - when attacks are taking place and the Computer Network Defense is at max alertness. |
|
|
Term
| Discuss the security rules and procedures for magnetic and electronic media. |
|
Definition
| Data is stored and which normally is removable from the system by the user or operator. All such devices bearing classified information must be conspicuously marked with the highest level of classification. |
|
|
Term
|
Definition
| Designated Approving Authority - the official with the authority to formally assume responsibility for operating a system (or network) at an acceptable level of risk |
|
|
Term
|
Definition
| Process that provides risk identification, analysis, mitigation planning, mitigation plan implementation, and tracking to ensure identification and handling of risks. |
|
|
Term
| Define the 5 attributes of IA: |
|
Definition
Confidentiality
Integrity
Availability
Non-repudiation
Authentication
|
|
|
Term
| List and define 9 categories of computer incidents: |
|
Definition
1 Root Level Intrusion (Incident)
2 User Level Intrusion (Incident)
4 Denial of Service (Incident)
7 Malicious Logic (Incident)
3 Unsuccessful Activity Attempt (Event)
5 Non-Compliance Activity (Event)
6 Reconnaissance (Event)
8 Investigating (Event)
9 Explained Anomaly (Event) |
|
|
Term
| Define vulnerability assessment |
|
Definition
| An examination of the ability of a system or application including current security procedures and controls, to withstand assault. |
|
|
Term
| Explain the difference between vulnerability and threat. |
|
Definition
Vulnerability - refers to a weakness in a system's security scheme.
Threat - Circumstances, events, or people with the potential to cause harm to a system. |
|
|
Term
State the duties and responsibilities of the IAM:
|
|
Definition
| Information Assurance Manager is responsible for the information assurance program within a command, site, system, or enclave. |
|
|
Term
Define the following devices and their uses:
Host/Client
Application Server
Hub
Switch
Router
WAP |
|
Definition
Allows for multiple clients to connect and share resources.
Dedicated to run specific applications for individual clients.
Is a device for connecting multiple devices together and making them act as a single network.
Is a computer networking device that connects network segments.
Is a device that interconnects two or more computer networks and interchanges packets between them.
Is an open international standard for application-layer network comms (wireless) |
|
|
Term
Define the following devices and their uses:
Proxy Server
Firewall
VPN Concentrator
Back-up
Repeater |
|
Definition
Is a server that acts as an intermediary for requests from clients seeking resources from other servers.
To permit or deny computer applications/services based upon a set of rules.
Device that provides cost savings (remote-access)
Network resources if network files become corrupt.
Is an electronic device that receives a signal and retransmits it at a higher level. |
|
|
Term
Define the following layers of routing and common devices associated with each:
Access
Distribution
Core |
|
Definition
access routers include SOHO (small office/home office) located at costumer sites.
enforcing quality of service across a WAN.
"collapsed backbone" interconnecting the distribution tier routers from multiple buildings. (high bandwidth) |
|
|
Term
|
Definition
| One of the most common computer network topologies. Consists of one central switch to transmit messages. |
|
|
Term
| What is a bus network topology? |
|
Definition
| A set of clients are connected via a shared communications line. (Simplest way to connect multiple clients) but have problems when 2 clients want to transmit at the same time. |
|
|
Term
| What is a ring network topology? |
|
Definition
| connects to exactly two other nodes, forming a single continuous pathway for signals through each node. |
|
|
Term
| What is a mesh networking topology? |
|
Definition
may act as an independent router, regardless of whether it is connected to another network or not.
(Continuous connections) by hopping from node to node. |
|
|
Term
|
Definition
| Metropolitan Area Network - is a large computer network that usually spans a city or a large campus. (interconnects a # of LANs) |
|
|
Term
|
Definition
| Global Access Network is a telecommunication system that extends mobile voice, data, and IP. Commercial name used by mobile carriers. |
|
|
Term
| Name each layer of the OSI model? |
|
Definition
Application
Presentation
Session
Transport
Network
Data Link
Physical |
|
|
Term
| What layers are in the TCP/IP Model? |
|
Definition
Application
Host-to-Host
Internet
Network Access |
|
|
Term
| State the difference between IPv4 and IPv6? |
|
Definition
IPv4 has 32 bit addresses
IPv6 has 128 bit addresses |
|
|
Term
| What does NIPRNET stand for and what is it used for? |
|
Definition
| Non-classified Internet Protocol Router Network is used to exchange sensitive but unclas info between "internal" users. |
|
|
Term
| What is SIPR stand for and what is it used for? |
|
Definition
| Secret Internet Protocol Router Network is a system of interconnected cpu networks used to transmit classified information. |
|
|
Term
| What is JWICS stand for and what is it used for? |
|
Definition
| Joint Worldwide Intelligence Communications System - interconnected computer networks used by U.S. DoD to transmit classified Top Secret and SCI information. |
|
|
Term
|
Definition
| the global information grid is a globally interconnected, end-to-end set of information for disseminating. |
|
|
Term
|
Definition
| Defense Information System Network is DoD's enterprise network for providing data, video, and voice services. |
|
|
Term
|
Definition
| Navy/Marine Corps Intranet provides IT services to US-CONUS shore based Navy networks. |
|
|
Term
|
Definition
| is a Navy-wide initiative for IT services in the OCONUS Navy locations. |
|
|
Term
|
Definition
| is a GAN, and is managed by 4 fleet NOCs positioned around the world for 24/7 ops. |
|
|
Term
Describe the following:
Machine Language
Assembly Languages
High-level Language
Operating System
Applications |
|
Definition
is a system of instructions
area type of low-level languages for programming cpus.
Is a programming language with strong abstraction from the details of the cpu.
Is a set of system software programs in a cpu.
Are computer softwares to help the user perform specific tasks. |
|
|
Term
Describe the following to include the risks associated:
Virus
Worms
Trojans
Backdoors
Phishing
|
|
Definition
is a cpu program that can copy itself and infect a cpu.
Are self-replicating malware computer programs.
Are malware that appears to perform a desirable function for the user prior to run or install.
Are a method of bypassing normal authentication.
Is a process of attempting to acquire sensitive info. |
|
|
Term
Describe function and risk associated with following activities:
Network enumerating
Buffer overflow
SQL injection
Dictionary attack |
|
Definition
is a computing activity in which user names are retrieved.
is an anomaly where a program overruns the buffer's boundary and overwrites adjacent memory.
is a code injection technique that exploits a security vulnerability.
is a technique for defeating a cipher or authentication by using likely possibilities. |
|
|
Term
Describe function and risk associated with following activities:
Privilege escalation
Brute Force attack
Social engineering
|
|
Definition
is the act of exploiting a bug or design flaw in a software application to gain access.
is a strategy used to break the encryption of data.
is the act of manipulating people into performing actions or divulging confidential information. |
|
|
Term
| Describe the functionality of PKI? |
|
Definition
| Public Key Infrastructure is an arrangement that binds public keys with respective user identities by means of a certificate authority. |
|
|
Term
| State the purpose of DNS. |
|
Definition
| Domain Name System is a hierarchical naming system for cpus, services, or any resource connected to the internet. |
|
|
Term
| Discuss the purpose of a Red Cross message. |
|
Definition
| family members use the emergency communication system to notify service members of an emergency or other important event. |
|
|
Term
|
Definition
| Automated Digital Networking System - is to connect Navy shipboard networks to other ship and shore networks. |
|
|
Term
|
Definition
| Common User Digital Information Exchange Subsystem - provides a 2400 baud full duplex interface, over a satellite link with mobile platforms. |
|
|
Term
|
Definition
| VLF Digital Information Network - Fleet Submarine Broadcast System for worldwide delivery of messages. |
|
|
Term
|
Definition
| Automated Message Store and Forward - to relay messages to other commands outside the immediate area of responsibility. |
|
|
Term
|
Definition
| Integrated Broadcast System - Receives EAMs |
|
|
Term
|
Definition
| International Maritime Satellite - multipurpose commercial SATCOM system providing both simultaneous voice and IP data up to 128kbps. |
|
|
Term
|
Definition
Defense Messaging System employs the messaging and directory services using X.400 and X.500
Navy Regional Enterprise Message System provides web-based messaging capability to send and receive DMS messages.
Automatic Message Handling System provides simplified message drafting and release of outgoing messages. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Defense Connect Online - Instant Messenger |
|
|
Term
| Discuss GINGERBREAD and explain the procedures involved. |
|
Definition
Expected intruder on the net.
Announce GINGERBREAD on the net |
|
|
Term
| Discuss types of disclosures afforded protection by the EEFI list. |
|
Definition
Beadwindow Code:
Position 01
Capabilities 02
Operations 03
Electronic Warfare 04
Personnel 05
COMSEC 06
Wrong Circuit 07 |
|
|
Term
Discuss BEADWINDOW and explain the procedures involved.
What is the proper response? |
|
Definition
is a real-time procedure which brings to the immediate attention of circuit operators the fact that an EFFI disclosure has occurred.
"Roger Out" |
|
|
Term
| Define RIVER CITY and state when it is utilized. |
|
Definition
| An OPSEC tool that limits communications. Provides procedures to control outgoing paths from ships and shore systems. |
|
|
Term
|
Definition
Joint Spectrum Interference Resolution was designed to replace Meaconing, Intrusion, Jamming, and Interference (MIJI).
Meaconing - false navigation
Intrusion - someone pretending to be someone they are not.
Jamming - deliberate radiation for preventing or reducing an enemy's effective use.
Spectrum management - to manage frequencies and to prevent multiple connections. |
|
|
Term
Define and state the purpose of the following:
PLA
DTG
UTC (ZULU) |
|
Definition
Plain Language Address - is the only designator authorized for use in Naval message addressing.
Date-Time-Groups designed to prevent using duplicate DTG's on msgs from the same originator.
Coordinated Universal Time prevents confusion between the different zones and types of time. |
|
|
Term
| List the components of a standard navy message. |
|
Definition
Heading (FL6 FM and FL7 TO)
Message Text (FL12)
Ending (FL15 SSN and FL16 NNNN)
Format Line 11 and 13 are BT
16 Format Lines |
|
|
Term
Define the following message precedence's:
R
P
O
Z
W |
|
Definition
Routine (6 hours)
Priority (3 hours)
Immediate (30 Minutes)
Flash (As fast as possible less than 10 minutes)
Flash Override (3 Minutes) |
|
|
Term
| State the purpose of an OPTASK COMMS. |
|
Definition
a breakdown of circuits to distribute afloat communications plans. (message)
What frequencies to guard and to monitor |
|
|
Term
| State the purpose of a COMMPLAN. |
|
Definition
| Communications Plan is a multi-step process of developing and implementing voice and data comms in support of unit and fleet missions. |
|
|
Term
| State the purpose of a TSO. |
|
Definition
| Telecommunications Service Order - to start, change, or discontinue circuits or trunks and to effect admin changes. |
|
|
Term
State the purpose of a TSR.
Who may issue it? |
|
Definition
Telecommunications Service Requests - telecommunications requirement
By a specifically authorized TCO. |
|
|
Term
| State the purpose of a COMSPOT/Communications service advisory |
|
Definition
Communications Spot - will be reported any time communication outages or degradations are encountered by all ships or shore facilities.
Communications Services Advisory - is only shore facilities.
|
|
|
Term
| If comms cannot be restored in 48 hours, what is submitted? |
|
Definition
|
|
Term
| State the purpose of EKMS. |
|
Definition
Electronic Key Management System.
EKMS-1B prescribes the minimum policies for issuing, accounting, handling, safeguarding, and disposing of COMSEC material. (bible for comsec) |
|
|
Term
| State the purpose of OTAT/OTAR. |
|
Definition
Over-the-Air Key Transfer
Over-the-Air Rekeying |
|
|
Term
|
Definition
| used to analyze and measure unwanted signal leakage do to equipment radiation. |
|
|
Term
| State the purpose of EMCON |
|
Definition
| Emission Control is control of all electromagnetic and acoustic radiations, including communications, radar, EW and sonar. |
|
|
Term
Describe the mission of the following primary warfare areas:
ASW
SUW
IW |
|
Definition
Anti-Submarine Warfare - denying the enemy the effective use of submarines.
Surface Warfare - operations conducted to destroy or neutralize enemy naval surface forces
Information Warfare - to achieve or promote specific objectives over adversaries. |
|
|
Term
Describe the mission of the following primary warfare areas:
AW
STW
NSW |
|
Definition
Air Warfare - defensive measures designed to destroy attacking enemy aircraft.
Strike Warfare - to destroy enemy targets ashore.
Naval Special Warfare - conducts ops in the coastal, riverine, and maritime environments. |
|
|
Term
| Explain how the Reserve Component integrates with the Active Component. |
|
Definition
| Provide trained units and qualified persons available for active duty in the armed forces, in time of war or national emergency. |
|
|
Term
| Explain the purpose of a mobile detachment. |
|
Definition
| Provide direct or indirect support to an operational entity. |
|
|
Term
Discuss the primary services provided by the following deployable METOC teams:
Mine Warfare UUV Platoon
Naval Oceanography ASW Team (NOAT)
Strike Group Oceanography (SGOT)
Mobile Environment Team (MET)
Fleet Survey Team (FST) |
|
Definition
Removes divers and marine mammals from the dangers and extreme hazards.
Provides integral support to ASW.
Provides meteorological and oceanographic support.
Primary users of the Navy's mobile equipment assets.
Performs surveys of various equipment on ships. |
|
|
Term
| Discuss the IO (Information Operations) Core Capabilities: |
|
Definition
-Provide broad strategic concepts
-Provide an orderly schedule of decisions
-achieve unity of effort
-identify any special forces |
|
|
Term
| Define the roles of the U.S. Navy Blue and Red teams. |
|
Definition
Defending an enterprise's use of info systems.
Attacks or exploits against an enterprise's security posture. |
|
|
Term
| Explain the purpose of FES |
|
Definition
| Fleet Electronic Support - installation, removal, maintenance, and repair of Cryptologic Direct Support Element (CDSE) electronic equipment. |
|
|
Term
Explain the difference between the following documents:
USC Title 10
USC Title 50 |
|
Definition
Outlines the role of armed forces in the United States code.
Outlines the role of war and National Defense. |
|
|
Term
|
Definition
| Critical Intelligence Communication |
|
|
Term
State the purpose of the following:
CCOP
NITES
JDISS |
|
Definition
Cryptologic Carry-On Program provides exploitation capability by augmenting existing Ships Signal Exploitation Space (SSES).
Navy Integrated Tactical Environmental Subsystem is the portable tactical environment support system.
Joint Deployable Intelligence Support System allow connectivity and interoperability with intelligence systems supporting forces.
|
|
|
Term
| Discuss Maritime Domain Awareness (MDA) |
|
Definition
effective understanding of anything associated with the maritime domain that could impact the security, safety, etc.
|
|
|
Term
| State the purpose of a MOC |
|
Definition
| Maritime Operations Center - the nexus of joint and navy transformation initiatives |
|
|
Term
|
Definition
| Systematic proven process that identifies, controls, and protects generally sensitive but classified information about a mission. |
|
|
Term
| Discuss the five step planning process regarding OPSEC. |
|
Definition
Step 1: Identify critical information
Step 2: Threat Assessment
Step 3: Vulnerability Analysis
Step 4: Risk Assessment
Step 5: Measures/countermeasures |
|
|
Term
| Discuss the responsibilities of the command OPSEC Officer |
|
Definition
| for administering the OPSEC Program. |
|
|
Term
| Describe the OPSEC considerations regarding public affairs |
|
Definition
| they should coordinate the release of data to the public. |
|
|
Term
|
Definition
| Web Risk Assessment - scan a website to determine if there are any OPSEC related vulnerabilities. |
|
|
Term
|
Definition
| Essential Elements of Friendly Information - key information adversaries likely will inquire about regarding our intentions in order to obtain answers critical to their own operational effectiveness. |
|
|
Term
|
Definition
| Critical Information - is information about friendly activities and adversary seeks in order to gain a military advantage. |
|
|
Term
| Define the components and functions of the command OPSEC Program. |
|
Definition
Appoint an OPSEC program manager.
Utilize Naval OPSEC Support Team (NOST)
Local Opsec guidance
Annual review |
|
|
Term
| Describe the 3 categories of Intelligence. |
|
Definition
Strategic (National)
Operational (Joint)
Tactical (Commanders) |
|
|
Term
| Explain Intelligence Oversight and state the publications that govern it. |
|
Definition
Act of 1980 requires U.S. Government agencies to report covert actions to the house permanent.
Pubs:
Executive Order 12333
Public Law No. 95-511
Executive Order 12334 |
|
|
Term
| Define intelligence preparation of the battlespace environment. |
|
Definition
| Systematic and continuous analysis of the adversary, terrain, and weather in the assigned battlespace. |
|
|
Term
| Explain ISR mission requirements and fundamentals. |
|
Definition
| Intelligence surveillance reconnaissance - to effectively engage the enemy. |
|
|
Term
Describe the following:
HUMINT
OSINT
MASINT
SIGINT
COMINT
FISINT
ELINT
IMINT |
|
Definition
Human Intelligence
Open Source Intelligence
Measurement and Signature Intelligence
Signals Intelligence
Communication Intelligence
Foreign Instrumentation Signals Intelligence
Electronic Intelligence
Imagery Intelligence |
|
|
Term
Explain the mission of NMCI Service Desk. |
|
Definition
To provide support to more than 700,000 Sailors, Marines, and civilians to include end-user’s PCs, laptops, mobile wireless solutions for the security and support their missions require. |
|
|
Term
What is the geographic location ofeach Network Operations center? |
|
Definition
Quantico, VA; San Diego, Ca; Norfolk, VA; Pearl Harbor, HI |
|
|
Term
|
Definition
- (Active Directory Account Edit Operations) - Serves as an Active Directory look up for customers and provides account support. Used as a base for all agent tools. |
|
|
Term
|
Definition
| Used to create tickets and track existing tickets |
|
|
Term
|
Definition
| (Service Manager 7) – HP Software program replacing quickway and remedy, and is used to create and track existing tickets. |
|
|
Term
|
Definition
Used in conjunction with Remedy to work on new and existing tickets |
|
|
Term
|
Definition
Software tool used to free customer’s disk space and allow a higher system performance. |
|
|
Term
|
Definition
Active Directory Users and Computers) - Used to look up customers and provide account support when ADAEO is not available. |
|
|
Term
|
Definition
(Radia Four AService Tool) - Shows successful and unsuccessful HP Radia installed applications on a remote target computer. It is also used to verify associated and non-associated software on the target computer. |
|
|
Term
|
Definition
Used to remote into the foreground of the customer’s machine to assist with troubleshooting |
|
|
Term
| Describe the purpose of CLIN 23 items |
|
Definition
| Provides commercial off the shelf (COTS) software and hardware peripherals associated with data, voice, and video. |
|
|
Term
| What does P.A.R. stand for? |
|
Definition
|
|
Term
| What does A.H.T. stand for? |
|
Definition
|
|
Term
| What programs areused to generate Trouble Tickets? |
|
Definition
|
|
Term
| What reports are due each week to WFM? |
|
Definition
| MILDET Service Desk Assignments |
|
|
Term
Discuss proper escalation procedures. |
|
Definition
-Identify symptom
-Determine escalation path to RDM, ESD, or FS
-Fill out proper checklist
-Inform T2 to view and give permission to escalate
-Escalate ticket |
|
|
Term
Discuss call flow to create a ticket in Quickway or SM7. |
|
Definition
A) Greet the customer
B) Verify Classification
C) Verify if ticket is new or existing
D) Ask customer how you may assist
E) Restate customer issue
F) Map Call
G) Verify contact information
H) Verify NMCI Asset
I) Provide ticket number
J) Troubleshoot
K) Verify issue is resolved or give proper escalation information
L) Ask if there is any other assistance needed.
M) Thank customer |
|
|
Term
| What is the minimum QA score needed to transfer from the Service Desk? |
|
Definition
|
|
Term
| Discuss the different types of Data Seats. |
|
Definition
NIPR, SIPR, S&T, NNPI, Mission Critical |
|
|
Term
| What is the minimum time required at the Service Desk? |
|
Definition
|
|
Term
| Explain the purpose of a MAC ticket. |
|
Definition
| Move, Add, Change ticket – used to create, delete, or make changes to a customer’s profile or a target machine |
|
|
Term
| Define each band of the electromagnetic spectrum. |
|
Definition
•30 GHZ - 300 GHZ extremely high frequency
•3 GHZ - 30 GHZ superhigh frequency
•300 MHZ - 3 GHZ ultrahigh frequency
•30 MHZ - 300 MHZ very high frequency
•3 MHZ - 30 MHZ high frequency
•300 KHZ - 3 MHZ medium frequency
•30 KHZ - 300 KHZ low frequency
•3 KHZ - 30 KHZ very low frequency
•300 HZ - 3 KHZ voice frequency
•Up to 300 HZ extremely low frequency |
|
|
Term
Define the communication capabilities of transmissions in each of the bands below:
ELF
SLF
ULF
VLF
LF |
|
Definition
One-way sub comms.
Provide comm services for subs
Used for comms in mines
highly reliable path for comms in northern latitudes where atmospheric disturbances that make high-freq circuits unreliable.
has been used for comms since the advent of radio. |
|
|
Term
Describe the communication capabilities of transmissions in each of the bands below:
MF
HF
VHF
UHF LOS
UHF SAT
SHF
EHF |
|
Definition
Includes international distress frequencies and is used for search and rescue ashore.
Around since WWI.
Ideal for ship to shore ex. beach landings.
Tactical Voice. ex. Moving ships into formation.
Tactical Voice/Data
Radar and Satellite Communications
Satellite Communications
|
|
|
Term
|
Definition
| Cyclical processes, number of cycles per unit time. |
|
|
Term
|
Definition
| is the distance in space occupied by one cycle of a radio wave at any given instant. |
|
|
Term
|
Definition
| Trapping of an RF wave between two layers of the earth's atmosphere |
|
|
Term
|
Definition
| is a process where multiple analog message signals or digital data streams are combined into one signal over a shared medium. |
|
|
Term
|
Definition
| the ability to impress intelligence upon a transmission medium, such as radio waves. |
|
|
Term
|
Definition
| The removal of intelligence from a transmission medium |
|
|
Term
|
Definition
| The difference between the highest usable frequency of a device and the lowest usable frequency of the device. |
|
|
Term
|
Definition
| inserting noise or data onto a frequency. |
|
|
Term
Discuss the following terms and give a description of what each means in relation to the atmosphere:
Layers
Frequency
Radio Waves |
|
Definition
The ionosphere is composed of 3 layers designated D,E, and F, from the lowest level to the highest level.
The higher the frequency of a radio wave, the lower the rate of refraction by an ionized layer. |
|
|
Term
Discuss the following terms and give a description of what each means in relation to the atmosphere:
Radio Waves
Propagation
Azimuth Angle
|
|
Definition
there are 2 principal ways in which electromagnetic (radio) energy travels from a transmitting antenna to a receiving antenna: ground and sky waves.
Within the atmosphere, radio waves can be reflected, refracted, and diffracted like light and heat waves. |
|
|
Term
Discuss the following terms and give a description of what each means in relation to the atmosphere:
Azimuth Angle
Elevation Angle
|
|
Definition
The angle measured clockwise from true north in the horizontal plane.
The angle between the horizontal plane and the Line of Sight. |
|
|
Term
Describe the following modulation types and their common usage:
USB/LSB
Continuous Wave |
|
Definition
Upper Sideband - all of the sum frequencies above the carrier are spoken of collectively.
Lower Sideband - all the difference of frequencies below the carrier.
CW - The "on-off" keying, when a carrier either was present or absent. |
|
|
Term
Describe the following modulation types and their common usage:
AM
FM |
|
Definition
Amplitude Modulation is a technique used in electronic communication, most commonly for transmitting information via a radio carrier wave.
Frequency Modulation conveys information over a carrier wave by varying its frequency. |
|
|
Term
Define the following terms as they apply to RADAR:
PRI
PRF
RF |
|
Definition
Pulse Repetition Interval is the elapsed time from the beginning of one pulse to the beginning of the next pulse.
Pulse repetition frequency is the number of pulses per time unit.
Radio Frequency. Freq at which radar operates. |
|
|
Term
Define the following terms as they apply to RADAR:
BW
CW |
|
Definition
Bandwidth is the difference between the upper and lower cut-off frequencies of a radar receiver (measured in hertz)
Continuous-wave radar; non-pulsing. Sending out a very pure signal of a known freq. (Determines velocity, can't determine range) |
|
|
Term
Define the following terms as they apply to RADAR:
PW
Scan Rate |
|
Definition
Pulse Width has units of time and is commonly expressed in ms. (duration of the pulse)
When a radar is scanning, a sufficient number of pulses will be transmitted in any particular direction in order to guarantee reliable detection. |
|
|
Term
Define the following terms as they apply to RADAR:
Bearing
Azimuth
Elevation |
|
Definition
Bearing may be reference to true north or to own ship.
Angular measurement in the horizontal plane in a clockwise direction.
Is the angle between the horizontal plane and the line of sight, measured in the vertical plane. |
|
|
Term
Identify the following types of RADAR, their functions, and give examples of each:
Air Search
Surface Search
Fire Control |
|
Definition
Initially detect and determine the position, course, and speed of air targets.
The detection and determination of accurate ranges and bearings of surface objects and low-flying aircraft. (360 degree search pattern for LOS objects)
To provide target azimuth, elevation, range, and velocity to calculate fire solution. |
|
|
Term
| Explain the difference between OPELINT and TECHELINT. |
|
Definition
Is concerned with operationally relevant information such as the location, movement, employment, tactics, and activity of foreign non-comms emitters.
Is concerned with the technical aspects of foreign non-comms emitters such as signal characteristics, modes, functions, etc. |
|
|
Term
Discuss the various types of METOC products available through the Navy Oceanography portal (NOP):
USNO
JTWC
NOOC
FNMOC |
|
Definition
U.S. Naval Observatory provides a wide range of astronomical data and products and serves as the official source of time.
Joint Typhoon Warning Center is the DOD agency responsible for issuing tropical cyclone warnings for the Pacific/Indian Oceans.
|
|
|
Term
Discuss the various types of METOC products available through the Navy Oceanography portal (NOP):
NOOC
FNMOC
|
|
Definition
Naval Oceanography Operations Command advises Navy operations on the impact of ocean and atmospheric conditions.
Fleet Numerical Meteorology and Oceanography Center provides the highest quality, most relevant and timely worldwide meteorology and oceanography support. |
|
|
Term
Discuss the various types of METOC products available through the Navy Oceanography portal (NOP):
NAVO |
|
Definition
| Naval Oceanographic Office maximizes sea power by applying relevant oceanographic knowledge in support of National Security. |
|
|
Term
Discuss the capabilities of the following environmental satellites.
GOES
POES
DMSP |
|
Definition
Geostationary Environmental Satellites - the backbone to short term forecasting.
Polar Operational Environmental Satellite are able to collect global data on a daily basis for a variety of land, ocean, and atmosphere apps
Defense Meteorological Satellite Program see's clouds, snow, and fire in the visual and infrared spectra. |
|
|
Term
Discuss the capabilities of the following environmental satellites:
NPOESS
TRIMM |
|
Definition
National Polar-orbiting Operational Environmental Satellite System provides global coverage by circling the earth ever 100 minutes monitoring environmental conditions.
Tropical Rainfall Measuring Mission - is a research satellite designed to help understand the water cycle of the atmosphere. |
|
|
Term
Discuss the following meteorological terms and elements:
Wind direction/speed
Temperature: Ambient air, wind chill, heat stress |
|
Definition
An indicator of where the wind is coming from. Wind speed is the measured motion of air with respect to the surface of the earth.
The temperature of the surrounding air.
The apparent temperature felt on exposed skid due to wind.
A variety of problems associated with very warm temps and high humidity.
|
|
|
Term
Discuss the following meteorological terms and elements:
Precipitation
Relative humidity |
|
Definition
Any product of the condensation of atmospheric water vapor that is pulled down by gravity onto the earth's surface.
The ratio of the amount of water vapor present in the air compared to the greatest amount possible at the same temperature. |
|
|
Term
Discuss the following meteorological terms and elements:
Sky condition
Atmospheric pressure
Air Mass |
|
Definition
The state of the sky when it is covered by clouds.
The pressure exerted by the atmosphere at a given point.
A large volume of air defined by its temperature and water vapor content. |
|
|
Term
Discuss the following meteorological terms and elements:
Cold/warm/occluded front |
|
Definition
The leading edge of a cooler mass of air, replacing a warmer mass of air.
When this occurs, the warm air is separated (occluded) from the low pressure center at the Earth's surface.
Is formed when a cold front overtakes a warm front. |
|
|
Term
Discuss the following meteorological terms and elements:
Tropical depression
Tropical Storm
Hurricane/typhoon |
|
Definition
A closed circulation of low atmospheric pressure which blows counter-clockwise at 34 knots or less.
"..." 34-63 knots.
"..." (strong winds and heavy rain) Greater than 64 knots. |
|
|
Term
| What are the two different types of ocean eddies? What are the differences? |
|
Definition
Cold and Warm.
Cold water breaks off from a cold current and travels counter-clockwise into warmer ocean waters.
Warm water breaks off from a warm current and travels clockwise into colder ocean waters. |
|
|
Term
| What is the measurement and recording of subsurface water temperature at various depths? |
|
Definition
| bathythermograph observation |
|
|
Term
| What is the difference between ebb and flood tide? |
|
Definition
Ebb current that flows away from the shore.
Flood current that flows toward the shore. |
|
|
Term
| What is a littoral current and a rip current? |
|
Definition
A littoral current produced by the transport of the water caused by the breaking action of the waves.
A rip current is formed when opposing offshore currents bend sections of a littoral current seaward, creating rip currents. |
|
|
Term
| What are three different types of breakers? |
|
Definition
Spilling occurs with gentle and flat beach slopes.
Plunging occurs with a moderate to steep beach slope.
Surging is normally seen only with a very steep beach slope. |
|
|
Term
| What are narrow areas separating large differences in water temperature, salinity, density, and velocity? |
|
Definition
|
|
Term
| Discuss basic relationship of METOC to Geospatial Intel. |
|
Definition
| METOC is considered an intelligence layer of the GEOINT information base. |
|
|
Term
| Name the 3 types of winds and how many knots are each type. |
|
Definition
Small Craft 33 knots or less
Gale 34 to 47 knots
Storm 48 knots or greater |
|
|
Term
| When is it considered a severe thunderstorm? |
|
Definition
| With wind gusts 50 knots or greater and/or hail of 3/4 inch diameter or greater |
|
|
Term
| When is it considered a hurricane/typhoon? |
|
Definition
| Warning for land, harbor, inland water, and ocean areas for winds 64 knots or greater. |
|
|
Term
Discuss the following Tropical Cyclone Conditions of Readiness and who sets them:
COR 5
COR 4
COR 3
COR 2
COR 1 |
|
Definition
COR 5: Possible threat of destructive winds (96 hours)
COR 4: "..." (72 hours)
COR 3: Destructive winds of the force (48 hours)
COR 2: "..." (24 hours)
COR 1: "..." (12 hours) |
|
|
Term
| What are the 4 space mission areas? |
|
Definition
Space Force Enhancement
Space Support
Space Control
Space Force Application |
|
|
Term
|
Definition
| Is electrically charged particles that stream continuously from the Sun. |
|
|
Term
| Name 3 of the 5 types of orbits and their distances from the Earth's surface? |
|
Definition
Low Earth Orbit (approx. 100 and 420 miles)
Medium Earth Orbit (approx. 450 and 10,000)
Highly Elliptical Orbit (Molniya orbit) has an apogee nearly equivalent to the geosynchronous altitude and an inclination of approx. 63 degrees to 64 degrees. |
|
|
Term
| What satellite would have a period approximately equal to one day? Approximately how far is it from the Earth? |
|
Definition
Geosynchronous orbit
19,300 nautical miles |
|
|
Term
| What orbit has an inclination of 90 degrees? |
|
Definition
|
|
Term
|
Definition
| There are 2 Polar Orbiting Environmental Satellites (north and south orbit) |
|
|
Term
Define the following:
Apogee
Perigee |
|
Definition
Apogee is a point on the orbit farthest from the center of the Earth (away)
Perigee is the point closest to the center of the Earth will be halfway around the orbit. (close) |
|
|
Term
| How many space shuttle launching sites are there and where are they located? |
|
Definition
| 3: Kennedy Space Center Cape Canaveral, Wallops Island, Va, Vanderberg AFB, Ca |
|
|
Term
|
Definition
| Defense Satellite Communications System is a high capacity, SHF satellite based subsystem that provides jam-resistant comms. |
|
|
Term
| What satellite provides high-volume data and video information products to military tactical terminals? |
|
Definition
| Global Broadcast Service (GBS) |
|
|
Term
| What is the DoD's most capable and powerful communication satellite? |
|
Definition
|
|
Term
| Describe a Global Positioning System. |
|
Definition
| A satellite-based radio navigation system operated by DoD to provide all military, civil, and commercial users w/ precise positioning, navigation, and timing. |
|
|
Term
| Describe the advantages and disadvantages of Space-based Intelligence, Surveillance and Reconnaissance. (ISR) |
|
Definition
The prime advantage of space-based ISR capabilities is their potential to provide systematic and focused coverage of areas of interest.
In addition to the access limitations and a predictable overflight schedule dictated by the satellite orbit, satellite systems can be affected by weather: fog, smoke, etc. |
|
|
Term
| Discuss Space Situational Awareness. |
|
Definition
| The requisite current and predictive knowledge of the space environment and the operational environment upon which space operations depend. |
|
|
Term
| What is a branch of astronomy that deals with measurements of celestial bodies? |
|
Definition
|
|
Term
| What is the direction in space of axes which have been defined on the Earth? |
|
Definition
| Earth Orientation Parameters |
|
|
Term
| What is closely related to positioning but can be distinguished from it by a greater emphasis on determining a meaningful location? |
|
Definition
|
|
Term
| What is a system of distributed network time servers that provide an accurate and reliable time synchronization service for computers? |
|
Definition
| Computer network time synchronization |
|
|
Term
|
Definition
| Is a point-to-point connection between the ship and the Fleet Message Center. |
|
|
Term
| Explain why all units commshifting to FSM need a legacy route. |
|
Definition
| All units using FSM must have a legacy route in order to provide a means for Top Secret traffic. FSM is only classified to Secret. |
|
|
Term
| State the purpose of MMS. |
|
Definition
Multi-Level Mail Server.
Store & fwd message system.
Accessed via phone (STE to SECTERA), encrypted up to Top Secret. |
|
|
Term
|
Definition
| Master Update Authority is to process all routing changes and collective changes for all armed forces. Located in NCTAMS PAC and LANT. |
|
|
Term
| What is a premise router? |
|
Definition
| connect point for each noc to the DISN network |
|
|
Term
| What is the difference between an ISSR and an OSSR? |
|
Definition
| ISSR is the security filtering for inside the firewalls and OSSR is the security filtering for outside the firewalls |
|
|
Term
|
Definition
| Scans inbound and outbound emails and attachments viruses. |
|
|
Term
| What is a DNSMail Server? |
|
Definition
| DNS and Email (SMTP) store and forward services |
|
|
Term
|
Definition
| A cpu that manages the comms between client devices and printers. |
|
|
Term
|
Definition
| A cpu attached to a network that has the primary purpose of providing a location for the shared storage of cpu files. |
|
|
Term
|
Definition
| A cpu that stores and transfers e-mail from one cpu to another. |
|
|
Term
|
Definition
| Performs translation of humanly recognizable domain names and host names into the corresponding IP address. |
|
|
Term
|
Definition
| A cpu that delivers content using HTTP over the world wide web. |
|
|
Term
| Define and state the purpose of VLAN |
|
Definition
| Virtual Local area network a software concept that extends beyond single traditional law to a group of LAN segments. |
|
|
Term
|
Definition
| Redundant array of independant disks - a way of storing the same data of storing the same data in different places (thus redundantly) on multiple hard disk. |
|
|
Term
|
Definition
| modulator-demodulator. Typically used to send digital data over a phone line. |
|
|
Term
|
Definition
| A web interface of outlook web application that resembles microsoft outlook. (access email) |
|
|
Term
Discuss the following IT21 FLTNOCs multi-layered support concepts:
Tier One
Tier Two
Tier Three
Tier Four |
|
Definition
Provide 24/7 troubleshooting ship to shore and primary resource for IT-21 FLTNOC.
Sysadmins are responsible for providing the highest state operational readiness.
Provide specialized system technical support by fleet systems engineering team.
SPAWARSYSCEN Charleston acts as the primary engineering activity for IT-21. |
|
|
Term
|
Definition
| Consolidate Afloat Network And Enterprise Services |
|
|
Term
|
Definition
| To test whether a particular host is reachable across an IP. |
|
|
Term
|
Definition
| To show the route taken by packets across an IP network. |
|
|
Term
|
Definition
| Is a device that interconnects 2 or more cpu networks and selectively interchanges packets of data between them. |
|
|
Term
| State the purpose of the EKMS Manager? |
|
Definition
| Is the CO's primary advisor on matters concerning security and handling of COMSEC material. |
|
|
Term
| How often is a CO required to conduct a CMS inspection? |
|
Definition
|
|
Term
| How often is CMS Advise and Assist visits? |
|
Definition
|
|
Term
| How often is ISIC COMSEC inspections are required? |
|
Definition
| Must conduct unannounced EKMS inspections of their subordinate commands and units every 24 months. |
|
|
Term
| What are the 3 different types of COMSEC incidents? |
|
Definition
| Crypto, personnel, and physical |
|
|
Term
| What is the difference between Reportable and Non-reportable PDS? |
|
Definition
| Reportable PDS is premature or out-of-sequence use of keying material before its effective date. Non-reportable PDS is improperly completed accounting reports. |
|
|
Term
| What are the TPI requirements? |
|
Definition
| Two Person Integrity is required for handling, signing, inventory, and destruction for all keying materials. |
|
|
Term
| What are the procedures for correcting spillage? |
|
Definition
| The usetr shall disconnect the affected media from the network and then notify the organization. |
|
|
Term
|
Definition
| Classified information being transmitted on an unclassified network or system. |
|
|
Term
State the sites that have a FMX/DUSC system.
Which one is the master and the alternate? |
|
Definition
NCTAMS PAC, Honolulu, HI (MDUSC)
NCTAMS LANT, Norfolk, VA (ADUSC) |
|
|
Term
| Define and state the purpose of MCS. |
|
Definition
| The primary purpose of the Regional MCS is to provide PLA-to-Routing Indicator (RI) look up assignment. |
|
|
Term
| State the world-wide MCS RI |
|
Definition
| Each invalid PLA will receive a RI of RUBDPLA side routed on the original message. |
|
|
Term
|
Definition
| Routing Indicator is a code identifying the station or system; Address |
|
|
Term
|
Definition
| Originating station routing indicator - service messages are addressed by the telecommunications facility to the serving Nova. |
|
|
Term
|
Definition
| Destination Routing Indicator - consists of a six or seven character code identifying the station or system the message will be delivered to upon receipt by Autodin. |
|
|
Term
|
Definition
| Navy Automatic Relay Controller is the first four letters of the routing indicator of the Fleet NARC assigned to the servicing NCTAMS/NAVCOMTELSTA system |
|
|
Term
| State the RI that MCS will assign to an invalid PLA within a xmitted message. |
|
Definition
| Each invalid PLA will receive a RI of RUBDPLA side routed on the original message. |
|
|
Term
Define the following common OPSIGS:
ZBZ
ZUJ
ZEV
ZUG
ZES |
|
Definition
ZBZ: What is the printing acceptability of my signals
ZUJ: Stand by
ZEV: Message is ackowledged
ZUG: Negative
ZUE: Affirmative
ZES: Your message..has been received |
|
|
Term
| List the sites that have CUDIXS suites and their capabilities. |
|
Definition
NCTAMS PAC
NCTAMS LANT
NCTS Guam
NCTS Naples
Each site has at least 3 CUDIXS suites and operate two full and one "mini" config. |
|
|
Term
| Explain whether each master can radiate each other's CUDIXS and their limitations. |
|
Definition
Due to the geo-synchronous orbit, the satellite has a unique footprint that can only be accessed by those under that footprint. 4 major satellite footprints:
LANT Accessed by LANT & NAPLES
CONUS Accessed by LANT & PAC
PAC Accessed by PAC & Guam
I/O Accessed by Guam & Naples |
|
|
Term
| State the purpose of MPS-800. |
|
Definition
| Enables sites on IP, ISDN, and High Speed Serial to participate in meetings with each other. |
|
|
Term
| What are the 3 fleet multi-channel broadcast packages (fleet satellite broadcasts)? |
|
Definition
PMUL: Pacific
LMUL: Lant
IMUL: Indian Ocean |
|
|
Term
| Who administers broadcast? |
|
Definition
| BCA - Broadcast Control Authority |
|
|
Term
|
Definition
| Broadcast Keying Station introduces message into the Fleet Broadcast Network by generating a key stream broadcast bound information. |
|
|
Term
| What are stations that possess a TD-1150 and have connectivity to a particular BKS and BRS? |
|
Definition
| BCS - Broadcast Controlling Station |
|
|
Term
| What radiates the broadcast signal to the Fleet via Satellite? |
|
Definition
| BRS: Broadcast Radiating Station |
|
|
Term
| What is the function of DISA? |
|
Definition
| Defense Information Systems Agency is to deliver joint and coalition enterprise infrastructure, information sharing services, and command and control that enable joint war fighting. |
|
|
Term
| What is the function of the GNOC? |
|
Definition
| Global Network Operations & Security Center provides situational awareness of the myriad of networks, systems and applications that make up the GIG and protect/defend that grid from potential cyber threats. |
|
|
Term
|
Definition
| Regional Network Operations Security Center monitor and control faults, configuration accounting, performance and security of the NEN elements for which they have operational responsibility. |
|
|
Term
|
Definition
| Theater Network Operations & Security Center is network management and CND of the Army's network in a specific functional theater of operations. |
|
|
Term
|
Definition
| Fleet Network Operations Center provide a regional gateway from the various comms systems supporting ships to the DISN. |
|
|
Term
| What are the 4 Regional FLTNOCs? |
|
Definition
UARNOC - United Atlantic Network Operations Center (NCTAMS LANT)
PRNOC - Pacific Region Network Operations Center (NCTAMS PAC)
ECRNOC - Eastern Central Network Operations Center (NCTS Naples)
IORNOC - Indian Ocean Region Network Operations Center (NCTS Bahrain) |
|
|
Term
| What are the 3 criteria to receive IP services from FLTNOCs? |
|
Definition
Must have a valid IATO or ATO obtained from NETWARCOM DAA
Submit an IP services request message
If service will be provided via satellite communications link |
|
|
Term
|
Definition
| NOC to NOC is FLTNOC interconnectivity and restoral capability should a FLTNOC lose connectivity on their DSN path. |
|
|
Term
| Who is the DON controlling authority for IP assignments? |
|
Definition
| Navy NIC - Navy Network Information Center |
|
|
Term
| What are the IP Service requests for NIPR/SIPR/SI? |
|
Definition
Communications Information Bulletin
GCIB 3A (NIPR/SIPR)
GCIB 20H (SI) |
|
|
Term
| Who is the controlling authority for Navy Firewall Policies? |
|
Definition
| Naval Network Warfare Command (NAVNETWARCOM) |
|
|
Term
| What are the Fleet SINOCs? |
|
Definition
|
|
Term
|
Definition
| Collaboration at Sea is a set of tools that allow replication of information. |
|
|
Term
| Explain the role of Technical Control |
|
Definition
| To ensure reliable communications through all possible combinations of antennas, transmitters, receivers, frequencies, and terminal equipment. |
|
|
Term
|
Definition
| High Speed Global Ring provides an increased transport link between shore facilities. |
|
|
Term
|
Definition
| Marconi TNX-1100 ATM switches interconnecting the HSGR. |
|
|
Term
|
Definition
| Lucent PSAX 2300 ATM switches interconnecting the HSGR. |
|
|
Term
| State how many TNX 1100's make up the HSGR and where they are located. |
|
Definition
5
NCTAMS PAC, LANT, NCTS Bahrain, NCTS San Diego, NCTS Naples |
|
|
Term
|
Definition
| Extremely High Frequency Follow-On-Terminal is the terminal used to configure EHF LDR/MDR services. |
|
|
Term
|
Definition
| Navy Multi-band Terminal is a high data throughout Navy SATCOM program. |
|
|
Term
|
Definition
| Low Data Rate supports 2400 bits per second for information transfer. |
|
|
Term
|
Definition
| Medium Data Rate is an upgrade to Milstar provides 4.8 kilobits to 1.544 megabits per second. |
|
|
Term
|
Definition
| Point-to-Point is usually an ad hoc service between two EHF terminals. |
|
|
Term
State the satellite and channel for the following FSB packages:
LMUL
IMUL
PMUL |
|
Definition
UFO 6 & 7, Channel 1
UFO 10, Channel 1
UFO 8, Channel 1 |
|
|
Term
|
Definition
| EHF Time Division Multiple Access (TDMA) Interface Processor provides an ethernet connection between a ship's ADNS router, MDR, and another ship or shore for IP services. |
|
|
Term
Explain the difference between EC and spot beam and the approximate area covered by each.
EC
Spot Beam |
|
Definition
Earth Coverage: that port of the Earth seen by satellite.
Spot Bream covers 400 nautical mile diameter area at the equator. |
|
|
Term
|
Definition
| Commercial Wideband Satellite Program -provides up to 4 Mbps connectivity for data and voice communications. |
|
|
Term
|
Definition
| Commercial Broadband Satellite Program is a high data commercial throughput Navy SATCOM program. |
|
|
Term
|
Definition
| Wideband Global Satcom will provide DoD wideband communications coverage supporting tactical and fixed users. |
|
|
Term
| State the Land Earth Stations (LES) for CBSP. |
|
Definition
NCTAMS PAC - Paumalu, HI and Brewster, WA
NCTAMS LANT - Holmdel, NJ and Fuchsstadt, GE
|
|
|
Term
| State the ten DSCS teleport/STEP sites. |
|
Definition
PAC AOR: Wahiawa, HI; Camp Roberts, CA; Ft. Buckner, JP
LANT AOR: Northwest, VA; Landstuhl, Germany; Ft Belvoir, VA; Ft Detrick Maryland
IO AOR: Bahrain
MED AOR: Lago Patria, Italy |
|
|
Term
State the 3 INMARSAT earth stations:
|
|
Definition
Laurentides, Canada
Goonhilly, UK
Auckland, NZ |
|
|
Term
|
Definition
| Automated Digital Multiplexing System is a network multiplexer (Timeplex Link/2+) |
|
|
Term
State the bandwidth
DS-0 - 64 Kbps
DS-1 - 1.544 Mbps
T-1 - 1.544 Mbps
E-1 - 2.048 Mbps
DS-3 - 44.736 Mbps
OC-3 - 155.52 Mpbs
OC-192 - 9.953 Gbps
OC-768 - 39.813 Gbps |
|
Definition
|
|
Term
List and explain the 6 INMARSAT configs:
ALFA
BRAVO
CHARLIE
DELTA
ECHO
FOXTROT |
|
Definition
ALFA - 64kbps Voice and Data
BRAVO - 64kbps Voice and Data
CHARLIE - 64kbps Data Only
DELTA - 128kbps Voice and Data
ECHO - 128kbps Voice and Data
FOXTROT - 128kbps Data Only |
|
|
Term
Define and state the purpose of the following VTC mediums:
ISDN
VIXS
DVSG |
|
Definition
ISDN - Integrated Services Digital Network is a circuit-switched telephone network system.
VIXS - Video Information Exchange System provides a secure GENSER SECRET and SCI VTCs.
DVSG - DISN Video Service Global includes UNCLAS, Secret, TS VTC services. |
|
|
Term
|
Definition
| Automated Network Control Center replaces manual patch and test facilities ashore with a fully redundant computer-controlled switching and circuit monitoring system. |
|
|
Term
| State the purpose of iridium phones. |
|
Definition
| Satellite-based commercial communications services providing voice and data communications to users equipped with mobile satellite terminals. |
|
|
Term
| Explain the role and discuss services provided by the JFTOC. |
|
Definition
| Joint Fleet Telecommunications Operations Center. 24-7 One Stop Shop for C5I needs. (C5I=Command, Control, Communications, Computers, Collaboration, Intelligence) |
|
|
Term
| Define the role of NCTS in NETWARCOM. |
|
Definition
| Naval Computer Telecommunications Station are not master stations. They are subordinate to their cooresponding area master station and provide support services in their corresponding local area. |
|
|
Term
| Explain how a unit attains TIP access |
|
Definition
Units must submit a Satellite Access Request
Then, will create an EHF Service Plan
They will also create a TPP |
|
|
Term
Explain SAR/SAA procedures for the following:
EHF
INMARSAT
CBSP
SHF DSCS |
|
Definition
PACOM requires EHF SAR/GAR to be submitted via CARS.
SAR's are submitted IAW G-CIB 9A1 format 15 days prior to access.
SAR's are submitted IAW G-CIB 7E 30 days prior to access.
SAR's are submitted IAW G-CIB 7E 30 days prior to access. |
|
|
Term
|
Definition
| Knowledge Management - comprises a range of strategies and practices used in an organization to identify experiences. |
|
|
Term
| Define and state the purpose of ASI. |
|
Definition
| Authorized Service Interruption is the best possible communications service be provided to users commensurate with available equipment and facilites. |
|
|
Term
|
Definition
| Afloat Electromagnetic Spectrum Operations Program is a surface navy spectrum management software tool. |
|
|
Term
|
Definition
| Communications Control Ship is a designated platform respsonsible for the execution of a strike groups communications. |
|
|
Term
| State the purpose of FCC-100. |
|
Definition
| Multiplexer supports 16 user interfaces. Data for your email and phone lines. |
|
|
Term
| State the purpose and explain the two modes of operation of the AN/WSC-3. |
|
Definition
is the US Navy's standard UHF satellite terminal and LOS transceiver.
Satellite mode of operation - user uplinks/downlinks signal from satellite.
Line of Sight mode of operation is station to station communication via direct RF path. |
|
|
Term
| State the purpose of AN/USC-61C (DMR) |
|
Definition
| Digital Modular Radio system that is based on Wireless information Transfer technology. |
|
|
Term
| Define and explain the concept of DAMA. |
|
Definition
| Demand Assigned Multiple Access (TD-1271) provides time-division multiplexing of several digital data sources over one satellite channel. |
|
|
Term
| Define the following DAMA Operation Modes. |
|
Definition
AC Mode of operation - Auto Dama
DC Mode of operation - Distributed Control |
|
|
Term
|
Definition
| Joint UHF Military Satellite Communications Network Integrated controller is the hardware and software suite used by the NCTAMS-SMC. |
|
|
Term
| Define and state the purpose of SSA |
|
Definition
| Satellite Signal Analyzer monitors satellite receive signals for random noise. |
|
|
Term
|
Definition
| Voice Over Internet Protocol delivery of voice communications and multimedia sessions over IP networks. |
|
|
Term
|
Definition
| Defense Switched Network is an interbase, non-secure or secure C2 telecommunications system that provides end-to-end command use and dedicated telephone service. |
|
|
Term
|
Definition
| Defense Red Switched Network is a global secure voice service that provides to the President, Secretary of Defense, Joint Chiefs of Staff. |
|
|
Term
|
Definition
| Plain Old Telephone Service refers to the standard telephone service that most homes use. |
|
|
Term
|
Definition
| Afloat Personal Telecommunications Program provides personal calling on board U.S. Navy ships using satellite connectivity. |
|
|
Term
|
Definition
| Secure Terminal Equipment provides secure multi-media communications for voice. |
|
|