Introductory PME (Enlisted) - Block 5 - Planning for Operations (NWC-IEPME-INTRO-B5-V5)
______________ has/have sometimes been called "operations other than war" or "OOTW," and "military operations other than war" or "MOOTW."
"Irregular warfare"
Computer networks are defended using a ______________ concept.
"defense-in-depth"
_______________ describe(s) a military operation launched from the sea with the primary purpose of introducing a landing force ashore to accomplish an assigned mission.
Amphibious operations
______________ is a tool, technique, or activity employed within a dimension of the Information Operations environment that can be used to create effects and operationally desired conditions.
An information related capability
Maritime power projection includes operations ______________.
Answers A and B are both correct
______________ is primarily defensive in nature, while ______________ is primarily offensive in nature.
Antiterrorism, counterterrorism
The Army's critical combat support capabilities are embedded almost entirely in the ______________. Select all that apply.
Army National Guard Army Reserve
Strategy involves which of the following? Select all that apply.
Assigning forces Establishing goals
Which of the following are Coast Guard Area Commands? Select all that apply.
Atlantic Area Pacific Area
Which of the following is NOT part of the network casualty "response cycle?"
Attack
Which of the following are elements of identity management? Select all that apply.
Authentication Authorization Audit/compliance
The Coast Guard's ______________ conducts military and domestic environmental response operations and serves as advisors to combatant commanders.
National Strike Force
______________, located in Virginia Beach, VA, was reorganized in 2009 to operate and defend the Navy's portion of the Global Information Grid.
Naval Network Warfare Command (NETWARCOM)
__________ functions serve as authorization for the Services to build force structure.
Primary
The Air Force airpower tenet of ______________ explains that limited resources require that forces be applied for the greatest contribution to the most critical current Joint Force Commander (JFC).
Priority
______________ unifies all of the elements of the Army's battlefield organization.
Purpose
Which of the following categories of weapons fall within the definition of "weapons of mass destruction (WMD)"? Select all that apply.
Radiological weapons Other high explosives Chemical weapons
_______________ are the broad and enduring purposes specified by Congress in law for the Services and selected DOD components.
Roles
_______________ establish each Service's leading position in its respective domain of war.
Roles
The Commandant of the Marine Corps reports directly to ______________.
SECNAV
The _______________ forms what has often been called the "survivable leg" of the nuclear triad.
SSBN
The _______________ is responsible for protecting the force from other hostile ships.
SUWC
Which of the following is NOT a strategic objective of the National Strategy for Maritime Security?
Safeguard inland lakes and their resources.
_______________ give(s) a nation the ability to conduct its own operations in a given area, while preventing an adversary the use of the same common sea space.
Sea control
_______________ is/are the employment of naval forces, supported by land and air forces as appropriate, in order to achieve military objectives in vital sea areas.
Sea control
Which of the following are roles of the U.S. Army? Select all that apply.
Seizing, occupying, and defending land areas Defeating enemy land forces Prompt and sustained land combat
Which of the following is NOT a role of the Chairman of the Joint Chiefs of Staff (CJCS) in joint operation planning?
Serve as the supported commander when a joint operation plan covers more than one combatant commander's area of responsibility.
______________ operations create and preserve conditions for the success of decisive operations.
Shaping
Which of the following is an advantage of mine warfare?
Stealthy
The geographic areas of responsibility for geographic Combatant Commanders are established at what level(s)?
Strategic
______________ intelligence is required for the formation of policy and military plans at the national and international levels.
Strategic
Techniques such as adding "authorized" accounts to a targeted system, inserting "backdoors," and adding listening services characterize activities usually performed during the ______________ phase of a cyber attack.
Sustain
Carrier Strike Group and Expeditionary Strike Group commanders generally operate at what level of war?
Tactical
______________ intelligence is required for planning and conducting operations at the component or unit level.
Tactical
Coast Guard ______________ are capable of operating from Navy platforms during counterdrug and maritime interdiction operations in compliant boarding environments.
Tactical Law Enforcement Teams
Approximately how many Marines are 25-years old or younger?
Three quarters
The general functions and composition of the Marine Corps are described in ______________. Select all that apply.
Title 10, U.S. Code DoD Directive 5100.1
The Department of Homeland Security was created following the events of the ______________.
World Trade Center and Pentagon attacks, September 11, 2001
In the event of network failure, a ______________ plan enables an organization to continue its mission.
continuity of operations (COOP)
A/An _______________ is an individual, working with others, who is/are aimed at the overthrow of a constituted government through use of subversion and armed conflict.
insurgent
During war, ______________ strive(s) to identify the adversary's capabilities, vulnerabilities, and centers of gravity.
intelligence
Security cooperation planning, joint operation planning, and force planning are subsets of _______________.
joint strategic planning
All man-made and natural disasters are ______________ events.
local
Mechanized, armored, and air assault divisions require a significant amount of ______________ in order to conduct operations. Select all that apply.
logistic sustainment time to assemble strategic lift
Marines seek to avoid attrition by employing ______________ warfare against an adversary's critical vulnerabilities.
maneuver
U.S. military networks are probed for vulnerabilities by adversaries ______________ of times per day.
millions
The dual effects of a shock wave and an expanding gas bubble are characteristic of a _______________.
mine explosion
Commanders at the tactical level of warfare typically have the ______________ perspective of a conflict.
narrowest
Joint strategic planning occurs primarily at the ______________ levels.
national and theater
At the ______________ level, force planning is associated with creating and maintaining military capabilities.
national strategic
The principle difference between cyber attacks conducted by hackers and those conducted by nation-states is the ______________ of the attack.
objective
Mechanized infantry and armor are best suited for operations in ______________.
open plains
The operational level of war was developed ______________.
to bridge the gap between strategy and national strategic objectives, and the tactics employed on the battlefield to achieve those objectives
How many Air Expeditionary Force modules are normally on call at any one time to support the needs of combatant commanders?
two
The most efficient way to deploy Army combat forces is ______________.
using a combination of strategic sealift and strategic airlift
Understanding the interdependent relationship among the three levels of warfare helps commanders to ______________. Select all that apply.
visualize a logical flow of operations assign tasks allocate resources
The type of Air Force command immediately subordinate to a "Numbered Air Force" is called a ______________.
wing
Steady state conditions for an Air Expeditionary Task Force typically allow for _____________ hours of operation every day, with additional surge capability available for short durations.
12
The modern Coast Guard was created in ______________ and celebrates its anniversary on August 4th.
1915
The "officer to enlisted" ratio in the Air Force is approximately ______________ to 1.
4
The Coast Guard consists of approximately ______________ active duty members.
42,000
There are _____________ steps in the Navy Planning Process.
6
The Army has approximately ______________ soldiers serving on active duty.
600,000
The Air Force's "Total Force" numbers approximately ______________ personnel.
658,000
The Air Force employs ______________ tenets of airpower that are central to their doctrine and compliment the principles of war.
7
In order to deploy rapidly without the delays inherent to mobilizing reserves, the Marine Corps maintains its active force at about ______________ percent of its total force.
80
The Army's only airborne division is the ______________ Airborne Division.
82nd
A Coast Guard Port Security Unit (PSU) is capable of deploying via airlift within ______________ hours of notification.
96
______________ operations directly accomplishes the tasks assigned by higher headquarters.
Decisive
Which organization is responsible for homeland defense?
Department of Defense (DOD)
The Coast Guard is a military service that normally operates under the ______________.
Department of Homeland Security
Joint operation planning consists of ______________.
contingency planning and crisis action planning (CAP)
Insider threats are potent, mainly because ______________.
they already have trusted access to network resources
Because cyber attacks are conducted on and through computer networks, they are unable to achieve effects similar to those of physical warfare.
False
Due to the Marines' rigid task force construct, they are usually assigned to operate independently of joint forces.
False
Given the immense resources at DOD's disposal, it is now possible to deliver the highest possible level of protection against cyber attack across the entire DOD network.
False
Given their similarities, the concepts of Battlespace and Area of Operations are often used interchangeably by Army commanders.
False
Heavy maneuver forces can maneuver strategically with ease and are ideally suited for operations in urban terrain.
False
Since the Army's Civil Affairs and PSYOPS forces are comprised mostly of Army Reserve personnel, they are rarely deployed and spend more time at their home bases than any other type of Army unit.
False
The Air Force believes that air and space power will eventually render land and naval forces obsolete.
False
The Air Force's primary operational domain is the air, making NASA (National Aeronautics and Space Administration) the lead agency in U.S. military space operations.
False
The Coast Guard is prohibited by law (Titles 10 and 14) from performing military and law enforcement services simultaneously.
False
The Coast Guard's legislative mandate under Title 14 of the U.S. Code is to enforce-or to assist in the enforcement of-applicable state and local laws on, under, and over the high seas.
False
The boundaries that exist between the strategic, operational, and tactical levels of warfare are sharp and can be clearly defined in terms of the size of the units involved.
False
The highly tailored nature of Marine Air-Ground Task Forces makes them unsuitable for service as the core around which a Joint Task Force headquarters may be formed.
False
The sovereign options the Air Force delivers for the defense of the U.S. and its global interests depend upon the approval of America's friends and allies.
False
The principle cyber organizations under the Chief of Naval Operations are ______________. Select all that apply.
Fleet Cyber Command (10th Fleet) Cyber Forces Command
_______________ is the total of the numbers and types of ships, aircraft, personnel, bases, and equipment the Navy requires to carry out the tasks it has been assigned.
Force structure
_______________ include those various activities, operations, and capabilities for which the Services are responsible.
Functions
Which of the following Air Force core strategic capabilities strengthen joint warfighting capabilities and implement total force integration? Select all that apply.
Global power Global reach Agile combat support
The continuing transformation of information as both a weapon and an enabler in combat drives a warfighting capability that the Navy calls______________.
Information Dominance
Which of the following is NOT a level of war?
Joint
Marines fight as an integrated air-ground-logistics task force under a single commander called a ______________ Commander.
MAGTF
Which forces comprise the Marine Corps' combatant command-level service components? Select all that apply.
MARFORCOM MARFORPAC
The _______________ shall be organized, trained, and equipped to provide for the conduct of land operations as may be essential to the prosecution of a naval campaign.
Marine Corps
All Marine Corps components reinforce and support the ______________.
Marine Corps Operating Forces
The largest Marine Air-Ground Task Force is called a ______________, which can contain as many 100,000 Marines.
Marine Expeditionary Force
The Marine Corps' standing operational organization is called a ______________.
Marine Expeditionary Force (MEF)
The largest type of Marine Air-Ground Task Force that deploys for combat is called a ______________.
Marine Expeditionary Force (MEF)
Which of the following are among the Coast Guard's core roles? Select all that apply.
Maritime Security Maritime Stewardship Maritime Safety
The Coast Guard's ______________ is an enhanced deployable force that has the advanced interdiction skills needed to operate in a non-compliant or hostile environment.
Maritime Security Response Team
_______________ is/are the projection of combat power from the sea, to the shore, and beyond.
Maritime power projection
_______________ is a relatively low-cost, but highly effective area of warfare.
Mine warfare
__________ are tasks assigned by the President directly to the combatant commanders.
Missions
_______________ are those tasks assigned to the unified and specified combatant commanders by the President or the Secretary of Defense.
Missions
Which of the following are part of the Coast Guard's strategic trident of forces? Select all that apply.
Multi-mission shore-based forces Maritime patrol and interdiction forces Deployable specialized forces
The purpose of ______________ is to mobilize and organize our Nation to secure the U.S. homeland from terrorist attacks.
National Strategy for Homeland Security
Which document(s) provide(s) strategic guidance for the DOD on homeland security? Select all that apply.
National Strategy for Homeland Security Joint Publication 3-26, Homeland Security
______________ intelligence is required for military planning within regional theaters or areas of operations.
Operational
The Coast Guard offers which of the following specific national defense activities to a combatant commander? Select all that apply.
Port operations Maritime intercept operations
______________ play(s) a critical role in warfare by providing knowledge of the enemy to commanders and their staffs.
Intelligence
______________ is the analytical process used to produce intelligence assessments, estimates, and other intelligence products in support of a commander's decision-making process.
Intelligence preparation of the battlespace
______________ includes: WMD deterrence and counterproliferation, terrorism and counterterrorism, and insurgency and counterinsurgency.
Irregular warfare
What legislation strictly limits U.S. Armed Forces' involvement in law enforcement activities in the United States?
Posse Comitatus Act of 1878
The Coast Guard's headquarters is located in ______________.
Washington DC
An action undertaken by a Navy Seal Team operates at what level of war?
It varies depending on the level of the objective achieved or contributed to by the action.
The Army is comprised of ______________ divisions.
10
Which statement is correct when discussing the Navy Planning Process (NPP)?
A logical decision process that helps focus the commander and staff
_______________ is responsible for protecting the force against air-breathing and ballistic missile threats.
ADC
_______________ is responsible for coordinating and directing the protection of the force from all submerged threats.
AX
Currently, the greatest threat in cyberspace is posed by ______________.
Advanced Persistent Threats
Joint Force Commanders will normally assign a(n) ______________ officer the responsibilities of Joint Force Air Component Commander (JFACC) to coordinate air operations in a Joint Operation Area.
Air Force
What is the name of the latest technology that enables a submarine to patrol at slow speeds for long periods without having to snorkel?
Air Independent Propulsion
The ______________ is an Air Force expeditionary organization tailored to meet the needs of a combatant commander.
Air and Space Expeditionary Task Force (AETF)
_______________ enables non-nuclear submarines to conduct long submerged patrols with their batteries fully charged.
Air independent propulsion
The contingency planning process produces which of the following plans?
All the answers are correct.
Which of the following activities are encompassed in joint operational planning?
All the answers are correct.
Which of the following describes a primary function of the Navy?
All the answers are correct.
According to their position in water, what are the three classifications of mines?
Bottom, moored, and drifting
Which of the following are attributes of cyberspace? Select all that apply.
Boundaries are difficult to determine Entirely manmade Constantly changing
Which of the following describe configuration management (CM)? Select all that apply.
CM enables network operators to place strict controls on the hardware and software allowed to operate on a network. CM is a proven method of managing hardware and software vulnerabilities.
The Air Force airpower tenet of ______________ explains that a single commander, focused on the broader aspects of an operation, can best mediate the competing demands for air and space support against the strategic and operational requirements of a conflict.
Centralized Control
The Marine Corps fields specialized forces that may be deployed outside of the MAGTF, these forces are: Select all that apply.
Chemical Biological Incident Response Force Security Force Battalion Anti-Terrorism Battalion
Which of the following are air and space power functions? Select all that apply.
Combat support Counterair Counterspace Weather services
The senior active duty Coast Guard commander's title is ______________.
Commandant
______________ is conducted principally in peacetime, and focuses on potential or anticipated emergencies that likely would involve U.S. military forces.
Contingency planning
______________ is primarily offensive in nature, while ______________ is primarily defensive in nature.
Counterterrorism, antiterrorism
______________ is the time-sensitive development of joint operation plans and orders to an imminent crisis.
Crisis action planning
_______________ is the state of mind brought about by a credible threat of retaliation, a conviction that the action being contemplated cannot succeed, or a belief that the costs of the action will exceed any possible gain.
Deterrence
Which of the following are Air Force core competencies? Select all that apply.
Developing Airmen Leveraging technology to Warfighting
Which of these is NOT a strategic objective of the National Strategy for Homeland Security?
Eliminate all risk of terrorist activity in the U.S.
During a cyber attack, actions taken to increase the attacker's privileges normally occur during the ______________ phase.
Escalate
A single, comprehensive approach is the best way to ensure that all personnel (users, administrators, leadership, etc.) receive the cybersecurity education they need.
False
AETF structure requires military planners to ensure that all AETF assets are able to operate from a single base, as spreading them among multiple bases will reduce their combat effectiveness.
False
______________ is a category of intelligence derived from information collected and provided by human sources.
HUMINT
Which statement does NOT reflect an intelligence preparation of the battlespace (IPB) focus?
Highlights the course of action (COA) the enemy will pursue
In December 2004, the President directed the Secretaries of ______________ to lead the Federal effort to develop a comprehensive National Strategy for Maritime Security. Select all that apply.
Homeland Security Defense
_________________ is the protection of the United States sovereignty, territory, domestic population, and critical infrastructure against external threats and aggression or other threats.
Homeland defense
____________ is a concerted national effort to prevent terrorist attacks within the United States, reduce America's vulnerability to terrorism, and minimize the damage and recover from attacks that do occur.
Homeland security
______________ is a concerted national effort to prevent terrorist attacks within the United States, reduce America's vulnerability to terrorism, and minimize the damage and recover from attacks that do occur.
Homeland security
An air assault division is well suited for the following types of operations. Select all that apply.
Night fighting Stability and support Helicopter firepower Close or urban terrain
The Coast Guard's eleven specific mission programs are grouped into which of the following categories? Select all that apply.
Non-DHS Missions DHS Missions
Which of the following categories of weapons fall within the definition of "weapons of mass destruction"? Select all that apply.
Nuclear weapons Chemical weapons Other high explosives Radiological weapons Biological weapons
Efforts to hide or disguise the physical location of systems used to conduct a cyber attack is normally performed during the ______________ phase of an attack.
Obfuscate
Although the four steps in the intelligence preparation of the battlespace (IPB) process remain the same across the spectrum of conflict, they may be compacted or expanded as time permits.
True
An Air Force Air Operations Center (AOC) is capable of providing command and control for joint air operations anywhere in the theater.
True
Cyberspace operations are an integral part of a Joint Force Commander's synchronized effort.
True
Cyberspace operations are usually nested within the Information Operations cell on a Joint Force Commander's staff.
True
During times of war, the President can direct the Coast Guard to operate under the Department of Defense within the Navy.
True
If the operation is relatively small in scale, a Joint Force Commander may assign a naval officer as the Joint Force Air Component Commander.
True
Marine Air-Ground Task Forces are capable of being deployed to areas with no pre-existing infrastructure (roads, electrical power, etc.).
True
One of the greatest challenges routinely faced by Army leaders and planners is how to get the right force to the battlefield in a timely manner.
True
Penetration tests are conducted by friendly organizations to evaluate a security team's ability to respond to a network intrusion.
True
The "Numbered Air Forces" are subordinate to the Air Force's major commands.
True
The Air Force contains non-aviation wings.
True
The accomplishment of military missions inextricably depends upon networks and information systems.
True
When it was created, the Coast Guard was envisioned to "...be a military service and a branch of the Armed Forces of the United States at all times."
True
Which combatant commander(s) is/are tasked with "providing military assistance to U.S. civil authorities, including consequence management operations in response to chemical, biological, radiological, nuclear, or high-yield explosives (CBRNE) incidents, military support to civil authorities, military assistance for civil disturbances, and other civil support, authorized by the President or the Secretary of Defense (SecDef)"? Select all that apply.
U.S. Northern Command (USNORTHCOM) U.S. Southern Command (USSOUTHCOM) U.S. Pacific Command (USPACOM) U.S. Special Operations Command (USSOCOM)
The Marine Special Operations Command is under the operational control of ______________.
U.S. Special Operations Command
The major difference between a fighter/bomber wing and a mobility wing is that mobility wings have ______________.
additional mission support areas
OPERATION Titan Rain is but one example of what has been called ______________.
an Advanced Persistent Threat
In 2006, the Army reorganized into three ______________ and 10 ______________.
army commands, army service component commands
Historically, the Marine Corps has conducted operations ______________ of the ROMO.
at the lower end
Cyber warfare is different because ______________.
attacks can be conducted with virtual anonymity
Marines are prepared to deploy into ______________ environments, which are characterized by a lack of supporting infrastructure (roads, electrical power, communications, etc.). Select all that apply.
austere
Maritime security is best achieved by ______________ maritime security activities on a global scale.
blending public and private
Generally speaking, the higher the level of war, the ______________ the commander's perspective should be.
broader
The operational level of war is concerned primarily with _______________.
campaigns
For Department of Defense (DOD), homeland security is __________________. Select all that apply.
civil support homeland defense
The Service cyber commands are under the _____________ of U.S. Strategic Command (USSTRATCOM) and under the _____________ of U.S. Cyber Command's (USCYBERCOM).
combatant command; operational control
Military operations occur under the direction of ______________.
combatant commanders
The National Military Strategy provides guidance to the ______________ for the development of joint operation plans
combatant commanders
The National Military Strategy provides guidance to the ______________ for the development of joint operation plans.
combatant commanders
The homeland is defined as the physical region that includes the ______________.
continental United States, Alaska, Hawaii, United States territories and possessions, and surrounding territorial waters and airspace
A(n) ______________ can include response to military operations by foreign powers, terrorist activities, subversives, natural disasters, or other situations as directed by the President or SecDef.
contingency
Activities that "...[are] intended to attack, degrade, disrupt, deny, exploit, and defend electronic information and infrastructure." are termed as ______________ per Joint Publication 3-13, Information Operations.
cyberspace operations
Operational art ______________.
deals with the study, theory, and practice of planning, preparing, conducting, and sustaining major operations and campaigns designed to accomplish operational or strategic objectives
The Coast Guard divides its Area Commands into ______________ for regional focus.
districts
As part of the Army's redesign, it moved away from being a ______________-centric force and transformed into a more flexible ______________-centric modular combat team.
division, brigade
Which of the following are factors in offensive cyberspace operations? Select all that apply.
electronic warfare logical warfare physical warfare irregular warfare kinetic warfare conventional warfare
A(n) ______________ is a fight that is normally short in duration and fought between small forces, such as an individual aircraft in air-to-air combat.
engagement
The Marine Corps is organized into ______________ broad components.
four
There are ______________ types of Marine Air Ground Task Forces.
four
The two basic types of Army divisions, in terms of their fighting power, are ______________.
heavy and light
In order to mount an effective response to its targeted capabilities, DOD must ______________. Select all that apply.
increase confidence in its own systems decrease an adversary's confidence in its capabilities
Cyberspace is defined as a "...global domain within the ______________ environment..."
information
The military capability for maneuvering in cyberspace is called ______________.
information operations
Which of the following are tenets of Army operations? Select all that apply.
initiative agility synchronization
A/An ______________ is an organized movement aimed at the overthrow of a constituted government through use of subversion and armed conflict.
insurgency
The "Three Block War" concept means that Marines must be able to ______________. Select all that apply.
perform stability and counterinsurgency operations on one block wage conventional combat on one block engage in humanitarian operations on one block
The Navy Planning Process is designed to provide commanders with ______________.
possible courses of action
Network defense activities consist of ______________. Select all that apply.
protection monitoring detection analysis response
Armored Cavalry Regiments are capable of acting as a ______________. Select all that apply.
pursuit force special purpose force corps commander's "eyes and ears" covering force
Those persons with little in the way of hacking skills that can access and use powerful hacking tools are called _______________.
script kiddies
The Unified Command Plan (UCP) is an example of guidance at the ______________ level of war.
strategic
Information technology (IT) supply chain vulnerabilities are difficult to manage, because ______________. Select all that apply.
subversive die can be affixed to circuit boards during manufacture malicious code can be inserted into a device's firmware compromised devices appear normal and can pass routine quality assurance inspections IT components are increasingly foreign made
The personnel, bases, and activities that support the Marine Corps' operating forces comprise the Marine Corps ______________.
supporting establishment
Actions at the ______________ level of war tend to focus on the ordered arrangement and maneuver of combat elements in relation to each other and to the enemy to achieve combat objectives.
tactical
Coast Guard Sector Commanders maintain operation centers to facilitate command and control functions at the ______________ level.
tactical
The MEF typically fights at the ______________ level of warfare to fulfill the Joint Force Commander's objectives.
tactical
The Air Force's origins are rooted in ______________ during the First and Second World Wars.
the Army Air Corps
The aggregate of individuals, organizations, and systems that collect, process, disseminate or act on information is called ______________.
the Information Environment
Generally speaking, the President, ______________ function at the strategic level of war.
the Secretary of Defense, and the Chairman of the Joint Chiefs of Staff
Joint warfare is best described as ______________. (Select the best answer.)
the integrated and synchronized application of all appropriate capabilities
Actions are defined as strategic, operational or tactical based on ______________.
the level of the objectives achieved or contributed to by the actions