Test 4 Flashcards
1
Q
Discuss the relationship between wavelength and frequency.
A
- Wavelength and frequency are inversely related (f=c/lambda)
2
Q
- What are the types of modulation and define them.
A
- Amplitude Modulation (AM) – carrier signal changes in amplitude
- Frequency Modulation (FM) – carrier signal changes in frequency
- Phase Modulation (PM) – carrier signal changes in phase
3
Q
Compare multiplexing vs. multiaccess.
A
- Multiplexing - the process of combining two or more signals in the form of a single complex signal over a shared channel (# of signals)
- Multiaccess – the usage of a common communications resource by different users distributed at different locations (# of users)
4
Q
What are the three fundamental requirements necessary to jam?
A
- Frequency
- Power
- Access
5
Q
- Describe the impacts of each user with uplink and downlink SATCOM jamming.
A
- Downlink
- Affects the local area only (LOS)
- At the terrestrial receiver
- Uplink
- Large area effects (BLOS)
- All users in the downlink footprint
- At the satellite
6
Q
State the advantages of tactical data links.
A
- Rapid dissemination of tactical information
- Creates the ability to share SA which leads to synergy
- Access to multisensor, multiplatform air and ground picture
- Visual depiction of threats/friendlies while enroute/on tank/marshal
- 360 degree SA in the battle
7
Q
List the six characteristics of TDLs.
A
- Message standards
- Media
- Protocol
- Security
- Electronic protection
- Functionality
8
Q
ID the hardware components/terminals of TDLs.
A
- JTIDS or MIDS terminals are required for LINK16
9
Q
Describe the hardware requirement for TDL interoperability
A
- Gateway
10
Q
Illustrate NIPRNet Architecture.
A
- Public internet
- DoD gateway
- Air Force gateway
- Air Force base boundary
- NIPRNet host level
11
Q
What are the three parameters required to enter an established LINK16 network.
A
- Initial data load (IDL)
- Crypto
- Time sync
12
Q
Illustrate SIPRNet Architecture.
A
- DoD SIPRNet
- Air Force gateway
- Air Force base boundary
- SIPRNet host level
13
Q
Describe air gap considerations.
A
- Improperly moving data across and air gap creates a ‘virtual cable’
- Close CD burning sessions, write protect floppy disks
- Air gapped networks/computers are not visible to enterprise cyberspace defenders
- Air gap network/computer operators are responsible for their security procedures
- Must use secure websites to retrieve planning data
- Use HTTPS, PKI, password protect and when possible use SIPRNet
- Identify ‘mission only’ NIPRNet computers and restrict use to mission related work only
- What computer is used to write mission data onto CD; the same computer used to check Facebook?
14
Q
List common adversary threat activities.
A
- Scanning and reconnaissance
- Spear phishing
- Web redirects and malicious web pages
- Malware (why we can’t use thumbdrives)
- Automated operations
- Interactive operators
- Hardware and firmware attacks
- Insider
15
Q
List the four actions in cyberspace per JP 3-12.
A
- Cyberspace ISR
- Cyberspace operational preparation of the environment (OPE)
- Cyberspace attack
- Cyberspace defense