Term
|
Definition
long-term force shaping tool that aids in leveling rating manning between overmanned and undermanned ratings. |
|
|
Term
List the officer accession programs that are available to enlisted personnel:
|
|
Definition
Seaman to Admiral (STA-21 Program)
Limited Duty Officer (LDO)
Chief Warrant Officer Program (CWO)
Navy Officers Candidate School (OCS)
Medical Enlisted Commissioning Program (MECP)
Medical Service Corps In-Service Procurement (MSC IPP) |
|
|
Term
State the duties and responsibilities of the Command ESO |
|
Definition
The Educational Services Officers assists the Executive Officer in administering educational programs. |
|
|
Term
Describe the six programs of Brilliant on the Basics: |
|
Definition
Career Development Boards
Sponsorship
Mentorship
Sailor Recognition
Command Indoctrination
Command Ombudsmen support
|
|
|
Term
Discuss the purpose of the 3-M/PMS System? |
|
Definition
To maintain equipment at its maximum operating efficiency by reducing downtime and cost of maintenance and man-hours. |
|
|
Term
Explain how DPAS is used to track equipment |
|
Definition
Defense Property Accountability System - by recording sensitive information in an approved secure or non-secure system property system in away that national security is not compromised. |
|
|
Term
Discuss the purpose of the MOV program |
|
Definition
Material Obligation Validation - purpose is to ensure overaged material obligations reflected in the inventory. |
|
|
Term
|
Definition
Depot Level Repairable - managed items based on the unit cost, annual demand, difficulty of repairs, or other economic considerations that have been selected for special inventory control. |
|
|
Term
Explain the procedures for NRFI DLRs in regard to the following situations:
Turn-in
RIP |
|
Definition
Turn-in: Accomplished on a one-for-one exchange basis to receive credit to the nearest stock point.
RIP: (Remain-in-place): NRFI Part has to remain in the equipment until the RFI part has been received. |
|
|
Term
Define MAMS and Bulkhead Ready Spares |
|
Definition
Maintenance Assist Modules are used for troubleshooting of equipment held in the custody of assigned department head.
Bulkhead Ready Spares are bulky items stored in assigned spaces where they will be used. |
|
|
Term
Define the term CASREP and explain the four categories |
|
Definition
Casualty Report - report designed to identify the parts required to be repaired for faulty equipment.
4 categories:
CAT 1, CAT 2, CAT 3, CAT 4 |
|
|
Term
Define the following acronyms:
NSN
COG
APL
AEL
NC
NIS
SIM |
|
Definition
National Stock Number
Cognizance of Navy Material
Allowance Parts List
Allowance Equipage List
Not Carried
Not in Stock
Selected Item Management |
|
|
Term
What is a DD Form 1348-6? |
|
Definition
Material that cannot be identified by NSN |
|
|
Term
|
Definition
Request document for contractual procurement |
|
|
Term
|
Definition
7 part document for procuring non-nsn material |
|
|
Term
|
Definition
(MIPR, Military Interdepartmental Purchase Request) - Request material from other branches/departments |
|
|
Term
|
Definition
Invoice and public voucher for over-the-counter purchases of supplies |
|
|
Term
|
Definition
Request for supplies and services from commercial vendors |
|
|
Term
|
Definition
Request to buy, ship, and receive commercial products. |
|
|
Term
|
Definition
Amendment of solicitation and modification of a contract |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Quality Deficiency Report |
|
|
Term
Discuss the following:
CHRIMP
DRMS
Servmart |
|
Definition
Consolidated hazardous material reutilization and inventory management program - Navy's life-cycle control and management of hazardous material
Defense reutilization marketing service - disposing site of excess material purchased for military services
Service Mart - direct purchase of consumable, retail items from commercial sources. |
|
|
Term
Discuss the uses of the Government commercial purchase Card (IMPAC) (VISA) |
|
Definition
Provide on the spot purchases of supplies and services for a more efficient, cost effective, process of micro-purchase items or services. |
|
|
Term
What is an OPTAR and explain its components. |
|
Definition
Operating Target : Fiscal Year funds granted by the type commander for each command to obtain materials and services necessary for operations components:
OFC-20 Supplies and Services
OFC-50 Aviation
OFC-01 Flight Operations
|
|
|
Term
State the difference between the following:
Normal Power
Emergency Power
Uninterrupted Power |
|
Definition
Primary Source of power
Backup Source of power
Temporary Source of power while switching from primary to backup or to allow time to safety shut down equipment during a loss of power. |
|
|
Term
Define the following classification categories, how they differ, and the color codes used to identify each one.
Top Secret
Secret
Confidential
Unclassified |
|
Definition
TS (Orange) - cause exceptionally grave damage
Secret (Red) - cause Serious damage
Confidential (Blue) - cause damage
Unclassified (Green) - Example, pubs available on the internet. |
|
|
Term
Explain what is meant by 'need to know' |
|
Definition
is a determination that an individual requires access to specific classified information |
|
|
Term
What eligibility is favorable for Top Secret, Secret, and SCI and how often are they updated? |
|
Definition
Top Secret is favorably completed SSBI, SSBI-PR or PPR and must be updated every 5 years.
Secret/Confidential is favorably completed by NACLC or ANACI and must be updated every 10 and 15 years.
Sensitive Compartmented Information (SCI) is favorably adjudicated SSBI. A SSBI-PR is required to be submitted every 5 years. |
|
|
Term
Identify what a SAER is and its purpose? |
|
Definition
Security Access Eligibility Report - used when trying to get a SCI clearance but have to explain something in detail (Negative remarks on a credit report) |
|
|
Term
Identify the events that should be reported to the SSO? |
|
Definition
Financial issues, legal issues, U/A, mental illness, marriage to a foreign national, anything that could question your character, integrity, physical, and mental health needs to be reported. |
|
|
Term
Identify who has overall authority of, and controls access to, a SCIF |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Classified Information Nondisclosure Agreement |
|
|
Term
State when safe combinations should be changed. |
|
Definition
A combo lock is first installed or used
A combo has been subjected, or believed to have been subjected to compromise; and when considered necessary by the CSA.
Every 2 years safe and container combinations should be changed at a minimum. |
|
|
Term
What is an FDO and state their responsibilities: |
|
Definition
Foreign Disclosure Office (FDO)
Military information is a national security asset which must be conserved and protected. |
|
|
Term
What is the purpose of the Defense Courier Service? |
|
Definition
secure transmission of qualified classified documents and materials. |
|
|
Term
Describe the procedures for preparing hard copy classified material for transportation via DCS: |
|
Definition
Shall not weigh over 300 pounds
Items shall be addressed with the standardized DCS two-line address
Security classification markings, special security caveats, and other extraneous markings must not appear on the outer wrapper.
U.S. Postal Service bags, pouches, or sacks shall not be used for DCS material. |
|
|
Term
Who can serve as the TSCO? |
|
Definition
|
|
Term
State the THREATCON recognition and discuss what each represents. |
|
Definition
Normal - No known threat indicated.
Alpha - A general threat is possible
Bravo - An increased and more predictable threat
Charlie - An incident has occurred or intelligence has been received indicating that some form of terrorist action is imminent.
Delta - A terrorist attack has occurred or that intelligence indicates that a terrorist action against a specific location is likely |
|
|
Term
State the Force Protection Levels and discuss what each represents.
|
|
Definition
Normal - a general global threat is possible
Alpha - increased general threat
Bravo - increased or predictable threat
Charlie- incident occurs or intelligence is received
Delta - Immediate area where a terrorist attack has occurred. |
|
|
Term
|
Definition
Random Anti-Terrorism Measure - to maximize the effectiveness and deterrence value. |
|
|
Term
Explain and state the purpose of an EAP. |
|
Definition
Every command that holds classified COMSEC or CCI material must prepare and maintain a current, written emergency action plan for natural disasters. |
|
|
Term
What are the 3 categories of COMSEC material that may require destruction in hostile emergencies? |
|
Definition
COMSEC keying material, COMSEC-related material (maintenance manuals, operating instructions), and equipment |
|
|
Term
What are the Emergency Destruction Lists called and what do they include? |
|
Definition
Precautionary Destruction (Priority List A & B) - destroy keying material and non-essential manuals
Complete Destruction Priority List (C) - assign different persons to destroy the material in each category by means of separate destruction facilities and follow the priorities. |
|
|
Term
Explain how, and in what order, material is destroyed during Emergency Destruction. |
|
Definition
Emergency Destruction Priorities:
(1) Superseded keying material and secondary variables.
(a) Top Secret primary keying material.
(b) Secret, Confidential, and Unclas primary keying material
(2) Future (reserve on board) keying material for use one or two months in the future.
(3) Non-essential classified manuals:
(a) Maintenance manuals.
(b) Operating manuals.
(c) Administrative manuals. |
|
|
Term
|
Definition
Sensitive Compartmented Information - classified information concerning or derived from intelligence sources, methods, or analytical processes, which is required to be handled within formal access control systems established by the Director of Central Intelligence. |
|
|
Term
List the items prohibited in a SCIF and the security risks associated with them.
|
|
Definition
Cell phones, camera, removable HDD, USB, etc., 2 way radio, IPOD, Playstation, gameboy, PDA, Personal Electronic Devices |
|
|
Term
Define the difference between a security violation and a practice dangerous to security. |
|
Definition
Security violation is a compromise of classified info to persons not authorized to receive it or a serious failure to comply with the provisions of security regulations.
PDS is a failure to comply with the provisions of security regulations. |
|
|
Term
Explain vault re-certification and recurring inspections. |
|
Definition
By a person specifically trained and authorized by the GSA before it can be used to protect classified material.
Vault doors must have a GSA label affixed on the outside of the door. |
|
|
Term
Explain the DoD escort policy. |
|
Definition
If you are an escort you are required to stay with that individual or group you are escorting until they leave.
The movement of all visitors shall be controlled to ensure that access to classified information is deliberate.
As a matter of convenience and courtesy, flag officers are not required to sign visitor records. |
|
|
Term
Discuss the procedures for sanitizing an area |
|
Definition
The removal of information from the media or equipment such that data recovery using any known technique or analysis is prevented. |
|
|
Term
|
Definition
Communications Security - protective measures taken to deny unauthorized persons information derived from telecommunications of the U.S. Govt. concerning national security. (cryptosecurity, emission security, transmission security, & physical) |
|
|
Term
|
Definition
Information Security is the protection of information and information systems against unauthorized access or modification. |
|
|
Term
|
Definition
Computer Security are measures and controls that ensure confidentiality, integrity, and availability of the information processed and stored by a computer. |
|
|
Term
|
Definition
Personnel Security Program is to authorize initial and continued access to classified information and/or initial and continued assignment to sensitive duties |
|
|
Term
State the purpose of the ICD system |
|
Definition
Intelligence Community Directives and subsidiary issuances shall serve as the principal means by which the Director of National Intelligence (DNI) provides guidance, policy, and direction to the Intelligence Community. |
|
|
Term
|
Definition
Special Security Officer is responsible for implementing SCI security policy and procedures and performs management and oversight of the Department's SCI security program. |
|
|
Term
What is the responsibilities of the SSO. |
|
Definition
serves as the focal point for the receipt, control, and accountability of SCI and oversees SCI security functions for subordinate SCIFS. Must be a commissioned officer, warrant officer, or GS-9 or above |
|
|
Term
Identify who can be a CSM |
|
Definition
The Security Manager can be an Officer or GS-11 or above with sufficient authority and staff to manage the program for the command. |
|
|
Term
What is the prime responsibility of the CSM? |
|
Definition
for implementing the ISP and shall have direct access to the commanding officer. |
|
|
Term
What does JPAS stand for? |
|
Definition
Joint personnel adjudication system |
|
|
Term
Discuss how long a Commanding Officer can administratively suspend access before DONCAF revokes a clearance. |
|
Definition
Will determine immediately and suspend of SCI access for 90 days. |
|
|
Term
State the levels of INFOCON and what each signifies. |
|
Definition
INFOCON 5 - no apparent hostile activity against cpu networks.
INFOCON 4 - an increased risk of attack.
INFOCON 3 - when a risk has been identified.
INFOCON 2 - when an attack has taken place but the Computer Network Defense
INFOCON 1 - when attacks are taking place and the Computer Network Defense is at max alertness. |
|
|
Term
Discuss the security rules and procedures for magnetic and electronic media. |
|
Definition
Data is stored and which normally is removable from the system by the user or operator. All such devices bearing classified information must be conspicuously marked with the highest level of classification. |
|
|
Term
|
Definition
Designated Approving Authority - the official with the authority to formally assume responsibility for operating a system (or network) at an acceptable level of risk |
|
|
Term
|
Definition
Process that provides risk identification, analysis, mitigation planning, mitigation plan implementation, and tracking to ensure identification and handling of risks. |
|
|
Term
Define the 5 attributes of IA: |
|
Definition
Confidentiality
Integrity
Availability
Non-repudiation
Authentication
|
|
|
Term
List and define 9 categories of computer incidents: |
|
Definition
1 Root Level Intrusion (Incident)
2 User Level Intrusion (Incident)
4 Denial of Service (Incident)
7 Malicious Logic (Incident)
3 Unsuccessful Activity Attempt (Event)
5 Non-Compliance Activity (Event)
6 Reconnaissance (Event)
8 Investigating (Event)
9 Explained Anomaly (Event) |
|
|
Term
Define vulnerability assessment |
|
Definition
An examination of the ability of a system or application including current security procedures and controls, to withstand assault. |
|
|
Term
Explain the difference between vulnerability and threat. |
|
Definition
Vulnerability - refers to a weakness in a system's security scheme.
Threat - Circumstances, events, or people with the potential to cause harm to a system. |
|
|
Term
State the duties and responsibilities of the IAM:
|
|
Definition
Information Assurance Manager is responsible for the information assurance program within a command, site, system, or enclave. |
|
|
Term
Define the following devices and their uses:
Host/Client
Application Server
Hub
Switch
Router
WAP |
|
Definition
Allows for multiple clients to connect and share resources.
Dedicated to run specific applications for individual clients.
Is a device for connecting multiple devices together and making them act as a single network.
Is a computer networking device that connects network segments.
Is a device that interconnects two or more computer networks and interchanges packets between them.
Is an open international standard for application-layer network comms (wireless) |
|
|
Term
Define the following devices and their uses:
Proxy Server
Firewall
VPN Concentrator
Back-up
Repeater |
|
Definition
Is a server that acts as an intermediary for requests from clients seeking resources from other servers.
To permit or deny computer applications/services based upon a set of rules.
Device that provides cost savings (remote-access)
Network resources if network files become corrupt.
Is an electronic device that receives a signal and retransmits it at a higher level. |
|
|
Term
Define the following layers of routing and common devices associated with each:
Access
Distribution
Core |
|
Definition
access routers include SOHO (small office/home office) located at costumer sites.
enforcing quality of service across a WAN.
"collapsed backbone" interconnecting the distribution tier routers from multiple buildings. (high bandwidth) |
|
|
Term
|
Definition
One of the most common computer network topologies. Consists of one central switch to transmit messages. |
|
|
Term
What is a bus network topology? |
|
Definition
A set of clients are connected via a shared communications line. (Simplest way to connect multiple clients) but have problems when 2 clients want to transmit at the same time. |
|
|
Term
What is a ring network topology? |
|
Definition
connects to exactly two other nodes, forming a single continuous pathway for signals through each node. |
|
|
Term
What is a mesh networking topology? |
|
Definition
may act as an independent router, regardless of whether it is connected to another network or not.
(Continuous connections) by hopping from node to node. |
|
|
Term
|
Definition
Metropolitan Area Network - is a large computer network that usually spans a city or a large campus. (interconnects a # of LANs) |
|
|
Term
|
Definition
Global Access Network is a telecommunication system that extends mobile voice, data, and IP. Commercial name used by mobile carriers. |
|
|
Term
Name each layer of the OSI model? |
|
Definition
Application
Presentation
Session
Transport
Network
Data Link
Physical |
|
|
Term
What layers are in the TCP/IP Model? |
|
Definition
Application
Host-to-Host
Internet
Network Access |
|
|
Term
State the difference between IPv4 and IPv6? |
|
Definition
IPv4 has 32 bit addresses
IPv6 has 128 bit addresses |
|
|
Term
What does NIPRNET stand for and what is it used for? |
|
Definition
Non-classified Internet Protocol Router Network is used to exchange sensitive but unclas info between "internal" users. |
|
|
Term
What is SIPR stand for and what is it used for? |
|
Definition
Secret Internet Protocol Router Network is a system of interconnected cpu networks used to transmit classified information. |
|
|
Term
What is JWICS stand for and what is it used for? |
|
Definition
Joint Worldwide Intelligence Communications System - interconnected computer networks used by U.S. DoD to transmit classified Top Secret and SCI information. |
|
|
Term
|
Definition
the global information grid is a globally interconnected, end-to-end set of information for disseminating. |
|
|
Term
|
Definition
Defense Information System Network is DoD's enterprise network for providing data, video, and voice services. |
|
|
Term
|
Definition
Navy/Marine Corps Intranet provides IT services to US-CONUS shore based Navy networks. |
|
|
Term
|
Definition
is a Navy-wide initiative for IT services in the OCONUS Navy locations. |
|
|
Term
|
Definition
is a GAN, and is managed by 4 fleet NOCs positioned around the world for 24/7 ops. |
|
|
Term
Describe the following:
Machine Language
Assembly Languages
High-level Language
Operating System
Applications |
|
Definition
is a system of instructions
area type of low-level languages for programming cpus.
Is a programming language with strong abstraction from the details of the cpu.
Is a set of system software programs in a cpu.
Are computer softwares to help the user perform specific tasks. |
|
|
Term
Describe the following to include the risks associated:
Virus
Worms
Trojans
Backdoors
Phishing
|
|
Definition
is a cpu program that can copy itself and infect a cpu.
Are self-replicating malware computer programs.
Are malware that appears to perform a desirable function for the user prior to run or install.
Are a method of bypassing normal authentication.
Is a process of attempting to acquire sensitive info. |
|
|
Term
Describe function and risk associated with following activities:
Network enumerating
Buffer overflow
SQL injection
Dictionary attack |
|
Definition
is a computing activity in which user names are retrieved.
is an anomaly where a program overruns the buffer's boundary and overwrites adjacent memory.
is a code injection technique that exploits a security vulnerability.
is a technique for defeating a cipher or authentication by using likely possibilities. |
|
|
Term
Describe function and risk associated with following activities:
Privilege escalation
Brute Force attack
Social engineering
|
|
Definition
is the act of exploiting a bug or design flaw in a software application to gain access.
is a strategy used to break the encryption of data.
is the act of manipulating people into performing actions or divulging confidential information. |
|
|
Term
Describe the functionality of PKI? |
|
Definition
Public Key Infrastructure is an arrangement that binds public keys with respective user identities by means of a certificate authority. |
|
|
Term
State the purpose of DNS. |
|
Definition
Domain Name System is a hierarchical naming system for cpus, services, or any resource connected to the internet. |
|
|
Term
Discuss the purpose of a Red Cross message. |
|
Definition
family members use the emergency communication system to notify service members of an emergency or other important event. |
|
|
Term
|
Definition
Automated Digital Networking System - is to connect Navy shipboard networks to other ship and shore networks. |
|
|
Term
|
Definition
Common User Digital Information Exchange Subsystem - provides a 2400 baud full duplex interface, over a satellite link with mobile platforms. |
|
|
Term
|
Definition
VLF Digital Information Network - Fleet Submarine Broadcast System for worldwide delivery of messages. |
|
|
Term
|
Definition
Automated Message Store and Forward - to relay messages to other commands outside the immediate area of responsibility. |
|
|
Term
|
Definition
Integrated Broadcast System - Receives EAMs |
|
|
Term
|
Definition
International Maritime Satellite - multipurpose commercial SATCOM system providing both simultaneous voice and IP data up to 128kbps. |
|
|
Term
|
Definition
Defense Messaging System employs the messaging and directory services using X.400 and X.500
Navy Regional Enterprise Message System provides web-based messaging capability to send and receive DMS messages.
Automatic Message Handling System provides simplified message drafting and release of outgoing messages. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Defense Connect Online - Instant Messenger |
|
|
Term
Discuss GINGERBREAD and explain the procedures involved. |
|
Definition
Expected intruder on the net.
Announce GINGERBREAD on the net |
|
|
Term
Discuss types of disclosures afforded protection by the EEFI list. |
|
Definition
Beadwindow Code:
Position 01
Capabilities 02
Operations 03
Electronic Warfare 04
Personnel 05
COMSEC 06
Wrong Circuit 07 |
|
|
Term
Discuss BEADWINDOW and explain the procedures involved.
What is the proper response? |
|
Definition
is a real-time procedure which brings to the immediate attention of circuit operators the fact that an EFFI disclosure has occurred.
"Roger Out" |
|
|
Term
Define RIVER CITY and state when it is utilized. |
|
Definition
An OPSEC tool that limits communications. Provides procedures to control outgoing paths from ships and shore systems. |
|
|
Term
|
Definition
Joint Spectrum Interference Resolution was designed to replace Meaconing, Intrusion, Jamming, and Interference (MIJI).
Meaconing - false navigation
Intrusion - someone pretending to be someone they are not.
Jamming - deliberate radiation for preventing or reducing an enemy's effective use.
Spectrum management - to manage frequencies and to prevent multiple connections. |
|
|
Term
Define and state the purpose of the following:
PLA
DTG
UTC (ZULU) |
|
Definition
Plain Language Address - is the only designator authorized for use in Naval message addressing.
Date-Time-Groups designed to prevent using duplicate DTG's on msgs from the same originator.
Coordinated Universal Time prevents confusion between the different zones and types of time. |
|
|
Term
List the components of a standard navy message. |
|
Definition
Heading (FL6 FM and FL7 TO)
Message Text (FL12)
Ending (FL15 SSN and FL16 NNNN)
Format Line 11 and 13 are BT
16 Format Lines |
|
|
Term
Define the following message precedence's:
R
P
O
Z
W |
|
Definition
Routine (6 hours)
Priority (3 hours)
Immediate (30 Minutes)
Flash (As fast as possible less than 10 minutes)
Flash Override (3 Minutes) |
|
|
Term
State the purpose of an OPTASK COMMS. |
|
Definition
a breakdown of circuits to distribute afloat communications plans. (message)
What frequencies to guard and to monitor |
|
|
Term
State the purpose of a COMMPLAN. |
|
Definition
Communications Plan is a multi-step process of developing and implementing voice and data comms in support of unit and fleet missions. |
|
|
Term
State the purpose of a TSO. |
|
Definition
Telecommunications Service Order - to start, change, or discontinue circuits or trunks and to effect admin changes. |
|
|
Term
State the purpose of a TSR.
Who may issue it? |
|
Definition
Telecommunications Service Requests - telecommunications requirement
By a specifically authorized TCO. |
|
|
Term
State the purpose of a COMSPOT/Communications service advisory |
|
Definition
Communications Spot - will be reported any time communication outages or degradations are encountered by all ships or shore facilities.
Communications Services Advisory - is only shore facilities.
|
|
|
Term
If comms cannot be restored in 48 hours, what is submitted? |
|
Definition
|
|
Term
State the purpose of EKMS. |
|
Definition
Electronic Key Management System.
EKMS-1B prescribes the minimum policies for issuing, accounting, handling, safeguarding, and disposing of COMSEC material. (bible for comsec) |
|
|
Term
State the purpose of OTAT/OTAR. |
|
Definition
Over-the-Air Key Transfer
Over-the-Air Rekeying |
|
|
Term
|
Definition
used to analyze and measure unwanted signal leakage do to equipment radiation. |
|
|
Term
State the purpose of EMCON |
|
Definition
Emission Control is control of all electromagnetic and acoustic radiations, including communications, radar, EW and sonar. |
|
|
Term
Describe the mission of the following primary warfare areas:
ASW
SUW
IW |
|
Definition
Anti-Submarine Warfare - denying the enemy the effective use of submarines.
Surface Warfare - operations conducted to destroy or neutralize enemy naval surface forces
Information Warfare - to achieve or promote specific objectives over adversaries. |
|
|
Term
Describe the mission of the following primary warfare areas:
AW
STW
NSW |
|
Definition
Air Warfare - defensive measures designed to destroy attacking enemy aircraft.
Strike Warfare - to destroy enemy targets ashore.
Naval Special Warfare - conducts ops in the coastal, riverine, and maritime environments. |
|
|
Term
Explain how the Reserve Component integrates with the Active Component. |
|
Definition
Provide trained units and qualified persons available for active duty in the armed forces, in time of war or national emergency. |
|
|
Term
Explain the purpose of a mobile detachment. |
|
Definition
Provide direct or indirect support to an operational entity. |
|
|
Term
Discuss the primary services provided by the following deployable METOC teams:
Mine Warfare UUV Platoon
Naval Oceanography ASW Team (NOAT)
Strike Group Oceanography (SGOT)
Mobile Environment Team (MET)
Fleet Survey Team (FST) |
|
Definition
Removes divers and marine mammals from the dangers and extreme hazards.
Provides integral support to ASW.
Provides meteorological and oceanographic support.
Primary users of the Navy's mobile equipment assets.
Performs surveys of various equipment on ships. |
|
|
Term
Discuss the IO (Information Operations) Core Capabilities: |
|
Definition
-Provide broad strategic concepts
-Provide an orderly schedule of decisions
-achieve unity of effort
-identify any special forces |
|
|
Term
Define the roles of the U.S. Navy Blue and Red teams. |
|
Definition
Defending an enterprise's use of info systems.
Attacks or exploits against an enterprise's security posture. |
|
|
Term
Explain the purpose of FES |
|
Definition
Fleet Electronic Support - installation, removal, maintenance, and repair of Cryptologic Direct Support Element (CDSE) electronic equipment. |
|
|
Term
Explain the difference between the following documents:
USC Title 10
USC Title 50 |
|
Definition
Outlines the role of armed forces in the United States code.
Outlines the role of war and National Defense. |
|
|
Term
|
Definition
Critical Intelligence Communication |
|
|
Term
State the purpose of the following:
CCOP
NITES
JDISS |
|
Definition
Cryptologic Carry-On Program provides exploitation capability by augmenting existing Ships Signal Exploitation Space (SSES).
Navy Integrated Tactical Environmental Subsystem is the portable tactical environment support system.
Joint Deployable Intelligence Support System allow connectivity and interoperability with intelligence systems supporting forces.
|
|
|
Term
Discuss Maritime Domain Awareness (MDA) |
|
Definition
effective understanding of anything associated with the maritime domain that could impact the security, safety, etc.
|
|
|
Term
State the purpose of a MOC |
|
Definition
Maritime Operations Center - the nexus of joint and navy transformation initiatives |
|
|
Term
|
Definition
Systematic proven process that identifies, controls, and protects generally sensitive but classified information about a mission. |
|
|
Term
Discuss the five step planning process regarding OPSEC. |
|
Definition
Step 1: Identify critical information
Step 2: Threat Assessment
Step 3: Vulnerability Analysis
Step 4: Risk Assessment
Step 5: Measures/countermeasures |
|
|
Term
Discuss the responsibilities of the command OPSEC Officer |
|
Definition
for administering the OPSEC Program. |
|
|
Term
Describe the OPSEC considerations regarding public affairs |
|
Definition
they should coordinate the release of data to the public. |
|
|
Term
|
Definition
Web Risk Assessment - scan a website to determine if there are any OPSEC related vulnerabilities. |
|
|
Term
|
Definition
Essential Elements of Friendly Information - key information adversaries likely will inquire about regarding our intentions in order to obtain answers critical to their own operational effectiveness. |
|
|
Term
|
Definition
Critical Information - is information about friendly activities and adversary seeks in order to gain a military advantage. |
|
|
Term
Define the components and functions of the command OPSEC Program. |
|
Definition
Appoint an OPSEC program manager.
Utilize Naval OPSEC Support Team (NOST)
Local Opsec guidance
Annual review |
|
|
Term
Describe the 3 categories of Intelligence. |
|
Definition
Strategic (National)
Operational (Joint)
Tactical (Commanders) |
|
|
Term
Explain Intelligence Oversight and state the publications that govern it. |
|
Definition
Act of 1980 requires U.S. Government agencies to report covert actions to the house permanent.
Pubs:
Executive Order 12333
Public Law No. 95-511
Executive Order 12334 |
|
|
Term
Define intelligence preparation of the battlespace environment. |
|
Definition
Systematic and continuous analysis of the adversary, terrain, and weather in the assigned battlespace. |
|
|
Term
Explain ISR mission requirements and fundamentals. |
|
Definition
Intelligence surveillance reconnaissance - to effectively engage the enemy. |
|
|
Term
Describe the following:
HUMINT
OSINT
MASINT
SIGINT
COMINT
FISINT
ELINT
IMINT |
|
Definition
Human Intelligence
Open Source Intelligence
Measurement and Signature Intelligence
Signals Intelligence
Communication Intelligence
Foreign Instrumentation Signals Intelligence
Electronic Intelligence
Imagery Intelligence |
|
|
Term
Explain the mission of NMCI Service Desk. |
|
Definition
To provide support to more than 700,000 Sailors, Marines, and civilians to include end-user’s PCs, laptops, mobile wireless solutions for the security and support their missions require. |
|
|
Term
What is the geographic location ofeach Network Operations center? |
|
Definition
Quantico, VA; San Diego, Ca; Norfolk, VA; Pearl Harbor, HI |
|
|
Term
|
Definition
- (Active Directory Account Edit Operations) - Serves as an Active Directory look up for customers and provides account support. Used as a base for all agent tools. |
|
|
Term
|
Definition
Used to create tickets and track existing tickets |
|
|
Term
|
Definition
(Service Manager 7) – HP Software program replacing quickway and remedy, and is used to create and track existing tickets. |
|
|
Term
|
Definition
Used in conjunction with Remedy to work on new and existing tickets |
|
|
Term
|
Definition
Software tool used to free customer’s disk space and allow a higher system performance. |
|
|
Term
|
Definition
Active Directory Users and Computers) - Used to look up customers and provide account support when ADAEO is not available. |
|
|
Term
|
Definition
(Radia Four AService Tool) - Shows successful and unsuccessful HP Radia installed applications on a remote target computer. It is also used to verify associated and non-associated software on the target computer. |
|
|
Term
|
Definition
Used to remote into the foreground of the customer’s machine to assist with troubleshooting |
|
|
Term
Describe the purpose of CLIN 23 items |
|
Definition
Provides commercial off the shelf (COTS) software and hardware peripherals associated with data, voice, and video. |
|
|
Term
What does P.A.R. stand for? |
|
Definition
|
|
Term
What does A.H.T. stand for? |
|
Definition
|
|
Term
What programs areused to generate Trouble Tickets? |
|
Definition
|
|
Term
What reports are due each week to WFM? |
|
Definition
MILDET Service Desk Assignments |
|
|
Term
Discuss proper escalation procedures. |
|
Definition
-Identify symptom
-Determine escalation path to RDM, ESD, or FS
-Fill out proper checklist
-Inform T2 to view and give permission to escalate
-Escalate ticket |
|
|
Term
Discuss call flow to create a ticket in Quickway or SM7. |
|
Definition
A) Greet the customer
B) Verify Classification
C) Verify if ticket is new or existing
D) Ask customer how you may assist
E) Restate customer issue
F) Map Call
G) Verify contact information
H) Verify NMCI Asset
I) Provide ticket number
J) Troubleshoot
K) Verify issue is resolved or give proper escalation information
L) Ask if there is any other assistance needed.
M) Thank customer |
|
|
Term
What is the minimum QA score needed to transfer from the Service Desk? |
|
Definition
|
|
Term
Discuss the different types of Data Seats. |
|
Definition
NIPR, SIPR, S&T, NNPI, Mission Critical |
|
|
Term
What is the minimum time required at the Service Desk? |
|
Definition
|
|
Term
Explain the purpose of a MAC ticket. |
|
Definition
Move, Add, Change ticket – used to create, delete, or make changes to a customer’s profile or a target machine |
|
|
Term
Define each band of the electromagnetic spectrum. |
|
Definition
•30 GHZ - 300 GHZ extremely high frequency
•3 GHZ - 30 GHZ superhigh frequency
•300 MHZ - 3 GHZ ultrahigh frequency
•30 MHZ - 300 MHZ very high frequency
•3 MHZ - 30 MHZ high frequency
•300 KHZ - 3 MHZ medium frequency
•30 KHZ - 300 KHZ low frequency
•3 KHZ - 30 KHZ very low frequency
•300 HZ - 3 KHZ voice frequency
•Up to 300 HZ extremely low frequency |
|
|
Term
Define the communication capabilities of transmissions in each of the bands below:
ELF
SLF
ULF
VLF
LF |
|
Definition
One-way sub comms.
Provide comm services for subs
Used for comms in mines
highly reliable path for comms in northern latitudes where atmospheric disturbances that make high-freq circuits unreliable.
has been used for comms since the advent of radio. |
|
|
Term
Describe the communication capabilities of transmissions in each of the bands below:
MF
HF
VHF
UHF LOS
UHF SAT
SHF
EHF |
|
Definition
Includes international distress frequencies and is used for search and rescue ashore.
Around since WWI.
Ideal for ship to shore ex. beach landings.
Tactical Voice. ex. Moving ships into formation.
Tactical Voice/Data
Radar and Satellite Communications
Satellite Communications
|
|
|
Term
|
Definition
Cyclical processes, number of cycles per unit time. |
|
|
Term
|
Definition
is the distance in space occupied by one cycle of a radio wave at any given instant. |
|
|
Term
|
Definition
Trapping of an RF wave between two layers of the earth's atmosphere |
|
|
Term
|
Definition
is a process where multiple analog message signals or digital data streams are combined into one signal over a shared medium. |
|
|
Term
|
Definition
the ability to impress intelligence upon a transmission medium, such as radio waves. |
|
|
Term
|
Definition
The removal of intelligence from a transmission medium |
|
|
Term
|
Definition
The difference between the highest usable frequency of a device and the lowest usable frequency of the device. |
|
|
Term
|
Definition
inserting noise or data onto a frequency. |
|
|
Term
Discuss the following terms and give a description of what each means in relation to the atmosphere:
Layers
Frequency
Radio Waves |
|
Definition
The ionosphere is composed of 3 layers designated D,E, and F, from the lowest level to the highest level.
The higher the frequency of a radio wave, the lower the rate of refraction by an ionized layer. |
|
|
Term
Discuss the following terms and give a description of what each means in relation to the atmosphere:
Radio Waves
Propagation
Azimuth Angle
|
|
Definition
there are 2 principal ways in which electromagnetic (radio) energy travels from a transmitting antenna to a receiving antenna: ground and sky waves.
Within the atmosphere, radio waves can be reflected, refracted, and diffracted like light and heat waves. |
|
|
Term
Discuss the following terms and give a description of what each means in relation to the atmosphere:
Azimuth Angle
Elevation Angle
|
|
Definition
The angle measured clockwise from true north in the horizontal plane.
The angle between the horizontal plane and the Line of Sight. |
|
|
Term
Describe the following modulation types and their common usage:
USB/LSB
Continuous Wave |
|
Definition
Upper Sideband - all of the sum frequencies above the carrier are spoken of collectively.
Lower Sideband - all the difference of frequencies below the carrier.
CW - The "on-off" keying, when a carrier either was present or absent. |
|
|
Term
Describe the following modulation types and their common usage:
AM
FM |
|
Definition
Amplitude Modulation is a technique used in electronic communication, most commonly for transmitting information via a radio carrier wave.
Frequency Modulation conveys information over a carrier wave by varying its frequency. |
|
|
Term
Define the following terms as they apply to RADAR:
PRI
PRF
RF |
|
Definition
Pulse Repetition Interval is the elapsed time from the beginning of one pulse to the beginning of the next pulse.
Pulse repetition frequency is the number of pulses per time unit.
Radio Frequency. Freq at which radar operates. |
|
|
Term
Define the following terms as they apply to RADAR:
BW
CW |
|
Definition
Bandwidth is the difference between the upper and lower cut-off frequencies of a radar receiver (measured in hertz)
Continuous-wave radar; non-pulsing. Sending out a very pure signal of a known freq. (Determines velocity, can't determine range) |
|
|
Term
Define the following terms as they apply to RADAR:
PW
Scan Rate |
|
Definition
Pulse Width has units of time and is commonly expressed in ms. (duration of the pulse)
When a radar is scanning, a sufficient number of pulses will be transmitted in any particular direction in order to guarantee reliable detection. |
|
|
Term
Define the following terms as they apply to RADAR:
Bearing
Azimuth
Elevation |
|
Definition
Bearing may be reference to true north or to own ship.
Angular measurement in the horizontal plane in a clockwise direction.
Is the angle between the horizontal plane and the line of sight, measured in the vertical plane. |
|
|
Term
Identify the following types of RADAR, their functions, and give examples of each:
Air Search
Surface Search
Fire Control |
|
Definition
Initially detect and determine the position, course, and speed of air targets.
The detection and determination of accurate ranges and bearings of surface objects and low-flying aircraft. (360 degree search pattern for LOS objects)
To provide target azimuth, elevation, range, and velocity to calculate fire solution. |
|
|
Term
Explain the difference between OPELINT and TECHELINT. |
|
Definition
Is concerned with operationally relevant information such as the location, movement, employment, tactics, and activity of foreign non-comms emitters.
Is concerned with the technical aspects of foreign non-comms emitters such as signal characteristics, modes, functions, etc. |
|
|
Term
Discuss the various types of METOC products available through the Navy Oceanography portal (NOP):
USNO
JTWC
NOOC
FNMOC |
|
Definition
U.S. Naval Observatory provides a wide range of astronomical data and products and serves as the official source of time.
Joint Typhoon Warning Center is the DOD agency responsible for issuing tropical cyclone warnings for the Pacific/Indian Oceans.
|
|
|
Term
Discuss the various types of METOC products available through the Navy Oceanography portal (NOP):
NOOC
FNMOC
|
|
Definition
Naval Oceanography Operations Command advises Navy operations on the impact of ocean and atmospheric conditions.
Fleet Numerical Meteorology and Oceanography Center provides the highest quality, most relevant and timely worldwide meteorology and oceanography support. |
|
|
Term
Discuss the various types of METOC products available through the Navy Oceanography portal (NOP):
NAVO |
|
Definition
Naval Oceanographic Office maximizes sea power by applying relevant oceanographic knowledge in support of National Security. |
|
|
Term
Discuss the capabilities of the following environmental satellites.
GOES
POES
DMSP |
|
Definition
Geostationary Environmental Satellites - the backbone to short term forecasting.
Polar Operational Environmental Satellite are able to collect global data on a daily basis for a variety of land, ocean, and atmosphere apps
Defense Meteorological Satellite Program see's clouds, snow, and fire in the visual and infrared spectra. |
|
|
Term
Discuss the capabilities of the following environmental satellites:
NPOESS
TRIMM |
|
Definition
National Polar-orbiting Operational Environmental Satellite System provides global coverage by circling the earth ever 100 minutes monitoring environmental conditions.
Tropical Rainfall Measuring Mission - is a research satellite designed to help understand the water cycle of the atmosphere. |
|
|
Term
Discuss the following meteorological terms and elements:
Wind direction/speed
Temperature: Ambient air, wind chill, heat stress |
|
Definition
An indicator of where the wind is coming from. Wind speed is the measured motion of air with respect to the surface of the earth.
The temperature of the surrounding air.
The apparent temperature felt on exposed skid due to wind.
A variety of problems associated with very warm temps and high humidity.
|
|
|
Term
Discuss the following meteorological terms and elements:
Precipitation
Relative humidity |
|
Definition
Any product of the condensation of atmospheric water vapor that is pulled down by gravity onto the earth's surface.
The ratio of the amount of water vapor present in the air compared to the greatest amount possible at the same temperature. |
|
|
Term
Discuss the following meteorological terms and elements:
Sky condition
Atmospheric pressure
Air Mass |
|
Definition
The state of the sky when it is covered by clouds.
The pressure exerted by the atmosphere at a given point.
A large volume of air defined by its temperature and water vapor content. |
|
|
Term
Discuss the following meteorological terms and elements:
Cold/warm/occluded front |
|
Definition
The leading edge of a cooler mass of air, replacing a warmer mass of air.
When this occurs, the warm air is separated (occluded) from the low pressure center at the Earth's surface.
Is formed when a cold front overtakes a warm front. |
|
|
Term
Discuss the following meteorological terms and elements:
Tropical depression
Tropical Storm
Hurricane/typhoon |
|
Definition
A closed circulation of low atmospheric pressure which blows counter-clockwise at 34 knots or less.
"..." 34-63 knots.
"..." (strong winds and heavy rain) Greater than 64 knots. |
|
|
Term
What are the two different types of ocean eddies? What are the differences? |
|
Definition
Cold and Warm.
Cold water breaks off from a cold current and travels counter-clockwise into warmer ocean waters.
Warm water breaks off from a warm current and travels clockwise into colder ocean waters. |
|
|
Term
What is the measurement and recording of subsurface water temperature at various depths? |
|
Definition
bathythermograph observation |
|
|
Term
What is the difference between ebb and flood tide? |
|
Definition
Ebb current that flows away from the shore.
Flood current that flows toward the shore. |
|
|
Term
What is a littoral current and a rip current? |
|
Definition
A littoral current produced by the transport of the water caused by the breaking action of the waves.
A rip current is formed when opposing offshore currents bend sections of a littoral current seaward, creating rip currents. |
|
|
Term
What are three different types of breakers? |
|
Definition
Spilling occurs with gentle and flat beach slopes.
Plunging occurs with a moderate to steep beach slope.
Surging is normally seen only with a very steep beach slope. |
|
|
Term
What are narrow areas separating large differences in water temperature, salinity, density, and velocity? |
|
Definition
|
|
Term
Discuss basic relationship of METOC to Geospatial Intel. |
|
Definition
METOC is considered an intelligence layer of the GEOINT information base. |
|
|
Term
Name the 3 types of winds and how many knots are each type. |
|
Definition
Small Craft 33 knots or less
Gale 34 to 47 knots
Storm 48 knots or greater |
|
|
Term
When is it considered a severe thunderstorm? |
|
Definition
With wind gusts 50 knots or greater and/or hail of 3/4 inch diameter or greater |
|
|
Term
When is it considered a hurricane/typhoon? |
|
Definition
Warning for land, harbor, inland water, and ocean areas for winds 64 knots or greater. |
|
|
Term
Discuss the following Tropical Cyclone Conditions of Readiness and who sets them:
COR 5
COR 4
COR 3
COR 2
COR 1 |
|
Definition
COR 5: Possible threat of destructive winds (96 hours)
COR 4: "..." (72 hours)
COR 3: Destructive winds of the force (48 hours)
COR 2: "..." (24 hours)
COR 1: "..." (12 hours) |
|
|
Term
What are the 4 space mission areas? |
|
Definition
Space Force Enhancement
Space Support
Space Control
Space Force Application |
|
|
Term
|
Definition
Is electrically charged particles that stream continuously from the Sun. |
|
|
Term
Name 3 of the 5 types of orbits and their distances from the Earth's surface? |
|
Definition
Low Earth Orbit (approx. 100 and 420 miles)
Medium Earth Orbit (approx. 450 and 10,000)
Highly Elliptical Orbit (Molniya orbit) has an apogee nearly equivalent to the geosynchronous altitude and an inclination of approx. 63 degrees to 64 degrees. |
|
|
Term
What satellite would have a period approximately equal to one day? Approximately how far is it from the Earth? |
|
Definition
Geosynchronous orbit
19,300 nautical miles |
|
|
Term
What orbit has an inclination of 90 degrees? |
|
Definition
|
|
Term
|
Definition
There are 2 Polar Orbiting Environmental Satellites (north and south orbit) |
|
|
Term
Define the following:
Apogee
Perigee |
|
Definition
Apogee is a point on the orbit farthest from the center of the Earth (away)
Perigee is the point closest to the center of the Earth will be halfway around the orbit. (close) |
|
|
Term
How many space shuttle launching sites are there and where are they located? |
|
Definition
3: Kennedy Space Center Cape Canaveral, Wallops Island, Va, Vanderberg AFB, Ca |
|
|
Term
|
Definition
Defense Satellite Communications System is a high capacity, SHF satellite based subsystem that provides jam-resistant comms. |
|
|
Term
What satellite provides high-volume data and video information products to military tactical terminals? |
|
Definition
Global Broadcast Service (GBS) |
|
|
Term
What is the DoD's most capable and powerful communication satellite? |
|
Definition
|
|
Term
Describe a Global Positioning System. |
|
Definition
A satellite-based radio navigation system operated by DoD to provide all military, civil, and commercial users w/ precise positioning, navigation, and timing. |
|
|
Term
Describe the advantages and disadvantages of Space-based Intelligence, Surveillance and Reconnaissance. (ISR) |
|
Definition
The prime advantage of space-based ISR capabilities is their potential to provide systematic and focused coverage of areas of interest.
In addition to the access limitations and a predictable overflight schedule dictated by the satellite orbit, satellite systems can be affected by weather: fog, smoke, etc. |
|
|
Term
Discuss Space Situational Awareness. |
|
Definition
The requisite current and predictive knowledge of the space environment and the operational environment upon which space operations depend. |
|
|
Term
What is a branch of astronomy that deals with measurements of celestial bodies? |
|
Definition
|
|
Term
What is the direction in space of axes which have been defined on the Earth? |
|
Definition
Earth Orientation Parameters |
|
|
Term
What is closely related to positioning but can be distinguished from it by a greater emphasis on determining a meaningful location? |
|
Definition
|
|
Term
What is a system of distributed network time servers that provide an accurate and reliable time synchronization service for computers? |
|
Definition
Computer network time synchronization |
|
|
Term
|
Definition
Is a point-to-point connection between the ship and the Fleet Message Center. |
|
|
Term
Explain why all units commshifting to FSM need a legacy route. |
|
Definition
All units using FSM must have a legacy route in order to provide a means for Top Secret traffic. FSM is only classified to Secret. |
|
|
Term
State the purpose of MMS. |
|
Definition
Multi-Level Mail Server.
Store & fwd message system.
Accessed via phone (STE to SECTERA), encrypted up to Top Secret. |
|
|
Term
|
Definition
Master Update Authority is to process all routing changes and collective changes for all armed forces. Located in NCTAMS PAC and LANT. |
|
|
Term
What is a premise router? |
|
Definition
connect point for each noc to the DISN network |
|
|
Term
What is the difference between an ISSR and an OSSR? |
|
Definition
ISSR is the security filtering for inside the firewalls and OSSR is the security filtering for outside the firewalls |
|
|
Term
|
Definition
Scans inbound and outbound emails and attachments viruses. |
|
|
Term
What is a DNSMail Server? |
|
Definition
DNS and Email (SMTP) store and forward services |
|
|
Term
|
Definition
A cpu that manages the comms between client devices and printers. |
|
|
Term
|
Definition
A cpu attached to a network that has the primary purpose of providing a location for the shared storage of cpu files. |
|
|
Term
|
Definition
A cpu that stores and transfers e-mail from one cpu to another. |
|
|
Term
|
Definition
Performs translation of humanly recognizable domain names and host names into the corresponding IP address. |
|
|
Term
|
Definition
A cpu that delivers content using HTTP over the world wide web. |
|
|
Term
Define and state the purpose of VLAN |
|
Definition
Virtual Local area network a software concept that extends beyond single traditional law to a group of LAN segments. |
|
|
Term
|
Definition
Redundant array of independant disks - a way of storing the same data of storing the same data in different places (thus redundantly) on multiple hard disk. |
|
|
Term
|
Definition
modulator-demodulator. Typically used to send digital data over a phone line. |
|
|
Term
|
Definition
A web interface of outlook web application that resembles microsoft outlook. (access email) |
|
|
Term
Discuss the following IT21 FLTNOCs multi-layered support concepts:
Tier One
Tier Two
Tier Three
Tier Four |
|
Definition
Provide 24/7 troubleshooting ship to shore and primary resource for IT-21 FLTNOC.
Sysadmins are responsible for providing the highest state operational readiness.
Provide specialized system technical support by fleet systems engineering team.
SPAWARSYSCEN Charleston acts as the primary engineering activity for IT-21. |
|
|
Term
|
Definition
Consolidate Afloat Network And Enterprise Services |
|
|
Term
|
Definition
To test whether a particular host is reachable across an IP. |
|
|
Term
|
Definition
To show the route taken by packets across an IP network. |
|
|
Term
|
Definition
Is a device that interconnects 2 or more cpu networks and selectively interchanges packets of data between them. |
|
|
Term
State the purpose of the EKMS Manager? |
|
Definition
Is the CO's primary advisor on matters concerning security and handling of COMSEC material. |
|
|
Term
How often is a CO required to conduct a CMS inspection? |
|
Definition
|
|
Term
How often is CMS Advise and Assist visits? |
|
Definition
|
|
Term
How often is ISIC COMSEC inspections are required? |
|
Definition
Must conduct unannounced EKMS inspections of their subordinate commands and units every 24 months. |
|
|
Term
What are the 3 different types of COMSEC incidents? |
|
Definition
Crypto, personnel, and physical |
|
|
Term
What is the difference between Reportable and Non-reportable PDS? |
|
Definition
Reportable PDS is premature or out-of-sequence use of keying material before its effective date. Non-reportable PDS is improperly completed accounting reports. |
|
|
Term
What are the TPI requirements? |
|
Definition
Two Person Integrity is required for handling, signing, inventory, and destruction for all keying materials. |
|
|
Term
What are the procedures for correcting spillage? |
|
Definition
The usetr shall disconnect the affected media from the network and then notify the organization. |
|
|
Term
|
Definition
Classified information being transmitted on an unclassified network or system. |
|
|
Term
State the sites that have a FMX/DUSC system.
Which one is the master and the alternate? |
|
Definition
NCTAMS PAC, Honolulu, HI (MDUSC)
NCTAMS LANT, Norfolk, VA (ADUSC) |
|
|
Term
Define and state the purpose of MCS. |
|
Definition
The primary purpose of the Regional MCS is to provide PLA-to-Routing Indicator (RI) look up assignment. |
|
|
Term
State the world-wide MCS RI |
|
Definition
Each invalid PLA will receive a RI of RUBDPLA side routed on the original message. |
|
|
Term
|
Definition
Routing Indicator is a code identifying the station or system; Address |
|
|
Term
|
Definition
Originating station routing indicator - service messages are addressed by the telecommunications facility to the serving Nova. |
|
|
Term
|
Definition
Destination Routing Indicator - consists of a six or seven character code identifying the station or system the message will be delivered to upon receipt by Autodin. |
|
|
Term
|
Definition
Navy Automatic Relay Controller is the first four letters of the routing indicator of the Fleet NARC assigned to the servicing NCTAMS/NAVCOMTELSTA system |
|
|
Term
State the RI that MCS will assign to an invalid PLA within a xmitted message. |
|
Definition
Each invalid PLA will receive a RI of RUBDPLA side routed on the original message. |
|
|
Term
Define the following common OPSIGS:
ZBZ
ZUJ
ZEV
ZUG
ZES |
|
Definition
ZBZ: What is the printing acceptability of my signals
ZUJ: Stand by
ZEV: Message is ackowledged
ZUG: Negative
ZUE: Affirmative
ZES: Your message..has been received |
|
|
Term
List the sites that have CUDIXS suites and their capabilities. |
|
Definition
NCTAMS PAC
NCTAMS LANT
NCTS Guam
NCTS Naples
Each site has at least 3 CUDIXS suites and operate two full and one "mini" config. |
|
|
Term
Explain whether each master can radiate each other's CUDIXS and their limitations. |
|
Definition
Due to the geo-synchronous orbit, the satellite has a unique footprint that can only be accessed by those under that footprint. 4 major satellite footprints:
LANT Accessed by LANT & NAPLES
CONUS Accessed by LANT & PAC
PAC Accessed by PAC & Guam
I/O Accessed by Guam & Naples |
|
|
Term
State the purpose of MPS-800. |
|
Definition
Enables sites on IP, ISDN, and High Speed Serial to participate in meetings with each other. |
|
|
Term
What are the 3 fleet multi-channel broadcast packages (fleet satellite broadcasts)? |
|
Definition
PMUL: Pacific
LMUL: Lant
IMUL: Indian Ocean |
|
|
Term
Who administers broadcast? |
|
Definition
BCA - Broadcast Control Authority |
|
|
Term
|
Definition
Broadcast Keying Station introduces message into the Fleet Broadcast Network by generating a key stream broadcast bound information. |
|
|
Term
What are stations that possess a TD-1150 and have connectivity to a particular BKS and BRS? |
|
Definition
BCS - Broadcast Controlling Station |
|
|
Term
What radiates the broadcast signal to the Fleet via Satellite? |
|
Definition
BRS: Broadcast Radiating Station |
|
|
Term
What is the function of DISA? |
|
Definition
Defense Information Systems Agency is to deliver joint and coalition enterprise infrastructure, information sharing services, and command and control that enable joint war fighting. |
|
|
Term
What is the function of the GNOC? |
|
Definition
Global Network Operations & Security Center provides situational awareness of the myriad of networks, systems and applications that make up the GIG and protect/defend that grid from potential cyber threats. |
|
|
Term
|
Definition
Regional Network Operations Security Center monitor and control faults, configuration accounting, performance and security of the NEN elements for which they have operational responsibility. |
|
|
Term
|
Definition
Theater Network Operations & Security Center is network management and CND of the Army's network in a specific functional theater of operations. |
|
|
Term
|
Definition
Fleet Network Operations Center provide a regional gateway from the various comms systems supporting ships to the DISN. |
|
|
Term
What are the 4 Regional FLTNOCs? |
|
Definition
UARNOC - United Atlantic Network Operations Center (NCTAMS LANT)
PRNOC - Pacific Region Network Operations Center (NCTAMS PAC)
ECRNOC - Eastern Central Network Operations Center (NCTS Naples)
IORNOC - Indian Ocean Region Network Operations Center (NCTS Bahrain) |
|
|
Term
What are the 3 criteria to receive IP services from FLTNOCs? |
|
Definition
Must have a valid IATO or ATO obtained from NETWARCOM DAA
Submit an IP services request message
If service will be provided via satellite communications link |
|
|
Term
|
Definition
NOC to NOC is FLTNOC interconnectivity and restoral capability should a FLTNOC lose connectivity on their DSN path. |
|
|
Term
Who is the DON controlling authority for IP assignments? |
|
Definition
Navy NIC - Navy Network Information Center |
|
|
Term
What are the IP Service requests for NIPR/SIPR/SI? |
|
Definition
Communications Information Bulletin
GCIB 3A (NIPR/SIPR)
GCIB 20H (SI) |
|
|
Term
Who is the controlling authority for Navy Firewall Policies? |
|
Definition
Naval Network Warfare Command (NAVNETWARCOM) |
|
|
Term
What are the Fleet SINOCs? |
|
Definition
|
|
Term
|
Definition
Collaboration at Sea is a set of tools that allow replication of information. |
|
|
Term
Explain the role of Technical Control |
|
Definition
To ensure reliable communications through all possible combinations of antennas, transmitters, receivers, frequencies, and terminal equipment. |
|
|
Term
|
Definition
High Speed Global Ring provides an increased transport link between shore facilities. |
|
|
Term
|
Definition
Marconi TNX-1100 ATM switches interconnecting the HSGR. |
|
|
Term
|
Definition
Lucent PSAX 2300 ATM switches interconnecting the HSGR. |
|
|
Term
State how many TNX 1100's make up the HSGR and where they are located. |
|
Definition
5
NCTAMS PAC, LANT, NCTS Bahrain, NCTS San Diego, NCTS Naples |
|
|
Term
|
Definition
Extremely High Frequency Follow-On-Terminal is the terminal used to configure EHF LDR/MDR services. |
|
|
Term
|
Definition
Navy Multi-band Terminal is a high data throughout Navy SATCOM program. |
|
|
Term
|
Definition
Low Data Rate supports 2400 bits per second for information transfer. |
|
|
Term
|
Definition
Medium Data Rate is an upgrade to Milstar provides 4.8 kilobits to 1.544 megabits per second. |
|
|
Term
|
Definition
Point-to-Point is usually an ad hoc service between two EHF terminals. |
|
|
Term
State the satellite and channel for the following FSB packages:
LMUL
IMUL
PMUL |
|
Definition
UFO 6 & 7, Channel 1
UFO 10, Channel 1
UFO 8, Channel 1 |
|
|
Term
|
Definition
EHF Time Division Multiple Access (TDMA) Interface Processor provides an ethernet connection between a ship's ADNS router, MDR, and another ship or shore for IP services. |
|
|
Term
Explain the difference between EC and spot beam and the approximate area covered by each.
EC
Spot Beam |
|
Definition
Earth Coverage: that port of the Earth seen by satellite.
Spot Bream covers 400 nautical mile diameter area at the equator. |
|
|
Term
|
Definition
Commercial Wideband Satellite Program -provides up to 4 Mbps connectivity for data and voice communications. |
|
|
Term
|
Definition
Commercial Broadband Satellite Program is a high data commercial throughput Navy SATCOM program. |
|
|
Term
|
Definition
Wideband Global Satcom will provide DoD wideband communications coverage supporting tactical and fixed users. |
|
|
Term
State the Land Earth Stations (LES) for CBSP. |
|
Definition
NCTAMS PAC - Paumalu, HI and Brewster, WA
NCTAMS LANT - Holmdel, NJ and Fuchsstadt, GE
|
|
|
Term
State the ten DSCS teleport/STEP sites. |
|
Definition
PAC AOR: Wahiawa, HI; Camp Roberts, CA; Ft. Buckner, JP
LANT AOR: Northwest, VA; Landstuhl, Germany; Ft Belvoir, VA; Ft Detrick Maryland
IO AOR: Bahrain
MED AOR: Lago Patria, Italy |
|
|
Term
State the 3 INMARSAT earth stations:
|
|
Definition
Laurentides, Canada
Goonhilly, UK
Auckland, NZ |
|
|
Term
|
Definition
Automated Digital Multiplexing System is a network multiplexer (Timeplex Link/2+) |
|
|
Term
State the bandwidth
DS-0 - 64 Kbps
DS-1 - 1.544 Mbps
T-1 - 1.544 Mbps
E-1 - 2.048 Mbps
DS-3 - 44.736 Mbps
OC-3 - 155.52 Mpbs
OC-192 - 9.953 Gbps
OC-768 - 39.813 Gbps |
|
Definition
|
|
Term
List and explain the 6 INMARSAT configs:
ALFA
BRAVO
CHARLIE
DELTA
ECHO
FOXTROT |
|
Definition
ALFA - 64kbps Voice and Data
BRAVO - 64kbps Voice and Data
CHARLIE - 64kbps Data Only
DELTA - 128kbps Voice and Data
ECHO - 128kbps Voice and Data
FOXTROT - 128kbps Data Only |
|
|
Term
Define and state the purpose of the following VTC mediums:
ISDN
VIXS
DVSG |
|
Definition
ISDN - Integrated Services Digital Network is a circuit-switched telephone network system.
VIXS - Video Information Exchange System provides a secure GENSER SECRET and SCI VTCs.
DVSG - DISN Video Service Global includes UNCLAS, Secret, TS VTC services. |
|
|
Term
|
Definition
Automated Network Control Center replaces manual patch and test facilities ashore with a fully redundant computer-controlled switching and circuit monitoring system. |
|
|
Term
State the purpose of iridium phones. |
|
Definition
Satellite-based commercial communications services providing voice and data communications to users equipped with mobile satellite terminals. |
|
|
Term
Explain the role and discuss services provided by the JFTOC. |
|
Definition
Joint Fleet Telecommunications Operations Center. 24-7 One Stop Shop for C5I needs. (C5I=Command, Control, Communications, Computers, Collaboration, Intelligence) |
|
|
Term
Define the role of NCTS in NETWARCOM. |
|
Definition
Naval Computer Telecommunications Station are not master stations. They are subordinate to their cooresponding area master station and provide support services in their corresponding local area. |
|
|
Term
Explain how a unit attains TIP access |
|
Definition
Units must submit a Satellite Access Request
Then, will create an EHF Service Plan
They will also create a TPP |
|
|
Term
Explain SAR/SAA procedures for the following:
EHF
INMARSAT
CBSP
SHF DSCS |
|
Definition
PACOM requires EHF SAR/GAR to be submitted via CARS.
SAR's are submitted IAW G-CIB 9A1 format 15 days prior to access.
SAR's are submitted IAW G-CIB 7E 30 days prior to access.
SAR's are submitted IAW G-CIB 7E 30 days prior to access. |
|
|
Term
|
Definition
Knowledge Management - comprises a range of strategies and practices used in an organization to identify experiences. |
|
|
Term
Define and state the purpose of ASI. |
|
Definition
Authorized Service Interruption is the best possible communications service be provided to users commensurate with available equipment and facilites. |
|
|
Term
|
Definition
Afloat Electromagnetic Spectrum Operations Program is a surface navy spectrum management software tool. |
|
|
Term
|
Definition
Communications Control Ship is a designated platform respsonsible for the execution of a strike groups communications. |
|
|
Term
State the purpose of FCC-100. |
|
Definition
Multiplexer supports 16 user interfaces. Data for your email and phone lines. |
|
|
Term
State the purpose and explain the two modes of operation of the AN/WSC-3. |
|
Definition
is the US Navy's standard UHF satellite terminal and LOS transceiver.
Satellite mode of operation - user uplinks/downlinks signal from satellite.
Line of Sight mode of operation is station to station communication via direct RF path. |
|
|
Term
State the purpose of AN/USC-61C (DMR) |
|
Definition
Digital Modular Radio system that is based on Wireless information Transfer technology. |
|
|
Term
Define and explain the concept of DAMA. |
|
Definition
Demand Assigned Multiple Access (TD-1271) provides time-division multiplexing of several digital data sources over one satellite channel. |
|
|
Term
Define the following DAMA Operation Modes. |
|
Definition
AC Mode of operation - Auto Dama
DC Mode of operation - Distributed Control |
|
|
Term
|
Definition
Joint UHF Military Satellite Communications Network Integrated controller is the hardware and software suite used by the NCTAMS-SMC. |
|
|
Term
Define and state the purpose of SSA |
|
Definition
Satellite Signal Analyzer monitors satellite receive signals for random noise. |
|
|
Term
|
Definition
Voice Over Internet Protocol delivery of voice communications and multimedia sessions over IP networks. |
|
|
Term
|
Definition
Defense Switched Network is an interbase, non-secure or secure C2 telecommunications system that provides end-to-end command use and dedicated telephone service. |
|
|
Term
|
Definition
Defense Red Switched Network is a global secure voice service that provides to the President, Secretary of Defense, Joint Chiefs of Staff. |
|
|
Term
|
Definition
Plain Old Telephone Service refers to the standard telephone service that most homes use. |
|
|
Term
|
Definition
Afloat Personal Telecommunications Program provides personal calling on board U.S. Navy ships using satellite connectivity. |
|
|
Term
|
Definition
Secure Terminal Equipment provides secure multi-media communications for voice. |
|
|