• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/95

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

95 Cards in this Set

  • Front
  • Back

(001) When completing the career development course, how much time is given to complete each volume?


a. 15 days.


b. 30 days.


c. 3 months.


d. 12 months.

b. 30 Days

(001) What Air Force Instruction can you reference to determine trainee responsibilities?


a. AFI 36-2201.


b. AFI 36-2101.


c. AFI 36-2202.


d. AFI 36-2102.

a. AFI 36-2201

(002) What Air Force Instruction is referred to as the "little, brown book," and gives information on the enlisted tier responsibilities?


a. AFI 36-2101.


b. AFI 36-2201.


c. AFI 36-2618.


d. AFI 36-2903.

c. AFI 36-2618

(003) Who is inherently responsible for base force protection (FP)?


a. Commanders.


b. Antiterrorism officer.


c. All military members.


d. Force protection manager.

a. Commanders

(004) The application of active and passive defense measures, employed across the legally-defined ground dimension of the operational environment, to mitigate potential risks, and defeat adversary threats to Air Force operations is known as what?


a. Force protection.


b. Integrated defense.


c. Agile combat support.


d. Installation security plans.

b. Integrated Defense

(004) What is the place in which the commander can directly influence operations that expand and contract depending on friendly force control?


a. Point of interest.


b. Area of influence.


c. Base of staging.


d. Enemy battlespace.

b. Area of Influence

(005) What is the most important aspect of intelligence reporting?


a. Content.


b. Lateness.


c. Truth.


d. Relevance.

a. Content

(005) What ensures that your message serves its purpose at its destination?


a. Content.


b. Accuracy.


c. Truth.


d. Relevance.

b. Accuracy

(006) What do the objectives of integrated defense provide for the conduct of integrated defense?


a. Resources.


b. A central focus.


c. Conditions for success.


d. Objectives and guidance.

b. A Central Focus

(006) Where can you find the process for submitting a MISREP?


a. ATO.


b. SPINS.


c. SITREP.


d. Command directives.

b. SPINS

(006) Which type of intelligence data includes information on the number of aircraft on a specific mission?


a. Flight detail.


b. Operational data.


c. Enemy air reaction data.


d. Surface-to-air missile data.

a. Flight Detail

(007) Intelligence operations are which of the following?


a. Simultaneous.


b. Out of order.


c. Sequential.


d. Separate.

a. Simultaneous

(007) An ideal ISR strategy should be designed to maximize what?


a. Intelligence preparation of the operational environment.


b. The intelligence cycle.


c. Battlespace awareness.


d. The targeting cycle.

c. Battlespace Awareness

(008) During the ISR Process, when does planning and direction occur?


a. When directed by the commander.


b. Only in times of war.


c. Continuously.


d. Occasionally.

c. Continuously

(008) What kind of planning do commanders engage in order to conduct operations?


a. Mindless.


b. Reactive.


c. Adaptive.


d. Proactive.

c. Adaptive

16. (008) Identification of needs for intelligence regarding all aspects of the operational environment starts with which phase of the intelligence process?


a. Analysis and production.


b. Evaluation and feedback.


c. Planning and direction.


d. Collection.

c. Planning and Direction

(009) What is the most significant aspect of collection because of the operational needs for intelligence often exceeding intelligence capabilities?


a. Need of the requestor.


b. Urgency of the request.


c. Prioritization.


d. Reliability.

c. Prioritization

(009) Who determines the availability and capability of collection assets and resources that might contribute to requirement satisfaction?


a. Commander.


b. Intelligence analyst.


c. Collection manager.


d. JFC.

c. Collection Manager

(009) What is developed to compare characteristics of the requirement’s target with the characteristics of available assets or resources to determine collection suitability?


a. RFIs.


b. PIRs.


c. CCIRs.


d. EEIs.

d. EEIs

(010) What phase in the ISR process follows the collection phase?


a. Planning and direction.


b. Analysis and production.


c. Processing and exploitation.


d. Dissemination and integration.

c. Processing and Exploitation

(010) What type of data is converted into information that can be readily disseminated, used, transmitted, and exploited by intelligence analysts to produce multidiscipline intelligence products?


a. Time sensitive.


b. Top Secret.


c. Important.


d. Raw.

d. Raw

(010) Resulting information that is not yet fully subject to analytical assessment and receives tier one analysis for time-critical production but has not been subjected to full, analytical assessment is an example of what?


a. Analysis.


b. Production.


c. Processing.


d. Analysis and production.

c. Processing

(011) In addition to providing intelligence products that anticipate the needs of the commander, products must include the following elements.


a. Timeliness, accuracy, usability and completeness.


b. Timeliness and accuracy only


c. Timeliness, accuracy, usability, completeness, relevance, objectiveness, and availability


d. Timeliness, accuracy, usability, completeness, relevance, objectiveness.

c. Timeliness, accuracy, usability, completeness, relevance, objectiveness, and availability

(011) Analysis and production is done primarily by whom?


a. DIA.


b. JISE.


c. JIOC.


d. All-source analysts.

d. All-source Analysts

(011) During _______, information is received, organized, and entered into appropriate databases by the analysis and production elements of intelligence community organizations.


a. Analysis.


b. Evaluation.


c. Integration.


d. Interpretation.

c. Integration

(012) What is the most important requirement of the dissemination process?


a. Communication.


b. Organization.


c. Continuous management.


d. Procedures.

c. Continuous Management

(013) This traditional ISR asset was originally designed as a maritime patrol and anti-submarine aircraft?


a. RC-135 COBRA BALL.


b. RC-12 GUARDRAIL.


c. MR Mk1P Nimrod.


d. Tornado GR1A.

c. MR Mk1P Nimrod.

(013) What consists of the DB-110 reconnaissance system with a charged couple device day sensor, mid-wave indium antinomide infrared sensor, and provides real-time day and night targeting?


a. Goodrich Raptor reconnaissance pod.


b. Guidance Terminal reconnaissance pod.


c. Tactical Tiger View reconnaissance pod.


d. Sniper Spot reconnaissance pod.

a. Goodrich Raptor reconnaissance pod.

(014) What non-traditional ISR asset was purchased to fill the void left behind from the retirement of the TARPS system?


a. WSV.


b. TARS.


c. SHARP.


d. ATARS.

c. SHARP

(015) This model is a tool used to characterize the sort of processes that typically happen in a collection cycle for a given sensor.


a. Tasking, collection, processing, evaluation, and dissemination (TCPED).


b. Tasking, collection, processing, exploitation, and dissemination (TCPED).


c. Tasking, communication, processing, evaluation, and dissemination (TCPED).


d. Tasking, communication, processing, exploitation, and dissemination (TCPED).

b. Tasking, collection, processing, exploitation, and dissemination (TCPED).

(015) This phase of the TCPED model refers to the execution of collection operations.


a. Tasking.


b. Collection.


c. Processing.


d. Exploitation.

b. Collection

(015). _______ are typically in high demand, and requirements usually exceed platform capabilities and inventory.


a. ISR assets.


b. Collection Managers.


c. AOCs.


d. DCGSs.

a. ISR Assets

(016) This weapon system is the operational-level command and control center that provides the Commander Air Force Forces with the capability to direct and supervise the activities of assigned forces.


a. Air operations and space center.


b. Air and space operations center.


c. Air operations division.


d. Air operations system.

b. Air and Space Operations Center

(016) The ______ division focuses on long-range planning of air, space, and information operations to achieve theater objectives by developing, refining, disseminating, and assessing the JFACC air and space strategy.


a. Combat operations.


b. Strategy.


c. Combat plans.


d. ISR.

b. Strategy

(016) The primary products of this division include the air tasking order (ATO), airspace control order (ACO) and joint integrated prioritized target list (JIPTL).


a. Intelligence, surveillance, reconnaissance division.


b. Combat operations division.


c. Combat plans division.


d. Air mobility division.

c. Combat Plans Division

(016) What team in the AOC collaborates with collection managers, reconnaissance and surveillance planners, platform/PED liaisons, and the PED center to ensure the ISR operations are synchronized with joint operations?


a. ISR ops team.


b. Targets/tactical assessment team.


c. Airlift control team.


d. ACF Team.

a. ISR Ops Team

(016) This ISRD team conducts dynamic intelligence preparation of the operational environment and provides the context for understanding the adversary's intentions.


a. ISR operations team.


b. Combat intelligence team.


c. Targets/tactical assessment team.


d. Analysis, correlation and fusion team.

d. Analysis, Correlation and Fusion Team

(016) Which team within the air mobility division coordinates closely with the rescue coordination cell?


a. Airlift control team.


b. Air Mobility control team.


c. Air Refueling control team.


d. Aeromedical evacuation control team.

d. Aeromedical Evacuation Control Team

(017) Who is specifically focused on providing detailed, tailored intelligence products and reporting to globally deployed elements?


a. SOF DGS.


b. AFISRA.


c. 480th ISR Wing.


d. DCGS-A.

a. SOF DGS

(017) Which enterprise serves the Navy’s primary system for managing, processing, storing, and sharing critical multi-source intelligence and targeting data and products?


a. DCGS-SOF.


b. DCGS-MC.


c. DCGS-N.


d. DCGS-A.

c. DCGS-N

(017) Why does the DART provide external support?


a. To ensure requirements are satisfied only.


b. To obtain operations details only.


c. To produce tailored products only.


d. To ensure requirements are satisfied, obtain operations details, and produce tailored products.

a. To ensure requirements are satisfied only

(017) What does the DART keep the MPC informed of?


a. Intelligence gaps.


b. Mission requirements.


c. RFIs.


d. RFIs and intelligence gaps.

d. RFIs and Intelligence Gaps

(017) What product, produced by the DART, is used to graphically depict real-time intelligence data, activity, and reference, while meeting supported unit desired effects?


a. PMB.


b. Digital Overlays.


c. All source EYELID report.


d. AF DCGS Analysis report.

b. Digital Overlays

(017) What is the most enduring aspect of the DCGS architecture?


a. Assembled crews.


b. Exploitation crews.


c. Collected data.


d. Disseminated data.

B. Exploitation Crews

(018) Which of the following phases are NOT part of the mission planning cycle?


a. ATO planning.


b. Execution phase.


c. Receive the ATO.


d. Mission planning phase.

a. ATO Planning

(019) Which charts will normally depict the target areas for mission planning?


a. GNC.


b. ONC.


c. TPC.


d. JOG.

d. JOG

(020) In the third phase of the air tasking cycle, what provides the basis for weaponeering assessment activities?


a. MAAP.


b. JIPTL.


c. ATO.


d. ACO.

b. JIPTL

(021) Which of the following is correct, given the following set of an ATO? MSNACFT/2/ACTYP:F-16C/TEXAN01/A1/111/22222/33333//.


a. There will be two A1 aircraft flying a mission with call sign TEXAN01.


b. The call sign of the refueling aircraft is TEXAN01.


c. The aircraft assigned to this mission are F-16Cs.


d. There will be four aircraft flying this mission.

c. The aircraft assigned to this mission are F-16Cs.

(022) What is used to get aircraft to specific areas for mission accomplishment, and does not have altitude restrictions?


a. MRR.


b. BDZ.


c. ATR.


d. ROZ.

c. ATR

(022) Who is the office of primary responsibility for the section of the SPINS that provides guidance to subordinate and supporting commanders of the JFACCs overall C2 battle plan?


a. C2 Planning.


b. Strategy division.


c. Judge advocate general.


d. Electronic warfare coordination cell.

a. C2 Planning

(023) What is the purpose of the first step in the IPOE process?


a. To define the intelligence problem by identifying the specific aspects of the environment, the activities within it, and the space where they exist.


b. To determine the adversary’s COGs, capabilities, doctrinal principles and TTPs.


c. To determine how the battlespace affects adversary and friendly operations.


d. To define the limits of the operational environment.

d. To define the limits of the operational environment.

(023) Which dimension shapes the way military operations are conducted?


a. Information.


b. Physical.


c. Human.


d. Aerospace.

c. Human

(023) What IPOE dimension links the physical and cognitive dimensions?


a. Human.


b. Aerospace.


c. Information.


d. Surface.

c. Information

(024) What is the second step in the IPOE process?


a. Evaluate the adversary.


b. Describe the operational environment effects.


c. Define the limits of the operational environment.


d. Determine the adversary courses of action.

b. Describe the operational environment effects.

(024) Which dimension of the physical environment is not constrained by physical boundaries?


a. Air.


b. Land.


c. Space.


d. Information.

a. Air

(024) _______ are those characteristics, capabilities, or localities from which a military force, nation, or alliance derives its freedom of action, physical strength, or will to fight?


a. Centers of gravity.


b. Courses of action.


c. Strengths.


d. National treasures.

a. Centers of Gravity.

(024) When discussing the modified combined obstacle overlay (MCOO), what is the definition of an avenue of approach (AA)?


a. An air or ground route of an attacking force of a given size leading to its objective.


b. A specific direction or route that the main attack or center of mass of the unit will follow.


c. A route for a force of a particular size to reach an objective or key terrain.


d. The direction of attack used primarily in counterattacks.

b. A specific direction or route that the main attack or center of mass of the unit will follow.

(025) Which ring in Warden’s 5-Ring Model is the least effective area for air power to decisively destroy the adversary’s ability to conduct military operations?


a. Population.


b. Fielded forces.


c. Infrastructure.


d. Leadership.

b. Fielded Forces

(026) Step 4 of the IPOE process identifies and develops _________________.


a. All of the required intelligence.


b. How the battle space affects both adversary and friendly operations.


c. The adversary’s likely COA that will influence accomplishment of the command’s mission.


d. The adversary’s COG, capabilities, doctrinal principles, and applicable tactics, techniques and procedures (TTP) absent of environmental constraints.

c. The adversary’s likely COA that will influence accomplishment of the command’s mission.

(026) In what order should courses of action be developed?


a. In order of priority and commander’s guidance.


b. In order of its probability of adoption.


c. In chronological order.


d. In alphabetical order.

a. In order of priority and commander’s guidance.

(027) What level of IPOE seeks to create an analytic synergy through the integration of services and components?


a. Joint.


b. Tactical.


c. Strategic.


d. Operational.

a. Joint

(028) Whose responsibility is it to provide achievable and measureable guidance, objectives, and intent for IPOE?


a. Combat operations division.


b. Intelligence Staff.


c. Strategy Division.


d. COMAFFOR/JFACC.

d. COMAFFOR/JFACC

(029) What is the term that refers to energy that spreads out as it travels away from its source?


a. Signal.


b. Radiation.


c. Gamma rays.


d. Ultra violet rays.

b. Radiation

(030) What is the rate at which pulses or pulse groups are transmitted called?


a. Pulse width.


b. Pulse repetition frequency.


c. Pulse repetition time.


d. Pulse repetition interval.

b. Pulse repetition frequency.

(030) The distance a target is from the radar site at the time of detection is called what?


a. Range.


b. Altitude.


c. Azimuth.


d. Velocity/direction.

a. Range

(030) The speed at which the target moves in relation to the radar system and is usually expressed in knots is called what?


a. Range.


b. Altitude.


c. Azimuth.


d. Velocity/direction.

d. Velocity/Direction

(031) ________________ radar eliminates ground clutter and provides range, azimuth, and velocity resolution


a. Pulse.


b. Frequency.


c. Monopulse.


d. Pulse Doppler.

d. Pulse Doppler

(032) Identify the method of scan that continuously scans 360 degrees in azimuth.


a. Linear.


b. Raster.


c. Conical.


d. Circular.

d. Circular

(032) ___________________ provides search, track, and missile guidance to air-to-air weapons.


a. Early warning.


b. Height finding.


c. Air intercept.


d. Acquisitions.

c. Air Intercept

(033) What type of jamming uses a wide-band noise transmitter designed to deny the use of frequencies over wide portions of the EM spectrum?


a. Spot.


b. Sweep.


c. Barrage.


d. Precision.

c. Barrage

(034) What samples the receiver noise content at the end of each PRF and sets the gain accordingly for the next pulse interval?


a. Automatic gain control.


b. Automatic noise level.


c. Frequency agility.


d. Polarization.

b. Automatic Noise Level

(035) What does the Rivet Joint’s electronic support mission provide to national and theater consumers?


a. ELINT.


b. SIGINT.


c. GEOINT.


d. HUMINT.

b. SIGINT

(036) What is the measure of how well an object absorbs incident Infrared Radiation and reradiates it?


a. Radiation.


b. Emissivity.


c. Thermal capacity.


d. Absolute temperature.

b. Emissivity.

(037) Visible light occupies a very small part of the entire spectrum, from about _____ to ______ nanometers.


a. 100 to 150.


b. 1000 to 1100.


c. 1500 to 2200.


d. 400 to 700.

d. 400 to 700

(038) When considering the radar significance of cultural features in suburban areas, what will reflect less energy than the concrete and masonry used in urban areas?


a. The houses.


b. Sidewalks and parks.


c. Sidewalks, parks, roads, and railroads.


d. Shingle roofs, wooden construction, grass and dirt.

d. Shingle Roofs, Wooden Construction, Grass and Dirt

(038) When an aircraft _________________________, virtually all cultural, reflected energy comes from the sides of structures. This effect is known as urban reversal or frontal effect.


a. Reaches 17,500 feet.


b. Descends to low level.


c. Rapidly increases attitude.


d. Reaches 15,000 feet.

b. Descends to low level.

(038) When classifying radar returns of military installations, what is the usual method of classification?


a. Find the housing area first.


b. Classify which building is the command building.


c. Classify the installation into the broad category first.


d. Find the petroleum, oil, and lubrication facilities first.

c. Classify the installation into the broad category first.

(039) Which of the following will produce hot infrared signatures?


a. Boilers and furnaces.


b. Dirt roads.


c. Houses.


d. Fields.

a. Boilers and Furnaces

(039) Which of the following is not a factor affecting the thermal signature of equipment?


a. The size of the equipment.


b. Camouflage painting on the equipment.


c. Activity on the equipment.


d. Netting on the equipment.

a. The size of the equipment

(040) What U.S. Government organization was made to ensure the ability to operate effectively in cyberspace and efficiently organize appropriate resources?


a. US Cyber Command.


b. Defense Intelligence Agency.


c. US Communications Command.


d. Department of Homeland Security’s US Computer Emergency Readiness Team.

a. US Cyber Command.

(040) How does the DoD, and U.S. Government maximize talent and capabilities, leverage respective authorities, and operate more effectively to achieve DoD’s mission in the cyberspace realm?


a. Letting each MAJCOM have their own cyber element.


b. By not setting any boundaries or guidelines for USCYBERCOM to follow.


c. Giving USCYBERCOM an unlimited amount of resources.


d. Co-locating USCYBERCOM and NSA.

d. Co-locating USCYBERCOM and NSA

(040) How does cyberspace contribute to U.S. freedom of action?


a. U.S. military operations are secure from the enemy’s awareness.


b. Actions in cyberspace occur faster than the adversary’s capability react.


c. U.S. C2 and intelligence functions depend on operations within cyberspace.


d. All branches of the U.S. government are able to operate on a common network.

c. U.S. C2 and intelligence functions depend on operations within cyberspace.

(041) How many and what type of cyber threats is the U.S. prone to?


a. 5; Traditional, Irregular, Catastrophic, Disruptive, Usual.


b. 5; Traditional, Irregular, Catastrophic, Natural, Unplanned.


c. 6; Traditional, Irregular, Catastrophic, Disruptive, Natural, Accidental.


d. 6; Traditional, Irregular, Catastrophic, Disorderly, Usual, Accidental.

c. 6; Traditional, Irregular, Catastrophic, Disruptive, Natural, Accidental.

(041) A cyber-attack producing WMD-like effects is an example of what type of cyberspace threat category?


a. Traditional.


b. Accidental.


c. Catastrophic.


d. Disruptive

c. Catastrophic.

(041) What is an example of a Disruptive cyber threat?


a. The targeting of global research, investment, development, and industrial processes provide.


b. Terrorists using cyberspace to communicate anonymously.


c. Focusing cyber weapons against our capabilities that enable our air, land, maritime, special operations, and space forces.


d. A WMD or a similar effect destroying a communications system.

a. The targeting of global research, investment, development, and industrial processes provide.

(041) While most threats to cyberspace operations can be characterized as originating from entities having hostile intent there are some threats that must be considered that are not hostile. What are these non-hostile threat categories?


a. Irregular and Traditional.


b. Catastrophic and Disruptive.


c. Accidental and Traditional.


d. Natural and Accidental.

d. Natural and Accidental

(042) Waiting to learn of an imminent attack before addressing important critical infrastructure vulnerabilities is


a. safe and resourceful.


b. risky and unacceptable.


c. invulnerable and desirable.


d. good sound judgment.

b. risky and unacceptable.

(042) Which characteristic is not correct concerning insider vulnerability?


a. Trusted people with legitimate access rights to enterprise information systems and networks.


b. Trusted individuals that pose a significant threat to the enterprise and beyond.


c. Provides a potential avenue for individuals who seek to harm them.


d. Compromised unsuspecting individuals with data rights.

d. Compromised unsuspecting individuals with data rights.

(043) Regarding cyberspace activities, what is the largest target of adversary exploitation and attack attempts?


a. US private sector.


b. Electric and nuclear power facilities.


c. US government and military networks.


d. Commercial services and telecommunications.

c. US government and military networks.

(044) Which component of Space Situational Awareness provides the characterization and assessment of foreign (adversary and third party) space capabilities?


a. Intelligence.


b. Surveillance.


c. Reconnaissance.


d. Environmental Monitoring.

a. Intelligence.

(044) Which component of Space Situational Awareness includes the characterization and assessment of space weather on satellites and links, terrestrial weather near important ground nodes, and natural and man-made phenomena in outer space?


a. Intelligence.


b. Command and Control.


c. Environmental Monitoring.


d. Surveillance and Reconnaissance.

c. Environmental Monitoring.

(045) If adversaries reconstitute their command and control (C2) capabilities via satellite communications (SATCOM) after their ground-based communications network has been destroyed by precision bombing, what operations may be employed in conjunction to reduce or eliminate their ability to communicate with their forces?


a. Defensive counterspace operations.


b. Offensive counterspace operations.


c. Counterspace operations.


d. Deceive, disrupt, deny, degrade, or destroy operations.

b. Offensive counterspace operations.

(045) If a direct assent anti-satellite weapon was launched against an ISR satellite, which OCS category would it be effecting?


a. Terrestrial nodes.


b. Space nodes.


c. Communication links.


d. Military nodes.

b. Space Nodes

(045) A low-altitude direct ascent ASAT is a(n) ____________ weapon, which are __________ impact weapons that are launched on a booster from the ground or from an aircraft into a suborbital trajectory that is designed to intersect that of a low-Earth orbit (LEO) satellite.


a. Kinetic, interceptor.


b. Interceptor; kinetic.


c. Direct Energy Weapon; kinetic.


d. Direct Energy Weapon, Non-Kinetic.

b. Interceptor; kinetic.

(045) What kind of operations are being conducted if an adversary gains access to a restricted computer and was able to control satellite maneuvers?


a. Information Operations.


b. Kinetic Operations.


c. Malicious Operations.


d. Electronic Operations.

a. Information Operations