JKO JFC 100 Module 09: Cyberspace Operations Awareness
Which of the following are U.S. Cyber Command's lines of effort? (Select all that apply.)
- Secure and Defend DoD information networks (correct)
- Support combatant command global and regional operations (correct)
- Defend the nation against attacks of significant consequences (correct)
Which type of threat is potentially the most dangerous because of access to resources, personnel, and time that may not be available to other actors?
Nation state (correct)
Which cyberspace task controls or changes the adversary's information, information systems, and/or networks in a manner that supports commander's objectives?
Manipulate (correct)
Which two Titles of the U.S. Code give the Department of Defense the authority to conduct cyberspace operations?
- Title 50 (correct)
- Title 10 (correct)
Which type of threat can illegally disrupt or gain access to a network or computer system, and are also known as hackers?
Individual/small group (correct)
Which cyberspace operational task denies access to or operation of a targeted function to a level represented as a percentage of capacity?
Degrade (correct)
Which threats can use cyberspace as an unconventional asymmetric means to counter traditional advantages?
Irregular (correct)
Which Combatant Command holds the military command authority for cyberspace operations?
U.S. Cyber Command (correct)
Which of the following terms refers to the non-intelligence enabling activities conducted to plan and prepare for potential follow-on military operations?
Cyberspace Operational Preparation of the Environment (correct)
Which cyberspace operational task is a function of time to completely, but temporarily, deny access to or operation of, a targeted function for a specific period?
Disrupt (correct)
How are U.S. Cyber Commands forces organized? (Select all that apply.)
- Functional (correct)
- Service (correct)
Which cyberspace operational task is to permanently, completely, and irreparably deny access to, or operation of, a targeted function for the foreseeable scope of the conflict?
Destroy (correct)
Cyberspace operations are conducted under the judicial branch authorities to perform national security functions.
False (correct)
Which threats may be national or transnational in nature depending on how they are organized and steal information for their own use or, in turn, sell it to raise capital?
Criminal organization (correct)
Which cyberspace operational task attacks by degrading, disrupting or destroying access to or operation of targeted function by a specified level for a specified time?
Deny (correct)
Which threats arise from states employing recognized military capabilities and forces in well-understood forms of military conflict?
Traditional (correct)
Defensive Cyberspace Operations - Response Actions are the deliberate, authorized defensive measures or activities taken outside of the defended network to protect and defend the DoD cyberspace capabilities or other designated systems.
True (correct)