What are the 3 Hazards from Electromagnetic Radiation?
100
June 6, 1944
What is the D-day landing? Codename Neptune; Commanded by US Army General Dwight D. Eisenhower; hundreds of amphibious ships and aircraft, supports by combatant warships, crossed the English channel behind dozens of minesweepers; once completed successfully the allies were able to push on to Germany.
100
Attack on the USS Stark; Stark was struck by 2 anti-ship missiles fired from an Iraqi F-1 Mirage plande during the Iran-Iraq war; the fighter was given a routine radio warning by the Stark; the frigates radars malfunctioning and didn't detect the missile, the lookout gave warning only moments before the missiles struck. 37 sailors were killed and 21 were injured; the attack remains the only successful anti-ship missile strike on an American Warship.
What took place on May 17, 1987?
100
Any weakness, administrative process, act or physical exposure that makes an information asset susceptible to exploit by a threat.
What is a Vulnerability?
100
Confidentiality, Integrity, Availability, Non-repudiation, and Authentication
What are the attributes of IA?
200
The Characteristics of PPE (Personal Protective Equipment)
What are Respirators, Foot, Hand, Eye, Face, & Skin/Body Protection?
200
June 6-September 1, 1944
What is the Battle of Normandy? The largest amphibious operation in history; allowed allies to complete D-Day landings successfully and carry onto Germany.
200
Gemini 3; John Young piloted the first US two-man space mission, it was the first spacecraft to maneuver from one orbit to another; it acheived 3 orbits in all
What happend on March 23, 1965?
200
A potential cause of an unwanted impact to a system or organization.
What is a threat?
200
Physical, Data-Link, Networking, Transport, Session, Presentation, and Application
What are the layers of the OSI Model?
300
Navy Hearing Conservation Program
What is used to prevent occupational hearing loss and assure auditory fitness for duty of all Navy Personnel?
300
May 1942; Battle of Coral Sea
What is the first Battle fought where the two fleets never saw each other? It was fought with Aircraft launched from carriers.
300
Established on March 23, 1882 by Secretary of the Navy William H. Hunt.
When and by whom was ONI (Office of Naval Intel) developed?
300
IAVA (IA Vulnerability Alerts); corrective action is of the highest priority due to the severity of the vulnerability risk.
What addresses severe network vulnerabilities resulting in immediate and potentially severe threats to DON systems and information?
300
Translates internet domain and host names into IP addresses.
What is DNS (Domain Name Service)?
400
Navy and Marine Corps, Mishap and Safety Investigation Reporting and Record keeping manual
What is OPNAVINST 5102.1D?
400
January 23, 1968
What is the Capture of the USS Pueblo? The ship was boarded and captured by N. Korea; it is the only US Navy Ship currently being held captive.
400
In 1993 it was created by the Blue Ribbon Recruit Training Panel at the direction of CNO Kelso, and was made all hands in 1994 by CNO Jeremy Boorda; it promotes unity and teamwork.
When and why was the Sailors Creed Developed?
400
Address new vulnerabilities that do not pose an immediate risk to DON systems, but are significant enough that non-compliance with the corrective action could escalate the risk.
What is an IAVB (IS Vulnerability Bulletins)?
400
SQL Injection
What is a code injection technique that exploits a security vulnerability occurring in the database layer of an application?
500
The 5 steps of ORM
What are Identifying Hazards, Assessing Hazards, Making Risk Decisions, Implementing Controls, and Supervising?
500
May 5, 1961
What is Mercury 3? Alan Shepard piloted the US's first manned space flight, and became the second PERSON and first AMERICAN in space. This demonstrated the ability to acheive manual control under weightlessness.
500
The Continental Navy was created
What happend on October 13, 1775?
500
IAVT (IA Vulnerability Technical Advisory)
What addresses new vulnerabilities that are generally categorized as low risk to a DON system?
500
Used for processing information up to Secure Compartmented Information (SCI)