3-43.3-44.3-45.What are the primaryadvantages of (a)over-the-air rekey (OTAR)and (b) over-the-airtransfer (OTAT)?1.2.3.4.(a) Requires lesscircuit downtime forloading keylists, and(b) no operator trainingrequired(a) Reduces distributionof physical keyingmaterial, and (b)eliminates process ofloading equipment withkey tapes(a) Reduces distributionof physical keyingmaterial, and (b) nooperator trainingrequired(a) Eliminates processof loading equipmentwith key tapes, and (b)no operator trainingrequiredWhat is the purpose oftransmission authentication?1.2.3.4.TheTo guard againstfraudulent or simulatedtransmissionsTo inform the otheroperator that you arereceiving thetransmissionTo acknowledge thetransmission of theother operatorTo allow the otheroperator to acknowledgeyour transmissionself-authenticationmethod is used in which ofthe following transmissions?1.Transmission and reply2.Challenge and reply3.Transmissionauthentication4.Challenge authentication3-46.When you receive a messagethat has an authenticator init, what action, if any, areyou required to take?1.Prepare a message tochallenge the originator2.Send a message that youare in receipt of themessage3.Pass the message on tohigher authority forthem to challenge theoriginator4.None3-47.As an operator, you arerequired to authenticate inwhich of the followingsituations?1.You suspect intrusion onthe circuit2.You are requested toauthenticate3.You are requested tobreak radio silence4.Each of the aboveA.MeaconingB.InterferenceC.JammingD.IntrusionFigure 3DIN ANSWERING QUESTIONS 3-48 THROUGH3-51, SELECT THE TERM FROM FIGURE3D THAT IS DEFINED.3-48.The interception andrebroadcast of navigationalsignals on the samefrequency.1. A2. B3. C4. D26
Integrated Publishing, Inc. - A (SDVOSB) Service Disabled Veteran Owned Small Business