Term
|
Definition
Operating Target is defined as an estimate of the amount of money that will be required to perform assigned tasks and functions. |
|
|
Term
Identify the directives that govern personnel security |
|
Definition
DoD 5105.21-M-1 SECNAV M-5510-30 DCID 6/4 and 6/9 JOINTDODISS |
|
|
Term
|
Definition
Orange. Classification level applied to information whose unauthorized disclosure could reasonably be expected to cause exceptionally grave damage to the national security. |
|
|
Term
|
Definition
Red. Classification level applied to information whose unauthorized disclosure could reasonably be expected to cause serious damage to the national security |
|
|
Term
|
Definition
Blue. Classification level applied to information whose unauthorized disclosure could reasonably be expected to cause damage to the national security |
|
|
Term
|
Definition
|
|
Term
Identify what a SAER is and its purpose |
|
Definition
Security Access Eligibility Report - Used to identify an incident or any change in eligibility if an employee is still eligible for the security clearance. |
|
|
Term
Identify who has overall authority of, and controls access to, a SCIF. |
|
Definition
SSO – Special Security Officer will be responsible for the operation of the Sensitive Compartmented information Facility |
|
|
Term
|
Definition
Security Container Information |
|
|
Term
|
Definition
Activity Security Checklist |
|
|
Term
|
Definition
Security Container Check Sheet |
|
|
Term
|
Definition
Top Secret Cover Sheet (Orange) |
|
|
Term
|
Definition
|
|
Term
|
Definition
Confidential Cover Sheet (Blue) |
|
|
Term
State when safe combinations should be changed |
|
Definition
When a combination lock is first installed or used Combination has been subjected, or believed to have been subjected to compromise At other times when considered necessary by the CSA |
|
|
Term
What is an FDO and state their responsibilities |
|
Definition
Foreign Disclosure Officer. This individual will process all foreign visit requests to the command |
|
|
Term
State the purpose of the DCS |
|
Definition
Defense Courier Service is used for the transportation of sensitive classified materials which cannot be transported through public or private means |
|
|
Term
|
Definition
describes a situation or no current terrorist activity. The only security forces needed are enough to stop the everyday criminal, most likely civilian police forces |
|
|
Term
|
Definition
describes a situation where there is a small and general terrorist activity that is not predictable. However, agencies will inform personnel that there is a possible threat and standard security procedure review is conducted. |
|
|
Term
|
Definition
describes a situation with somewhat predictable terrorist threat. Security measures taken by agency personnel may affect the activities of local law enforcement and the general public. |
|
|
Term
|
Definition
describes a situation when an instance occurs or when intelligence reports that there is terrorist activity imminent. |
|
|
Term
|
Definition
describes a situation when a terrorist attack is taking place or has just occurred. FPCON DELTA usually occurs only in the areas that are most vulnerable to or have been attacked. |
|
|
Term
Explain and state the purpose of an EAP |
|
Definition
Emergency Action Plan. A plan for destroying classified material, due to its potential effect on national security should holdings fall into hostile hands |
|
|
Term
Explain how, and in what order, material is destroyed during Emergency Destruction. |
|
Definition
Priority One – Top Secret, Priority Two – Secret, Priority Three – Confidential |
|
|
Term
|
Definition
Sensitive Compartmented Information. Information and material that requires special controls for restricted handling |
|
|
Term
Define the difference between a security violation and a practice dangerous to security |
|
Definition
PDS is a practice that if continued, could lead to leaks of sensitive information. Security violations are acts that have violated a security policy and may have already resulted in a leak |
|
|
Term
State the purpose of the ICD system |
|
Definition
Intelligence Community Directive. The Director of National Intelligence (DNI) established Intelligence Community Directives (ICDs) as the principal means by which the DNI provides guidance, policy, and direction to the Intelligence Community. |
|
|
Term
Identify who can be a CSM |
|
Definition
Must be a GS-11 or Officer, be appointed by the CO, and have a SSBI within the last 5 years. |
|
|
Term
State the duties and responsibilities of a CSM |
|
Definition
responsible for the storage and destruction of all classified information as well as establishing the Emergency Action Plan. |
|
|
Term
Explain and state the purpose of JPAS |
|
Definition
Joint Personnel Adjudication System is the Department of Defense(DoD) personnel security migration system |
|
|
Term
|
Definition
measures that protect and defend information and information systems |
|
|
Term
|
Definition
The comprehensive evaluation of the technical and non technical security features of an IS and other safeguards |
|
|
Term
|
Definition
describes the Contractor’s approach to ensuring that the system ( meets the security standards required by the Project. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Identifies, controls, accounts for, and audits all changes to a site or information system during its design, development, and operational lifecycle |
|
|
Term
Discuss security procedures involved when performing cross-domain transfers |
|
Definition
Scan all information storage media and e-mail attachments introduced prior to its use on any SCI system. |
|
|
Term
|
Definition
process that allows IT managers to balance the operational and economic costs of protective measure |
|
|
Term
|
Definition
Confidentiality Integrity Availability Non-repudiation Authentication |
|
|
Term
List and define 9 categories of computer incidents |
|
Definition
Root Level Intrusion User Level Intrusion Unsuccessful Activity Attempted Denial of Service(DOS) Non-Compliance Activity Reconnaissance Malicious Logic Investigating |
|
|
Term
Define vulnerability assessment |
|
Definition
A testing process used to evaluate the network infrastructure, software and users |
|
|
Term
Explain the difference between vulnerability and threat |
|
Definition
Vulnerability: A real weakness in a system or security procedure that could be exploited. Threat: Any circumstance with the potential to adversely impact an through an information system - via unauthorized access, etc. |
|
|
Term
State the duties and responsibilities of the IAM |
|
Definition
responsible for establishing, implementing and maintaining the DoD information system IA program |
|
|
Term
|
Definition
Automated Digital Networking System. The primary function of the ADNS is to connect Navy shipboard networks to other ship and shore networks |
|
|
Term
|
Definition
COMMON USER DIGITAL INFORMATION EXCHANGE SUBSYSTEM |
|
|
Term
|
Definition
broadcast system provides a highly reliable and secure system for worldwide delivery of operational, tactical, and administrative messages from the Fleet Submarine Broadcast System |
|
|
Term
Discuss GINGERBREAD and explain the procedures involved |
|
Definition
A term advising-net participants that there may be a possible intruder on the radio net. |
|
|
Term
Discuss types of disclosures afforded protection by the EEFI list. |
|
Definition
Standardized EEFI are established to identify specific items of information which, if acquired by an adversary, would degrade the security of military operations |
|
|
Term
Discuss BEAD WINDOW and explain the procedures involved |
|
Definition
BEADWINDOW is a real-time procedure which brings to the immediate attention of circuit operators the fact that an EEFI disclosure has (or may have) occurred |
|
|
Term
Define the following message precedences R P O Z W |
|
Definition
Routine (6hrs) Priority (3hrs) Immediate (30mins) Flash (<10mins) Overrides all other codes, including Flash. (Immediately) |
|
|
Term
purpose of an OPTASK COMMS |
|
Definition
means used by which the United States Navy and Allied Navies distribute afloat Communications plans |
|
|
Term
State the purpose of a COMPLAN |
|
Definition
Communications Plan to integrate all the organization's programs, public education and advocacy efforts. |
|
|
Term
State the purpose of a TSO |
|
Definition
The authorization from Headquarters or discontinue circuits or trunks and to effect administrative changes. |
|
|
Term
State the purpose of Electronic Key Management System |
|
Definition
EKMS provides the capability and policies for automated generation distribution and management of electronic key, as well as management of physical key and non-key COMSEC |
|
|
Term
|
Definition
TEMPEST is the code name given to the investigation, study, and control of compromising emanations from telecommunications and automated information processing systems |
|
|
Term
State the purpose of Emissions Control |
|
Definition
control of all electromagnetic and acoustic radiations, |
|
|
Term
|
Definition
Anti-Submarine Warfare is the destruction or neutralization of enemy submarines |
|
|
Term
|
Definition
Anti-Surface Warfare is the destruction or neutralization of enemy surface combatants and merchant ships |
|
|
Term
|
Definition
Information Warfare is the action taken to achieve information superiority over the adversary by influencing his information and information-based processes, systems, and computer-based networks, while defending our own |
|
|
Term
|
Definition
Air Warfare is the action required to destroy or reduce an enemy’s air and missile threat |
|
|
Term
|
Definition
Strike Warfare is the destruction or neutralization of enemy land-based targets with conventional or nuclear missiles |
|
|
Term
|
Definition
Special Warfare is distinguished by unique objectives, weapons, and forces |
|
|
Term
Explain the purpose of a mobile detachment |
|
Definition
A unit that is not stationary in its operations whose purpose is to deploy in support of a tasked requirement. |
|
|
Term
Discuss the purpose of Direct Support Assets |
|
Definition
IRSUP Assets are used for short-duration requirements which require specialists not normally included in a ship’s PCS complement. |
|
|
Term
|
Definition
Consist of Remote Environmental Monitoring Units (REMUS) conducting oceanographic surveys, integrating new sensors into current programs. |
|
|
Term
Naval Oceanography ASW Team (NOAT) |
|
Definition
rovide environmental support to ASW forces worldwide at various Fleet and COCOM echelons |
|
|
Term
. Strike Group Oceanography Team (SGOT) |
|
Definition
Provide timely, comprehensive, and tactically relevant meteorological and oceanographic (METOC) products in direct support of Numbered Fleet / Navy Component Commanders. |
|
|
Term
Mobile Environmental Team (MET) |
|
Definition
Provides (METOC) information and forecasts for current operational use, forecast tactical decision-making, and climatological (statistical) information for long-range planning and design purposes. |
|
|
Term
|
Definition
FST gathers the needed information via timely, self-contained hydrographic surveys in response to combatant commanders' requests. |
|
|
Term
|
Definition
SYOP, MILDEC, OPSEC, EW, and CNO |
|
|
Term
|
Definition
defending an enterprise’s use of information systems by maintaining its security posture against a group of mock attackers |
|
|
Term
Explain the purpose of FES |
|
Definition
Fleet Electronics Support: Installs and maintains specialized equipment for permanent and ad-hoc missions. |
|
|
Term
|
Definition
It provides the legal basis for the roles, missions and organization of each of the services as well as the United States Department of Defense |
|
|
Term
|
Definition
outlines the role of War and National Defense in the United States Code |
|
|
Term
|
Definition
Cryptologic Carry-On Program. IO systems must respond to technological landscape to deliver tactically relevant data to the COTP |
|
|
Term
|
Definition
Navy Integrated Tactical Environmental Subsystem is the portable tactical environmental support system used by the U.S. Navy Mobile Environmental Teams |
|
|
Term
|
Definition
Joint Deployable Intelligence Support System (JDISS) program provides a family of hardware and software capabilities that allow connectivity and interoperability with intelligence systems supporting forces |
|
|
Term
Discuss Maritime Domain Awareness |
|
Definition
the effective understanding of anything associated with the maritime domain that could impact the security, safety, economy, or environment |
|
|
Term
State the purpose of a MOC |
|
Definition
The Maritime Operations Center provides critical support in the execution of the nation's Maritime Strategy |
|
|
Term
|
Definition
IDENTIFY CRITICAL INFORMATION THREAT ASSESSMENT VULNERABILITY ANALYSIS RISK ASSESSMENT MEASURES/COUNTERMEASURES |
|
|
Term
|
Definition
Web Risk Assessment - Web site self-assessments are a useful tool in determining whether potential critical information is on a command’s Web site. |
|
|
Term
|
Definition
Key information adversaries likely will inquire about regarding our intentions, capabilities, and activities, in order to obtain answers critical to their own operational effectiveness. |
|
|
Term
|
Definition
CI is defined as information about friendly activities, intentions, capabilities, or limitations an adversary seeks in order to gain a military, political, diplomatic, economic, or technological advantage |
|
|
Term
State the purpose of Naval Intelligence |
|
Definition
Naval intelligence provides insights into this uncertain world, both in peace and in war |
|
|
Term
five steps of Intelligence |
|
Definition
Planning and Direction Collection Processing Production Dissemination |
|
|
Term
three categories of Intelligence |
|
Definition
Tactical Operational Strategic |
|
|
Term
|
Definition
Priority Intelligence Requirements are any subject, general or specific, upon which there is a need for the collection of information or the production of intelligence |
|
|
Term
Define the difference between a US citizen and a US person with regards to US Intelligence Oversight |
|
Definition
United States person means: - United States citizen- an alien known to be a permanent resident- an unincorporated association composed of US citizens or permanent resident aliens- a corporation incorporated in the United States |
|
|
Term
Define intelligence preparation of the battle space environment |
|
Definition
Defines the area of operations and focuses intelligence assets on the battle space |
|
|
Term
Define the mission of Fleet Intelligence Office and its two subordinate commands |
|
Definition
To provide fleet intelligence and support DoD mission accomplishment. NETWARCOM & CYBERCOM |
|
|
Term
Explain ISR mission requirements and fundamentals |
|
Definition
Intelligence , Surveillance and Reconnaissance requirements generally focus on meeting the commander’s intelligence needs in order to prevent surprise, support war gaming and planning |
|
|
Term
Explain the function of an Intelligence Fusion Cell |
|
Definition
Analyzing all source intelligence information to produce assessments, reports, articles, threat analysis, special studies etc, responsive to user needs |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Measurement and Signature Intelligence |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Foreign Instrumentation Signals Intelligence |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
Give 3 examples of intelligence briefs |
|
Definition
Deployment, Port, and Country |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
3-30 Hz / long range sigs to submerged subs operating beyond normal mission depth. |
|
|
Term
|
Definition
30-300Hz / Common power grid freqs of 50 Hz and 60 Hz. US and Russian deep-sea comms |
|
|
Term
|
Definition
300-3000Hz / radio comms in mines |
|
|
Term
|
Definition
3-30 KHz / long sigs to subs operating normally |
|
|
Term
|
Definition
30-300KHz / Fleet multi-channel broadcast |
|
|
Term
|
Definition
300-3000KHz / Navy & commercial AM broadcasts |
|
|
Term
|
Definition
3-30 MHz / med-long terrestrial radio comms. |
|
|
Term
|
Definition
30-300 MHz / line of sight or just beyond. Amphib ops, FM broadcast, amateur radio comms. |
|
|
Term
|
Definition
300-3000MHz / Line of Site communications. |
|
|
Term
|
Definition
3-30 GHz / RADAR and Satellite communications |
|
|
Term
|
Definition
30-300 GHz / Radio Astronomy |
|
|
Term
|
Definition
The number of cycles per unit of time, usually expressed in hertz. |
|
|
Term
|
Definition
The number of cycles per unit of time, usually expressed in hertz. |
|
|
Term
|
Definition
Occurs when a wave traveling through two different mediums passes through the BOUNDARY of the mediums and bends toward or away from the NORMA |
|
|
Term
|
Definition
The simultaneous transmission of a number of intelligible signals (messages) in either or both directions using only a single RF carrier |
|
|
Term
|
Definition
The ability to impress intelligence upon a transmission medium, such as radio waves. |
|
|
Term
|
Definition
The frequency range occupied by a modulated carrier wave. |
|
|
Term
|
Definition
The carrier is shifted between two differing frequencies by opening and closing a key. |
|
|
Term
|
Definition
TROPOSPHERE, the STRATOSPHERE, and the IONOSPHERE |
|
|
Term
|
Definition
A form of radiant energy that can neither be seen nor felt. (2) An electromagnetic wave generated by a transmitter |
|
|
Term
|
Definition
Waves traveling through a medium |
|
|
Term
|
Definition
Angular measurement in the horizontal plane in a clockwise direction. |
|
|
Term
|
Definition
The angle between the horizontal plane and the line of sight. |
|
|
Term
|
Definition
Upper Sideband. All of the sum frequencies above the carrier wave |
|
|
Term
|
Definition
Lower Sideband. All the difference frequencies below the carrier wave |
|
|
Term
|
Definition
Continuous Wave. An electromagnetic wave of constant amplitude and frequency |
|
|
Term
|
Definition
Amplitude Modulation. Any method of modulating an electromagnetic carrier frequency by varying its amplitude in accordance with the message intelligence that is to be transmitted. |
|
|
Term
|
Definition
Conveys information over a carrier wave by varying its frequency |
|
|
Term
|
Definition
Pulse Repetition Interval. The time duration between the start of one pulse and the start of the next pulse |
|
|
Term
|
Definition
Pulse-Repetition Frequency. The number of pulses a radar transmits each second, measures in pulses per second |
|
|
Term
|
Definition
Radio Frequency. Any frequency or electromagnetic energy capable of propagation into space |
|
|
Term
|
Definition
Band Width. The section of the frequency spectrum that specific signals occupy |
|
|
Term
|
Definition
Continuous Wave. An electromagnetic wave of constant amplitude and frequency. |
|
|
Term
|
Definition
Pulse Width. Duration of time between the leading and trailing edges of a pulse |
|
|
Term
|
Definition
The time it takes an RF beam to complete one search cycle of the scan pattern |
|
|
Term
Identify the following types of RADAR |
|
Definition
Air-search radar Surface Search Fire Control |
|
|
Term
Explain the difference between OPELINT and TECHELINT |
|
Definition
Operational Electronic Intelligence - is concerned with operationally relevant information such as the location, movement, employment, tactics, and activity of foreign noncommunications emitters and their associated weapon systems. Technical Electronic Intelligence - is concerned with the technical aspects of foreign noncommunications emitters such as signal characteristics, modes, functions, associations, capabilities, limitations, vulnerabilities, and technology levels. |
|
|
Term
|
Definition
e half-duplex (hdx) mode has one-way flow of information between terminals |
|
|
Term
|
Definition
The full-duplex (fdx) mode is a method of operation in which telecommunications between stations takes place simultaneously in both directions using two separate frequencies |
|
|
Term
|
Definition
The simplex (splx) mode uses a single channel or frequency to exchange information between two or more terminals |
|
|