I2ACOP Final
Study online at https://quizlet.com/_i097os
1. What are the 5 Operational Domains?: Air, Land, Maritime, Space, Cyberspace
2. The Space Domain is the area above the altitude where atmospheric effects
are negligible.: True
3. What are the 3 layers of Cyberspace?: Physical Network Layer, Logical Network Layer, Cyber-per-
sona Layer
4. The _____ of 1986 made the CJCS the sole military advisor to the POTUS and
NSC.: Goldwater-Nichols Act
5. The _____ of 1947 created the National Military Establishment and prescribed
a weak SECDEF.: National Security Act
6. The Supported Commander has the authority to exercise general direction of
supporting effort.: True
7. What are the 3 dimensions of the information environment?: Physical, Informational,
Cognitive
8. The _____ dimension encompasses where and how information is collected,
processed, stored, disseminated, and protected.: Informational
9. The _____ dimension includes values, beliefs, perceptions, and awareness.: -
Cognitive
10. IO applies, integrates, and synchronizes IRCs to disrupt, corrupt, or usurp
the decision making of Target Audiences.: True
11. _____ is a maneuver space essential for facilitating control within the Opera-
tional Environment (OE).: The Electromagnetic Spectrum
12. The EMOE is a maneuver space, and battlespace where competition and
warfare are conducted.: True
13. The 3 subcategories of Space Control are:: Offensive Space Control, Defensive Space Control,
Navigation Warfare
14. What are the 3 dimensions of the Space Domain?: Physical, Network, Cognitive
15. _____ are defensive measures or activities taken outside of defended net-
works to protect DOD cyberspace.: DCO-RA
16. Degrade is a function of _____.: Amount
17. The _____ is the base for Mission Command, enables warfighting functions,
and is foundational to Cyberspace Operations.: DODIN
1/5
, I2ACOP Final
Study online at https://quizlet.com/_i097os
18. DODIN Operations design, _____, configure, _____, operate, maintain, and
sustain DOD cyberspace.: build, secure
19. The Principle of Military Necessity prohibits _____ to exact confessions and
other activities.: torture
20. ROE does not provide implementation guidance on the inherent right and
obligation of self-defense.: False
21. The _____ conducts CO to defeat significant cyberspace threats to the DODIN,
and when ordered, to the nation.: Cyber National Mission Force
22. CMTs and CSTs are OPCON to _____.: JFHQ-Cyber
23. ___ involves the collecting and processing foreign communications passed
by radio, wire, or other electromagnetic means.: COMINT
24. Which organization provides CI/HUMINT support to Cyberspace Opera-
tions?: DIA
25. _____ plans organize the day-to-day operations of the Joint Force to shape the
OE and achieve national objectives.: Campaign
26. A _____ describes the CONOPs, major forces, concepts of support, and esti-
mated timelines.: base plan or CONOP
27. A target is an _____ or _____ that performs a function for the adversary
considered for possible engagement or action.: entity, object
28. A high payoff target is one whose loss to the enemy will significantly con-
tribute to the success of friendly COA.: True
29. _____ supports commanders and planners in organizing and understanding
the OE as a complex interactive system.: Operational Design
30. The _____ process analyzes relevant aspects of the OE.: JIPOE
31. Insufficient targeting guidance could result in a decrease in JFC confidence
in the JTC.: True
32. What is step 2 of targeting guidance development?: Identify Key Target System(s)
33. Service components will not have their own Target Systems they want to
attack based on their mission.: False
34. Identification of COGs, LOOs, decision points, desired & undesired effects
are _____ in Targeting Guidance Development?: Step 3
2/5
Study online at https://quizlet.com/_i097os
1. What are the 5 Operational Domains?: Air, Land, Maritime, Space, Cyberspace
2. The Space Domain is the area above the altitude where atmospheric effects
are negligible.: True
3. What are the 3 layers of Cyberspace?: Physical Network Layer, Logical Network Layer, Cyber-per-
sona Layer
4. The _____ of 1986 made the CJCS the sole military advisor to the POTUS and
NSC.: Goldwater-Nichols Act
5. The _____ of 1947 created the National Military Establishment and prescribed
a weak SECDEF.: National Security Act
6. The Supported Commander has the authority to exercise general direction of
supporting effort.: True
7. What are the 3 dimensions of the information environment?: Physical, Informational,
Cognitive
8. The _____ dimension encompasses where and how information is collected,
processed, stored, disseminated, and protected.: Informational
9. The _____ dimension includes values, beliefs, perceptions, and awareness.: -
Cognitive
10. IO applies, integrates, and synchronizes IRCs to disrupt, corrupt, or usurp
the decision making of Target Audiences.: True
11. _____ is a maneuver space essential for facilitating control within the Opera-
tional Environment (OE).: The Electromagnetic Spectrum
12. The EMOE is a maneuver space, and battlespace where competition and
warfare are conducted.: True
13. The 3 subcategories of Space Control are:: Offensive Space Control, Defensive Space Control,
Navigation Warfare
14. What are the 3 dimensions of the Space Domain?: Physical, Network, Cognitive
15. _____ are defensive measures or activities taken outside of defended net-
works to protect DOD cyberspace.: DCO-RA
16. Degrade is a function of _____.: Amount
17. The _____ is the base for Mission Command, enables warfighting functions,
and is foundational to Cyberspace Operations.: DODIN
1/5
, I2ACOP Final
Study online at https://quizlet.com/_i097os
18. DODIN Operations design, _____, configure, _____, operate, maintain, and
sustain DOD cyberspace.: build, secure
19. The Principle of Military Necessity prohibits _____ to exact confessions and
other activities.: torture
20. ROE does not provide implementation guidance on the inherent right and
obligation of self-defense.: False
21. The _____ conducts CO to defeat significant cyberspace threats to the DODIN,
and when ordered, to the nation.: Cyber National Mission Force
22. CMTs and CSTs are OPCON to _____.: JFHQ-Cyber
23. ___ involves the collecting and processing foreign communications passed
by radio, wire, or other electromagnetic means.: COMINT
24. Which organization provides CI/HUMINT support to Cyberspace Opera-
tions?: DIA
25. _____ plans organize the day-to-day operations of the Joint Force to shape the
OE and achieve national objectives.: Campaign
26. A _____ describes the CONOPs, major forces, concepts of support, and esti-
mated timelines.: base plan or CONOP
27. A target is an _____ or _____ that performs a function for the adversary
considered for possible engagement or action.: entity, object
28. A high payoff target is one whose loss to the enemy will significantly con-
tribute to the success of friendly COA.: True
29. _____ supports commanders and planners in organizing and understanding
the OE as a complex interactive system.: Operational Design
30. The _____ process analyzes relevant aspects of the OE.: JIPOE
31. Insufficient targeting guidance could result in a decrease in JFC confidence
in the JTC.: True
32. What is step 2 of targeting guidance development?: Identify Key Target System(s)
33. Service components will not have their own Target Systems they want to
attack based on their mission.: False
34. Identification of COGs, LOOs, decision points, desired & undesired effects
are _____ in Targeting Guidance Development?: Step 3
2/5