Uploaded by Yeet

I2ACOP Study Guide

advertisement
FINAL QUIZ REVIEW
IMPORTANT NOTE:
QUESTION 83’S CORRECT ANSWER ON THIS FINAL EXAM
KAHOOT IS “FALSE,” BUT IN QUIZ 6 THIS QUESTION ON KAHOOT
WAS MARKED AS “TRUE.”
WE HAVE LET THE INSTRUCTORS KNOW ABOUT THIS
CONFLICTING GUIDANCE AND WE WILL MAKE AN INQUIRY ABOUT
IT BEFORE THE EXAM BEGINS
Happy Studying!
1. What are the 5 Operational Domains?
Air, Maritime, Space, Cyberspace, Multi-Domain
Air, Land, Maritime, Space, Cyberspace
Air, Land, Space, Cyberspace, Cognitive
Air, Land, Maritime, Space, Electromagnetic Spectrum
2. The Space Domain is the area above the altitude where atmospheric
effects are negligible.
True
False
3. What are the 3 layers of Cyberspace?
Physical Network Layer, Logical Network Layer, Cyber-persona Layer
Logical Network Layer, Datalink Layer, Cyber-persona Layer
Physical Network Layer, Transport Layer, Cyber-persona Layer
Logical Network Layer, Application Layer, Physical Network Layer
4. Cyberspace is not dependent on the physical domains of air, land,
maritime, and space.
True
False
5. The Multi-Domain Effect Battalion provides _____, _____, _____ target
acquisition and products.
SIGINT, GEOINT, OSINT
IMINT, SIGINT, HUMINT
OSINT, HUMINT, MASINT
GEOINT, MASINT, SIGINT
6. The _____ of 1986 made the CJCS the sole military advisor to the
POTUS and NSC.
National Security Act
Townshend Act
Goldwater-Nichols Act
Patriot Act
7. The SECDEF _____, _____, and _____ forces to Combatant
Commanders.
assigns, allocates, apportions
allocates, trains, equips
assigns, distributes, equips
trains, mans, equips
8. _____ operations are military actions conducted by joint forces and
service forces is specified command relationships.
Joint
Information
Cyber
Space
9. What are the 3 aspects of the information environment?
Physical, Informational, Cyber
Physical, Session, Application
Physical, Informational, Human
Physical, Logical, Cyber-Persona
10. The ____ aspects reflect the way that individuals, information
systems, and groups communicate and exchange information.
Physical
Human
Informational
Logical
11. The ____ aspects are the interactions between people and the
environment that shapes human behavior and decision making.
Physical
Informational
Joint Operation
Human
12. OIE are conducted in support of JFC’s operation/campaign objective or
in support of other components of the joint force.
True
False
13. ___ is a maneuver space essential for facilitating control within the
Operational Environment (OE).
The Land Domain
The Electromagnetic Spectrum
Cyberspace
Space
14. The EMOE is a maneuver space, and battlespace where competition
and warfare are conducted.
True
False
15. What are the 3 factors of EMOE complexity?
controlled, contained, constrained
contested, congested, restrained
contested, degraded, disrupted
contested, congested, constrained
16. Jamming is a defensive and offensive electronic attack activity.
True
False
17. EW personnel employ sensors to detect, intercept, identify, and locate
enemy electromagnetic signatures is a _____ task.
EM Intrusion
Electromagnetic Reconnaissance
Threat Warning
Direction Finding
18. Space operations are those operations impacting and utilizing only
space-based capabilities.
True
False
19. ____ is the current, predictive knowledge, and characterization of
space objects and the OE.
Space Information Environment
Intelligence, Surveillance, Reconnaissance
Space Control
Space Situational Awareness
20. The 3 subcategories of Space Control are:
Satellite Communication, ISR, Defensive Space Control
Space Awareness, Offensive Space Control, PNT
Offensive Space Control, Defensive Space Control, ISR
Offensive Space Control, Defensive Space Control, Navigation Warfare
21. Cyberspace Operations are only comprised of military operations of
the DOD.
True
False
22. Combatant Commanders use _____ to create effects in support of
military objectives.
DODIN Operations
Offensive Cyberspace Operations
Defensive Cyberspace Operations
Cyberspace Operations
23. Cyberspace Operations use _____, _____, and _____ functions to create
effects in cyberspace and the physical domain.
physical, informational, cognitive
links, nodes, logical
offensive, defensive, DODIN
military, EMS, space
24. _____ are defensive measures or activities taken outside of defended
networks to protect DOD cyberspace.
Cyberspace Exploitation
DCO-RA
DCO-IDM
ISR in Cyberspace
25. Degrade is a function of _____.
Deny
OCO
Amount
Time
26. There is no stateless maneuver space in cyberspace.
True
False
27. ____ actions include intelligence, maneuver, and information
collection to prepare for future military operations.
Cyberspace Attack
Cyberspace Security
Cyberspace Exploitation
Cyberspace Defense
28. The goal of DCO is to defeat the threat of a _____ and/or return a
compromised network to a secure and functional state.
specific adversary
Nation State
Non-State Adversary
cyber attack
29. Disrupt is a function of _____.
OCO
Time
Amount
Deny
30. The _____ is the base for Mission Command, enables warfighting
functions, and is foundational to Cyberspace Operations.
Cyber Command
DISN
DODIN
DISA
31. DODIN Operations secure, _____, operate, _____, maintain, and
sustain DOD cyberspace.
replace, monitor
configure, extend
defend, replicate
analyze, respond
32. Cyberspace Defense is _____: include response to specific threats,
exploitation, or malicious cyberspace activity.
internal
proactive
external
reactive
33. ROE does not provide implementation guidance on the inherent right
and obligation of self-defense.
True
False
34. Which title has the key focus is National Defense?
Title 32
Title 10
Title 6
Title 50
35. The _____ conducts CO to defeat significant cyberspace threats to the
DODIN and the nation.
Cyber National Mission Force
Cyber Protection Force
Cyber Mission Force
Cyber Combat Mission Force
36. Cyber Combat Mission Forces consists of _____ and _____.
CMTs, CSTs
CPTs, NMTs
NSTs, NMTs
NPTs, CMTs
37. CMTs and CSTs are OPCON to _____.
CNMF
JFHQ-Cyber
DISA
JFHQ-DODIN
38. JFHQ-Cyber does not manage CMF intelligence requirements,
collection, processing, and dissemination.
True
False
39. JFHQ-Cyber exercises _____ of all assigned CMTs, CSTs, and CPTs.
ADCON
INSCOM
OPCON
TACON
40. The ___ conducts cyber operations to support the missions, plans, and
priorities of the geographic and functional CCDRs.
Cyber Combat Mission Force
Cyber National Mission Force
Cyber Protection Force
Cyber Mission Combat Force
41. The 3 subcategories of SIGINT are _____.
TECHINT, COMINT, ELINT
COMINT, ELINT, FISINT
COMINT, ELINT, MASINT
ELINT, FISNT, MASINT
42. ___ involves the collecting and processing foreign communications
passed by radio, wire, or other electromagnetic means.
COMINT
FISINT
OSINT
ELINT
43. _____ plans organize the day-to-day operations of the Joint Force to
shape the OE and achieve national objectives.
Global
Campaign
Crisis
Regional
44. A _____ describes the CONOPs, major forces, concepts of support, and
estimated timelines.
Commander’s Estimate
Concept Plan
Operations Plan
base plan or CONOP
45. A target is an _____ or _____ that performs a function for the
adversary considered for possible engagement or action.
country, person
person, vehicle
building, vehicle
entity, object
46. A high payoff target is one whose loss to the enemy will significantly
contribute to the success of friendly COA.
True
False
47. A high value target is one the enemy commander requires for the
successful completion of his/her mission.
True
False
48. What is phase 3 of the Joint Targeting Cycle?
Mission Planning and Force Execution
Capabilities Analysis
Combat Assessment
Target Development and Prioritization
49. Combat assessment relies on MOPs and MOEs for measurement.
True
False
50. The _____ process analyzes relevant aspects of the OE.
Planning
Operational Art
Operational Design
JIPOE
51. The OE is the composite of ___, ___, and ___ that affect the
employment of capabilities and decisions of the commander.
conditions, targets, influences
circumstances, plans, influences
conditions, circumstances, influences
plans, targets, conditions
52. Insufficient targeting guidance could result in a decrease in JFC
confidence in the JTC.
True
False
53. What is step 2 of targeting guidance development?
Identify key Target System(s)
Review JFC Guidance and Intent
Write Assessments of MOPs and MOEs
Write Effects Statement
54. ID of COGs, LOOs, decision points, and desired/undesired effects
are part of ___ step in Targeting Guidance Development?
Step 4
Step 5
Step 3
Step 6
55. JIPOE is a _____ and _____ process conducted before and during
operations, and in preparation of follow-on missions.
deliberate, informed
continuous, cyclical
continuous, deliberate
cyclical, predictive
56. JIPOE is the analytical process used to produce intelligence _____,
_____, and other intelligence _____.
assessments, estimates, products
reports, plans, products
assessments, reports, plans
estimates, products, collection
57. Mission analysis is used to study the assigned _____ and to _____ all
other tasks necessary to accomplish the mission.
objective and approve
tasks and recommend
tasks and identify
mission and assign
58. Valid assumptions have three characteristics: _______, _______, and
_______ for planning to continue.
logical, realistic, essential
feasible, realistic, essential
feasible, intelligent, realistic
logical, realistic, concise
59. If the assumption is not necessary, its only effect is to introduce _____
and _____ in the commander’s perspective.
objectives, requirements
facts, information
options, facts
error, bias
60. An RFI can’t be used to turn an assumption into a fact.
True
False
61. A _____ is a requirement placed on the command by a higher
command that dictates an action (“must do”).
restraint
MOE
constraint
RFI
62. The _____ describes the mission in terms of the elements of who,
what, when, where, and why.
CONOP
OE
mission statement
problem statement
63. _____ tasks are additional tasks the commander must accomplish,
typically to accomplish the specified tasks.
Implied
Critical
Essential
Specified
64. A _____ is a requirement placed on the command by a higher
command that prohibits an action (“cannot do”).
Constraint
MOE
restraint
RFI
65. What is phase 2 of the Joint Targeting Cycle?
Mission Planning and Force Execution
Combat Assessment
Capability Analysis
Target Development and Prioritization
66) The goal of phase 2 of the JTC is to _____ and _____ potential targets.
identify, characterize
characterize, assess
locate, identify
assess, locate
67) Target development is analysis, assessment, and documentation process to
identify and characterize potential targets.
Answer streak 9
+ 874
Next
True
False
68) Target _____ is an optional process initiated by the JFC and support by the
intelligence community.
processing
validation
analysis
vetting
69) Target _____ ensures all candidate targets meet the objectives and criteria
outlined in the commander’s guidance.
validation
vetting
processing
analysis
70) A COA is a potential way (_____, _____) to accomplish the assigned mission.
ends, solution
solution, method
means, method
method, ends
71) The first decision in COA development is whether to conduct simultaneous or
sequential development of the COAs.
True
False
72) COAs should focus on _____ and _____.
MOPs, MOEs
COGs, LOEs
COGs, decisive points
intelligence, objectives
73)COA validity criteria are _____, _____, _____, _____, and _____.
acceptable, sustainable, complete, risk, surprise
feasible, acceptable, sustainable, complete, risk
suitable, feasible, acceptable, distinguishable, complete
suitable, feasible, acceptable, sustainable, complete
74) Offensive cyberspace operations are intended to project _____ in and through
grey and red cyberspace.
security
effects
power
personas
75) Key Terrain in Cyberspace is analogous to physical key terrain in that holding
it affords a combatant an advantage.
True
False
76) The 5 enablers for conducting OCO are _____, _____, _____, _____, and _____.
authority, access, capability, time, intelligence
access, personnel, time, intelligence, space
authority, access, cyberspace, time, intelligence
IE, IO, computers, access, intelligence
77) OCO missions leverage adversary and enemy reliance on information,
information technology, and data.
True
False
78) The purpose of DCO is to halt adversary offensive initiative, and sustain or
regain friendly initiative.
True
False
79) _____ is a DCO mission where actions are taken external to the defended
network.
Entrenchment
Defense of Non-DOD Cyberspace
DCO-IDM
DCO-RA
80) DCO Operations are _____ and _____.
threat specific and reactive
threat specific and network agnostic
network specific and threat agnostic
network specific and proactive
81) What products do CPTs provide to local defenders?
Adversary COAs, Risk Mitigation Plan, and Mission Defense Plan
Intelligence Products, Risk Mitigation Plan, and Mission Defense Plan
Network maps, Risk Mitigation Plan, and Offensive Cyber Plans
Network maps, Risk Mitigation Plan, and Mission Defense Plan
82)
What is step 1 of capabilities analysis?
Effects Estimate
Capabilities Analysis
Target Vulnerability Analysis
Feasibility Assessment
83) The goal of Target Vulnerability Assessment is to build an exhaustive list of
target components.
True
False
84) What is the process of determining the quantity of a type of lethal or nonlethal means required to create an effect?
Vetting
Assignment
Weaponeering
Validation
85) COA analysis is the process of closely examining potential friendly COAs and
identifying the _____ and _____ of each.
disadvantages and validity
advantages and disadvantages
validity and advantages
center of gravity and advantages
86) A key output of JPP Step 4 is _____.
Refined COAs
Objectives
Key Tasks
Timeline
87) COA _____ identifies which COA best accomplishes the mission while best
positioning the force for future operations.
Comparison
Refinement
Wargaming
Analysis
88) During which step of the JPP the staff briefs the commander on the COA
comparison and the analysis/wargaming results?
STEP 6 COA Approval
STEP 5 COA Comparison
STEP 4 COA Analysis and Wargaming
STEP 3 COA DEV
89) The commander’s estimate provides a concise narrative statement of how the
commander intends to accomplish the mission.
True
False
90) COA _____ is the end result of the COA comparison process.
Wargaming
Analysis
Selection
Validity
91) What is phase 4 of the Joint Targeting Cycle?
Capabilities Analysis
Target Development and Prioritization
Mission Planning and Force Execution
Commander’s Decision and Force Assignment
92) The 5 steps of JTC phase 4 are consolidate, assemble, assign, _____, and issue.
develop
present
plan
collect
93) The CONOPS ____ and ____ expresses what the JFC intends to accomplish
and how it will be done using available resources.
continually, concisely
generally, verbally
clearly, concisely
orderly, clearly
94) The Situation paragraph describes the ____, ____, and ____ of the theater
strategic situation that the plan addresses.
circumstances, laws, conditions
conditions, circumstances, influences
conditions, circumstances, enemy
allies, enemy, conditions
95) What is Phase 5 of the JTC?
Mission Planning and Force Execution
Target Development and Prioritization
Combat assessment
Capability Analysis
96) JTC Phase 5 begins after the JFC approves force execution of the _____,
developed during force assignment.
COA
Joint Task Force
OPORD
Targeting Plan
97) Dynamic targeting is executed using the dynamic process of find, fix, _____,
target, engage, and _____.
assess, finish
finish, locate
evaluate, finish
track, assess
98) JTC phase 6 is a ____ process that assesses the effectiveness of the activities
during the first five phases of the JTC.
essential
synchronized
deliberate
continuous
99) BDA is the estimate of damage composed of ____ and ____ damage
assessments, as well as a target system assessment.
Answer streak 16
+ 918
Next
lethal, non-lethal
object, entity
physical, functional
physical, cyber
100) Collateral Damage Assessment evaluates damage usually located outside of
the target boundary.
True
False
Download