ACP 125 (Revision F), Communication Instructions Radiotelephone Procedures “Chapter 2” Flashcards

1
Q
  1. What is un-enciphered communication medium is the least secure of all means of communications? (Page 2-1)
A

Radio

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. What is the collective title for the measures taken to protect all aspects of communications in order to deny information and intelligence to the enemy?
    (Page 2-3)
A

Communications Security (COMSEC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. What is that component of COMSEC which includes all measures designed to protect Allied radio transmissions from enemy interception, analysis and deception?
    (Page 2-3)
A

Transmission Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. What is the act of searching for, listening to and recording radio communications and electronic transmissions for the purpose of obtaining information?
    (Page 2-3)
A

Interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. What is the examination and interpretation of intercepted radio communications traffic and electronic transmissions for the purpose of obtaining intelligence?
    (Page 2-4)
A

Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. What is the introduction of a false transmission into a communications system, by imitating an authentic transmission, with the intention to deceive or create confusion?
    (Page 2-4)
A

Deception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. What is the only conclusive defense against interception?

Page 2-4

A

Radio Silence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Individual transmission should not exceed how many seconds and, whenever possible, terminated with the proword OUT?
    (Page 2-5)
A

20

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Whether allied or those of an adversary, what are the most sensitive information sent over radio and are an unrivaled source of intelligence?
    (Page 2-6)
A

Locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. What are designed to provide security protection for sensitive short-term tactical information where speed and simplicity of operation are the overriding considerations?
    (Page 2-8)
A

Low Level Codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. What provides useful information for an enemy to use in a timely way (his/her response time can be expected to be as little as a few minutes) to our disadvantage?
    (Page 2-8)
A

Exploitable Text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. In training, there is a need to differentiate between exercise play and events, which require action outside the context of the exercise; conventionally this is known as “real” activity. In order to highlight the differences between real and other messages, what proword is used?
    (Page 2-10)
A

NO PLAY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. What is a security aid designed to protect Allied communications against deception from fraudulent transmissions by unauthorized persons?
    (Page 2-10)
A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. What is a single word with a pre-arranged meaning, used to establish a condition, an alert, or to initiate the implementation of a plan or operation?
    (Page 2-10)
A

Codeword

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. What is a unique, daily changing group of four random letters used to disguise a command, formation, unit or sub unit?
    (Page 2-11)
A

Address Group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. What is a combination of letters and figures that identify a communication facility, an organization, or an individual on a radio net?
    (Page 2-11)
A

Callsign