EIWS 2 Flashcards

(360 cards)

1
Q

What does ORM stand for in safety fundamentals?

A

Operational Risk Management

ORM is a systematic process to identify, assess, and control risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List the five steps of the ORM process.

A
  • Identify hazards
  • Assess hazards
  • Make risk decisions
  • Implement controls
  • Supervise

Each step is crucial for effective risk management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In the ORM process, what is the purpose of Step One: Identify hazards?

A

Outline major steps and conduct preliminary hazard analysis

This involves listing hazards and possible causes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is assessed in Step Two: Assess hazards?

A

Degree of risk in terms of probability and severity

A matrix may be used for assessment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the focus of Step Three: Make risk decisions?

A

Develop risk control options and evaluate benefits versus risks

Communication with higher authority may be necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three measures listed in Step Four: Implement controls?

A
  • Engineering controls
  • Administrative controls
  • Personal protective equipment

These measures help eliminate hazards or reduce risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of Step Five: Supervise in the ORM process?

A

Conduct follow-up evaluations of controls

Monitoring for changes may require further ORM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Risk Assessment Matrix.

A

Combines severity with probability to determine risk assessment code (RAC)

It helps identify the level of risk for each hazard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does mishap probability measure?

A

Likelihood that a potential consequence will occur due to exposure to a hazard

Factors include location, exposure, and affected populations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List the four subcategories of mishap probability.

A
  • A - Frequent
  • B - Likely
  • C - Occasionally
  • D - Seldom
  • E - Unlikely

Each category describes the expected frequency of occurrence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does RAC stand for?

A

Risk Assessment Code

It combines hazard severity and mishap probability into a single letter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List the five RACs.

A
  • Extremely High (E)
  • High (H)
  • Medium (M)
  • Low (L)

Each RAC indicates a different level of risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the timeliness requirement for filing mishap investigation reports?

A

Must be submitted within 30 days of mishap occurrence

Timely reporting is crucial for effective safety management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the four required mishap reportable items?

A
  • On duty DoD civilians and military mishaps
  • Navy civilian fatalities
  • Exposure to laser and radio frequency radiation
  • Ordnance related explosive mishaps

These items must be reported to ensure safety and compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of a HAZREP message?

A

To report a hazardous condition or near-mishap before an actual mishap occurs

It helps prevent future incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define HERO.

A

Hazards of Electromagnetic Radiation to Ordnance

It refers to risks associated with electromagnetic radiation affecting ordnance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the two types of respirators?

A
  • Air purifying
  • Air supplied

Users must be medically screened and fit-tested.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the goal of the U.S. Navy’s Hearing Conservation Program?

A

To prevent occupational hearing loss

Noise-induced hearing loss is a significant health hazard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the purpose of the Personnel Security Program?

A

Manage risk of staff exploiting access for unauthorized purposes

Established under executive order 12968.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Define Top Secret (TS) classification.

A

Expected to cause exceptionally grave damage to national security

Identified by the color ORANGE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does Need to Know mean?

A

Restriction of access to sensitive data necessary for one’s job

Security clearance alone does not guarantee access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is SCI?

A

Sensitive Compartmented Information

Protects national intelligence derived from intelligence sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the investigative basis for Top Secret clearance?

A

Favorably completed Tier 5, SSBI, SSBI-PR or PPR

Must be updated every 5 years.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the Continuous Evaluation Program (CEP)?

A

Modernizes personnel security practices by continuously assessing eligibility

Implemented by the ODNI in December 2016.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What incidents must be reported to the **SSO**?
* Involvement in unlawful activities * Foreign influence concerns * Criminal sexual behavior * Non-compliance with security rules * Change of marital status with a foreign national ## Footnote These incidents can impact security clearance eligibility.
26
Who controls access to a **SCIF**?
The Special Security Officer (SSO) ## Footnote The SSO is responsible for the management of the SCI security program.
27
What is the purpose of **SF 312**?
Classified Information Nondisclosure Agreement ## Footnote It ensures individuals do not disclose classified information.
28
When should combinations for containers be changed?
* When first placed in use * When access is no longer needed * When subjected to compromise * When the safe is retired * Every 2 years if none of the above ## Footnote Regular changes enhance security.
29
What does **DCS** stand for?
Defense Courier Service ## Footnote It is a secure network for distributing classified materials.
30
What is required when preparing classified material for **DCS transportation**?
* Use standardized DCS address * No visible postage on outer wrapper * Security markings only on inner wrapper ## Footnote These procedures ensure the security of classified materials during transport.
31
What is the purpose of **Emergency Action Plan (EAP)**?
Establishes a structured response to emergencies ## Footnote Ensures safety and well-being of individuals and COMSEC material, including evacuation procedures and communication.
32
What does **EDP** stand for?
Emergency Destruction Procedures ## Footnote Identifies locations of classified materials and priorities for destruction based on national security impact.
33
Who can give the order to initiate **Emergency Destruction**?
* Commanding Officer (CO) * Officer in Charge (OIC) ## Footnote These individuals have the authority to initiate destruction procedures in emergencies.
34
List the **priorities for emergency destruction** areas.
* One - Top Secret material * Two - Secret material * Three - Confidential material ## Footnote Priorities are based on the potential effect on national security.
35
What is a **SCIF**?
Sensitive Compartmented Information Facility ## Footnote Must be accredited and have specific physical security measures in place.
36
What is the difference between a **security violation** and an **infraction**?
* Security Violation: Non-compliance that could lead to loss of classified material * Security Infraction: Non-compliance that does not likely result in compromise ## Footnote Violations require investigation, while infractions do not.
37
What does **COMSEC** stand for?
Communication Security ## Footnote Protective measures to deny unauthorized access to telecommunications.
38
What is the role of the **Top Secret Control Officer (TSCO)**?
Responsible for Top Secret materials in the command ## Footnote Maintains accountability for receipt, reproduction, transfer, and destruction of classified information.
39
What does **INFOSEC** stand for?
Information Security ## Footnote Protects information that could damage national security if disclosed.
40
What is the purpose of **DISS**?
Defense Information System for Security ## Footnote Automated system for personnel security management within the DoD.
41
What are the **security requirements** for a SCIF?
* Must be accredited by SOIC * TEMPEST accreditation * Physical Security Inspection completed ## Footnote Space must be hardened and approved through the accreditation process.
42
What is the function of **ADNS**?
Automated Digital Network System ## Footnote Connects Navy shipboard networks to other networks for IP data.
43
What is the **importance of standardization** in naval messages?
Ensures effective, efficient, and secure communication ## Footnote Enhances clarity and interoperability within the Navy and allied forces.
44
What does **R** stand for in message precedents?
Routine ## Footnote Messages concerning normal peacetime military operations, with a delivery time of 6 hours.
45
What is a **COMSPOT**?
Communications Service Advisory ## Footnote Reports submitted during communication outages or degradations.
46
What is the role of the **Special Security Officer (SSO)**?
Focal point for receipt, control, and accountability of SCI ## Footnote Oversees SCI security functions for subordinate SCIFs.
47
What is the maximum duration a Commanding Officer can suspend access to classified information without DCSA revoking a security clearance?
90 days ## Footnote Suspension is a temporary measure to safeguard sensitive information.
48
What does **OPSEC** stand for?
Operations Security ## Footnote Protects sensitive but unclassified information about missions and operations.
49
What is the purpose of **Emergency Destruction Procedures (EDP)**?
Identifies locations and priorities for destruction of classified materials ## Footnote Ensures national security is protected in emergencies.
50
What is the purpose of a **COMSPOT**?
* Reports communication outages or degradations * Submitted by ships and shore facilities * Timely submissions required within thirty minutes * Updates every hour or upon significant change * CASREP if systems cannot be restored within 48 hours ## Footnote COMSPOT reports are sent to the servicing NCTAMS and communications station, and info is relayed to the appropriate numbered fleet commander and ISIC.
51
What is a **Communications Service Advisory**?
* Reports sent by shore facilities during outages * Advisories sent when multiple units experience an outage ## Footnote This ensures that communication issues are addressed promptly across affected systems.
52
What does **BEADWINDOW** signify?
* Real-time procedure for EEFI disclosure * Uses a code word and number combination * Validity not discussed on the net * Response: 'ROGER OUT' ## Footnote BEADWINDOW alerts circuit operators to potential breaches of Essential Elements of Friendly Information.
53
List the **EEFI codes** and their meanings.
* 1 - Position * 2 - Capabilities * 3 - Operations * 4 - Electronic Warfare * 5 - Personnel * 6 - COMSEC * 7 - Wrong Circuit ## Footnote Disclosure of these elements can compromise operational security.
54
Define **RIVER CITY**.
Operational security condition to restrict communications ## Footnote Implemented to prevent unauthorized information disclosure and enhance force protection.
55
What is **TEMPEST**?
Investigation and control of compromising emanations ## Footnote TEMPEST analyzes unwanted signal leakage from telecommunications systems.
56
What is the purpose of **EMCON**?
Control of electromagnetic and acoustic radiations ## Footnote EMCON minimizes emissions to avoid detection by hostile forces.
57
What does **JSIR** stand for?
Joint Spectrum Interference Resolution ## Footnote Designed to replace the MUI program for managing interference in the electromagnetic spectrum.
58
What is the purpose of **OPTASK COMMS**?
Disseminates afloat communications plans ## Footnote Assigns frequency spectrum portions to systems, sensors, and transmitters.
59
What is a **COMMPLAN**?
Multi-step process for voice and data communications ## Footnote An in-depth version of OPTASK COMMS detailing frequency assignments.
60
Define **OTAT**.
Over the Air Key Transfer ## Footnote Transmits electronic KEYMAT material directly to crypto devices.
61
What is **OTAR**?
Over the Air Rekeying ## Footnote Used to rekey crypto equipment during updates or emergencies.
62
What is the relationship between **Host** and **Client**?
Client requests services from Host ## Footnote This describes the interaction between two computer programs.
63
What is an **Application Server**?
Software framework for running applications ## Footnote It provides the environment for application execution.
64
What is a **Hub**?
Connects segments of a LAN, operates at Layer 1 ## Footnote Hubs copy incoming packets to all ports for visibility across the network.
65
What is the function of a **Switch**?
Joins multiple computers in a LAN, operates at Layer 2 ## Footnote Switches inspect data packets and forward them to the intended device.
66
Define a **Router**.
Forwards data packets between networks, operates at Layer 3 ## Footnote Routers determine the best path for data transmission based on address information.
67
What is a **WAP**?
Wireless Application Protocol ## Footnote Allows interoperability of WAP equipment and software with various network technologies.
68
What is the purpose of a **Proxy Server**?
Acts as an intermediary for client requests ## Footnote Controls client access to the internet and resources from other servers.
69
What is a **Firewall**?
Permits or denies network transmissions based on rules ## Footnote Used to protect networks from unauthorized access while allowing legitimate communications.
70
What is a **VPN Concentrator**?
Manages multiple VPN connections ## Footnote Enables secure communication between remote users and a central network.
71
What is the purpose of a **Back-up**?
Copies of data for restoration after data loss ## Footnote Essential for data recovery in case of an event causing data loss.
72
Define a **Repeater**.
Regenerates signals to extend transmission distance ## Footnote Used to maintain signal integrity over longer distances.
73
What is a **LAN**?
Local Area Network, connects devices in a small geographic area ## Footnote Typically shares resources within an office or building.
74
What is a **WAN**?
Wide Area Network, spans large geographic areas ## Footnote Connects multiple smaller networks like LANs.
75
Define a **MAN**.
Metropolitan Area Network, interconnects several LANs ## Footnote Usually spans a city or large campus.
76
What is a **GAN**?
Global Area Network, connects different WANs ## Footnote Covers an unlimited geographical area.
77
What is **Bus Topology**?
Network architecture with clients on a shared communication line ## Footnote May have collision handling mechanisms to manage simultaneous transmissions.
78
What is **Star Topology**?
Network with a central hub or switch for message transmission ## Footnote One of the most common network topologies.
79
Define **Ring Topology**.
Each node connects to two others, forming a continuous pathway ## Footnote Data travels node to node, but a single link failure can disrupt the network.
80
What is **Mesh Topology**?
Network where each node acts as an independent router ## Footnote Allows for continuous connections and reconfiguration around broken paths.
81
What is a **VLAN**?
Virtual LAN, a broadcast domain partitioned at the data link layer ## Footnote Commonly used in network switches to segment traffic.
82
What is the **OSI model**?
A framework for dividing communication systems into layers ## Footnote Consists of 7 layers, each providing services to the layer above.
83
What is the **TCP/IP model**?
Set of protocols for network communication ## Footnote Consists of 4 layers, ensuring data is sent and understood correctly.
84
What is the difference between **IPv4** and **IPv6**?
* IPv4: Decimal format, ~4.3 billion addresses * IPv6: Hexadecimal format, ~340 undecillion addresses * IPv4: Complex header, less security * IPv6: Simpler header, integrated security * IPv4: Uses DHCP, IPv6 supports auto-configuration ## Footnote IPv6 was designed to address the limitations of IPv4, particularly address exhaustion.
85
Define **NIPRNET**.
Non-classified Internet Protocol Router Network ## Footnote Used for exchanging sensitive but unclassified information and internet access.
86
What is **SIPRNET**?
Secret Internet Protocol Router Network ## Footnote Used by the U.S. DoD to transmit classified information securely.
87
What does **JWICS** stand for?
Joint Worldwide Intelligence Communications Systems ## Footnote Used for transmitting classified information by packet switching.
88
What does **SIPRNET** stand for?
Secret Internet Protocol Router Network ## Footnote A system used by the U.S. DoD and DoS to transmit classified information securely.
89
What is the purpose of **JWICS**?
Joint Worldwide Intelligence Communications Systems ## Footnote Used to transmit classified information securely via packet switching over TCP/IP.
90
What does **CENTRIXS** enable?
* Information sharing using email * Web services * Instant messaging * Chat * VoIP ## Footnote A collection of classified coalition networks.
91
Define **CANES**.
Consolidated Afloat Networks and Enterprise Services ## Footnote Modernizes shipboard, submarine, and shore-based C4I network systems.
92
What does **DODIN (GIG)** stand for?
Department of Defense Network Global Information Grid ## Footnote A globally interconnected set of information capabilities for managing information.
93
What is the **DISN**?
Defense Information Systems Network ## Footnote DoD enterprise network providing data, video, and voice services.
94
What does **NMCI** refer to?
Navy/Marine Corps Intranet ## Footnote A program where IT services are outsourced and deployed throughout the Navy/Marine Corps.
95
What is the purpose of **ONE-NET**?
OCONUS Navy Enterprise Network ## Footnote A Navy-wide initiative to install a common IT infrastructure at OCONUS locations.
96
What does **IT21/ISNS** stand for?
Information Technology for the 21st Century/Integrated Shipboard Network System ## Footnote Governed by the CNO/NETWARCOM firewall policy.
97
Define **operating system**.
A set of system software programs regulating application software use of computer hardware ## Footnote Controls how users interact with the computer.
98
Define **applications**.
Computer software designed to help users perform specific tasks ## Footnote Can be singular or multiple related tasks.
99
What is **FTP** and its port?
File Transfer Protocol - Port 20/21 ## Footnote Used to transfer large amounts of data between nodes.
100
What does **SSH** stand for and its port?
Secure Shell - Port 22 ## Footnote Protects data integrity with encrypted connections.
101
What is **Telnet** and its port?
Telecommunications Network - Port 23 ## Footnote Allows users to access and manage remote nodes.
102
What does **SMTP** stand for and its port?
Simple Mail Transfer Protocol - Port 25 ## Footnote Allows users to send and receive email.
103
What is **DNS** and its port?
Domain Name Service - Port 53 ## Footnote Required for connecting to remote computers using domain names.
104
What does **DHCP** stand for and its ports?
Dynamic Host Configuration Protocol - Ports 67/68 ## Footnote Provides IP addresses and other network configuration information.
105
What does **HTTP/HTTPS** stand for and their ports?
Hypertext Transfer Protocol / Hypertext Transfer Protocol Secure - Ports 80/443 ## Footnote Protocols for data transmission on the web.
106
What is **POP3** and its port?
Post Office Protocol Version 3 - Port 110 ## Footnote Allows email clients to retrieve mail from a server.
107
What does **IMAP4** stand for and its port?
Internet Message Access Protocol Version 4 - Port 143 ## Footnote Allows clients to connect to and retrieve email from a server.
108
Define **TCP**.
Transmission Control Protocol ## Footnote Ensures data integrity and reliable connections.
109
Define **UDP**.
User Datagram Protocol ## Footnote Unreliable, faster transmission standard than TCP.
110
What does **MAC** stand for?
Mandatory Access Controls ## Footnote The strictest level of access control defined by the system administrator.
111
What does **DAC** stand for?
Discretionary Access Controls ## Footnote Allows users to control access to their own data.
112
What does **RBAC** stand for?
Role Based Access Controls ## Footnote Assigns permissions based on a user's job function.
113
What is **Separation of Duty**?
An internal control to prevent error and fraud ## Footnote Ensures multiple individuals are responsible for separate parts of a task.
114
What does **Least Privilege** mean?
Minimum levels of access needed to perform a job function ## Footnote Ensures users have only necessary permissions.
115
What does **NAT** stand for?
Network Address Translation ## Footnote Modifies IP addresses in packet headers for private network access.
116
What does **PAT** stand for?
Port Address Translation ## Footnote Allows multiple devices to share a single public IP address.
117
What is a **DMZ**?
Demilitarized Zone ## Footnote Isolates publicly accessible services from an internal network.
118
Define **Virtualization**.
Creating virtual instances of computing resources ## Footnote Improves efficiency and resource management.
119
What is the purpose of **Active Directory**?
Manages users, devices, and resources in a Windows network ## Footnote Provides centralized management and security.
120
Define **cybersecurity**.
Protecting networks, systems, devices, and data from cyber threats ## Footnote Involves ensuring confidentiality, integrity, and availability of information.
121
What does **ISSM** stand for?
Information Systems Security Manager ## Footnote Ensures cybersecurity components are evaluated before integration.
122
What is the role of an **ISSO**?
Information System Security Officer ## Footnote Assists ISSM and enforces cybersecurity policies.
123
What is a **Backdoor**?
Method of bypassing normal authentication ## Footnote Allows remote access while remaining undetected.
124
Define **Worm**.
Self-replicating malware programs ## Footnote Spread across networks without user intervention.
125
What is a **Trojan**?
Malware that appears to perform a desirable function ## Footnote Facilitates unauthorized access to the user's system.
126
Define **Virus**.
Computer program that can copy itself and infect computers ## Footnote Spreads through executable code.
127
What is **Phishing**?
Attempt to acquire sensitive information by masquerading as a trustworthy entity ## Footnote Gathers information like usernames and passwords.
128
What is a **Dictionary Attack**?
Password-cracking technique using common words and phrases ## Footnote Targets weak passwords.
129
Define **Privilege Escalation**.
Exploiting flaws to gain higher access privileges ## Footnote Includes vertical and horizontal escalation.
130
What is a **Brute Force Attack**?
Trial-and-error method to find passwords or keys ## Footnote Tries all possible combinations.
131
What is **Network Enumeration**?
Technique to identify active hosts and services ## Footnote Helps attackers map a target's network.
132
What is a **Rainbow Table**?
Precomputed table of hashed passwords ## Footnote Used to quickly reverse hashed passwords.
133
Define **Social Engineering**.
Manipulating people to reveal confidential information ## Footnote Includes methods like phishing and baiting.
134
What is a **Buffer Overflow**?
Occurs when a program writes more data than a buffer can hold ## Footnote Can lead to arbitrary code execution.
135
What is a **Denial of Service (DoS)** attack?
Overloads a system with excessive traffic ## Footnote Makes it unavailable to legitimate users.
136
What is a **Distributed Denial of Service (DDoS)** attack?
Uses multiple compromised devices to flood a target ## Footnote More powerful than a single-source DoS attack.
137
Define **SQL Injection**.
Code injection attack exploiting web application vulnerabilities ## Footnote Allows manipulation of databases.
138
What is the **cybersecurity risk management process**?
Identification, assessment, and prioritization of risks ## Footnote Aims to minimize and control the impact of unfortunate events.
139
Define **Confidentiality** in cybersecurity.
Ensures sensitive data is accessible only to authorized users ## Footnote Examples include encryption and access control mechanisms.
140
What does **Integrity** ensure?
Data remains accurate and unaltered unless modified by authorized personnel ## Footnote Examples include hashing algorithms and digital signatures.
141
Define **Availability**.
Ensures systems and data are accessible when needed by authorized users ## Footnote Examples include redundant servers and disaster recovery plans.
142
What is **Non-Repudiation**?
Ensures an entity cannot deny actions taken on data ## Footnote Examples include digital signatures and log files.
143
Define **Authenticity**.
Ensures users and systems are verified before access is granted ## Footnote Examples include biometric authentication and PKI.
144
What does **PKI** stand for?
Public Key Infrastructure ## Footnote Manages digital keys and certificates for secure communication.
145
What does **identity** ensure in cybersecurity?
Verification of users, systems, and data sources before access is granted ## Footnote Examples include biometric authentication, Public Key Infrastructure (PKI), and Two-Factor Authentication (2FA).
146
Define **PKI**.
Public Key Infrastructure; a framework for managing digital keys and certificates for secure communication, authentication, and encryption ## Footnote Functions include using asymmetric encryption, issuing digital certificates, and enabling secure data exchange.
147
What are the components of **PKI**?
* Certificate Authority (CA) * Registration Authority (RA) * Public & Private Keys * Certificate Revocation List (CRL) ## Footnote Each component plays a role in issuing, validating, and managing digital certificates.
148
What does **PKC** stand for?
Public Key Cryptography ## Footnote It uses two mathematically linked keys: a public key for encryption and a private key for decryption.
149
What are the procedures for **high-to-low data transfers**?
Sanitize and redact classified content, apply downgraded marking, log the transaction before release ## Footnote This ensures compliance with security protocols.
150
What are the procedures for **low-to-high data transfers**?
Vet files through a one-way guard, scan for malware, strip prohibited metadata, enforce file-type policies ## Footnote Only compliant data is admitted into the higher domain.
151
What is the **electromagnetic spectrum**?
The complete range of electromagnetic frequencies from 3 kHz to beyond 300,000 THz ## Footnote Audio frequencies (15 Hz-20 kHz) are not included.
152
What are the characteristics of **Radio Waves**?
* Wavelength: More than 1 mm * Frequency: Less than 300 GHz * Energy: Lowest in the spectrum ## Footnote Used for long-distance communication.
153
What are the characteristics of **Microwaves**?
* Wavelength: 1 mm - 1 m * Frequency: 300 MHz - 300 GHz * Energy: Higher than radio waves ## Footnote Commonly used in communication and cooking.
154
What are the characteristics of **Infrared (IR) Waves**?
* Wavelength: 700 nm - 1 mm * Frequency: 300 GHz - 430 THz * Energy: Lower than visible light ## Footnote Used in remote controls and thermal imaging.
155
What are the characteristics of **Visible Light**?
* Wavelength: 400 nm - 700 nm * Frequency: 430 THz - 770 THz * Energy: Medium ## Footnote Allows vision and is part of the electromagnetic spectrum.
156
What are the characteristics of **Ultraviolet (UV) Light**?
* Wavelength: 10 nm - 400 nm * Frequency: 770 THz - 30 PHz * Energy: Higher than visible light ## Footnote Can cause chemical reactions and is used in sterilization.
157
What are the characteristics of **X-Rays**?
* Wavelength: 0.01 nm - 10 nm * Frequency: 30 PHz - 30 EHz * Energy: Very high ## Footnote Penetrates soft tissues and is used in medical imaging.
158
What are the characteristics of **Gamma Rays**?
* Wavelength: Less than 0.01 nm * Frequency: More than 30 EHz * Energy: Highest in the spectrum ## Footnote Can damage cells and are used in cancer treatment.
159
What is the frequency range of **ELF**?
3 Hz - 30 Hz ## Footnote Used for long-range signals to submarines.
160
What is the frequency range of **SLF**?
30 Hz - 300 Hz ## Footnote Also used for long-range signals to submarines.
161
What is the frequency range of **ULF**?
300 Hz - 3 kHz ## Footnote Used for long-range signals to submarines.
162
What is the frequency range of **VLF**?
3 kHz - 30 kHz ## Footnote Used for reliable long-range signals and message traffic to submarines.
163
What is the frequency range of **LF**?
30 kHz - 300 kHz ## Footnote Used for fleet multi-channel broadcasts and legacy GPS systems.
164
What is the frequency range of **MF**?
300 kHz - 3 MHz ## Footnote Used for AM radio and international distress frequencies.
165
What is the frequency range of **HF**?
3 MHz - 30 MHz ## Footnote Used for long-distance communications and can travel due to RF signal bouncing.
166
What is the frequency range of **VHF**?
30 MHz - 300 MHz ## Footnote Used for line-of-sight communications and ideal for amphibious operations.
167
What is the frequency range of **UHF**?
300 MHz - 3 GHz ## Footnote Used for line-of-sight communications and tactical voice transmissions.
168
What is the frequency range of **SHF**?
3 GHz - 30 GHz ## Footnote Used for SATCOM and modern radars.
169
What is the frequency range of **EHF**?
30 GHz - 300 GHz ## Footnote Used for experimental radars and SATCOM, can penetrate nuclear fallout.
170
Define **Refraction**.
The bending of a wave as it passes from one medium to another with a different density, causing a change in speed and direction. ## Footnote Refraction is crucial in understanding how waves behave in different environments.
171
Define **Reflection**.
The bouncing back of a wave when it encounters a surface or boundary that does not absorb its energy. ## Footnote Reflection is a fundamental concept in wave behavior.
172
Define **Diffraction**.
The spreading of waves when they encounter obstacles or pass through narrow openings. ## Footnote Diffraction allows radio signals to bend around buildings and sound waves to be heard around corners.
173
What is **Multiplexing**?
A technique that allows multiple signals to share the same transmission medium by separating them in time, frequency, or code. ## Footnote Multiplexing is essential for efficient communication systems.
174
Define **Bandwidth**.
The range of frequencies that a transmission channel can carry, typically measured in hertz (Hz) or bits per second (bps). ## Footnote Higher bandwidth allows for faster data transmission and greater information capacity.
175
What is **Keying**?
Modulation technique where digital signals are transmitted by varying properties of a carrier wave, such as amplitude, frequency, or phase. ## Footnote Common types include Amplitude Shift Keying (ASK), Frequency Shift Keying (FSK), and Phase Shift Keying (PSK).
176
Define **Polarization**.
The orientation of the electric field of an electromagnetic wave. ## Footnote It is crucial in radio communication to reduce interference and enhance signal clarity.
177
What is the **Doppler Effect**?
The change in frequency or wavelength of a wave relative to an observer moving towards or away from the wave source. ## Footnote It is observed in sound and electromagnetic waves for radar and satellite communication.
178
Define **Ground Waves**.
Radio waves that travel along the Earth's surface, maintaining communication over long distances, especially at low frequencies. ## Footnote They are effective in regions where direct line-of-sight communication is obstructed.
179
Define **Sky Waves**.
Radio waves that are reflected or refracted back to Earth by the ionosphere, enabling long-distance communication beyond the horizon. ## Footnote Sky waves are essential for HF radio communications.
180
Define **Space Waves**.
Radio waves that travel directly through the atmosphere or space without relying on the Earth's surface or ionosphere. ## Footnote They are used in satellite communication and line-of-sight communication systems.
181
What are **Surface Waves**?
Type of ground wave that propagates along the Earth's surface, influenced by conductivity and terrain. ## Footnote These waves are effective at very low frequencies (VLF) and are used for submarine communication.
182
What is a **Skip Zone**?
A region where a transmitted radio signal does not reach due to the lack of ground wave coverage and the first sky wave reflection occurring beyond this area. ## Footnote It results in a communication gap between the transmitter and receiver.
183
Describe the **Troposphere**.
Lowest atmospheric layer, extending from the surface to roughly 8-15 km altitude, containing most of the Earth's weather phenomena. ## Footnote Variability in weather can attenuate radio signals through absorption and scattering.
184
Describe the **Stratosphere**.
Spans from the top of the troposphere up to about 50 km altitude, with a more stable temperature and the presence of the ozone layer. ## Footnote The absence of weather systems minimizes interference for signals traveling through this layer.
185
Describe the **Ionosphere**.
Electrically charged region of the upper atmosphere, extending roughly from 60 km to 1,000 km altitude, ionized by solar radiation. ## Footnote It reflects or refracts high-frequency (HF) radio waves, enabling long-distance communications.
186
What is **Weather**'s impact on wave propagation?
Conditions like rain, snow, fog, and storms can affect wave propagation by causing scattering, absorption, and refraction of signals. ## Footnote High humidity and precipitation can lead to signal degradation.
187
Define **Attenuation**.
The gradual reduction in signal strength as it travels through a medium due to absorption, scattering, or distance. ## Footnote Significant in high-frequency communication and worsened by obstacles.
188
What is **Fading**?
The variation in signal strength at the receiver due to interference, reflection, refraction, or changes in atmospheric conditions. ## Footnote Fading can significantly impact communication quality.
189
What are **Sun Spots**?
Temporary dark regions on the Sun's surface that increase ionospheric activity, enhancing or disrupting radio wave propagation. ## Footnote High sunspot activity can improve shortwave radio communication but may interfere with satellite communications.
190
What is **Ducting/Temperature Inversion**?
Occurs when a temperature inversion traps radio waves between layers of the atmosphere, allowing them to travel longer distances than normal. ## Footnote This phenomenon enhances VHF and UHF communication but can cause unexpected interference.
191
Define **Modulation**.
The process of modifying a carrier wave's properties to encode information for transmission. ## Footnote It is essential for effective communication.
192
Define **Demodulation**.
The reverse process of modulation, where the original information signal is extracted from the modulated carrier wave at the receiver. ## Footnote Demodulation is crucial for interpreting received signals.
193
What is **USB**?
Upper Sideband. A form of Amplitude Modulation (AM) where only the upper half of the frequency spectrum is transmitted. ## Footnote It reduces bandwidth usage.
194
What is **LSB**?
Lower Sideband. The opposite of USB, where only the lower half of the frequency spectrum is transmitted. ## Footnote LSB is also used to reduce bandwidth.
195
Define **CW**.
Continuous Wave. A form of modulation where a constant radio frequency is switched on and off to encode messages. ## Footnote Highly efficient for long-distance communication.
196
What does **AM** stand for?
Amplitude Modulation. Varies the amplitude of the carrier wave to encode information. ## Footnote Commonly used in aircraft communication and emergency broadcasts.
197
What does **FM** stand for?
Frequency Modulation. Varies the frequency of the carrier wave to encode information. ## Footnote Provides better noise resistance and is used in ship-to-ship communication.
198
What is **SSB**?
Single Side Band. A form of AM where only one sideband is transmitted, reducing bandwidth usage. ## Footnote Used for long-range HF communication.
199
Define **Half-Duplex**.
Allows data transmission in both directions, but only one direction at a time. ## Footnote A device must wait for the other to finish before responding.
200
Define **Full-Duplex**.
Allows data transmission simultaneously in both directions, improving efficiency. ## Footnote This mode is essential for modern communication systems.
201
What is **PRI/PRT**?
Pulse Repetition Interval/Pulse Repetition Time. The time interval between successive radar pulses. ## Footnote A longer PRI allows for greater detection range.
202
What is **PRF**?
Pulse Repetition Frequency. The number of radar pulses transmitted per second. ## Footnote Higher PRF enhances target tracking.
203
Define **RF**.
Radio Frequency. The frequency of the radar signal used for detecting and tracking targets. ## Footnote RF is critical for effective radar operations.
204
What does **BW** stand for in radar?
Bandwidth. The range of frequencies a radar system can operate within. ## Footnote A wider bandwidth improves range resolution.
205
What is **Scan** in radar terminology?
The radar's movement pattern as it sweeps an area to detect targets. ## Footnote Different scan types determine how quickly and effectively targets are located.
206
Define **Azimuth**.
The horizontal angle or direction from the radar's position to a target, measured in degrees. ## Footnote Azimuth is crucial for accurate target tracking.
207
What is **Bearing Resolution**?
The radar's ability to distinguish between two closely spaced targets at the same range but different azimuths. ## Footnote Higher resolution enables precise tracking.
208
What is the purpose of **Naval Intelligence**?
Ensures superior situational awareness, informed decision-making, and the protection of national and allied maritime interests. ## Footnote It is vital in both peacetime and conflict.
209
What is **Data** in the context of intelligence?
Raw, unprocessed facts and figures collected from various sources. ## Footnote Data has no inherent meaning until organized and analyzed.
210
Define **Information**.
Processed data that has been organized and structured to provide meaning. ## Footnote It answers basic questions but does not offer deeper insights.
211
What is **Intelligence**?
Analyzed information that provides insights, predictions, and assessments to support decision-making. ## Footnote It answers why something is happening and its implications.
212
What is **Intelligence Oversight**?
Policies, procedures, and regulations ensuring intelligence activities are conducted legally and ethically. ## Footnote It is designed to prevent abuses of power and protect civil liberties.
213
Define a **U.S. person** according to intelligence oversight.
A citizen of the U.S., an alien resident lawfully admitted for permanent residence, or a corporation incorporated in the U.S. ## Footnote This definition is crucial for legal intelligence operations.
214
What is the difference between **Title 10** and **Title 50** authorities?
Title 10 governs military operations, while Title 50 governs intelligence and national security activities. ## Footnote Title 10 is directed by military leaders; Title 50 is directed by civilian intelligence leadership.
215
What is the role of intelligence in **Tactical Warfare**?
Focuses on immediate battlefield information to support operational decisions. ## Footnote Tactical intelligence is critical for mission success.
216
What are the **three distinct branches** of the United States government?
* Legislative Branch * Executive Branch * Judicial Branch ## Footnote Each branch has specific powers and responsibilities to check the powers of the others, ensuring a balance of power.
217
Define **Tactical Warfare**.
The lowest level of warfare, focused on individual battles, engagements, and direct combat operations. ## Footnote Objective to execute specific missions and engagements with precision.
218
What is the role of **Intelligence** in Tactical Warfare?
* Provides real-time threat assessments * Supports target acquisition, enemy movements, and area conditions * Utilizes SIGINT, IMINT, and HUMINT ## Footnote Intelligence is crucial for gaining an advantage in tactical operations.
219
Define **Operational Warfare**.
Middle level of warfare, linking tactics with strategic goals. ## Footnote Objective to achieve regional or theater-wide military goals through coordinated operations.
220
What is the role of **Intelligence** in Operational Warfare?
* Helps in campaign planning, force movements, and logistics * Assesses enemy capabilities, strengths, and vulnerabilities * Provides surveillance and operational forecasting ## Footnote Intelligence supports broader military objectives in operational contexts.
221
Define **Strategic Warfare**.
Highest level of warfare, focused on long-term national security, military strategy, and policymaking. ## Footnote Objective is to protect national interests and deter major threats.
222
What is the role of **Intelligence** in Strategic Warfare?
* Informs high-level decision-makers * Analyzes geopolitical risks and foreign military capabilities * Supports deterrence strategies and national defense policies ## Footnote Intelligence is essential for shaping long-term military strategies.
223
What are **Intelligence Requirements**?
Questions or requests that drive intelligence collection, analysis, and dissemination. ## Footnote Derived from information requirements and focus on what intelligence agencies must collect.
224
What are **Information Requirements**?
Specific details or data needed to support decision-making at different levels of warfare. ## Footnote Come from commanders and define what information is needed for mission success.
225
Define **FFIR**.
Friendly Forces Information Requirement. Refers to information a commander needs about friendly forces. ## Footnote Includes details on unit strength, capabilities, logistics, readiness, and location.
226
Define **PIR**.
Priority Intelligence Requirement. Critical intelligence needs focused on the enemy or operational area. ## Footnote Often time-sensitive and require intelligence collection efforts.
227
Define **CCIR**.
Commander's Critical Information Requirement. High-priority information needs that support a commander's decision-making. ## Footnote Includes both PIR and FFIR.
228
What is **GEOINT**?
Geospatial Intelligence. Collects and analyzes imagery, maps, and geospatial data. ## Footnote Provides terrain analysis and battlefield awareness.
229
What is **IMINT**?
Imagery Intelligence. A subset of GEOINT involving analyzing photographic and infrared images. ## Footnote Supports targeting, reconnaissance, and surveillance.
230
What is **HUMINT**?
Human Intelligence. Collected from human sources such as spies and informants. ## Footnote Provides insights into enemy intentions and political situations.
231
What is **SIGINT**?
Signals Intelligence. Collects intelligence from intercepted electronic communications. ## Footnote Provides insight into enemy communications and cyber threats.
232
What is **COMINT**?
Communications Intelligence. A subset of SIGINT focusing on intercepting voice and data communications. ## Footnote Monitors radio, telephone, satellite, and internet traffic.
233
What is **ELINT**?
Electronic Intelligence. A subset of SIGINT focusing on radar and missile guidance signals. ## Footnote Assesses enemy radar systems and air defense networks.
234
What is **FISINT**?
Foreign Instrumentation Signals Intelligence. Collects intelligence on foreign telemetry and missile test signals. ## Footnote Monitors ballistic missile tests and electronic emissions.
235
What is **OSINT**?
Open-Source Intelligence. Gathers intelligence from publicly available sources. ## Footnote Monitors global trends and potential threats from open-source data.
236
What is **MASINT**?
Measurement and Signature Intelligence. Collects intelligence from scientific and technical sources. ## Footnote Detects missile launches and unconventional threats.
237
What is **FININT**?
Financial Intelligence. Tracks financial transactions to identify terrorist funding. ## Footnote Disrupts criminal networks and sanctions evasion.
238
What is the purpose of **intelligence fusion**?
Integrating, analyzing, and synthesizing information from multiple sources. ## Footnote Improves decision-making by providing accurate and timely intelligence.
239
What is **Warning Intelligence**?
Provides early warning of potential threats or impending attacks. ## Footnote Allows decision-makers to take preventive measures.
240
What is **Current Intelligence**?
Delivers up-to-date intelligence on ongoing events and military operations. ## Footnote Supports real-time decision-making.
241
What is **General Military Intelligence**?
Covers broad information on military forces and capabilities of foreign nations. ## Footnote Assists in strategic planning.
242
What is **Target Intelligence**?
Identifies critical enemy assets for military operations. ## Footnote Supports target selection and operational planning.
243
What is **Scientific and Technical Intelligence**?
Focuses on foreign nations' weapons systems and military advancements. ## Footnote Helps assess technological threats.
244
What is **Counterintelligence**?
Detects and neutralizes foreign espionage and insider threats. ## Footnote Protects classified information and national security interests.
245
What is **Estimative Intelligence**?
Provides long-term assessments about future threats and geopolitical developments. ## Footnote Helps plan for potential future conflicts.
246
What is **Identity Intelligence**?
Focuses on biometric and behavioral data to identify security threats. ## Footnote Supports counterterrorism and law enforcement efforts.
247
Provide an example of a **National Intelligence Organization**.
NSA ## Footnote Provides signals intelligence and cybersecurity defense.
248
Provide an example of a **Theater Intelligence Organization**.
Joint Intelligence Operations Center (JIOC) ## Footnote Supports regional military operations.
249
Provide an example of a **Fleet Intelligence Organization**.
U.S. Navy Fleet Intelligence Office ## Footnote Provides operational intelligence for fleet commanders.
250
Provide an example of a **Unit Intelligence Organization**.
Intelligence Detachment aboard an Aircraft Carrier ## Footnote Supports tactical intelligence collection for shipboard operations.
251
What is the role of an **intelligence watchfloor**?
Real-time operations center for monitoring and analyzing intelligence. ## Footnote Ensures situational awareness and decision support.
252
What does **JIOC** stand for?
Joint Intelligence Operating Center ## Footnote Ensures intelligence needs for strategic, operational, and tactical missions.
253
What are the **four steps** of the Joint Intelligence Preparation of the Operating Environment process?
* Define the Operating Environment * Describe the Impact of the Operating Environment * Evaluate the Adversary * Determine Adversary Courses of Action ## Footnote A systematic process used by military intelligence.
254
What is the **Common Operational Picture (COP)**?
A real-time, shared visualization of the operational environment. ## Footnote Integrates friendly, enemy, neutral, and civilian activities.
255
What is the **Common Intelligence Picture (CIP)**?
A fused intelligence product providing a shared understanding of adversary capabilities. ## Footnote Supports strategic and tactical planning.
256
What is **ISR**?
Intelligence, Surveillance, and Reconnaissance Management. ## Footnote Planning, coordination, and execution of ISR.
257
What are the **six phases** of the Joint Targeting Cycle?
* End State and Commander's Objectives * Target Development and Prioritization * Capabilities Analysis * Commander's Decision and Force Execution * Mission Execution * Combat Assessment ## Footnote Intelligence plays a critical role in each phase.
258
What does **F2T2EA** stand for?
Find, Fix, Track, Target, Engage, and Assess. ## Footnote Process used to locate and neutralize enemy threats.
259
What is **ICD 203**?
Analytic Standards. ## Footnote Establishes standards for intelligence analysis ensuring accuracy and integrity.
260
What is **ICD 204**?
National Intelligence Priorities Framework (NIPF). ## Footnote Establishes the process for setting and managing national intelligence priorities.
261
What must intelligence be to ensure objectivity?
Objective, independent, and free from bias ## Footnote These principles are essential for maintaining the integrity of intelligence analysis.
262
Analytic judgments must be supported by _______.
evidence and clearly explained ## Footnote This ensures that conclusions drawn from intelligence are valid and justifiable.
263
Analysts must acknowledge _______ and alternative viewpoints.
uncertainties ## Footnote Recognizing uncertainties helps in providing a more balanced analysis.
264
What does ICD 204 establish?
The process for setting and managing national intelligence priorities ## Footnote This framework aligns intelligence efforts with national security needs.
265
ICD 206 establishes standards for properly citing _______ in intelligence analysis.
sources ## Footnote Analysts must reference sources like SIGINT, HUMINT, and GEOINT in their reports.
266
What is the purpose of ICD 207?
Defines common tradecraft standards for conducting intelligence analysis ## Footnote This promotes consistency and accuracy across all intelligence community agencies.
267
What is the **3-M Program**?
Maintenance and Material Management Program ## Footnote A U.S. Navy-wide system designed to ensure effective maintenance and material readiness.
268
What maintenance level is performed by the ship's crew using onboard resources?
Organizational-Level Maintenance (TA-4) ## Footnote This level of maintenance is crucial for immediate operational readiness.
269
What does the Planned Maintenance System (PMS) aim to achieve?
* Prevent equipment failures * Increase equipment lifespan * Reduce downtime and repair costs * Ensure maintenance is performed consistently and correctly ## Footnote PMS is essential for maintaining operational readiness in the Navy.
270
What is the purpose of the **Automated Work Request 4790/2K**?
To report equipment malfunctions, maintenance actions, and repair requests ## Footnote This document is used when issues exceed routine preventive maintenance.
271
What are **Danger Tags** used for in the Tag-Out Program?
To indicate systems that could cause injury or death if operated ## Footnote This is a critical safety measure during maintenance.
272
What does TCPED stand for in Naval Meteorology and Oceanography?
Tasking, Collection, Processing, Exploitation, Dissemination ## Footnote This cycle organizes and processes environmental data into actionable intelligence.
273
What is the mission of the **Naval Oceanographic Office (NAVO)**?
Optimize seapower by applying relevant oceanographic knowledge ## Footnote This supports U.S. National Security objectives.
274
What does the **Fleet Numerical Meteorology and Oceanography Center (FNMOC)** do?
Generate and deliver numerical weather and oceanographic forecasts ## Footnote These forecasts are critical for naval operations.
275
What is the role of the **United States Naval Observatory (USNO)**?
Provide precise astronomical data and timekeeping services ## Footnote This is essential for navigation and operational systems.
276
What is the purpose of the **Maintenance Requirement Card (MRC)**?
Provides step-by-step instructions for conducting maintenance ## Footnote Strict compliance with MRCs is essential for operational readiness and safety.
277
What are the **casualty categories** based on mission capability impact?
* Category 1 (CAT 1): Minor degradation * Category 2 (CAT 2): Some degradation * Category 3 (CAT 3): Major degradation * Category 4 (CAT 4): Complete mission failure ## Footnote These categories help prioritize maintenance and operational responses.
278
What is the mission of the **NOOC**?
To provide accurate timekeeping, astrometric services, and support navigation systems ## Footnote Ensures precision time signals and maintains celestial reference frames for navigation and scientific research.
279
What is the mission of the **Naval Oceanography Operations Command**?
To provide enhanced asymmetric warfighting capabilities in the undersea domain through the METOC Kill Chain ## Footnote Connects the Undersea Warfare Reachback Center to deployed Echelon V commands via a robust IT infrastructure.
280
What is the mission of the **Fleet Weather Center Norfolk**?
To provide maritime forecasts, warnings, and voyage planning for various regions ## Footnote Supports 2nd, 4th, and 6th fleet.
281
What is the mission of the **Fleet Weather Center San Diego**?
To keep the Fleet safe from hazardous weather and enable effective operations ## Footnote Supports 3rd, 5th, and 7th fleet.
282
What does **ADCON** stand for?
Administrative Control ## Footnote CNMOC is administratively managed by USFF, responsible for personnel, training, and readiness.
283
What does **OPCON** stand for?
Operational Control ## Footnote CNMOC falls under the operational control of NAVIFOR, integrating products into tactical planning.
284
What does **ISR** support provide?
Environmental and METOC intelligence to ISR missions ## Footnote Supported through SCIF capable units like NAVO, FNMOC, and JTWC.
285
What is the focus of the **Joint Typhoon Warning Center (JTWC)**?
Monitoring and forecasting tropical cyclones in the Pacific and Indian Oceans ## Footnote Supports broader warning systems for tsunami conditions.
286
What is the role of the **Pacific Tsunami Warning Center (PTWC)**?
Monitors the Pacific Ocean for tsunami-generating events and issues warnings ## Footnote Alerts international partners and coastal communities.
287
What is the role of the **National Tsunami Warning Center (NTWC)**?
Provides tsunami warnings for U.S. coastal areas ## Footnote Ensures timely alerts for local authorities and the public.
288
What does the **Fleet Weather Center - Norfolk** provide for tropical operations?
Localized meteorological data and operational intelligence ## Footnote Enhances tropical cyclone assessments in cooperation with the National Hurricane Center.
289
What is a **Significant Tropical Weather Advisory**?
Initial outlook on disturbed weather areas with potential for tropical cyclones ## Footnote Includes geographic coordinates, movement, and development potential.
290
What does a **Tropical Cyclone Formation Alert** indicate?
A tropical disturbance is organizing, and cyclone formation is likely within 24 hours ## Footnote Issued to alert of potential cyclone development.
291
What is a **Tropical Cyclone Warning**?
Issued once a tropical cyclone is identified, providing detailed storm information ## Footnote Includes storm characteristics, path, hazard information, and safety recommendations.
292
What does **Condition V** indicate?
Hurricane season is active, with storms greater than 72 hours away ## Footnote All vulnerable installations maintain at least TCCOR 5.
293
What are the wind criteria for a **Tropical Depression**?
Maximum sustained winds are less than 34 knots ## Footnote Approximately 39 mph.
294
What are the wind criteria for a **Tropical Storm**?
Maximum sustained winds range from 34 to 63 knots ## Footnote Roughly 39 to 73 mph.
295
What are the wind criteria for a **Typhoon**?
Maximum sustained winds are at least 64 knots but below super typhoon threshold ## Footnote At least 74 mph.
296
What are the wind criteria for a **Super Typhoon**?
Maximum sustained winds reach 130 knots or higher ## Footnote About 150 mph.
297
What is a **Tsunami Warning**?
Issued when a destructive tsunami is imminent or occurring ## Footnote Poses a significant threat to life and property.
298
What is a **Tsunami Advisory**?
Alert that a tsunami is expected but likely smaller and less damaging ## Footnote Less severe than a warning.
299
What is a **Tsunami Watch**?
Issued when there is potential for tsunami development ## Footnote Conditions have not confirmed an immediate threat.
300
What is the role of **USFF**?
Develop and disseminate meteorological, oceanographic, and hydrographic forecasts ## Footnote Informs operational planning and training across the fleet.
301
What is the role of **PACFLT**?
Deliver region-specific environmental assessments ## Footnote Supports operational decision-making with ocean conditions analysis.
302
What is the role of **SUBLANT**?
Focus on underwater acoustics and hydrographic information ## Footnote Essential for submarine stealth and navigation.
303
What is the role of **INDOCPACOM**?
Support regional security by integrating environmental intelligence ## Footnote Assess ocean dynamics and hydrographic conditions.
304
What does **climatology** study?
Long-term weather trends and patterns ## Footnote Provides environmental context for military planning.
305
What is the **Navy Planning Process**?
Systematic, iterative process for analyzing missions and developing actions ## Footnote Helps commanders translate decisions into planned actions.
306
What is the role of **METOC** in the Navy Planning Process?
Provides environmental assessments, analysis, and recommendations ## Footnote Includes METOC Estimate and identifies impacts on operations.
307
What is the role of the **Navy Space Command**?
Supports full-spectrum space domain operations and advocates for space capabilities ## Footnote Integrates space capabilities into maritime operations.
308
What is **Space Domain Awareness**?
Tracking and characterizing objects in Earth orbit ## Footnote Uses sensors to maintain a picture of the space environment.
309
What are **Offensive Operations** in space?
Develop capabilities to disrupt or deny adversary space systems ## Footnote Focus on offensive capabilities.
310
What are **Defensive Operations** in space?
Protect one's own space assets against attacks ## Footnote Focus on safeguarding space capabilities.
311
What is the purpose of **Positioning, Navigation, and Timing**?
Delivers precise location and time data globally ## Footnote Supports navigation and operational processes.
312
What is the role of **Satellite Communications**?
Provides secure communication links globally ## Footnote Essential for command and control.
313
What does **Environmental Monitoring** involve?
Observing space weather phenomena and predicting effects on systems ## Footnote Helps mitigate adverse effects on satellites.
314
What is the purpose of **Missile Warning**?
Detects missile launches and tracks trajectories in real time ## Footnote Critical for early threat detection.
315
What does **Nuclear Detonation Detection** do?
Detects indicators of nuclear explosions ## Footnote Supports treaty compliance and global monitoring.
316
What is **Spacelift**?
Involves launching payloads into space using rockets ## Footnote Covers logistics and operational planning for satellite insertion.
317
What are the characteristics of **Low Earth Orbit**?
160 km to 2,000 km above Earth, 90-120 minute orbital period ## Footnote Reduced signal delay, higher resolution for imaging.
318
What are the characteristics of **Medium Earth Orbit**?
Between 2,000 km and 35,786 km, balances coverage area and latency ## Footnote Less atmospheric drag than LEO.
319
What are the characteristics of a **Geosynchronous Orbit**?
Approximately 35,786 km above the equator, period equal to one day ## Footnote Geostationary satellites remain fixed over one point.
320
What are the three segments of **Space Operations**?
* Space Segment * Ground Segment * User Segment ## Footnote Each segment plays a crucial role in the operation of space systems.
321
What are the benefits of access to **space**?
* Enhanced ISR * Reliable Communications * Precise Navigation * Environmental Monitoring * Deterrence and Strategic Advantage ## Footnote Access to space enhances military capabilities and operations.
322
What are the **natural space environment hazards**?
* Space Debris * Micrometeoroids * Vacuum ## Footnote These hazards pose risks to spacecraft and systems.
323
What are the **cybersecurity threats** to space operations?
* Cyberattacks on spacecraft * Vulnerabilities in software and hardware ## Footnote These threats can disrupt communications and compromise mission data.
324
What does **orbital debris** pose a risk to?
Spacecraft and satellites ## Footnote Orbital debris can lead to collisions that may damage or destroy operational spacecraft.
325
What are **micrometeoroids**?
Small particles in space that can damage spacecraft surfaces and equipment ## Footnote They are a significant threat to the integrity of spacecraft.
326
What is the **vacuum** of space known to cause?
Materials to degrade and pose challenges for life support systems ## Footnote The lack of atmosphere affects the durability of materials used in spacecraft.
327
True or false: **Cyberattacks** on spacecraft and ground systems can disrupt communications.
TRUE ## Footnote Cyberattacks can manipulate satellite functions or compromise sensitive mission data.
328
What are the **vulnerabilities** in space systems?
* Software vulnerabilities * Hardware vulnerabilities * Supply chain attacks * Jamming and spoofing * Malware ## Footnote These vulnerabilities can be exploited by cyber attackers.
329
What are **offensive space operations** aimed at?
Targeting an adversary's space capabilities ## Footnote These operations may include actions to deceive, disrupt, deny, degrade, or destroy military space capabilities.
330
What is the goal of **defensive space operations**?
Preserve space combat power and neutralize adversary actions ## Footnote These operations ensure effective responses to hostile acts from any domain.
331
What is the role of **FLTCYBERCOM/USTENTHFLT**?
Oversees Navy-wide cyber operations ## Footnote Ensures the security and integration of digital and space-based assets.
332
What does **NNWC** stand for?
Naval Network Warfare Command ## Footnote Manages the Navy's global network architecture.
333
What is the responsibility of **NSOC**?
Directly manages and executes operational space missions ## Footnote Coordinates planning and employment of space assets to support maritime operations.
334
What does **NIOC Colorado** serve as?
An analytical and integration hub for information and intelligence ## Footnote Processes and fuses data from space sensors with other intelligence sources.
335
What is the role of the **USNO**?
Provides precise timekeeping and astrometric data ## Footnote Supplies critical celestial and timing information for navigation and satellite operations.
336
What does **NIWDC** focus on?
Development and integration of advanced information warfare technologies ## Footnote Conducts research and innovation to enhance cyber and space domain integration.
337
What is the mission of **NAVIFOR**?
To generate agile and technically superior combat-ready IW forces ## Footnote Ensures the Navy can decisively deter, compete, and win.
338
What are the **three core capabilities** of NAVIFOR?
* Assured C2 * Integrated Fires * Battlespace Awareness ## Footnote These capabilities ensure effective command and control, coordination of firepower, and situational awareness.
339
What does **Assured C2** ensure?
Uninterrupted and secure communication and control capabilities ## Footnote Guarantees reliable command under any circumstances.
340
What is the significance of the **Attack on USS LIBERTY**?
Led to improvements in operational security and situational awareness ## Footnote Sparked re-evaluation of IW mission coordination and integration.
341
What was the **Battle of Midway**?
A critical turning point in the Pacific Theater during World War II ## Footnote Halted Japanese expansion and showcased the importance of intelligence.
342
What was the **USS PUEBLO** incident?
Seizure of a U.S. Navy intelligence-gathering ship by North Korean forces ## Footnote Resulted in a major breach of U.S. cryptologic systems.
343
What was the **D-Day Landing** known as?
Operation Overlord ## Footnote The largest amphibious invasion in history, crucial for liberating Western Europe.
344
What was the **Purple Code**?
A Japanese diplomatic cipher machine used during the late 1930s and early 1940s ## Footnote Its decryption provided critical strategic insights for the U.S.
345
What does the **Command Language Program of the Year** award recognize?
Exceptional Command Language Program enhancing mission readiness ## Footnote Criteria include effective use of resources and demonstrated improvement in language readiness.
346
What is the purpose of the **Language Professional of the Year** award?
Honors outstanding leadership and commitment to language program success ## Footnote Recognizes significant contributions to curriculum development and training.
347
What does the **Linguist of the Year** award recognize?
Exceptional language skills and operational contributions ## Footnote Criteria include superior performance on language proficiency tests.
348
What does the **Foreign Language Excellence Award** acknowledge?
Excellence in foreign language proficiency in support of national defense ## Footnote Recognizes impactful use of foreign language in operations.
349
What is the **purpose** of the **Foreign Language Excellence Award**?
Acknowledges individuals or units who have demonstrated excellence in foreign language proficiency and application in support of national defense or intelligence missions ## Footnote This award recognizes significant contributions in foreign language skills.
350
List the **criteria** for the **Foreign Language Excellence Award**.
* High proficiency scores (DLPT or OPI) * Sustained and impactful use of foreign language in operations * Advancement of cross-cultural communication * Promotion of language learning and cultural understanding * Significant mission contributions using foreign language skills ## Footnote These criteria highlight the importance of practical application of language skills.
351
Which ratings comprise the **IWC**?
* CTN (Cryptologic Technician - Networks) * CTR (Cryptologic Technician - Collection) * CTI (Cryptologic Technician - Interpretive) * CTM (Cryptologic Technician - Maintenance) * CTT (Cryptologic Technician - Technical) * IS (Intelligence Specialist) * IT (Information Systems Technician) * AG (Aerographer's Mate) ## Footnote Each rating focuses on specific areas within cryptology and intelligence.
352
What is the focus of **CTN** (Cryptologic Technician - Networks)?
Offensive and defensive cyberspace operations ## Footnote This role is crucial for maintaining cybersecurity.
353
What is the focus of **CTR** (Cryptologic Technician - Collection)?
Signals collection and analysis ## Footnote This role involves gathering intelligence through signal interception.
354
What is the focus of **CTI** (Cryptologic Technician - Interpretive)?
Foreign language translation and interpretation ## Footnote This role is essential for understanding foreign communications.
355
What is the focus of **CTM** (Cryptologic Technician - Maintenance)?
Maintenance of cryptologic and electronic warfare equipment ## Footnote This ensures that all equipment is operational and effective.
356
What is the focus of **CTT** (Cryptologic Technician - Technical)?
Electronic warfare and signals exploitation ## Footnote This role is vital for analyzing and utilizing electronic signals.
357
What is the focus of **IS** (Intelligence Specialist)?
Collection, analysis, and dissemination of intelligence products ## Footnote This role is key for providing actionable intelligence.
358
What is the focus of **IT** (Information Systems Technician)?
Network administration, communications, and cyber operations ## Footnote This role supports the infrastructure of information systems.
359
What is the focus of **AG** (Aerographer's Mate)?
Weather observation and forecasting (supports METOC) ## Footnote This role is important for operational planning based on weather conditions.
360
List the **officer communities** that comprise the **IWC**.
* 1800 - Oceanography Officer * 1810 - Cryptologic Warfare (CW) Officer * 1820 - Information Professional (IP) Officer * 1830 - Intelligence Officer * 1840 - Cyber Warfare Engineer (CWE) ## Footnote These officer designators cover various aspects of information warfare.