Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/8

Click to flip

8 Cards in this Set

  • Front
  • Back

1. What is the first step in electronic warfare (EW) that is essential when developing an accurate electronic order of battle (EOB)?


a. Denial


b. Detection


c. Deception


d. Destruction


b. Detection

2. Traditional noise jamming techniques designed to block communications channels or radarscope presentations are applications of


a. denial


b. deception


c. disruption


d. destruction


a. denial

3. Deliberate radiation, reradiation, alteration, suppression, absorption, denial, enhancement, or reflection of electromagnetic energy to mislead the enemy is called


a. detection


b. deception


c. disruption


d. destruction


b. deception


4. What is the most effective means of denying the enemy the use of the electromagnetic spectrum?


a. denial


b. deception


c. disruption


d. destruction


d. destruction


5. What component of electronic warfare (EW) involves the use of electromagnetic, directed energy, or antiradiation weapons to attack personnel, facilities, or equipment?


a. electronic attack (EA)


b. electronic support (ES)


c. electronic protection (EP)


d. electronic counter countermeasures (ECCM)

a. Electronic attack (EA)

6. Frequency agility and changing pulse recurring frequency (PRF) are examples of


a. electronic attack (EA)


b. electronic support (ES)


c. electronic protection (EP)


d. electronic countermeasures (ECCM)


c. electronic protection (EP)


7. Electronic support data is not used to produce


a. signal intelligence


b. ballistic intelligence


c. electronic intelligence


d. communications intelligence


b. ballistic intelligence


8. To control an adversary's command and control (C2) capabilities, command and control warfare (C2W) integrates destruction,


a. electronic warfare, military deception, operational security, and psychological operations.


b. electronic warfare, military deception, and operational security.