Introduction to Joint Multi-TDL Network (MTN) Operations JT101 (FOUO) POST TEST 2
Which of the following best describe the Black Traffic Encryption Key (BTEK) used for Network Enabled Weapons (NEW)? Select all that apply.
-Allows the NEW to communicate on Link 16 -Unique to the weapon -Link 16 waveform key
Which of the following are disadvantages of Indirect (Relay) connectivity? Select all that apply.
-Each leg must meet the point-to-point criteria -Increased Time Slot Duty Factor (TSDF) -Multiplies the time slot requirements (the relayed message needs a time slot to be transmitted in)
What are the terminal design features that contribute to JTIDS/MIDS jam resistance? Select all that apply.
-High hopping rate of 76,923 hops per second -Error Detection and Correction (EDAC) coding -Pseudorandom frequency-hopping pattern over 51 discrete center frequencies
Which of the following are components of a timeslot in Link 16 communications? Select all that apply.
-Propagation -Sync/Header -Jitter -Data
What are the three requirements for Link 16 direct connectivity? Select all that apply.
-Sufficient signal strength at the receiver -Radio frequency (RF) Point-to-point line-or-sight (LOS) -Sufficient propagation time within the current time slot
What numbers are used by a network designer as Crypto Variable Logic Labels (CVLLs)?
1 - 127
How many timeslots are in a frame in Link 16 communications?
1,536
How many cryptographic keys can the JTIDS/MIDS Secure Data Unit (SDU) store?
1000 plus
How many JTIDS/MIDS net numbers are there?
127
How many nets can operate in a Link 16 network before reaching maximum spectral capacity?
20 nets
How many frames are in an epoch in Link 16 communications?
64
Each JTIDS/MIDS transmissions contains a ____________ pulse stream.
72, 258 or 444
Where in the Network Description Document (NDD) can a platform operator reference to identify Crypto Variable Logic Label (CVLL) usage for their platform?
COMSEC Cross Reference Table
Under which MIDS terminal mode are all the IPF features disabled?
Combat Protect (2)
In which Link 16 security mode is a discrete Crypto Variable Logic Labels (CVLLs) assigned to only the TSEC which is used for message encryption as well?
Common Variable Mode (CVM)
Dedicated Timeslot Reuse is a form of what JTIDS/MIDS access mode?
Contention
Which JTIDS/MIDS access mode allows multiple participants to share common timeslots using the same net resulting in receivers hearing the closest transmitter?
Contentions access
Which of the following IS NOT a Built in Test (BIT) provided by Link 16 terminals?
Continuous BIT
Which of the following IS NOT true of Link 16 spread spectrum processing?
Decreases the power transmitted over any single frequency
Which JTIDS/MIDS access mode allows only one unit to transmit per timeslot and goes unused if that specific participant has no data to transmit?
Dedicated access
Which of the following IS NOT determined by the Transmission Security (TSEC) variable in Link 16?
Encryption and decryption of message data
Which of the following IS NOT a function provided by the Link 16 terminal's Platform J connection?
J-Series messages using JREAP C protocol
Which source document is used to determine foreign JTIDS/MIDS EMC restrictions?
JTIDS/MIDS Multinational Ad Hoc Spectrum Support Working Group Notebook
A ___________ is a group of participants, or terminals, in synchronization sharing a common understanding of timeslot boundaries.
JTIDS/MIDS Network
Which Link 16 jam resistance characteristic defines the power output needed to jam Link 16 communications at equal distances?
Link margin
Which of the following MIDS LVTs can transmit at 1000 watts and is also known as MIDS-on-Ship (MOS)?
MIDS LVT (5)
Which JTIDS/MIDS access technique is not operator selectable and allows different groups of users to exchange information in different Network Participation Groups (NPGs)?
Multi-nets
What is another term for the hopping pattern used by a terminal for a single transmission?
Net
Which category of frequency assignment authorization is good for five years and is entered into the Government Master File (GMF)?
Permanent Frequency Assignments
Which of the following IS NOT directed in CJCSI 6232.01 Link 16 Spectrum Deconfliction?
Provides information about timeslot allocation
Which Link 16 jam resistance characteristic defines the required distance between a jammer and a receiver to jam Link 16 communications using equal power?
Range ratio
What technique is used by Link 16 terminals to correct errors and erasures in a message in order to pass uncorrupted data to the host system?
Reed Solomon Error Detection and Correction (EDAC) coding
What is the purpose of a Link 16 terminal's Secure Data Unit (SDU)?
Stores cryptovariables for message and transmission security
What JTIDS/MIDS protocol dictates that platforms take turns transmitting and receiving data according to time?
Time Division Multiple Access (TDMA)
What measurement is used to express the pulse density of all Link 16 transmissions in a 12 second frame?
Time Slot Duty Factor (TSDF)
Which JTIDS/MIDS access mode allows units to automatically and dynamically assign surveillance capacity based on platform need?
Timeslot Reallocation (TSR)
The ____________ pseudo-randomly assigns a center frequency to each pulse.
Transmission Security (TSEC) crypto variable
Which type of relay allows messages received on one net number to be relayed to another net number?
Zoom Relay