Self-Test Vol. 1 Unit 6 Flashcards
What three major considerations affect supporting cyber operations?
Policy, Authority, and the Law.
What three priorities drive the National Strategy to Secure Cyberspace?
Prevent cyber-attacks against American’s critical infrastructure, reduce national vulnerability to cyber attacks, minimize damage and recovery time from cyber attacks.
Can an Air National Guardsman execute a cyber-operation?
ANG can train for Title 10 but can not execute unless assigned to Title 10.
What is the primary Air Force command for cyberspace missions?
AFSPC
How does OCO intend to project power?
Application of force in and through cyberspace.
In DCO, what are reactive defenses?
Measures taken to counter an adversary’s effort to penetrate a network or actions taken to terminate an ongoing intrusion.
Most exploitations activities evolve from what?
Phishing
On delegation authority, whose cyber tasking orders does the 624 OC relay to all Air Force units?
24 AF/AFCYBER commander
What are the four agencies the I-NOSC relays cyber orders to?
MCCC, AFFOR, ACCC, and installation comm units.
Does the ATO reflect the integrated air, space, and cyberspace operations plan that support a joint force commander’s campaign?
Yes
What is the stimulant that generates increased information superiority?
Network-centric warfare
What is key to mitigating unintended or undesirable effects and maximizing cyberspace superiority?
Careful planning
How can CO affect an adversary’s informational and physical IO dimensions?
Targeting, either independently or in conjunction with IO, adversary’s culture, organization, or individual psychology.
What are the three capabilities of EW?
EA, EP, and ES
What was the original term used to describe MISO?
PSYOPS
What distinct capability does PA bring to the mission?
Counterpropaganda
Can MILDEC intentionally target or mislead the new media, the U.S. public, or Congress?
No
What process does OPSEC incorporate to deny adversaries critical information about friendly forces?
SM