Page | 1
Block 2 TEST 2 Questions and Answers
(Expert Solutions)
Q: Human Intelligence (HUMINT)
ANS 🗹🗹: Intelligence gathered by means of interpersonal contact . A category of
intelligence derived from information collected and provided by human sources .
HCTS collect information about people and their associated documents and media
sources to identify elements , intentions . capability . strength , disposition , tactics ,
and equipment .
Q: Imagery
ANS 🗹🗹: IMINT includes representation of objects reproduced electronically or by
optical means on film, electronic display devices, or other media. Can be derived
from visual photography, radar sensors, infrared sensors, lasers, and electro-optics.
Obtained from the electro optical and infrared sensors and from synthetic aperture
radars possibly capable of detecting moving targets
Q: Discovery
ANS 🗹🗹: Open source data, a complex field of primary references sources
photographs, images, documents audio and video recordings, consists of raw data
that can be agglomerated, usually with an editing process
Q: Operations Security Indicators
ANS 🗹🗹: The process of tasking, collecting, processing, analyzing, and
disseminating intelligence is called the Intelligence cycle.
Q: 4 critical sources for gathering intelligence
ANS 🗹🗹: Human
Signals
Image
Open source intelligence
Q: Signals Intelligence (SIGINT)
, Page | 2
ANS 🗹🗹: Signal intelligence is gathered from various sources including foreign
communications, radar and other electronic systems
Q: Open-Source Intelligence (OSINT)
ANS 🗹🗹: Utilizes information that is openly available to all
Q: Integrated defense
ANS 🗹🗹: ID is the incorporation of multidisciplinary active and passive, offensive
and defensive capabilities it is employed to mitigate potential risks to the Air Force
Q: ID considerations
ANS 🗹🗹: Threats include but are not limited to terrorist insider foreign
intelligence entities (FIEs) and Criminals
Q: 3 traditional level of threats
ANS 🗹🗹: Level 1,2,3
Q: Level 1 traditional level of threats
ANS 🗹🗹: threats include enemy agents and terrorist whose primary missions
include espionage, sabotage and subversion
Q: Level 2 traditional level of threats
ANS 🗹🗹: Threats include small scale, irregular forces conducting unconventional
warfare that can pose serious threats to military forces and civilians
Q: Level 3 traditional level of threats
ANS 🗹🗹: Threats have the capability of sabotage combat power by air, land or sea
anywhere into the operational area
Q: Terrorism
ANS 🗹🗹: The calculated use of violence to instill fear and is intended to coerce or
intimidate government or societies
Q: Hierarchical structure
Block 2 TEST 2 Questions and Answers
(Expert Solutions)
Q: Human Intelligence (HUMINT)
ANS 🗹🗹: Intelligence gathered by means of interpersonal contact . A category of
intelligence derived from information collected and provided by human sources .
HCTS collect information about people and their associated documents and media
sources to identify elements , intentions . capability . strength , disposition , tactics ,
and equipment .
Q: Imagery
ANS 🗹🗹: IMINT includes representation of objects reproduced electronically or by
optical means on film, electronic display devices, or other media. Can be derived
from visual photography, radar sensors, infrared sensors, lasers, and electro-optics.
Obtained from the electro optical and infrared sensors and from synthetic aperture
radars possibly capable of detecting moving targets
Q: Discovery
ANS 🗹🗹: Open source data, a complex field of primary references sources
photographs, images, documents audio and video recordings, consists of raw data
that can be agglomerated, usually with an editing process
Q: Operations Security Indicators
ANS 🗹🗹: The process of tasking, collecting, processing, analyzing, and
disseminating intelligence is called the Intelligence cycle.
Q: 4 critical sources for gathering intelligence
ANS 🗹🗹: Human
Signals
Image
Open source intelligence
Q: Signals Intelligence (SIGINT)
, Page | 2
ANS 🗹🗹: Signal intelligence is gathered from various sources including foreign
communications, radar and other electronic systems
Q: Open-Source Intelligence (OSINT)
ANS 🗹🗹: Utilizes information that is openly available to all
Q: Integrated defense
ANS 🗹🗹: ID is the incorporation of multidisciplinary active and passive, offensive
and defensive capabilities it is employed to mitigate potential risks to the Air Force
Q: ID considerations
ANS 🗹🗹: Threats include but are not limited to terrorist insider foreign
intelligence entities (FIEs) and Criminals
Q: 3 traditional level of threats
ANS 🗹🗹: Level 1,2,3
Q: Level 1 traditional level of threats
ANS 🗹🗹: threats include enemy agents and terrorist whose primary missions
include espionage, sabotage and subversion
Q: Level 2 traditional level of threats
ANS 🗹🗹: Threats include small scale, irregular forces conducting unconventional
warfare that can pose serious threats to military forces and civilians
Q: Level 3 traditional level of threats
ANS 🗹🗹: Threats have the capability of sabotage combat power by air, land or sea
anywhere into the operational area
Q: Terrorism
ANS 🗹🗹: The calculated use of violence to instill fear and is intended to coerce or
intimidate government or societies
Q: Hierarchical structure