FINAL QUIZ REVIEW IMPORTANT NOTE: QUESTION 83’S CORRECT ANSWER ON THIS FINAL EXAM KAHOOT IS “FALSE,” BUT IN QUIZ 6 THIS QUESTION ON KAHOOT WAS MARKED AS “TRUE.” WE HAVE LET THE INSTRUCTORS KNOW ABOUT THIS CONFLICTING GUIDANCE AND WE WILL MAKE AN INQUIRY ABOUT IT BEFORE THE EXAM BEGINS Happy Studying! 1. What are the 5 Operational Domains? Air, Maritime, Space, Cyberspace, Multi-Domain Air, Land, Maritime, Space, Cyberspace Air, Land, Space, Cyberspace, Cognitive Air, Land, Maritime, Space, Electromagnetic Spectrum 2. The Space Domain is the area above the altitude where atmospheric effects are negligible. True False 3. What are the 3 layers of Cyberspace? Physical Network Layer, Logical Network Layer, Cyber-persona Layer Logical Network Layer, Datalink Layer, Cyber-persona Layer Physical Network Layer, Transport Layer, Cyber-persona Layer Logical Network Layer, Application Layer, Physical Network Layer 4. Cyberspace is not dependent on the physical domains of air, land, maritime, and space. True False 5. The Multi-Domain Effect Battalion provides _____, _____, _____ target acquisition and products. SIGINT, GEOINT, OSINT IMINT, SIGINT, HUMINT OSINT, HUMINT, MASINT GEOINT, MASINT, SIGINT 6. The _____ of 1986 made the CJCS the sole military advisor to the POTUS and NSC. National Security Act Townshend Act Goldwater-Nichols Act Patriot Act 7. The SECDEF _____, _____, and _____ forces to Combatant Commanders. assigns, allocates, apportions allocates, trains, equips assigns, distributes, equips trains, mans, equips 8. _____ operations are military actions conducted by joint forces and service forces is specified command relationships. Joint Information Cyber Space 9. What are the 3 aspects of the information environment? Physical, Informational, Cyber Physical, Session, Application Physical, Informational, Human Physical, Logical, Cyber-Persona 10. The ____ aspects reflect the way that individuals, information systems, and groups communicate and exchange information. Physical Human Informational Logical 11. The ____ aspects are the interactions between people and the environment that shapes human behavior and decision making. Physical Informational Joint Operation Human 12. OIE are conducted in support of JFC’s operation/campaign objective or in support of other components of the joint force. True False 13. ___ is a maneuver space essential for facilitating control within the Operational Environment (OE). The Land Domain The Electromagnetic Spectrum Cyberspace Space 14. The EMOE is a maneuver space, and battlespace where competition and warfare are conducted. True False 15. What are the 3 factors of EMOE complexity? controlled, contained, constrained contested, congested, restrained contested, degraded, disrupted contested, congested, constrained 16. Jamming is a defensive and offensive electronic attack activity. True False 17. EW personnel employ sensors to detect, intercept, identify, and locate enemy electromagnetic signatures is a _____ task. EM Intrusion Electromagnetic Reconnaissance Threat Warning Direction Finding 18. Space operations are those operations impacting and utilizing only space-based capabilities. True False 19. ____ is the current, predictive knowledge, and characterization of space objects and the OE. Space Information Environment Intelligence, Surveillance, Reconnaissance Space Control Space Situational Awareness 20. The 3 subcategories of Space Control are: Satellite Communication, ISR, Defensive Space Control Space Awareness, Offensive Space Control, PNT Offensive Space Control, Defensive Space Control, ISR Offensive Space Control, Defensive Space Control, Navigation Warfare 21. Cyberspace Operations are only comprised of military operations of the DOD. True False 22. Combatant Commanders use _____ to create effects in support of military objectives. DODIN Operations Offensive Cyberspace Operations Defensive Cyberspace Operations Cyberspace Operations 23. Cyberspace Operations use _____, _____, and _____ functions to create effects in cyberspace and the physical domain. physical, informational, cognitive links, nodes, logical offensive, defensive, DODIN military, EMS, space 24. _____ are defensive measures or activities taken outside of defended networks to protect DOD cyberspace. Cyberspace Exploitation DCO-RA DCO-IDM ISR in Cyberspace 25. Degrade is a function of _____. Deny OCO Amount Time 26. There is no stateless maneuver space in cyberspace. True False 27. ____ actions include intelligence, maneuver, and information collection to prepare for future military operations. Cyberspace Attack Cyberspace Security Cyberspace Exploitation Cyberspace Defense 28. The goal of DCO is to defeat the threat of a _____ and/or return a compromised network to a secure and functional state. specific adversary Nation State Non-State Adversary cyber attack 29. Disrupt is a function of _____. OCO Time Amount Deny 30. The _____ is the base for Mission Command, enables warfighting functions, and is foundational to Cyberspace Operations. Cyber Command DISN DODIN DISA 31. DODIN Operations secure, _____, operate, _____, maintain, and sustain DOD cyberspace. replace, monitor configure, extend defend, replicate analyze, respond 32. Cyberspace Defense is _____: include response to specific threats, exploitation, or malicious cyberspace activity. internal proactive external reactive 33. ROE does not provide implementation guidance on the inherent right and obligation of self-defense. True False 34. Which title has the key focus is National Defense? Title 32 Title 10 Title 6 Title 50 35. The _____ conducts CO to defeat significant cyberspace threats to the DODIN and the nation. Cyber National Mission Force Cyber Protection Force Cyber Mission Force Cyber Combat Mission Force 36. Cyber Combat Mission Forces consists of _____ and _____. CMTs, CSTs CPTs, NMTs NSTs, NMTs NPTs, CMTs 37. CMTs and CSTs are OPCON to _____. CNMF JFHQ-Cyber DISA JFHQ-DODIN 38. JFHQ-Cyber does not manage CMF intelligence requirements, collection, processing, and dissemination. True False 39. JFHQ-Cyber exercises _____ of all assigned CMTs, CSTs, and CPTs. ADCON INSCOM OPCON TACON 40. The ___ conducts cyber operations to support the missions, plans, and priorities of the geographic and functional CCDRs. Cyber Combat Mission Force Cyber National Mission Force Cyber Protection Force Cyber Mission Combat Force 41. The 3 subcategories of SIGINT are _____. TECHINT, COMINT, ELINT COMINT, ELINT, FISINT COMINT, ELINT, MASINT ELINT, FISNT, MASINT 42. ___ involves the collecting and processing foreign communications passed by radio, wire, or other electromagnetic means. COMINT FISINT OSINT ELINT 43. _____ plans organize the day-to-day operations of the Joint Force to shape the OE and achieve national objectives. Global Campaign Crisis Regional 44. A _____ describes the CONOPs, major forces, concepts of support, and estimated timelines. Commander’s Estimate Concept Plan Operations Plan base plan or CONOP 45. A target is an _____ or _____ that performs a function for the adversary considered for possible engagement or action. country, person person, vehicle building, vehicle entity, object 46. A high payoff target is one whose loss to the enemy will significantly contribute to the success of friendly COA. True False 47. A high value target is one the enemy commander requires for the successful completion of his/her mission. True False 48. What is phase 3 of the Joint Targeting Cycle? Mission Planning and Force Execution Capabilities Analysis Combat Assessment Target Development and Prioritization 49. Combat assessment relies on MOPs and MOEs for measurement. True False 50. The _____ process analyzes relevant aspects of the OE. Planning Operational Art Operational Design JIPOE 51. The OE is the composite of ___, ___, and ___ that affect the employment of capabilities and decisions of the commander. conditions, targets, influences circumstances, plans, influences conditions, circumstances, influences plans, targets, conditions 52. Insufficient targeting guidance could result in a decrease in JFC confidence in the JTC. True False 53. What is step 2 of targeting guidance development? Identify key Target System(s) Review JFC Guidance and Intent Write Assessments of MOPs and MOEs Write Effects Statement 54. ID of COGs, LOOs, decision points, and desired/undesired effects are part of ___ step in Targeting Guidance Development? Step 4 Step 5 Step 3 Step 6 55. JIPOE is a _____ and _____ process conducted before and during operations, and in preparation of follow-on missions. deliberate, informed continuous, cyclical continuous, deliberate cyclical, predictive 56. JIPOE is the analytical process used to produce intelligence _____, _____, and other intelligence _____. assessments, estimates, products reports, plans, products assessments, reports, plans estimates, products, collection 57. Mission analysis is used to study the assigned _____ and to _____ all other tasks necessary to accomplish the mission. objective and approve tasks and recommend tasks and identify mission and assign 58. Valid assumptions have three characteristics: _______, _______, and _______ for planning to continue. logical, realistic, essential feasible, realistic, essential feasible, intelligent, realistic logical, realistic, concise 59. If the assumption is not necessary, its only effect is to introduce _____ and _____ in the commander’s perspective. objectives, requirements facts, information options, facts error, bias 60. An RFI can’t be used to turn an assumption into a fact. True False 61. A _____ is a requirement placed on the command by a higher command that dictates an action (“must do”). restraint MOE constraint RFI 62. The _____ describes the mission in terms of the elements of who, what, when, where, and why. CONOP OE mission statement problem statement 63. _____ tasks are additional tasks the commander must accomplish, typically to accomplish the specified tasks. Implied Critical Essential Specified 64. A _____ is a requirement placed on the command by a higher command that prohibits an action (“cannot do”). Constraint MOE restraint RFI 65. What is phase 2 of the Joint Targeting Cycle? Mission Planning and Force Execution Combat Assessment Capability Analysis Target Development and Prioritization 66) The goal of phase 2 of the JTC is to _____ and _____ potential targets. identify, characterize characterize, assess locate, identify assess, locate 67) Target development is analysis, assessment, and documentation process to identify and characterize potential targets. Answer streak 9 + 874 Next True False 68) Target _____ is an optional process initiated by the JFC and support by the intelligence community. processing validation analysis vetting 69) Target _____ ensures all candidate targets meet the objectives and criteria outlined in the commander’s guidance. validation vetting processing analysis 70) A COA is a potential way (_____, _____) to accomplish the assigned mission. ends, solution solution, method means, method method, ends 71) The first decision in COA development is whether to conduct simultaneous or sequential development of the COAs. True False 72) COAs should focus on _____ and _____. MOPs, MOEs COGs, LOEs COGs, decisive points intelligence, objectives 73)COA validity criteria are _____, _____, _____, _____, and _____. acceptable, sustainable, complete, risk, surprise feasible, acceptable, sustainable, complete, risk suitable, feasible, acceptable, distinguishable, complete suitable, feasible, acceptable, sustainable, complete 74) Offensive cyberspace operations are intended to project _____ in and through grey and red cyberspace. security effects power personas 75) Key Terrain in Cyberspace is analogous to physical key terrain in that holding it affords a combatant an advantage. True False 76) The 5 enablers for conducting OCO are _____, _____, _____, _____, and _____. authority, access, capability, time, intelligence access, personnel, time, intelligence, space authority, access, cyberspace, time, intelligence IE, IO, computers, access, intelligence 77) OCO missions leverage adversary and enemy reliance on information, information technology, and data. True False 78) The purpose of DCO is to halt adversary offensive initiative, and sustain or regain friendly initiative. True False 79) _____ is a DCO mission where actions are taken external to the defended network. Entrenchment Defense of Non-DOD Cyberspace DCO-IDM DCO-RA 80) DCO Operations are _____ and _____. threat specific and reactive threat specific and network agnostic network specific and threat agnostic network specific and proactive 81) What products do CPTs provide to local defenders? Adversary COAs, Risk Mitigation Plan, and Mission Defense Plan Intelligence Products, Risk Mitigation Plan, and Mission Defense Plan Network maps, Risk Mitigation Plan, and Offensive Cyber Plans Network maps, Risk Mitigation Plan, and Mission Defense Plan 82) What is step 1 of capabilities analysis? Effects Estimate Capabilities Analysis Target Vulnerability Analysis Feasibility Assessment 83) The goal of Target Vulnerability Assessment is to build an exhaustive list of target components. True False 84) What is the process of determining the quantity of a type of lethal or nonlethal means required to create an effect? Vetting Assignment Weaponeering Validation 85) COA analysis is the process of closely examining potential friendly COAs and identifying the _____ and _____ of each. disadvantages and validity advantages and disadvantages validity and advantages center of gravity and advantages 86) A key output of JPP Step 4 is _____. Refined COAs Objectives Key Tasks Timeline 87) COA _____ identifies which COA best accomplishes the mission while best positioning the force for future operations. Comparison Refinement Wargaming Analysis 88) During which step of the JPP the staff briefs the commander on the COA comparison and the analysis/wargaming results? STEP 6 COA Approval STEP 5 COA Comparison STEP 4 COA Analysis and Wargaming STEP 3 COA DEV 89) The commander’s estimate provides a concise narrative statement of how the commander intends to accomplish the mission. True False 90) COA _____ is the end result of the COA comparison process. Wargaming Analysis Selection Validity 91) What is phase 4 of the Joint Targeting Cycle? Capabilities Analysis Target Development and Prioritization Mission Planning and Force Execution Commander’s Decision and Force Assignment 92) The 5 steps of JTC phase 4 are consolidate, assemble, assign, _____, and issue. develop present plan collect 93) The CONOPS ____ and ____ expresses what the JFC intends to accomplish and how it will be done using available resources. continually, concisely generally, verbally clearly, concisely orderly, clearly 94) The Situation paragraph describes the ____, ____, and ____ of the theater strategic situation that the plan addresses. circumstances, laws, conditions conditions, circumstances, influences conditions, circumstances, enemy allies, enemy, conditions 95) What is Phase 5 of the JTC? Mission Planning and Force Execution Target Development and Prioritization Combat assessment Capability Analysis 96) JTC Phase 5 begins after the JFC approves force execution of the _____, developed during force assignment. COA Joint Task Force OPORD Targeting Plan 97) Dynamic targeting is executed using the dynamic process of find, fix, _____, target, engage, and _____. assess, finish finish, locate evaluate, finish track, assess 98) JTC phase 6 is a ____ process that assesses the effectiveness of the activities during the first five phases of the JTC. essential synchronized deliberate continuous 99) BDA is the estimate of damage composed of ____ and ____ damage assessments, as well as a target system assessment. Answer streak 16 + 918 Next lethal, non-lethal object, entity physical, functional physical, cyber 100) Collateral Damage Assessment evaluates damage usually located outside of the target boundary. True False