COMPLETE SOLUTIONS
What is an orderly analytical set of logical steps to frame a problem to examine a mission and produce a plan or order? correct answer: Joint Planning Process
Which of the following is a type of Cyberspace action? correct answer: Cyberspace Attack
Which of the following are components of Defensive Cyberspace Operations? correct answer: All of the Above: DCO-IDM
DCO-RA
Defense of non DOD cyberspace
Action, Reaction, and Counter-action are part of what JPP Step? correct answer: JPP Step 4
What are the types of cyberspace exploitation? correct answer: ISR in Cyberspace, C S&R, C-
OPE
Title 10 provides the military authority to conduct what cyberspace action? correct answer: Cyberspace Attack
Installation policy states that the NEC must push network security updates remotely, this is an example of a? correct answer: Constraint
A supposition about a current situation or future course of events presumed to be true? correct answer: Assumption
What are the categories of targeting? (pick all that apply) correct answer: Deliberate
Dynamic
What happens during JPP Step 6: COA Approval? correct answer: Staff briefs CDR their COAs & CDR selects or modifies their COAs
What happens during JPP Step 5: COA Comparison? correct answer: Staff evaluates all COAs against their evaluation criteria and selects COA
Which of the following is not one of the COA validity criteria? correct answer: Limited
(Correct: Adequate, Acceptable, Feasible, Distinguishable, Complete)
2 + 3 is in reference to what? correct answer: Russia, China + Iran, North Korea, and Emerging Threats