Vol2 Ure3 CDC 3D153

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Jayhuiz23
J
Jayhuiz23
Community Contributor
Quizzes Created: 11 | Total Attempts: 1,310
Questions: 20 | Attempts: 231

SettingsSettingsSettings
3D153 Quizzes & Trivia

This is to be used as a study aid for CDC 3D153 RF transmission systems.


Questions and Answers
  • 1. 

    (221) Any military action involving the use of the electromagnetic (EM) spectrum to include directed energy to attack an enemy is called?

    • A.

      Electronic support (ES)

    • B.

      Electronic warfare (EW)

    • C.

      Electromagnetic Pulse (EMP)

    • D.

      Electromagnetic Interference (EMI)

    Correct Answer
    B. Electronic warfare (EW)
    Explanation
    Electronic warfare (EW) refers to any military action that involves the use of the electromagnetic (EM) spectrum, including directed energy, to attack an enemy. This can include activities such as jamming enemy communications, disrupting radar systems, or using directed energy weapons to disable enemy equipment. Electronic support (ES) refers to actions that involve the use of the EM spectrum to gather information about the enemy's electronic capabilities. Electromagnetic Pulse (EMP) refers to a burst of electromagnetic radiation that can disrupt or damage electronic equipment. Electromagnetic Interference (EMI) refers to unintentional electromagnetic radiation that can disrupt or degrade the performance of electronic equipment.

    Rate this question:

  • 2. 

    (221) Which is not an example of electronic protection (EP)?

    • A.

      Frequency agility in a radio

    • B.

      Communications intelligence

    • C.

      Electronic and material shielding for systems

    • D.

      Process to counter meaconing, interference, jamming, and intrustion

    Correct Answer
    B. Communications intelligence
    Explanation
    The given options describe various examples of electronic protection (EP), which refers to measures taken to protect electronic systems from threats such as interference, jamming, and intrusion. Frequency agility in a radio, electronic and material shielding, and processes to counter meaconing, interference, jamming, and intrusion are all examples of EP. However, "communications intelligence" does not fall under the category of EP. Communications intelligence refers to the collection and analysis of information from communication systems, and is not directly related to protecting electronic systems from threats.

    Rate this question:

  • 3. 

    (221) Which electronic warfare (EW) component responds to taskings to search for, intercept, identify, and locate intentional and unintentional sources of radiated energy?

    • A.

      Electronic Attack (EA)

    • B.

      Electronic control (EC)

    • C.

      Electronic support (ES)

    • D.

      Electronic protection (EP)

    Correct Answer
    C. Electronic support (ES)
    Explanation
    Electronic support (ES) is the correct answer because it involves the tasks of searching for, intercepting, identifying, and locating intentional and unintentional sources of radiated energy. This component of electronic warfare is responsible for collecting and analyzing electromagnetic emissions to provide situational awareness and support other electronic warfare operations. Electronic Attack (EA) involves using electromagnetic energy to attack enemy systems, Electronic control (EC) involves controlling friendly systems, and Electronic protection (EP) involves protecting friendly systems from electronic warfare threats.

    Rate this question:

  • 4. 

    (222) Electromagnetic (EM) deception as it applies to electronic warfare (EW) is?

    • A.

      Controlling the information an enemy

    • B.

      The elimination of some or all of an adversary's electronic defenses

    • C.

      The deliberate radiation of EM energy intended to convey misleading information to an enemy

    • D.

      Degrading or interfering with the enemy's use of the EM spectrum to limit the enemy's combat capabilities

    Correct Answer
    C. The deliberate radiation of EM energy intended to convey misleading information to an enemy
    Explanation
    Electromagnetic (EM) deception in electronic warfare (EW) refers to the intentional emission of EM energy with the purpose of providing false or misleading information to the enemy. This tactic aims to confuse and misguide the adversary by conveying deceptive signals or information through the use of electromagnetic radiation. By doing so, EM deception disrupts the enemy's ability to accurately interpret and utilize the electromagnetic spectrum, ultimately limiting their combat capabilities.

    Rate this question:

  • 5. 

    (223) What is the process of unscrambling encrypted information so that it is intelligible?

    • A.

      Decryption

    • B.

      Encryption

    • C.

      Cryptography

    • D.

      Cryptanalysis

    Correct Answer
    A. Decryption
    Explanation
    Decryption is the process of unscrambling encrypted information so that it becomes intelligible. It involves using a decryption key or algorithm to reverse the encryption process. By decrypting the information, it can be converted back into its original form, allowing authorized individuals to understand and access the data.

    Rate this question:

  • 6. 

    (224) How many selectable traffic key slots does the KG–84A have?

    • A.

      1

    • B.

      2

    • C.

      4

    • D.

      8

    Correct Answer
    C. 4
    Explanation
    The KG-84A has a total of 4 selectable traffic key slots. This means that it can accommodate up to 4 different traffic keys, allowing for secure communication with multiple parties. Each key slot can be used to encrypt and decrypt messages, ensuring the confidentiality and integrity of the information being transmitted. Having multiple key slots enhances the flexibility and scalability of the KG-84A, making it suitable for various communication scenarios.

    Rate this question:

  • 7. 

    (224) Which switch on the KY–57 VINSON zeroizes channels one through five?

    • A.

      Fill

    • B.

      Mode

    • C.

      Power

    • D.

      Volume

    Correct Answer
    A. Fill
    Explanation
    The switch on the KY-57 VINSON that zeroizes channels one through five is the "Fill" switch.

    Rate this question:

  • 8. 

    (225) The common name for the method of changing the encryption keys over the radio channel in a two-way radio system is called?

    • A.

      Over-the-air rekeying (OTAR)

    • B.

      Asymmetric

    • C.

      Symmetric

    • D.

      Off-line

    Correct Answer
    A. Over-the-air rekeying (OTAR)
    Explanation
    Over-the-air rekeying (OTAR) is the common name for the method of changing the encryption keys over the radio channel in a two-way radio system. This method allows for the secure and efficient changing of encryption keys without the need for physical access to the radios. It ensures that the communication remains secure by regularly updating the encryption keys over the airwaves, minimizing the risk of unauthorized access or decryption of the transmitted information.

    Rate this question:

  • 9. 

    (225) Centralized control of encryption keys will not reduce?

    • A.

      Procedural problems

    • B.

      Operational problems

    • C.

      Security problems

    • D.

      Safety problems

    Correct Answer
    D. Safety problems
    Explanation
    Centralized control of encryption keys will not reduce safety problems. This means that even with centralized control, safety issues related to encryption keys will still exist. Centralized control refers to the practice of managing all encryption keys in a single location, which can lead to potential vulnerabilities and risks. Safety problems may include unauthorized access to encryption keys, loss or theft of keys, or inadequate protection measures. Therefore, while centralized control may address other issues such as procedural, operational, or security problems, it does not necessarily eliminate safety problems.

    Rate this question:

  • 10. 

    (226) In frequency hopping (FH) operation, the interval at which each transmitter remains on a given frequency for a specific time is known as the?

    • A.

      Dwell time

    • B.

      Hopping rate

    • C.

      Frequency offset

    • D.

      Transmitter velocity

    Correct Answer
    A. Dwell time
    Explanation
    In frequency hopping (FH) operation, the interval at which each transmitter remains on a given frequency for a specific time is known as the dwell time. This refers to the duration for which the transmitter stays on a particular frequency before switching to another frequency in the hopping sequence. It determines the amount of time the transmitter spends on each frequency and is an essential parameter in FH systems.

    Rate this question:

  • 11. 

    (227) Which RT–1523 SINCGARS subassembly removes synchronization and frequency hopping information that is embedded in a receive signal?

    • A.

      The interleaver

    • B.

      The modulator

    • C.

      The demodulator

    • D.

      The exciter power amplifier module

    Correct Answer
    C. The demodulator
    Explanation
    The demodulator is responsible for removing synchronization and frequency hopping information that is embedded in a receive signal. It extracts the original information from the modulated signal by reversing the modulation process.

    Rate this question:

  • 12. 

    (227) The RT–1523 SINCGARS radio’s time sync and correlator module manipulates control signal outputs during the frequency hopping (FH) mode to?

    • A.

      Stop frequency shifts during receive operations

    • B.

      Shut down reception only during frequency shifts

    • C.

      Shut down transmission only during frequency shifts

    • D.

      Shut down reception and transmission during frequency shifts

    Correct Answer
    D. Shut down reception and transmission during frequency shifts
    Explanation
    The RT-1523 SINCGARS radio's time sync and correlator module manipulates control signals during the frequency hopping (FH) mode to shut down reception and transmission during frequency shifts. This means that when the radio is changing frequencies, it temporarily stops both receiving and transmitting signals to ensure a smooth transition and prevent interference or loss of data.

    Rate this question:

  • 13. 

    (228) Concerning HAVE QUICK II communications (MWOD), how long can each word of day (WOD) be used?

    • A.

      Each WOD is used until it is manually changed

    • B.

      For a total of 3 days

    • C.

      For 48 hours

    • D.

      For 24 hours

    Correct Answer
    D. For 24 hours
    Explanation
    Each word of the day (WOD) in HAVE QUICK II communications can be used for a period of 24 hours before it is manually changed.

    Rate this question:

  • 14. 

    (229) Which one of the following statement is not a characteristic of the AN/GRC–171B(V)4 transceiver?

    • A.

      It operates from 116MHz to 149.975 MHz

    • B.

      It provides antijam communications in amplitude modulation (AM) and frequency modulation (FM)

    • C.

      It contatins both HAVE QUICK and HAVE QUICK II

    • D.

      It can communicate on any one of 7,000 available channels

    Correct Answer
    A. It operates from 116MHz to 149.975 MHz
    Explanation
    The AN/GRC-171B(V)4 transceiver does not operate from 116MHz to 149.975 MHz.

    Rate this question:

  • 15. 

    (229) What does the low-pass filter of the AN/GRC–171B(V)4 transceiver perform?

    • A.

      Image frequency rejection in receive and harmonic attenuation in transmit

    • B.

      Image frequency rejection in transmit and harmonic attenuation in receive

    • C.

      RF decoupling in transmit and harmonic suppression in receive

    • D.

      RF decoupling in receive and harmonic suppression in transmit

    Correct Answer
    A. Image frequency rejection in receive and harmonic attenuation in transmit
    Explanation
    The low-pass filter of the AN/GRC-171B(V)4 transceiver performs image frequency rejection in receive and harmonic attenuation in transmit. This means that it filters out unwanted frequencies that could interfere with the receiver's ability to receive signals, specifically targeting image frequencies. Additionally, it helps to reduce the presence of harmonics in the transmitted signals, ensuring that the transmitted signals are clean and free from unwanted harmonic distortions.

    Rate this question:

  • 16. 

    (229) The output power of the AN/GRC–171B(V)4 transceiver is?

    • A.

      25 Watts in both amplitude modulation (AM) and frequency modulation (FM)

    • B.

      20 Watts in AM, 50 Watts in FM

    • C.

      20 Watts in AM, 20 Watts in FM

    • D.

      50 Watts in narrowband, 25 watts in wideband

    Correct Answer
    B. 20 Watts in AM, 50 Watts in FM
    Explanation
    The AN/GRC-171B(V)4 transceiver has an output power of 20 Watts in amplitude modulation (AM) and 50 Watts in frequency modulation (FM). This means that when using AM, the transceiver can transmit at a power of 20 Watts, while when using FM, it can transmit at a higher power of 50 Watts. The transceiver is capable of operating at different power levels depending on the modulation technique being used.

    Rate this question:

  • 17. 

    (230) The Joint Tactical Information Distribution System (JTIDS) is commonly referred to as?

    • A.

      Link 4A

    • B.

      Link 11

    • C.

      Link 16

    • D.

      Link 22

    Correct Answer
    C. Link 16
    Explanation
    The correct answer is Link 16. The Joint Tactical Information Distribution System (JTIDS) is commonly referred to as Link 16. Link 16 is a secure, jam-resistant, high-speed digital data link used by military forces to exchange tactical information, such as location, identification, and mission data, in real-time. It enables efficient and effective communication and coordination between different platforms, such as aircraft, ships, and ground forces, enhancing situational awareness and command and control capabilities.

    Rate this question:

  • 18. 

    (231) Which service uses the Enhanced Position Location Reporting System (EPLRS) to locate and track amphibious assault craft?

    • A.

      Army

    • B.

      Navy

    • C.

      Air Force

    • D.

      Marines

    Correct Answer
    B. Navy
    Explanation
    The correct answer is Navy because they use the Enhanced Position Location Reporting System (EPLRS) to locate and track amphibious assault craft. This system is specifically designed for the Navy's use in monitoring and managing their amphibious operations. The Army, Air Force, and Marines may have their own systems for tracking and locating their respective assets, but in this case, it is the Navy that utilizes EPLRS for this purpose.

    Rate this question:

  • 19. 

    (231) What type of network radio does the Air Force use for close air support?

    • A.

      Single Channel Ground and Airborne Radio system (SINCGARS)

    • B.

      Enhanced Position Location Reporting System (EPLRS)

    • C.

      Joint Tactical Information Distribution System (JTIDS)

    • D.

      Situation Awareness Data Link (SADL)

    Correct Answer
    D. Situation Awareness Data Link (SADL)
    Explanation
    The Air Force uses the Situation Awareness Data Link (SADL) for close air support. SADL is a network radio system that allows for the exchange of real-time situational awareness information between aircraft and ground forces. It enables the sharing of critical data such as target locations, friendly positions, and threat information, enhancing coordination and effectiveness in close air support operations.

    Rate this question:

  • 20. 

    (232) How many programmable devices can the multiband inter/intra team radio hold?

    • A.

      3

    • B.

      5

    • C.

      7

    • D.

      10

    Correct Answer
    C. 7
    Explanation
    The multiband inter/intra team radio can hold a total of 7 programmable devices.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 20, 2012
    Quiz Created by
    Jayhuiz23
Back to Top Back to top
Advertisement