• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/8

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

8 Cards in this Set

  • Front
  • Back

1. What is the first step in electronic warfare (EW) that is essential when developing an accurate electronic order of battle (EOB)?


a. Denial


b. Detection


c. Deception


d. Destruction


b. Detection

2. Traditional noise jamming techniques designed to block communications channels or radarscope presentations are applications of


a. denial


b. deception


c. disruption


d. destruction


a. denial

3. Deliberate radiation, reradiation, alteration, suppression, absorption, denial, enhancement, or reflection of electromagnetic energy to mislead the enemy is called


a. detection


b. deception


c. disruption


d. destruction


b. deception


4. What is the most effective means of denying the enemy the use of the electromagnetic spectrum?


a. denial


b. deception


c. disruption


d. destruction


d. destruction


5. What component of electronic warfare (EW) involves the use of electromagnetic, directed energy, or antiradiation weapons to attack personnel, facilities, or equipment?


a. electronic attack (EA)


b. electronic support (ES)


c. electronic protection (EP)


d. electronic counter countermeasures (ECCM)

a. Electronic attack (EA)

6. Frequency agility and changing pulse recurring frequency (PRF) are examples of


a. electronic attack (EA)


b. electronic support (ES)


c. electronic protection (EP)


d. electronic countermeasures (ECCM)


c. electronic protection (EP)


7. Electronic support data is not used to produce


a. signal intelligence


b. ballistic intelligence


c. electronic intelligence


d. communications intelligence


b. ballistic intelligence


8. To control an adversary's command and control (C2) capabilities, command and control warfare (C2W) integrates destruction,


a. electronic warfare, military deception, operational security, and psychological operations.


b. electronic warfare, military deception, and operational security.