2-25. The test element in the authentication table is the challenge and consists of
The challenge is also called the _______________
(2-25. Answer: two, test element)
2-26. The reply to a challenge normally consists of _______________ letter(s), which is called
(2-26. Answer: one, authenticator)
2-27. Even incorrectly authenticated transmissions can be genuine. Such messages should be
delivered without delay, but must be marked "NOT AUTHENTICATED." The addressee then
decides their authenticity.
If a radio operator receives a message from a station that gives an incorrect authenticator
when challenged, he should--
Disregard the message.
Copy the message and send it to the addressee as is.
Copy the message and send it to the addressee marked "NOT
(2-27. Answer: c. Copy the message and send it to the addressee marked "NOT
2-28. Authentication is mandatory when any station suspects imitative communications
deception on any circuit. Without security, even the most efficient communications system is
worthless. Demand _______________ whenever you suspect imitative communications
deception on any circuit.
(2-28. Answer: authentication)