Test 4 Flashcards

1
Q

Discuss the relationship between wavelength and frequency.

A
  • Wavelength and frequency are inversely related (f=c/lambda)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. What are the types of modulation and define them.
A
  • Amplitude Modulation (AM) – carrier signal changes in amplitude
  • Frequency Modulation (FM) – carrier signal changes in frequency
  • Phase Modulation (PM) – carrier signal changes in phase
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Compare multiplexing vs. multiaccess.

A
  • Multiplexing - the process of combining two or more signals in the form of a single complex signal over a shared channel (# of signals)
  • Multiaccess – the usage of a common communications resource by different users distributed at different locations (# of users)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the three fundamental requirements necessary to jam?

A
  • Frequency
  • Power
  • Access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Describe the impacts of each user with uplink and downlink SATCOM jamming.
A
  • Downlink
  • Affects the local area only (LOS)
  • At the terrestrial receiver
  • Uplink
  • Large area effects (BLOS)
  • All users in the downlink footprint
  • At the satellite
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

State the advantages of tactical data links.

A
  • Rapid dissemination of tactical information
  • Creates the ability to share SA which leads to synergy
    • Access to multisensor, multiplatform air and ground picture
    • Visual depiction of threats/friendlies while enroute/on tank/marshal
    • 360 degree SA in the battle
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List the six characteristics of TDLs.

A
  • Message standards
  • Media
  • Protocol
  • Security
  • Electronic protection
  • Functionality
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ID the hardware components/terminals of TDLs.

A
  • JTIDS or MIDS terminals are required for LINK16
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe the hardware requirement for TDL interoperability

A
  • Gateway
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Illustrate NIPRNet Architecture.

A
  • Public internet
  • DoD gateway
  • Air Force gateway
  • Air Force base boundary
  • NIPRNet host level
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the three parameters required to enter an established LINK16 network.

A
  • Initial data load (IDL)
  • Crypto
  • Time sync
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Illustrate SIPRNet Architecture.

A
  • DoD SIPRNet
  • Air Force gateway
  • Air Force base boundary
  • SIPRNet host level
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe air gap considerations.

A
  • Improperly moving data across and air gap creates a ‘virtual cable’
    • Close CD burning sessions, write protect floppy disks
  • Air gapped networks/computers are not visible to enterprise cyberspace defenders
    • Air gap network/computer operators are responsible for their security procedures
  • Must use secure websites to retrieve planning data
    • Use HTTPS, PKI, password protect and when possible use SIPRNet
  • Identify ‘mission only’ NIPRNet computers and restrict use to mission related work only
  • What computer is used to write mission data onto CD; the same computer used to check Facebook?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List common adversary threat activities.

A
  • Scanning and reconnaissance
  • Spear phishing
  • Web redirects and malicious web pages
  • Malware (why we can’t use thumbdrives)
  • Automated operations
  • Interactive operators
  • Hardware and firmware attacks
  • Insider
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

List the four actions in cyberspace per JP 3-12.

A
  • Cyberspace ISR
  • Cyberspace operational preparation of the environment (OPE)
  • Cyberspace attack
  • Cyberspace defense
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Match the AF cyberspace weapon systems to the corresponding mission area.

A
  • C2 for DODIN Ops, DCO, and OCO
    • Cyberspace command and control mission system (C3MS)
  • DODIN Ops
    • Cyberspace security and control system (CSCS)
    • Air Force Intranet control (AFINC)
  • DCO
    • Cyberspace vulnerability assessment/Hunter (CVA/Hunter)
    • Cyberspace defense analysis (CDA)
    • Air Force cyberspace defense (ACD)
  • OCO
    • Network attack system (NAS)
17
Q

What must be accomplished to close the link (link budgeting)?

A

Total gains must overcome total losses so that the signal to noise ratio is sufficient

18
Q

Characteristics of a TDL (Listed and Described)

A
  • Message Standards
    i. Consists of rules, procedures, standard formats, data element defs
  • Media
    i. Must account for entire data path
  • Protocols
    i. Simplex
    ii. Half Duplex
    iii. Full Duples
  • Security
    i. Encryption (Link 11 does not encrypt full message)
  • Electronic protection
    i. EDAC – Does not require full data, can fill in the blanks
  • Functionally
    i. Relay vs Data Forwarders
    1. Relay – Retransmission / repromulgation on the same link network
    2. Forwarding – Translation and promulgation from one link to a different link network or interface