Block 2 - Unit 5 Flashcards

1
Q

The cyberspace domain is the use of electronics and the __________ __________ to store, modify and exchange data via networked systems and associated physical infrastructures

A

Electromagnetic spectrum - EMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

__________ __________ missions deny, degrade, disrupt, destroy, or deceive an adversary’s cyberspace capability

A

Offensive cyberspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

__________ __________ is an offensive cyberspace operation employing network-based capabilities to destroy, disrupt, or corrupt information resident in or transmitting through networks

A

Network Attack - NetA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

_________ __________ use traditional kinetic means to physically destroy a target

A

Physical attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_________ __________ objective is to protect friendly forces and vital interests from adversary cyberspace attack

A

Defensive mission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three major components of network defense activities?

A
  • Active
  • Passive
  • Inherent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_________ __________ are measures taken to directly counter adversary activities to penetrate a network

A

Active defenses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

__________ __________ is a major component of network defense involving security related activities such as malicious software detection, port security, and system configuration

A

Passive defense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Using a computer network to gather data from target or an adversary automated information systems or network is __________ __________ ___________

A

Computer Network Exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Activities used to negate, neutralize or diminish the effects of or an advantage from foreign psychological operations are ____________

A

Counterpropaganda

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Psychological operations target the adversary’s ___________

A

Mind

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The influence operations capability designed to deceive our adversaries is ________ ________

A

MILDEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

__________ __________ is the methodology applied to an operation for the purpose of denying critical information to the adversary

A

OPSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

__________ ___________ operations are the first line of defense against adversary propaganda and disinformation

A

Public Affairs - PA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Electronic warfare (EW) is any military action using the electromagnetic or __________ __________ to manipulate the electromagnetic spectrum to attack an adversary

A

Directed energy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The electronic warfare operation that uses directed energy (DE) of anti-radiation weapons to attack personnel, facilities, or equipment is known as __________ __________

A

Electronic Attack - EA

17
Q

The electronic warfare operation focused on protecting personnel, facilities, and equipment from adversary’s employment of electronic warfare is _________ _________

A

Electronic Protection - EP

18
Q

The collection of electromagnetic data used for making timely decisions involving electronic warfare operations is __________ ___________ __________

A

Electronic Warfare Support - ES

19
Q

__________ systems are employed to control, manage, and monitor large complex systems

A

Supervisory Control and Data Acquisition - SCADA

20
Q

Why are SCADA systems a concern for cyber warriors?

A

A cyber terrorist with the proper knowledge and equipment can attack our networks and cause damages. Things at risk are public and private institutions in the sectors of agriculture, food, water, public health, emergency services, government, etc.

21
Q

Tactical Data Link (TADL) systems were developed in conjunction with digital computers to permit Joint and Coalition forces to exchange information across a ____________ interface

A

Digital

22
Q

Tactical Data Link (TADL) systems are immune from cyberspace attack. (T/F)

A

False!

23
Q

__________ is composed of hundreds of thousands of interconnected computers, servers, routers, switches and fiber optic cables that allow our critical infrastructures to work

A

Cyberspace

24
Q

How can superior cyber capabilities be used to target an adversary’s decision cycle?

A

Cyber combat operations can disrupt, degrade, or deny the adversary’s ability to collect or display information, command forces or even take action against friendly forces

25
Q

List the three national objectives to secure cyberspace

A
  1. Prevent cyber attacks against American critical infrastructures:
  2. Reduce national vulnerability to cyber attacks:
  3. Minimize damage and recovery time from attacks that do occur
26
Q

The Ops capability of using the domain includes _________________ and _________________

A

Cyberspace Attack and Force Enhancement

27
Q

Cyberspace effects gained from directed energy include (list 5)

A
  • sensor disruption
  • data manipulation
  • decision support degradation
  • command and control disruption
  • weapon system degradation
28
Q

Force enhancement operations provide warfighters global _________ ___________

A

Situational Awareness

29
Q

What counter operations are utilized to ensure the cyberspace capability of controlling the domain?

A

Offensive Counter-Operations - OCO

Defensive Counter-Operations - DCO

30
Q

Cyberspace defense includes measures to preserve, protect, recover and reconstitute friendly cyberspace capabilities before, during and after a __________ __________

A

Hostile attack

31
Q

Cyberspace ____________ operations ensure friendly freedom of action in cyberspace while denying that same freedom to our adversaries

A

Offensive Counter-Operations - OCO

32
Q

Cyberspace Civil Support Operations will also support the defense industrial base in protecting __________ ____________

A

Sensitive information

33
Q

What are the four steps involved in the defense against covert activity by an adversary?

A
  1. Monitoring networks and systems
  2. Detecting intrusions and other activities
  3. Reacting to intrusions and other activities
  4. Counter attack