Heritage
Organization
IA/Networks
T/C Services
Command Specific
100

flexibility, economy, attainability responsiveness, simplicity, survivability, sustainability

What are 7 principles of naval logistics?


100

Stuttgart Germany

What is the location of EUCOM and AFRICOM

100

180 Days

How long does an IATO last for?

100

troposphere, stratosphere, ionosphere

what are the layers of the atmosphere

100

ncts guam, ncts naples, nctams pac, nctams cant

what are the jmini sites

200

command and control, operations, warfare, logistics, intelligence, planning

what are the 6 areas of naval doctrine?

200

Offutt AFB, Nebraska

What is the location of STRATCOM?

200

documents protection of the system

What is teh system security plan?

200

3 mhz-30mhz

what is the freq. spectrum for hf

200

ETCS Lee, LT Groth, ENS tinoco

who are the department heads for n6, n1, n4

300

captured by the North Korea on January 23 1968

What is the USS Pueblo?

300

Colorado Springs, CO

What is the headquarters of NORTHCOM

300

confientiality, integrity, availability, non-repudiation, authentication

what are the 5 attributes of IA

300

one way comms only

what is simplex?

300

built for rempote and field locations delivers secure reliable comms for deployed units

what is the purpose of dket

400

ship attacked by Iraqi fighter jests in 1987

What is the USS stark

400

Scott AFB, IL

What is location of TRANSCOM

400

Pplication, prensentation, session, transport, network, data link, physical

What are the layers in the OSI model?

400

FT Buckner JAPAN, Wahiawa HI, Camp Roberts, Ft detrick MD, Northwest va, Landstuhl Germany, ramstein germany, Lago Itlay, n36, ft meade

what are the dscs teleport sites?

400

auto, memory, manual, standby

what a re the modes of tracking for AN/gsc 52a's

500

National security Council, Air Force, CIA

What was created under the National Secuirty Act of 1947?

500

Norfolk, VA

What is location of JFOCM(US joint forces command)?

500

malicious logic, root level intrusion, reconaissance, user level intrusion, unsuccessful activity attempt, denial of service, investigating, non compliance activity, explained anomoly

what are the 9 categories of computer incidents?

500

3khz-30khz

what is freq spectrum for VLF

500

6592 lines and 214 trunks

what is the capasbility of the sl-100

M
e
n
u