1nx CDC Unit 2 Test

110 Questions | Total Attempts: 92

SettingsSettingsSettings
CDC Quizzes & Trivia

Intelligence Fundamentals


Questions and Answers
  • 1. 
    Dominating the _________ spectrum is as critical to conflict now as occupying land was in the past.
    • A. 

      Electronic

    • B. 

      Operations

    • C. 

      Information

    • D. 

      None of the above

  • 2. 
    What is defined as “action taken to affect adversary information and information systems while defending one’s own information and information systems”?
    • A. 

      Information operations (IO)

    • B. 

      Influence operations (IFO)

    • C. 

      Psychological operations (PSYOP)

    • D. 

      Operations security (OPSEC)

  • 3. 
    Focused on the _________ domain of the battlespace, _________ operations targets the mind of the adversary.
    • A. 

      Information, psychological

    • B. 

      Information, influence

    • C. 

      Cognitive, influence

    • D. 

      Cognitive, psychological

  • 4. 
    _________ operations is focused on affecting the perceptions and behaviors of leaders, groups, or entire populations. It also employs capabilities to affect behaviors, protect operations, communicate commander’s intent, and project accurate information.
    • A. 

      Information

    • B. 

      Influence

    • C. 

      Psychological

    • D. 

      None of the above

  • 5. 
    Which aircraft has the primary mission of conducting PSYOP operations?
    • A. 

      The AWACS

    • B. 

      Warnord One

    • C. 

      Commando Solo

    • D. 

      None of the above

  • 6. 
    True or False. Military Deception (MILDEC) is a powerful tool in military operations which misleads or manages the perception of allies, causing them to act in accordance with friendly objectives.
    • A. 

      True

    • B. 

      False

  • 7. 
    Which of the following is a real life example of a MILDEC?
    • A. 

      US media coverage of US amphibious training

    • B. 

      CNN documentary about the War in Iraq

    • C. 

      Computer viruses planted into enemy computers in the mid 80’s

    • D. 

      US media coverage of US amphibious training in the Persian Gulf designed to alter the intentions of enemy forces

  • 8. 
    _________ is a defensive activity that helps prevent our adversaries from gaining and exploiting our critical information
    • A. 

      IFO

    • B. 

      INFOSEC

    • C. 

      OPSEC

    • D. 

      IO

  • 9. 
    _________ is defined as information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, assassinations conducted by or on behalf of foreign governments or entities, or international terrorist activities.
    • A. 

      Counterintelligence (CI)

    • B. 

      Counterpropaganda Operations

    • C. 

      Covert Operations

    • D. 

      None of the above

  • 10. 
    Who initiates, conducts, and oversees all AF CI investigations, activities, operations, and other related CI activities?
    • A. 

      Security Office

    • B. 

      Your local IG

    • C. 

      AF Office of Special Investigations

    • D. 

      The legal office

  • 11. 
    _________ _________ operations are the lead activity and first line of defense against adversary propaganda and disinformation.
    • A. 

      Counterpropaganda

    • B. 

      Public affairs

    • C. 

      Electronic warfare

    • D. 

      None of the above

  • 12. 
    True or False. Counterpropaganda operations involve efforts to negate, neutralize, or diminish effects of (or gain advantage from) foreign PSYOP or propaganda.
    • A. 

      True

    • B. 

      False

  • 13. 
    _________ and _________ the information edge in conflict can be a powerful weapon to defeat propaganda.
    • A. 

      Planning, applying

    • B. 

      Gaining, maintaining

    • C. 

      Gaining, planning

    • D. 

      Planning, defending

  • 14. 
    _________ _________ involves the use of EM-directed energy, or anti-radiation weapons to attack personnel, facilities, or equipment with the intent of deceiving, disrupting, denying, or destroying an adversary’s combat capability.
    • A. 

      Physical attack

    • B. 

      Electronic warfare

    • C. 

      Electronic protection

    • D. 

      Electronic attack

  • 15. 
    _________ attack is fundamental to military operations because it disrupts, damages, or destroys the enemy’s resources to wage war.
    • A. 

      Electronic

    • B. 

      Physical

    • C. 

      Network

    • D. 

      Indirect

  • 16. 
    _________ _________ is any military action involving the use of electromagnetic (EM) or directed energy to manipulate the EM spectrum to attack an adversary.
    • A. 

      Spectrum warfare

    • B. 

      Electronic attack

    • C. 

      Electronic warfare

    • D. 

      Network attack

  • 17. 
    What defensively enhances the use of the electronic spectrum for friendly forces and is focused on protecting personnel, facilities, and equipment from any effects of friendly or adversary actions against them?
    • A. 

      Electronic protection

    • B. 

      Electronic warefare support

    • C. 

      Network protection

    • D. 

      Network defense

  • 18. 
    True or False. Electronic protection is used to locate and identify all sources of EM energy.
    • A. 

      True

    • B. 

      False

  • 19. 
    What are the three primary activities of the integration of Network warfare operations?
    • A. 

      Network operations support, network warfare support, and network defense

    • B. 

      Network warfare support, network defense, and network attack support

    • C. 

      Network attack support, network operations support, and network defense

    • D. 

      Network attack, network defense, and network warfare support

  • 20. 
    _________ _________ operations is defined as “the integrated planning, employment, and assessment of military capabilities to achieve desired effects across the interconnected analog and digital network portion of the battlespace.
    • A. 

      Network warfare

    • B. 

      Spectrum warfare

    • C. 

      Electronic defense

    • D. 

      None of the above

  • 21. 
    What is the integrated capability to task, collect, process, exploit, and disseminate accurate and timely intelligence.
    • A. 

      National Air and Space Intelligence Center (NASIC)

    • B. 

      Intelligence, surveillance, and reconnaissance (ISR)

    • C. 

      National tactical integration (NTI)

    • D. 

      Processing, Exploitation, and dissemination (PED)

  • 22. 
    A commander-driven process used to predict and preempt adversary actions when and where we choose is also known as what?
    • A. 

      Navigational battlespace awareness (NBA)

    • B. 

      Precision navigation and timing (PNT)

    • C. 

      Predictive intelligence operations (PIO)

    • D. 

      Predictive battlespace awareness (PBA)

  • 23. 
    Space-based navigation systems provide three-dimensional _________ data and a _________ timing source to military as well as civil and commercial users worldwide.
    • A. 

      Planning, alternate

    • B. 

      Integration, operational

    • C. 

      Positioning, standard

    • D. 

      Operational, standard

  • 24. 
    What are the constraints often faced by our ISR capabilities?
    • A. 

      Limited lead times, too many intelligence resources, support often requires long lead times, and the environment is not dynamic enough

    • B. 

      Limited intelligence resources, constrained legally, support often requires long lead times, and the environment is dynamic

    • C. 

      Equipment capabilities, personnel numbers, information operations support, and network operations support

    • D. 

      Limited intelligence resources, constrained legally, limited information operations support, and the number of properly trained personnel

  • 25. 
    True or False. NetA (network attack) is conducted using information systems to deceive, disrupt, deny, delay, degrade, or destroy information that resides in networks.
    • A. 

      True

    • B. 

      False

Back to Top Back to top