Advancement Exam Study Guide

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 45

IT STUDY GUIDE FOR

ADVANCEMENT,
QUALIFICATIONS, AND
IW KNOWLEDGE!

Governing Publications
ACP 121 Communications Instructions General

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


ACP 128 AUTODIN

ACP 131 Q & Z Codes

CJCSM 6510.01B Cyber Incident Handling Program

COMNAVYCYBERFORINST 5239.1 Information Assurance Workforce Improvement


Program

COMNAVYCYBERFORINST 5239.2B Commander’s Cyber Security and Information


Assurance Handbook

COMNAVIDFORINST 5239.3B Cyber Security Readiness Handbook

DODI 8500.01 Cyber Security

DODI 8510.01 Risk Management Framework for DOD


Information Technology

FXP 3 Exercises

JOINT DODIIS Cryptologic SCI Information Systems Security


Standards

NAVSEA EE130-AG-HBK-020 VOL. (EHF / LOW DATA RATE LDR/MDR)


1

NAVSEA EE180-KT-1MC-010 SKL

NAVSEAINST 4790.8C 3-M

NTP 2 SECTION 1 SHF

NTP 2 SECTION 2 UHF

NTP 2 SECTION 4 COMMERCIAL SAT COMM

NTP 3 SUPP-1(L) AIG, CAD, TASK ORGANIZATION

NTP 4 (E) Fleet Communications

NTP 6 (E) Navy Electromagnetic Spectrum

NTP-3 (J) Naval Telecommunications Procedure

NTTP 6-02 Navy Tactics, Techniques and Procedures in C4I


Infrastructure

NWP 1-03.1 Operational Reports

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


SECNAV M-5510.30 Personnel Security Program

SECNAV M-5510-36 Information Security Program

SECNAVINST 5239.3B Information Assurance Policy

BUPERSINST 1610.10D Evaluation System

NAVEDTRA 14325 BMR

NAVPERS 15560D Personnel Manual

NAVPERS 15665I Uniform Regulations

OPNAVINST 1420.1B Officer Commissioning Programs

OPNAVINST 1700.10M SOY

OPNAVINST 1720.4A Suicide

OPNAVINST 3500.39C ORM

OPNAVINST 5354.1F EO

OPNAVINST 5370.2C Fraternization

OPNAVINST 6110.1J PRT

SECNAVINST 1752.4B SAPR

307 SHF/WGS
Wideband Global System

What is a SAR? SAA?


● Satellite Access Request
● Satellite Access Authorization

What is a GAR? GAA?


● GBS Access Request
● GBS Access Authorization

How many days prior does a SAR need to be submitted?


● 45 Days Prior to Underway

What information can be found on an SAA?

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


● Mission Number, Operating bands, EBEM Settings, Gateway Settings, Satellite
Data Base Number

What does EBEM stand for?


● Enhanced Bandwidth Efficient Modem

List EBEM settings


● Sub Mode, Data Rate, Mode, IF Offset/IF carrier Frequency, Serial Rate, Inner
Code/Inner Code Rate, Timing Source, Buffer Size (iridium crystal timing)
● Reference SAA

What does ESEM stand for and what does it do?


● Enhanced Service Efficient Modem
● Provides own encryption

What is the nomenclature for the WGS terminal?


● WSC-6(V)5A

List antenna for WGS


● USC-69=CBSP
● OE-581=GBS
● AS-4514=DSCS

How do you acquire the satellite?


● Take SAA fill in information on mod, demod, up-convertor and down-convertor,
select satellite in accordance with SAA, Enter SMAT and ring seed in ESEM

How do you input the frequency on the terminal?


● Set up up-convertor and down-convertor/mod. and demod.

What is an Up-convertor and a Down-convertor?


● Up-convertor is symbolic to modulator
● Down-convertor is symbolic to Demodulator

Why can we have two WGS missions?


● We have two EBEMS

How do you check if the terminal is using the HPA or MPA?


● Operational commands and then setup AMP

How do you take the terminal out of dummy load for the HPA or MPA?
● Ensure the beam state is on and change the Comm. Mode

How do you conduct a power balance?


● Call the Gateway

List Reasons to conduct power balance


● Low Eb/High Eb
● No eb

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


● Balance Resources

What is the FIREBERD?


● Communication analyzer, in house Q.A. checks

Setting for FIREBERD


● Data, Gen Clock, timing, set up interface

What does BERT stand for?


● Bit Error Rate Test

What is a bi-directional loop?


● Sends data to self and to station

What are you checking for in ADNS when any loop test is being conducted?
● Lineup protocol down loop

When circuit path is setup using a KIV-7M, what should you check for when any loop test is
being conducted?
● TR

How do you setup an external loop on the KIV-7M and what should you check for in ADNS?
● Go to ext loop

What does FOM stand for and what is it used for?


● Fiber Optic Media convertor
● Converts fiber to copper or serial

What bands does WGS use and what are their ranges?
● KA=26.5-40.0
● X=8.2-12.4
● C=5.85-8.20 Ghz

Who do we send the C4I report to and at what times?


● To the Gateway at 0400Z, 1200Z, 2000Z

What is an AAR and how many days do you have to submit?


● After Action Report
● 72 Hours

306/EHF STUDY GUIDE


EHF

● Nomenclature of EHF terminal? USC-38(v)2

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


● List 7 things required to bring up EHF? Timing, Crypto, Navigation, Ephemeris Data,
Adaptation Data, Dry Air, Chilled Water
● What should the status of the HPA display when in IDLE? From HPA Dummy Load
means no TX.
● What are the black keys and their classification? Unclas ; TAC-1, Cover, & Downlink.
● What is TAC 1 used for? Allows access to satellite beams. Cover? Privilege level
used to control satellite and communication functions . Downlink? Common to all
satellite beams
● What is the red unique key used for? Encrypts the black keys
● What are the red operational keys? EHF SKL KEYS
● Describe the differences between loading black keys and red operational keys? Red
operational keys are already encrypted , Black keys need the RED UNIQUE to
encrypt them.
● What navigational inputs are required? Lat/Long: Manually entered, Heading:
SINS(Shipboard Internal Navigation System)(WSN-7),Speed: Manually
entered ,Pitch/Roll: SINS (WSN-7)
● What is A-data? Adaptation Data
− What is System-data? Defines which satellites are out there and which ones
you can join.
− What is Terminal-data? Gives ships specific Terminal ID (Ships terminal I.D
can be found in EHF Handbook) and defines block zones for the ship.
● What is E-data? Satellite position and velocity, Good for 42 days on MIL*, Will
update on its own if the satellite is acquired, May still acquire if stale but may take
longer.
● How do you format A-data and E-data? Delete all Misc. letters until it looks like EHF
Handbook.
● What type of cooling is used for EHF? Chilled Water
● List EHF antenna and locations? Two AS-4294; On top PRIFLY, On SPN-35 platform.
● How many gyros per antenna?2
● How many LDR ports are there? MDR? There are 12 Ports for LDR. 4 Prim. W/max
2400bps, 4 Sec. W/max 300bps, 4 RCV ports W/max 2400bps. There are 16 ports
for MDR.
● What beam is used for LDR? Uses Earth Coverage beam W/ a 17.5˚ wide beam
which covers 4000 NM; Which provides Network & PTP W/ Data and Voice.
● What is required before you can acquire MDR? LDR
● What type of MDR beam would we use? Uses Nuller Spot Beam & Distributed User
Coverage Antenna. NSB is 1˚ wide (400 NM), and DUCA is 1˚ wide (400 NM).
Services Provided are; Dual Simplex for IP services, Voice Nets or PTP calls at
2400 bps, TIP (TMDA Interface Processor) for IP services.
● What does XMT/RCV; XMT/RCV mean? We are up on LDR/MDR.
● List CCI for EHF? KYV-5, KIV-7M, KGV-11.
● What does the KYV-5 limit the data rate to? 2400.
● What are MDR ports 15 and 16 used for? 15 = DSVT, 16 =T1…These are both not
used by us.

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


● What does DUCA stand for? NSB? Distributed User Coverage Antenna & Nueller
Spot Beam
● Where can you find a list of all Terminal ID’s? EHF Handbook.
● What type of multiplexing does EHF use? Time Division Multiple Access
● How many LDR timeslots are there? 7. MDR? 237.
● For an LDR voice net, what do you need to know about timeslots for all users on the net
to communicate? Can’t let it auto select if ARG wants to communicate, If you use
timeslot 7, you will be allocating all the data to one circuit.
● What is an ESP and what information is on it? EHF Service Plan
● What is ATIP?Advanced TDMA Interface Process
● What is special about the data rate for CT TIP? When more than one person is on the
net, the bandwidth is allocated equally.
● What is Subnet A and B for CT TIP? Subnet A is shore side always RCV Only.
Subnet B is our station so we set it to TX/RCV.
● What is SOL? Sequential Order List
● Who establishes the SOL for a net? The 1st Terminal to come up on the net is
established by default.
● What is predicted SNR vs. measured SNR? Predicted is based on terminal type &
Antenna Type. Measured is the current situation.
● Describe what your QUAL will be based on your DNLK
● What does forced mean in regards to timeslots? Assigned
● Why are LDR timeslots not assigned on the ESP? Minimal amount and Lead of ARG
or SG assigns it typically.
● What is crosslinking? Expand Range by going STATION-SAT-SAT-STATION.
● What is initial binding? Binding of two terminals to INT OTAR

304/TECH OPERATOR STUDY


GUIDE
UHF LOS

● WSC-3 versions and how many of each? WSC-3(v) 6, WSC-3(v)11, WSC-3(v)14,


● WSC-3 front panel settings for LOS circuit? Manual, Remote, LOS, AM Mode, Squelch
Off
● WSC-3 front panel settings for LINK 11? FM, Otherwise same settings
● Radio in transceivers designed for LINK 11? WSC-3(v) 14 #4,8,12,16
● What is LINK 11 used for? Used by CIC
● List of UHF LOS antennas? AS-1735 (Plated Pairs) , AS-390 (Spiders)
● What is AADS? RT-1720
● What radio is used for AADS? To Track LCAC’s
● Nomenclature for radio for AADS? RT-1720

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


● Nomenclature for RDS, Mini SAS, BAS, and SAS? Mini SAS=SA-2112(v)1, RDS= SA-
2112(v) 4, BAS=SA-2112(v)6, SAS=SA-2112(v)8
● Nomenclature for coupler for WSC-3? OA-9277
● Purpose of the coupler? Electronically Length & Shortens Antenna
● How to manually input a frequency into the coupler? Modify, then Press FREQ., then
enter FREQ IAW Commplan
● What is the frequency separation for each coupler? 5 MHz in Auto, and 3MHz in
Manual
● Describe frequency hopping? Prevents Jamming By switching between FREQS.
While still communicating
● What two things do you need for frequency hopping? Time of Day & Word of Day
● Which UHF LOS radio is capable of frequency hopping? WSC -3(v)11
● What WSC-3 front panel should you check if you hear a robot when testing a circuit?
Squelch & Modulation
● What does the BAS do? SAS? Mini SAS? RDS? BAS Patches Radio to Crypto, SAS
Patches Crypto to Channel & Channels to Phones, Mini-SAS Patches Air Circuits
To Channels, RDS Patches Crypto To Equipment Strings I.E.,(CUDIXS)
● What CCI can you use for a secure UHF LOS circuit? KY-58
● What CCI’s can you use for an unsecure UHF LOS circuit? KYV-5, KY-58, C-10316
(Charlie Box)
● What is the circuit MAD and what is the frequency? Military Air Distress = 243.000MHz

VHF

● What radio is used for VHF Low frequencies? SRC-54 with a range of 30-88 MHz
● What radio is used for VHF High frequencies? GRC-211 with a range of 116-
157.575MHz
● What are the settings for the SRC-54? Vol. 9, Manual, SC, PT
● Nomenclature for SRC-54? RT-1730
● What is another name for the SRC-54? SINGARS (Single Channel Ground to Air
Radio System)
● Nomenclature for the multi-coupler for SRC-54? TD-1456
● List of VHF antennas, their location, and frequency range? AS-4366 (Di-Pole) = 30-
88MHz , AS-2809(Stove Pipe) = 115-162 MHz / 116-151.915 MHz
● Which SRC-54’s are on the BAS? SRC’s without Crypto.
● Which SRC-54’s are on the SAS? SRC’s with Crypto
● Which SRC-54’s do you need to load for secure voice? SRC’s with Crypto need to be
loaded
● How do you do a back to back for a VHF circuit? Input same FREQ. on 2 different
Radios, and place both of them on the same channel.
● What is the circuit IAD and what is the frequency? International Air Distress with a
FREQ. of 121.5MHz

HF

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


● What radio is used for HF? Marconi, Marconi Selenia
● Nomenclature for HF radio? URC-109
● Settings for HF voice circuit? FREQ. Mode is USB, Select Voice, Then input FREQ.
IAW Commplan
● Settings for HF LINK 11? Local, Disable, Link 11, TX, RMT Key, Mode ISB
● List of HF antennas and their locations? AS-3773 (Twin Whips), AS-2537 (35 Foot
Whips), AS-3606(AVKS), AS-3871 (Fan Wires)
● Which radio is used for HF SAR? RT-1694
● Describe USB, LSB, and ISB? Upper Side Band, Lower Side Band, Intermediate
Side Band
● What are MUF, LUF, and FOT? Most Usable Freq., Lowest Usable Freq., Frequency
of Optimal Transmission
● What CCI is used for LINK 11? KG-40
● Who uses LINK 11? DPC
● What is HERO? Hazardous Electromagnetic Radiation of Ordnance
● Who sets HERO? OHO
● List reasons to lower or raise the whip antennas? Flight Quarters, Pulling into Port,
Pulling out of Port, Restricted Maneuver indoc, Fuel Replenishment, Supply
Replenishment

PORTABLE RADIOS

● What does EPIRB stand for? Emergency Positioning Indicating Radio Beacon
● What is the beacon frequency of the EPIRB? 406 MHz
● What two frequency ranges can the PRC-113 do?
● What two frequencies can the PRC-96 do? 243.000 MHz & 121.500 MHz

301&303/Message Center
● What are the 4 precedence’s and how much time do you have to send them?
R- Routine (6HRS) P-Priority (3HRS) O-Immediate (30Min.) Z- Flash (10Min.)
● How do you send an OTO on NAVMACS?
NPM DE NBHR SENDING OTO TO RAISE R/R…K/JJA

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


● How would you write Format line 2?
RTTUZYUW RXXXXXX0000 3652301-UUUU--RHMCSUU.
● What does C2OIX stand for? Command & Control Official Information Exchange
● What does DPVS stand for? Distributed PLA Verification System
● What is the process of releasing a message on C2OIX? 1.Batch Import, 2.Upload,
3.Release
● What does EMCON stand for and what is it? Emission Control
Turning radiation off on the transmitters
● What does OSRI stand for? Originating Station Routing Indicator
● What does DSRI stand for? Designation Station Routing Indicator
● What does NAVMACS stand for? Naval Modular Automated Communications
System
● What are the colors on NAVMACS and what does each one mean?
Purple- Test , Green- Active, Yellow- Hold, White- Emcon, Blue- Inactive
● What does AIG stand for and what is it? Address Indicator Group; 2 or 3 PLA’s in a
group for tactical purposes
● What does CAD stand for and what is it? Collective Address Designator; 4 or more
PLA’s in a group for strategic ops.
● What does CUDIXS stand for? Common User Digital Information Exchange Sub-
System
● What is the primary means of sending out message traffic? C2OIX
● What are the 3 ways to distribute messages? C2OIX, NAVMACS, Fleet Message
System(FMS).
● What logs are kept in JMC? T/S Log, AMCROSS Log, Visitor Log, Burn Bag Log, P4
Log, Master Station Log, Outgoing Message Log
● What is Fleet Broadcast under in the 2301? PMCC
● What three keys are loaded into the KIV-7M for Fleet Broadcast? CV = Community
Variable, BAV= Broadcast Area Variable , UV= Universal Variable
● What is and who sets MINIMIZE? Limiting Message Traffic In A High Tempo
Environment & CNO Sets It
● What does CIC stand for?
CONTENT INDICATOR CODES
ZYUW- GenAdmin; NGCN- Casrep; NBAT- Ammo; ZDKW- Retransmit; ZYVW-
Service; ZYUM- Moverep; ZELX- Correction; ZBKW- Cancellation
● How do you route an AMCROSS message underway? Log then Hand route to CHAPS
Inport ? Log then route to CDO
● How do you route a P4 message? Log then route to CO Admin
● Where do you get the PAC number for CUDIXS from?2301
● What does NTP stand for? Naval Telecommunications Publication
● How do you enter a port on the DAMA? *9 then Desired Port Number
● How do you exit a port on the DAMA? *6
● How do you check for the Guard Number? *2
● What does TBA stand for? Terminal Based Address
● How do you enter a Guard Number? *1 Then Desired Guard Number

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


● How do you delete a Guard Number? *4
● How do you connect a call on the DAMA? #76 then Guard Number of Desired Circuit
● How do you disconnect a call on the DAMA? #4

IW OVERVIEW
FREQUENCY
ANTENNA NOMENCLATURE FREQUENCY RANGE
35 FOOT WHIPS AS-2537 HF LOS 3-30 MHz
17 FOOT WHIPS AS-3773 HF LOS 3-30 MHz
AVKS AS-3606 HF LOS 3-30 MHz
FAN WIRES AS-3871 HF LOS 3-30 MHz
STOVE PIPE AS-2809 VHF LOS 30-300 MHz
DI-POLE AS-4366 VHF LOS 30-300 MHz
PLATED PAIRS AS-1735 UHF LOS 300 MHz-3 GHz
TRASH CAN AS-3018 UHF (SATCOM) 300 MHz-3 GHz
SPIDERS AS-390 UHF LOS 300 MHz-3 GHz
DSCS AS-4514 SHF 3 GHz-30 GHz
CBSP USC-69 SHF 3 GHz-30 GHz
GBS OE-581 SHF 3 GHz-30 GHz
NO NICKNAME AS-4294 EHF 30 GHZ- 300 GHz

ADNS (automated digital network system) – IP services, SHF/EHF Satcom, Ship to Shore
communications

CUDIXS (common user digital info exchange sub-system) – Half Duplex, UHF Satcom,
Secondary means of message traffic, Can send and up to Top Secret

VTC (Video TeleConference)

Gingerbread explain with the procedure involved – Intruder on net, end all communications

Define the following message precedence.

Routine (R) – 6 hrs or less

Priority (P) – 3 hrs or less

Immediate (O) – 30 minutes or less

Flash (Z) – 10 minutes or less

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


White Pinnacle (W) – 3 Minutes or less; a test for radio Shacks, Must be on the
President’s desk in 10 minutes

Purpose of a COMMPLAN

Distribute to all Circuitry; the Commplan is derived from the information on the
OPTASK COMMS

Define the following

a. Full Duplex – Simultaneous tx/rx communication (telephone)


b. Half Duplex – One at a time tx/rx communication (walkie talkies)
c. Simplex – Can only transmit or receive (1MC) / (FLT BCST)

Define

a. PLA- Plain Language Address


b. AIG – Address Indicator Group
c. CAD – Collective Address Designators
d. OSRI – Originating Station Routing Indicator
e. DSRI – Designator Station Routing Indicator
f. OIX – Official Information Exchange

Purpose of the IRIDIUM phones

- Satellite phone
- Troubleshooting
- Emergency phone calls only

Define and explain DAMA

- Demand Assigned Multiple Access


- Used for UHF SATCOM
- Holds for 4 circuits

Define the purpose of GBS

- Global Broadcast Service


- Provide data imagery, video and other information near world wide
- Receive only

Define bandwidth allocation

- Allocating Bandwidth to different entities

List advantages of the following

- EHF: Nuclear survivable, Low Probability Interception, Anti-Jammable, Low


Probability of Detection

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


Define the purpose of the following

- CBSP
Commercial Broadband Satellite Program
Civilians Own
- DSCS
Defense Satellite Communication System
DoD Owns

Define the following

- COMSEC incidents (3 Types)


Personal – Selling secrets
Physical – Stealing SKL, Missing COMSEC
Crypto – Load Crypto on wrong device
- Reportable PDS (Practice Dangerous to Security)
Up to the 19 Stars
- Non-reportable PDS (Practice Dangerous to Security)
Up to the CO

Define the following areas of COMSEC

- Crypto security
- Transmission Security
- Emission Security
- Physical Security

COMSEC OVERVIEW
KG175, KY-58, KIV-5, KGV-11, KIV-7m, MD1324, PYQ-
10, KG40, KG 250, STE, Tempest, Faccon, Iridium Phone,
Cik
Kg175:
1)2 Keys == 1 Modern, 1 PPK (Traditional Key)
Also, Uses A “CIK” (Crypto Ignition Key).
2). Known As A Taclane, It Also Has INE (Inline
Network Encryption) Capabilities Meaning, It Encrypts Network Traffic.
3). Load Crypto And Configure Settings: Connect The Taclane With The Red RJ-45 Cable,
That’s Connected With The Computer Console Near It.
Ky-58:

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


1).UHF Satcom, UHF Los, VHF
2). Housing For KY-58 Is Known As HYX-58
3). There Is No Fill Button On The KY-58 So A Handset Can Be Connected To The KY-58.
The Transmit Button On The Handset Is Used To Fill Crypto On The KY-58.
How To Load Crypto For KY-58

5). *Connect The Skl And Handset To The KY-58


*Switch Mode To Ld On The KY-58 And Lcl On The ……….HYX-58
*Make Sure Both HYX-58 And KY-58 Are Switch On And Volume Knob Is Maxed.
*Load Crypto With The Skl And Press The Transmit Button Two Times, On The Handset,
Wait For White Noise Then Silence.
*Disconnect SKL And Handset, Switch Settings From LD To C On KY-58 And LCL To
Rem On HYX-58. Crypto Load Complete.
Turning Off The KY-58
6). Turn The Power Knob On The KY-58 From “On” To “Off”
Then Power Switch The HYX-58 From “On” To “Off”
KYV-5/ANDVT

1). Andvt == Advanced Narrowband Digital Voice Terminal


2). UHF Los (Un-encrypted), UHF Satcom, EHF, HF
3). When Crypto Is Loaded Correctly, The Andvt Should Display
A “01” In The Analog Display Box When Switch Is Turned To Ku
4). The Housing For The Andvt Is Called The Usc 43.
5). There Is No “C” (Cypher) Function On The Andvt, Instead It
Says “Net” (Network).
KGV-11
1). Connected To The TD-1271 (Dama).
2). UHF Satcom, EHF
3). Used For Bulk Encryption
KIV-7m
1). Has Bulk Encryption And Ine Capabilities.
2). Uses 3 Keys For Fleet Broadcast.

3). Emulates Other Crypto Devices Using “Personalities”, Such As:


KW-46l (Fleet Broadcast), Suite-a (Cudixs), Suite-b, KG-84,
Stadil-j, KW-46m.
4). Suite A & B == Not Just A Personality Type On The KIV-7m, But A
Combination Of Personality, Crypto And Settings, Loaded In
The ”V” And “Xo1” Slots, That Make Up The Suite.
5). Uses A CIK,
6). Has 2 Channels That Can Be Loaded With Multiple Keys.

PYQ-10
1). Also Known As An SKL(Simple Key Loader)

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


2). Uses A CIK
3). Emulates Other Loading Devices, Such As The KIK-11, KIK-15 And
The KOI-18.
4). Can Be Zeroized By Removing The Cik, Removing The Battery
For An Extended Period Of Time (Over 1 Min), Overloading The
Audit Trail (At 100%), Or Manually Deleting The Keys.
5). Windows Based Operating System.
MD-1324
1). Also Known As The Mini-dama. The MD-1324 Is Its Own
Crypto Device, Modem And Multiplexer, Which Unlike The
Regular Dama’s (TD-1271), Need The KGV-11’s To Load Crypto.
2). Can Send And Receive Data And Voice On 5khz, 25khz, Dedicated, And Iw (Integrated
Waveform) Circuits.

3). MD-1324’s Located In Radio

4). Utilizes Both The Md’s And The Console Above Them To Load
Crypto. Using 2 Keys To Load Key Slots 3 And 4 On The Md’s,
That Correspond To Slots 2 And 3 On The Console.

5). Load Crypto


*On Console, Select The Modem On The Drop Down Menu
*Go To Configure > Crypto,
*Click On Load/Zeroize Tab
*Click Zeroize
*On Md Select Port 3 Or 4, With Port 2 Or 3 On The Console
*Load Key On SKL, Click Load Key On Console
*When Both Keys Are Loaded, Refresh Status
*”Key Status” Should Have A Check Mark On The Loaded
Port
*Click Apply And Ok
*Confirm In Settings In Settings Tab, 2 Check Marks On
Ports 2 And 3, With One Port Checked As “Current”.
KG-40
1 Used For GPS
KG-250
1). Is INE Capable
2). Uses 2 Ppk (Traditional) Crypto Keys
3). Uses A CIK
4). When Loading Keys, Make Sure To Load The New Keys First,
Then Zeroize The Old Keys.
5). 1 Used For Gbs

STE

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


1). Secure Terminal Equipment
2). Ste’s Are The Black Phones You Find Inside The Shops On The
Ship.
3). Uses A Ksv-21 To Secure And Encrypt Phone Calls.
Iridium Phones
1). Satellite Telephone That Can Be Used While Onboard The Ship.
2). The Monthly Service Fee, If Used, Is 25,000$
Tempest Checks
1). A Radio Emissions Check, That Checks For Excess Radio Wave Emissions, Leaving The
Compartments Or The Ship.
Faccon
1). Master Kill Switch For All Electrical Circuits Onboard The Ship.
Blackout Procedures
1). If A Blackout Occured, Notify The Cwo Then, Start Shutting
Off Crypto Devices.

EKMS OVERVIEW
EKMS

Electronic Key Management System

EKMS 1E

Policies and Procedures Manual

EKMS 3E

EKMS Inspection Manual

CMS 5E

CMS Cryptographic Equipment information/guidance manual

NAG16

OTAT/OTAR Manual

OTAT

Over The Air Transfer

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


OTAR

Over the air Repeat

2280.3

NCTS instruction

5511.6 series

Emergency Action Plan

CMS 25

KEYMAT local destruction record sheet

SF 700

Record change of safe combination [stays in safe]

SF 701

Space daily security checklist [stays out of safe]

SF 702

Security container check sheet [stays outside for opening/closing safe]

SF 153

Records all Transfer, Receipt, Destruction, "other" and inventory for crypto material.

OF (Optional Form) 89

Record of safe maintenance [stays in safe]

What annex has retention periods for each EKMS form?

Annex Tango

CNO

Overall responsible within the Navy of Cryptographic Items

ISIC (Immediate superior in command)

NCTAMS LANT

NCMS

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


Central Office

EKMS Manager

Mr. John Doe

EKMS Alternates

IT1 Jane Doe

EKMS Clerk

IT3 Schmucatelly

Name 3 types of COMSEC incidents

Personnel, physical, Cryptographic

Personnel

Espionage, stealing/selling information

Physical

Loss of material/canister, improper destruction

Cryptographic

Sending wrong OCTAL, reloading wrong crypto into circuit twice.

PDS (Practices Dangerous to Security)

Practices which have the potential to jeopardize the security of COMSEC material
(compromise)

Reportable

PDS reported to ISIC i.e.: missing signature, lost STU III CIK

Non-Reportable

PDS reported to CO, or stays in command i.e.: improperly completed accounting reports
or doc, item not listed on account inventory.

TIER 0

NSA EKMS 20, provides centralized key management services for ALL forms of key

TIER 1

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


NCMS/COR (central office of Records), Intermediate key generation and distribution
center

TIER 2

NCTS NAPLES IA Vault, manage key and other comsec material

TIER 3

Local Elements, accounts that have received comsec material

CMS Advice and Assistance

Conducts informal training every 18 months

CMS Advice and Assistance

Conducts official inspection every 2 years

Top Secret

Orange

Secret

Red

Confidential

Blue

Unclassified

Green

Effective

In use to support an operation requirement

Superseded

No longer authorized for use, must be immediately destroyed

Reserved on board

Held for future use

Regular suppression

Based on pre-determined date

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


Irregular Suppression

Not pre-determined but occurs as a result of use

Emergency Suppression

Compromised

AL code 1

Serial/Register from product to destruction accountable to the COR

AL code 2

Quantity from production to destruction accountable to the COR

AL code 4

Quantity and handled/safeguarded based on classification accounted locally

Al code 6

Electronically generated and continuously accountable to the COR

AL code 7

Electronically generated and accounted locally

Diagraph Codes

COMSEC keying material preprinted data consisting of two letters printed to the left of
the short title on each segment of the tape leader.

Diagraph Code First letter

Identifies the number of different key settings within the canister, number of copies of
each key setting, and total number of segments in the canister, respectively

Emergency Destruction Drills

These drills must be accomplished quarterly.

Emergency Destruction Drill: Superseded

First items destroyed in Emergency Destruction drill from Top secret, secret, then
unclassified.

Emergency Destruction Drill: Current

Second items destroyed in Emergency Destruction drill from Top secret, secret, then
unclassified.

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


Emergency Destruction Drill: Reserved-On board

Third items destroyed in Emergency Destruction drill from Top secret, secret, then
unclassified.

Transport of COMSEC material

Must have TPI; be on the EKMS access list, EKMS qualified, and courier card in order to

Change combo when?

Lock is initially placed in use, when any person no longer needs access, compromised,
at least once every 2 years.

When do we conduct inventory?

Semiannually, annually, change of command, disestablishment

DFS

Defense courier system Top secret/secret courier to transport material

Amendments

Any Changes to a publication


Different types of EHF USC-83

3 black / 1 red

TPI

Two person Integrity

TPC

Two person Control

Segment

Piece of physical Key tape

SKL/PYQ-10

Holds 10,000 Keys, Audit done first 5 days of every month and/or 80% capacity, has
Audit Trails.

CCI

Controlled Cryptographic Item

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


CIK

Password and username to access PYQ-10.

IW INFORMATION
ASSURANCE/ CYBER
SECURITY
Common Core
INFORMATION OPERATIONS THAT PROTECT AND
DEFINE IA
DEFEND DATA AND INFORMATION SYSTEMS
THE EVALUATION OF THE TECHNICAL AND NON
DEFINE CERTIFICATION TECHNICAL SECURITY FEATURES OF AN INFORMATION
SYSTEM.
IS THE OFFICIAL MANAGEMENT DECISION TO OPERATE
DEFINE ACCREDITATION AN INFORMATION SYSTEM IN A SPECIFIED
ENVIRONMENT
DEFINE DAA
THE OFFICIAL WHO ASSUMES FORMAL RESPONSIBILITY
(DESIGNATED
FOR OPERATING A SYSTEM AT AN ACCEPTABLE LEVEL
ACCREDITING
OF RISK.
AUTHORITY)
SYSTEM SECURITY PLAN IS THE FORMAL DOCUMENT
DEFINE SYSTEM PREPARED BY THE INFORMATION SYSTEM OWNER.
SECURITY PLAN PROVIDES AN OVERVIEW OF THE SECURITY
REQUIREMENTS FOR THE SYSTEM
DEFINE SYSTEM
DESCRIBES THE PLANNED SECURITY TASKS REQUIRED
SECURITY
TO MEET SYSTEM OR NETWORK SECURITY
AUTHORIZATION
REQUIREMENTS
AGREEMENT
GRANTED AFTER SUCCESSFUL CERTIFICATION AND
DEFINE ATO (AUTHORITY
ACCREDITATION OR TO PERMIT A MAJOR CONVERSION
TO OPERATE)
OF A SYSTEM. GOOD FOR 3 YEARS.
DEFINE IATO (INTERIM
INTERIM APPROVAL TO OPERATE
AUTHORITY TO
CAN BE GRANTED FOR UP TO 180 DAYS
OPERATE)
ACCOUNTS FOR ALL CHANGES TO A SITE OR
DEFINE CONFIGURATION
INFORMATION SYSTEM DURING ITS DESIGN,
MANAGEMENT
DEVELOPMENT AND OPERATION CYCLE.
DISCUSS SECURITY REVIEW THE SECURITY ATTRIBUTES OF EACH SYSTEM
PROCEDURES INVOLVED TO DETERMINE ADDITIONAL SECURITY REQUIREMENTS

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


WHEN PERFORMING
TO BE IMPLEMENTED. DOCUMENT THE REQUIREMENTS
CROSS DOMAIN
AS PART OF THE ACCREDITATION.
TRANSFERS
ALLOWS IT MANAGERS TO BALANCE THE COST OF
DISCUSS RISK
PROTECTIVE MEASURES WHILE ACHIEVING GAINS IN
MANAGEMENT
MISSION CAPABILITY
CONFIDENTIALITY
AUTHENTICATION
NAME THE FIVE
AVAILABILITY
ATTRIBUTES OF IA
NON REPUDIATION
INTEGRITY
WHAT IS ASSURANCE THAT INFO IS NOT DISCLOSED TO
CONFIDENTIALITY UNAUTHORIZED PERSONS, PROCESSES OR DEVICES.
ASSURANCE THAT INFORMATION IS NOT MODIFIED BY
UNAUTHORIZED PARTIES IN AN UNAUTHORIZED
MANNER. INTEGRITY SUPPORTS THE ASSURANCE THAT
WHAT IS INTEGRITY
INFORMATION IS NOT ACCIDENTALLY OR MALICIOUSLY
MANIPULATED, ALTERED, OR CORRUPTED. AND THE
ABILITY TO DETECT WHEN CHANGES HAVE BEEN MADE.
ASSURANCE OF TIMELY, RELIABLE ACCESS TO DATA
WHAT IS AVAILABILITY
AND INFORMATION SYSTEMS BY AUTHORIZED USERS
ASSURANCE THAT THE SENDER OF DATA IS PROVIDED
WHAT IS NON-
WITH PROOF OF DELIVERY AND THE RECIPIENT IS
REPUDIATION
PROVIDED WITH PROOF OF SENDERS IDENTITY.
WHAT IS ASSURANCE OF THE IDENTITY OF AN EMAIL MESSAGE
AUTHENTICATION SENDER OR RECEIVER.
MALICIOUS LOGIC
USER LEVEL INTRUSION
ROOT LEVEL INTRUSION
LIST THE NINE DENIAL OF SERVICE
CATEGORIES OF EXPLAINED ANOMALY
COMPUTER INCIDENTS RECONNAISSANCE
UNSUCCESSFUL ACTIVITY ATTEMPT
NON COMPLIANCE ACTIVITY
INVESTIGATING
EXPLAIN THE DOD
ALL WEBSITES MUST BE REGISTERED THROUGH THE
WORLD WIDE WEB
NAVY WEBSITE REGISTRATION SYSTEM.
SECURITY POLICY
INFORMATION ASSURANCE VULNERABILITY ALERT
ADDRESSES SEVERE NETWORK VULNERABILITIES THAT
DEFINE IAVA
POSE IMMEDIATE AND SEVERE THREATS TO DOD
SYSTEMS
INFORMATION ASSURANCE VULNERABILITY BULLETIN
DEFINE IAVB ADDRESSES NEW VULNERABILITIES THAT DO NOT POSE
AN IMMEDIATE RISK TO DOD SYSTEMS
IA VULNERABILITY TECHNICAL ADVISORIES ADDRESS
DEFINE IAVT NEW VULNERABILITIES THAT ARE GENERALLY
CATEGORIZED AS LOW RISK TO DON SYSTEMS.
COMPUTER TASKING ORDER
DEFINE CTO
CHANGE TO A POLICY OF INFORMATION SYSTEMS

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


DEFINE NTD (NAVY
A DIRECTIVE UPDATING POLICY AND GUIDANCE ON A
TELECOMMUNICATION
NETWORK. RECEIVED FROM COMNAVNETWARCOM
DIRECTIVE)
A COLLECTION OF UPDATES, FIXES OR ENHANCEMENTS
DEFINE SERVICE PACK TO A SOFTWARE PROGRAM DELIVERED IN THE FORM
OF A SINGLE INSTALLABLE PACKAGE.
EXAMINATION OF AN INFORMATION SYSTEM OR
DEFINE VULNERABILITY
PRODUCT TO DETERMINE THE EFFICIENCY OF SECURITY
ASSESSMENT
MEASURES.
ANY WEAKNESS, ADMINISTRATIVE PROCESS, OR ACT
OF PHYSICAL EXPOSURE THAT MAKES AN
VULNERABILITY
INFORMATION ASSET SUSCEPTIBLE TO EXPLOIT BY A
THREAT.
A POTENTIAL CAUSE OF AN UNWANTED IMPACT TO A
THREAT
SYSTEM OR ORGANIZATION.
INFORMATION ASSURANCE MANAGER
OVERSEAS ALL IAO'S, ENSURES SECURITY
STATE THE DUTIES OF
INSTRUCTIONS, GUIDANCE AND SOPS ARE MAINTAINED
AN IAM
AND IMPLEMENTED. OVERSEAS ALL IAVA'S, SECURITY
MEASURES, EVALUATIONS, AND ACCREDITATION.
Unit Specific
MULTIPLE LAYERS OF DEFENSE, REDUNDANCY, LIKE AN
DEFENSE-IN-DEPTH
ONION.
ANY CODE THAT IS PART OF A SOFTWARE SYSTEM
MALICIOUS CODE THAT IS INTENDED TO CAUSE SECURITY BREACHES OR
DAMAGE TO A SYSTEM
A COMPUTER THAT HAS BEEN COMPROMISED AND
ZOMBIE USED TO PERFORM MALICIOUS TASKS UNDER REMOTE
DIRECTION.
USED TO SPREAD EMAIL SPAM AND LAUNCH DENIAL-
BOT OF-SERVICE ATTACKS. SOFTWARE APPLICATION THAT
RUN AUTOMATED TASKS OVER THE INTERNET
COLLECTION OF ZOMBIE WORKSTATIONS RUNNING
BOTS (SOFTWARE APPLICATIONS THAT RUN
BOTNET
AUTOMATED TASKS OVER THE INTERNET) TO SPREAD
EMAIL SPAM AND LAUNCH DOS
A THREAT OR ATTACK THAT EXPLOITS A PREVIOUSLY
UNKNOWN VULNERABILITY IN A COMPUTER
ZERO DAY EXPLOIT APPLICATION OR OPERATING SYSTEM THAT
DEVELOPERS HAVE NOT HAD TIME TO ADDRESS AND
PATCH.
SOFTWARE THAT AIDS IN GATHERING INFORMATION
ABOUT A PERSON OR ORGANIZATION WITHOUT THEIR
SPYWARE
KNOWLEDGE. SENDS INFORMATION TO OTHER
ENTITIES.
A CODE INTENTIONALLY INSERTED INTO A SOFTWARE
LOGIC BOMB SYSTEM THAT WILL SET OFF A MALICIOUS FUNCTION
WHEN SPECIFIC CONDITIONS ARE MET.
SOFTWARE THAT LOGS EVERY KEYSTROKE AND
KEYLOGGERS
WRITES IT TO A FILE.

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


USER WHO GAINS ELEVATED ACCESS TO RESOURCES
PRIVILEGE ESCALATORS THAT ARE NORMALLY PROTECTED FROM AN
APPLICATION OR USE.
AN ATTEMPT TO MAKE A MACHINE OR NETWORK
DENIAL-OF-SERVICE RESOURCE UNAVAILABLE TO ITS INTENDED USERS.
PING OF DEATH.
DISTRIBUTED-DENIAL-OF-
LARGE SCALE DENIAL OF SERVICE
SERVICE
SOFTWARE THAT TAKES ADVANTAGE OF A BUG,
EXPLOIT GLITCH, OR VULNERABILITY. CAUSES UNINTENDED
BEHAVIOUR.
GLOBAL INFORMATION AN ALL ENCOMPASSING COMMUNICATION PROJECT OF
GRID THE UNITED STATES DoD
REDUCING VULNERABILITIES THAT MAY LEAD TO AN
MITIGATION
ATTACK ON A COMPUTER SYSTEM.
AN ATTACK ON A COMPUTER SYSTEM WITH THE
PENETRATION INTENTION OF FINDING SECURITY WEAKNESSES,
POTENTIALLY GAINING ACCESS
AN ATTEMPT TO GAIN ACCESS TO A COMPUTER AND ITS
PROBE
FILES THROUGH A KNOWN OR PROBABLE WEAK POINT
AN ELECTRONIC SIGNATURE THAT CAN BE USED BY
DIGITAL SIGNATURES SOMEONE TO AUTHENTICATE THE DOCUMENT, FILE, OR
EMAIL
A SERVICE THAT VALIDATES THE INTEGRITY OF A
NON-REPUDIATION
DIGITAL SIGNATURE
IS THE NAME OF MANAGEMENT OF CRYPTOGRAPHIC
KEYS IN A CRYPTOSYSTEM.
KEY MANAGEMENT
THIS INCLUDES DEALING WITH THE GENERATION,
EXCHANGE, STORAGE, USE, CRYPTO-SHREDDING
(DESTRUCTION) AND REPLACEMENT OF KEYS.
IN CHARGE OF IA PROGRAM. OVERSEE ALL IAO’S,
IAVA’S, SECURITY MEASURES, EVALUATIONS AND
ACCREDITATIONS.
IAM
ENSURES SECURITY INSTRUCTIONS, GUIDANCE AND
SOP’S ARE MAINTAINED AND IMPLEMENTED.
APPLIES EVERYTHING (IN TO EFFECT) THAT THE IAM
IAO
OVERSEES.
HE/SHE SHALL CONFIGURE AND OPERATE IA AND IA-
ENABLED TECHNOLOGY IN ACCORDANCE WITH DOD
INFORMATION SYSTEM
INFORMATION SYSTEM IA POLICIES AND ESTABLISH
SECURITY OFFICER
AND MANAGE AUTHORIZED USER ACCOUNTS FOR DOD
INFORMATION SYSTEMS.
WHEN A FILE OF HIGH CLASSIFICATION GETS PLACED
ELECTRONIC SPILLAGE ON A LOWER CLASSIFICATION SYSTEM IT CREATES AN
ELECTRONIC SPILLAGE.
WEBSITE TO SEE IF SOFTWARE OR APPLICATIONS ARE
DADMS
AUTHORIZED
NCDOC (NAVY CYBER IN CHARGE OF INCIDENTS, MONITORS NETWORK

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


DEFENSE OPERATIONS
ACTIVITY FOR MALICIOUS EVENTS.
COMMAND)
RED TEAM ATTEMPTS TO PENETRATE IA VULNERABILITIES.
PROTECT FROM THE INSIDE. TEAM COMES TO THE SHIP
AND SCANS THE ENTIRE NETWORK LOOKING FOR
BLUE TEAM VULNERABILITIES. ONCE IDENTIFIED THEY INFORM THE
COMMAND, AND THE COMMAND IS RESPONSIBLE FOR
FIXING THE DISCREPANCIES. CTN’S
A DEVICE OR a SOFTWARE APPLICATION THAT
MONITORS NETWORK OR SYSTEM ACTIVITIES FOR
MALICIOUS ACTIVITY OR POLICY VIOLATIONS AND
PRODUCES REPORTS TO A MANAGEMENT STATION.
ACTIVE: IDS AUTO-RESPONDS TO THE SUSPICIOUS
INTRUSION DETECTION
ACTIVITY BY RESETTING THE CONNECTION OR BY
SYSTEM (IDS)
REPROGRAMMING THE FIREWALL TO BLOCK THE
TRAFFIC.
PASSIVE: IDS DETECTS A POTENTIAL SECURITY
BREACH, LOGS THE INFO AND SIGNALS AN ALERT ON
THE CONSOLE OR OWNER.
SOFTWARE THAT PREVENTS SUSPICIOUS ACTIVITY BY
INTRUSION PREVENTION
RESETTING THE CONNECTION OR BLOCKING NETWORK
SYSTEM (IPS)
TRAFFIC FROM THE MALICIOUS SOURCE.
SOFTWARE APPLICATIONS USED WITHIN THE
DEPARTMENT OF DEFENSE (DOD) TO MONITOR, DETECT,
HOST-BASED SECURITY
AND COUNTERATTACK AGAINST THREATS TO DOD
SYSTEM (HBSS)
COMPUTER NETWORKS AND SYSTEMS.

SHIP SPECIFIC
SOFTWARE APPLICATIONS USED WITHIN THE
DEPARTMENT OF DEFENSE (DOD) TO MONITOR, DETECT,
HOST BASED SECURITY
AND COUNTERATTACK AGAINST THREATS TO DOD
SYSTEM (HBSS)
COMPUTER NETWORKS AND SYSTEMS.

WINDOWS SERVER A PROGRAM THAT ENABLES ADMINISTRATORS TO


UPDATE SERVICES MANAGE THE DISTRIBUTION OF UPDATES AND
(WSUS) ON SERVERS HOTFIXES. THESE ARE RELEASED BY SPAWAR.

WINDOWS SERVER A PROGRAM THAT ENABLES ADMINISTRATORS TO


UPDATE SERVICES MANAGE THE DISTRIBUTION OF UPDATES AND
(WSUS) ON HOTFIXES. THESE ARE PUSHED AFTER INITIAL
WORKSTATIONS INSTALLATION OF SERVER UPDATES.

A SOFTWARE PROGRAM DESIGNED TO IDENTIFY AND


ANTI-VIRUS REMOVE KNOWN OR POTENTIAL COMPUTER VIRUSES.

OVERSEES ALL IAO’S, ENSURE SECURITY


INSTRUCTIONS, GUIDANCE, AND SOP’S ARE
IAM MAINTAINED AND IMPLEMENTED. OVERSEES ALL
IAVA’S, SECURITY MEASURES, EVALUATIONS, AND
ACCREDITATION.

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


ASSIST THE IAM IN MEETING THE DUTIES AND
IAO
RESPONSIBILITIES OF NETWORK SECURITY.
A SET OF HARDWARE, SOFTWARE, PEOPLE, POLICIES,
AND PROCEDURES REQUIRED TO CREATE, MANAGE,
PUBLIC KEY DISTRIBUTE, USE, STORE, AND REVOKE DIGITAL
INFRASTRUCTURE (PKI) CERTIFICATES. EVERYTHING THAT GOES IN TO BE ABLE
TO YOU USE YOUR DIGITAL CERTIFICATE ON YOUR CAC
AND SIPR TOKEN.

IW SYSTEMS AND NETWORKS


Define the following devices:

● Host/Client – A computer or device that is connected to the internet/network.


● Application Server – A server that holds applications.
● Hub – A networking device that forwards packets to all segments.
● Switch – A networking device that has the ability to choose which segments it wants to
forward the packet(s) to.
● Router - A Networking device that acts as the default gateway.
● WAP - Wireless Access Point, device that broadcast a wired network using WI-FI,
Bluetooth, etc.
● Proxy Server – Server that requests resources from other servers for a user to receive.
● Firewall – A device, set of devices and/or software that permits or denies off
going/incoming network traffic.
● VPN Concentrator – An encrypted tunnel between hosts.
● Back-up – Copy of data that is used to restore original data during a data loss event.
● Repeater – An electronic device that receives a signal and re-amplifies it so the signal
can cover longer distances

What are the layers of routing?

● Access – This layer includes hubs and switches. It ensures packets are delivered to
end user computer
● Distribution – This layer includes LAN-based routers and layer 3 switches. It ensures
that packets are properly routed in the network.
● Core – This layer includes high-end switches and backbones. It is concerned with
speed and reliable delivery of packets (information).

Topologies and Networks.

● Topologies are the physical or logical design of a network.

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


● LAN (Local Area Network) – A computer network covering a small area such as a home
or office.
● WAN (Wide Area Network) – A computer network that covers a broad area, such as
businesses or organizations.
● MAN (Metropolitan Area Network) – The largest type of network that spans cities and/or
campuses. Example of this is the internet.
● GAN (Generative Adversarial Network) – Network that supports mobile
communications, wireless LANS, etc via satellite.

OSI Model and TCP/IP Model

● OSI (Open Systems Interconnection) Model – Is a way of subdividing a communications


system into smaller parts called layers.
● TCP/IP (Transmission Control Protocol/Internet Protocol) Model - Is a way of subdividing
a communications system into smaller parts called layers.

IPv4 VS IPv6 – Both are connectionless protocol that allow you to access a network(s). The
difference is IPv4 is 32-bit while IPv6 is 128-bit.

Classes of Network.
● NIPRNET (Non-Classified Internet Protocol Router Network) - Used for
processing information up to Unclassified.
● SIPRNET (Secret Internet Protocol Router Network - Used for processing
information up to Secret.
● JWICS (Joint Worldwide Intelligence Communication System - Used for
processing information up to Secure Compartmented Information.

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


The different networks.

● NMCI – Serves as the primary network for shore U.S. users.


● ONENET – Serves as the primary network for OCONUS shore users.
● IT21 – Serves as the primary network for all afloat commands.

What is an OS and Application?

● Operating System - Is a system software that regulates the ways


applications are used.
● Application - Is a computer software that performs singular or multiple tasks
for a user.

What is the purpose of DNS?

● DNS (Domain Name Service/System) – Translates host names to IP addresses


and vice versa.

What is CNO?

● CNO (Computer Network Operations) – It is the actions taken via computer


networks to protect, monitor, analyze and respond to network attacks that would
compromise information systems.

INFOCON.

● INFOCON (Information Operations Condition) System – A defense system


based on the status of information systems used to defend against network
attacks.
● INFOCON 5 is the least restrictive while INFOCON 1 is the most restrictive.

Different commands.

● NCDOC (Navy Cyber Defense Operations Command) – Oversees and monitors


networks.
● FLTNOC (Fleet Network Operations Center) – Provides IP services to the fleet.
(There are 4: PRNOC,UARNOC, ECRNOC and IORNOC.)
● NCTS (Naval Computer and Telecommunications Station) – Provides secure,
reliable, and timely services to U.S. commands.
● The five services provided by FLTNOC are; IP Services, Email, Message
Traffic, Voice Comms, VTC.

What is CAS?

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


● Collaboration at Sea – Web based application to post mission essential
information for user with low bandwidth consumption.

State the following servers and applications/servers on them.

● NIAPS (Navy Integrated Application Product Suite)


Sharepoint(Homepage) eSOMS(Tag-out Module)
SKED 3.2 (3M Program) FSM(Food Service Management)
TORIS(Training Officer Database) WebATIS(Equipment Publication
FEDLOG(Federal Logistics) CTA(Career Tools Afloat)
ROM3(Ship’s Store)

● NTCSS (Navy Tactical Command Support System)


-RADM(Relational Admin),
-RSUPPLY(Relational Supply),
-OMMS-NG(Organizational Maintenance Management System – New Generation),
-NALCOMIS(Naval Aviation Logistics Command Management Information System)
● CENTRIXS (Combined Enterprise Regional Information Exchange System)
The system is used to talk to foreign allies over a secure network, there are 4 enclaves.
-JPN
-KOREA
-CNFC
-CMFP
● TBMCS (Theatre Battle Management Core System) – The system is used to
track airborne resources.
● GCCS-M (Global Command and Control System – Maritime) – Tracks enemies
and allies and provides a COP(Common Operational Picture).
● DCGS-N (Distributed Common Ground System – Navy) – Network that provides
access to GALE, GCCS-M and imagery applications.

What is ASI?

● ASI (Authorized Service Interruption) – A coordinated downtime/maintenance


window with potential of impacting the network. EX: Weekly Reboots

What is the difference between HTTP and HTTPS?

● HTTP is unsecure while HTTPS is secure.

What is RADMERC?

● RADMERC (Radiant Mercury) – Classes and declasses information to


different systems.

What is MIRC?

● MIRC (Microsoft Internet Relay Chat) – SIPR chat.

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


What is RAID?
● RAID (Redundant Array of Independent Disks) – Provides data redundancy or
performance improvement.
What are the four IP classes and range used by DoD?
● Class A: 1.X.X.X - 127.X.X.X
Class B: 127.X.X.X - 191.X.X.X
Class C: 192.X.X.X – 223.X.X.X
Class D: 224.X.X.X – 254.X.X.X

What does the following servers do?


● File Server – Holds and distributes files.
Mail Server – Allows commands to send and receive emails.
DNS Server - Translates host names to IP addresses.
Web Server – Allows users to web browse.
Print Server – Manages all print devices on the network.

What does a VLAN do?


● VLAN(Virtual Local Area Network) – Segments the network so that other users
can participate in their own network. An example of this is when marines ride
the BHR network, yet have their own marine network.

Know the following ports:


● FTP (File Transfer Protocol) – 20/21
SSH (Secure Shell) – 22
Telnet – 23
SMTP (Simple Mail Transfer Protocol) – 25
DNS (Domain Name Service/System) - 53
HTTP (Hypertext Transfer Protocol) – 80
POPv3 (Post Office Protocol Version 3) – 110
HTTPS (Hypertext Transfer Protocol Secure) - 443

What is OWA?

● OWA (Outlook Web Access) – Allows access to an email account remotely


through the Internet.
What is What’s Up Gold?
● What’s Up Gold – Is a software that monitors network devices and shows the
current status of the network.

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


What is ISNS?
● ISNS (Integrated Shipboard Network System) – A high-speed information
network that provides communications to personnel.

Describe the following Microsoft components:

● TMG (Threat Management Gateway) – A network firewall that controls


incoming and outgoing traffic.
● Home Drive – An external storage drive that provides users additional space
for files.
● Share Drive – A network storage drive that stores files for the whole
command.

Describe the following Conditions and when each one is set.

● OPSECON - Used to set internet capabilities for users.


● RIVERCITY – Used during emergency situations to limit information being
released. EX: Man Overboard, GQ, Med-Evac, etc.
● EMCON – Used to reduce telecommunication signatures being sent off the ship.
Set when needed to disguise ourselves.

Explain the following Network Security:


● Access List – A list that grants access to cleared personnel in protected spaces.
Firewall - A software or hardware-based network security system that controls the incoming
and outgoing network traffic

Consolidated AfloatNetworks&EnterpriseServices

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


1. What is CAS? What is WRBS, what type of info does it broadcast?
a. CAS = Collaboration at Sea. WRBS = wireless reach back system. Used to capture
biometrics/identify suspects
2. What is Sailor 2.1 and who supports it?
a. Website for submitting trouble tickets to SPAWAR
3. How many enclaves are supported on the CANES Network?
a. 4 = UNCLAS, SECRET, SCI, Secret Releasable
4. What/Where are NCTAMS? How many master stations?
a. Naval Computer Telecommunications Area Master Station. Located in Hawaii and
Virginia
b. Provides communication system support to shore and afloat units
5. Which Enclave is used for the primary warfighter?
a. SECRET/SIPR is used for primary warfighting
6. What racks are used in CANES?
a. Backbone rack (hosts backbone switch), Data Center Rack (VMs), Edge Switch Racks
(connection to end user) , and VTC( VideoTeleConference) Racks

7. What enclave is MAC-1 Failover used on?


a. SECRET/SIPR
8. Network Topologies:
a. Star topology – all computers and devices are connected to a main hub or switch. The
hub or switch amasses and disburses the flow of data within the network. Star
topology is the most common type of network and follows the Ethernet standard.
b. Bus topology – in this arrangement computers and devices are connected to a single
linear cable called a trunk. The trunk is also referred to as the backbone or a segment.
Each end of the trunk must be discharged to prevent the signal from rebounding back
up the cable.
c. Ring topology – computers and devices are connected to a closed loop cable. Here
there are no terminating ends so if one system crashes the entire network goes down.
Each computer functions as a repeater and charges the signal before sending it to the
next station.
d. Mesh topology: infrastructure nodes (i.e. bridges, switches and other infrastructure
devices) connect directly, dynamically and non-hierarchically to as many other nodes
as possible and cooperate with one another to efficiently route data from/to clients.
9. What replaced CENTRIX?
a. SR
10. What are the Canes Architectural Domains:
a. System Management (15), Core Enterprise (6), Computing Infrastructure (6), Network
Communications (5), Information Assurance (2), Domain Level (1)
11. What does SR support?
a. Coalition partners/allies

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


12. What do VTC racks host?
a. VTC and VDS (on force level units)
13. Know difference between LAN Distribution, File Transfer and Video Distribution
14. What enclave uses wireless?
a. UNCLAS
15. What layer of the OSI model is a switch found on?
a. Layer 2 (filters by MAC address)
16. What layer of the OSI model is a router found on?
a. Layer 3, uses ACLs (Access Control Lists) to filter
17. What server is the blackberry hosted on?
a. BES, Blackberry Enterprise Suite
18. What is a SAN Switch?
a. Makes a network of storage devices accessible to multiple servers
19. Office productivity is provided by?
a. Microsoft 2010 Suite
20. What Raid is used in CANES?
a. 5
21. How do routers allow access through the network?
a. ACL’s, Access Control Lists. Uses IP addresses
What is Linux used for on the CANES network?
Used on VM’s: AP02 and RHWCS
What are the file systems and Operating Systems on the CANES Network?
Server OS types: Windows Server 2003 and 2008, Red Hat Enterprise Linux (RHEL 5.x
and 6.x), Solaris
Workstation OS types: Windows 7 and XP
What are the 2 Primary functions of Linux Kernel?
Resource allocation and system service management
How many standard directories and types of root directories in a Linux system?
15 directories
What are the 3 layers to Linux, how do they interact with each other?
Application (gives command), Shell (interpreter/command processor) and Kernel
(reports back to shell after action is completed)
What are common linux commands?
Man, mkdir, ls, shutdown, du, lp, tar, crontab, ps, cat, whoami, clear, pwd, find, echo
To search: grep
Where does Linux store information/data/files?
/etc/shadow
How many basic file types are in Linux and what are they?
7
Text file, audio file, executable, directory, character device, block device, local domain
socket, named pipe, symbolic link
EMC Ionics Suite

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


9
What roles does a system administrator have?
Ensures data, applications, and services are readily available to crew and ship. Correct
reported discrepancies, perform software backups in accordance with IAVA
What are the system management roles?
In ITOI know MCAS, ESM, MBIM and ACM
MCAS – Multitasking across IPs, ESM – servers, MBIM – maintenance, ACM –
application connectivity manager
What is event Manager used for on the CANES Network?
Collects all logs and consolidates it all into 1
what does vCM (vcenter configuration manager) provide?
Provides management services for workstations, NOT network devices
What are Incident management service and problem management service used for?
Incident management: to restore normal operations as quickly as possible with the
least possible impact to operations or the user. Also responsible for the management
of life cycle of all incidents. Automatically creates trouble tickets
Problem management: service designed to resolve the fundamental problem in the
CANES infrastructure that cause faults or incidents

What type of file does the vCM use?


.crate files
Power point says its creates various files in diff locations with extension .dbe
What is the objective of a baseline?
Reduce project vulnerability
Who uses the rollback feature?
NCM/Network Configuration Manager
Used to roll back to baseline
What is the difference between NOC and DISA as it refers to patches?
License updates come from KMS servers at the NOC
Where is DHCP located? What enclave is it used on?
Located on WEB server
UNCLAS and S E C R E T
Where is the DNS server located?
DC01 (primary) DC02 (backup)
NTP and Symmetricon provides you with?
Time Service
How do you access the VMware service manager and what do you use it for?
Recommended that it is set as home page for all system administrators. Access from
browser and has view of all/tracks trouble tickets.
Network Security: “any activity that protects the CANES network from threats and
vulnerabilities is considered network security:

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


Information Assurance Manager (IAM) is responsible for the network security compliance and
reporting using CANES system management tools
CANES network is part of the DOD GIG Afloat Network
DOD 8500.01 Directive: defines measures to protect and defend information and information
systems by ensuring: availability, integrity, authentication, confidentiality, non-repudiation
Network security for a CANES network must ensure data exchanges between systems are
encrypted, in accordance with DISA STIG (best practices, checklist, etc)
Computer Network Defense (CND) is designed to protect, monitor, analyze, detect and
respond to unauthorized activity. CND protects network through guidance of IA.
Information Assurance (IA) represents a series of measures to protect/defend from intrusions
IA ensures network confidentiality, integrity, availability, authentication, and non-repudiation
IAT Level 2 provides network support for Network Environment and advanced levels of CE.
IAM operates at 3 different levels
A firewall is a device or program that controls the flow of network traffic between networks or
host that employ different security postures.
ISE authorization to CANES network posture controls an evaluation, guest access, profiling,
max security and security groups
CANES provides HBSS for all enclaves including SR and SCI. HBSS is on every
server/workstation/host, whether is Windows or Linux

Outlook 2010 is used for EMAIL!


Chat Server: CS01 vm server
a. Openfire (Open source/free), client – Spark (UNCLAS, SECRET, SCI)
b. IBM Lotus Sametime (SR Enclave), client – IBM Lotus Sametime
c. MAKO (SECRET/SCI), client – MAKO
d. Lync (Secret only), client - lync
FileZilla is used to transfer files, on IAEXET vm server
What tools/applications are used for PDAs?
e. Blackberry Enterprise Suite (BES), blackberry enterprise server, access point, microsoft
exchange, Microsoft outlook, active directory, windows server
f. Hardware: PDA device, virtual blade systems, servers and switches, Cisco Aironet
g. Tools: PDA Diagram, Access Point Diagram, Wireless Internal Services diagram, APG
Dashboard, EMC Dashboard
What VLANs are used for wireless?
h. 190 (embarkables), 195(AP Management), 196 (clients)
VTC and VDS:
i. VTC VLANs: unclas – 183, Secret – 283
i. External, uses analog
j. VDS: can output video down to workstations, not found on DDGs
i. Internal, using an IP signal
k. INTERNAL MEANS “WITHIN BATTLEGROUP”, choose “FALSE” on test

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


What is the web based management software for VDS?
l. HAIvision Video Furnace
What physical servers do CDS and MLS use?
m. TS01 or TS0x, located in SECRET rack, in IA domain,
n. Uses transfer guard and CDS access to transfer between Secret and above Enclaves
o. Uses just CDS Access for unclas
p. HPDL 380 G6 is where CDS Access is, in Secret data center.
Web Hosting is under which domain:
q. Core Enterprise
CES is under what Domain?
r. IA
Printers are under what domain?
s. Computer Infrastructure
Exchange
t. Transport (IAEXT), Mail (Exchange server), Client Access (DC servers)
Which enclaves use which VLANs?
u. UNCLAS – 100s, SECRET – 200s, SR – 300s, SCI – 500s
Domain list for Core Enterprise:
v. Collaboration Service, database management, knowledge management, directory
management, office productivity, SOA
Domain list for Computing Infrastructure:
w. Application hosting, VTC Bridging System, Peripheral, Video Subsystem, VTC
Conference Room, Voice System
Domain list for IA:
x. Security (Risk Management), MLS/CDS
Print Service:
y. Print management service is located on VM IAEXET
z. SR printer is on VLAN 134
aa. Software: 3600/6600 drivers, print services manager, active directory
bb. To add a printer to the network: IP Address, Subnet and Gateway
What is the function of the BES server: for PDAs, black berry

UNDERSTANDING RADIO WAVES &


PROMULGATION

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


Q1. Which two composite fields (composed of E and H fields) are associated with every
antenna? A1. Induction field and radiation field

Q2. What composite field (composed of E and H fields) is found stored in the antenna?
A2. Induction field.

Q3. What composite field (composed of E and H fields) is propagated into free space? A3.
Radiation field.

Q4. What is the term used to describe the basic frequency of a radio wave? A4.
Fundamental frequency.

Q5. What is the term used to describe a whole number multiple of the basic frequency of a radio
wave? A5. Harmonic frequency or harmonics.

Q6. It is known that WWV operates on a frequency of 10 megahertz. What is the wavelength of
WWV? A6. 30 meters.

Q7. A station is known to operate at 60-meters. What is the frequency of the unknown station?
A7. 5 megahertz

Q8. If a transmitting antenna is placed close to the ground, how should the antenna be
polarized to give the greatest signal strength? A8. Vertically polarized.

Q9. In the right-hand rule for propagation, the thumb points in the direction of the E field and the
forefinger points in the direction of the H field. In what direction does the middle finger point?
A9. Direction of wave propagation.

Q10. What is one of the major reasons for the fading of radio waves which have been reflected
from a surface? A10. Shifting in the phase relationships of the wave.

Q11. What are the three layers of the atmosphere? A11. Troposphere, stratosphere, and
ionosphere.

Q12. Which layer of the atmosphere has relatively little effect on radio waves? A12.
Stratosphere.

Q13. What is the determining factor in classifying whether a radio wave is a ground wave or a
space wave? A13. Whether the component of the wave is travelling along the surface or
over the surface of the earth
Q14. What is the best type of surface or terrain to use for radio wave transmission?
A14. Radio horizon is about 1/3 farther
Q15. What is the primary difference between the radio horizon and the natural horizon?
A15. Sea water.

Q16. What three factors must be considered in the transmission of a surface wave to reduce
attenuation? A16. (a) electrical properties of the terrain (b) frequency (c) polarization of
the antenna

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


Q17. What causes ionization to occur in the ionosphere? A17. High energy ultraviolet light
waves from the sun

Q18. How are the four distinct layers of the ionosphere designated?
A18. D, E, F1, and F2 layers.

Q19. What is the height of the individual layers of the ionosphere?


A19. D layer is 30-55 miles, E layer 55-90 miles, and F layers are 90-240 miles.

Q20. What factor determines whether a radio wave is reflected or refracted by the ionosphere?
A20. Thickness of ionized layer.

Q21. There is a maximum frequency at which vertically transmitted radio waves can be
refracted back to Earth. What is this maximum frequency called? A21. Critical frequency.

Q22. What three main factors determine the amount of refraction in the ionosphere?
A22. (a) density of ionization of the layer (b) frequency (c) angle at which it enters the
layer

Q23. What is the skip zone of a radio wave?


A23. A zone of silence between the ground wave and sky wave where there is no
reception

Q24. Where does the greatest amount of ionospheric absorption occur in the ionosphere?
A24. Where ionization density is greatest

Q25. What is meant by the term "multipath"?


A25. A term used to describe the multiple pattern a radio wave may follow.

Q26. When a wide band of frequencies is transmitted simultaneously, each frequency will vary
in the amount of fading. What is this variable fading called? A26. Selective fading.

Q27. What are the two main sources of emi with which radio waves must compete?
A27. Natural and man-made interference.

Q28. Thunderstorms, snowstorms, cosmic sources, the sun, etc., are a few examples of emi
sources. What type of emi comes from these sources? A28. Natural.

Q29. Motors, switches, voltage regulators, generators, etc., are a few examples of emi sources.
What type of emi comes from these sources? A29. Man-made.

Q30. What are three ways of controlling the amount of transmitter-generated emi? A30. (a)
filtering and shielding of the transmitter (b) limiting bandwidth (c) cutting the antenna to
the correct frequency
Q31. What are three ways of controlling radiated emi during transmission? A31. (a) physical
separation of the antenna (b) limiting bandwidth of the antenna (c) use of directional
antennas

Q32. What are the two general types of variations in the ionosphere? A32. Regular and
irregular variations.

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


Q33. What is the main difference between these two types of variations? A33. Regular
variations can be predicted but irregular variations are unpredictable

Q34. What are the four main classes of regular variation which affect the extent of ionization in
the ionosphere? A34. Daily, seasonal, 11-year, and 27-days variation.

Q35. What are the three more common types of irregular variations in the ionosphere?
A35. Sporadic E, sudden disturbances, and ionospheric storms.

Q36. What do the letters muf, luf, and fot stand for?
A36. Muf is maximum usable frequency. Luf is lowest usable frequency. Fot is commonly
known as optimum working frequency.

Q37. When is muf at its highest and why?


A37. Muf is highest around noon. Ultraviolet light waves from the sun are most intense.

Q38. What happens to the radio wave if the luf is too low? A38. When luf is too low it is
absorbed and is too weak for reception.

Q39. What are some disadvantages of operating transmitters at or near the luf?
A39. Signal-to-noise ratio is low and the probability of multipath propagation is greater.

Q40. What are some disadvantages of operating a transmitter at or near the muf?
A40. Frequent signal fading and dropouts.

Q41. What is fot?


A41. Fot is the most practical operating frequency that can be relied on to avoid
problems of multipath, absorbtion, and noise.

Q42. How do raindrops affect radio waves?


A42. They can cause attenuation by scattering.

Q43. How does fog affect radio waves at frequencies above 2 gigahertz?
A43. It can cause attenuation by absorbtion.

Q44. How is the term "temperature inversion" used when referring to radio waves?
A44. It is a condition where layers of warm air are formed above layers of cool air.

Q45. How does temperature inversion affect radio transmission?


A45. It can cause vhf and uhf transmission to be propagated far beyond normal line-of-
sight distances.
Q46. In what layer of the atmosphere does virtually all weather phenomena occur?
A46. Troposphere.
Q47. Which radio frequency bands use the tropospheric scattering principle for propagation of
radio waves?
A47. Vhf and above.

Q48. Where is the tropospheric region that contributes most strongly to tropospheric scatter
propagation? A48. Near the mid-point between the transmitting and receiving antennas,
just above the radio horizon.

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


Q1. What are the two basic classifications of antennas?
A1. Half-wave (Hertz) and quarter-wave (Marconi).

Q2. What are the three parts of a complete antenna system?


A2. Coupling device, feeder, and antenna.

Q3. What three factors determine the type, size, and shape of an antenna?
A3. Frequency of operation of the transmitter, amount of power to be radiated, and
general direction of the receiving set.

Q4. If a wave travels exactly the length of an antenna from one end to the other and back
during the period of 1 cycle, what is the length of the antenna? A4. One-half the wavelength

Q5. What is the term used to identify the points of high current and high voltage on an antenna?
A5. Current and voltage loops.

Q6. What is the term used to identify the points of minimum current and minimum voltage on an
antenna? A6. Current and voltage nodes.

Q7. The various properties of a transmitting antenna can apply equally to the same antenna
when it is used as a receiving antenna. What term is used for this property?
A7. Reciprocity of antennas

Q8. The direction of what field is used to designate the polarization of a wave?
A8. Electric (E) field

Q9. If a wave's electric lines of force rotate through 360 degrees with every cycle of rf energy,
what is the polarization of this wave? A9. Circular polarization

Q10. What type of polarization should be used at medium and low frequencies?
A10. Vertical polarization.

Q11. What is an advantage of using horizontal polarization at high frequencies?


A11. Less interference is experienced by man-made noise sources

Q12. What type of polarization should be used if an antenna is mounted on a moving vehicle at
frequencies below 50 megahertz?
A12. Vertical polarization.

Q13. What is the radiation resistance of a half-wave antenna in free space? A13. 73 ohms.

Q14. A radiating source that radiates energy stronger in one direction than another is known as
what type of radiator? A14. Anisotropic radiator

Q15. A radiating source that radiates energy equally in all directions is known as what type of
radiator? A15. Isotropic radiator.

Q16. A flashlight is an example of what type of radiator? A16. Anisotropic radiator.


Q17. What terms are often used to describe basic half-wave antennas?
A17. Dipole, doublet and Hertz

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


Q18. If a basic half-wave antenna is mounted vertically, what type of radiation pattern will be
produced? A18. Nondirectional

Q19. In which plane will the half-wave antenna be operating if it is mounted horizontally?
A19. Vertical plane.

Q20. Since the radiation pattern of a dipole is similar to that of a doublet, what will happen to
the
pattern if the length of the doublet is increased? A20. The pattern would flatten.

Q21. What is the simplest method of feeding power to the half-wave antenna?
A21. To connect one end through a capacitor to the final output stage of the transmitter.

Q22. What is the radiation pattern of a quarter-wave antenna?


A22. A circular radiation pattern in the horizontal plane, or same as a half wave.

Q23. Describe the physical arrangement of a ground screen.


A23. It is composed of a series of conductors arranged in a radial pattern and buried 1 to
2 feet below the ground.

Q24. What is the difference in the amount of impedance between a three-wire dipole and a
simple center-fed dipole?
A24. Nine times the feed-point impedance.

Q25. Which has a wider frequency range, a simple dipole or a folded dipole?
A25. Folded dipole

Q26. What is the purpose of antenna stubs?


A26. To produce desired phase relationship between connected elements

Q27. What is the primary difference between the major and minor lobes of a radiation pattern?
A27. Major lobes have the greatest amount of radiation.

Q28. What is the maximum number of elements ordinarily used in a collinear array?
A28. Four.

Q29. Why is the number of elements used in a collinear array limited?


A29. As more elements are added, an unbalanced condition in the system occurs which
impairs
efficiency.

Q30. How can the frequency range of a collinear array be increased?


A30. By increasing the lengths of the elements of the array.

Q31. How is directivity of a collinear array affected when the number of elements is increased?
A31. Directivity increases.
Q32. What is the primary cause of broadside arrays losing efficiency when not operating at their
designed frequency?
A32. Lower radiation resistance.

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


Q33. When more than two elements are used in a broadside array, how are the elements
arranged? A33. Parallel and in the same plane

Q34. As the spacing between elements in a broadside array increases, what is the effect on the
major lobes? A34. They sharpen

Q35. What are some disadvantages of the end-fire array?


A35. Extremely low radiation resistance, confined to one frequency, and affected by
atmospheric conditions.

Q36. Where does the major lobe in the end-fire array occur?
A36. Along the major axis

Q37. To maintain the required balance of phase relationships and critical feeding, how must the
end-fire array be constructed?
A37. Symmetrically.

Q38. What two factors determine the directivity pattern of the parasitic array?
A38. Length of the parasitic element (tuning) and spacing between the parasitic and
driven elements

Q39. What two main advantages of a parasitic array can be obtained by combining a reflector
and a director with the driven element?
A39. Increased gain and directivity

Q40. The parasitic array can be rotated to receive or transmit in different directions. What is the
name given to such an antenna?
A40. Rotary array.

Q41. What are the disadvantages of the parasitic array?


A41. Their adjustment is critical and they do not operate over a wide frequency range.

Q42. What is the advantage of adding parasitic elements to a Yagi array?


A42. Increased gain.

Q43. The Yagi antenna is an example of what type of array?


A43. Multielement parasitic array

Q44. To radiate power efficiently, a long-wire antenna must have what minimum overall length?
A44. One-half wavelength

Q45. What is another name for the Beverage antenna?


A45. Wave antenna

Q46. What is the polarity of the currents that feed the V antenna? A46. Opposite

Q47. What is the main disadvantage of the rhombic antenna?


A47. It requires a large antenna site

Q48. What is the primary reason for the development of the turnstile antenna?
A48. For omnidirectional vhf communications

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


Q1. What is propagation? A1. Propagation means spreading out.
Q2. How is a wave defined as it applies to wave propagation?
A2. A wave is a disturbance which moves through a medium.
Q3. What is wave motion?
A3. A means of transferring energy from one place to another.
Q4. What are some examples of wave motion?
A4. Sound waves, light waves, radio waves, heat waves, water waves.
Q5. What type of wave motion is represented by the motion of water?
A5. Transverse waves.
Q6. What are some examples of transverse waves?
A6. Radio waves, light waves, and heat waves.
Q7. What example of a longitudinal wave was given in the text?
A7. A sound wave.
Q8. What are the three requirements for a wave to be propagated?
A8. A source, medium, and detector (receiver).
Q9. What is a cycle?
A9. A sequence of events, such as the positive and negative alternation of electrical
current.
Q11. What is the law of reflection?
A11. The law of reflection states: The angle of incidence is equal to the angle of
reflection.
Q12. When a wave is reflected from a surface, energy is transferred. When is the transfer of
energy greatest?
A12. When the incident wave is nearly parallel with the surface.
Q13. When is the transfer of energy minimum?
A13. When the incident wave is perpendicular to the surface. Also a dull (or black)
surface reflects very little regardless of the angle.
Q14. A refracted wave occurs when a wave passes from one medium into another medium.
What determines the angle of refraction?
A14. The density of the two mediums, and the velocity of the waves.
Q15. The apparent change in frequency or pitch because of motion is explained by what effect?
A15. The Doppler effect.
Q16. What term describes sounds capable of being heard by the human ear?
A16. Sonics.
Q17. Are all sounds audible to the human ear? Why?
A17. No. The average human ear cannot hear all sounds in the infrasonic and ultrasonic
regions.
Q18. Sound waves transmitted from a source are sometimes weak when they reach the
detector. What
instrument is needed to boost the weak signal?
A18. An amplifier.
Q19. What are the three basic requirements for sound?
A19. A source, medium, and detector (receiver).
Q20. What are the two general groups of sound?
A20. Noise and tones.
Q21. What are the three basic characteristics of sound?
A21. Pitch, intensity, and quality.
Q22. What is the normal audible range of the human ear?
A22. 20 Hz to 20 kHz.
Q23. What is intensity as it pertains to sound?
A23. The amount of energy transmitted from a source.

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD


Q24. What characteristic of sound enables a person to distinguish one musical instrument from
another, if they are all playing the same note?
A24. Quality.
Q25. How does density and temperature affect the velocity of sound?
A25. Velocity increases as density decreases and temperature increases.
Q26. What term is used in describing the science of sound?
A26. Acoustics.
Q27. A sound wave that is reflected back toward the source is known as what type of sound?
A27. Echo.
Q28. What is the term for multiple reflections of sound waves?
A28. Reverberation.
Q29. A cavity that vibrates at its natural frequency produces a louder sound than at other
frequencies. What term is used to describe this phenomenon?
A29. Resonance.
Q30. What do we call a disturbance that distracts or distorts the quality of sound?
A30. Noise.
Q31. What are three means of producing light?
A31. Mechanical, electrical, and chemical.
Q32. What is the smallest unit of radiant energy?
A32. A photon.
Q33. What unit is used to measure the different wavelengths of light?
A33. Angstrom unit.
Q34. What are the three primary colors of light?
A34. Red, green and blue.

IT2 (IW/AW) ALVARADO USS BONHOMME RICHARD

You might also like