Block 3 Flashcards

1
Q

What does COMSEC do?

A

Prevents unauthorized access to sensitive info via encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The process of converting unsecure information into a disguised form is?

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The process of recovering original intelligence is?

A

Decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Who is the US crypto leader that creates signals intel (SIGINT) and information assurance (IA) products?

A

NSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How many types of crypto devices are there?

A
  1. Types 1-4
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which crypto devices are approved by the NSA?

A

Types 1-3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Crypto device type ____ deals with classified or sensitive US govt info and contains NSA approved algorithms that protect systems requiring the most stringent protection mechanisms.

A

Type 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Crypto device type ____ deals with national security information and was developed using established NSA business processes containing NSA-approved algorithms exceeding best commercial practices.

A

Type 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Crypto device type ____ deals with unclassified sensitive US govt or commercial info and was developed using established commercial standards and contains NIST-approved algorithms.

A

Type 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Crypto device type ____ deals with unevaluated commercial encryption that isn’t for govt use and contains either vendor proprietary algorithms, algorithms registered in by NIST, or algorithms registered by NIST and published in a federal information processing standard (FIPS).

A

Type 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the four encryption methods?

A

Voice, data, trunk (bulk) and manual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What forms of voice communications can utilize voice encryption?

A

All forms (radio, telephone and internet protocol (IP))

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the three common secure voice IPs?

A
  • Voice over secure (VoSIP)
  • Secure voice over IP (SVoIP)
  • Secure voice over secure IP (SVoSIP)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the distinct difference between the voice over IP (VoIP) encryptions?

A

Whether you apply encryption in the phone, the network or both

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the two types of data encryption?

A

Symmetric key (secret key) and asymmetric key (public-key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is symmetric key (secret-key) data encryption?

A

Data encryption method that uses identical key copies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is asymmetric key (public-key) data encryption?

A

Data encryption method that uses two different keys (public key and private key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is based on a secret key data encryption system, that consists of 64 binary digits and is considered unsecure today?

A

Data encryption standard (DES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What uses a three step data encryption process that utilizes one DES key per step and decrypts by reversing the process?

A

Triple data encryption standard (3DES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What replaced 3DES and utilizes 128, 192 and 256 bit key-lengths?

A

Advanced encryption standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What converts multiplexed signals into one data stream that requires a very fast encryption system?

A

Trunk (bulk) encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a piece of hardware that is free of codes that once a piece of equipment has keys loaded, it assumes the position of the highest loaded key?

A

Controlled cryptographic item (CCI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a device found in most newer radios that needs the encryption (key) loaded from a fill device?

A

Internal encryption device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are three examples of an external encryption device?

A
  • KY-57
  • KY-99
  • KIV-7M
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are the characteristics of the KY-57 external decryption device?

A
  • Used with VHF and UHF radios
  • VINSON (wideband) encryption
  • Holds up to six crypto keys
  • Can receive a fill from a PYQ-10, KIK-30 or OTAR
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are the characteristics of the KY-99 external decryption device?

A
  • Used with HF, VHF and UHF radios
  • VINSON (wideband) or ANDVT (narrowband) encryption
  • Holds up to six crypto keys
  • Can receive a fill from a PYQ-10, KIK-30 or OTAR
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are the characteristics of the KIV-7M external decryption device?

A
  • Used with digital and voice communications
  • Requires at least one traffic encryption key (TEK)
  • Requires removable crypto ignition key (CIK)
  • Holds up to 10 crypto keys
  • Commercial off the shelf
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are three examples of encryption fill devices?

A

PYQ-10, KIK-30 and KVL-3000+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

____ is an encryption fill device that is also known as the simple key loader (SKL), that receives/stores/transfers crypto keys.

A

PYQ-10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

____ is an encryption fill device that is also known as the really simple key loader (RASKL) and stores up to 40 crypto keys.

A

KIK-30

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

____ is an encryption fill device that is also known as key variable loader (KVL) that loads crypto keys into land mobile radios (LMRs) and stores up to 1024 crypto keys.

A

KVL-3000+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are the components of the AN/PRC-113 man-pack config?

A
  • RT-1319
  • Battery case
  • Dual VHF/UHF antenna
  • Handset or headset
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are the components of the AN/TRC-176 transportable or rack mounted config?

A
  • RT-1319
  • Radio set control (remote)
  • Audio amplifier
  • Chassis assembly
  • Dual VHF/UHF antenna
  • Handset or headset
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What are the components of the AN/VRC-83 high-powered vehicle mounted config?

A
  • RT-1319
  • Radio set control (remote)
  • Audio amplifier
  • Chassis assembly
  • RF amplifier (30 watts)
  • Dual VHF/UHF antenna
  • Handset or headset
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is the method of transmitting radio signals by rapidly switching a carrier among many frequency channels using a pseudorandom sequence known to both transmitter and receiver?

A

Frequency hopping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are the three main advantages of spread spectrum communications over a fixed frequency transmission?

A
  • Highly resistant to interference
  • Provides protection against jamming
  • Difficult to intercept
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Frequency hopping operations are secure (T/F)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Basic Anti-Jam (AJ) or Single Word of Day (SWOD)

A

Have Quick I (HQI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Advanced Anti-Jam or Multiple Word of Day (MWOD)

A

Have Quick II (HQII)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What are the three things required to operate Have Quick?

A
  • Time of Day (TOD)
  • Word of Day (WOD)
  • Net Number
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What synchronizes each radio during using have quick radios?

A

Time of day (TOD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

How can TOD be received?

A
  • GPS
  • Hard-Wire connection (HWT)
  • RF from another radio (OTAR)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

How can TOD be emergency started?

A

By pressing the 3 and ENT key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What programs the frequency hopping pattern and rate?

A

Word of day (WOD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

WOD uses how many codes and for how many days?

A

Up to 6 frequency hopping codes (elements) per

day and can store up to 6 days of codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is the entry point in frequency hopping network and allows for multiple radio networks using common TOD and WOD?

A

Net number

47
Q

What is the ability for a radio to receive two transmissions at the same time?

A

Conferencing

48
Q

When conferencing what allows for the second frequency to be received?

A

The second received signal is shifted down 25 KHz below the original transmit frequency

49
Q

Conferencing can only be used while in what mode of operation?

A

Active HQ mode

50
Q

Which have quick operational mode code places the radio into preset load mode (LP)?

A

220.000

51
Q

Which have quick operational mode code places the radio into MWOD load mode (LC)?

A

220.025

52
Q

Which have quick operational mode code erases all MWOD codes?

A

220.050

53
Q

Which have quick operational mode code places the radio into frequency management training (FMT) load mode

A

220.075

54
Q

What are the two types of HQ nets?

A

Training and operational nets

55
Q

What is the hq net that is also known as frequency management training (FMT) and has conferencing automatically enabled?

A

Training nets

56
Q

HQ I training net has how many preprogrammed freqs?

A

5 freqs

57
Q

HQ II training net has how many preprogrammed freqs?

A

16 freqs

58
Q

What type of radio has 1,000 possible net numbers and SWODS do not expire?

A

HQ I SWOD

59
Q

What type of radio has 3,000 possible net numbers and each WOD is good for 24 hours?

A

HQ II MWOD

60
Q

Most radios are HQ II (T/F)

A

True

61
Q

JTIDS/MIDS, SINCGARS and PRC-117G are examples of what?

A

Frequency hopping systems

62
Q

What are the radio operations ABCs?

A

Accuracy, brevity and clarity

63
Q

What assigns a unique word to each letter and number?

A

Phonetic alphabet

64
Q

What conveys information in condensed form?

A

Procedure words

65
Q

What is the process of combining two frequencies in a nonlinear
device to produce a third?

A

Heterodyning

66
Q

What are the properties of a heterodyned frequency?

A

It has the two original input frequencies

as well as the sum and difference of these two signals

67
Q

What is the frequency to which a carrier frequency is shifted up or
down as a step in the transmission or reception process?

A

Intermediate Frequency

68
Q

What is created by heterodyning the carrier signal with an injection frequency?

A

Intermediate Frequency

69
Q

What is a frequency very close to the operating frequency that,
if heterodyned in the mixer, will produce the proper
intermediate frequency (IF)?

A

Adjacent Channel

70
Q

What is an undesired input frequency relatively distant from
the operating frequency that, if heterodyned in the
mixer, will produce the proper IF?

A

Image Frequency

71
Q

What is the ability of a receiver to select the desired frequency
or a band of frequencies and reject all others?

A

Selectivity

72
Q

The wider the bandwidth, the less selectivity (T/F)

A

True

73
Q

What is the ability of a receiver to respond to a weak signal
through background noise, to produce a specified
output signal?

A

Sensitivity

74
Q

What determines the sensitivity of a receiver?

A

S+N/N test

75
Q

What is a test that compares the level of the desired output signal to the noise generated by the receiver?

A

S+N/N test

76
Q

What varies the gain of the receiver, with
varying received signal input levels, to maintain a
constant audio output level?

A

Automatic gain control (AGC)

77
Q

Without AGC, the audio would get louder and quieter

with varying received RF inputs (T/F)

A

True

78
Q

What monitors the received signal level and quiets, or mutes, the receiver when there is very little or no received signal?

A

Squelch

79
Q

What maintains a constant audio signal strength in order to

prevent over-modulation?

A

Compression

80
Q

What maintains the output power from the transmitter at a
constant level by taking a sample of the RF signal after
it leaves the RF power amplifier?

A

Automatic level control (ALC)

81
Q

During reception incoming signals from the antenna
are routed through the transmitter which contains a
reflectometer and the transmit-receive (T-R) switch (T/F)

A

True

82
Q

After leaving the T/R relay, the signal is routed through the ____ before entering the ____.

A

Guard receiver; main receiver

83
Q

During reception incoming frequency is mixed with an ____from the ____ to create an intermediate frequency.

A

Injection frequency from the synthesizer

84
Q

Where is the transmission circuitry conratined?

A

Modulator and transmitter

85
Q

What amplifies and filters the signal and applies it to the antenna?

A

Transmitter

86
Q

What provides keyboard decoding, LCD display control,
mode control for all functions of the RT, and
synthesizer frequency control?

A

Data converter

87
Q

What alerts the operator if the source of voltage drops too low?

A

The display via the data converter

88
Q

What supplies all dc voltages required by the RT?

A

Power regulator assembly

89
Q

The source voltage may be derived from either an

AC/DC power supply or a battery pack (T/F)

A

True

90
Q

What four regulated voltages does the RT use?

A

+6.3 Vdc
+12 Vdc
-13.5 Vdc
-29 Vdc

91
Q

The RT-1319/B is divided into how many sections?

A

8

92
Q

A9

A

Power switch assembly

93
Q

A7

A

Power regulator assembly

94
Q

A4

A

Main receiver

95
Q

A5

A

Guard receiver assembly

96
Q

A3

A

Modulator assembly

97
Q

A6

A

Synthesizer assembly

98
Q

A2

A

Transmitter assembly

99
Q

A1

A

Data converter assembly

100
Q

What are a few troubleshooting techniques?

A

– Visual Inspection
– Six-step Process – Serial Method
– Half-split Method
– Trouble Analysis Diagrams

101
Q

What is performed before the beginning of any trouble

analysis?

A

Visual inspection

102
Q

What two steps are done during a visual inspection?

A
  • Inspect the radio for any damage (burned, broken, loose, or missing components)
  • Verify the correct status settings (switches, controls, indicators)
103
Q

What are the steps of the six step process?

A
  • Verify the complaint
  • Determine the related systems
  • Analyze the symptoms
  • Isolate the problem
  • Correct the problem
  • Check for proper operation
104
Q

What is the troubleshooting technique where you start from the beginning, work your way through the circuit?

A

Serial Method

105
Q

The serial method is effective but time consuming if the problem is at the end of the circuit (T/F)

A

True

106
Q

What is the most effective troubleshooting technique?

A

Half-split method

107
Q

Scheduled preventive maintenance is a primary

job for most RF Transmission Systems technicians (T/F)

A

True

108
Q

What detects malfunctions or misalignments before
they become a serious problem and create an
outage?

A

Preventive maintenance inspection (PMI)

109
Q

What alignment aligns the guard receiver’s squelch

potentiometer to T.O. specifications?

A

Guard squelch

110
Q

What controls the acceptance threshold of a weak receive signal on a guard frequency and it set to open with 6 microvolts or less input power to RT?

A

Guard squelch (R72)

111
Q

What is set to 87% ± 7.5% to ensure
the correct amount of power is attainted in the
sidebands and carrier for a non distorted signal?

A

Modulation (R139)

112
Q

What is set to 2.25 Vrms audio output
power to the handset connector to provide
operator audio feedback?

A

Sidetone (R100)

113
Q

What may reveal issues in the radio

system that need resolving?

A

Scheduled PMIs

114
Q

As technicians, you will diagnose various faults with

the symptoms presented and fix the issue (T/F)

A

True