• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/62

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

62 Cards in this Set

  • Front
  • Back
What is electronic warfare?
Any military action involving the use of the EM spectrum to include DE to control the EM spectrum or to
attack an enemy.
How does EA prevent or reduce an enemy’s use of the EM spectrum?
Detection, denial, disruption, deception, and destruction.
What is the key element in preventing jamming by friendly forces?
Proper frequency management.
Give some examples of EP.
Frequency agility in a radio, change pulse repetition frequency on a radar set, electronic and material
shielding for systems, and processes to counter meaconing, interference, jamming, and intrusion.
What taskings do ES respond to?
Search for, intercept, identify, and locate sources of intentional and unintentional radiated EM energy for
the purpose of threat recognition.
What EW effects are waged throughout the electromagnetic spectrum to secure and maintain
effective control and use?
Through the integration of detection, denial, deception, disruption, and destruction.
Define EM deception as it applies to EW.
The deliberate radiation, reradiation, alteration, suppression, absorption, denial, enhancement, or reflection
of EM energy in a manner intended to convey misleading information to an enemy or to enemy EMdependent
weapons, thereby degrading or neutralizing the enemy’s combat capability.
Define encryption.
The process of scrambling information so it is unintelligible to anyone except the intended recipient.
What is secure voice?
Devices which are designed to provide voice encryption for voice communication over a range of
communication types such as radio, telephone or IP.
escribe the difference between symmetric and asymmetric algorithms?
Symmetric algorithms use the same key for both encryption and decryption where the decryption key is
derived from encryption key. Asymmetric algorithms use a different key for encryption and decryption, the
decryption key cannot be derived from the encryption key.
What permits the encryption key to be public and the decryption key to be private?
Asymmetric algorithms permit the encryption key to be public, allowing anyone to encrypt with the key,
but the decryption key is private so only the intended recipient can decrypt the message.
Describe the difference between “keyed” and “unkeyed” encryption devices.
When an encryption device is appropriately configured with the proper codes, it is considered to be
“keyed.” Absence of this configuration code renders the device useless; it is then considered to be
“unkeyed.”
If the operator uses a TOP SECRET code key, what security classification would the device take?
If the operator uses a TOP SECRET code key, the device is considered TOP SECRET.
How is COMSEC hardware categorized when it is empty and free of codes?
Cryptographic controlled item (CCI).
Describe the KY–99 encryption device?
A self-contained terminal with embedded communication security and is designed to provide secure voice
and/or data communications for military customers.
Which encryption device is a general, high-capacity key generator used to encrypt and decrypt
teletypewriter and digital data in both tactical and fixed environments?
KG–84.
What does the mode switch on a KY–57 do?
It allows you to transmit in the clear and secure mode and it controls the loading of encryption codes.
When the cryptographic ignition key is removed and not collocated, how should the KIV–7 be
handled?
As an UNCLASSIFIED cryptographic controlled item (CCI).
How do you operate a KOI–18?
Slide the key tape into the reader and pull it out at a moderate rate.
How do you verify the presence of a code in a KYK–13?
The red indicator light blinks when you press the initiate button in the OFF/CHECK position.
What is one advantage of the CYZ–10?
You can carry hundreds of fills
What is OTAR?
Method of changing the encryption keys in a two-way radio system over the radio channel or over the air.
What does OTAR give you?
A centralized control over encryption keys which reduces procedural, operational, and security problems.
What does the FH signal to a receiver that is not synchronized to the transmitter look like?
Impulse noise.
What type of techniques makes the HAVE QUICK and SINCGARS radios effective against
jamming, compared to older systems?
FH techniques.
What is the hopping speed of the fast FH mode?
More than 1,000 hops/sec.
Name the types of spread spectrum systems.
Direct sequence, FH, time hopping, pulsed FM (chirp), and hybrid systems.
What type of system uses a combination of spread spectrum methods to use the beneficial
properties of the systems used?
Hybrid systems.
What four properties arise as a result of the pseudorandom code sequence and the wide signal
bandwidth that results from spreading?
Selective addressing code, division multiplexing, low probability of intercept, and antijamming.
What does the acronym “ICOM” indicate?
Integrated COMSEC capability
Which section of the RT–1523 is responsible for modulation and demodulation?
The RF section.
State the purpose of the interleaver during receiver operations.
Removal of synchronization and frequency-hopping information that is embedded in the signal.
How many different impedance bands are contained in the impedance matching network?
4.
Which band of the impedance matching network is used if a BNC-type connector is connected to
the RT?
The 50-ohm band.
State two conditions which will cause the SIDETONE DISABLE line to be set to logic level 1.
Temperature exceeding 105° Celsius or VSWR exceeding 5:1.
Name the 3 items used to select a frequency from the look-up table during FH mode.
The TRANSEC variable, FH sync time (TOD), and net ID number.
Where does the control module obtain and execute instructions during remote operation?
From the remote I/O module.
Which RF section module performs modulation of the carrier?
The exciter/power amplifier.
State the purpose of HAVE QUICK radios.
To prevent unfriendly forces from interfering with our communications.
What is the purpose of WOD and TOD?
The radios use WOD and TOD to decide which frequency they should be on at any given time.
Why isn’t HAVE QUICK considered a means of secure communications?
Broadband spectrum analyzers can quickly “see” each frequency as it is being used and thereby “listen” to
the communications. A determined enemy can tune 7,000 receivers to the proper frequencies and listen to
the communications.
List two differences between HQI and HQII.
HQ1 allows one word to be loaded at a time; the word has no time limit for how long it can be used. HQII
allows up to six words to be loaded at a time and each word expires after 24 hours.
Which module of the AN/GRC–171B(V)4 controls all activities of the transceiver?
The ECCM module.
What is the RF output power when in FM mode? [AN/GRC–171B(V)4]
50 watts.
What happens to the guard receiver when the transceiver is keyed? [AN/GRC–171B(V)4]
The guard receiver is disabled.
Which module determines frequency selection when in the HAVE QUICK mode? [AN/GRC–171B(V)4]
The ECCM processor.
What causes all 6s to be displayed on the FREQ/CHAN display?
An over temperature condition.
What does it mean if the FAULT lamp comes on? [AN/GRC–171B(V)4]
It indicates an out-of-tolerance condition exists.
What is JTIDS commonly referred to?
Link–16.
State the principle of operation that eliminates the requirement for a net control station?
TDMA eliminates the requirement for a net control station (NCS) by providing nodeless communications
network architecture.
What acts as the single time source for time synchronization of all units entering the network?
Network Time Reference (NTR).
What makes JTIDS resistant to jamming?
Spread-spectrum and FH techniques.
The JTIDS terminal operates in what frequency band?
L-band (between 960 and 1215 MHz.
Describe the enhanced position location reporting system.
EPLRS is a joint service, software programmable, networking digital radio. It provides secure, jam-resistant
wireless digital connection among battlefield computers; allowing field commander’s to form a joint
network. Also, it provides platform position information independent of GPS. EPLRS aids in fratricide
prevention because it is highly jam resistant and thus allows weapons platforms to see where other EPLRS
are located even in a congested battlefield environment.
What are the EPLRS system virtual circuits called?
Needlines, to set up communications between EPLRS RSs.
Who controls the EPLRS control network, performs all the necessary calculations, routes control
net messages and queries, and graphically displays the positions of all active RSs?
EPLRS network manager
Name the four features the EPLRS radio sets provide.
The radio sets provide the following features:
(1) Display user position location with accuracy of 10 to 30 meters for manpack, surface vehicle, and grid
reference RS and 25 to 100 meters for airborne RS.
(2) Provide automatic reporting of RS position location.
(3) Provide user-to-user digital readout communications.
(4) Provide range and bearing to other RS, designated reference points, or predesignated positions.
Describe the situational awareness data link (SADL).
SADL integrates modified US Air Force close air support aircraft with the digitized battlefield information
via EPLRS on their heads up display showing where Army/Marine/ground radios are located.
What is the ultimate goal for the joint tactical radio system family of radios?
To produce a family of interoperable, modular, software-defined radios that operate as nodes in a network
to ensure secure wireless communication and networking services for mobile and fixed forces.
What does legacy interoperability deal with?
Legacy interoperability deals with the ability for JTR sets to communicate with designated radios currently
fielded and, more specifically, the waveforms associated with each of those radios
What can each channel of a JTR capable of executing?
Each channel of a JTR is capable (in general) of executing a different waveform (e.g. WNW, EPLRS, etc.)
depending on the mission requirements determined by the operator.
How many programmable devices can MBITR hold?
Being software-based, MBITR holds seven programmable devices.