OPERATIONS AWARENESS
Which cyberspace operational task denies access to or operation of a targeted function
to a level represented as a percentage of capacity? - ANSWER-Degrade
Which type of threat is potentially the most dangerous because of access to resources,
personnel, and time that may not be available to other actors? - ANSWER-Nation state
Which threats can use cyberspace as an unconventional asymmetric means to counter
traditional advantages? - ANSWER-Irregular
Which cyberspace operational task is a function of time to completely, but temporarily,
deny access to or operation of, a targeted function for a specific period? - ANSWER-
Disrupt
Which of the following terms refers to the non-intelligence enabling activities conducted
to plan and prepare for potential follow-on military operations? - ANSWER-Cyberspace
Operational Preparation of the Environment
Which threat may be national or transnational in nature depending on how they are
organized and steal information for their own use or, in turn, sell it to raise capital? -
ANSWER-Criminal organization
Which cyberspace operational task is to permanently, completely, and irreparably deny
access to, or operation of, a targeted function for the foreseeable scope of the conflict? -
ANSWER-Destroy
Cyberspace operations are conducted under the judicial branch authorities to perform
national security functions. - ANSWER-False
Which of the following are U.S. Cyber Command's lines of effort? - ANSWER-- Secure
and Defend DoD information networks
- Defend the nation against attacks of significant consequences
- Support combatant command global and regional operations (correct)
Which Combatant Command holds the military command authority for cyberspace
operations? - ANSWER-U.S. Strategic Command