Introduction to Joint Multi-TDL Network (MTN) Operations JT101 (FOUO) (Link-16 US Members Student Course)-POST TEST2
Which of the following best describe the Black Traffic Encryption Key (BTEK) used for Network Enabled Weapons (NEW)? Select all that apply.
-Allows the NEW to communicate on Link 16 -Link 16 waveform key -Unique to the weapon
Which of the following are disadvantages of Indirect (Relay) connectivity? Select all that apply.
-Each leg must meet the point-to-point criteria -Increased Time Slot Duty Factor (TSDF) -Multiplies the time slot requirements (the relayed message needs a time slot to be transmitted in)
Which are NOT methods that can be used to deconflict Link 16 networks? Select all that apply.
-Employing a network time offset -Using different Initialization Data Load (IDL) files
Which of the following are components of a timeslot in Link 16 communications? Select all that apply.
-Jitter -Sync/Header -Data -Propagation
What are the three requirements for Link 16 direct connectivity? Select all that apply.
-Radio frequency (RF) Point-to-point line-or-sight (LOS) -Sufficient propagation time within the current time slot -Sufficient signal strength at the receiver
Which of the following IS NOT true about Secure Data Units (SDUs)? Select all that apply.
-SDU Serial number is 16 bits -Limited to today and tomorrow pairs
What are the two types of Link 16 capacity? Select all that apply.
-Terminal capacity -System capacity
How many timeslots are in a frame in Link 16 communications?
1,536
How many JTIDS/MIDS net numbers are there?
127
What is the link margin value that must be achieved to force an enemy jammer at equal distance to a receiving Link 16 terminal to use 128 times more power than the transmitting terminal?
21 dB
A link margin value of 21dB will force an enemy jammer using equal power to get within how many miles of a receiving terminal if the transmitting terminal is 60 miles away?
5 miles or 1/12 the distance
What portion of the electromagnetic spectrum do Link 16 terminals operate?
960 - 1215 MHz frequency band
Where in the Network Description Document (NDD) can a platform operator reference to identify Crypto Variable Logic Label (CVLL) usage for their platform?
COMSEC Cross Reference Table
Under which MIDS terminal mode are all the IPF features disabled?
Combat Protect (2)
Which JTIDS/MIDS access mode can be either operator-controlled or machine-controlled?
Contention access
Which of the following IS NOT a Built in Test (BIT) provided by Link 16 terminals?
Continuous BIT
All Link 16 equipped systems must have an approved __________ entry in order to operate.
DD Form 1494
Which of the following IS NOT true of Link 16 spread spectrum processing?
Decreases the power transmitted over any single frequency
Which JTIDS/MIDS access technique gives two or more platforms the same time slot, net, and TSEC crypto in which to transmit because they have no requirement to exchange information?
Dedicated Timeslot Reuse
Which JTIDS/MIDS access mode allows only one unit to transmit per timeslot and goes unused if that specific participant has no data to transmit?
Dedicated access
What are the two types of JTIDS/MIDS RF connectivity?
Direct connectivity and indirect connectivity
Which of the following IS NOT true of the use of the Link 16 information assurance feature known as double pulse transmissions?
Each pulse occurs on identical frequencies
Which of the following IS NOT a factor when choosing crypto key for a network? Select all that apply.
Employment of Dedicated Timeslot Reuse
Which of the following is determined by the Message Security (MSEC) variable in Link 16?
Encryption and decryption of message data
Which of the following IS NOT true about a JTIDS/MIDS pulse stream?
Incompatible with the National Airspace System (NAS)
Which of the following IS NOT a function provided by the Link 16 terminal's Platform J connection?
J-Series messages using JREAP C protocol
Which source document is used to determine foreign JTIDS/MIDS EMC restrictions?
JTIDS/MIDS Multinational Ad Hoc Spectrum Support Working Group Notebook
A ___________ is a group of participants, or terminals, in synchronization sharing a common understanding of timeslot boundaries.
JTIDS/MIDS Network
Link 16 jam resistance is defined in what two ways?
Link margin and range ratio
What is another term for the hopping pattern used by a terminal for a single transmission?
Net
In which Link 16 security mode are discrete Crypto Variable Logic Labels (CVLLs) assigned to both TSEC and MSEC?
Partition Variable Mode (PVM)
What numbers are used by a network designer as Crypto Variable Logic Labels (CVLLs)?
Partition Variable Mode (PVM)
Which of the following IS NOT directed in CJCSI 6232.01 Link 16 Spectrum Deconfliction?
Provides information about timeslot allocation
What technique is used by Link 16 terminals to correct errors and erasures in a message in order to pass uncorrupted data to the host system?
Reed Solomon Error Detection and Correction (EDAC) coding
Which JTIDS/MIDS access technique requires the assignment of a net number of 1 - 126 in the OPTASK LINK but is identified as the specific access mode in the Network Description Document (NDD) as net 127?
Stacked Nets
What is the purpose of a Link 16 terminal's Secure Data Unit (SDU)?
Stores cryptovariables for message and transmission security
What JTIDS/MIDS protocol dictates that platforms take turns transmitting and receiving data according to time?
Time Division Multiple Access (TDMA)
What measurement is used to express the pulse density of all Link 16 transmissions in a 12 second frame?
Time Slot Duty Factor (TSDF)
Which JTIDS/MIDS access mode is designed for all Network Participation Groups (NPGs) but is currently used only for NPG 7 Surveillance?
Timeslot Reallocation (TSR)
The ____________ pseudo-randomly assigns a center frequency to each pulse.
Transmission Security (TSEC) crypto variable
Which type of relay allows messages received on one net number to be relayed to another net number?
Zoom Relay