How can we help?

You can also find more resources in our Help Center.

258 terms

EIDWS Common Core

This is study material for the EIDWS Common Core, specifically tailored to NCDOC's board questions. Under the question is a numerical representation for section and sub-section ( ex. 1.1.1a, book 1, section 1, subsection 1, part A).
STUDY
PLAY
What is the concept of ORM?
1.1.1
Operational Risk Management - Decision making tool used by personnel at all levels to minimize risk to acceptable levels.
Name the 5 steps of ORM.
1.1.2
(I AM IS)
Identify Hazards, Assess Hazards, Make Risk Decisions, Implement Controls, and Supervise.
State the instruction that governs safety and mishap reporting.
1.1.3
OPNAVINST 5102.1D
Define Hazard Severity and the 4 categories of Hazard Severity.
1.1.4
An assessment of the potential consequence that can occur due to exposure to a hazard.
1-May cause death, loss of assets or cause grave damage to national interests.
2-May cause severe injury, illness, property damage or damage to national interests.
3-May cause minor injury, illness, property damage or damage to national interests.
4-Minimal threat to personnel safety, property and national interests.
Define mishap probability and 4 subcategories of mishap probability.
1.1.5
Assessment of the likelihood that a consequence may occur due to a hazard.
1-Likely to occur immediately or in a short period of time.
2-Probably will occur in time.
3-May occur in time.
4-Unlikely to occur, but not impossible.
Define RAC and list its categories.
1.1.6
RAC - Risk Assessment Code
1-Critical, 2-Serious, 3-Moderate, 4-Minor, 5-Negligible
Discuss the timeliness and means for filing mishap investigations reports.
1.1.7
Reports involving Class A mishaps and any mishaps that result in the hospitalization of 3 or more personnel must be submitted within 8 hours. All other reports must be submitted within 30 days.
Name the 4 required mishap reportable items.
1.1.8
1. Government property damage mishaps.
2. Civilian and military on/off-duty mishaps.
3. Any work-related illness or injury
4. Incidents of interest for mishap prevention purposes.
State the purpose of a HAZREP message.
1.1.9
Submitted when the elimination and control of a given hazard has community-wide implication in reducing mishaps.
What are the 3 objectives of First Aid?
1.1.10
1-Save Lives
2-Prevent further injury
3-Prevent infection
What are the 3 methods of controlling bleeding?
1.1.11
1-Direct pressure
2-Pressure points
3-Constricting Bands
Identify 11 pressure points.
1.1.12
1-Temple, 2-Jaw, 3-Neck, 4-Shoulder (Collar Bone), 5-Above the Elbow, 6-Wrist, 7-Hand, 8-Groin, 9-Thigh, 10-Knee, 11-Ankle
Describe the symptoms and treatment for shock.
1.1.13
Symptoms: Cold skin, weak and rapid pulse, loss of consciousness.
Treatment: Keep person lying down and warm, head below feet to help blood flow to the brain.
What is the difference between Open and Closed fracture?
1.1.14
Open - bone is protruding through skin.
Closed - bone is cracked, but did not break the skin.
Describe the procedures necessary for personnel rescue as applied to electrical shock.
1.1.15a
Do not touch victim's body or anything conducting electricity. Try to turn off the source of electricity or use non-conducting object to separate the victim from the power source.
Describe the procedures necessary for treatment as applied to electrical shock.
1.1.15b
Check Airway, Breathing, Circulation (ABC). If there is no pulse, administer CPR or artificial ventilation immediately.
Describe the methods of clearing an obstructed airway.
1.1.16
1-Standing Abdominal Thrust, 2-Reclining Abdominal Thrust, 3-Standing Chest Thrust, 4-Reclining Chest Thrust
Describe the effects and treatment of the following temperature related injuries:
a. Hypothermia
1.1.17a
a. When the body reaches subnormal levels below 95 degrees. Treat by minimizing heat loss from the body.
Describe the effects and treatment of the following temperature related injuries:
b. Frostbite
1.1.17b
b. Affected parts of the body turn stiff, pale, or freezes due to cold. Treat by re-warming the tissue.
Describe the effects and treatment of the following temperature related injuries:
c. Heat Stress
1.1.17c
c. Increase in body temperature due to exposure to extreme heat or hot environments. The body is unable to cool itself by sweating. Heat stress can lead to Heat Exhaustion and Heat Stroke. Treat by removing individual from the environment.
Describe the effects and treatment of the following temperature related injuries:
d. Heat Exhaustion
1.1.17d
d. Body temperature is 101.5 degrees and above. Skin looks gray, cold, moist and clammy. Treat victims as if they were in shock.
Describe the effects and treatment of the following temperature related injuries:
d. Heat Stroke
1.1.17e
e. Body temperature is extremely high (105 degrees or higher), sweating mechanism breaks down. Treat by reducing body heat immediately.
Define HERO, HERP, and HERF.
1.1.18
HERO - Hazards of Electromagnetic Radiation to Ordnance.
HERP - Hazards of Electromagnetic Radiation to Personnel.
HERF - Hazards of Electromagnetic Radiation to Fuel.
Define HAZMAT.
1.1.19
Materials that have been deemed hazardous in or out of its normal state that can cause injury or death if inhaled, eaten, or exposed to skin.
Discuss how to store HAZMAT.
1.1.20
Store in accordance with its Material Safety Data Sheet (MSDS) in a secured location.
Describe potential risks of improperly labeled and stored HAZMAT.
1.1.21
Fires, explosions, poisonous gases, death.
What is an MSDS and what information does it provide?
1.1.22
Material Safety Data Sheet - identifies material, its makeup, how to store it, and how to dispose of it, as well as all safety precautions.
Describe the general characteristics of the following PPE.
a. Respirators
b. Hand Protection
c. Foot Protection
d. Eye Protection
e. Face Protection
f. Skin/Body Protection
g. Hearing Protection
1.1.23
Personal Protective Equipment - Self explanatory.
State the goal of the U.S. Navy's Hearing Conservation Program.
1.1.24
To prevent occupational hearing loss and assure auditory fitness for Navy personnel.
What are the 6 areas that comprise Naval Doctrine?
1.2.1
(COWLIP)
Command and Control
Operations
Warfare
Logistics
Intelligence
Planning
State the 7 principles of Naval Logistics.
1.2.2
(FREASSS)
Flexibility
Responsiveness
Economy
Attainability
Simplicity
Sustainability
Survivability
What was the first ship named after an enlisted person and why?
1.2.3
USS Osmond Ingram
He was the first enlisted person to be killed in combat during WWI.
Discuss the conditions that led to the formation of the U.S. Navy.
1.2.4
2nd Continental Congress authorized the purchase of 2 ships to protect US Merchant vessels from the British.
Name the 3 classes of naval vessels that existed at the inception of the Navy.
1.2.5
Ships-of-the-line
Sloops of War
Frigates
Discuss the following military customs and courtesies:
a. Hand Salute
1.2.6a
a. The hand salute is centuries old and probably originated when men in armor raised their helmet visors so they could be identified.
Discuss the following military customs and courtesies:
b. Saluting the Ensign
1.2.6b
b. Each person in the naval service, upon coming on board a ship of the Navy, shall salute the national ensign. Coming on board salute Ensign then the Officer of the Deck, when leaving salute in reverse order.
Discuss the following military customs and courtesies:
c. Dipping the Ensign
1.2.6c
c. Merchant ships "salute" Navy ships by dipping their ensigns. Merchant ships or vessels with the lowest ranking officer dip the ensign first, and then the Navy vessel or higher ranking vessel returns the gesture. The Navy does not dip the Ensign first to any non-US Navy ship.
Discuss the following military customs and courtesies:
d. Gun Salute
1.2.6d
d. A national salute of 21 guns is fired on Washington's Birthday, Memorial Day, and Independence Day and to honor the President of the United States/heads of foreign states. Salutes to naval officers are as follows:
Admiral: 17 guns
Vice Admiral: 15 guns
Rear Admiral (upper half): 13 guns
Rear Admiral (lower half): 11 guns
Discuss the importance of the following events as they relate to naval history:
a. Battle of Coral Sea
1.2.7a
a. 7-8 May 1942 -U.S. broke JN-25 code and was able to discern Japanese plans in time for Allied fleets to assemble in the Coral Sea. Actions allowed for a successful prevention of the Japanese invasion of Tulagi island (Solomon sea) and Port Moresby (off the coast of New Guinea). First battle fought entirely by air, neither side saw each other. USS Lexington was lost.
Discuss the importance of the following events as they relate to naval history:
b. Voyage of the Great White Fleet
1.2.7b
b. 16 December 1907- The Japanese navy dominated the Pacific and posed a potential threat to the Philippines. The United States was ill-prepared for war. Most of our battle fleet was concentrated in the Atlantic, and there were only a handful of armored cruisers on duty in the Pacific. To impress upon Japan that the U.S. Navy could shift from the Atlantic to the Pacific, Roosevelt ordered the Great White Fleet to sail around the world.
Discuss the importance of the following events as they relate to naval history:
c. Battle of Normandy
1.2.7c
c. 6 June 1944 - The largest amphibious assault in history. Military deception was used to confuse and prevent Germany from knowing when and how the assault would be carried out.
Discuss the importance of the following events as they relate to naval history:
d. Midway
1.2.7d
d. 4-7 June 1942 - The turning point of the Pacific war. The U.S. breaking of the Japanese JN-25 naval code provided intel of the attack a week in advance.
Discuss the importance of the following events as they relate to naval history:
e. Guadalcanal
1.2.7e
e. 7 August 1942 - 8 February 1943: Allies' first major offensive action in the Pacific. Though both sides suffered heavy losses, Japan was ultimately forced to retreat and endure costly losses that they could not recover from due to the loss they suffered earlier at Midway. Sullivan bros tragedy reinforced family separation on Navy ships.
Discuss the importance of the following events as they relate to naval history:
f. Battle of Leyte Gulf
1.2.7f
f. 23-26 October 1944 - Largest naval battle in WWII, nearly destroyed all of the Japanese fleet. After the battle Japan lost the Philippines and was unable to utilize resources from Southeast Asian territories.
Discuss the following events, their impact on history, and the Sailors that were involved:
a. Mercury 3
1.2.8a
a. 5 May 1961 - First U.S. manned space flight by astronaut Alan Shepard.
Discuss the following events, their impact on history, and the Sailors that were involved:
b. Gemini 3
1.2.8b
b. 23 March 1965 - First U.S. 2 manned space mission led by astronauts Virgil Grissom and John W. Young.
Discuss the following events, their impact on history, and the Sailors that were involved:
c. Apollo 11
1.2.8c
c. 16-24 July 1969 - First manned Lunar landing led by astronauts Neil Armstrong and Buzz Aldrin.
Discuss the following events, their impact on history, and the Sailors that were involved:
d. Apollo 17
1.2.8d
d. 7-19 December 1972 - Sixth and last Lunar landing mission led by astronauts Eugene A. Cernan, Ronald E. Evans.
Discuss the following events, their impact on history, and the Sailors that were involved:
e. STS-1
1.2.8e
e. 12 April 1981 - (STS - Space Transportation System) First shuttle mission/shuttle systems test flight aboard the space shuttle: Columbia led by astronauts John W. Young and Robert L. Crippen.
Describe the historical significance of the following events as they relate to Information Dominance:
a. The On the Roof Gang
1.2.9a
a. 1928-1941 - 176 enlisted radio operators attended classes set on top of the old Navy Headquarters Building in Washington DC. They trained the first radiomen to collect enemy signals.
Describe the historical significance of the following events as they relate to Information Dominance:
b. The Purple Code
1.2.9b
b. Cryptologic machine used by Japan and Germany during WWII. Once broke, allowed the allies to read dispatches between Japan and Germany.
Describe the historical significance of the following events as they relate to Information Dominance:
c. The Battle of Midway
1.2.9c
c. 4-7 June 1942 - United States broke the Japanese JN-25 code, ultimately allowing U.S. allied forces to prepare for an impending Japanese attack at Midway which led to victory in the clash.
Describe the historical significance of the following events as they relate to Information Dominance:
d. The Attack on the USS Liberty
1.2.9d
d. 8 June 1967 - While on an intelligence collection mission, the USS Liberty was attacked by Israeli fighters. 34 Cryptologic personnel died. Largest loss of life in an intelligence gathering event in U.S. history.
Describe the historical significance of the following events as they relate to Information Dominance:
e. The Capture of the USS Pueblo
1.2.9e
e. 23 January 1968 - While on an intelligence gathering mission, USS Pueblo was captured by North Korea. Largest single loss of classified material in U.S. history.
Describe the historical significance of the following events as they relate to Information Dominance:
f. D-Day Landing
1.2.9f
f. 6 June 1944 - The largest amphibious assault in history. Military deception and counterintelligence was used to confuse and prevent Germany from knowing when and how the assault would be carried out.
Describe the historical significance of the following events as they relate to Information Dominance:
g. Landing at Inchon
1.2.9g
g. 15 September 1950 - Successful U.N. amphibious invasion during the Korean War. Naval intelligence was provided from a recon team placed in Inchon which contributed to the success of the invasion.
Describe the historical significance of the following events as they relate to Information Dominance:
h. Hainan Island EP-3 Incident
1.2.9h
h. 1 April 2001 - EP-3 was a collection plane that went down in China. Classified data was not destroyed and eventually recovered by the People's Liberation Army Navy.
Describe the historical significance of the following events as they relate to Information Dominance:
i. Bletchley Park
1.29i
i. Known as "Station X" during WWII. Site of United Kingdom's main decryption establishment, a government code and cipher school. German enigma was decrypted there.
Describe the historical significance of the following events as they relate to Information Dominance:
j. The Navajo Code Talkers
1.2.9j
j. Navajo language was used by U.S. Allied forces to transmit codes during WWII. The code was never broken by the Axis powers.
Describe the historical significance of the following events as they relate to Information Dominance:
k. The Attack on the USS Stark
1.2.9k
k. Only successful anti-ship missile attack on a U.S. Navy warship.
Describe the historical significance of the following events as they relate to Information Dominance:
l. EC-121 Shoot Down
1.2.9l
l. Plane was shot down while on a recon intelligence gathering mission near North Korea. Everyone on board died. U.S. Navy adopted new procedures to provide higher degree of protection for recon aircrafts.
State the qualities that characterize the Navy/Marine Corps team as instruments to support national policies.
These qualities are readiness, flexibility, self-sustainability, and mobility. They permit naval forces to be expeditionary - that is, being able to establish and maintain a forward-based, stabilizing presence around the world.
State the 3 levels of war.
1.2.11
(STO)
Strategic, Tactical, and Operational
What is the significance of the National Security Act of 1947?
1.2.12
Signed by President Truman. Established the CIA, NSC (National Security Council), the Air Force and merged the Department of War (Army) with the Department of the Navy into the National Military Establishment (Department of Defense).
State when and why the Navy Core Values were established.
1.2.13
Navy Core Values were established and adopted by CNO Admiral Kelso in 1992 in response to the Tailhook Incident of 1991.
State when and why the Sailor's Creed was developed.
1.2.14
The "Sailors Creed" was written by a "Blue Ribbon Recruit Training Panel" in 1993 at the direction of Chief of Naval Operations Admiral Frank Kelso to describe every sailor from e-1 to 0-10.
State RADM Grace Hopper's contributions to the U.S. Navy.
1.2.15
RADM Hopper conceptualized machine programming languages which led to the development of Common Business-Oriented Language (COBOL). She was said to have also coined the terms "computer bug" and "debugging".
State the name of the first computer and where it was located.
1.2.16
Electronic Numerical Integrator and Computer (ENIAC). Located at the University of Pennsylvania.
Discuss ARPANET and when it was developed.
1.2.17
April to December 1969 - Advanced Research Projects Agency Network (ARPANET) was one of the world's first operational packet switching networks. First network to implement TCP/IP.
Explain the impact of the John Walker espionage case.
1.2.18
He began spying for the Soviet Union in December 1967. Damage is unknown, led to the formation of two person integrity.
State the oldest intelligence organization in the U.S. Navy.
1.2.19
Established 23 March 1882, Office of Naval Intelligence (ONI).
Explain when ONI was established and by whom it was founded.
1.2.20
Established 23 March 1882, founded by Secretary of the Navy William Hunt.
State the first CIO/DNI.
1.2.21
First Chief Intelligence Officer/Director of Naval Intelligence was Theodorus Bailey-Myers-Mason.
Name the 2 departments that were combined to form the ONI.
1.2.22
The Department Library was combined with the Office of Intelligence.
State the mission of the US Navy.
1.3.1
Maintain, train, and equip combat ready naval forces capable of winning wars, deterring aggression, and maintaining freedom of the seas.
Discuss the the NCA, its members and functions.
1.3.2
National Command Authority
Est. by the National Security Act of 1947
Consists of the U.S. President and the Secretary of Defense. Function is to command authority over the Joint Chiefs of Staff and the unified military departments.
What is the difference between ADCON and OPCON?
1.3.3
Administrative Control vs Operational Control
ADCON has authority over subordinates with respect to admin and support, control of resources, logistics, and training.
OPCON has authority to organize commands and control the application of force.
What is the function of a COCOM?
1.3.4a
Combatant Commander - Non-transferable command authority over assigned forces.
What is the function of a Navy COCOM?
1.3.4b
Command authority over Atlantic Fleet, Pacific Fleet, Navy Forces Europe, Navy Forces Central.
What is the function of FLTCOM?
1.3.4c
Fleet Commander - Overall responsibility for the operations of the Fleet in their AOR. There are 7 numbered fleets.
What is the function of a TYCOM?
1.3.4d
Type Commander
Responsible for the Mission and Component Commands, which consist of personnel, training and logistics.
What is the location and mission of PACOM?
1.3.5a
Pacific Command, Camp Smith, Pearl harbor, HI
Provides Asia/Pacific stability and security.
What is the location and mission of EUCOM?
1.3.5b
European Command, Stuttgart, Germany
Provides transatlantic and European stability and security.
What is the location and mission of JFCOM?
1.3.5c
Joint Forces Command, Suffolk, VA (Disestablished)
What is the location and mission of SOUTHCOM?
1.3.5d
Southern Command, Miami, FL
Joint Ops command to enhance regional security in South and Central America.
What is the location and mission of CENTCOM?
1.3.5e
Central Command, MacDill AFB, Tampa, FL
Responsible for interactions with the Middle East and Central Asia.
What is the location and mission of NORTHCOM?
1.3.5f
Northern Command, Peterson AFB, CO
Provide homeland defense, support, and security.
What is the location and mission of SOCOM?
1.3.5g
Special Operations Command, MacDill AFB, Tampa, FL
Provide support for Special Operations (i.e. SEAL Teams, etc.)
What is the location and mission of TRANSCOM?
1.3.5h
Transportation Command, Scott AFB, IL
Provides deployment support.
What is the location and mission of STRATCOM?
1.3.5i
Strategic Command, Offutt AFB, NE
Leaders in Strategic Deterrence and Preeminent Global Warfighters In Space and Cyberspace
What is the location and mission of AFRICOM?
1.3.5j
Africa Command, Stuttgart, Germany
Provide peacekeeping as well as health and security in Africa.
What is the location and mission of USCYBERCOM?
1.3.5k
United States Cyber Command, Fort Meade, MD
Charged with pulling together existing cyberspace resources, creating synergy and synchronizing war-fighting effects to defend the information security environment.
State the location, mission and component commands for the following:
a. CNO N2/N6
1.3.6a
Director of Naval intelligence/Deputy Chief of Naval Operations. A critical link to the intelligence community.
State the location, mission and component commands for the following:
b. CNMOC
1.3.6b
Commander, Naval Meteorology and Oceanography Command.
State the location, mission and component commands for the following:
c. NNWC
1.3.6c
Naval network Warfare Command, Norfolk, VA - Security of Global information Grid (GIG).
State the location, mission and component commands for the following:
d. Commander, Reserve Space and Network Warfare Program
1.3.6d
Sponsor reserve space and support Navy space team.
State the location, mission and component commands for the following:
e. Commander, USSTRATCOM
1.3.6e
Ensures freedom of action in space and cyberspace.
State the location, mission and component commands for the following:
f. Joint Space Operations Center
1.3.6f
Provide capabilities to conduct space operations.
State the location, mission and component commands for the following:
g. NOAA
1.3.6g
National Oceanic and Atmospheric Administration
State the location, mission and component commands for the following:
h. Naval Space Operations Center
1.3.6h
Maintain a Constant surveillance of space and provide space control support and space force enhancement support
State the location, mission and component commands for the following:
i. NAVYCYBERFOR
1.3.6i
Navy Cyber Forces, Suffolk, VA - Provides command and control for cryptology and space.
State the location, mission and component commands for the following:
j. ONI
1.3.6j
Office of Naval intelligence, Suitland, MD. Produces meaningful maritime intel rapidly to key strategic, operational, and tactical decision-makers.
State the location, mission and component commands for the following:
k. Office of Oceanographer/Navigator of the Navy
1.3.6k
Provides naval, joint, and coalition war fighters with environmental understanding of the air, surface, and subsurface maritime battle space - Washington, D.C.
Define the operating areas of the numbered fleets.
a. 2nd Fleet
b. 3rd Fleet
c. 4th Fleet
d. 5th Fleet
e. 6th Fleet
f. 7th Fleet
g.10th Fleet
1.3.7
2nd - Norfolk, VA - Western Atlantic and Continental U.S.
3rd - San Diego, CA - Eastern and North Pacific
4th - Mayport, FL - Caribbean and Central/ Eastern South America
5th - Manama, Bahrain - Indian Ocean, Suez Canal, Red Sea, Arabian Gulf.
6th - Naples, Italy - Eastern Atlantic Ocean, Mediterranean and Northern sea.
7th - Yokusuka, Japan - Western Pacific, North of Antarctic
10th - Ft. Meade, MD - Cyber Domain
Define the following: TF, TG, TU, TE.
1.3.8
Task Force - 1020 (USCYBERCOM)
Task Group - 1020.1 (NCDOC)
Task Unit - 1020.1.1 (Ship inside Strike Group)
Task Element - 1020.1.1.1 (squadrons on ship)
Describe the Following IDC ratings.
a. AG
b. CTI
c. CTM
d. CTN
e. CTR
f. CTT
g. IS
h. IT
1.3.9
a. Aerographer's Mate
b. Cryptologic Technician Interpretive
c. Cryptologic Technician Maintenance
d. Cryptologic Technician Networks
e. Cryptologic Technician Collection
f. Cryptologic Technician Technical
g. Intelligence Specialist
i. Information System Technician
State the location, mission, and component commands of the following Naval and computer Telecommunication Area Master Stations (NCTAMS).
a. NCTAMS LANT
b. NCTAMS PAC
1.3.10
a. Norfolk, VA - Provide secure and reliable telecommunications in support of C4I (Command, Control, Communications, Computers, and intelligence) for Atlantic Fleet.
b. Wahiawa, HI - Provide secure and reliable telecommunications in support of C4I for Pacific Fleet.
Define C4ISR.
1.3.11
Command, Control, Communications, Computers, Intelligence Surveillance and Reconnaissance.
Explain the mission of the DISA.
1.3.12
Defense information System Agency - Provide command and control capabilities while assuring global net-centric enterprise in direct support to full spectrum of operations.
Explain the mission of the NASIC.
1.3.13
Naval Air and Space Intelligence Center - Provides Intel directly to military unit's development and sustainment of U.S. air, space, and cyberspace capabilities.
State the Mission of NCDOC.
1.3.14
Coordinate, monitor, and oversea the defense of Navy computer networks and systems and to be responsible for accomplishing computer network defense (CND) missions as assigned by Commander, U.S. 10th Fleet and Commander, USCYBERCOM.
Identify and discuss the following organizations and their roles in the intelligence community.
a. ODNI
b. DIA
c. NSA
d. CIA
e. NGA
f. DHS
g. FBI
h. DEA
i. DOE
1.3.15a
a. ODNI: Office of Director of National Intelligence
b. DIA: Defense Intelligence Agency
c. NSA: National Security Agency
d. CIA: Central Intelligence Agency
e. NGA: National Geospatial Intelligence Agency
f. DHS: Department of Homeland Security
g. FBI: Federal Bureau of Investigation
h. DEA: Drug Enforcement Agency
i. DOE: Department of Energy
Identify and discuss the following organizations and their roles in the intelligence community.
j. DOS
k. DOT
l. NASA
m. NRO
n. USAF
o. USA
p. USMC
q. USN
r. USCG
1.3.15b
j. DOS: Department of State
k. DOT: Department of Transportation or Treasury
l. NASA: National Aeronautics and Space Administration
m. NRO: National Reconnaissance Office
n. USAF: US Air Force
o. USA: US Army
p. USMC: US Marine Corps
q. USN: US Navy
r. USCG: US Coast Guard
Describe the role of the following:
Commander in Chief, SecDef, SecNav, CNO, Fleet Commander, and Type Commander.
1.4.1
Commander in Chief, President of the US (Barrack Obama)
SecDef - head of DoD (Chuck Hagel)
SecNav - policies and control of Navy (Ray Mabus)
CNO - Senior Naval Officer, adviser to Pres & SecNav (ADM Jonathan W. Greenert)
Fleet Commander - Commands designated Fleet AOR (Adm. Rogers)
TYCOM - Squadron or ship commander (Adm. Herbert)
Describe the role of the following:
MCPON, Fleet Master Chief, Force Master Chief, Command Master Chief.
1.4.2
MCPON - Senior Enlisted Leader (SEL) of the Navy, adviser to CNO (Mike Stevens)
Fleet MC - Responsible for the larger fleet commands such as PAC Fleet. There are 5 Fleet MCs in the Navy.
Force MC - Responsible for larger force commands such as submarine force in U.S. Atlantic Fleet. There are 10 Force MC positions in the Navy.
CMC - SEL at a command that works as a liaison between the Commanding Officer and the enlisted ranks. (Master Chief Brashear)
Define CCRI.
1.4.3
Command Cyber Readiness Inspection - A formal inspection conducted under the direction of USCYBERCOM to ensure compliance with information assurance and CND policies.
State NAVYCYBERFOR's role in an CCRI.
1.4.4
Office of the Designator Approving Authority (ODAA) for operating a network.
What is the purpose of the following:
EDVR, ODCR, and AMD?
1.4.5
EDVR (Enlisted Distribution & Verification Report) - provides command all pertinient information concerning sailors attached to their UIC to include gains, losses, TIR, TAD, NECs, transfers, etc.
ODCR (Officer Distribution Control Report) - Monthly statement of officer manpower accounts for pertinent Navy activities.
AMD (Activity Manpower Document) - Manning requirements for naval activities.
What is the purpose of the following:
Eval Report, Fitness Report, and Concurrent Report?
1.4.6
Eval - Sailor's performance in the last year. E6 and below.
Fitness - Evaluation reports for officers.
Concurrent - Performance record for a member whom is away from parent command more than 90 days.
What is found on the following pages of a Service Record: Page 2, 4, SGLI and 13?
1.4.7
Page 2 - Emergency data and dependents
Page 4 - Enlistment qualifications history
SGLI - Service Member's Group Life insurance coverage.
Page 13 - Administrative Remarks
What is the purpose of a SITREP and what are its categories?
1.4.8
(Situational Report) provides timely information on critical situations and military operations.
Pinnacle - National Level interest
Navy Blue - High Navy interest
Unit SITREP - Operational commander level of interest
Discuss the importance of the IG.
1.4.9
Office of the Inspector General conduct and supervises audits/investigations relating to the programs and operations of the DOD.
State the purpose of the Navy Correspondence Manual.
1.4.10
Provides the user with the proper means of drafting Navy Correspondence from formatting to proper titles and spacing.
Explain the PTS Program.
1.4.11
Perform to Serve - was used for retention purposes to determine whether an individual was eligible to re-enlist and the manning volumes for each rating. Replaced by Career Way Points.
List officer programs available to enlisted members.
1.4.12
1. US Naval Academy and Naval Academy Preparatory School
2. Selection and Training Program (BOOST)
3. Officer Candidate School (OCS) Program
4. Limited Duty Officer (LDO) and Chief Warrant Officer (CWO) Programs
5. Seaman to Admiral-21 (STA-21) Program
6. Medical Enlisted Commissioning Program
7. Medical Service Corps in-service Procurement Program
Explain what the DLPT is.
1.4.13
Defense Language Proficiency Test
State the duties and responsibilities of the Command ESO.
1.4.14
Educational Services Officer assists the Executive Officer in administering educational programs.
Explain the purpose of the U.S. Navy's Drug Screening Program.
1.4.15
Randomly screen Sailors for Drug abuse/consumption.
Describe the 6 programs of Brilliant on the Basics.
1.4.16
1 - Career Development Boards
2 - Sponsorship
3 - Mentorship
4 - Sailor Recognition
5 - Command Indoctrination
6 - Command Ombudsman
Explain the purpose of the PAO.
1.4.17
Public Affairs Officer - Coordinate between media outlets and the command's OPSEC officer to prevent sensitive material from being disclosed to the public.
What is the purpose of 3-M?
1.5.1a
Materials Maintenance Management - Provides for managing maintenance and materials support to achieve maximum equipment operation readiness.
What is the purpose of PMS?
1.5.1b
Preventative Maintenance System - standardized method for planning, scheduling, and accomplishing preventative maintenance.
What is DPAS?
1.5.2
Defense Property Accountability System - software developed to standardize property accountability for all of DoD.
What is CASREP and its 4 categories?
1.5.7
Casualty Reporting
CAT1: Non-sufficient impact on Command.
CAT2: Minor degradation of secondary mission.
CAT3: Major degradation of secondary mission or Minor
degradation of a primary mission.
CAT4: Loss of at least one primary mission (i.e. DIW).
Define the term NSN.
1.5.8a
National Stock Number - 13 digit number, first 4 are Federal Supply Group and Class. Assigned by the Defense Logistics Agency.
What is "Cognizance" (COG)?
1.5.8b
Symbol used to provide supply management Information.
What is the purpose of DD Form 1348-6?
1.5.9a
DoD Single Line Item Requisition System Document.
What is the purpose of NAVCOMPT 2276?
1.5.9b
Contractual procurement.
What is the purpose of NAVSUP 1250-2?
1.5.9c
Requisition material that does not have an NSN.
What is the purpose of DD Form 448?
1.5.9d
Military interdepartmental purchase request.
What is the purpose of Standard Form 44?
1.5.9e
Designed for on the spot, over the counter purchases of supplies and services while away from the purchasing office. Purchase of materials and services have a limit of $2500, except aviation fuel, $25,000.
What is the purpose of DD Form 1155?
1.5.9f
Shipment invoice.
What is the purpose of Standard Form 1449?
1.5.9g
Solicitation/Contract/Order for Commercial items.
What is the purpose of SF 30?
1.5.9h
Modification of contract.
What is the purpose of DD Form 200?
1.5.9i
Survey Form - for missing or non-repairable electronic test equipment.
What is the purpose of SF 364?
1.5.9j
Report of Deficiency - for shipping or packing discrepancies.
What is the purpose of SF 386?
1.5.9k
Quality Deficiency Report - to report deficiencies in materials received.
What is the purpose of SF 1149?
1.5.9 (for a newer edition)
Transfer items from one command to another.
What is "CHRIMP"?
1.5.10a
Consolidated Hazardous Material Re-utilization and inventory Management program - A program that hazardous material control and management plan calling for all Hazardous Materials to be centrally controlled onboard ships.
Explain OPTAR and its components.
1.5.12
Operating Target
Estimated amount of money that will be required by an operating unit to perform its assigned tasks and functions.
State the difference between the following:
Normal Power, Emergency Power, and Uninterrupted Power.
1.5.13
Normal Power - power for everyday use.
EMC Power - backup power if normal power fails.
Uninterrupted Power (UPS) - battery backup of continuous power for systems to allow for normal power to be restored or for EMC power to come online.
Identify the directives that govern personnel security.
1.6.1
1-Executive Orders 12968 & 10450
2-DoD 5200.2-R
3-DoD Dir 5105.21-M-1
SECNAV M-5110.36
DCI Directive
Explain what is meant by "need to know".
1.6.3
Limits the number of persons granted access to classified material to the minimum, consistent with operational needs and security clearance requirements.
What does an investigation for TS Clearance require?
1.6.4a/d
Complete SSBI for those who have constant assignment to TS/SCI or Presidential Support. Must be renewed every 5 years.
What does an investigation for Secret Clearance require?
1.6.4b
Complete NACLC or ANACI. Must be renewed every 10 years.
What does an investigation for Confidential Clearance require?
1.6.4c
Good indefinitely (approx. 10-15 years).
Identify SAER and its function.
1.6.5
Used to identify or change eligibility of a security clearance.
(Security Access Eligibility Report)
Identify the use of the following terms:
SF 700, SF 701, SF 702, SF 703, SF 153, and SF 312.
1.6.8
700 - Security container information for safes/spaces.
701 - Activity security checklist, provides accountability.
702 - Container checklist, names and times when opened.
703 - Top Secret cover sheet.
153 - CMS Report, accountability for COMSEC materials.
312 - Classified information Non-Disclosure Agreement.
When should safe combinations be changed?
1.6.9
Initial setup, when an individual's access is suspended, compromise of code, transfer of personnel out of space.
State the purpose of DCS.
1.6.11
Defense Courier Service
Tasked with establishment, staffing, maintaining, and operating an international network of couriers for secure transmission of classified documents and material.
Describe the procedures for transportation of classified material via DCS and hand carried items.
1.6.12
DCS - Use standard 2-line addressing with NO classification markings inside double wrapped box with brown paper.
Hand-Carry - Use coversheet. Double wrap when carrying outside.
What are the 5 THREATCON levels?
1.6.14
Normal - general threat of terrorist activity is possible
Alpha - terrorist threat unpredictable
Bravo - predictable terrorist threats
Charlie - imminent terrorist attack
Delta - terrorist attack has occurred
State the purpose of an EAP.
1.6.16
Emergency Action Plan
Establishes practices/procedures to protect classified and COMSEC material during emergency situations such as natural disasters.
What is the difference between a Security Violation and a Practice Dangerous to Security?
1.6.22
Security Violation - loss or compromise of classified information.
Practice Dangerous to Security - possibility to jeopardize security or COMSEC materials.
State the levels of INFOCONs and what each signifies.
1.6.37
5-Normal
4-Increased Vigilance
3-Enhanced Readiness
2-Readiness Greater
1-Maximum Readiness
Define IA.
1.7.1
Information operations that protect/defend data and information systems by ensuring confidentiality, integrity, availability, authentication, and non-repudiation.
Define Certification in regards to IA.
1.7.2a
Evaluation of security features of an IS in support of accreditation.
Define Accreditation in regards to IA.
1.7.2b
Official management decision to operate an IS in a specified environment.
Define DAA in regards to IA.
1.7.2c
Designated Approving Authority
Responsible for Risk Management and accreditation of IT System Security.
Discuss security procedures involved when performing when performing cross-domain transfers.
1.7.3
-Media must be classified at highest level of information on system until validated.
-Scan for viruses before and after transfer and validate write protection.
-Media must be new every time.
-Log accordingly.
What is "Confidentiality"?
1.7.5a
The assurance that information is not disclosed to unauthorized parties.
What is "Integrity"?
1.7.5b
The assurance that information is not modified by unauthorized parties.
What is "Availability"?
1.7.5c
The assurance of timely, reliable access to data and information systems by authorized users.
What is "Non-Repudiation"?
1.7.5d
The assurance that the sender of data is provided with proof of delivery and recipients are provided with sender's identity. Provides the inability of either party of claiming that they did not send or receive the data.
List the 9 categories of computer incidents.
1.7.6
1-Root
2-User
3-Unsuccessful Attempt
4-Denial of Service
5-Poor Security
6-Scan/Probe
7-Malicious Logic
8-Investigating
9-Explained Anomaly
What is the difference between a vulnerability and a threat?
1.7.10
Vulnerability - weakness in an IS that could possibly be exploited by a threatening source.
Threat - the potential to adversely affect an IS by unauthorized access, destruction, disclosure, or DoS.
Draw the OSI and TCP Models.
OSI---------------------TCP
7-Application-------Application
6-Presentation------Application
5-Session----------Application
4-Transport--------Transport
3-Network---------Internet
2-Data-Link--------Network Interface
1-Physical----------Network Interface
Name 2 protocols associated with the Datalink Layer.
MAC - Media Access Control
LLC - Logical Link Control
Name 2 protocols associated with the Transport Layer.
TCP
UDP
ICMP
What is the use/purpose of a Firewall?
1.8.1h
It is a hardware/software system designed to hide nodes from external networks.
What is Network Topology?
1.8.3a
It is the logical layout of the network (bus, ring, mesh, star).
Define the following acronyms.
LAN
WAN
MAN
GAN
1.8.3b-e
Local Area Network
Wide Area Network
Metropolitan Area Network
Global Area Network
State the difference between IPv4 and IPv6.
1.8.5
IPv4 - 32 bit address. 4.3B addresses.
IPv6 - 128 bit address. 3.4 x 10^38 addresses.
Define the following and how they are used.
NIPR
SIPR
JWICS
1.8.6
NIPR - unclass
SIPR - Secret
JWICS - TS
Explain the following networks and where they are employed.
DODN
DISN
NMCI
ONENET
IT21
1.8.7
DODN - DoD Information Network
DISN - Defense Information Systems Network
NMCI - Navy Marine Corps Intranet (Enterprise level IT Management)
ONENET - NMCI like connectivity for OCONUS
IT21 - Ship to Shore Networks
What is a Virus?
1.8.9a
Infects another executable and uses a carrier program to spread itself.
What is a Worm?
1.8.9b
Similar to a virus, but does not require a carrier program or user interaction to spread from host to host; self propagates.
What is a Trojan?
1.8.9c
Malicious program disguised as something benign. Can allow a hacker access to a computer or be used as a Denial of Service attack.
What is a Backdoor?
1.8.9d
Program that a hacker installs on a target system to allow access at a later time.
What is Phishing?
1.8.9e
Social engineering attack involving email posing as a legitimate business or entity requesting seemingly necessary Personally Identifiable Information.
What is Network Enumeration attack?
1.8.10a
The process of scanning and compiling pertinent information of the layout of a network and its users.
What is a Buffer Overflow attack?
1.8.10b
DoS attack that overloads a system's input capacity thereby crashing the system or preventing the user from accessing its resources.
What is an SQL Injection attack?
1.8.10c
Overloads the input sector of an SQL database and allows the ability to execute arbitrary code forcing the database to divulge its contents.
What is a Dictionary attack?
1.8.10d
Attempts to crack passwords based on a list of words or values.
What is a Privilege Escalation attack?
1.8.10e
The ability to escalate privileges to a level allowing the intruder to access or execute programs or data at a level higher than the original intrusion perspective.
What is a Brute Force attack?
1.8.10f
Physically inputting a user's credentials until access is granted to a system when credentials are unknown.
What is a Social Engineering attack?
1.8.10g
The ability to get the user to divulge their credentials or other useful information about themselves or their organizations.
What is the function of PKI?
1.8.11
Provides encryption and data security in computer networks.
What is Automated Digital Networking System (ADNS)?
1.9.2a
The primary function of the ADNS is to connect Navy shipboard networks to other ship and shore networks for transferring Internet Protocol (IP) data of various classification levels.
What is Common User Digital Information Exchange Subsystem (CUDIXS)?
1.9.2b
The suites have the capability to both send and receive narrative shipboard message traffic.
What is the VLF Digital Information Network (VERDIN)?
1.9.2c
A broadcast system that provides a highly reliable and secure system for worldwide delivery of operational, tactical, and administrative messages from the Fleet Submarine Broadcast System (FSBS) and Minimum Essential Emergency Communications Network (MEECN).
Explain "Gingerbread".
1.9.3
An intruder on the net - stated by anyone who believes that communications have been compromised.
Explain "Bead Window".
1.9.5
Last transmission potentially disclosed unauthorized information.
Explain "River City".
1.9.6
Varying degrees of RF restriction to limit incoming and outgoing communications to the ship.
What is "Meaconing"?
1.9.7a
A system of receiving radio beacon signals and rebroadcasting them on the same frequency to confuse navigation.
What is "Intrusion"?
1.9.7b
Intentional insertion of EM energy into transmission paths with the objective of deceiving operators.
What is "Jamming"?
1.9.7c
The deliberate radiation, re-radiation or reflection of EM energy to reduce or eliminate an enemy's ability to communicate.
What is "Automated Message Store and Forward" (NOVA)?
1.9.2d
A store and forward switching system that provides automated re-addressal and quote functions for authorized users.
What is "Spectrum Management"?
1.9.7d
The fine-tuning of RF to reduce cross-talk and converging of different communication systems to maintain COMSEC.
What are the message precedents?
1.9.10
R-Routine
P-Priority
O-Immediate
Z-Flash
W-White Pinnacle
What is "OPTASK COMMS"?
1.9.11
Operational Tasking Communication.
State the purpose of a commplan.
1.9.12
Designed to integrate an organizations programs, public education, and advocacy efforts into a unified system.
What is a "COMSPOT"?
1.9.15
A report indicative of issues, expected outages, or an outage lasting more than 30 minutes. Goes to NCTAMS and DISA.
What is "EMCON"?
1.9.19
Emissions Control
Prevents an enemy from detecting, identifying and locating friendly forces. (Minimizes EM Interference of friendly forces)
Describe the mission of the following primary warfare areas.
ASW
SUW
IW
AW
STW
NSW
1.10.1
ASW - Anti Submarine Warfare
SUW - Surface Warfare
IW - Information Warfare
AW - Aviation Warfare
STW - Strike Warfare
NSW - Navy Special Warfare
Discuss IO Core Capabilities.
1.10.6
PSYOPS, MILDEC, OPSEC, EW, CNO - Principle means of influencing an adversary and other targets by maintaining freedom of operation in the information environment.
What are the roles of Navy Blue and Red Teams?
1.10.7
Blue - systems security and CND.
Red - CNA and CNE
Explain the purpose of FES.
1.10.8
Fleet Electronics Support
Maintains operational readiness of EW systems.
What is US Title 10?
1.10.9a
Outlines the roles of the US Armed Forces.
What is US Title 50?
1.10.9b
Outlines the role for war and National Defense.
Define "CRITIC".
1.10.10
The reporting of critical information in short, specially formatted messages.
Define "OPSEC".
1.11.1
Process that identifies critical information to determine if friendly actions can be observed by adversary intelligence systems.
What is the 5-Step Planning Process?
1.11.2
1 - Planning & Direction
2 - Collection
3 - Processing
4 - Production
5 - Dissemination
Define "WRA".
1.11.5
Web Risk Assessment
Reviews command's website through the eyes of an adversary looking for critical information that reveals sensitive operations and technical data.
Define "EEFI".
1.11.6a
Essential Elements of Friendly Information
Define "Critical Information".
1.11.6b
Core secrets of the organization.
State the purpose of Naval Intelligence.
1.12.1
Supports all aspects of Naval Operations.
Define the 5 steps of intelligence.
1.12.2
1 - Consolidate results of target development
2 - Assemble data on friendly force status
3 - Assign forces to specific targets
4 - Present the target recommendations to the Joint Forces Commander
5 - Issue tasking orders to forces
What are the 3 types of Navy Intelligence?
1.12.3
STO
Strategic, Tactical, and Operational
Define "CCIR".
1.12.6
CO's Critical Information Requirement
It's a list of information requirements identified by the CO as being critical in facilitating timely information management and decision making. (Cat 1, 2, 4, and 7 level events.)
Explain the function of an Intelligence Fusion Cell.
1.12.13
Combines in-real-time national strategic intelligence and local tactical intelligence.
Define the following:
HUMINT
OSINT
MASINT
SIGINT
COMINT
FISINT
ELINT
IMINT
ACINT
1.12.14
HUMINT - Human Intelligence
OSINT - Open Source Intelligence
MASINT - Measurement and Signature Intelligence
SIGINT - Signals Intelligence
COMINT - Communications Intelligence
FISINT - Foreign Instrumentation Signals Intelligence
ELINT - Electronic Intelligence
IMINT - Imagery Intelligence
ACINT - Acoustic Intelligence
Give 3 examples of intelligence briefs.
1.12.15
1 - Operations and Planning
2 - Logistics
3 - Communications
Describe the capabilities of the following RF bands:
ELF - Extremely Low Frequency
SLF - Super Low Frequency
ULF - Ultra Low Frequency
VLF - Very Low Frequency
LF - Low Frequency
MF - Medium Frequency
HF - High Frequency
VHF - Very High Frequency
UHF - Ultra High Frequency
SHF - Super High Frequency
EHF - Extremely High Frequency
1.13.2
ELF - 1-way submarine communications
SLF - unused
ULF - unused
VLF - broadcast time keeping
LF - telegraph systems
MF - long distance over water (AM Radio)
HF - point to point, ship/shore, ground/air, fleet broadcasts
VHF - line of sight, amphibious assault
UHF - line of sight, tactical between ships
SHF - radar and satellite communications
EHF - experimental
What is frequency?
1.13.3a
Variations or cycles in a given amount of time.
What is wavelength?
1.13.3b
Distance of a radio wave.
What is ducting?
1.13.3c
Trapping an RF wave between two layers of atmosphere.
What is refraction?
1.13.3d
Change in direction of RF when density changes.
What is multiplexing?
1.13.3e
Transmitting multiple frequencies over a single carrier wave.
What is modulation/demodulation?
1.13.3f
Transmit and receive data over radio frequencies.
What is bandwidth?
1.13.3g
Differences between highest and lowest point of a usable wave.
What is keying?
1.13.3h
Relays used in radio transmitters for circuits using crypto.
In relation to atmosphere, what is "Layers"?
1.13.4a
Regions in the atmosphere.
What are Radio Waves?
1.13.4c
An EM wave generated by a transmitter.
What is Propagation?
1.13.4d
Waves traveling through a meeting point.
What is Azimuth?
1.13.4e
Clockwise measurement in the horizontal plane from true North.
What is Elevation?
1.13.4f
Angle between horizontal plane and line-of-site.
What is "Pulse Width" (PW)?
1.13.6e
The duration of the pulse.
Define the following:
Half Duplex
Full Duplex
Simplex
1.13.9
Half Duplex - Send and receive on same frequency, but not simultaneously.
Full Duplex - Simultaneous transmit and receive on same frequency.
Simplex - Only sends or receives on a specific frequency (one-way communication)
What is the capabilities of the GOES and POES Environmental Satellites?
1.14.3
GOES (Geostationary Operational Environmental Satellite) orbit the earth at a specific Geo-Sync orbit at 22,300 miles above the equator.
POES (Polar Operational Environmental Satellite) orbit the earth at an altitude of 450 miles cover the entire surface of the earth every few days.
Discuss how Visibility affects military operations.
1.14.5a
Affect shipboard and shore flight operations as well as amphibious assault and Spec Ops missions.
Discuss how Precipitation affects military operations.
1.14.5b
Impacts RADAR performance.
Discuss the Tropical Cyclone Conditions of Readiness.
1.14.14
COR1 - 12 hours
COR2 - 24 hours
COR3 - 48 hours
COR4 - 72 hours
COR5 - 96 hours
What is "Low Earth Orbit"?
1.15.3a
150-800 miles above earth's surface.
What is "Medium Earth Orbit"?
1.15.3b
10,800 miles above the earth's surface (GPS).
What is "Geosynchronous Orbit"?
1.15.3d
Approx. 19,300-22,300 miles above the earth's surface, satellites remain over same point of the earth.
What is "Apogee"?
1.15.4a
Point of orbit furthest from the earth.
What is "Perigee"?
1.15.4b
Point of orbit closest to the earth.