Cyber Force Packages Flashcards

1
Q

You would develop a plan for proactive network defense by using what process?

A

Joint Operational Planning Process (JOPP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CyOD

A

Cyberspace Operations Directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the benefits of cyber force packaging?

A

terrain access improvement, buy-in from the NOS, cyberspace interdiction package (CIP), tactical reconnaissance package (TRP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

effects consideration and deconfliction would fall into which step?

A

Step 3: Master Cyber Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

these forces conduct wide monitoring and alert to intercept and mitigate malicious adversaries before they reach target. it relies on automated alerts

A

Cyber Alert Patrol (CAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

these forces conduct internal active defense operations, remote scanning and accessing systems/services

A

Tactical Reconnaissance Package (TRP) - FIND

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

these forces setup and validate sensors, scripts, signatures alerts and logging capabilities for specified terrain/targets.

A

AFIN Sensor Package (ASP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

these forces setup, validate, and enable network/system access for specified terrain.

A

AFIN Access Package (AAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the fifth step in the Cyber Tasking Cycle?

A

Execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

monitors the execution of the AFTCO and CCO tasked AF units (division)

A

Combat Operations Division (COD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

these forces deny, degrade, disrupt adversary process, create affects on AFIN terrain. (important: they DO NOT destroy)

A

Cyberspace Interdiction Package (CIP) - TARGET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

these forces conduct internal active defense operations/employed after target is detected; confirms or invalidates emerging targets

A

Cyberspace Surveillance Package (CSP) - FIX/TRACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

624 OC Strategy Division (SRD) with the CyCC takes the inputs of what to begin the development of the Cyberspace Operations Directive (CyOD)?

A

Commander’s Estimate Brief (CEB) and Operations Order ( OPORD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the sixth step in the Cyber Tasking Cycle?

A

Assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Target Development is initiated by which division? Completed by who?

A

initiated by Strategy Division (SRD), completed by Combat Plans Division (CPD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Master Cyber Planning (Step 3) and Orders Productions (Step 4) are in which division?

A

Combat Plans Division (CPD)

17
Q

What is the second step in the Cyber Tasking Cycle?

A

Target Development

18
Q

these forces are in stand-by, tasked to be ready , crisis-action planned objectives

A

Quick Reaction Force (QRF) - ENGAGE/ACCESS

19
Q

seven-step proven, comprehensive, analytical methodology common services

A

Joint Operational Planning Process (JOPP)

20
Q

used to task assigned cyber units (24 AF assets) to perform OCO, DCO, mission assurance, blue, and red team operations to meet AF or Joint requirements.

A

AFCTO

21
Q

these forces destroy specified targets, require MOPs and MOEs to declare mission success

A

Cyberspace Strike Package (CKP) - ENGAGE/ACCESS

22
Q

What is the first step in the Cyber Tasking Cycle?

A

Strategy Development