Power to the People
Rise of the Machines
Joint Means Army
Space Cadets
Nuke 'em
100
TE Lawrence used his Arab forces to fight this country, during this war (two-part answer).
What is Turkey/Ottoman Empire during WWI?
100
Cyber attacks are difficult to deter because networks are difficult to __________?
What is defend?
100
I sign the Unified Command Plan.
Who is the President?
100
The Air Force describes __________ as the ability to maintain freedom of action in, from, and to space, sufficient to sustain mission assurance.
What is Space Superiority?
100
In order for deterrence to work, an attacker must fear _______.
What is retaliation?
200
Mao's theory of protracted war has these three stages (in order):
What is Strategic Defensive, Strategic Stalemate, Strategic Counteroffensive?
200
This MAJCOM is primarily responsible for cyberdefense.
What is Air Force Space Command?
200
As commander of USCENTCOM, my immediate supervisor is this person.
Who is the Secretary of Defense?
200
This treaty denies signatory countries the ability to weaponize celestial bodies.
What is the 1967 Outer Space Treaty?
200
According to Brodie's ________ of ________, protecting the retaliatory force is the essential requirement for deterrence.
What is Diplomacy of Violence?
300
According to Galula, a counterinsurgency becomes 'hot' when this happens.
What is when the counterinsurgent applies force against the insurgent?
300
This organization within this COCOM is responsible for executing military cyberspace operations (two-part answer).
What is Cybercommand, and what is USSTRATCOM?
300
The services have these responsibilities for the joint warfighting commander (three activities).
What are organizing, training, and equipping?
300
Everett Dolman's theory of ____________ advocates for the US to seize control of Low Earth Orbit (LEO).
What is Astropolitik?
300
Using the Strange model for CoG Analysis, uranium enrichment in the wargaming lab was considered a Critical ________ because of its unique single point of failure mode in nuclear weapons production.
What is Vulnerability?
400
Regarding asymmetries, Galula states that--at the beginning of an insurgency--the insurgent is stronger than the counterinsurgent in all areas except this.
What is strength (physical power, arms)?
400
This method of illicit network access involves manipulating people to get them to give you access information.
What is social engineering?
400
These are the three Functional Combatant Commands.
What are USSOCOM, USSTRATCOM, and USTRANSCOM?
400
The National Security Space Strategy describes space as Congested, Congested and ______________.
What is Competitive?
400
According to Schelling, the 'political targets' of the atomic bombing of Japan were the ___________.
What are survivors in Tokyo?
500
“Granted _________, security (in the form of denying targets to the enemy), time, and doctrine (the idea to convert every subject to friendliness), victory will rest with the insurgents, for the algebraical factors are in the end decisive, and against them perfection of means and spirit struggle quite in vain.”
What is mobility?
500
_________ remains the Air Force's most important activity in cyberspace.
What is cyberdefense?
500
These two operations were the catalyst for the 'jointness' emphasized in the Goldwater-Nichols Reorganization DoD Act of 1986.
What were Operation Eagle Claw (Hostages in Iran) and Operation Urgent Fury (invasion of Grenada)?
500
Space assets deployed to a geographic UCC will generally answer to this office/officer.
Who is the JFACC?
500
Using space/surface networked sensors to track in-bound adversary ICBMs is an example of ________ Defense in US Nuclear Strategy.
What is Active?
M
e
n
u