Create an account
Which battle were the five Sullivan Brothers lost and aboard what ship?
The Battle of Guadalcanal on board the USS Juneau
What are the six areas that comprise Naval Doctrine?
Command & Control, Operations, Warfare, Logistics, Intelligence and Planning
What are the seven principles of Naval Logistics?
Simplicity, Attainability, Flexibility, Economy, Responsiveness, Sustainability, Survivability
What are the five steps to ORM?
Identify Hazards, Assess Hazards, Make Risk Decisions, Implement Controls, Supervise
List the four categories of Hazard Severity
1. May cause death or loss of facility
2. May cause severe injury or damage to national interests
3. May cause minor injury or damage to national interests
4. Minimal threat to personnel or national interests
What are the sub-categories to Mishap Probability?
A. Likely to occur immediately or within a short period of time.
B. Likely to occur in time.
C. May occur in time.
D. Unlikely to occur
List the four Mishap reporting Categories and their respective monetary values.
A: $2 Million or more
B: $500,000 to $2 Million
C: $50,000 to $500,000
D: $20,000 to $50,000
What is the purpose of a HAZREP?
To report that a significant hazardous condition exists that may affect other commands.
What are the three objectives of first aid?
Breathing, Stop Bleeding/Maintain Circulation, Prevent or Treat for Shock
What three classes of ships existed at the inception of the US Navy?
Ships of the Line, Frigates, Sloops of War
What event is concidered to be the greatest loss of Cryptologic Persons?
The attack on the USS Liberty
What events in space were US Navy Sailors involved in?
Mercury 3, Gemini 3, Apollo 11, Apollo 17 and STS-1
Who are the "On the Roof Gang"?
176 Navy and Marine enlisted radio operators considered to be the first Cryptologists.
What was ARPANET?
The world's first operational packet switching network, and one of the networks that came to compose the global internet
What two departments were combined to create the Office of Naval Intelligence?
The Deparment Library and the Office of Intelligence
Who was the founder and the first head of the US Office of Naval Intelligence, with the post of Chief Intelligence Officer?
LT. Theodorus Bailey Myers Mason
Who is recognized as the first American Commissioned Naval Officer and it's first Flag Officer?
The "Naval Act of 1794" provided for the construction of how many frigates which made up the first ships in the US Navy?
What is the name of the oldest commissioned ship in the US Navy and one of the six original ships of the US Navy?
State the mission of the United States Navy
To maintain, train and equip combat ready Naval forces capable of winning wars, deterring aggression and maintaining freedom of the seas.
Who are the members of the NCA?
President of the United States (as commander-in-chief) and the Secretary of Defense (as the deputy to the commander-in-chief) jointly, or their duly deputized successors.
What are the 5 attributes of IA?
Confidentiality, Integrity, Availability, Non-Repudiation and Authentication.
Describe the six programs that make up Brilliant on the Basics
Mentorship, Sponsorship, CDB, Ombudsman, Indoctrination and Sailor Recognition (Awards)
"Provides the right support at the right time, at the right place" is an example of what principle of Naval Logistics?
"Avoiding unnecessary complexity in preparing, planning and conducting logistic operations" is an example of what principle of Naval Logistics?
"Adapting logistic support to changing conditions" is an example of what principle of Naval Logistics?
"Employing logistic support assets effectively" is an example of what principle of Naval Logistics?
"Acquiring the minimum essential logistic support to begin combat operations" is an example of what principle of Naval Logistics?
"Providing logistic support for the duration of the operation" is an example of what principle of Naval Logistics?
"Ensuring that the logistic infrastructure prevails inspite of degredation and damage" is an example of what principle of Naval Logistics?
The crew for the final lunar mission included which two naval officers?
Eugene Cernan and Ronald Evans
Which CT Rating performs collection and analysis of state of the art communications signls, using sophisticated high powered computers, and specialized electronic/magnetic recorders?
Which title of the United States Code outlines the role of armed forces in the United States?
NAVYCYBERFOR executes CCRI's for Navy commands on behalf of?
Defense Information Systems Agency
Which form is designed for on-the-spot over-the-counter purchases of supplies and non-personal services while away from the purchasing office?
What is the formal document that fully describes the planned security tasks required to meet system or network security requirements?
When dealing with IA, what is a certification
Comprehensive Evaluation of Technical and Non-Technical Security Features of an Information System (IS)
List the five steps of the OPSEC process
1. Identify Critical Information
2. Analyze the Threat
3. Analyze the Vulnerabilities
4. Assess the Risk
5. Apply Countermeasures
What is OPSEC (Not what does OPSEC break out to)?
A systematic, proven process that identifies, controls and protects generally sensitive, but unclassified information about a mission, operation or activity.
What is the purpose of Naval Intelligence?
That which supports all aspects of naval operations.
(i.e. Supporting the Commander, Identifying Centers of Gravity and Critical Vulnerabilities, Supporting Planning, Execution of Operations, Protecting the Force, Supporting Combat Assessment and Support to Operating Forces)
What are the five steps of Intelligence?
Planning and Directing, Collection, Processing, Production and dissemination.
What is a collection of updates, fixes, and/or enhancements to a software program delivered in the form of a single installable package?
What is a formal document that fully describes the planned security tasks required to meet system or network security requirements?
Systems Security Authorization Agreement
What is the formal authorization for a system or major application to process information at a specified level of sensitivity in an operational environment?
Authority to Operate
What type of attack is meant to deny, degrade or disrupt normal functionality of a system or network?
Denial of Service
OPREP 3 SITREP
Message to a commander or appropriate higher authority for a specific incident but not meeting the need to notify entire Navy.
What are the six programs for Brilliant on the Basics?
Career Development Board
Command Ombudsman Support
When would a SAER be conducted?
At the time of an incident involving civil or military arrests or charges which could potentially impact continued SCI eligibility.
when should safe combinations be changed?
initial use, change in statue of authorized users, compromise or suspected compromise of container or combination, when a safe is left open or as needed.
Bulkhead Mounted Spares remain in the custody of?
The Department Head
(Department Head of the department for which the spares are used.)
Critical systems are aligned for Emergency Power in the event of a loss of normal power.
Critical equipment and systems that cannot risk loss of data or performance should be placed on Uninterrupted Power supply to assure continued performance during a power outage to allow for transfer of function to an alternate Emergency Operating Center (EOC)
EXAMPLE: UPS battery systems.
NACLC checks are conducted for which type of clearances and at what intervals?
SECRET: 10 Years
CONFIDENTIAL: 15 Years
What does CUDIXS do?
IT's a shore-based, computer controlled system that handles message echanges between ships/shore/ships
With regards to messaging, what is NOVA
NOVA is a message handling system that employs First-In-First-Out protocols. It's a system used for handling messages from one command to another.
What is INMARSAT used for?
Merchant ship communications. It's employed by the Navy as a last resort form of communications when other preferred systems aren't functioning correctly or in emergency situations.
Automatic Message Handling System
(Part of NEWSDEALER messaging switching system)
(Web based message handling system)
What categories fall under EEFI?
01 - Position
02 - Capabilities
03 - Operations
04 - Electronic Warfare
05 - Personnel
06 - COMSEC
07 - Wrong Circuit
RIVER CITY 2
More restrictive. Considered for high visibility VIP visits, TLAM/airstrike planning, MIO operations, high visibility/threat area port visits.
RIVER CITY 1
Most restrictive. Considered for adversary attack, massive casualties, ship/submarine severely damaged/missing/lost, acft missing/lost, man overboard, shipboard fire and incidents that require special handling or could result in an international incident.
Communications Spot (Report)
Report sent by any platform when experiencing communications difficulties or failure of a communications system. Used to notify upper echelon commanders of communications difficulties of deployed or shore based units.
With respect to the Reserves, what is an ARI?
Active Reserve Integration (Officer)
They assist commands with placement of activated reserves for job placement. (Active/Weekend Activation/Temporarily Activated)
Maritime Operations Center
(Allows the Navy to maintain a state of readiness, providing commanders with all the necessary resources to constantly manage operations and be able to smoothly transition from peacetime operations to disaster relief operations and major combat operations while still handling fleet management functions.)
What are the core capabilities of IO (Information Operations)?
Psyops, Mildec, OPSEC, EW and CNO (CND, CNA, CNE)
Host is a system that provides a service and a client is a system that requests a service from a host.
Hosts share resources with one or more clients. Clients do not share resources with hosts.
What can be a disadvantage to a host server?
If too many clients connect to it, it may become overloaded.
Device connecting multiple systems together using wires and making the seperate components work together as a single unit.
Acts as an intermediary for requests, applies filter rules and approves or denies the establishment of a connection.
(Filter by IP address or protocol)
Investment strategy for procuring computers and networking software for an intranet between ships
Mal-ware, appears to provide a desirable function, but facilittes unauthorised access to a system
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together