Name the the three main categories of the Full Range Leadership Model
Laissez Faire, Transactional, Transformational
Describe a Threat
Threat = Capability + Intent
Name the three characteristics of the Space Domain
Congested, Contested, Operationally limited (Competitive)
List the instruments of power
(hint: DIME)
Diplomatic, Informational, Military, Economic
List the three needs for a military justice system
Discipline, Crimes unique to the military, Military justice worldwide
Name the Transactional leadership styles
Contingent Reward, Management by Exception-Active, Management by Exception-Passive
Describe a Vulnerability
Vulnerability = Weakness
Cite 3 threats to US access to space
Space weather, man made threats, jamming, lazing, cyberspace attacks
Ends, Ways, and Means are the parts of the process to ____ US military ___ from national ___
Formulate, strategy, objectives
List 3 rights a service member has within the military justice system
Rights advisement, compulsory self-incrimination prohibited, right to counsel, search/seizure/inspection
Name the Transformational Leadership Styles
Idealized Influence, Inspirational Motivation, Intellectual Stimulation, Individual Consideration
A global domain within the information environment consisting of the interdependent network of information technology infrastructures and resident data, including the internet, telecommunications networks, computer systems, and embedded processors and controllers describes what?
The Department of Defense definition for cyberspace
Cite 4 capabilities of space assets
Position, Navigation, and Timing (PNT)/ Satellite Communication (SATCOM)/ Missile Warning (MW)/ Environmental Monitoring (EM)/ Intelligence, Surveillance, and Reconnaissance (ISR) / Offensive Space Control (OSC) / Defensive Space Control (DSC) / Space Situational Awareness (SSA)
Name two pillars of the current National Security Strategy (NSS)
Protect the homeland, Promote American prosperity, Preserve peace through strength, Advance American influence
Identify 3 methods available under the UCMJ to maintain discipline
Preventative discipline, Administrative tools, Non judicial punishment (NJP), Judicial punishment
Describe the Full Range Leadership Model graph
Axes are Effect and Effort, ordered from Laissez-Fair < Transactional < Transformational
(doesn't have to be exact, at least 2 sub categories for each qualifies. must describe axes)
Name 3 cyberspace Threats
Nation States, Extremists/Terrorists, Hackers/Criminals, Insider Threats, User Error
Identify the space capabilities
Orbital warfare, space electronic warfare, space battle management, space access and sustainment
Name two lines of effort of the current National Defense Strategy (NDS)
Lethality, Partnerships, Reform
Commander's legal staff who represents the Air Force in all legal matters
Describe at least three of the ways to apply full range leadership
Not a continuum from "bad" to "good", Different circumstances require different behaviors, May utilize several behaviors in one day or at the same time, Blending and emphasizing behaviors is critical, Laissez-faire is the absence of leadership: avoid it
Name 3 cyberspace Vulnerabilities
User, Operating System, Applications, Poor security procedural practices
Generalize space strategy, policy, and law
Maintain space superiority / Provide space support to national, joint, and combined operations / Ensure space stability
Name 3 objectives of the current National Military Strategy (NMS)
Respond to threats, Deter strategic attack and proliferation of WMD, Deter conventional attack, Assure allies and partners, Compete below the level of armed conflict
What is the function of the Area Defense Counsel?
Represents Air Force personnel in legal matters