TBS Phase 1 Exam Guide 2026: Tactics,
Questions & Answers
Initiative and response - ANSWER All actions in war are based on either the initiative to act or a
response to an action.
i. When our ability to continue to attack is gone, we must switch to the defense. This is the
culminating point. The offense is most vulnerable to counterattack at this point.
Styles of warfare - ANSWER The styles of warfare exist on a spectrum between attrition and
maneuver.
culminating point - ANSWER where we switch fro offense to defense and are the most exposed
Attrition - ANSWER i. Attrition seeks to wear down an enemy's material resources. Maneuver
warfare seeks to circumvent problems and attack them from a position of advantage.
Manuver - ANSWER ii. Maneuver warfare seeks to paralyze the enemy system. In maneuver
warfare, enemy strengths are avoided and weaknesses are exploited.
Combat power - ANSWER power is the total destructive force we can bring upon the enemy at
a given time or place. Combat power consists of material, men, weapons, terrain, leadership,
tempo, surprise and many other factors
,Speed and focus - ANSWER Speed is rapidity of action. Speed over time is tempo
Center of Gravity - ANSWER may not always be tangible. Morale, capabilities, positions, or the
relationship between elements of the enemy forces may be the vital element to the enemy's ability
to fight. An Enemies Surface
Critical Vulnerabilites - ANSWER where our actions will have the most destructive effects. An
Enemies Gap
War Defined - ANSWER War is a violent clash of interests between or among organized
groups characterized by the use of military force. These groups are not always nations, but can be
political groups, terrorists, or guerrillas within nations.
Friction - ANSWER Countless factors make war difficult to conduct. When the simple is
difficult, and the difficult is impossible, we have friction. Friction can be mental or physical
Uncertainty - ANSWER Uncertainty is the "fog of war." All decisions in war will be based on
incomplete, inaccurate, or contradictory information
Fluidity - ANSWER No one event in war can be isolated. It has been shaped by all of the
previous events
Disorder - ANSWER In the "fog of war," disorder rules the battlefield. Plans are overcome by
events.
Complexity - ANSWER War is not a conflict between two individuals, but between forces
consisting of many individuals..
The human dimension - ANSWER The human will is the central factor in war. War is shaped by
human morals and emotions. It is an extreme test of physical strength, will, and stamina.
Violence and danger - ANSWER Violence is an element of war. It produces the greatest horrors.
Danger is ever present, along with fear. Fear weakens the will. Leaders study fear and learn to
counteract it
,physical, moral and mental factors - ANSWER The physical forces of war are easily recognized,
such as men and material. The moral factors, such as a nation's resolve, are hard to grasp. Mental
factors affect our ability to outthink our enemy
Evoltion of war - ANSWER The nature of war is constant. Its methods are ever changing. A
major cause of these changes is technology. We must be on the cutting edge of tactics and
technology while not forgetting those fundamentals which is time tested and constant
War is an act of policy - ANSWER War is an extension of both policy and politics with the
addition of military force. Policy refers to the conscious objectives established in the political
process. War must serve policy.
Strategy of annihilation - ANSWER seeks to destroy an enemy's military power. We do not have
to physically destroy an enemy's forces, but can incapacitate them. We can reach policy goals by
paralyzing the enemy.
stratergy of eroision - ANSWER seeks to erode the enemy's will
means in war - ANSWER At the highest level, war involves economic, diplomatic, and
psychological forces as well as military force
Spectrum of conflict - ANSWER War ranges from total war to military operations other than
war (MOOTW). MOOTW includes peacemaking operations and humanitarian relief.\
Define Operational Security (OPSEC), - ANSWER The process to deny the enemy critical
information about us.
identify immediate actions for safeguarding suspected classified material - ANSWER Report all
security violations or suspected compromises, including espionage attempts, to the security
manager immediately.
identify the levels of classified materials security classification - ANSWER 1. Top Secret -
, 2. Secret
3. Confidential - - 4. Unclassified -
top secret - ANSWER - unauthorized disclosure can be expected to cause exceptionally grave
damage to national security. Orange cards
Secret - ANSWER unauthorized disclosure could be expected to cause serious damage to
national security. Red card indicator
Confidential - ANSWER - could be expected to cause identifiable damage to national security-
blue cards
Unclassified - ANSWER any other material not marked identify procedures for classified
material spillage or compromise - ANSWER Report all security violations or suspected
compromises, including espionage attempts, to the security manager immediately.
Use classified material in a controlled environment that limits the number of people who have
access to it.
Cover or close material if uncleared personnel approach.
Never leave classified material unsecured.
Never take classified material home.
Memorize safe combinations; written records of combinations are only maintained in the CMCC
and may not be held by any individual.
Store nothing valuable with classified material.
Do not discuss classified material with anyone other than cleared personnel with need to know.
Destroy material exactly when told using the prescribed method.
identify the procedures for reporting persons suspected of espionage - ANSWER report the
incident or person immediately to your chain of command, security manager, S-2 Intelligence
Officer, or Naval Criminal Investigative Services (NCIS
identify the methods used by foreign agents to collect information - ANSWER 1. Exploiting or
stealing classified equipment and technology
2. Illegally transferring U.S. technology from third countries
3. Covert espionage.
Questions & Answers
Initiative and response - ANSWER All actions in war are based on either the initiative to act or a
response to an action.
i. When our ability to continue to attack is gone, we must switch to the defense. This is the
culminating point. The offense is most vulnerable to counterattack at this point.
Styles of warfare - ANSWER The styles of warfare exist on a spectrum between attrition and
maneuver.
culminating point - ANSWER where we switch fro offense to defense and are the most exposed
Attrition - ANSWER i. Attrition seeks to wear down an enemy's material resources. Maneuver
warfare seeks to circumvent problems and attack them from a position of advantage.
Manuver - ANSWER ii. Maneuver warfare seeks to paralyze the enemy system. In maneuver
warfare, enemy strengths are avoided and weaknesses are exploited.
Combat power - ANSWER power is the total destructive force we can bring upon the enemy at
a given time or place. Combat power consists of material, men, weapons, terrain, leadership,
tempo, surprise and many other factors
,Speed and focus - ANSWER Speed is rapidity of action. Speed over time is tempo
Center of Gravity - ANSWER may not always be tangible. Morale, capabilities, positions, or the
relationship between elements of the enemy forces may be the vital element to the enemy's ability
to fight. An Enemies Surface
Critical Vulnerabilites - ANSWER where our actions will have the most destructive effects. An
Enemies Gap
War Defined - ANSWER War is a violent clash of interests between or among organized
groups characterized by the use of military force. These groups are not always nations, but can be
political groups, terrorists, or guerrillas within nations.
Friction - ANSWER Countless factors make war difficult to conduct. When the simple is
difficult, and the difficult is impossible, we have friction. Friction can be mental or physical
Uncertainty - ANSWER Uncertainty is the "fog of war." All decisions in war will be based on
incomplete, inaccurate, or contradictory information
Fluidity - ANSWER No one event in war can be isolated. It has been shaped by all of the
previous events
Disorder - ANSWER In the "fog of war," disorder rules the battlefield. Plans are overcome by
events.
Complexity - ANSWER War is not a conflict between two individuals, but between forces
consisting of many individuals..
The human dimension - ANSWER The human will is the central factor in war. War is shaped by
human morals and emotions. It is an extreme test of physical strength, will, and stamina.
Violence and danger - ANSWER Violence is an element of war. It produces the greatest horrors.
Danger is ever present, along with fear. Fear weakens the will. Leaders study fear and learn to
counteract it
,physical, moral and mental factors - ANSWER The physical forces of war are easily recognized,
such as men and material. The moral factors, such as a nation's resolve, are hard to grasp. Mental
factors affect our ability to outthink our enemy
Evoltion of war - ANSWER The nature of war is constant. Its methods are ever changing. A
major cause of these changes is technology. We must be on the cutting edge of tactics and
technology while not forgetting those fundamentals which is time tested and constant
War is an act of policy - ANSWER War is an extension of both policy and politics with the
addition of military force. Policy refers to the conscious objectives established in the political
process. War must serve policy.
Strategy of annihilation - ANSWER seeks to destroy an enemy's military power. We do not have
to physically destroy an enemy's forces, but can incapacitate them. We can reach policy goals by
paralyzing the enemy.
stratergy of eroision - ANSWER seeks to erode the enemy's will
means in war - ANSWER At the highest level, war involves economic, diplomatic, and
psychological forces as well as military force
Spectrum of conflict - ANSWER War ranges from total war to military operations other than
war (MOOTW). MOOTW includes peacemaking operations and humanitarian relief.\
Define Operational Security (OPSEC), - ANSWER The process to deny the enemy critical
information about us.
identify immediate actions for safeguarding suspected classified material - ANSWER Report all
security violations or suspected compromises, including espionage attempts, to the security
manager immediately.
identify the levels of classified materials security classification - ANSWER 1. Top Secret -
, 2. Secret
3. Confidential - - 4. Unclassified -
top secret - ANSWER - unauthorized disclosure can be expected to cause exceptionally grave
damage to national security. Orange cards
Secret - ANSWER unauthorized disclosure could be expected to cause serious damage to
national security. Red card indicator
Confidential - ANSWER - could be expected to cause identifiable damage to national security-
blue cards
Unclassified - ANSWER any other material not marked identify procedures for classified
material spillage or compromise - ANSWER Report all security violations or suspected
compromises, including espionage attempts, to the security manager immediately.
Use classified material in a controlled environment that limits the number of people who have
access to it.
Cover or close material if uncleared personnel approach.
Never leave classified material unsecured.
Never take classified material home.
Memorize safe combinations; written records of combinations are only maintained in the CMCC
and may not be held by any individual.
Store nothing valuable with classified material.
Do not discuss classified material with anyone other than cleared personnel with need to know.
Destroy material exactly when told using the prescribed method.
identify the procedures for reporting persons suspected of espionage - ANSWER report the
incident or person immediately to your chain of command, security manager, S-2 Intelligence
Officer, or Naval Criminal Investigative Services (NCIS
identify the methods used by foreign agents to collect information - ANSWER 1. Exploiting or
stealing classified equipment and technology
2. Illegally transferring U.S. technology from third countries
3. Covert espionage.