What protocol automatically assigns IP addresses?
What is "DHCP"
This is the term for the delay between sending a signal and receiving a response in satellite communications.
What is latency?
This type of attack targets a single system, trying to crash or make it unavailable, and one classic example involves sending oversized ICMP packets, often called the “Ping of Death.”
What is a DoS attack (Denial of Service)?
the "FROM" line is formally known as this.
What is the originator?
This form is used to check security containers when opening and closing them.
What is SF 702?
What is the subnet mask for a Class C network?
What is (255.255.255.0)
This spectrum band, between 300 MHz and 3 GHz, is commonly used for UHF satellite and tactical radio systems.
What is the Ultra High Frequency (UHF) band?
In Information Assurance, this type of attack exploits a user’s trust in a seemingly legitimate message or website to steal credentials or deliver malware.
What is phishing?
This precedence is used when immediate action is required, such as a combat alert.
What is 'Immediate' (O)?
This cryptographic method uses the same key for both encryption and decryption.
What is symmetric encryption?
This variant of CSMA is used in wired Ethernet and relies on detecting collisions during transmission, while its wireless counterpart tries to avoid collisions altogether.
👉 What are CSMA/CD and CSMA/CA?
This physical phenomenon describes the bending of electromagnetic waves around obstacles or through openings, impacting satellite signal reception.
What is diffraction?
This set of three rules helps keep data safe: it makes sure only the right people can see it, prevents it from being messed with, and ensures it’s available when you need it.
What is the CIA Triad (Confidentiality, Integrity, Availability)?
These are the five key components that make up a standard military Date-Time Group (DTG).
What are: day, time, time zone indicator, month, and year?
This form is used to record the combination change of a safe that stores classified or COMSEC material.
What is SF 700?
These three well-known TCP ports are commonly used for web traffic, email, and file transfer: HTTP, SMTP, and FTP.
What are ports 80, 25, and 21?
This type of SATCOM architecture allows multiple users to share satellite bandwidth by separating signals through time, frequency, or code.
What is multiplexing?
This process continuously monitors network traffic and system events to detect, respond to, and report security incidents in real time.
What is intrusion detection or intrusion detection system (IDS)?
These are the four message precedence levels in Navy communications, with the fastest delivery required in 10 minutes or less.
What are Routine (R), Priority (P), Immediate (O), and Flash (Z)?
This TACLANE device uses two keys (modern and PPK) and a Crypto Ignition Key (CIK) to encrypt network traffic.
What is the KG-175?
What are the 7 layers of the OSI model? (In order top to bottom)
What is the (Application, Presentation, Session, Transport, Network, Datalink, and Physical Layer)
This is the process of changing radio frequencies to avoid detection or jamming.
What is frequency hopping?
In IA, this concept ensures that all actions on a system can be traced to a responsible party, often through logging, digital signatures, and auditing, so that users cannot deny their actions.
What is non-repudiation?
This ultra-rare precedence overrides even Flash (Z) traffic and is reserved for critical national-level messages.
What is 'Flash Override' (Y)?
When using a frequency-hopping UHF radio, these two items are required to configure it for secure operation.
What are Time of Day (TOD) and Word of Day (WOD)?