2-25. The test element in the authentication table is the challenge and consists of
_______________ letters.
The challenge is also called the _______________
_______________.
(2-25. Answer: two, test element)
2-26. The reply to a challenge normally consists of _______________ letter(s), which is called
the _______________.
(2-26. Answer: one, authenticator)
2-27. Even incorrectly authenticated transmissions can be genuine. Such messages should be
delivered without delay, but must be marked "NOT AUTHENTICATED." The addressee then
decides their authenticity.
If a radio operator receives a message from a station that gives an incorrect authenticator
when challenged, he should--
_________a.
Disregard the message.
_________b.
Copy the message and send it to the addressee as is.
_________c.
Copy the message and send it to the addressee marked "NOT
AUTHENTICATED."
(2-27. Answer: c. Copy the message and send it to the addressee marked "NOT
AUTHENTICATED.")
2-28. Authentication is mandatory when any station suspects imitative communications
deception on any circuit. Without security, even the most efficient communications system is
worthless. Demand _______________ whenever you suspect imitative communications
deception on any circuit.
(2-28. Answer: authentication)
SS0652
2-10