Comms Flashcards

1
Q

Discuss Communications Security (COMSEC) and the role of the Electronic Key Management System (EKMS)

**Common Core*

A

**Common Core*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is meant by the term Two-Person Integrity (TPI) and how it is related to COMSEC?

**Common Core*

A

**Common Core*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Discuss the following terms:
A. Controlled Cryptographic Item (CCI)
B. Physical Security
C. Practice Dangerous to Security (PDS)
D. Emergency Action Plan/Emergency Destruction Plan (EAP/EDP)
E. Data Transfer Device (DTD)
F. COMSEC Incident

**Common Core*

A

**Common Core*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain the three different types of “Supersessions”
A. Regular
B. Irregular
C. Emergency

**Common Core*

A

a) Regular - scheduled destruction of keymat

b) Irregular - keymat not scheduled for destruction, but occurs after normal use

c) Emergency - unplanned destruction of keymat, usually because of compromise

**Common Core*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain the function and the contents of Communications Electronic Operating Instruction (CEOI)

**Common Core*

A

Blueprint developed from operational planning directed by HHQ regarding how to talk to higher, adjacents, and subordinates

**Common Core*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define the following terms:
A. Essential Elements of Friendly Information (EEFI)
B. Commander’s Critical Information Requirements (CCIR)
C. Command, Control, Communications, Computers, and Intelligence (C4I)
D. Communications Information System Officer (ISSO)

**Common Core*

A

a) Essential Elements of Friendly Information (EEFI) - identifies specific items which if revealed could degrade the security of military operations, “beadwindow” is used if EEFI is discussed over comms

b) Commander’s Critical Information Requirements (CCIR) - any event that requires the commander to make a decision, or any item worth while of waking the CO up

c) Command, Control, Communications, Computers, and Intelligence (C4I) - everything the 6 shop does

d) Communications Information System Officer (CISO)

**Common Core*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the primary tactical radio used by your unit and what man-pack is used during infantry operations?

**Common Core*

A

RT-1523, PRC-119

**Common Core*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Discuss the function of the Single Channel Ground Air Radio System

**Common Core*

A

The Single Channel Ground and Airborne Radio System (SINCGARS) provides commanders with a highly reliable, secure, easily maintained Combat Net Radio (CNR) that has both voice and data handling capability in support of command and control operations.

**Common Core*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Identify the following capabilities for the “Radio” Receiver-Transmitter (RT) AN/PRC-152
A. Characteristics
B. Frequency Range
C. Configuration
D. Antennas
E. Power Sources

**Common Core*

A

A. VHF
B. 30 - 512 MHz
C. 16 kbps data rate, 25 kHz wide band COMSEC for secure voice/data
D. RF 390
E. BB690 batteries (4 hrs) or BA550 batteries (30 hrs)

**Common Core*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Discuss the purpose of a retransmission (RETRANS) site

**Common Core*

A

Extends SINCGARS (VHF) to go over horizon and obstacles. Requires VRC-92 w/dog bone. Higher/unobstructed.

**Common Core*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Identify the following capabilities for the “Radio” Receiver-Transmitter (RT) 1949 (AN/PRC-117G)
A. Characteristics
B. Frequency Range
C. Configuration
D. Antennas
E. Power Sources

**Common Core*

A

a) The AN/PRC-117G features a Joint Tactical Radio System (JTRS) Test & Evaluation Laboratory (JTEL) certified Software Communications Architecture (SCA) operating environment, providing the optimal transition to software-defined radio technology.

b) 30 MHz - 2 GHz

c) Ethernet, RS-232, RS-422, USB, Selective Availability Anti-spoofing Module (SAASM)

**Common Core*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Identify the following capabilities for the RF-310M-HH Suite B Multiband Handheld Radio
A. Characteristics
B. Frequency Range
C. Configuration
D. Antennas
E. Power Sources

**Common Core*

A

a) The RF-310M-HH is ideal for homeland security operations.

b) 30-512 MHz

c) An optional embedded GPS receiver that displays local position and provides automatic position reporting for situational awareness in the field

e)

**Common Core*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain the function of the following communication assets:
A. Satellite Signals Navigation set (AN/PSN 11)
B. Simple Key Loader (AN/PYQ-10)

**Common Core*

A

a) Satellite Signals Navigation set (AN/PSN 11) - precision lightweight GPS receiver, highly accurate satellite signal

b) Cryptographic Key Loading, Secure Key Management, Data Transfer, Compact and Portable

**Common Core*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Discuss the proper use of the phonetic alphabet, numerals, and prowords

**Common Core*

A

Used to avoid confusion in reporting information and to avoid EEFI release over comms

**Common Core*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain Line of Sight (LOS)

**Common Core*

A

Direct free-space path that exists between two points, must be no obstructions

**Common Core*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Discuss challenge and password

**Common Core*

A

The challenge and password system is a critical method for ensuring secure, authenticated radio communication, particularly in military or high-security contexts. It helps confirm the identity of parties involved in communication, ensuring that only authorized personnel are able to send and receive messages, and protects against potential threats such as enemy interception or impersonation.

**Common Core*