Network Admin
Radio
Information Assurance
Naval Messaging
COMSEC
100

What protocol automatically assigns IP addresses?

What is "DHCP"

100

This is the term for the delay between sending a signal and receiving a response in satellite communications.

What is latency?

100

This type of attack targets a single system, trying to crash or make it unavailable, and one classic example involves sending oversized ICMP packets, often called the “Ping of Death.”

What is a DoS attack (Denial of Service)?

100

the "FROM" line is formally known as this.

What is the originator?

100

This form is used to check security containers when opening and closing them.

What is SF 702?

200

What is the subnet mask for a Class C network?

What is (255.255.255.0)

200

This spectrum band, between 300 MHz and 3 GHz, is commonly used for UHF satellite and tactical radio systems.

What is the Ultra High Frequency (UHF) band?

200

In Information Assurance, this type of attack exploits a user’s trust in a seemingly legitimate message or website to steal credentials or deliver malware. 

What is phishing?

200

This precedence is used when immediate action is required, such as a combat alert.

What is 'Immediate' (O)?

200

This cryptographic method uses the same key for both encryption and decryption.

What is symmetric encryption?

300

This variant of CSMA is used in wired Ethernet and relies on detecting collisions during transmission, while its wireless counterpart tries to avoid collisions altogether.

👉 What are CSMA/CD and CSMA/CA?

300

This physical phenomenon describes the bending of electromagnetic waves around obstacles or through openings, impacting satellite signal reception.

What is diffraction?

300

This set of three rules helps keep data safe: it makes sure only the right people can see it, prevents it from being messed with, and ensures it’s available when you need it.

What is the CIA Triad (Confidentiality, Integrity, Availability)?

300

These are the five key components that make up a standard military Date-Time Group (DTG).

What are: day, time, time zone indicator, month, and year? 



300

This form is used to record the combination change of a safe that stores classified or COMSEC material.

What is SF 700?

400

These three well-known TCP ports are commonly used for web traffic, email, and file transfer: HTTP, SMTP, and FTP.

What are ports 80, 25, and 21?

400

This type of SATCOM architecture allows multiple users to share satellite bandwidth by separating signals through time, frequency, or code.

What is multiplexing?

400

This process continuously monitors network traffic and system events to detect, respond to, and report security incidents in real time.

What is intrusion detection or intrusion detection system (IDS)?

400

These are the four message precedence levels in Navy communications, with the fastest delivery required in 10 minutes or less.

What are Routine (R), Priority (P), Immediate (O), and Flash (Z)?

400

This TACLANE device uses two keys (modern and PPK) and a Crypto Ignition Key (CIK) to encrypt network traffic.

What is the KG-175?

500

What are the 7 layers of the OSI model? (In order top to bottom)

What is the (Application, Presentation, Session, Transport, Network, Datalink, and Physical Layer)

500

This is the process of changing radio frequencies to avoid detection or jamming.

What is frequency hopping?

500

In IA, this concept ensures that all actions on a system can be traced to a responsible party, often through logging, digital signatures, and auditing, so that users cannot deny their actions.

What is non-repudiation?

500

This ultra-rare precedence overrides even Flash (Z) traffic and is reserved for critical national-level messages.

What is 'Flash Override' (Y)?

500

When using a frequency-hopping UHF radio, these two items are required to configure it for secure operation.

What are Time of Day (TOD) and Word of Day (WOD)?

M
e
n
u