TE Lawrence used his Arab forces to fight this country, during this war. (two part answer)
What is Turkey/Ottoman Empire during WWI.
100
Both state and _______ can be combatants in a 'cyberwar.'
What are non-state actors?
100
I sign the Unified Command Plan.
Who is the President?
100
GPS utilizes this orbit.
What is Medium Earth Orbit (MEO)?
100
According to Brodie, _______ is the dominant concept of nuclear strategy.
What is deterrence?
200
Mao's theory of protracted war has these three stages (in order):
What is Strategic Defensive, Strategic Stalemate, Strategic Counteroffensive.
200
This MAJCOM is primarily responsible for cyberdefense.
What is Air Force Space Command?
200
As commander of USCENTCOM, my immediate supervisor is this person.
Who is the Secretary of Defense?
200
This treaty denies signatory countries the ability to weaponize celestial bodies.
What is the 1967 Outer Space Treaty?
200
In order for deterrence to work, an attacker must fear _______.
What is retaliation?
300
According to Galula, a counterinsurgency becomes 'hot' when this happens.
What is the application of force against an insurgent?
300
This organization within this COCOM is responsible for executing military cyberspace operations (two-part answer).
What is Cybercommand, and what is USSTRATCOM?
300
The services have these responsibilities for the joint warfighting commander.
What are organizing, training, and equipping?
300
The GPS core missions consist of position, navigation, and _______; this final mission is intertwined with banking transactions.
What is timing?
300
Using the Strange model, uranium enrichment in the wargaming lab was considered a Critical ________ because of its unique single point of failure mode in nuclear weapons production.
What is Vulnerability?
400
According to Galula, these are the actions the counterinsurgent may take while the insurgency is still in the cold phase (name one of the four).
What is:
- take direct actions?
- Indirect actions on the conditions propitious to the insurgent?
- infiltrate?
- reinforce the machine?
400
This method of illicit network access involves manipulating people to get them to give you access information.
What is social engineering?
400
These are the three Functional Combatant Commands.
What are USSOCOM, USSTRATCOM, and USTRANSCOM?
400
Spacelift falls under this space mission area.
What is Space Support?
400
According to Schelling, the 'political targets' of the atomic bombing of Japan were the ___________.
What are survivors in Tokyo?
500
Regarding asymmetries, Galula states that--at the beginning of an insurgency--the insurgent is stronger than the counterinsurgent in many areas except this.
What is strength (physical power, arms)?
500
_________ remains the Air Force's most important activity in cyberspace.
What is cyberdefense?
500
These two operations were the catalyst for the 'jointness' emphasized in the Goldwater-Nichols Reorganization DoD Act of 1986.
What were Operation Eagle Claw (Hostages in Iran) and Operation Urgent Fury (invasion of Grenada)?
500
Space assets deployed to a geographic COCOM will generally answer to this office/officer.
Who is the JFACC?
500
According to Brodie, no adequate _______ against the [atomic] bomb exists, and the possibilities of its existence in the future are exceedingly remote.