What are the specific Cyberspace actions that employ cyberspace capabilities for the JFC in the creation of effects? CORRECT ANSWERS: Attack, Defense, Exploitation, and Security
____________ is the foundational intelligence process of system-level target development. CORRECT ANSWERS: Target Systems Analysis (TSA)
Which of the following is NOT one of the FOUR steps to JIPOE? CORRECT ANSWERS: Determine Friendly Force Courses of Action
Intelligence actions conducted by the CCMD authorized by EXPORD or conducted by SIGINT unit under temporary SOTA: CORRECT ANSWERS: ISR in Cyberspace
Effects estimates are essential in gaining the JFC's approval and are situation specific. CORRECT ANSWERS: True
What are the five (5) domains under Multi-Domain Operations? CORRECT ANSWERS: Air, Land, Maritime, Space, and Cyberspace
Course of Action (COA) Comparison is: CORRECT ANSWERS: All of the above
Capabilities Analysis is a 4-step process consisting of: CORRECT ANSWERS: TVA, Capability Assignment, Feasibility Assessment, Effects Estimate
Standard methodology for Course of Action (COA) Wargaming is: CORRECT ANSWERS: Action, Reaction, Counter-action,Record
CPTs defend the DODIN or other ___ cyberspace in coordination with segment owners, CSSPs, and users. CORRECT ANSWERS: Blue
What are the types of mission for a CPT? CORRECT ANSWERS: Survey, Contain, Clear, Secure
A weakness in an info system, system security procedures, or internal controls that could be exploited is a what? CORRECT ANSWERS: Vulnerability
How many components are there to Combat Assessment (Tactical Level of Warfare)? CORRECT ANSWERS: 4
The Commander's Estimate is: CORRECT ANSWERS: A narrative statement of how the Cmdr intends to accomplish the mission
According to JP 3-12, Figure I-1, the three layers of cyberspace are: CORRECT ANSWERS: Physical Network Layer, Logical Network Layer, and Cyber-Persona Layer