UNITED24 - Make a charitable donation in support of Ukraine!

Military

Practice Exercise
Lesson 3

Instructions The following items will test your understanding of the material covered in this lesson. There is only one correct answer for each item. When you have completed the exercise, check your answers with the answer key that follows. If you answer any item incorrectly, review that part of the lesson which contains the portion involved.

1. MI personnel perform which form of deception?

A. Imitative electronic deception
B. Collective electronic deception
C. Simulative electronic deception
D. Manipulative electronic deception
2. Altering the electromagnetic profile of friendly forces is called what?

A. Simulative electronic deception
B. Imitative electronic deception
C. Manipulative electronic deception
D. Signal intelligence
3. Jamming control mechanisms include both positive and negative controls. Which of the following is a positive control?

A. On-off controls
B. Taboo frequencies
C. Guarded frequencies
D. Protected frequencies
4. Which of the following is normally directed against a specific frequency?

A. Stepped jamming
B. Barrage jamming
C. Sweep jamming
D. Spot jamming
5. Which form of jamming is most often used against non-communications?

A. Radiation jamming
B. Reradiation jamming
C. Spot jamming
D. Barrage jamming
6. The application of a modulation to a type of jamming is done because the selected modulation does what?

A. Provides a better ground wave
B. Provides a more efficient sky wave
C. Performs better against the signal being transmitted
D. Is most effective for the distance between the jammer and the receiver
7. Which of the following describes jamming?

A. A repeater can intercept and amplify, but not modify, a signal
B. A mountain cannot mask a jamming signal
C. Target link distance is the distance from the jammer to the intended receiver
D. Environmental factors affect the ability of a jamming device to radiate a signal
8. What is the form of deception used to enter an enemy communications net?

A. Imitative electronic deception
B. Collective electronic deception
C. Simulative electronic deception
D. Manipulative electronic deception
9. Which scope of imitative electronic deception requires the least technical support?

A. Cryptographic intrusion
B. Deceptive jamming
C. Nuisance intrusion
D. Planned message intrusion