CDC Vol 1, 015 Telephone Communications Systems COPY Flashcards

1
Q
  • What system provides a direct dialing access to most military installations and DOD facilities around the world?
A

DSN - Defense Switched Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • List two advantages of using cellular phones and pagers?
A
  1. Makes it easier to contact commanders, key personnel, and standby personnel at times when they are not near an administrative telephone.
  2. Serves as a backup means of communication.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • How are communications using the STE secured?
A

By the insertion of a PCMCIA crypto card called the FORTEZZA plus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • Name the levels of precedence of the telephone priority system.
A
  • Flash
  • Immediate
  • Priority
  • Routine
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What precedence is reserved for vital communications having an immediate operational effect on tactical operations, safety and rescue operations, and intelligence reports?

A

Immediate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is not considered a level of precedence but preempts all other level? Note: This is meant for the highest echelon of command.

A

Flash Override

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What precedence applies to all other official communications and is the most commonly used?

A

Routine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What precedence is reserved for alerts, warnings, and other emergency actions with an immediate bearing on national, command, or area security?

A

Flash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What precedence handles calls as received?

A

Routine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What precedence is the highest and preempts all lower precedence calls?

A

Flash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What precedence are reserved for matters that require prompt completion for national defense and security?

A

Priority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name the nonsecure systems C2BMOs use most often?

NOTE: There are 4

A
  • Hot Lines
  • Administrative telephones
  • DSN - Defense Switched Network
  • Cell phones and pagers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What comm system provide the ability call agencies without a dialing capability?

A

Hot Lines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What comm system is much like your home phone but may also have access to the DSN telephone system?

A

Administrative telephone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name the secure comm systems C2BMOs use most often?

NOTE: There are 4

A
  • STE - Secure Terminal Equipment
  • KY-68
  • VoSIP - Voice over Secure Internet Protocal
  • IRC - Internet Chat Relay
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A secure terminal equipment (STE) offers secure data in less than 2 seconds over what network?

A

ISDN - Integrated Services Digital Network

17
Q

What are the two modes on the secure terminal equipment (STE)?

A
  1. ISDN - Integrated Services Digital Network

2. PSTN - Public Switched Telephone Network

18
Q

What comm system is a ruggedized, self-contained, secure telephone terminal with a push-to-talk handset?

A

KY-68

19
Q

The KY-68 can operate as a full-duplex or half-duplex voice/data subscriber terminal. How many kilobits per second can the KY-68 transmit?

A

16-32 kb/s

20
Q

What COMSEC setting can the KY-68 operate in?

A
  • COMSEC master switch
  • COMSEC slave switch
  • Sole User without intervening devices
21
Q

How are VoSIP phones encrypted?

A

The network the VoSIP phone is connected to is encrypted. A VoSIP phone itself is not encrypted.

22
Q

What does VoSIP service feature that is designed to discover, identify, and track the use of network resources?

A

IMS - Identity Management Soutions

23
Q

What does VoSIP maintain compliance with?

A

IAVA - Information Assurance Vulnerability Alert

24
Q

What type comm system does mIRC create a virtual meeting place where users can talk and participate in group or private discussions in near-real-time worldwide?

A

Internet Chat Relay

25
Q

Who many ongoing conversations does mIRC support in one AOR?

A

2,700