A global domain within the information environment consisting of interdependent networks of information technology infrastructures
What is Cyberspace
100
Outlines the role of commerce and trade
What is US Code Title 15?
100
One of the easiest ways for our adversaries to gather information about military operations
What is Social Media?
100
The globally interconnected, end-to-end set of information capabilities that provides information on demand to warfighters, policy makers, and support personnel.
What is the DoDIN?
200
Which class of extinguisher is used for its cooling or quenching effect to reduce the burning material’s temperature?
What is Class A
200
The two operations that fall under "using the domain"
What are Cyberspace attack operations and Force enhancement operations?
200
Defines how joint forces use information operations to support our national strategy
What is Joint Pub 3-13?
200
Protects access to information systems through the use of tokens, logon IDs, passwords, PINs
What is Identification and Authentication?
200
Considered the backbone for the DoD worldwide communications network
What is the DISN?
300
When a tourniquet can be used
What is "for severe life threatening bleeding that cannot be controlled by any other means."
300
Ensures friendly use of the electromagnetic spectrum while selectively denying this capability to our adversaries
What is Controlling the Domain?
300
Specifies the rules for Internet use on the job
What is Internet Usage Policy
300
Protection that results from the proper use of cryptographic systems
What is CryptoSec?
300
Long-haul telecommunications infrastructure is maintained by this organization
What is the DISA?
400
Which principle of risk management is used best by integrating the principles as early as possible and provides decision makers the greatest opportunity to apply them?
What is Integrate RM into operations and planning at all levels
400
To completely but temporarily deny (a function of time) access to, or operation of, a target for a period of time.
What is disrupt?
400
Refers to a second or subsequent edition of a TO that supersedes (replaces) the preceding edition.
What is a Revision?
400
Unintentionally emitted signals, or compromising emanations
What are EMSEC vulnerabilities?
400
An open architecture of cutting-edge radio waveform technology system that enables multiple radio types to communicate with one another.
What is the JTRS?
500
The first step to take when you see someone experiencing electrical shock
What is turn off the power
500
The employment of cyber capabilities where the primary purpose is to achieve military objectives in or through the use of the cyberspace domain
What is Cyberspace Operations?
500
Consists of one or more current TOs (paper and/or digital versions) with all changes, revisions, and supplements maintained on a continuing basis
What is a TO library?
500
The telecommunications line is installed in a hardened conduit material, an alarmed carrier, or a continuously viewed carrier
What is a Hardened Distribution System?
500
Provides a cost-effective, reliable, and secure means of classified voice communications