4.
Prosigns are normally used with which of the following?
A.
B.
C.
Radiotelegraph
D.
5.
Which of the following is not an example of proper radio operator
procedure?
A.
Encrypt all EEFI
B.
Operate on fixed schedules
C.
Reduce distinguishable operator procedures
D.
Use authentication
6.
Which type of modulated jamming involves broadcasting synchronization
tones over the operating frequency of a radio net that uses voice security
devices?
A.
B.
Random pulse
C.
Recorded sounds
D.
Stepped tones
2-17
SS0135