Introductory PME (Enlisted) - Block 5 - Planning for Operations (NWC-IEPME-INTRO-B5-V5)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

______________ has/have sometimes been called "operations other than war" or "OOTW," and "military operations other than war" or "MOOTW."

"Irregular warfare"

Computer networks are defended using a ______________ concept.

"defense-in-depth"

_______________ describe(s) a military operation launched from the sea with the primary purpose of introducing a landing force ashore to accomplish an assigned mission.

Amphibious operations

______________ is a tool, technique, or activity employed within a dimension of the Information Operations environment that can be used to create effects and operationally desired conditions.

An information related capability

Maritime power projection includes operations ______________.

Answers A and B are both correct

______________ is primarily defensive in nature, while ______________ is primarily offensive in nature.

Antiterrorism, counterterrorism

The Army's critical combat support capabilities are embedded almost entirely in the ______________. Select all that apply.

Army National Guard Army Reserve

Strategy involves which of the following? Select all that apply.

Assigning forces Establishing goals

Which of the following are Coast Guard Area Commands? Select all that apply.

Atlantic Area Pacific Area

Which of the following is NOT part of the network casualty "response cycle?"

Attack

Which of the following are elements of identity management? Select all that apply.

Authentication Authorization Audit/compliance

The Coast Guard's ______________ conducts military and domestic environmental response operations and serves as advisors to combatant commanders.

National Strike Force

______________, located in Virginia Beach, VA, was reorganized in 2009 to operate and defend the Navy's portion of the Global Information Grid.

Naval Network Warfare Command (NETWARCOM)

__________ functions serve as authorization for the Services to build force structure.

Primary

The Air Force airpower tenet of ______________ explains that limited resources require that forces be applied for the greatest contribution to the most critical current Joint Force Commander (JFC).

Priority

______________ unifies all of the elements of the Army's battlefield organization.

Purpose

Which of the following categories of weapons fall within the definition of "weapons of mass destruction (WMD)"? Select all that apply.

Radiological weapons Other high explosives Chemical weapons

_______________ are the broad and enduring purposes specified by Congress in law for the Services and selected DOD components.

Roles

_______________ establish each Service's leading position in its respective domain of war.

Roles

The Commandant of the Marine Corps reports directly to ______________.

SECNAV

The _______________ forms what has often been called the "survivable leg" of the nuclear triad.

SSBN

The _______________ is responsible for protecting the force from other hostile ships.

SUWC

Which of the following is NOT a strategic objective of the National Strategy for Maritime Security?

Safeguard inland lakes and their resources.

_______________ give(s) a nation the ability to conduct its own operations in a given area, while preventing an adversary the use of the same common sea space.

Sea control

_______________ is/are the employment of naval forces, supported by land and air forces as appropriate, in order to achieve military objectives in vital sea areas.

Sea control

Which of the following are roles of the U.S. Army? Select all that apply.

Seizing, occupying, and defending land areas Defeating enemy land forces Prompt and sustained land combat

Which of the following is NOT a role of the Chairman of the Joint Chiefs of Staff (CJCS) in joint operation planning?

Serve as the supported commander when a joint operation plan covers more than one combatant commander's area of responsibility.

______________ operations create and preserve conditions for the success of decisive operations.

Shaping

Which of the following is an advantage of mine warfare?

Stealthy

The geographic areas of responsibility for geographic Combatant Commanders are established at what level(s)?

Strategic

______________ intelligence is required for the formation of policy and military plans at the national and international levels.

Strategic

Techniques such as adding "authorized" accounts to a targeted system, inserting "backdoors," and adding listening services characterize activities usually performed during the ______________ phase of a cyber attack.

Sustain

Carrier Strike Group and Expeditionary Strike Group commanders generally operate at what level of war?

Tactical

______________ intelligence is required for planning and conducting operations at the component or unit level.

Tactical

Coast Guard ______________ are capable of operating from Navy platforms during counterdrug and maritime interdiction operations in compliant boarding environments.

Tactical Law Enforcement Teams

Approximately how many Marines are 25-years old or younger?

Three quarters

The general functions and composition of the Marine Corps are described in ______________. Select all that apply.

Title 10, U.S. Code DoD Directive 5100.1

The Department of Homeland Security was created following the events of the ______________.

World Trade Center and Pentagon attacks, September 11, 2001

In the event of network failure, a ______________ plan enables an organization to continue its mission.

continuity of operations (COOP)

A/An _______________ is an individual, working with others, who is/are aimed at the overthrow of a constituted government through use of subversion and armed conflict.

insurgent

During war, ______________ strive(s) to identify the adversary's capabilities, vulnerabilities, and centers of gravity.

intelligence

Security cooperation planning, joint operation planning, and force planning are subsets of _______________.

joint strategic planning

All man-made and natural disasters are ______________ events.

local

Mechanized, armored, and air assault divisions require a significant amount of ______________ in order to conduct operations. Select all that apply.

logistic sustainment time to assemble strategic lift

Marines seek to avoid attrition by employing ______________ warfare against an adversary's critical vulnerabilities.

maneuver

U.S. military networks are probed for vulnerabilities by adversaries ______________ of times per day.

millions

The dual effects of a shock wave and an expanding gas bubble are characteristic of a _______________.

mine explosion

Commanders at the tactical level of warfare typically have the ______________ perspective of a conflict.

narrowest

Joint strategic planning occurs primarily at the ______________ levels.

national and theater

At the ______________ level, force planning is associated with creating and maintaining military capabilities.

national strategic

The principle difference between cyber attacks conducted by hackers and those conducted by nation-states is the ______________ of the attack.

objective

Mechanized infantry and armor are best suited for operations in ______________.

open plains

The operational level of war was developed ______________.

to bridge the gap between strategy and national strategic objectives, and the tactics employed on the battlefield to achieve those objectives

How many Air Expeditionary Force modules are normally on call at any one time to support the needs of combatant commanders?

two

The most efficient way to deploy Army combat forces is ______________.

using a combination of strategic sealift and strategic airlift

Understanding the interdependent relationship among the three levels of warfare helps commanders to ______________. Select all that apply.

visualize a logical flow of operations assign tasks allocate resources

The type of Air Force command immediately subordinate to a "Numbered Air Force" is called a ______________.

wing

Steady state conditions for an Air Expeditionary Task Force typically allow for _____________ hours of operation every day, with additional surge capability available for short durations.

12

The modern Coast Guard was created in ______________ and celebrates its anniversary on August 4th.

1915

The "officer to enlisted" ratio in the Air Force is approximately ______________ to 1.

4

The Coast Guard consists of approximately ______________ active duty members.

42,000

There are _____________ steps in the Navy Planning Process.

6

The Army has approximately ______________ soldiers serving on active duty.

600,000

The Air Force's "Total Force" numbers approximately ______________ personnel.

658,000

The Air Force employs ______________ tenets of airpower that are central to their doctrine and compliment the principles of war.

7

In order to deploy rapidly without the delays inherent to mobilizing reserves, the Marine Corps maintains its active force at about ______________ percent of its total force.

80

The Army's only airborne division is the ______________ Airborne Division.

82nd

A Coast Guard Port Security Unit (PSU) is capable of deploying via airlift within ______________ hours of notification.

96

______________ operations directly accomplishes the tasks assigned by higher headquarters.

Decisive

Which organization is responsible for homeland defense?

Department of Defense (DOD)

The Coast Guard is a military service that normally operates under the ______________.

Department of Homeland Security

Joint operation planning consists of ______________.

contingency planning and crisis action planning (CAP)

Insider threats are potent, mainly because ______________.

they already have trusted access to network resources

Because cyber attacks are conducted on and through computer networks, they are unable to achieve effects similar to those of physical warfare.

False

Due to the Marines' rigid task force construct, they are usually assigned to operate independently of joint forces.

False

Given the immense resources at DOD's disposal, it is now possible to deliver the highest possible level of protection against cyber attack across the entire DOD network.

False

Given their similarities, the concepts of Battlespace and Area of Operations are often used interchangeably by Army commanders.

False

Heavy maneuver forces can maneuver strategically with ease and are ideally suited for operations in urban terrain.

False

Since the Army's Civil Affairs and PSYOPS forces are comprised mostly of Army Reserve personnel, they are rarely deployed and spend more time at their home bases than any other type of Army unit.

False

The Air Force believes that air and space power will eventually render land and naval forces obsolete.

False

The Air Force's primary operational domain is the air, making NASA (National Aeronautics and Space Administration) the lead agency in U.S. military space operations.

False

The Coast Guard is prohibited by law (Titles 10 and 14) from performing military and law enforcement services simultaneously.

False

The Coast Guard's legislative mandate under Title 14 of the U.S. Code is to enforce-or to assist in the enforcement of-applicable state and local laws on, under, and over the high seas.

False

The boundaries that exist between the strategic, operational, and tactical levels of warfare are sharp and can be clearly defined in terms of the size of the units involved.

False

The highly tailored nature of Marine Air-Ground Task Forces makes them unsuitable for service as the core around which a Joint Task Force headquarters may be formed.

False

The sovereign options the Air Force delivers for the defense of the U.S. and its global interests depend upon the approval of America's friends and allies.

False

The principle cyber organizations under the Chief of Naval Operations are ______________. Select all that apply.

Fleet Cyber Command (10th Fleet) Cyber Forces Command

_______________ is the total of the numbers and types of ships, aircraft, personnel, bases, and equipment the Navy requires to carry out the tasks it has been assigned.

Force structure

_______________ include those various activities, operations, and capabilities for which the Services are responsible.

Functions

Which of the following Air Force core strategic capabilities strengthen joint warfighting capabilities and implement total force integration? Select all that apply.

Global power Global reach Agile combat support

The continuing transformation of information as both a weapon and an enabler in combat drives a warfighting capability that the Navy calls______________.

Information Dominance

Which of the following is NOT a level of war?

Joint

Marines fight as an integrated air-ground-logistics task force under a single commander called a ______________ Commander.

MAGTF

Which forces comprise the Marine Corps' combatant command-level service components? Select all that apply.

MARFORCOM MARFORPAC

The _______________ shall be organized, trained, and equipped to provide for the conduct of land operations as may be essential to the prosecution of a naval campaign.

Marine Corps

All Marine Corps components reinforce and support the ______________.

Marine Corps Operating Forces

The largest Marine Air-Ground Task Force is called a ______________, which can contain as many 100,000 Marines.

Marine Expeditionary Force

The Marine Corps' standing operational organization is called a ______________.

Marine Expeditionary Force (MEF)

The largest type of Marine Air-Ground Task Force that deploys for combat is called a ______________.

Marine Expeditionary Force (MEF)

Which of the following are among the Coast Guard's core roles? Select all that apply.

Maritime Security Maritime Stewardship Maritime Safety

The Coast Guard's ______________ is an enhanced deployable force that has the advanced interdiction skills needed to operate in a non-compliant or hostile environment.

Maritime Security Response Team

_______________ is/are the projection of combat power from the sea, to the shore, and beyond.

Maritime power projection

_______________ is a relatively low-cost, but highly effective area of warfare.

Mine warfare

__________ are tasks assigned by the President directly to the combatant commanders.

Missions

_______________ are those tasks assigned to the unified and specified combatant commanders by the President or the Secretary of Defense.

Missions

Which of the following are part of the Coast Guard's strategic trident of forces? Select all that apply.

Multi-mission shore-based forces Maritime patrol and interdiction forces Deployable specialized forces

The purpose of ______________ is to mobilize and organize our Nation to secure the U.S. homeland from terrorist attacks.

National Strategy for Homeland Security

Which document(s) provide(s) strategic guidance for the DOD on homeland security? Select all that apply.

National Strategy for Homeland Security Joint Publication 3-26, Homeland Security

______________ intelligence is required for military planning within regional theaters or areas of operations.

Operational

The Coast Guard offers which of the following specific national defense activities to a combatant commander? Select all that apply.

Port operations Maritime intercept operations

______________ play(s) a critical role in warfare by providing knowledge of the enemy to commanders and their staffs.

Intelligence

______________ is the analytical process used to produce intelligence assessments, estimates, and other intelligence products in support of a commander's decision-making process.

Intelligence preparation of the battlespace

______________ includes: WMD deterrence and counterproliferation, terrorism and counterterrorism, and insurgency and counterinsurgency.

Irregular warfare

What legislation strictly limits U.S. Armed Forces' involvement in law enforcement activities in the United States?

Posse Comitatus Act of 1878

The Coast Guard's headquarters is located in ______________.

Washington DC

An action undertaken by a Navy Seal Team operates at what level of war?

It varies depending on the level of the objective achieved or contributed to by the action.

The Army is comprised of ______________ divisions.

10

Which statement is correct when discussing the Navy Planning Process (NPP)?

A logical decision process that helps focus the commander and staff

_______________ is responsible for protecting the force against air-breathing and ballistic missile threats.

ADC

_______________ is responsible for coordinating and directing the protection of the force from all submerged threats.

AX

Currently, the greatest threat in cyberspace is posed by ______________.

Advanced Persistent Threats

Joint Force Commanders will normally assign a(n) ______________ officer the responsibilities of Joint Force Air Component Commander (JFACC) to coordinate air operations in a Joint Operation Area.

Air Force

What is the name of the latest technology that enables a submarine to patrol at slow speeds for long periods without having to snorkel?

Air Independent Propulsion

The ______________ is an Air Force expeditionary organization tailored to meet the needs of a combatant commander.

Air and Space Expeditionary Task Force (AETF)

_______________ enables non-nuclear submarines to conduct long submerged patrols with their batteries fully charged.

Air independent propulsion

The contingency planning process produces which of the following plans?

All the answers are correct.

Which of the following activities are encompassed in joint operational planning?

All the answers are correct.

Which of the following describes a primary function of the Navy?

All the answers are correct.

According to their position in water, what are the three classifications of mines?

Bottom, moored, and drifting

Which of the following are attributes of cyberspace? Select all that apply.

Boundaries are difficult to determine Entirely manmade Constantly changing

Which of the following describe configuration management (CM)? Select all that apply.

CM enables network operators to place strict controls on the hardware and software allowed to operate on a network. CM is a proven method of managing hardware and software vulnerabilities.

The Air Force airpower tenet of ______________ explains that a single commander, focused on the broader aspects of an operation, can best mediate the competing demands for air and space support against the strategic and operational requirements of a conflict.

Centralized Control

The Marine Corps fields specialized forces that may be deployed outside of the MAGTF, these forces are: Select all that apply.

Chemical Biological Incident Response Force Security Force Battalion Anti-Terrorism Battalion

Which of the following are air and space power functions? Select all that apply.

Combat support Counterair Counterspace Weather services

The senior active duty Coast Guard commander's title is ______________.

Commandant

______________ is conducted principally in peacetime, and focuses on potential or anticipated emergencies that likely would involve U.S. military forces.

Contingency planning

______________ is primarily offensive in nature, while ______________ is primarily defensive in nature.

Counterterrorism, antiterrorism

______________ is the time-sensitive development of joint operation plans and orders to an imminent crisis.

Crisis action planning

_______________ is the state of mind brought about by a credible threat of retaliation, a conviction that the action being contemplated cannot succeed, or a belief that the costs of the action will exceed any possible gain.

Deterrence

Which of the following are Air Force core competencies? Select all that apply.

Developing Airmen Leveraging technology to Warfighting

Which of these is NOT a strategic objective of the National Strategy for Homeland Security?

Eliminate all risk of terrorist activity in the U.S.

During a cyber attack, actions taken to increase the attacker's privileges normally occur during the ______________ phase.

Escalate

A single, comprehensive approach is the best way to ensure that all personnel (users, administrators, leadership, etc.) receive the cybersecurity education they need.

False

AETF structure requires military planners to ensure that all AETF assets are able to operate from a single base, as spreading them among multiple bases will reduce their combat effectiveness.

False

______________ is a category of intelligence derived from information collected and provided by human sources.

HUMINT

Which statement does NOT reflect an intelligence preparation of the battlespace (IPB) focus?

Highlights the course of action (COA) the enemy will pursue

In December 2004, the President directed the Secretaries of ______________ to lead the Federal effort to develop a comprehensive National Strategy for Maritime Security. Select all that apply.

Homeland Security Defense

_________________ is the protection of the United States sovereignty, territory, domestic population, and critical infrastructure against external threats and aggression or other threats.

Homeland defense

____________ is a concerted national effort to prevent terrorist attacks within the United States, reduce America's vulnerability to terrorism, and minimize the damage and recover from attacks that do occur.

Homeland security

______________ is a concerted national effort to prevent terrorist attacks within the United States, reduce America's vulnerability to terrorism, and minimize the damage and recover from attacks that do occur.

Homeland security

An air assault division is well suited for the following types of operations. Select all that apply.

Night fighting Stability and support Helicopter firepower Close or urban terrain

The Coast Guard's eleven specific mission programs are grouped into which of the following categories? Select all that apply.

Non-DHS Missions DHS Missions

Which of the following categories of weapons fall within the definition of "weapons of mass destruction"? Select all that apply.

Nuclear weapons Chemical weapons Other high explosives Radiological weapons Biological weapons

Efforts to hide or disguise the physical location of systems used to conduct a cyber attack is normally performed during the ______________ phase of an attack.

Obfuscate

Although the four steps in the intelligence preparation of the battlespace (IPB) process remain the same across the spectrum of conflict, they may be compacted or expanded as time permits.

True

An Air Force Air Operations Center (AOC) is capable of providing command and control for joint air operations anywhere in the theater.

True

Cyberspace operations are an integral part of a Joint Force Commander's synchronized effort.

True

Cyberspace operations are usually nested within the Information Operations cell on a Joint Force Commander's staff.

True

During times of war, the President can direct the Coast Guard to operate under the Department of Defense within the Navy.

True

If the operation is relatively small in scale, a Joint Force Commander may assign a naval officer as the Joint Force Air Component Commander.

True

Marine Air-Ground Task Forces are capable of being deployed to areas with no pre-existing infrastructure (roads, electrical power, etc.).

True

One of the greatest challenges routinely faced by Army leaders and planners is how to get the right force to the battlefield in a timely manner.

True

Penetration tests are conducted by friendly organizations to evaluate a security team's ability to respond to a network intrusion.

True

The "Numbered Air Forces" are subordinate to the Air Force's major commands.

True

The Air Force contains non-aviation wings.

True

The accomplishment of military missions inextricably depends upon networks and information systems.

True

When it was created, the Coast Guard was envisioned to "...be a military service and a branch of the Armed Forces of the United States at all times."

True

Which combatant commander(s) is/are tasked with "providing military assistance to U.S. civil authorities, including consequence management operations in response to chemical, biological, radiological, nuclear, or high-yield explosives (CBRNE) incidents, military support to civil authorities, military assistance for civil disturbances, and other civil support, authorized by the President or the Secretary of Defense (SecDef)"? Select all that apply.

U.S. Northern Command (USNORTHCOM) U.S. Southern Command (USSOUTHCOM) U.S. Pacific Command (USPACOM) U.S. Special Operations Command (USSOCOM)

The Marine Special Operations Command is under the operational control of ______________.

U.S. Special Operations Command

The major difference between a fighter/bomber wing and a mobility wing is that mobility wings have ______________.

additional mission support areas

OPERATION Titan Rain is but one example of what has been called ______________.

an Advanced Persistent Threat

In 2006, the Army reorganized into three ______________ and 10 ______________.

army commands, army service component commands

Historically, the Marine Corps has conducted operations ______________ of the ROMO.

at the lower end

Cyber warfare is different because ______________.

attacks can be conducted with virtual anonymity

Marines are prepared to deploy into ______________ environments, which are characterized by a lack of supporting infrastructure (roads, electrical power, communications, etc.). Select all that apply.

austere

Maritime security is best achieved by ______________ maritime security activities on a global scale.

blending public and private

Generally speaking, the higher the level of war, the ______________ the commander's perspective should be.

broader

The operational level of war is concerned primarily with _______________.

campaigns

For Department of Defense (DOD), homeland security is __________________. Select all that apply.

civil support homeland defense

The Service cyber commands are under the _____________ of U.S. Strategic Command (USSTRATCOM) and under the _____________ of U.S. Cyber Command's (USCYBERCOM).

combatant command; operational control

Military operations occur under the direction of ______________.

combatant commanders

The National Military Strategy provides guidance to the ______________ for the development of joint operation plans

combatant commanders

The National Military Strategy provides guidance to the ______________ for the development of joint operation plans.

combatant commanders

The homeland is defined as the physical region that includes the ______________.

continental United States, Alaska, Hawaii, United States territories and possessions, and surrounding territorial waters and airspace

A(n) ______________ can include response to military operations by foreign powers, terrorist activities, subversives, natural disasters, or other situations as directed by the President or SecDef.

contingency

Activities that "...[are] intended to attack, degrade, disrupt, deny, exploit, and defend electronic information and infrastructure." are termed as ______________ per Joint Publication 3-13, Information Operations.

cyberspace operations

Operational art ______________.

deals with the study, theory, and practice of planning, preparing, conducting, and sustaining major operations and campaigns designed to accomplish operational or strategic objectives

The Coast Guard divides its Area Commands into ______________ for regional focus.

districts

As part of the Army's redesign, it moved away from being a ______________-centric force and transformed into a more flexible ______________-centric modular combat team.

division, brigade

Which of the following are factors in offensive cyberspace operations? Select all that apply.

electronic warfare logical warfare physical warfare irregular warfare kinetic warfare conventional warfare

A(n) ______________ is a fight that is normally short in duration and fought between small forces, such as an individual aircraft in air-to-air combat.

engagement

The Marine Corps is organized into ______________ broad components.

four

There are ______________ types of Marine Air Ground Task Forces.

four

The two basic types of Army divisions, in terms of their fighting power, are ______________.

heavy and light

In order to mount an effective response to its targeted capabilities, DOD must ______________. Select all that apply.

increase confidence in its own systems decrease an adversary's confidence in its capabilities

Cyberspace is defined as a "...global domain within the ______________ environment..."

information

The military capability for maneuvering in cyberspace is called ______________.

information operations

Which of the following are tenets of Army operations? Select all that apply.

initiative agility synchronization

A/An ______________ is an organized movement aimed at the overthrow of a constituted government through use of subversion and armed conflict.

insurgency

The "Three Block War" concept means that Marines must be able to ______________. Select all that apply.

perform stability and counterinsurgency operations on one block wage conventional combat on one block engage in humanitarian operations on one block

The Navy Planning Process is designed to provide commanders with ______________.

possible courses of action

Network defense activities consist of ______________. Select all that apply.

protection monitoring detection analysis response

Armored Cavalry Regiments are capable of acting as a ______________. Select all that apply.

pursuit force special purpose force corps commander's "eyes and ears" covering force

Those persons with little in the way of hacking skills that can access and use powerful hacking tools are called _______________.

script kiddies

The Unified Command Plan (UCP) is an example of guidance at the ______________ level of war.

strategic

Information technology (IT) supply chain vulnerabilities are difficult to manage, because ______________. Select all that apply.

subversive die can be affixed to circuit boards during manufacture malicious code can be inserted into a device's firmware compromised devices appear normal and can pass routine quality assurance inspections IT components are increasingly foreign made

The personnel, bases, and activities that support the Marine Corps' operating forces comprise the Marine Corps ______________.

supporting establishment

Actions at the ______________ level of war tend to focus on the ordered arrangement and maneuver of combat elements in relation to each other and to the enemy to achieve combat objectives.

tactical

Coast Guard Sector Commanders maintain operation centers to facilitate command and control functions at the ______________ level.

tactical

The MEF typically fights at the ______________ level of warfare to fulfill the Joint Force Commander's objectives.

tactical

The Air Force's origins are rooted in ______________ during the First and Second World Wars.

the Army Air Corps

The aggregate of individuals, organizations, and systems that collect, process, disseminate or act on information is called ______________.

the Information Environment

Generally speaking, the President, ______________ function at the strategic level of war.

the Secretary of Defense, and the Chairman of the Joint Chiefs of Staff

Joint warfare is best described as ______________. (Select the best answer.)

the integrated and synchronized application of all appropriate capabilities

Actions are defined as strategic, operational or tactical based on ______________.

the level of the objectives achieved or contributed to by the actions


Ensembles d'études connexes

Hands-On Server 2019 Pre-Assessment Quiz

View Set

Ch. 9 Human Growth & Development

View Set

Digital Citizenship Unit Test Study Guide

View Set

Physical Science Electron Dot Diagram

View Set

SSC101 - Chapter 3, SSC101 - Chapter 6, SSC101 - Chapter 5, SSC101 - Chapter 4, SSC101 - Chapter 2, SSC101 - Chapter 1, SSC102 - Chapter 1, SSC102 - Chapter 2, SSC102 - Chapter 3, SSC102 - Chapter 4, SSC102 - Chapter 5, SSC102 - Chapter 6, SSC102 - C...

View Set