3.
During the planning phase of a tactical operation, what are the most important
A.
Speed and format.
B.
Speed and security.
C.
D.
4.
Physical security must be enforced before a message is transmitted and after it is received
at a distant station. Which of the following is an example of physical security of a document or
message?
A.
Classify it.
B.
Restricted access.
C.
Log it in the security file.
D.
Record the courier's name.
5.
What is any measure established by a command to protect its telecommunications from
traffic analysis?
A.
Physical security.
B.
Emission security.
C.
Electronic security.
D.
Transmission security.
6.
Which of the following is a reason for the introduction of dummy traffic in
A.
Providing emission security.
B.
Disrupting a traffic analysis.
C.
Diminishing message interceptions.
D.
Identifying unauthorized stations.
SS0652
2-16