Professional Documents
Culture Documents
El Warf
El Warf
1
ELECTRONIC WARFARE
8. Which radio wave range will be usable in case of application of nuclear weapons?
a. VHF/UHF
b. HF
c. Microwaves
2
ELECTRONIC WARFARE
14. What was the main task of EF-111 and RF-4G airplanes?
a. Escort, bomber airplanes.
b. Escort, covering fighter airplanes.
c. Escort, reconnaissance airplanes.
d. Escort, electronic warfare airplanes.
17. Which threats need to count against military systems? (Radio navigation)
a. Dipole jamming
b. Electronic jamming
c. Location finding
d. Deceptive messages, signals
e. Interception
f. Guided missile strike
3
ELECTRONIC WARFARE
22. Which technical solution can reduce jamming effects for friendly troops?
a. Use of dipole dispenser.
b. Use of unattended jammers.
c. Use of omnidirectional antennas.
4
ELECTRONIC WARFARE
27. Put the right words into the appropriate space of the definition!
_____ waves are electric (E) and magnetic (M) fields propagating in a dielectric
material, changing in time, in interaction with one another.
a. constant
b. changing
c. acoustic
d. radio
e. electromagnetic
f. magnetic
g. hydro acoustic
28. What types of guidance are usable in the homing guidance missile?
a. Passive
b. Semi-passive
c. Remote guidance
5
ELECTRONIC WARFARE
32. Choose the appropriate equation among the relations of frequency, wavelength, and
the distance!
a. b. c.
33. Match the subdivisions of ECM to the appropriate methods and assets!
Corner reflector Infrared guided missile Simulation
Electronic jamming ->
Electronic deception ->
Electronic neutralisation -
>
34. Support EW aircraft may apply Stand-off Jamming (SOJ), or Stand-in Jamming
(SIJ) procedures.
Adevărat
Fals
6
ELECTRONIC WARFARE
7
ELECTRONIC WARFARE
g. locate
COMINT =
IMINT =
OSINT =
ELINT =
ACINT =
43. How the unattended jammers can be set up to the deep of enemy?
a. We can overshoot with cannons.
b. We can transport them by trucks.
c. We can throw down from aircraft container.
46. Which threats need to count against military systems? (UHF communication)
a. Dipole jamming
b. Guided missile strike
c. Electronic jamming
d. Interception
e. Deceptive messages, signals
f. Location finding
8
ELECTRONIC WARFARE
9
ELECTRONIC WARFARE
52. Determine those activity that is conducted parallel with the targeting process!
a. Mission analysis
b. EW mission analysis
c. EW estimate
d. COA approval
53. How many radio direction finders are necessary at least in a direction finding
baseline to define exact location?
a. three
b. four or more
c. two
Navigation =
Radio =
Radar =
IFF =
10
ELECTRONIC WARFARE
58. Support EW aircraft may apply only Stand-off Jamming (SOJ) procedures.
Adevărat
Fals
59. Airborne self-defense EW systems may apply Stand-off Jamming (SOJ), or Stand-
in Jamming (SIJ) procedures.
Adevărat
Fals
They are friendly frequencies used for a particular operation. These frequencies are of such
critical importance that jamming should be restricted unless absolutely necessary or until
coordination with the using unit is made.
->
They are adversary frequencies that are currently being exploited for combat information and
intelligence. These frequencies may be jammed after the commander has weighed the
potential operational gain against the loss of the technical information.
->
They are friendly frequencies of such importance that they must never be deliberately
jammed or interfered with by friendly forces.
->
11
ELECTRONIC WARFARE
64. Are the radar signals necessary to be received for response pulse jamming?
a. Yes, because it is needed for determination of jamming direction.
b. No, we can jam radars without received signals.
c. Yes, because it is needed for determination technical parameters of response signals.
65. Which effect has been caused during the dipole scattering?
a. Active response pulse jamming.
b. Passive noise jamming.
c. Passive response pulse jamming.
d. Active noise jamming.
68. Airborne self-defense EW systems may apply only Stand-in Jamming (SIJ)
procedures.
Adevărat
12
ELECTRONIC WARFARE
Fals
71. What tasks are not part of the Computer network operations?
a. Mapping the structure of computer networks
b. Obstruct the electron flow in networks
c. Destruction of the operators
d. Changing or destruction of the program and data contents of targeted objects
e. Detection of the emanations of monitors
f. Registration of dataflow within a network
72. Which threats need to count against military systems? (SIGINT station)
a. Dipole jamming
b. Deceptive messages, signals
c. Electronic jamming
d. Interception
e. Guided missile strike
f. Location finding
73. What types of jamming devices are able to eliminate the shielding effect of the
terrain?
a. Unattended ground sensors - UGS
b. Jammer pod hanged on unmanned aerial vehicle - UAV)
c. Expendable jammer
d. Jamming station deployed in the friendly area
13