Z3D153 - 2016 Edit Code 3, Volume 2 Part 5

20 Questions | Total Attempts: 69

SettingsSettingsSettings
Please wait...
Z3D153 Quizzes & Trivia

.


Questions and Answers
  • 1. 
    Which type of advanced waveform enables data and imagery situational awareness and provides enhanced combat effectiveness?
    • A. 

      Soldier radio.

    • B. 

      Wideband networking.

    • C. 

      Mobile user objective system (MUOS).

    • D. 

      Adaptive network wideband waveform (ANW2).

  • 2. 
    In high-frequency (HF) communications, your station’s automatic link establishment (ALE) self-address is the address
    • A. 

      The user programmed for his or her station.

    • B. 

      It shares with other members.

    • C. 

      Of an unprogrammed station.

    • D. 

      Of other stations in the net.

  • 3. 
    This is the simplest form of an automatic link establishment (ALE) call.
    • A. 

      All.

    • B. 

      Any.

    • C. 

      Group.

    • D. 

      Individual.

  • 4. 
    Which automatic link establishment (ALE) call option lets you call a predefined group of stations with a single shared address, and requires them to respond, one at a time, in a predefined order?
    • A. 

      Handshake.

    • B. 

      Channel.

    • C. 

      Group.

    • D. 

      Net.

  • 5. 
    Where is the primary high frequency global communications system (HFGCS) network control station located?
    • A. 

      Offutt, Nebraska.

    • B. 

      Grand Forks, North Dakota.

    • C. 

      Andrews AFB, Maryland.

    • D. 

      Croughton, England.

  • 6. 
    This is not a major network within the Military Auxiliary Radio Service (MARS).
    • A. 

      Mission support network (MSN).

    • B. 

      Phone patch network (PPN).

    • C. 

      Very high frequency (VHF) network.

    • D. 

      Ultra-high frequency (UHF) network.

  • 7. 
    The process of unscrambling encrypted information so that it is intelligible is known as
    • A. 

      Decryption.

    • B. 

      Encryption.

    • C. 

      Cryptography.

    • D. 

      Cryptanalysis.

  • 8. 
    Which type of cryptographic algorithm permits the encryption key to be public?
    • A. 

      Asymmetric.

    • B. 

      Symmetric.

    • C. 

      Encoder.

    • D. 

      Secret.

  • 9. 
    Which secure communications device operates by simply sliding the key tape into the reader?
    • A. 

      KYK–13.

    • B. 

      KOI–18.

    • C. 

      KY–57.

    • D. 

      KY–99A.

  • 10. 
    The common name for the method of changing encryption keys over the radio channel in a two-way radio system is called
    • A. 

      Over-the-air rekeying (OTAR).

    • B. 

      Asymmetric.

    • C. 

      Symmetric.

    • D. 

      Off-line.

  • 11. 
    Which type of conventional land mobile radio (LMR) device maximizes the communications distance between lower-powered equipment items?
    • A. 

      Mobile.

    • B. 

      Portable.

    • C. 

      Repeater.

    • D. 

      Base station.

  • 12. 
    In a land mobile radio (LMR) repeater system, a device that separates and isolates the incoming receive signal from the outgoing transmit signal and vice versa is known as a
    • A. 

      Duplexer.

    • B. 

      Comparator.

    • C. 

      Key-unkey relay.

    • D. 

      Transmit-receive switch.

  • 13. 
    Which type of site configuration was designed to provide coverage for a small geographical area?
    • A. 

      Single-site.

    • B. 

      Multi-site.

    • C. 

      Simulcast.

    • D. 

      Multicast.

  • 14. 
    This provides the interface between dispatch consoles and the central controller in a typical trunking system.
    • A. 

      Modems.

    • B. 

      Access control.

    • C. 

      Switching equipment.

    • D. 

      System management computer.

  • 15. 
    When setting up a trunking network, users with common missions or functions are assigned as
    • A. 

      Nets.

    • B. 

      Channels.

    • C. 

      Talkgroups.

    • D. 

      Subscribers.

  • 16. 
    Which statement is not a benefit of having a trunking network?
    • A. 

      Selective radio inhibit.

    • B. 

      Faster system access.

    • C. 

      Unbalanced channel loads.

    • D. 

      Better channel efficiency.

  • 17. 
    This differentiates the enterprise land mobile radio (ELMR) network from a regular trunking or conventional network.
    • A. 

      Advanced encryption standard (AES) encryption.

    • B. 

      Association of Public-Safety Communications Officials (APCO) P25 standard.

    • C. 

      Repeater.

    • D. 

      Centralized core controller.

  • 18. 
    Which Air Force instruction (AFI) requires communications squadrons to maintain installation notification and warning systems (INWS)?
    • A. 

      AFI 10–2501, Air Force Emergency Management Program.

    • B. 

      AFI 10–2801, Force Development Concepts.

    • C. 

      AFI 33–115, Air Force Information Technology Service Management.

    • D. 

      AFI 33–217, Voice Call Sign Program.

  • 19. 
    In the giant-voice system, this controls the system’s signal routing and power distribution.
    • A. 

      Landline board.

    • B. 

      Control board.

    • C. 

      Radio board.

    • D. 

      Encoder.

  • 20. 
    Which is not a major component of the giant-voice system?
    • A. 

      Siren cabinet.

    • B. 

      Siren stack.

    • C. 

      Decoder.

    • D. 

      Encoder.