Mod 11 Flashcards

1
Q

Concept of spread spectrum

A

the narrowband signal is manipulated (scrambled) prior to transmission in such a way that the signal occupies a much larger part of the RF spectrum then strictly needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

using a spread spectrum technique can make your signal what?

A

More robust against interference and jamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The manipulation of spread spectrum requires?

A

a pseudo random noise code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Two techniques to spread the spectrum

A

Direct Sequence Spread Spectrum (DSSS)

Frequency hopping (FHSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Direct Sequence Spread Spectrum (DSSS)

A

multiplication of the original data signal with a much faster pseudo random noise code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Results of DSSS

A

a scrambled signal with a much wider spectrum. Improves protection against interfering signals, especially narrowband interference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The use of DSSS for multiple access is called

A

Code Division Multiple Access (CDMA), and is used e.g. in the 3rd generation mobile communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Frequency Hopping Spread Spectrum (FHSS)

A

makes the narrow band signal jump in random narrow bands within a larger bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In Frequency Hopping, the RF frequency of the narrowband transmission is quickly changed within a certain range, according to

A

a pseudo random noise code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Like DSSS, FH also provides a multiple access capability by

A

using orthogonal hopping codes for different (logical) communication channels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

JTIDS/MIDS is

A

It provides secure, flexible, and
jam-resistant information transfer in real time among the dispersed and mobile units, characteristic of modern armed forces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

JTIDS/MIDS combines characteristics designed to overcome many of the limitations common to existing systems by providing

A

increased system capacity
and coverage, improved connectivity, survivability, jamming resistance, and reduced danger of data loss and data obsolescence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

JTIDS/MIDS terminals operate on the principal of

A

Time Division Multiple Access (TDMA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The JTIDS/MIDS system operates in what frequency band

A

960 - 1215 MHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which spread spectrum technique does JTIDS/MIDS use?

A

both frequency hopping and direct sequence spread spectrum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

EPLRS is

A

a joint service secure, jam-resistance data link that is primarily used by ground forces (US Army) for blue-force tracking (friendly troop position information) and digital data dissemination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SADL provides

A

fighter-to-fighter, air-to-ground, and ground-to-air data communications that are robust, secure, jam-resistant, and contention-free, air-to-ground combat identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

EPLRS/SADL is limited to

A

LOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

EPLRS/SADL soldier range (vehicle to vehicle

A

5-8 miles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

EPLRS/SADL Ground to air range

A

dependent on the altitude of the airborne platform but can easily exceed 100 miles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The biggest change found on the JBC-P compared to BFT2

A

the addition of communications security (COMSEC) devices

the graphics and user operability are far superior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

JBC-P COMSEC is loaded by

A

KGV-72

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What equipment was utilized by the FBCB2?

A

DAGR GPS, Upgraded MT-2025

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

JBC-P uses what equipment?

A

MFoCS systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is Tactical Data Links (TDLs)

A

Joint Chiefs of Staff (JCS)-approved standardized communication link suitable for transmitting machine-readable, digital information

The TDL program facilitates information exchange between the US and Allied commands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are the 3 TDLs

A

Link 11, Link 11B, Link 16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Link 11

A

Formerly known as TADIL A

a secure digital point-to-point legacy data link

Air Force has migrated to Link 16 and only uses Link 11 when interoperating with countries or platforms that do not yet have LINK 16

half-duplex

28
Q

Data rate of link 11

A

up to 2400 bits per second (bps)

29
Q

Channel size of Link 11 in UHF and HF

A

UHF : 25khz
HF: 6khz

30
Q

Link 11B

A

Formerly known as TADIL B

secure, full-duplex, point-to-point digital data link that uses serial transmission.

Its circuit may be established across satellite, microwave, terrestrial cable, and so forth. Its usage is generally limited to providing connectivity between ground-based units.

31
Q

Difference between Link 11 and Link 11 B

A

link11B is not associated with RF transmissions and does not use a modulated waveform. It is a circuit, usually combined with other circuits in a multiplexer, and is transmitted as data.

32
Q

Data rate of Link 11B

A

up to 1200 bps

33
Q

Link 16

A

language used on JTIDS/MIDS to send messages

Formerly known as TADIL J

secure, frequency hopping (FH), line-of-sight (LOS) data link whose primary purpose is situational awareness and C2.

34
Q

What frequency band does Link 16 Operate in?

A

L band (960-1215mhz)

L-Band does not penetrate foliage or man-made structures, nor does it bend around hills

35
Q

Link 16 has a robust anti-jam mode, which hops over…

A

51 frequencies that are spaced 3 MHz apart from one another.

36
Q

Link 16 was designed for

A

the air-to-air environment and is the primary data link for the USAF.

37
Q

The goal of Communications Security (COMSEC) is to

A

ensure information pertaining to national security stays out of the wrong hands.

deny unauthorized personnel information derived from ISs of the United States Government related to national security and to ensure the authenticity of such ISs

38
Q

COMSEC is a Cybersecurity discipline identified in what AFI?

A

AFI 17-130 Cybersecurity Program Management

39
Q

NSA/CSS is tasked with preventing

A

foreign adversaries from gaining access to classified national security information

all military encryption is standardized by the NSA guidance.

40
Q

NSA product Types

A

ranks cryptographic products or algorithms by a certification

The CNSSI No. 4009 National Information Assurance Glossary defines the Type 1, 2, 3, and 4 products.

41
Q

Type 1

A

For encrypting and decrypting classified and sensitive national security information.

42
Q

Type 2

A

For encrypting or decrypting sensitive national security information

43
Q

Type 3

A

For encrypting or decrypting unclassified sensitive U.S. Government or commercial information, and to protect systems requiring protection mechanisms consistent with standard commercial practices.

44
Q

Type 4

A

For unevaluated commercial cryptographic equipment that are neither NSA nor NIST certified for any Government usage. These products may contain either vendor proprietary algorithms, algorithms registered by NIST, or algorithms registered by NIST and published in a Federal Information Processing Standard (FIPS).

45
Q

Suite A and B

A

Classifications of encryption-device types

46
Q

Suite A

A

(Confidential through Top Secret) A specific set of classified cryptographic algorithms used for the protection of some categories of restricted mission critical information.

47
Q

Suite B

A

(Confidential through Secret) A specific set of cryptographic algorithms suitable for protecting both classified and unclassified national security systems and information throughout the US government and to support interoperability with allies and coalition partners.

48
Q

What is Cryptography

A

is the art and science of making and breaking codes and ciphers

49
Q

Encryption is the process of

A

converting information to a disguised form in order to send it across a potentially unsafe channel.

50
Q

Modern encryption schemes utilize the concepts of

A

symmetric-keys and public-keys

51
Q

Symmetric Key

A

the encryption and decryption keys are the same. Communicating parties must have the same key in order to achieve secure communication.

52
Q

Public key

A

the encryption key is published for anyone to use and encrypt messages. However, only the receiving party has access to the decryption key that enables messages to be read.

53
Q

Advanced Encryption Standard

A

symmetric-key algorithm

proved to be a much-needed upgrade, providing encryption using three different key lengths: 128, 192, and 256 bits.

54
Q

Confidential and Secret information requires

A

AES of 128-bit key lengths or higher

55
Q

Top Secret requires

A

AES 192 or 256- bit key length

56
Q

High Assurance Internet Protocol Encryption (HAIPE)

A

provides a secure gateway that allows two enclaves to exchange data over an untrusted or lower-classification network, such as commercial internet

57
Q

HAIPE provides a tactical advantage to military radio communications by

A

ability to establish secure mobile ad hoc networking (MANET) capabilities for users

58
Q

SCIP

A

Secure Communications Interoperability Protocol

standard for secure voice and data communication

SCIP supports national (US) and multi-national modes

only requirement is a minimum bandwidth of 2400 Hz.

59
Q

Voice over IP

A

technology used to transmit voice communication over a data network using Internet Protocol

60
Q

Secure Voice over IP (SVoIP

A

is when secure phones are used to protect information sent over the VoIP network.

61
Q

Voice over Secure IP (VoSIP)

A

is the same as SVoIP in that they are technologies used to securely transmit voice communications, but with VoSIP, the security is provided by separate encryption devices in the network rather than the secure phones themselves.

62
Q

When the device is empty and free of codes, COMSEC hardware is categorized as ?

A

controlled cryptographic item” (CCI)

It is considered UNCLASSIFIED.

63
Q

Transmission Encryption Keys (TEK)

A

a key used to encrypt messages

64
Q

Transmission Security Keys (TSK

A

used to secure the link by which the message will travel.

65
Q

Fill devices often use a standard data protocol such as

A

DS-101 or DS-102